CN109144600B - Application program running method and device and computer readable medium - Google Patents

Application program running method and device and computer readable medium Download PDF

Info

Publication number
CN109144600B
CN109144600B CN201810645420.3A CN201810645420A CN109144600B CN 109144600 B CN109144600 B CN 109144600B CN 201810645420 A CN201810645420 A CN 201810645420A CN 109144600 B CN109144600 B CN 109144600B
Authority
CN
China
Prior art keywords
application
running
instance
cache
registration interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810645420.3A
Other languages
Chinese (zh)
Other versions
CN109144600A (en
Inventor
崔英林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lianshang Xinchang Network Technology Co Ltd
Original Assignee
Lianshang Xinchang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lianshang Xinchang Network Technology Co Ltd filed Critical Lianshang Xinchang Network Technology Co Ltd
Priority to CN201810645420.3A priority Critical patent/CN109144600B/en
Publication of CN109144600A publication Critical patent/CN109144600A/en
Application granted granted Critical
Publication of CN109144600B publication Critical patent/CN109144600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses an application program running method, equipment and a computer readable medium, wherein when a first application running in a foreground state is placed in a background, a second application running in the foreground state and provided with a preset registration interface is identified; causing the first application to send a registration request to the second application; after the second application receives the registration request, the application instance of the first application is added to the cache of the second application; the application can be placed into background operation so that its associated process is in a state that can be persistently referenced.

Description

Application program running method and device and computer readable medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an application running method, an application running device, and a computer-readable medium.
Background
With the development of modern communication technology, mobile phones are becoming indispensable communication tools for people. At present, Android is an operating system most used by global mobile phone users, developed by google corporation known in the united states, and mainly applied to the fields of smart phones, tablet computers and the like. Android is an operating system which is based on a Linux kernel and faces to a mobile terminal. When the application program is placed in the background operation, the occupied memory of the application program cannot be immediately cleaned, and the Linux kernel process also correspondingly continues to exist. When the system memory is insufficient, the system recovers the process, so that the recovered process cannot be continuously referred, and the Linux kernel process of the application program needs to be started again to be continuously referred. In summary, in the current technical solution, there is a problem that when an application is placed in a background operation, an associated process cannot be continuously referenced due to a memory recovery mechanism of an Android operating system.
Disclosure of Invention
In view of this, embodiments of the present disclosure provide an application running method, an application running device, and a computer readable medium, which are used to solve the problem in the prior art that when an application is placed in a background running state due to a memory recovery mechanism of an operating system, an associated process of the application cannot be continuously referred to.
The embodiment of the specification adopts the following technical scheme:
an embodiment of the present specification provides an application program running method, including:
when a first application running in a foreground state is placed in a background, identifying a second application running in the foreground state and having a preset registration interface;
causing the first application to send a registration request to the second application; and
causing the second application to add at least one application instance of the first application to its cache after receiving the registration request.
Preferably, the method further comprises:
when the first application is placed in the foreground again, the first application is caused to send a logout request to the second application; and
causing the second application to delete the application instance of the first application from its cache.
Preferably, the method further comprises:
and after the registration is successful, sending an instruction for the first application to release the occupied system memory.
Preferably, the method further comprises:
causing the first application to send verification information including its package name and/or certificate; and
causing the second application to authenticate the first application.
Preferably, causing the second application to authenticate the first application comprises:
and enabling the second application to send a request to a server to acquire a packet name list of the legal application.
Preferably, identifying a second application running in a foreground state and having a preset registration interface includes:
and monitoring the specified operation of the user, and identifying a second application which runs in a foreground state and is provided with a preset registration interface based on the specified operation of the user.
Preferably, identifying a second application running in a foreground state and having a preset registration interface includes: a second application having a predetermined package name is retrieved locally.
Preferably, adding at least one application instance of the first application to its cache comprises:
and judging whether the application instance of the first application is stored in the cache or not based on the ID of the application instance of the first application, and if so, not adding the application instance of the first application.
Embodiments of the present specification also provide a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to perform the steps of:
when a first application running in a foreground state is placed in a background, identifying a second application running in the foreground state and having a preset registration interface;
causing the first application to send a registration request to the second application;
causing the second application to add at least one application instance of the first application to its cache after receiving the registration request.
Embodiments of the present specification also provide an apparatus for information processing at a user equipment, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the steps of:
the identification module is used for identifying a second application which runs in a foreground state and is provided with a preset registration interface when a first application running in the foreground state is placed in a background;
a request module to cause the first application to send a registration request to the second application; and
and the adding module is used for adding at least one application instance of the first application into the cache of the second application after the second application receives the registration request.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects: when a first application running in a foreground state is placed in a background, a second application running in the foreground state and having a preset registration interface is identified; and causing the first application to send a registration request to the second application; and causing the second application to add the application instance of the first application to its cache; thereby enabling its associated processes to be in a state that can be persistently referenced when the application is placed in the background.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow chart of a method for running an application in one embodiment of the present disclosure;
fig. 2 is a flowchart of an operation method of an application program in an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
An embodiment of the present specification provides an application program running method, an application program running device, and a computer readable medium, so as to solve a problem in the prior art that when an application program is placed in a background running state due to a memory recovery mechanism of an operating system, an associated process of the application program cannot be continuously referred to.
Fig. 1 is a method for running an application program according to an embodiment of the present disclosure, and the method is as follows. The execution subject of the running method of the application program may be a process running in an operating system of the terminal device, for example: and (4) independently running the process in the android system of the mobile phone.
Step S101: when a first application running in a foreground state is placed in a background, identifying a second application running in the foreground state and having a preset registration interface;
it should be noted that, when it is monitored that the first application running in the foreground state is placed in the background, the process identifies the second application running in the foreground state and having the preset registration interface. The preset registration interface is a unified standardized registration interface which is opened to all background applications by the second application running in the foreground state.
Wherein, discerning the second application that runs with the foreground state and has predetermined registration interface includes: a second application having a predetermined package name is retrieved locally.
It should be noted that the first application and the second application running in the foreground status have a user-visible interface or are services with a binding to a visible notification bar.
The registration interface is preset, such as: server. The process described in this embodiment retrieves the local process according to the preset registration interface, and finds the second application having the preset registration interface.
The first application has a registration interface class that is unified with the second application and has a callback interface that can be used to communicate with the second application.
For example: when the user uses the mobile phone, the second application of the user is bound with the visible notification bar, and the first application installed on the user is operated in the foreground and has a user visible interface; when a user clicks a HOME address indicator (HOME) key on a mobile phone, and the first application is placed on a background at the moment, the first application does not have a visible interface, the process automatically searches a local process, and searches that the second application has a preset HOME server registration interface.
Wherein, discerning the second application that runs with the foreground state and has predetermined registration interface includes:
and monitoring the specified operation of the user, and identifying a second application which runs in a foreground state and is provided with a preset registration interface based on the specified operation of the user. The specified operation may be a click operation of a user on a specific position. For example: and clicking the HOME key.
As shown in fig. 2, when a first application running in the foreground state is placed in the background, the process according to this embodiment monitors a user's designated operation, and identifies a second application running in the foreground state and having a preset registration interface based on the user's designated operation.
For example: when the user uses the mobile phone, the second application of the user is bound with the visible notification bar, and the first application installed on the user is operated in the foreground and has a user visible interface; a user clicks an HOME internet address indicator (HOME) key on a mobile phone, at this time, a first application is placed in a background running state, and meanwhile, the process monitors the clicking operation of the user, and pops up a window, which comprises two buttons of 'keep process' and 'not keep process'; when the user clicks the "keep process" button, the process described in this embodiment automatically searches for the local process, and searches that the second application has a preset x.
Step S102, enabling the first application to send a registration request to the second application;
it should be noted that, the first application sends a registration request to the second application through its callback interface.
Step S103, the second application receives the registration request, and adds at least one application instance of the first application to its cache.
It should be noted that, the second application adds at least one application instance of the first application to its cache, so that the application instance of the first application is in a state that can be referred to at any time, and therefore, the purpose of maintaining the process of the first application can be achieved. The first application may contain a plurality of application instances, the application instances of the plurality of first applications constituting an application instance list.
The following example is carried out: after the second application receives the registration request, at least one application instance of the first application is added to the cache of the second application, so that the application instance of the first application is in a state of being capable of being referred at any time, and the purpose of maintaining the process of the first application is achieved.
Preferably, the method further comprises:
when the first application is placed in the foreground state to run again, the first application sends a logout request to the second application;
the second application deletes the application instance of the first application from its cache.
When the first application is activated, namely the first application is put into the foreground state again to run, the first application can be actively logged off, and all application instances of the first application are deleted, so that the journey is prevented from being circularly referenced.
The following example is carried out: when the user re-clicks the first application to activate it, the first application sends a logout request to the second application, which deletes all application instances of the first application from its cache.
Preferably, the method further comprises:
and after the registration is successful, sending an instruction for the first application to release the occupied system memory.
It should be noted that, after the registration is successful, the process in this embodiment sends, to the first application, an instruction for the first application to release the occupied system memory. The following example is carried out: after the successful registration, the process described in this embodiment sends an instruction to the first application to release the system memory occupied by the first application. Or, the second application sends a registration success message to the wechat server, and the wechat server sends a registration success notification to the process described in this embodiment, where the process described in this embodiment sends an instruction to the first application to release the system memory occupied by the first application, and the first application receives the instruction and releases the system memory occupied by the first application.
Preferably, adding the application instance of the first application to its cache includes:
and judging whether the application instance of the first application is stored in the cache or not based on the ID of the application instance of the first application, and if so, not adding the application instance of the first application.
It should be noted that, under the condition of multiple registrations, the uniqueness of the cache needs to be ensured when the foreground application caches, and the multiple registrations are also cached once, at this time, it can be determined whether the process ID of the foreground application, i.e. the ID of the application instance, is already stored in the cache, so as to prevent the repeated addition.
Preferably, the method further comprises:
the first application sends verification information containing its package name and/or certificate;
the second application authenticates the first application.
It should be noted that the registration request includes a package name and/or a certificate of the first application, and is used to verify whether the first application is a legitimate application, so as to prevent the registration interface from being abused.
The following example is carried out: the first application sends a registration request to a callback interface of the second application, wherein the request comprises a package name and/or a certificate of the first application.
Wherein the second application performs authentication on the first application, including:
and the second application sends a request to the server to acquire a packet name list of the legal application.
It should be noted that, after the second application obtains the package name list of the valid application, the package name of the first application is matched with the package name list, and if the package name of the first application is matched with the package name list, the first application is the valid application.
The following example is carried out: and the second application sends a request to the server to acquire a packet name list of the legal application, matches the packet name of the first application with the packet name list, and if the packet name of the first application is matched with the packet name list, the first application is the legal application.
Based on the same inventive concept, embodiments of the present specification provide a computer-readable medium having computer-readable instructions stored thereon, where the computer-readable instructions can be executed by a processor to perform the following steps:
when a first application running in a foreground state is placed in a background, identifying a second application running in the foreground state and having a preset registration interface;
causing the first application to send a registration request to the second application; and
and after the second application receives the registration request, adding at least one application instance of the first application into a cache of the second application.
Based on the same inventive concept, an embodiment of the present specification provides an apparatus for information processing at a user equipment, where the apparatus includes a memory for storing computer program instructions and a processor for executing the program instructions, where the computer program instructions, when executed by the processor, trigger the apparatus to perform the following steps:
the identification module is used for identifying a second application which runs in a foreground state and is provided with a preset registration interface when a first application running in the foreground state is placed in a background;
a request module to cause the first application to send a registration request to the second application; and
and the adding module is used for adding at least one application instance of the first application into the cache of the second application after the second application receives the registration request.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. An application program running method, comprising:
when a first application running in a foreground state is placed in a background, identifying a second application running in the foreground state and having a preset registration interface, so that the first application and the second application communicate by using the preset registration interface;
enabling the first application to send a registration request to the second application through the preset registration interface; and
after the second application receives the registration request, at least one application instance of the first application in the started state is added to the cache of the second application, so that the at least one application instance of the first application in the started state is referred by the second application.
2. The method for running the application program according to claim 1, further comprising:
when the first application is placed in the foreground running again, enabling the first application to send a logout request to the second application; and
causing the second application to delete the application instance of the first application from its cache.
3. The method for running the application program according to claim 1, further comprising:
and after the registration is successful, sending an instruction for the first application to release the occupied system memory.
4. The method for running the application program according to claim 1, further comprising:
causing the first application to send verification information including its package name and/or certificate; and
causing the second application to authenticate the first application.
5. The method for operating the application program according to claim 4, wherein the causing the second application to authenticate the first application includes:
and enabling the second application to send a request to a server to acquire a packet name list of the legal application.
6. The method for operating an application program according to claim 1, wherein identifying a second application operating in a foreground state and having a predetermined registration interface comprises:
and monitoring the specified operation of the user, and identifying a second application which runs in a foreground state and is provided with a preset registration interface based on the specified operation of the user.
7. The method for operating an application program according to claim 1, wherein identifying a second application operating in a foreground state and having a predetermined registration interface comprises: a second application having a predetermined package name is retrieved locally.
8. The method for running the application program according to claim 1, wherein adding at least one application instance of the first application to a cache thereof comprises:
and judging whether the application instance of the first application is stored in the cache or not based on the ID of the application instance of the first application, and if so, not adding the application instance of the first application.
9. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the method of any one of claims 1 to 8.
10. An apparatus for information processing at a user equipment, the apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform the method of any of claims 1 to 8.
CN201810645420.3A 2018-06-21 2018-06-21 Application program running method and device and computer readable medium Active CN109144600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810645420.3A CN109144600B (en) 2018-06-21 2018-06-21 Application program running method and device and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810645420.3A CN109144600B (en) 2018-06-21 2018-06-21 Application program running method and device and computer readable medium

Publications (2)

Publication Number Publication Date
CN109144600A CN109144600A (en) 2019-01-04
CN109144600B true CN109144600B (en) 2021-10-29

Family

ID=64802138

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810645420.3A Active CN109144600B (en) 2018-06-21 2018-06-21 Application program running method and device and computer readable medium

Country Status (1)

Country Link
CN (1) CN109144600B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110762564A (en) * 2019-09-11 2020-02-07 宁波欧琳厨房电器有限公司 Intelligent cooker control method based on self-starting of application component
CN111142979B (en) * 2019-12-30 2023-09-22 广州酷狗计算机科技有限公司 Application program running method, device, computer equipment and storage medium
WO2023245366A1 (en) * 2022-06-20 2023-12-28 北京小米移动软件有限公司 Application management method and apparatus, electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622176A (en) * 2012-02-24 2012-08-01 青岛海信移动通信技术股份有限公司 Processing method and device of application program operation interface
CN103914335A (en) * 2013-01-05 2014-07-09 中国移动通信集团公司 Invoking method, equipment and system for background service
CN105009033A (en) * 2013-03-15 2015-10-28 高通股份有限公司 Interactive inputs for background task
CN106815065A (en) * 2015-11-27 2017-06-09 腾讯科技(深圳)有限公司 The awakening method and device of background application, electronic equipment
CN108076229A (en) * 2017-12-28 2018-05-25 维沃移动通信有限公司 A kind of application operation condition control method and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106775862A (en) * 2016-12-08 2017-05-31 蓝信工场(北京)科技有限公司 Using loading method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622176A (en) * 2012-02-24 2012-08-01 青岛海信移动通信技术股份有限公司 Processing method and device of application program operation interface
CN103914335A (en) * 2013-01-05 2014-07-09 中国移动通信集团公司 Invoking method, equipment and system for background service
CN105009033A (en) * 2013-03-15 2015-10-28 高通股份有限公司 Interactive inputs for background task
CN106815065A (en) * 2015-11-27 2017-06-09 腾讯科技(深圳)有限公司 The awakening method and device of background application, electronic equipment
CN108076229A (en) * 2017-12-28 2018-05-25 维沃移动通信有限公司 A kind of application operation condition control method and mobile terminal

Also Published As

Publication number Publication date
CN109144600A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN110990804B (en) Resource access method, device and equipment
CN107370730B (en) Login information processing method and equipment
CN107426169B (en) Service processing method and device based on permission
CN111538980B (en) Account binding method, device and system for application program
CN109144600B (en) Application program running method and device and computer readable medium
CN107066519B (en) Task detection method and device
CN108268289B (en) Parameter configuration method, device and system for web application
CN107479868B (en) Interface loading method, device and equipment
CN107092824B (en) Application program running method and device
CN107070871B (en) Identity verification method and device
CN111753270B (en) Application program login verification method, device, equipment and storage medium
CN115374481B (en) Data desensitization processing method and device, storage medium and electronic equipment
CN113079224A (en) Account binding method and device, storage medium and electronic equipment
CN108616361B (en) Method and device for identifying uniqueness of equipment
CN110781192A (en) Verification method, device and equipment of block chain data
CN114547569A (en) Account login processing method and device
CN109976769B (en) Method, device and equipment for determining server identification corresponding to application installation package
CN108295478B (en) Method, equipment and readable medium for establishing social relationship
CN111078435A (en) Service processing method and device and electronic equipment
CN110992039A (en) Transaction processing method, device and equipment
CN107704502B (en) Routing method, device, equipment and system
CN114238934A (en) Equipment information acquisition method, device, equipment and medium
CN111796864A (en) Data verification method and device
CN112306710A (en) Service processing system, interface calling method and device
CN112231757B (en) Privacy protection method, device and equipment for embedded application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant