CN109918895A - For the method for output data, electronic equipment and computer-readable medium - Google Patents

For the method for output data, electronic equipment and computer-readable medium Download PDF

Info

Publication number
CN109918895A
CN109918895A CN201910171255.7A CN201910171255A CN109918895A CN 109918895 A CN109918895 A CN 109918895A CN 201910171255 A CN201910171255 A CN 201910171255A CN 109918895 A CN109918895 A CN 109918895A
Authority
CN
China
Prior art keywords
application
target
system permission
identification character
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910171255.7A
Other languages
Chinese (zh)
Other versions
CN109918895B (en
Inventor
赵颖俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910171255.7A priority Critical patent/CN109918895B/en
Publication of CN109918895A publication Critical patent/CN109918895A/en
Application granted granted Critical
Publication of CN109918895B publication Critical patent/CN109918895B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Embodiment of the disclosure discloses the method for output data, electronic equipment and computer-readable medium.One specific embodiment of this method includes: to obtain at least one identification character, wherein identification character is corresponding with the required system permission used of application, and identification character applies the required system permission used for determining;For the identification character at least one identification character, in the case where determining the system permission corresponding to the identification character by use, system permission corresponding to the identification character is used using called data as called data;Export the called data of at least one determined.The embodiment helps to find more in time between software to facilitate the normal operation for ensuring software with the presence or absence of conflict.

Description

For the method for output data, electronic equipment and computer-readable medium
Technical field
Embodiment of the disclosure is related to field of computer technology, and in particular to method, electronic equipment for output data And computer-readable medium.
Background technique
Software conflict, when referring to that two or more softwares are run at the same time, the conflict that program is likely to occur leads to wherein one A software or two softwares all cisco unity malfunctions.For example, hardware device (such as computer or mobile phone etc.) operation is slowly, some is soft Part is unable to normal use, hardware device crash etc..
The existing mode for solving software conflict is usual are as follows: by user feedback, or in test phase, is found to have class Like the software of function, then by way of such as being controlled using blacklist or white list, or for certain permissions into Row optimization is in a manner of obtaining higher permission priority, to avoid the conflict between software as far as possible.
Summary of the invention
The present disclosure proposes for the method for output data, electronic equipment and computer-readable medium.
In a first aspect, embodiment of the disclosure provides a kind of method for output data, this method comprises: obtaining extremely A few identification character, wherein identification character is corresponding with the required system permission used of application, and identification character is answered for determination With the required system permission used;For the identification character at least one identification character, determine corresponding to the identification character System permission by the case where use, system permission corresponding to the identification character use using called data as Called data;Export the called data of at least one determined.
Second aspect, embodiment of the disclosure provide a kind of device for output data, which includes: to obtain list Member is configured to obtain at least one identification character, wherein and identification character is corresponding with the required system permission used of application, Identify that character applies the required system permission used for determining;First determination unit is configured at least one identification Identification character in character, in the case where determining the system permission corresponding to the identification character by use, the identification character institute Corresponding system permission is used using called data as called data;Output unit, be configured to export really The called data of at least one made.
The third aspect, embodiment of the disclosure provide a kind of electronic equipment for output data, comprising: one or more A processor;Storage device is stored thereon with one or more programs, when said one or multiple programs are by said one or more A processor executes, so that the one or more processors are realized such as any embodiment in the above-mentioned method for output data Method.
Fourth aspect, embodiment of the disclosure provide a kind of computer-readable medium for output data, deposit thereon Computer program is contained, is realized when which is executed by processor such as any embodiment in the above-mentioned method for output data Method.
Embodiment of the disclosure provide for the method for output data, electronic equipment and computer-readable medium, pass through Obtain at least one identification character, wherein identification character is corresponding with the required system permission used of application, and identification character is used for It determines and applies the required system permission used, then, for the identification character at least one identification character, determine in the identification In the case that system permission corresponding to character is by use, the use application of system permission corresponding to the identification character is called Data as called data, finally, at least one called data that output is determined, above scheme facilitate more and When find to facilitate the normal operation for ensuring software with the presence or absence of conflict between software.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the disclosure is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that one embodiment of the disclosure can be applied to exemplary system architecture figure therein;
Fig. 2 is the flow chart according to one embodiment of the method for output data of the disclosure;
Fig. 3 is the schematic diagram according to an application scenarios of the method for output data of the disclosure;
Fig. 4 is the flow chart according to another embodiment of the method for output data of the disclosure;
Fig. 5 is the structural schematic diagram according to one embodiment of the device for output data of the disclosure;
Fig. 6 is adapted for the structural schematic diagram for the computer system for realizing the electronic equipment of embodiment of the disclosure.
Specific embodiment
The disclosure is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the disclosure can phase Mutually combination.The disclosure is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is shown can the method for output data using embodiment of the disclosure or the dress for output data The exemplary system architecture 100 for the embodiment set.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105. Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Various telecommunication customer end applications can be installed, such as web browser is answered on terminal device 101,102,103 With, shopping class application, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be hardware, be also possible to software.When terminal device 101,102,103 is hard When part, can be for software operation various electronic equipments, including but not limited to smart phone, tablet computer, it is on knee just Take computer and desktop computer etc..When terminal device 101,102,103 is software, may be mounted at above-mentioned cited In electronic equipment.Multiple softwares or software module may be implemented into (such as providing the software of Distributed Services or software in it Module), single software or software module also may be implemented into.It is not specifically limited herein.
Server 105 can be to provide the server of various services, such as to running on terminal device 101,102,103 Software provides the background server supported.Background server can carry out the data such as the page request received analyzing etc. Reason, and obtain processing result (such as page data that the page is presented for terminal device).
It should be noted that the method provided by embodiment of the disclosure for output data can be by server 105 It executes, can also be executed by terminal device 101,102,103.Correspondingly, it can be set for the device of output data in service In device 105, also it can be set in terminal device 101,102,103.In addition, for exporting provided by embodiment of the disclosure The method of data, can also be fitted to each other execution by server 105 and terminal device 101,102,103, for output data Each unit included by device can be respectively arranged in server 105 and terminal device 101,102,103.
It should be noted that server can be hardware, it is also possible to software.When server is hardware, may be implemented At the distributed server cluster that multiple servers form, individual server also may be implemented into.It, can when server is software To be implemented as multiple softwares or software module (such as providing the software of Distributed Services or software module), also may be implemented At single software or software module.It is not specifically limited herein.
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.When the electronics for the operation of output data method thereon When equipment does not need to carry out data transmission with other electronic equipments, which can only include transporting for output data method The electronic equipment of row thereon.
With continued reference to Fig. 2, the process of one embodiment of the method for output data according to the disclosure is shown 200.This is used for the method for output data, comprising the following steps:
Step 201, at least one identification character is obtained.
In the present embodiment, for the executing subject of the method for output data, (such as server shown in FIG. 1 or terminal are set It is standby) at least one knowledge can be obtained by wired connection mode or radio connection from other electronic equipments or local Malapropism symbol.
In the present embodiment, identification character is corresponding with the required system permission used of application, and identification character is for determining Using the required system permission used.As an example, identification character can be the unique identification of system permission.It is appreciated that pair For single software, multiple systems permission (applying the required system permission used) can be used in the process of running, For example, system permission can include but is not limited to it is at least one of following: positioning permission, opens bluetooth at the permission for calling camera Permission etc..In practice, system permission and identification character can be established corresponding relationship in advance by technical staff.For example, using key (key) mode of value (value) pair answers system permission and identification character association storage will pass through identification character to determine With the required system permission used.
Herein, identification character can be the predetermined character of technical staff, for example, identification character " 1 " can be used, come Determine the positioning permission of application;With character " 2 " are identified, to determine the permission etc. for calling camera of application.
In some optional implementations of the present embodiment, identification character may include at least one of following: system power Limit permission keyword (such as Android application permission keyword ACCESS_CHECKIN_PROPERTIES, ACCESS_ COARSE_LOCATION etc.), the function keyword (such as notice, phone, screen locking etc.) of system permission, application programming Interface name (such as the action name of Android system application: ACTION_MAIN, ACTION_DIAL etc.).
Herein, the executing subject communication link when the executing subject of above-mentioned steps 201 is terminal device, with step 201 The server-side connect can issue at least one identification character to the executing subject of above-mentioned steps 201, so as to holding for above-mentioned steps 201 Row main body obtains at least one identification character.In addition, at least one above-mentioned identification character can also be pre-stored within above-mentioned steps Among 201 executing subject (i.e. terminal device).
In addition, above-mentioned executing subject is available to be pre-stored within when the executing subject of above-mentioned steps 201 is server At least one local identification character;It can also be from the electronic equipment (such as terminal device) communicated to connect with above-mentioned executing subject Obtain at least one identification character.
Step 202, for the identification character at least one identification character, the system corresponding to the identification character is determined In the case that permission is by use, system permission corresponding to the identification character is used using called data as called Data.
In the present embodiment, above-mentioned for the identification character at least one identification character accessed in step 201 In the case that executing subject can determine the system permission corresponding to the identification character by use, corresponding to the identification character System permission is used using called data as called data.
Herein, system permission corresponding to above-mentioned identification character can be weighed for the system determined used in identification character Limit.The use application of system permission can be the application for using the system permission.
It is appreciated that needing to call data, for example, number of users usually using applying using system permission According to (such as user account, user's pet name), application programming interface (ApplicationProgrammingInterface, API) etc..
In some optional implementations of the present embodiment, called data include at least one of the following: beating for application The packet name that packet program includes, the class name that the packing program of application includes.
Step 203, at least one called data that output is determined.
In the present embodiment, above-mentioned executing subject can export the called data of at least one determined.
Herein, as an example, above-mentioned executing subject can be to communicating with when above-mentioned executing subject is terminal device At least one called data that the server-side output of connection is determined.It, can be with when above-mentioned executing subject is server At least one the called data determined to the terminal device for communicating with connection or the output of other servers.
In the step 203, the called data that above-mentioned executing subject is exported, which can be determined by step 202, to be owned Called data, be also possible to part determined by step 202 and be called data.
In some optional implementations of the present embodiment, above-mentioned steps 201- step 203 can be to be used in target It preceding is executed by above-mentioned executing subject using online.Wherein, target is terminal application to be installed using application.It is above-mentioned as a result, Executing subject can execute as follows above-mentioned steps 201: firstly, determining that target uses at least using application is required One system permission.Then, at least one identification character corresponding at least one system permission is obtained.
In practice, the program code for realizing above-mentioned steps 201- step 203 can be deployed in above-mentioned target by developer Among the preposition version of application.For example, developer can will realize the program code portion of above-mentioned steps 201- step 203 It is deployed among the application that version is 1.0, in the case, above-mentioned target uses the above-mentioned application that application can be that version is 2.0. Optionally, the program code for realizing above-mentioned steps 201- step 203 can be deployed in and answer in above-mentioned target use by developer Among online preceding other application.
It is appreciated that above-mentioned executing subject can be answered due to before target uses application online with outlet terminal is mounted The data that can be capable of calling with called, target using the system permission used needed for application after mounting its, thus, this is optional Implementation can target use application installation before, to may with target use application there are close function or close permissions The data that the application of operation is called are exported, and further, developer can determine that other are answered by the data that are called With in the process of running, if can be clashed with target using application, after determination may clash, developer can be with Target is adjusted using the packing of application with program, to avoid the generation of conflict, the data that are called as a result, can be exploitation Personnel provide reference when writing packing program of the target using application, ensure that target using application just to a certain extent Often operation.
In some optional implementations of the present embodiment, above-mentioned executing subject can also be used for according to what user inputted It indicates the operation information that can target operate normally using application, determines that can target operate normally using application.
Herein, above-mentioned operation information can be what user artificially determined.When operation information instruction target uses application When can operate normally, above-mentioned executing subject can determine that target uses application that can operate normally;When the operation information indicates target When being not normally functioning using application, above-mentioned executing subject can determine that target is not normally functioning using application.
In some optional implementations of the present embodiment, above-mentioned executing subject can also be called according at least one Data determine that can target operate normally using application.Wherein, can target can be to be determined its using application and operate normally Application.
It is appreciated that being likely to occur conflict when two or more applications are run at the same time using, leading to one of them Using or two application be not normally functioning.For example, hardware device (such as computer or mobile phone etc.) operation is slowly, some software is not Energy normal use, hardware device crash etc..Herein, it can be operated normally by the above-mentioned target of determination using application, it can be with The probability of happening of the above problem is reduced to a certain extent.
In some optional implementations of the present embodiment, for above-mentioned steps: according at least one data that are called, Determine that can target operate normally using application, above-mentioned executing subject can also execute in the following way:
For at least one called data in data that are called, the called corresponding system permission of data is determined, Determine target using applying during using determined system permission, if at least one using removing mesh in application Mark is clashed using the other application except application, to determine that can target operate normally using application.
Herein, the corresponding system permission of above-mentioned called data can be used in the application for calling called data System permission.
As an example, above-mentioned executing subject can in the following way, to determine whether target is made with above-mentioned using application It is clashed with the other application in application in addition to target uses application: if using application and above-mentioned use in target During other application in addition to target uses application is run on the same device simultaneously, equipment operation is slow Slowly, crash or target uses appointing in application and the above-mentioned other application using in application in addition to target uses application Meaning application occur dodge move back, Caton phenomena such as in any one or multinomial, then, above-mentioned executing subject can determine that target makes Conflicted with application with the above-mentioned other application using in application in addition to target uses application;If do not occurred above-mentioned existing Any one as in, then, above-mentioned executing subject can determine that target is used in application with above-mentioned except target makes using application It is not clashed with the other application except application.
In some optional implementations of the present embodiment, target includes for adjusting using the packing program of application The program for the use priority that target is applied using the required system used of application.Determining that target cannot using application as a result, In the case where normal operation, following set-up procedure is can also be performed in above-mentioned executing subject: adjustment target, which uses, applies required use System application use priority, and determine that can the last target adjusted operate normally using application.
In the case where determining that the last target adjusted is not normally functioning using application, above-mentioned executing subject can To continue to execute above-mentioned set-up procedure.
It is used needed for application it is appreciated that developer can use in development goal in application, target will be used to adjust The program of the use priority of the system application used is written in packing program of the target using application, so that target makes With applying when being unable to operate normally adjust automatically (such as to adjust at random, priority is gradually increased, alternatively, gradually decreasing preferential Grade) its used system application use priority, occur when using same priority so as to avoid with other application Conflict.
In some optional implementations of the present embodiment, above-mentioned executing subject can be with: according to determined to Few called data carry out permission control using the required system permission used to what terminal was installed.
As an example, when above-mentioned executing subject determines that there are at least two system permissions for single identification character Using the called data of application (i.e. called data), and the use application of above-mentioned at least two system permission be installed on it is same When terminal, above-mentioned executing subject can carry out permission control to above-mentioned at least two system permission.For example, allowing one of them Using the required system permission used, forbid another using the required system permission used, alternatively, when two applications while making When system permission corresponding with the identification character, the excellent of the corresponding system permission of identification character is set using for the two applications First grade.
Herein, when above-mentioned executing subject is terminal, the terminal of the application of installation and above-mentioned executing subject can be same One electronic equipment, when above-mentioned executing subject is server-side, the terminal of the application of installation can be with above-mentioned executing subject communication link It connects.
In some optional implementations of the present embodiment, for above-mentioned steps 203, above-mentioned executing subject can also be adopted It is executed with such as under type: firstly, counting to the called data of at least one determined, generating index database.Wherein, Index database is used to characterize the corresponding relationship between identification character and called data.Then, above-mentioned index database is exported.
As an example, above-mentioned index database can be the bivariate table or data for being stored with identification character and called data Library.The index database can be used for retrieving the called data of corresponding identification character, alternatively, with the presence or absence of some corresponding specific identification The called data of character.
In some optional implementations of the present embodiment, for above-mentioned steps: according at least one data that are called, Determine that can target operate normally using application, above-mentioned executing subject can also execute in the following way:
Firstly, being built using the system permission in required at least one system permission used of application in advance for target In vertical index database, which is retrieved, to determine the system permission corresponding called data in search library. Wherein, index database is that the data that are called based at least one are established, and index database is for characterizing called data and system permission Between corresponding relationship.
Herein, above-mentioned index database, which can be, arranges at least one above-mentioned called data, is classified, being indexed to produce Raw index database.At least one, which is called in data, has the item of retrieval meaning (for example, the packing program bag of application The class name or other business that the packing program of the packet name, application that include includes) according to the orderly layout of certain way, for The database of retrieval.As an example, above-mentioned index database, which can be associated storage, to be had called data and characterizes the letter of system permission The database of breath, be also possible to associated storage have the marks (such as address for storing called data) of called data with The database of the mark (such as address for storage system permission) of system permission.
Herein, it can have but be not limited at least one of following using (such as using application using application or target) System permission: the permission of user data is accessed, using permission of communication function etc..
Then, based on called data identified, in search library, determine that can target operate normally using application.
As an example, above-mentioned executing subject can determine that called data identified, in search library are corresponding first The use application of system permission, if including that other in addition to target uses application are answered in the use application that this place is determined With, then, above-mentioned executing subject can determine that target is not normally functioning using application;If the use that this place is determined is answered It does not include the other application in addition to target uses application in, then, above-mentioned executing subject can determine that target uses application It can operate normally.
In some optional implementations of the present embodiment, the case where target is not normally functioning using application is being determined Under, above-mentioned executing subject can also adjust target and answer using the packing program of application, and using target use adjusted Application is used with the target before substitution adjustment.
Herein, above-mentioned executing subject can use such as mouse, key according to technical staff under the control of technical staff Control instruction caused by the input-output equipment such as disk uses the packing program of application to adjust target.For example, if target Packing program using application includes following character " function ", and technical staff is by keyboard, at character " function " It is added to new character " 1 " afterwards, then, target adjusted may include character using the packing program that application includes “function1”。
It is appreciated that adjustment target using application packing program after, technical staff can again to adjustment after Target be packaged using the packing of application with program, thus to the target after packing using application issue, for Family uses.
It should be noted that a possibility that using application with other using between application in the presence of conflicting due to the target before adjusting It is larger, thus, by adjusting target using the packing program of application, and is used using target adjusted and adjusted using substitution Target before whole can be reduced target and be existed with other using between application using application using application for user installation use A possibility that conflict, to improve the probability that target uses application to operate normally.
In some optional implementations of the present embodiment, for above-mentioned steps: adjustment target uses the packing applied With program, above-mentioned executing subject can also execute in the following way: being based on predetermined adjustment regular collection, adjust mesh Mark the packing program using application.
Herein, above-mentioned adjustment rule can be technical staff it is predetermined it is various for adjust target using application It is packaged and uses program, use application to use the rule that there is a possibility that conflicting between application with other to reduce target.As an example, Above-mentioned adjustment rule can be but not limited to: if the packing for the application that target is called using the required system permission used of application The packet name for including with program uses the packing of the application of the other application in application in addition to target uses application at least one The packet name for including with program is identical, then, the packing for the application that adjustment target is called using the required system permission used of application The packet name for including with program;If the packing program for the application that target is called using the required system permission used of application includes Class name, include using the packing program of the application of the other application in application in addition to target uses application at least one Class name it is identical, then, include in the packing program for the application that target is called using the required system permission that uses of application Predetermined one or more characters are added behind class name.For example, if target is used using the required system permission used The class name that the packing program of the application of calling includes uses other in application in addition to target uses application at least one The class name that the packing program of the application of application includes is identical, is " function ", then, above-mentioned executing subject can be in mesh The class name " function " that the packing program for the application that mark is called using the required system permission used of application includes below, adds Add predetermined one or more characters (such as " 1 "), thus the class name (example that the packing program for obtaining new application includes Such as " function1 ").
In some optional implementations of the present embodiment, called data include: that the packing of application includes with program Packet name and application the packing program class name that includes.And for above-mentioned steps: determining that can target use application normal Operation, above-mentioned executing subject can also execute in the following way: weigh determining that target is used using the required system used The packet name that the packing program for the application called includes is limited, uses its in application in addition to target uses application at least one The packet name that the packing program for the application that he applies includes is identical, alternatively, target is used using the required system permission tune used The class name that the packing program of application includes is answered at least one using other in application in addition to target uses application In the identical situation of class name that the packing program of application includes, above-mentioned executing subject can determine that target uses application not It can operate normally.
In some optional implementations of the present embodiment, determine target use apply the required system permission used The packet name that the packing program of the application of calling includes uses other in application in addition to target uses application at least one The packet name that the packing program of the application of application includes is different, also, target is called using the required system permission used of application Application the packing program class name that includes, use the other application in application in addition to target uses application at least one Application the packing program class name that includes it is different in the case where, above-mentioned executing subject can determine that target uses application can be just Often operation.
With continued reference to the signal that Fig. 3, Fig. 3 are according to the application scenarios of the method for output data of the present embodiment Figure.In the application scenarios of Fig. 3, it (is " logical in figure that terminal device 301, which obtains at least one identification character from server 302 first, Know, phone " 3001), wherein identification character is corresponding with the required system permission that uses is applied, and (such as " notice " can correspond to System permission " permission for reading notice ", " phone " can be with correspondence system permission " permission made a phone call "), identification character is used for It determines and applies the required system permission used.Then, for the identification character at least one identification character, terminal device 301 In the case where the system permission corresponding to the identification character is determined by use, system permission corresponding to the identification character makes Use using called data as called data (in figure, terminal device 301 determine be called data " notify, Phone " 3002, wherein the class name that the packing program of the application of the corresponding system permission of notify characterization " notice " includes, The class name that the packing program of the application of the corresponding system permission of phone characterization " phone " includes), finally, terminal device 301 is defeated The called data of at least one determined out are (as shown, terminal device 301 exports called data to server 302 “notify、phone”3002)。
Currently, existing one of the mode for solving to conflict between application are as follows: by user feedback, or in test phase, hair Now with the application of similar functions, then by way of such as being controlled using blacklist or white list, or to Mr. Yu A little permissions optimize in a manner of obtaining higher permission priority, to avoid the conflict between applying as far as possible.And the disclosure Method provided by the above embodiment, by determine system permission corresponding to identification character by the case where use, the identification System permission corresponding to character is used using called data as called data, so as to the operation that is applied Called data in the process, called data obtained can be referred to for developer, so as to developer more and When find with the presence or absence of conflict between software, so that it is guaranteed that the normal operation of software.
With further reference to Fig. 4, it illustrates the processes 400 of another embodiment of the method for output data.The use In the process 400 of the method for output data, comprising the following steps:
Step 401, at least one identification character is obtained.
In the present embodiment, for the executing subject of the method for output data, (such as server shown in FIG. 1 or terminal are set It is standby) at least one knowledge can be obtained by wired connection mode or radio connection from other electronic equipments or local Malapropism symbol.Wherein, identification character includes that the permission keyword of system permission, the function keyword of system permission and application program are compiled Journey interface name.Identify that character is corresponding with the required system permission used of application, identification character applies required use for determining System permission.
Step 402, for the identification character at least one identification character, the system corresponding to the identification character is determined In the case that permission is by use, system permission corresponding to the identification character is used using called data as called Data.
In the present embodiment, for the identification character at least one identification character, above-mentioned executing subject can be determined System permission corresponding to the identification character is by the case where use, the use application of system permission corresponding to the identification character The data called are as called data.Wherein, system permission corresponding to above-mentioned identification character can be identification character institute For determining system permission.The use application of system permission can be the application for using the system permission.Called data packet Include the class name that the packing program of packet name and application that the packing program of application includes includes.
Step 403, at least one called data that output is determined.
In the present embodiment, above-mentioned executing subject can export the called data of at least one determined.
Step 404, for target using the system permission in required at least one system permission used of application, preparatory In the index database of foundation, which is retrieved, to determine the system permission corresponding called number in search library According to.
In the present embodiment, for target using application required at least one system permission used in system permission, Above-mentioned executing subject can retrieve the system permission in the index database pre-established, to determine that the system permission exists Corresponding called data in search library.Wherein, index database is that the data that are called based at least one are established, and index database is used for Characterize the corresponding relationship between called data and system permission.
Step 405, determine that target includes using the packing program for the application called using the required system permission used Packet name, include using the packing program of the application of the other application in application in addition to target uses application at least one Packet name, the packing program of the application class name that includes it is whether respectively different.
In the present embodiment, above-mentioned executing subject can also determine that target is called using the required system permission used of application Application the packing program packet name that includes, use the other application in application in addition to target uses application at least one Application the packing program packet name, the packing program of application that the include class name that includes it is whether respectively different.If it is determined that It is respectively different, step 407 is executed, it is no to then follow the steps 406.
Step 406, determine that target is not normally functioning using application.
In the present embodiment, in the packing journey for determining application of the target using the required system permission calling used of application The packet name that sequence includes uses the packing journey of the application of the other application in application in addition to target uses application at least one The packet name that sequence includes is identical, alternatively, the packing program bag for the application that target is called using the required system permission used of application The class name included uses the packing program bag of the application of the other application in application in addition to target uses application at least one In the identical situation of the class name included, above-mentioned executing subject can determine that target is not normally functioning using application.
Step 407, determine that target uses application that can operate normally.
In the present embodiment, in the packing journey for determining application of the target using the required system permission calling used of application The packet name that sequence includes uses the packing journey of the application of the other application in application in addition to target uses application at least one The packet name that sequence includes is different, also, target uses the packing program bag of the application of the required system permission calling used of application The class name included uses the packing program bag of the application of the other application in application in addition to target uses application at least one In the case that the class name included is different, above-mentioned executing subject can determine that target uses application that can operate normally.
Step 408, it is based on predetermined adjustment regular collection, adjustment target uses the packing program of application, and The target before application substitution adjustment is used to use application using target adjusted.
In the present embodiment, in the case where determining that target is not normally functioning using application, above-mentioned executing subject can be with Based on predetermined adjustment regular collection, target is adjusted using the packing program of application, and uses target adjusted Application is used using the target before application substitution adjustment.
It should be noted that not rushed in addition to above with respect to associated description documented by each step included by Fig. 4 In the case where prominent, the associated description of above-mentioned steps 401- step 408 can also include and the embodiment or optional reality in Fig. 2 Existing mode is identical or corresponding verbal description (such as description for feature, the description for effect etc.).For example, in Fig. 4 Shown in flow chart include step 408 in, although not above with respect to associated description documented by each step included by Fig. 4 Record " adjustment rule can be the predetermined various packing programs that application is used for adjusting target of technical staff, with Reduce target and use the rule that there is a possibility that conflicting between application with other using application ", above-mentioned literature record is in for Fig. 2 Verbal description among, thus, the adjustment rule in the step 408 that flow chart shown in Fig. 4 includes is also possible to technical staff It is predetermined various for adjusting target using the packing program of application, it is answered with reducing target using application with other uses The rule for a possibility that being conflicted with presence.Details are not described herein.
Figure 4, it is seen that the method for output data compared with the corresponding embodiment of Fig. 2, in the present embodiment Process 400 highlight determining target using application can operate normally the step of, and determining target use application cannot In the case where normal operation, it is based on predetermined adjustment regular collection, adjustment target is adopted using the packing program applied The step of target before application substitution adjustment is using application is used with target adjusted.As a result, compared with the existing technology (such as By user feedback, or in test phase, it is found to have the application of similar functions, then by such as using blacklist or white The mode that list is controlled, or certain permissions are optimized in a manner of obtaining higher permission priority, to use up The conflict that can be avoided that between application), the scheme of the present embodiment description whether there is conflict between can determining application more in time, when Determine a possibility that there is conflict between application larger (such as target application for using the required system permission that uses of application to call The packet name that packing program includes, the application for using the other application in application in addition to target uses application at least one The packet name that packing program includes is identical, alternatively, the packing for the application that target is called using the required system permission used of application The class name for including with program uses the packing of the application of the other application in application in addition to target uses application at least one The class name for including with program is identical) when, it can be by adjusting the packing program of application, and target adjusted is used to use Using the target substituted before adjusting using application, so that the application after repacking is general in the presence of conflicting between other application Rate substantially reduces, and then ensures user during using the application, which can operate normally.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, present disclose provides one kind for exporting number According to device one embodiment, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, except special documented by following Sign is outer, which can also include feature identical or corresponding with embodiment of the method shown in Fig. 2.The device specifically may be used To be applied in various electronic equipments.
As shown in figure 5, the device 500 for output data of the present embodiment includes: that acquiring unit 501, first determines list Member 502 and output unit 503.Wherein, acquiring unit 501 is configured to obtain at least one identification character, wherein identification character Corresponding with the required system permission used of application, identification character applies the required system permission used for determining;First really Order member 502 is configured to for the identification character at least one identification character, is determined corresponding to the identification character and is By in the case where use, system permission corresponding to the identification character is used using called data as being adjusted permission of uniting Use data;Output unit 503 is configured to export the called data of at least one determined.
In the present embodiment, for the acquiring unit 501 of the device of output data 500 can by wired connection mode or Person's radio connection obtains at least one identification character from other electronic equipments or local.It identifies needed for character and application The system permission used is corresponding, and identification character applies the required system permission used for determining.
In the present embodiment, the identification character at least one identification character obtained for acquiring unit 501, above-mentioned the In the case that one determination unit 502 can determine the system permission corresponding to the identification character by use, the identification character institute Corresponding system permission is used using called data as called data.The power of system corresponding to above-mentioned identification character Limit can be system permission determining used in identification character.The use application of system permission can be to use the system permission Application.
In the present embodiment, above-mentioned output unit 503 can export the called data of at least one determined.
In some optional implementations of the present embodiment, the device 500 can also include: receiving unit (in figure not Show), it is configured to: receiving and be used to indicate the operation information that can target operate normally using application.Wherein, operation information is Artificially determine.
In some optional implementations of the present embodiment, the device 500 further include: the second determination unit is (in figure not Show) data that are called according at least one are configured to, determine that can target operate normally using application.
In some optional implementations of the present embodiment, the second determination unit include: the first determining module (in figure not Show) it is configured to determine the called corresponding system of data for the called data at least one called data Permission determines target using applying during using determined system permission, if at least one using applying In other application in addition to target uses application clash, to determine that can target operate normally using application.
In some optional implementations of the present embodiment, the second determination unit includes: that retrieval module (is not shown in figure It is configured to pre-establishing for target using the system permission in required at least one system permission used of application out) Index database in, which is retrieved, with determine the system permission corresponding called data in search library, In, index database is that the data that are called based at least one are established, index database for characterize called data and system permission it Between corresponding relationship;Second determining module (not shown) is configured to based on called number identified, in search library According to and the data called in the process of implementation of at least one system permission, determine that can target operate normally using application.
In some optional implementations of the present embodiment, the device 500 further include: adjustment unit (not shown) It being configured in response to determine that target is not normally functioning using application, adjustment target uses the packing program of application, and The target before application substitution adjustment is used to use application using target adjusted.
In some optional implementations of the present embodiment, adjustment unit includes: adjustment module (not shown) quilt It is configured to adjust target based on predetermined adjustment regular collection and use the packing program of application.
In some optional implementations of the present embodiment, called data include: that the packing of application includes with program Packet name and application the packing program class name that includes.And second determination unit include: that third determining module (is not shown in figure It is configured in response to determine that target includes using the packing program for the application called using the required system permission used out) Packet name, include using the packing program of the application of the other application in application in addition to target uses application at least one Packet name it is identical, alternatively, the class that the packing program for the application that target is called using the required system permission that uses of application includes Name, the class for including using the packing program of the application of the other application in application in addition to target uses application at least one Name is identical, determines that target is not normally functioning using application.
In some optional implementations of the present embodiment, the device 500 further include: the 4th determining module is (in figure not Show) it is configured in response to the packing program bag for the application for determining that target is called using the required system permission used of application The packet name included uses the packing program bag of the application of the other application in application in addition to target uses application at least one The packet name included is different, also, target includes using the packing program of the application of the required system permission calling used of application Class name includes using the packing program of the application of the other application in application in addition to target uses application at least one Class name is different, determines that target uses application that can operate normally.
In some optional implementations of the present embodiment, which further includes that third determination unit (is not shown in figure Out), be configured to according at least one determined be called data, to terminal installed using the required system used Permission carries out permission control.
In some optional implementations of the present embodiment, above-mentioned output unit 503 is further configured to: to really The called data of at least one made are counted, and index database is generated, wherein index database is for characterizing identification character and being adjusted With the corresponding relationship between data;Export index database.
In some optional implementations of the present embodiment, identification character includes at least one of the following: system permission Permission keyword, the function keyword of system permission, application programming interface name.
In some optional implementations of the present embodiment, called data include at least one of the following: beating for application The packet name that packet program includes, the class name that the packing program of application includes.
The device provided by the above embodiment of the disclosure obtains at least one identification character by acquiring unit 501, In, identification character is corresponding with the required system permission used of application, and identification character applies the required system used for determining Permission, then for the first determination unit 502 for the identification character at least one identification character, it is right in the identification character institute to determine In the case that the system permission answered is by use, the data that the use application of system permission corresponding to the identification character is called are made For the data that are called, output unit 503 exports the called data of at least one determined later, helps to send out more in time With the presence or absence of conflict between existing software, facilitate the normal operation for ensuring software.
Below with reference to Fig. 6, it illustrates the computer systems for the electronic equipment for being suitable for being used to realize embodiment of the disclosure 600 structural schematic diagram.Electronic equipment shown in Fig. 6 is only an example, should not function to embodiment of the disclosure and Use scope brings any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and Execute various movements appropriate and processing.In RAM603, also it is stored with system 600 and operates required various programs and data. CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to bus 604。
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communications portion 609, and/or from detachable media 611 are mounted.When the computer program is executed by central processing unit (CPU) 601, limited in execution disclosed method Above-mentioned function.
It should be noted that computer-readable medium described in the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof Machine program code, described program design language include object-oriented programming language-such as Python, Java, Smalltalk, C++ further include conventional procedural programming language-such as " C " language or similar program design language Speech.Program code can be executed fully on the user computer, partly be executed on the user computer, as an independence Software package execute, part on the user computer part execute on the remote computer or completely in remote computer or It is executed on server.In situations involving remote computers, remote computer can pass through the network of any kind --- packet It includes local area network (LAN) or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as benefit It is connected with ISP by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in embodiment of the disclosure can be realized by way of software, can also be passed through The mode of hardware is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor Including acquiring unit, the first determination unit and output unit.Wherein, the title of these units under certain conditions constitute pair The restriction of the unit itself, for example, acquiring unit is also described as " obtaining the unit of at least one identification character ".
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, which can be Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment. Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are held by the electronic equipment When row, so that the electronic equipment: obtaining at least one identification character, wherein identification character and the required system used of application are weighed Limit it is corresponding, identification character for determine apply the required system permission used;For the identification at least one identification character Character, in the case where determining the system permission corresponding to the identification character by use, the power of system corresponding to the identification character Limit is used using called data as called data;Export the called data of at least one determined.
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the disclosure, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed in the disclosure Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (13)

1. a kind of method for output data, comprising:
Obtain at least one identification character, wherein identification character is corresponding with the required system permission used of application, identifies character The required system permission used is applied for determining;
For the identification character at least one described identification character, determine that the system permission corresponding to the identification character is made In the case where, system permission corresponding to the identification character is used using called data as called data;
Export the called data of at least one determined.
2. according to the method described in claim 1, wherein, the method is executed before target uses application online, described Target is terminal application to be installed using application;And
It is described to obtain at least one identification character, comprising:
Determine that the target uses required at least one system permission used of application;
Obtain at least one identification character corresponding at least one described system permission.
3. according to the method described in claim 1, wherein, the method also includes:
According at least one described called data, determine that can target operate normally using application.
4. according to the method described in claim 3, wherein, described at least one called data according to determine that target makes It can be operated normally with application, comprising:
For the called data at least one described called data, the called corresponding system permission of data is determined, Determine target using applying during using determined system permission, if at least one using removing institute in application It states target to clash using the other application except application, to determine that can target operate normally using application.
5. according to the method described in claim 3, wherein, described at least one called data according to determine that target makes It can be operated normally with application, comprising:
For target using the system permission in required at least one system permission used of application, in the index database pre-established In, which is retrieved, to determine the system permission corresponding called data in the search library, wherein The index database is established based at least one described called data, and the index database is for characterizing called data and being Corresponding relationship between permission of uniting;
Based on the called data in identified, the described search library, determine that can the target operate normally using application.
6. the method according to one of claim 3-5, wherein called data include: that the packing of application includes with program Packet name and application the packing program class name that includes;And
Can the determination target be operated normally using application, comprising:
Include using the packing program of the application of the required system permission calling used of application in response to the determination target Packet name uses the packing program bag of the application of the other application in application in addition to the target uses application at least one The packet name included is identical, alternatively, the packing program bag for the application that the target is called using the required system permission used of application The packing of the application of other application in the class name included, at least one described use application in addition to the target uses application The class name for including with program is identical, determines that the target is not normally functioning using application.
7. the method according to one of claim 3-5, wherein the method also includes:
It is not normally functioning in response to the determination target using application, adjusts the packing program that the target uses application, And the target before application substitution adjustment is used to use application using target adjusted.
8. according to the method described in claim 7, wherein, the adjustment target uses the packing program applied, comprising:
Based on predetermined adjustment regular collection, adjusts the target and use the packing program of application.
9. the method according to one of claim 3-5, wherein the target includes being used for using the packing program of application It adjusts the target and uses the program of the use priority of the required system application used of application;And
The method also includes:
It is not normally functioning in response to the determination target using application, executes following set-up procedure: adjusted the target and use Using the use priority of the required system application used;Determine that can the last target adjusted normally be transported using application Row;
In response to determining that the last target adjusted is not normally functioning using application, the set-up procedure is continued to execute.
10. method described in one of -5 according to claim 1, wherein the method also includes:
According to the called data of at least one determined, carried out to what terminal was installed using the required system permission used Permission control.
11. method described in one of -5 according to claim 1, wherein described to export the called number of at least one determined According to, comprising:
The called data of at least one determined are counted, generate index database, wherein the index database is for characterizing Identify the corresponding relationship between character and called data;
Export the index database.
12. a kind of electronic equipment, comprising:
One or more processors;
Storage device is stored thereon with one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-11.
13. a kind of computer-readable medium, is stored thereon with computer program, wherein real when described program is executed by processor The now method as described in any in claim 1-11.
CN201910171255.7A 2019-03-07 2019-03-07 Method, electronic device, and computer-readable medium for outputting data Active CN109918895B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910171255.7A CN109918895B (en) 2019-03-07 2019-03-07 Method, electronic device, and computer-readable medium for outputting data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910171255.7A CN109918895B (en) 2019-03-07 2019-03-07 Method, electronic device, and computer-readable medium for outputting data

Publications (2)

Publication Number Publication Date
CN109918895A true CN109918895A (en) 2019-06-21
CN109918895B CN109918895B (en) 2023-07-14

Family

ID=66963743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910171255.7A Active CN109918895B (en) 2019-03-07 2019-03-07 Method, electronic device, and computer-readable medium for outputting data

Country Status (1)

Country Link
CN (1) CN109918895B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1987797A (en) * 2005-12-23 2007-06-27 国际商业机器公司 Method and system for avoiding software conflict
CN103310149A (en) * 2013-05-27 2013-09-18 华为终端有限公司 System function calling method and device and terminal
CN105573744A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Application list ordering method, application list ordering device and terminal equipment
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus
CN106406956A (en) * 2016-09-23 2017-02-15 北京小米移动软件有限公司 An application program installing method and device
CN107203715A (en) * 2016-03-18 2017-09-26 阿里巴巴集团控股有限公司 The method and device that execution system is called
CN107463445A (en) * 2017-07-31 2017-12-12 广东欧珀移动通信有限公司 Application process priority management method, apparatus, storage medium and electronic equipment
CN108614696A (en) * 2016-12-08 2018-10-02 腾讯科技(深圳)有限公司 The method and device that a kind of method that application makes, static library generate

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1987797A (en) * 2005-12-23 2007-06-27 国际商业机器公司 Method and system for avoiding software conflict
CN103310149A (en) * 2013-05-27 2013-09-18 华为终端有限公司 System function calling method and device and terminal
CN105573744A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Application list ordering method, application list ordering device and terminal equipment
CN107203715A (en) * 2016-03-18 2017-09-26 阿里巴巴集团控股有限公司 The method and device that execution system is called
CN106056000A (en) * 2016-06-24 2016-10-26 北京奇虎科技有限公司 System authority-based mobile device storage partition configuration method and apparatus
CN106406956A (en) * 2016-09-23 2017-02-15 北京小米移动软件有限公司 An application program installing method and device
CN108614696A (en) * 2016-12-08 2018-10-02 腾讯科技(深圳)有限公司 The method and device that a kind of method that application makes, static library generate
CN107463445A (en) * 2017-07-31 2017-12-12 广东欧珀移动通信有限公司 Application process priority management method, apparatus, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN109918895B (en) 2023-07-14

Similar Documents

Publication Publication Date Title
CN107357914B (en) Information processing method and device
CN106911697B (en) Access rights setting method, device, server and storage medium
CN109446099A (en) Automatic test cases generation method, device, medium and electronic equipment
CN109582691A (en) Method and apparatus for controlling data query
CN108920222A (en) A kind of method and device for business processing of rule-based engine
CN110502222A (en) AAR method, apparatus, medium and the equipment in outgoing dependence inner base library
CN109062563A (en) Method and apparatus for generating the page
US11861013B2 (en) Systems and methods for triaging software vulnerabilities
CN109189938A (en) Method and apparatus for updating knowledge mapping
CN109492053A (en) Method and apparatus for accessing data
CN109359194A (en) Method and apparatus for predictive information classification
CN109447635A (en) Information storage means and device for block chain
CN109271403A (en) A kind of operating method of data query, device, medium and electronic equipment
CN109271557A (en) Method and apparatus for output information
CN110019263A (en) Information storage means and device
CN108829518A (en) Method and apparatus for pushed information
CN109582317A (en) Method and apparatus for debugging boarding application
CN110109983B (en) Method and device for operating Redis database
CN108959642A (en) Method and apparatus for information to be written
CN108763881A (en) Method and apparatus for controlling user right
CN109299124A (en) Method and apparatus for more new model
CN110471859A (en) Service test method, device, medium and electronic equipment
CN109145591A (en) The plug-in loading method of application program
CN109815433A (en) Method and device, storage medium and electronic equipment is locally stored in browser
CN109816455A (en) Method and apparatus for handling information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant