CN110209511B - Method and device for skipping between applications - Google Patents

Method and device for skipping between applications Download PDF

Info

Publication number
CN110209511B
CN110209511B CN201910465667.1A CN201910465667A CN110209511B CN 110209511 B CN110209511 B CN 110209511B CN 201910465667 A CN201910465667 A CN 201910465667A CN 110209511 B CN110209511 B CN 110209511B
Authority
CN
China
Prior art keywords
application
target
jump
identification
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910465667.1A
Other languages
Chinese (zh)
Other versions
CN110209511A (en
Inventor
古栋辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Pocket Fashion Technology Co ltd
Original Assignee
Beijing Pocket Fashion Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Pocket Fashion Technology Co ltd filed Critical Beijing Pocket Fashion Technology Co ltd
Priority to CN201910465667.1A priority Critical patent/CN110209511B/en
Publication of CN110209511A publication Critical patent/CN110209511A/en
Application granted granted Critical
Publication of CN110209511B publication Critical patent/CN110209511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements

Abstract

The disclosure relates to a method and a device for jumping between applications. The method comprises the following steps: a first application generates a jump request, and the jump request requests to jump by using a public identifier of a second application; determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs; and selecting a target application in the at least one third application to jump so as to respond to the jump request. According to the technical scheme, more purposes can be achieved by installing the least applications, the storage space of the terminal is saved, the operation of a user is facilitated, and the user experience is high.

Description

Method and device for skipping between applications
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for skipping between applications.
Background
At present, in a terminal device, it is common practice to transfer one App (Application) content to another App by one-to-one jumping between applications. For example, when a user sees an interesting message by using a news App and wants to share a WeChat friend circle, the user can input a skip request for skipping from the news App to the WeChat App, so that the terminal can control the news App to send the interesting message to the WeChat friend circle for sharing through skip among applications.
In the skip scene among the applications, the terminal can only skip from a source application such as a news App to a target application such as a WeChat App requested by a skip request, and when the target application is not installed on the terminal, the terminal cannot skip from the source application to the target application and further cannot respond to the skip request to achieve the purpose of skipping to the target application.
Disclosure of Invention
The embodiment of the disclosure provides a method and a device for jumping between applications. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a method for jumping between applications, including:
a first application generates a jump request, and the jump request requests to jump by using a public identifier of a second application;
determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs;
and selecting a target application in the at least one third application to jump so as to respond to the jump request.
In one embodiment, the selecting a target application of the at least one third application to jump to respond to the jump request includes:
responding, by the target application, to the jump request when the target application is able to respond to the jump request.
In one embodiment, the selecting a target application of the at least one third application to jump to respond to the jump request includes:
when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the second application;
when the application holding the target private identification is installed in the terminal, skipping from the target application to the application holding the target private identification, and responding to the skipping request by the application holding the target private identification;
when the application holding the target private identification is not installed in the terminal, after the application holding the target private identification is controlled to be installed, the application jumps to the application holding the target private identification from the target application, and the application holding the target private identification responds to the jump request. In an embodiment, when the skip request further carries a private identifier of the second application, the method further includes:
when a second application holding the private identification of the second application is installed in the terminal, jumping from the target application to the second application, and responding to the jumping request by the second application;
the determining at least one third application installed in the terminal and holding the public identity of the second application comprises:
and when the second application holding the private identification of the second application is not installed in the terminal, determining at least one third application which is installed in the terminal and holds the public identification of the second application.
In one embodiment, the selecting a target application of the at least one third application to jump comprises:
selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
receiving an input selection instruction, wherein the selection instruction is used for indicating that a target application in the at least one third application is selected to jump; and responding to the selection instruction, and selecting a target application in the at least one third application to jump.
In one embodiment, the skip request further carries a public identifier of the fourth application, and the method further includes:
and when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the fourth application, wherein the fourth application and the second application belong to different applications.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for jumping between applications, including:
the generating module is used for generating a jump request by a first application, and the jump request requests to jump by using a public identifier of a second application;
the determining module is used for determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs;
and the selection module is used for selecting a target application in the at least one third application to jump so as to respond to the jump request.
In one embodiment, the selection module comprises:
and the first response submodule is used for responding the jump request by the target application when the target application can respond to the jump request.
In one embodiment, the selection module comprises:
the first determining submodule is used for determining a target private identifier corresponding to the public identifier according to the public identifier of the second application when the target application cannot respond to the jump request;
a second response submodule, configured to jump from the target application to the application holding the target private identity when the application holding the target private identity is installed in the terminal, and respond to the jump request by the application holding the target private identity;
and the third response submodule is used for controlling to jump from the target application to the application holding the target private identity after the application holding the target private identity is installed when the application holding the target private identity is not installed in the terminal, and the application holding the target private identity responds to the jump request.
In an embodiment, when the skip request further carries a private identifier of the second application, the apparatus further includes:
a response module, configured to jump from the target application to a second application when the second application holding a private use identifier of the second application is installed in the terminal, and respond to the jump request by the second application;
the determining module comprises:
and the second determining submodule is used for determining at least one third application which is installed in the terminal and holds the public identification of the second application when the second application holding the private identification of the second application is not installed in the terminal.
In one embodiment, the selection module comprises:
the selection submodule is used for selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
the receiving submodule is used for receiving an input selection instruction, and the selection instruction is used for indicating that a target application in the at least one third application is selected to jump;
and the fourth response submodule is used for responding to the selection instruction and selecting the target application in the at least one third application to jump.
In one embodiment, the skip request further carries a public identifier of the fourth application;
the first determining submodule is further configured to determine, when the target application cannot respond to the skip request, a target private identity corresponding to the public identity according to a public identity of a fourth application, where the fourth application and the second application belong to different applications.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for jumping between applications, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the above method.
According to a fourth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium storing computer instructions which, when executed by a processor, implement the steps in the above-mentioned method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: in this embodiment, a plurality of applications may form an application group, and thus, when an application wants to jump to a second application in the application group, even if the second application is not installed, the application may jump to other applications in the application group that can achieve the jump purpose to achieve a corresponding purpose, and a user does not need to install the second application to achieve the jump purpose.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a method of jumping between applications, according to an example embodiment.
FIG. 2 is a flow diagram illustrating a method of jumping between applications, according to an example embodiment.
FIG. 3 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 4 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 5 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 6 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 7 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 8 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
FIG. 9 is a block diagram illustrating an apparatus for jumping between applications, according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a method for jumping between applications according to an exemplary embodiment, where as shown in fig. 1, the method for jumping between applications is used in a terminal, and includes the following steps 101 and 103:
in step 101, a first application generates a jump request requesting a jump using a public identity of a second application.
Here, when the first application receives a jump instruction for jumping to the second application, which is input by a user, the first application generates a jump request for jumping to the second application, where the jump request requests to jump using a public identifier of the second application, and the jump request carries service data requesting the second application to achieve a certain purpose.
Here, the first application and the second application are different applications.
In step 102, at least one third application which is installed in the terminal and holds the public identification of the second application is determined; each third application holds a public identity of each application in an application group to which the third application belongs.
Here, at least two applications are included in one application group, and each application is provided with two identifiers: the private label and the public label, wherein, the public label is used for being identified to the application and held by other applications so as to form the same application group, and the private label is used for precisely jumping. Besides two identifiers of the application, each application in the same application group can also hold common identifiers of other applications in the application group. Two applications in the same application group can jump to each other and transmit the jump request.
Here, after obtaining the skip request, the terminal may first query which application is the public identity of the second application from the applications installed in the terminal, and determine a third application or multiple third applications holding the public identity of the second application in the terminal, where the third application is an application in the same application group as the second application, and the third application and the second application may be the same application or different applications.
In step 103, a target application of the at least one third application is selected to jump in response to the jump request.
Here, the terminal may select a target application from the at least one third application to jump, and the target application may respond to the jump request after receiving the jump request, and of course, the target application may also jump to other applications in the same application group, and the other applications respond to the jump request.
For example, assume that the identities held by applications within an application group can be as shown in table 1:
Figure BDA0002079324240000071
TABLE 1
As shown in table 1, there are four applications within the application group: the method comprises the following steps of applying A, applying B, applying C and applying D, wherein the applying A holds the identification of the applying A: public identity A and private identity A, and the public identities of other applications in the application group: the public identifier B, the public identifier C, and the public identifier D are also shown in table 1, and are not described herein again.
In general, a user does not install all applications in an application group in a terminal. Assuming that only an application B and an application C are installed in the terminal, the first application is an application X, the second application is an application A, and the application B can achieve the purpose of a jump request, the application X can jump by using the common identifier A after receiving a jump instruction input by a user and jumping to the application A, the terminal can determine that at least one third application which is installed in the terminal and holds the common identifier A is the application B and the application C, at the moment, the terminal can select a target application from the application B and the application C to jump, and can select the target application as the application B, so that the terminal can jump to the application B from the application X, and the application B can respond to the jump request to achieve the purpose of the jump request. Thus, even if the application A is not available, the purpose of the jump request can be realized.
Of course, in the above example, the first application may also be an application in an application group, such as application C, that is, the first application and the second application may belong to the same application group, or may not belong to the same application group, which is not limited herein.
In this embodiment, a plurality of applications may form an application group, and thus, when an application wants to jump to a second application in the application group, even if the second application is not installed, the application may jump to other applications in the application group that can achieve the jump purpose to achieve a corresponding purpose, and a user does not need to install the second application to achieve the jump purpose.
In one possible implementation, step 103 in the jump method between applications described above can be implemented as the following step a 1.
In step a1, when the target application can respond to the jump request, the jump request is responded to by the target application.
Here, after the terminal jumps from the first application to the target application, if the target application can respond to the jump request, the target application can directly respond to the jump request, so as to achieve the purpose of the jump request.
Still taking the application group shown in table 1 as an example, assuming that the first application is application X and the second application is application a, both application a and application B can achieve the objective 1.
The first condition is as follows: only an application A is installed in the terminal, and an application B is not installed in the terminal; the application X performs a jump using the common identifier a after receiving a jump instruction to jump to the application a, which is input by a user, and the terminal determines that at least one third application having the common identifier a and installed in the terminal is the application a, at this time, the terminal may directly determine that the target application is the application a, and jumps to the application a from the application X, and the application a may respond to the jump request to achieve the purpose 1 of the jump request.
Case two: the application A is not installed in the terminal, only the application B is installed, the application X uses the public identification A to jump after receiving a jump instruction which is input by a user and jumps to the application A, the terminal can determine that at least one third application which is installed in the terminal and holds the public identification A is the application B, at the moment, the terminal can directly determine that the target application is the application B, the application X jumps to the application B, and the application B can respond to the jump request to realize the aim 1 of the jump request. Thus, the application X wants to jump to the application a to achieve the purpose 1, but when the application a is not installed, it can jump to the application B in the same application group to achieve the purpose 1.
Case three: the application A and the application B are installed in the terminal, the application X uses the public identification A to jump after receiving a jump instruction which is input by a user and jumps to the application A, the terminal can determine that at least one third application which is installed in the terminal and holds the public identification A is the application A and the application B, at the moment, the terminal can select a target application from the application A and the application B as the application A or the application B, the application X jumps to the application A or the application B, and the application A or the application B can respond to the jump request to realize the purpose 1 of the jump request.
In one possible implementation, the step 103 in the jump method between the above-mentioned applications may be implemented as the following steps a2 to a 4.
In step a2, when the target application cannot respond to the jump request, determining a target private identity corresponding to the public identity according to the public identity of the second application.
In step a3, when the application holding the target private label is installed in the terminal, the jump is made from the target application to the application holding the target private label, and the jump request is responded by the application holding the target private label.
In step a4, when the application holding the target private identity is not installed in the terminal, after controlling the installation of the application holding the target private identity, the jump is made from the target application to the application holding the target private identity, and the jump request is responded by the application holding the target private identity.
Here, after the terminal jumps from the first application to the target application, if the target application cannot respond to the jump request, the target application may determine a target private identity corresponding to the public identity of the second application according to a correspondence between a public identity and a private identity pre-stored in the target application, and since only the second application will hold the target private identity corresponding to the public identity of the second application, the terminal may determine whether an application holding the target private identity is installed in the terminal, and if so, it indicates that the second application holding the target private identity is installed in the terminal, at this time, the terminal may jump from the target application to the second application, and the second application responds to the jump request.
If the terminal judges that the application with the target private identity is not installed in the terminal, the terminal indicates that a second application with the target private identity is not installed in the terminal, at this time, in order to enable the jump request to be responded, the terminal can automatically download and install the second application, and can also display prompt information to guide a user to install the second application. After the terminal downloads and installs the second application, the terminal can jump from the target application to the second application, and the second application responds to the jump request.
Also taking the application group shown in table 1 above as an example, assume that the first application is application X and the second application is application a, and only application a can achieve purpose 2.
The first condition is as follows: only the application B is installed, and the application A is not installed, after the application X receives a jump instruction which is input by a user and jumps to the application A, the terminal will determine that at least one third application installed in the terminal and holding the public identity a is application B, and at this time, the terminal may directly determine that the target application is application B, and jump from application X to application B, but the application B can not respond to the skip request to realize the purpose 2 of the skip request, so the terminal can determine the private identification A corresponding to the public identification A, further determining that the application A with the private identification A is not installed in the terminal, at this time, the terminal can automatically or guide to install the application A, after the application A is installed, a jump is made from the application B to the application a, which responds to the jump request by implementing the purpose 2 of the jump request.
Case two: if the application A and the application B are installed at the same time, after the application X receives a jump instruction which is input by a user and jumps to the application A, the common identifier A is used for jumping, the terminal determines that at least one third application which is installed in the terminal and holds the common identifier B is an application A and an application B, at the moment, the terminal may select a target application as the application B, the application X jumps to the application B, but the application B can not respond to the skip request to realize the purpose 2 of the skip request, so the terminal can determine the private identification A corresponding to the public identification A, further determining that the application A with the private identification A is not installed in the terminal, at this time, the terminal can automatically or guide to install the application A, after the application A is installed, a jump is made from the application B to the application a, which responds to the jump request by implementing the purpose 2 of the jump request. In this case, of course, the terminal may also select the target application as application a, and application a may respond to the skip request to achieve the purpose 2 of the skip request.
In a possible implementation manner, the skip request further carries a public identifier of the fourth application, and the skip method between the applications further includes step a 5.
In step a5, when the target application cannot respond to the jump request, determining a target private identity corresponding to the public identity according to a public identity of a fourth application, where the fourth application and the second application belong to different applications.
Here, after the terminal jumps from the first application to the target application, if the target application cannot respond to the jump request, the target application may determine a target private identity corresponding to the public identity of the fourth application according to a correspondence between the public identity and the private identity pre-stored by the target application, and then perform the above steps A3 and a 4.
For example, only application a can achieve purpose 2, and application X can use only one public identity, such as public identity B, to jump when jumping. In this case, when the user wants to jump to the application a by the application X to achieve the purpose 2, the user inputs a jump instruction, the application X receives the jump instruction and generates a jump request to jump by using the public identifier B, and the jump request carries the service data for achieving the purpose 2 and also carries the public identifier a of the fourth application at the jump destination, namely the application a.
The first condition is as follows: only the application B is installed, the application A is not installed, when the application X jumps by using the public identification B, the terminal can determine that at least one third application which is installed in the terminal and holds the public identification B is the application B, at the moment, the terminal can directly determine that the target application is the application B and jumps to the application B from the application X, but the application B can not respond to the skip request to realize the purpose 2 of the skip request, at this time, the terminal can determine the private identification A corresponding to the public identification A according to the public identification A carried in the skip request, further determining that the application A with the private identification A is not installed in the terminal, at this time, the terminal can automatically install the application A or guide the user to install the application A, after the installation of the application A is completed, a jump is made from the application B to the application a, which responds to the jump request by implementing the purpose 2 of the jump request.
Of course, if the application a is installed in the terminal, the terminal may jump from the application B to the application a, and the application a responds to the jump request, so that the application a realizes the purpose 2 of the jump.
In a possible implementation manner, when the jump request further carries the private identifier of the second application, the method for jumping between applications further includes step B1, and step 102 in the method may also be implemented as the following step B2.
In step B1, when a second application holding the private use identifier of the second application is installed in the terminal, the target application jumps to the second application, and the second application responds to the jump request.
In step B2, when the second application holding the private identification of the second application is not installed in the terminal, at least one third application holding the public identification of the second application, which is installed in the terminal, is determined.
Here, the first application generates a jump request for jumping to the second application, where the jump request carries a public identifier and a private identifier of the second application, and the terminal may first determine whether an application holding the private identifier of the second application is installed in the terminal, and if so, it indicates that the second application is installed in the terminal, and at this time, the target application may jump directly to the second application, and the second application responds to the jump request. If the terminal determines that the terminal does not have the application with the private identifier of the second application, it indicates that the second application is not installed in the terminal, and at this time, the terminal may perform step 102 and step 103, select a third application in the terminal that belongs to the same application group as the second application to perform a jump, and respond to the jump instruction by the third application.
In a possible embodiment, step 103 of the jump method between applications described above can also be implemented as the following step C1.
In step C1, a target application in the at least one third application is selected according to a preset rule for jumping.
Here, the preset rule may be to select the third application installed first as the target application, or to select the third application with the highest frequency of X hops as the target application, or the like.
In a possible implementation, the step 103 of the jump method between the above-mentioned applications can also be implemented as the following steps C2 and C3.
In step C2, an input selection instruction is received, where the selection instruction is used to instruct a target application in the at least one third application to be selected for jumping.
In step C3, in response to the selection instruction, a target application of the at least one third application is selected to jump.
Here, after determining the plurality of third applications, the terminal may display an option box and an "ok" key for each third application on the terminal screen, and the user may click the option box to select the target application and click the "ok" key to determine to select the target application, which is an input selection instruction, and after receiving the selection instruction, the terminal may select the third application selected by the user as the target application in response to the selection instruction.
Also taking the application group shown in table 1 above as an example, assuming that the first application is application X and the second application is application a, only application a can achieve purpose 3. An application A, an application B and an application C are installed in the terminal; the application X generates a jump request to the application a carrying the common identifier a, the terminal determines that three third applications installed in the terminal and holding the common identifier a are the application a, the application B and the application C, at this time, the terminal displays an option frame and a "ok" button of the three applications, the user can click the option frame corresponding to the application a and click the "ok" button to input a selection instruction, the terminal receives the selection instruction, selects the application a to jump, and the application a responds to the jump request, thereby achieving the purpose 3.
The embodiment may receive an input selection instruction, where the selection instruction is used to instruct a target application in the at least one third application to be selected for jumping, and in response to the selection instruction, the target application in the at least one third application is selected for jumping, which may ensure that an application required by a user can be jumped to respond to a jump request.
The implementation is described in detail below by way of several embodiments.
Fig. 2 is a flowchart illustrating a method for jumping between applications according to an exemplary embodiment, where as shown in fig. 2, the method for jumping between applications may be implemented by a terminal or the like, including steps 201 and 208.
In step 201, a first application generates a jump request requesting a jump using a public identity of a second application.
In step 202 at least one third application installed in the terminal holding a public identity of said second application is determined.
Wherein each third application holds a public identifier of each application in an application group to which the third application belongs;
in step 203, receiving an input selection instruction, where the selection instruction is used to instruct a target application in the at least one third application to be selected for jumping;
in step 204, in response to the selection instruction, a target application of the at least one third application is selected to jump.
In step 205, when the target application can respond to the jump request, the jump request is responded to by the target application.
In step 206, when the target application cannot respond to the jump request, determining a target private identity corresponding to the public identity according to the public identity of the second application;
in step 207, when the application holding the target private identity is installed in the terminal, the application jumps from the target application to the application holding the target private identity, and the application holding the target private identity responds to the jump request.
In step 208, when the application holding the target private identity is not installed in the terminal, after controlling to install the application holding the target private identity, jumping from the target application to the application holding the target private identity, and responding to the jump request by the application holding the target private identity.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods.
FIG. 3 is a block diagram illustrating an apparatus for jumping between applications, which may be implemented as part or all of an electronic device, in software, hardware, or a combination of both, according to an example embodiment. As shown in fig. 3, the jumping apparatus between applications includes:
a generating module 301, configured to generate a skip request by a first application, where the skip request requests to skip using a public identifier of a second application;
a determining module 302, configured to determine at least one third application installed in the terminal and holding the public identifier of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs;
a selecting module 303, configured to select a target application of the at least one third application to jump in response to the jump request.
As a possible embodiment, fig. 4 is a block diagram illustrating an apparatus for jumping between applications according to an exemplary embodiment, and as shown in fig. 4, the apparatus for jumping between applications disclosed above may further configure the selection module 303 to include a first response submodule 3031, where:
a first response submodule 3031, configured to, when the target application can respond to the jump request, respond to the jump request by the target application.
As a possible embodiment, fig. 5 is a block diagram illustrating an apparatus for jumping between applications according to an exemplary embodiment, and as shown in fig. 5, the apparatus for jumping between applications disclosed above may further configure the selection module 303 to include a first determination submodule 3032, a second response submodule 3033, and a third response submodule 3034, wherein:
a first determining submodule 3032, configured to determine, according to the public identifier of the second application, a target private identifier corresponding to the public identifier when the target application cannot respond to the skip request;
a second response submodule 3033, configured to jump from the target application to the application holding the target private identity when the application holding the target private identity is installed in the terminal, and respond to the jump request by the application holding the target private identity;
a third response submodule 3034, configured to, when the application holding the target private identity is not installed in the terminal, control to jump from the target application to the application holding the target private identity after the application holding the target private identity is installed, and respond to the jump request by the application holding the target private identity.
As a possible embodiment, when the jump request further carries a private identifier of the second application, fig. 6 is a block diagram illustrating an apparatus for jumping between applications according to an exemplary embodiment, and as shown in fig. 6, the apparatus for jumping between applications disclosed above may be further configured to include a response module 304, and the determining module 302 may be further configured to include a second determining sub-module 3021, where:
a response module 304, configured to jump from the target application to a second application when the second application holding a private use identifier of the second application is installed in the terminal, and respond to the jump request by the second application;
a second determining submodule 3021, configured to determine, when a second application holding a private identity of the second application is not installed in the terminal, at least one third application holding a public identity of the second application, which is installed in the terminal.
As a possible embodiment, fig. 7 is a block diagram illustrating an apparatus for jumping between applications according to an exemplary embodiment, and as shown in fig. 7, the apparatus for jumping between applications disclosed above may further configure the selection module 303 to include a selection sub-module 3035, where:
the selecting submodule 3035 is configured to select a target application in the at least one third application according to a preset rule to jump.
As a possible embodiment, fig. 8 is a block diagram illustrating an apparatus for jumping between applications according to an exemplary embodiment, and as shown in fig. 8, the apparatus for jumping between applications disclosed above may further configure the selection module 303 to include a receiving submodule 3036 and a fourth response submodule 3037, wherein:
the receiving submodule 3036 is configured to receive an input selection instruction, where the selection instruction is used to instruct a target application in the at least one third application to be selected for jumping;
a fourth response submodule 3037, configured to select, in response to the selection instruction, a target application in the at least one third application to jump.
As a possible embodiment, the skip request further carries a public identifier of the fourth application; the first determining submodule 3032 is further configured to determine, when the target application cannot respond to the skip request, a target private identity corresponding to the public identity according to the public identity of the fourth application, where the fourth application and the second application belong to different applications.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 9 is a block diagram illustrating an apparatus for jumping between applications, which is suitable for a terminal device, according to an exemplary embodiment. For example, the apparatus 900 may be a mobile phone, a game console, a computer, a tablet device, a personal digital assistant, and the like.
The apparatus 900 may include one or more of the following components: processing component 901, memory 902, power component 903, multimedia component 904, audio component 905, input/output (I/O) interface 906, sensor component 907, and communications component 908.
The processing component 901 generally controls overall operation of the device 900, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 901 may include one or more processors 920 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 901 may include one or more modules that facilitate interaction between the processing component 901 and other components. For example, the processing component 901 may include a multimedia module to facilitate interaction between the multimedia component 904 and the processing component 901.
The memory 902 is configured to store various types of data to support operations at the apparatus 900. Examples of such data include instructions for any application or method operating on device 900, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 902 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 903 provides power to the various components of the device 900. The power components 903 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 900.
The multimedia component 904 includes a screen that provides an output interface between the device 900 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 904 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 900 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
Audio component 905 is configured to output and/or input audio signals. For example, audio component 905 includes a Microphone (MIC) configured to receive external audio signals when apparatus 900 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 902 or transmitted via the communication component 908. In some embodiments, audio component 905 also includes a speaker for outputting audio signals.
I/O interface 906 provides an interface between processing component 901 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Sensor component 907 includes one or more sensors for providing various aspects of status assessment for device 900. For example, sensor assembly 907 may detect an open/closed state of device 900, the relative positioning of components, such as a display and keypad of device 900, the change in position of device 900 or a component of device 900, the presence or absence of user contact with device 900, the orientation or acceleration/deceleration of device 900, and the change in temperature of device 900. Sensor assembly 907 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 907 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 907 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 908 is configured to facilitate communications between the apparatus 900 and other devices in a wired or wireless manner. The apparatus 900 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 908 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 908 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 900 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 902 comprising instructions, executable by the processor 920 of the apparatus 900 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium, instructions in which, when executed by a processor of an apparatus 900, enable the apparatus 900 to perform a method of jumping between the above-mentioned applications, the method comprising:
a first application generates a jump request for jumping to a second application, wherein the jump request carries a public identifier of the second application;
determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs;
and selecting a target application in the at least one third application to jump so as to respond to the jump request.
In one embodiment, the selecting a target application of the at least one third application to jump to respond to the jump request includes:
responding, by the target application, to the jump request when the target application is able to respond to the jump request.
In one embodiment, the selecting a target application of the at least one third application to jump to respond to the jump request includes:
when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the second application;
when a second application holding the target private identification is installed in the terminal, skipping from the target application to the second application, and responding to the skipping request by the second application;
and when the second application is not installed in the terminal, controlling to jump from the target application to the second application after the second application is installed, and responding to the jump request by the second application.
In an embodiment, when the skip request further carries a private identifier of the second application, the method further includes:
when a second application holding the private identification of the second application is installed in the terminal, jumping from the target application to the second application, and responding to the jumping request by the second application;
the determining at least one third application installed in the terminal and holding the public identity of the second application comprises:
and when the second application holding the private identification of the second application is not installed in the terminal, determining at least one third application which is installed in the terminal and holds the public identification of the second application.
In one embodiment, the selecting a target application of the at least one third application to jump comprises:
selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
receiving an input selection instruction, wherein the selection instruction is used for indicating that a target application in the at least one third application is selected to jump; and responding to the selection instruction, and selecting a target application in the at least one third application to jump.
The present embodiment further provides a jump apparatus between applications, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
a first application generates a jump request for jumping to a second application, wherein the jump request carries a public identifier of the second application;
determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs;
and selecting a target application in the at least one third application to jump so as to respond to the jump request.
In one embodiment, the processor may be further configured to:
the selecting a target application of the at least one third application to jump to respond to the jump request comprises:
responding, by the target application, to the jump request when the target application is able to respond to the jump request.
In one embodiment, the processor may be further configured to:
the selecting a target application of the at least one third application to jump to respond to the jump request comprises:
when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the second application;
when a second application holding the target private identification is installed in the terminal, skipping from the target application to the second application, and responding to the skipping request by the second application;
and when the second application is not installed in the terminal, controlling to jump from the target application to the second application after the second application is installed, and responding to the jump request by the second application.
In one embodiment, the processor may be further configured to:
when the jump request further carries a private identifier of the second application, the method further includes:
when a second application holding the private identification of the second application is installed in the terminal, jumping from the target application to the second application, and responding to the jumping request by the second application;
the determining at least one third application installed in the terminal and holding the public identity of the second application comprises:
and when the second application holding the private identification of the second application is not installed in the terminal, determining at least one third application which is installed in the terminal and holds the public identification of the second application.
In one embodiment, the processor may be further configured to:
the selecting a target application of the at least one third application to jump comprises:
selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
receiving an input selection instruction, wherein the selection instruction is used for indicating that a target application in the at least one third application is selected to jump; and responding to the selection instruction, and selecting a target application in the at least one third application to jump.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (12)

1. A method for jumping between applications, comprising:
the method comprises the following steps that a first application generates a jump request, the jump request carries a public identifier and a private identifier of a second application, at least two applications are included in one application group, and each application is provided with two identifiers: the application group comprises a private identification and a public identification, wherein the public identification is used for being identified to belong to applications and being held by other applications so as to form the same application group, the private identification is used for being specifically used for one application, and the public identification and the private identification have a pre-stored corresponding relationship;
when a second application holding the private identification of the second application is installed in the terminal, skipping from a target application to the second application, and responding to the skipping request by the second application;
when a second application holding the private identification of the second application is not installed in the terminal, determining at least one third application which is installed in the terminal and holds the public identification of the second application; each third application holds a public identifier of each application in an application group to which the third application belongs; and selecting a target application in the at least one third application to jump so as to respond to the jump request.
2. The method of claim 1, wherein selecting a target application of the at least one third application to jump in response to the jump request comprises:
responding, by the target application, to the jump request when the target application is able to respond to the jump request.
3. The method of claim 1, wherein selecting a target application of the at least one third application to jump in response to the jump request comprises:
when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the second application;
when the application holding the target private identification is installed in the terminal, skipping from the target application to the application holding the target private identification, and responding to the skipping request by the application holding the target private identification;
when the application holding the target private identification is not installed in the terminal, after the application holding the target private identification is controlled to be installed, the application jumps to the application holding the target private identification from the target application, and the application holding the target private identification responds to the jump request.
4. The method of claim 1, wherein selecting a target application of the at least one third application to jump comprises:
selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
receiving an input selection instruction, wherein the selection instruction is used for indicating that a target application in the at least one third application is selected to jump; and responding to the selection instruction, and selecting a target application in the at least one third application to jump.
5. The method of claim 3, wherein the skip request further carries a public identity of a fourth application, and the method further comprises:
and when the target application cannot respond to the jump request, determining a target private identification corresponding to the public identification according to the public identification of the fourth application, wherein the fourth application and the second application belong to different applications.
6. An apparatus for jumping between applications, comprising:
the generation module is used for generating a jump request by a first application, wherein the jump request carries a public identifier and a private identifier of a second application, one application group comprises at least two applications, and each application is provided with two identifiers: the application group comprises a private identification and a public identification, wherein the public identification is used for being identified to belong to applications and being held by other applications so as to form the same application group, the private identification is used for being specifically used for one application, and the public identification and the private identification have a pre-stored corresponding relationship;
the response module is used for jumping from a target application to a second application when the second application holding the private identification of the second application is installed in the terminal, and the second application responds to the jumping request;
the determining module is used for determining at least one third application which is installed in the terminal and holds the public identification of the second application when the second application holding the private identification of the second application is not installed in the terminal; each third application holds a public identifier of each application in an application group to which the third application belongs;
and the selection module is used for selecting a target application in the at least one third application to jump so as to respond to the jump request.
7. The apparatus of claim 6, wherein the selection module comprises:
and the first response submodule is used for responding the jump request by the target application when the target application can respond to the jump request.
8. The apparatus of claim 6, wherein the selection module comprises:
the first determining submodule is used for determining a target private identifier corresponding to the public identifier according to the public identifier of the second application when the target application cannot respond to the jump request;
a second response submodule, configured to jump from the target application to the application holding the target private identity when the application holding the target private identity is installed in the terminal, and respond to the jump request by the application holding the target private identity;
and the third response submodule is used for controlling to jump from the target application to the application holding the target private identity after the application holding the target private identity is installed when the application holding the target private identity is not installed in the terminal, and the application holding the target private identity responds to the jump request.
9. The apparatus of claim 6, wherein the selection module comprises:
the selection submodule is used for selecting a target application in the at least one third application to jump according to a preset rule;
alternatively, the first and second electrodes may be,
the receiving submodule is used for receiving an input selection instruction, and the selection instruction is used for indicating that a target application in the at least one third application is selected to jump;
and the fourth response submodule is used for responding to the selection instruction and selecting the target application in the at least one third application to jump.
10. The apparatus according to claim 8, wherein the skip request further carries a public identifier of a fourth application;
the first determining submodule is further configured to determine, when the target application cannot respond to the skip request, a target private identity corresponding to a public identity according to a public identity of a fourth application, where the fourth application and the second application belong to different applications.
11. An apparatus for jumping between applications, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the steps of the method of any one of claims 1 to 5.
12. A computer readable storage medium storing computer instructions, wherein the computer instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 5.
CN201910465667.1A 2019-05-30 2019-05-30 Method and device for skipping between applications Active CN110209511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910465667.1A CN110209511B (en) 2019-05-30 2019-05-30 Method and device for skipping between applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910465667.1A CN110209511B (en) 2019-05-30 2019-05-30 Method and device for skipping between applications

Publications (2)

Publication Number Publication Date
CN110209511A CN110209511A (en) 2019-09-06
CN110209511B true CN110209511B (en) 2022-03-11

Family

ID=67789746

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910465667.1A Active CN110209511B (en) 2019-05-30 2019-05-30 Method and device for skipping between applications

Country Status (1)

Country Link
CN (1) CN110209511B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333807A (en) * 2014-10-22 2015-02-04 乐视网信息技术(北京)股份有限公司 Application processing method and device and smart television
CN107370740A (en) * 2017-07-28 2017-11-21 北京五八信息技术有限公司 Redirect hold-up interception method and device
US20170351539A1 (en) * 2014-12-27 2017-12-07 Huawei Technologies Co., Ltd. Application interaction method and apparatus, and terminal
CN109062465A (en) * 2018-06-29 2018-12-21 努比亚技术有限公司 A kind of application program launching method, mobile terminal and storage medium
CN109164916A (en) * 2018-08-24 2019-01-08 百度在线网络技术(北京)有限公司 The starting method and apparatus of application program
CN109408256A (en) * 2018-10-17 2019-03-01 麒麟合盛网络技术股份有限公司 Using call method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333807A (en) * 2014-10-22 2015-02-04 乐视网信息技术(北京)股份有限公司 Application processing method and device and smart television
US20170351539A1 (en) * 2014-12-27 2017-12-07 Huawei Technologies Co., Ltd. Application interaction method and apparatus, and terminal
CN107370740A (en) * 2017-07-28 2017-11-21 北京五八信息技术有限公司 Redirect hold-up interception method and device
CN109062465A (en) * 2018-06-29 2018-12-21 努比亚技术有限公司 A kind of application program launching method, mobile terminal and storage medium
CN109164916A (en) * 2018-08-24 2019-01-08 百度在线网络技术(北京)有限公司 The starting method and apparatus of application program
CN109408256A (en) * 2018-10-17 2019-03-01 麒麟合盛网络技术股份有限公司 Using call method and device

Also Published As

Publication number Publication date
CN110209511A (en) 2019-09-06

Similar Documents

Publication Publication Date Title
US10237901B2 (en) Method and apparatus for connecting with controlled smart device, and storage medium
US9769667B2 (en) Methods for controlling smart device
EP3096502A2 (en) Method, apparatus and system for managing control relationships between account and device
CN109496439B (en) Method and device for establishing unicast connection based on object direct connection
US11792659B2 (en) Method and device for using network slice
CN105119790B (en) Apparatus control method and device
US11457479B2 (en) Method and apparatus for configuring random access occasion, method and apparatus for random access
CN109451877B (en) Unmanned aerial vehicle control method and device, unmanned aerial vehicle and remote control equipment
US11596018B2 (en) Region configuration method and device
EP3226432A1 (en) Method and device for sharing media data between terminals
US20170339545A1 (en) Method and apparatus for accessing wireless network
CN111010721A (en) Wireless network distribution method, wireless network distribution device and computer readable storage medium
CN109525966B (en) Intelligent device query method and device and storage medium
CN111031002A (en) Broadcast discovery method, broadcast discovery apparatus, and storage medium
US9723639B2 (en) Communication method and terminal
CN106990984B (en) Method and device for updating system
CN110913276B (en) Data processing method, device, server, terminal and storage medium
CN106506808B (en) Method and device for prompting communication message
CN108886461B (en) Data transmission method and device
CN105873154B (en) Network access method and device
CN110209511B (en) Method and device for skipping between applications
CN109194639B (en) Message receiving and processing method, device, terminal and readable storage medium
CN113726905A (en) Data acquisition method, device and equipment based on home terminal equipment
CN115484154B (en) Configuration method, request method, device and storage medium of resource equipment
CN106302768B (en) Method and device for pushing remote controller information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant