CN110502288A - For the call method of third-party application, device, electronic equipment and storage medium - Google Patents

For the call method of third-party application, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110502288A
CN110502288A CN201910765378.3A CN201910765378A CN110502288A CN 110502288 A CN110502288 A CN 110502288A CN 201910765378 A CN201910765378 A CN 201910765378A CN 110502288 A CN110502288 A CN 110502288A
Authority
CN
China
Prior art keywords
class
party application
acquisition methods
application
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910765378.3A
Other languages
Chinese (zh)
Inventor
方攀
陈岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910765378.3A priority Critical patent/CN110502288A/en
Publication of CN110502288A publication Critical patent/CN110502288A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4488Object-oriented
    • G06F9/449Object-oriented method invocation or resolution

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application proposes a kind of for the call method of third-party application, device, electronic equipment and storage medium, wherein method includes: that the class reflection calling of third-party application obtains the acquisition methods of system class;The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class.This method can be realized without changing system bottom, and the limitation for calling non-public object to third-party application reflection around open system can be realized in application layer, guarantee the accessible non-public object using system of third-party application, difficulty substantially reduces.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.

Description

For the call method of third-party application, device, electronic equipment and storage medium
Technical field
This application involves technical field of electronic equipment more particularly to it is a kind of for the call method of third-party application, device, Electronic equipment and storage medium.
Background technique
Java reflection mechanism refers in operating status, for any one class, can know all categories of this class Property and method;For any one object, its any one method and attribute can be called.In Android system Android In application and development, reflection mechanism is commonly used to obtain the undocumented application programming interfaces (Application of Google Google Programming Interface, abbreviation API), however, Google starts to limit since developer Preview Release Android P Third-party application processed uses reflection mechanism, obtains private API.
In the prior art, by modifying Android system bottom, the limitation dosed using various methods removal Google is reached The purpose of the accessible non-public API of third-party application.
Under this mode, need to change Android system bottom, difficulty is larger, also, is only applicable to particular system, Wu Fashi With other Android systems, applicability and compatibility be not strong.
Summary of the invention
The application propose it is a kind of for the call method of third-party application, device, electronic equipment and storage medium, for solving Certainly in the prior art by way of changing Android system bottom, third-party application is made to access non-public API, difficulty is larger, and Applicability and compatible not strong technical problem.
The application first aspect embodiment proposes a kind of call method for third-party application, comprising:
The class reflection of third-party application, which is called, obtains the acquisition methods of system class;
The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class.
As the first possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called After obtaining the acquisition methods of system class, further includes:
The acquisition methods that reflection is called to obtained system class, are named as goal approach;
The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class, comprising:
The class of third-party application calls non-public object using goal approach.
As second of possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called Obtain the acquisition methods of system class, comprising:
GetDeclaredMethod acquisition methods in the class reflection calling system class Class of third-party application.
As the third possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called GetDeclaredMethod acquisition methods in system class Class, comprising:
The class of third-party application is reflected by the Class.class.getDeclaredMethod method in Android system to be adjusted With the getDeclaredMethod acquisition methods in system class Class.
As the 4th kind of possible implementation of the application first aspect embodiment, non-public object includes non-public answers With at least one of routine interface and non-public field.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
The application second aspect embodiment proposes a kind of calling device for third-party application, comprising:
First calling module obtains the acquisition methods of system class for reflecting to call;
Second calling module reflects the non-public object of invocation target class for passing through the acquisition methods of system class.
As the first possible implementation of the application second aspect embodiment, device further include:
Module is named, for the acquisition methods for calling obtained system class will to be reflected, is named as goal approach;
Second calling module, is specifically used for:
Non-public object is called using goal approach.
As second of possible implementation of the application second aspect embodiment, the first calling module is specifically used for:
Reflect the getDeclaredMethod acquisition methods in calling system class Class.
As the third possible implementation of the application second aspect embodiment, the first calling module is also used to:
Calling system class Class is reflected by the Class.class.getDeclaredMethod method in Android system In getDeclaredMethod acquisition methods.
As the 4th kind of possible implementation of the application second aspect embodiment, non-public object includes non-public answers With at least one of routine interface and non-public field.
The calling device for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
The application third aspect embodiment proposes a kind of electronic equipment, comprising: memory, processor and is stored in storage On device and the computer program that can run on a processor, when processor executes program, realize that the application first aspect such as is implemented The call method for third-party application that example proposes.
The application fourth aspect embodiment proposes a kind of computer readable storage medium, is stored thereon with computer journey Sequence realizes the called side for third-party application proposed such as the application first aspect embodiment when the program is executed by processor Method.
The additional aspect of the application and advantage will be set forth in part in the description, and will partially become from the following description It obtains obviously, or recognized by the practice of the application.
Detailed description of the invention
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow diagram provided by the embodiment of the present application one for the call method of third-party application;
Fig. 2 is the schematic illustration that third-party application obtains non-public API using reflection;
Fig. 3 is the flow diagram provided by the embodiment of the present application two for the call method of third-party application.
Fig. 4 is the flow diagram that non-public API is called in third-party application reflection in the embodiment of the present application;
Fig. 5 is the structural schematic diagram provided by the embodiment of the present application three for the calling device of third-party application;
Fig. 6 is the structural schematic diagram provided by the embodiment of the present application four for the calling device of third-party application.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and should not be understood as the limitation to the application.
The application is non-mainly in the prior art accessing by way of changing Android system bottom, third-party application Open API, difficulty is larger, and applicability and compatible not strong technical problem, proposes a kind of calling for third-party application Method.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
Below with reference to the accompanying drawings the call method, device, electronic equipment for third-party application of the embodiment of the present application is described And storage medium.
Fig. 1 is the flow diagram provided by the embodiment of the present application one for the call method of third-party application.
As shown in Figure 1, this be used for the call method of third-party application the following steps are included:
Step 101, the class reflection of third-party application, which is called, obtains the acquisition methods of system class.
Applicant analyzes system limitation third-party application using the principle that reflection mechanism obtains non-public API, obtains It arrives:
(1) assume that needing to reflect the method called is " function " method in target class, such as class B, referring to fig. 2, By the B.class.getDeclaredMethod method in Android system in the class A of third-party application, name in class B is obtained For " function " method, it is named as fun1;
(2) " function " method in class B is called by fun1.invoke () reflection;
(3) Android system judges in class B whether " function " method is non-public API, if the side " function " in class B Method is not non-public API, then reflects and call successfully, if " function " method is non-public API in class B, carries out step 4;
(4) further judge to call whether the class A of reflection is system class, if class A is system class, reflects and call successfully, If class A is not system class, malloc failure malloc is reflected, Android system is dished out NoSuchMethodException exception.
In summary, the reason of reflecting malloc failure malloc includes: class A not instead of system class, the class of third-party application;Class A " function " method in class B called by reflection is non-public API.
Therefore, in the embodiment of the present application, in order to enable the class of third-party application successfully calls non-public API, it can be to be The identity of system class goes reflection to call non-public API.Specifically, it is possible, firstly, to by the class of third-party application, reflection is called and is obtained The acquisition methods of system class, since the acquisition methods of system class are not non-public objects, the class of third-party application can be adjusted With success.
Step 102, the class of third-party application passes through the acquisition methods of system class, reflects the non-public right of invocation target class As.
In the embodiment of the present application, non-public object may include at least one of non-public API and non-public field.
Optionally, it when non-public object is non-public API, is called in the class reflection of third-party application and obtains system class After acquisition methods, the non-public API of invocation target class can be reflected by the acquisition methods of system class, due to reflecting caller For system class, system class can call directly non-public API, therefore reflection is called successfully.As a result, without changing system bottom, The limitation for calling non-public API to third-party application reflection around open system can be realized in application layer, guarantee third-party application without Obstacle uses the non-public API of system, and difficulty substantially reduces, also, facilitates compatible lowest version, compatible and with strong applicability.
Similarly, when non-public object is non-public field, can also be led to by the acquisition methods of reflection calling system class The acquisition methods of calling system class are crossed, the non-public field of invocation target class is reflected.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
For an embodiment in clear explanation, another call method for being used for third-party application is present embodiments provided, Fig. 3 is the flow diagram provided by the embodiment of the present application two for the call method of third-party application.
As shown in figure 3, the call method for being used for third-party application may comprise steps of:
Step 201, the class reflection of third-party application, which is called, obtains the acquisition methods of system class.
In the embodiment of the present application, when non-public object difference, the system class of the class reflection calling of third-party application is obtained Take method different.
As a kind of possible implementation, when the non-public object that third-party application reflection is called is non-public API, The class of third-party application can reflect the getDeclaredMethod acquisition methods in calling system class Class.
Specifically, the class of third-party application can be by Android android system Class.class.getDeclaredMethod method, the getDeclaredMethod reflected in calling system class Class are obtained Take method.
As alternatively possible implementation, when the non-public object that third-party application reflection is called is non-public field When, the class of third-party application can reflect the getDeclaredField acquisition methods in calling system class Class.
Specifically, the class of third-party application can be by Android android system Class.class.getDeclaredField method, the getDeclaredField reflected in calling system class Class are obtained Method.
Step 202, the acquisition methods that reflection is called to obtained system class, are named as goal approach.
In the embodiment of the present application, after reflection calling obtains the acquisition methods of system class, above-mentioned acquisition methods can be ordered Entitled goal approach, such as it is named as gdm.
Step 203, the class of third-party application uses the non-public object of goal approach invocation target class.
In the embodiment of the present application, when the acquisition methods of the class of third-party application reflection calling system class, due to system class Acquisition methods be not non-public object, therefore, the class of third-party application can call success, later, can be by system class Acquisition methods are named as goal approach, and the class of third-party application uses the non-public object of goal approach invocation target class, due to Goal approach is the acquisition methods of system class, and system class can call directly non-public object, therefore, can call success.
It as an example, when the non-public object of target class is the non-public API of target class, for example is class B's " function " method, referring to fig. 4:
(1) in the class A of third-party application, by Class.class.getDeclaredMethod method, class is obtained " getDeclaredMethod " method in Class, is named as gdm;
(2) " getDeclaredMethod " method called in class Class is reflected by gdm.invoke, obtained in class B The method of entitled " function ", is named as fun1.Wherein, Android system judges in class Class " getDeclaredMethod " method is not non-public API, and therefore, reflection is called successfully;
(3) " function " method called in class B is reflected by fun1.invoke, since the reflection caller is class Class is to belong to system class, therefore reflection is called successfully.
It is easy to operate as a result, and be easily achieved, without changing Android system bottom, invocation target can be realized in application layer The non-public API of class, difficulty substantially reduce.Also, compatibility is stronger, can be adapted to the Android system of all versions, and being promoted should The applicability of method.
In the application, by reflecting the getDeclaredMethod method of class Class, using the system class body of class Class The method that part goes reflection invocation target class is realized without changing system bottom, so that it may in application layer around Android P or more Edition system calls the limitation of non-public API to third-party application reflection, obtains the non-public API of target class.
Similarly, by the getDeclaredField method in reflection class Class, Android can be bypassed in application layer P and the above edition system call the limitation of non-public field to third-party application reflection, obtain the non-public field of target class, In This is not repeated them here.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of obtained system class are called in reflection by the acquisition methods of system class, are named as goal approach, and use target side The non-public object of method invocation target class.Thus, it is possible to it is easy to operate and be easily achieved, without changing Android system bottom, In The non-public object of invocation target class can be realized in application layer, and difficulty substantially reduces.Also, compatibility is stronger, can be adapted to institute There is the Android system of version, promotes the applicability of this method.
In order to realize above-described embodiment, the application also proposes a kind of calling device for third-party application.
Fig. 5 is the structural schematic diagram provided by the embodiment of the present application three for the calling device of third-party application.
As shown in figure 5, the calling device for being used for third-party application includes: that the first calling module 110 and second calls mould Block 120.
Wherein, the first calling module 110 obtains the acquisition methods of system class for reflecting to call.
Second calling module 120 reflects the non-public object of invocation target class for passing through the acquisition methods of system class.
Further, in a kind of possible implementation of the embodiment of the present application, referring to Fig. 6, embodiment shown in Fig. 5 On the basis of, which can also include:
Module 130 is named, for the acquisition methods for calling obtained system class will to be reflected, is named as goal approach.
Second calling module 120, is specifically used for: calling non-public object using goal approach.
As a kind of possible implementation, the first calling module 110 is specifically used for: in reflection calling system class Class GetDeclaredMethod acquisition methods.
As alternatively possible implementation, the first calling module 110 is also used to: by Android system The getDeclaredMethod that Class.class.getDeclaredMethod method reflects in calling system class Class is obtained Method.
In the embodiment of the present application, non-public object includes at least one in non-public application programming interfaces and non-public field It is a.
It should be noted that the aforementioned explanation to the call method embodiment for third-party application is also applied for this The calling device for third-party application of embodiment, details are not described herein again.
The calling device for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
In order to realize above-described embodiment, the application also proposes a kind of electronic equipment, comprising: memory, processor and storage On a memory and the computer program that can run on a processor, when processor executes program, such as the aforementioned reality of the application is realized Apply the call method for third-party application of example proposition.
Wherein, electronic equipment can set for PC (Personal Computer, abbreviation PC), cloud device, movement Standby etc., mobile device can for example have each for mobile phone, tablet computer, personal digital assistant, wearable device, mobile unit etc. The hardware device of kind operating system, touch screen and/or display screen.
In order to realize above-described embodiment, the application also proposes a kind of computer readable storage medium, is stored thereon with calculating Machine program realizes the called side for third-party application proposed such as the application previous embodiment when the program is executed by processor Method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used Any one of art or their combination are realized: have for data-signal is realized the logic gates of logic function from Logic circuit is dissipated, the specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application Type.

Claims (10)

1. a kind of call method for third-party application, which is characterized in that the described method comprises the following steps:
The class reflection of third-party application, which is called, obtains the acquisition methods of system class;
The class of the third-party application reflects the non-public object of invocation target class by the acquisition methods of the system class.
2. call method according to claim 1, which is characterized in that the class reflection of the third-party application, which is called, is After the acquisition methods for class of uniting, further includes:
The acquisition methods that reflection is called to the obtained system class, are named as goal approach;
The class of the third-party application reflects the non-public object of invocation target class, packet by the acquisition methods of the system class It includes:
The class of the third-party application calls the non-public object using the goal approach.
3. call method according to claim 1, which is characterized in that the class reflection of the third-party application, which is called, is The acquisition methods for class of uniting, comprising:
GetDeclaredMethod acquisition methods in the class reflection calling system class Class of the third-party application.
4. call method according to claim 3, which is characterized in that the class of the third-party application reflects calling system class GetDeclaredMethod acquisition methods in Class, comprising:
The class of the third-party application is reflected by the Class.class.getDeclaredMethod method in Android system to be adjusted With the getDeclaredMethod acquisition methods in system class Class.
5. call method according to claim 1-4, which is characterized in that the non-public object includes non-public At least one of application programming interfaces and non-public field.
6. a kind of calling device for third-party application, which is characterized in that described device includes:
First calling module obtains the acquisition methods of system class for reflecting to call;
Second calling module reflects the non-public object of invocation target class for the acquisition methods by the system class.
7. calling device according to claim 6, which is characterized in that described device further include:
Module is named, for the acquisition methods for calling the obtained system class will to be reflected, is named as goal approach;
Second calling module, is specifically used for:
The non-public object is called using the goal approach.
8. calling device according to claim 6, which is characterized in that first calling module is specifically used for:
Reflect the getDeclaredMethod acquisition methods in calling system class Class.
9. a kind of electronic equipment, which is characterized in that on a memory and can be on a processor including memory, processor and storage The computer program of operation when the processor executes described program, is realized and is used for the as claimed in any one of claims 1 to 5 The call method of tripartite's application.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Such as the call method as claimed in any one of claims 1 to 5 for third-party application is realized when execution.
CN201910765378.3A 2019-08-19 2019-08-19 For the call method of third-party application, device, electronic equipment and storage medium Pending CN110502288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910765378.3A CN110502288A (en) 2019-08-19 2019-08-19 For the call method of third-party application, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910765378.3A CN110502288A (en) 2019-08-19 2019-08-19 For the call method of third-party application, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110502288A true CN110502288A (en) 2019-11-26

Family

ID=68588752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910765378.3A Pending CN110502288A (en) 2019-08-19 2019-08-19 For the call method of third-party application, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110502288A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105843654A (en) * 2016-04-14 2016-08-10 广州市久邦数码科技有限公司 Method and system for implementing dynamic loading of advertisement SDK (software development kit)
CN108647061A (en) * 2018-04-24 2018-10-12 北京奇虎科技有限公司 Call method, device and the computing device of system hidden method
CN109597662A (en) * 2018-11-08 2019-04-09 百度在线网络技术(北京)有限公司 The call method, device and electronic equipment in non-public library in mobile terminal
CN109901937A (en) * 2019-01-18 2019-06-18 平安普惠企业管理有限公司 Hide reflection call method, device, computer equipment and the storage medium of API

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105843654A (en) * 2016-04-14 2016-08-10 广州市久邦数码科技有限公司 Method and system for implementing dynamic loading of advertisement SDK (software development kit)
CN108647061A (en) * 2018-04-24 2018-10-12 北京奇虎科技有限公司 Call method, device and the computing device of system hidden method
CN109597662A (en) * 2018-11-08 2019-04-09 百度在线网络技术(北京)有限公司 The call method, device and electronic equipment in non-public library in mobile terminal
CN109901937A (en) * 2019-01-18 2019-06-18 平安普惠企业管理有限公司 Hide reflection call method, device, computer equipment and the storage medium of API

Similar Documents

Publication Publication Date Title
CN108563435B (en) The method and device of code building
Henning API: Design Matters: Why changing APIs might become a criminal offense.
JP2019536153A (en) Smart contract processing method and apparatus
CN107291802B (en) Relation map methods of exhibiting and device
CN110210021A (en) Read understanding method and device
CN109462726A (en) The control method and device of camera
CN105528251B (en) Processing method, device and the mobile terminal of applicative notifications information
US20170109153A1 (en) System and method for providing supplemental functionalities to a computer program via an ontology instance
CN110069739A (en) The page preloads method and device
CN110311748A (en) Method for synchronizing time, device and the vehicle using it of vehicle
CN110297721A (en) A kind of across contract call method of the intelligent contract based on JAVA
CN104123165B (en) Application program unloading method and device and mobile terminal
US20070220249A1 (en) Data structure and method for managing modules associated with a kernel
CN110502288A (en) For the call method of third-party application, device, electronic equipment and storage medium
CN106921688B (en) Service providing method for distributed system and distributed system
US20150106786A1 (en) Symmetrical dimensions in context-oriented programming to optimize software object execution
CN107729097A (en) Displayed page collocation method and relevant device
US20020101449A1 (en) System and method for developing and processing a graphical user interface for a computer application
CN110471744A (en) Password amending method, device, equipment and computer readable storage medium
US9183001B2 (en) Simulation of static members and parameterized constructors on an interface-based API
US8028274B2 (en) Integrating loosely coupled tools using contracts and references
CN111198735A (en) Layer information acquisition method, layer information acquisition device and terminal equipment
EP2726985A1 (en) Device and method for synchronizing tasks executed in parallel on a platform comprising several calculation units
CN108845953B (en) Interface testing method and device
CN110471851A (en) A kind of automated testing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination