CN110502288A - For the call method of third-party application, device, electronic equipment and storage medium - Google Patents
For the call method of third-party application, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110502288A CN110502288A CN201910765378.3A CN201910765378A CN110502288A CN 110502288 A CN110502288 A CN 110502288A CN 201910765378 A CN201910765378 A CN 201910765378A CN 110502288 A CN110502288 A CN 110502288A
- Authority
- CN
- China
- Prior art keywords
- class
- party application
- acquisition methods
- application
- calling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4488—Object-oriented
- G06F9/449—Object-oriented method invocation or resolution
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The application proposes a kind of for the call method of third-party application, device, electronic equipment and storage medium, wherein method includes: that the class reflection calling of third-party application obtains the acquisition methods of system class;The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class.This method can be realized without changing system bottom, and the limitation for calling non-public object to third-party application reflection around open system can be realized in application layer, guarantee the accessible non-public object using system of third-party application, difficulty substantially reduces.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
Description
Technical field
This application involves technical field of electronic equipment more particularly to it is a kind of for the call method of third-party application, device,
Electronic equipment and storage medium.
Background technique
Java reflection mechanism refers in operating status, for any one class, can know all categories of this class
Property and method;For any one object, its any one method and attribute can be called.In Android system Android
In application and development, reflection mechanism is commonly used to obtain the undocumented application programming interfaces (Application of Google Google
Programming Interface, abbreviation API), however, Google starts to limit since developer Preview Release Android P
Third-party application processed uses reflection mechanism, obtains private API.
In the prior art, by modifying Android system bottom, the limitation dosed using various methods removal Google is reached
The purpose of the accessible non-public API of third-party application.
Under this mode, need to change Android system bottom, difficulty is larger, also, is only applicable to particular system, Wu Fashi
With other Android systems, applicability and compatibility be not strong.
Summary of the invention
The application propose it is a kind of for the call method of third-party application, device, electronic equipment and storage medium, for solving
Certainly in the prior art by way of changing Android system bottom, third-party application is made to access non-public API, difficulty is larger, and
Applicability and compatible not strong technical problem.
The application first aspect embodiment proposes a kind of call method for third-party application, comprising:
The class reflection of third-party application, which is called, obtains the acquisition methods of system class;
The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class.
As the first possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called
After obtaining the acquisition methods of system class, further includes:
The acquisition methods that reflection is called to obtained system class, are named as goal approach;
The class of third-party application passes through the acquisition methods of system class, reflects the non-public object of invocation target class, comprising:
The class of third-party application calls non-public object using goal approach.
As second of possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called
Obtain the acquisition methods of system class, comprising:
GetDeclaredMethod acquisition methods in the class reflection calling system class Class of third-party application.
As the third possible implementation of the application first aspect embodiment, the class of third-party application, which reflects, to be called
GetDeclaredMethod acquisition methods in system class Class, comprising:
The class of third-party application is reflected by the Class.class.getDeclaredMethod method in Android system to be adjusted
With the getDeclaredMethod acquisition methods in system class Class.
As the 4th kind of possible implementation of the application first aspect embodiment, non-public object includes non-public answers
With at least one of routine interface and non-public field.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later
Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer
System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system
Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
The application second aspect embodiment proposes a kind of calling device for third-party application, comprising:
First calling module obtains the acquisition methods of system class for reflecting to call;
Second calling module reflects the non-public object of invocation target class for passing through the acquisition methods of system class.
As the first possible implementation of the application second aspect embodiment, device further include:
Module is named, for the acquisition methods for calling obtained system class will to be reflected, is named as goal approach;
Second calling module, is specifically used for:
Non-public object is called using goal approach.
As second of possible implementation of the application second aspect embodiment, the first calling module is specifically used for:
Reflect the getDeclaredMethod acquisition methods in calling system class Class.
As the third possible implementation of the application second aspect embodiment, the first calling module is also used to:
Calling system class Class is reflected by the Class.class.getDeclaredMethod method in Android system
In getDeclaredMethod acquisition methods.
As the 4th kind of possible implementation of the application second aspect embodiment, non-public object includes non-public answers
With at least one of routine interface and non-public field.
The calling device for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later
Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer
System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system
Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
The application third aspect embodiment proposes a kind of electronic equipment, comprising: memory, processor and is stored in storage
On device and the computer program that can run on a processor, when processor executes program, realize that the application first aspect such as is implemented
The call method for third-party application that example proposes.
The application fourth aspect embodiment proposes a kind of computer readable storage medium, is stored thereon with computer journey
Sequence realizes the called side for third-party application proposed such as the application first aspect embodiment when the program is executed by processor
Method.
The additional aspect of the application and advantage will be set forth in part in the description, and will partially become from the following description
It obtains obviously, or recognized by the practice of the application.
Detailed description of the invention
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow diagram provided by the embodiment of the present application one for the call method of third-party application;
Fig. 2 is the schematic illustration that third-party application obtains non-public API using reflection;
Fig. 3 is the flow diagram provided by the embodiment of the present application two for the call method of third-party application.
Fig. 4 is the flow diagram that non-public API is called in third-party application reflection in the embodiment of the present application;
Fig. 5 is the structural schematic diagram provided by the embodiment of the present application three for the calling device of third-party application;
Fig. 6 is the structural schematic diagram provided by the embodiment of the present application four for the calling device of third-party application.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the application, and should not be understood as the limitation to the application.
The application is non-mainly in the prior art accessing by way of changing Android system bottom, third-party application
Open API, difficulty is larger, and applicability and compatible not strong technical problem, proposes a kind of calling for third-party application
Method.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later
Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer
System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system
Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
Below with reference to the accompanying drawings the call method, device, electronic equipment for third-party application of the embodiment of the present application is described
And storage medium.
Fig. 1 is the flow diagram provided by the embodiment of the present application one for the call method of third-party application.
As shown in Figure 1, this be used for the call method of third-party application the following steps are included:
Step 101, the class reflection of third-party application, which is called, obtains the acquisition methods of system class.
Applicant analyzes system limitation third-party application using the principle that reflection mechanism obtains non-public API, obtains
It arrives:
(1) assume that needing to reflect the method called is " function " method in target class, such as class B, referring to fig. 2,
By the B.class.getDeclaredMethod method in Android system in the class A of third-party application, name in class B is obtained
For " function " method, it is named as fun1;
(2) " function " method in class B is called by fun1.invoke () reflection;
(3) Android system judges in class B whether " function " method is non-public API, if the side " function " in class B
Method is not non-public API, then reflects and call successfully, if " function " method is non-public API in class B, carries out step 4;
(4) further judge to call whether the class A of reflection is system class, if class A is system class, reflects and call successfully,
If class A is not system class, malloc failure malloc is reflected, Android system is dished out NoSuchMethodException exception.
In summary, the reason of reflecting malloc failure malloc includes: class A not instead of system class, the class of third-party application;Class A
" function " method in class B called by reflection is non-public API.
Therefore, in the embodiment of the present application, in order to enable the class of third-party application successfully calls non-public API, it can be to be
The identity of system class goes reflection to call non-public API.Specifically, it is possible, firstly, to by the class of third-party application, reflection is called and is obtained
The acquisition methods of system class, since the acquisition methods of system class are not non-public objects, the class of third-party application can be adjusted
With success.
Step 102, the class of third-party application passes through the acquisition methods of system class, reflects the non-public right of invocation target class
As.
In the embodiment of the present application, non-public object may include at least one of non-public API and non-public field.
Optionally, it when non-public object is non-public API, is called in the class reflection of third-party application and obtains system class
After acquisition methods, the non-public API of invocation target class can be reflected by the acquisition methods of system class, due to reflecting caller
For system class, system class can call directly non-public API, therefore reflection is called successfully.As a result, without changing system bottom,
The limitation for calling non-public API to third-party application reflection around open system can be realized in application layer, guarantee third-party application without
Obstacle uses the non-public API of system, and difficulty substantially reduces, also, facilitates compatible lowest version, compatible and with strong applicability.
Similarly, when non-public object is non-public field, can also be led to by the acquisition methods of reflection calling system class
The acquisition methods of calling system class are crossed, the non-public field of invocation target class is reflected.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later
Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer
System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system
Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
For an embodiment in clear explanation, another call method for being used for third-party application is present embodiments provided,
Fig. 3 is the flow diagram provided by the embodiment of the present application two for the call method of third-party application.
As shown in figure 3, the call method for being used for third-party application may comprise steps of:
Step 201, the class reflection of third-party application, which is called, obtains the acquisition methods of system class.
In the embodiment of the present application, when non-public object difference, the system class of the class reflection calling of third-party application is obtained
Take method different.
As a kind of possible implementation, when the non-public object that third-party application reflection is called is non-public API,
The class of third-party application can reflect the getDeclaredMethod acquisition methods in calling system class Class.
Specifically, the class of third-party application can be by Android android system
Class.class.getDeclaredMethod method, the getDeclaredMethod reflected in calling system class Class are obtained
Take method.
As alternatively possible implementation, when the non-public object that third-party application reflection is called is non-public field
When, the class of third-party application can reflect the getDeclaredField acquisition methods in calling system class Class.
Specifically, the class of third-party application can be by Android android system
Class.class.getDeclaredField method, the getDeclaredField reflected in calling system class Class are obtained
Method.
Step 202, the acquisition methods that reflection is called to obtained system class, are named as goal approach.
In the embodiment of the present application, after reflection calling obtains the acquisition methods of system class, above-mentioned acquisition methods can be ordered
Entitled goal approach, such as it is named as gdm.
Step 203, the class of third-party application uses the non-public object of goal approach invocation target class.
In the embodiment of the present application, when the acquisition methods of the class of third-party application reflection calling system class, due to system class
Acquisition methods be not non-public object, therefore, the class of third-party application can call success, later, can be by system class
Acquisition methods are named as goal approach, and the class of third-party application uses the non-public object of goal approach invocation target class, due to
Goal approach is the acquisition methods of system class, and system class can call directly non-public object, therefore, can call success.
It as an example, when the non-public object of target class is the non-public API of target class, for example is class B's
" function " method, referring to fig. 4:
(1) in the class A of third-party application, by Class.class.getDeclaredMethod method, class is obtained
" getDeclaredMethod " method in Class, is named as gdm;
(2) " getDeclaredMethod " method called in class Class is reflected by gdm.invoke, obtained in class B
The method of entitled " function ", is named as fun1.Wherein, Android system judges in class Class
" getDeclaredMethod " method is not non-public API, and therefore, reflection is called successfully;
(3) " function " method called in class B is reflected by fun1.invoke, since the reflection caller is class
Class is to belong to system class, therefore reflection is called successfully.
It is easy to operate as a result, and be easily achieved, without changing Android system bottom, invocation target can be realized in application layer
The non-public API of class, difficulty substantially reduce.Also, compatibility is stronger, can be adapted to the Android system of all versions, and being promoted should
The applicability of method.
In the application, by reflecting the getDeclaredMethod method of class Class, using the system class body of class Class
The method that part goes reflection invocation target class is realized without changing system bottom, so that it may in application layer around Android P or more
Edition system calls the limitation of non-public API to third-party application reflection, obtains the non-public API of target class.
Similarly, by the getDeclaredField method in reflection class Class, Android can be bypassed in application layer
P and the above edition system call the limitation of non-public field to third-party application reflection, obtain the non-public field of target class, In
This is not repeated them here.
The call method for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of obtained system class are called in reflection by the acquisition methods of system class, are named as goal approach, and use target side
The non-public object of method invocation target class.Thus, it is possible to it is easy to operate and be easily achieved, without changing Android system bottom, In
The non-public object of invocation target class can be realized in application layer, and difficulty substantially reduces.Also, compatibility is stronger, can be adapted to institute
There is the Android system of version, promotes the applicability of this method.
In order to realize above-described embodiment, the application also proposes a kind of calling device for third-party application.
Fig. 5 is the structural schematic diagram provided by the embodiment of the present application three for the calling device of third-party application.
As shown in figure 5, the calling device for being used for third-party application includes: that the first calling module 110 and second calls mould
Block 120.
Wherein, the first calling module 110 obtains the acquisition methods of system class for reflecting to call.
Second calling module 120 reflects the non-public object of invocation target class for passing through the acquisition methods of system class.
Further, in a kind of possible implementation of the embodiment of the present application, referring to Fig. 6, embodiment shown in Fig. 5
On the basis of, which can also include:
Module 130 is named, for the acquisition methods for calling obtained system class will to be reflected, is named as goal approach.
Second calling module 120, is specifically used for: calling non-public object using goal approach.
As a kind of possible implementation, the first calling module 110 is specifically used for: in reflection calling system class Class
GetDeclaredMethod acquisition methods.
As alternatively possible implementation, the first calling module 110 is also used to: by Android system
The getDeclaredMethod that Class.class.getDeclaredMethod method reflects in calling system class Class is obtained
Method.
In the embodiment of the present application, non-public object includes at least one in non-public application programming interfaces and non-public field
It is a.
It should be noted that the aforementioned explanation to the call method embodiment for third-party application is also applied for this
The calling device for third-party application of embodiment, details are not described herein again.
The calling device for third-party application of the embodiment of the present application is called by the class reflection of third-party application and is obtained
The acquisition methods of system class by the acquisition methods of system class, reflect the non-public object of invocation target class, due to anti-later
Penetrating caller is system class, therefore reflection is called successfully.As a result, without changing system bottom, bypass can be realized in application layer
System calls the limitation of non-public object to third-party application reflection, guarantees that third-party application is accessible and uses the non-public of system
Object, difficulty substantially reduce.Also, compatibility is stronger, and the system that can be adapted to all versions promotes the applicability of this method.
In order to realize above-described embodiment, the application also proposes a kind of electronic equipment, comprising: memory, processor and storage
On a memory and the computer program that can run on a processor, when processor executes program, such as the aforementioned reality of the application is realized
Apply the call method for third-party application of example proposition.
Wherein, electronic equipment can set for PC (Personal Computer, abbreviation PC), cloud device, movement
Standby etc., mobile device can for example have each for mobile phone, tablet computer, personal digital assistant, wearable device, mobile unit etc.
The hardware device of kind operating system, touch screen and/or display screen.
In order to realize above-described embodiment, the application also proposes a kind of computer readable storage medium, is stored thereon with calculating
Machine program realizes the called side for third-party application proposed such as the application previous embodiment when the program is executed by processor
Method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by the application
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings
Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used
Any one of art or their combination are realized: have for data-signal is realized the logic gates of logic function from
Logic circuit is dissipated, the specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile
Journey gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application
It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould
Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application
Type.
Claims (10)
1. a kind of call method for third-party application, which is characterized in that the described method comprises the following steps:
The class reflection of third-party application, which is called, obtains the acquisition methods of system class;
The class of the third-party application reflects the non-public object of invocation target class by the acquisition methods of the system class.
2. call method according to claim 1, which is characterized in that the class reflection of the third-party application, which is called, is
After the acquisition methods for class of uniting, further includes:
The acquisition methods that reflection is called to the obtained system class, are named as goal approach;
The class of the third-party application reflects the non-public object of invocation target class, packet by the acquisition methods of the system class
It includes:
The class of the third-party application calls the non-public object using the goal approach.
3. call method according to claim 1, which is characterized in that the class reflection of the third-party application, which is called, is
The acquisition methods for class of uniting, comprising:
GetDeclaredMethod acquisition methods in the class reflection calling system class Class of the third-party application.
4. call method according to claim 3, which is characterized in that the class of the third-party application reflects calling system class
GetDeclaredMethod acquisition methods in Class, comprising:
The class of the third-party application is reflected by the Class.class.getDeclaredMethod method in Android system to be adjusted
With the getDeclaredMethod acquisition methods in system class Class.
5. call method according to claim 1-4, which is characterized in that the non-public object includes non-public
At least one of application programming interfaces and non-public field.
6. a kind of calling device for third-party application, which is characterized in that described device includes:
First calling module obtains the acquisition methods of system class for reflecting to call;
Second calling module reflects the non-public object of invocation target class for the acquisition methods by the system class.
7. calling device according to claim 6, which is characterized in that described device further include:
Module is named, for the acquisition methods for calling the obtained system class will to be reflected, is named as goal approach;
Second calling module, is specifically used for:
The non-public object is called using the goal approach.
8. calling device according to claim 6, which is characterized in that first calling module is specifically used for:
Reflect the getDeclaredMethod acquisition methods in calling system class Class.
9. a kind of electronic equipment, which is characterized in that on a memory and can be on a processor including memory, processor and storage
The computer program of operation when the processor executes described program, is realized and is used for the as claimed in any one of claims 1 to 5
The call method of tripartite's application.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
Such as the call method as claimed in any one of claims 1 to 5 for third-party application is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910765378.3A CN110502288A (en) | 2019-08-19 | 2019-08-19 | For the call method of third-party application, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910765378.3A CN110502288A (en) | 2019-08-19 | 2019-08-19 | For the call method of third-party application, device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110502288A true CN110502288A (en) | 2019-11-26 |
Family
ID=68588752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910765378.3A Pending CN110502288A (en) | 2019-08-19 | 2019-08-19 | For the call method of third-party application, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110502288A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105843654A (en) * | 2016-04-14 | 2016-08-10 | 广州市久邦数码科技有限公司 | Method and system for implementing dynamic loading of advertisement SDK (software development kit) |
CN108647061A (en) * | 2018-04-24 | 2018-10-12 | 北京奇虎科技有限公司 | Call method, device and the computing device of system hidden method |
CN109597662A (en) * | 2018-11-08 | 2019-04-09 | 百度在线网络技术(北京)有限公司 | The call method, device and electronic equipment in non-public library in mobile terminal |
CN109901937A (en) * | 2019-01-18 | 2019-06-18 | 平安普惠企业管理有限公司 | Hide reflection call method, device, computer equipment and the storage medium of API |
-
2019
- 2019-08-19 CN CN201910765378.3A patent/CN110502288A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105843654A (en) * | 2016-04-14 | 2016-08-10 | 广州市久邦数码科技有限公司 | Method and system for implementing dynamic loading of advertisement SDK (software development kit) |
CN108647061A (en) * | 2018-04-24 | 2018-10-12 | 北京奇虎科技有限公司 | Call method, device and the computing device of system hidden method |
CN109597662A (en) * | 2018-11-08 | 2019-04-09 | 百度在线网络技术(北京)有限公司 | The call method, device and electronic equipment in non-public library in mobile terminal |
CN109901937A (en) * | 2019-01-18 | 2019-06-18 | 平安普惠企业管理有限公司 | Hide reflection call method, device, computer equipment and the storage medium of API |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108563435B (en) | The method and device of code building | |
Henning | API: Design Matters: Why changing APIs might become a criminal offense. | |
JP2019536153A (en) | Smart contract processing method and apparatus | |
CN107291802B (en) | Relation map methods of exhibiting and device | |
CN110210021A (en) | Read understanding method and device | |
CN109462726A (en) | The control method and device of camera | |
CN105528251B (en) | Processing method, device and the mobile terminal of applicative notifications information | |
US20170109153A1 (en) | System and method for providing supplemental functionalities to a computer program via an ontology instance | |
CN110069739A (en) | The page preloads method and device | |
CN110311748A (en) | Method for synchronizing time, device and the vehicle using it of vehicle | |
CN110297721A (en) | A kind of across contract call method of the intelligent contract based on JAVA | |
CN104123165B (en) | Application program unloading method and device and mobile terminal | |
US20070220249A1 (en) | Data structure and method for managing modules associated with a kernel | |
CN110502288A (en) | For the call method of third-party application, device, electronic equipment and storage medium | |
CN106921688B (en) | Service providing method for distributed system and distributed system | |
US20150106786A1 (en) | Symmetrical dimensions in context-oriented programming to optimize software object execution | |
CN107729097A (en) | Displayed page collocation method and relevant device | |
US20020101449A1 (en) | System and method for developing and processing a graphical user interface for a computer application | |
CN110471744A (en) | Password amending method, device, equipment and computer readable storage medium | |
US9183001B2 (en) | Simulation of static members and parameterized constructors on an interface-based API | |
US8028274B2 (en) | Integrating loosely coupled tools using contracts and references | |
CN111198735A (en) | Layer information acquisition method, layer information acquisition device and terminal equipment | |
EP2726985A1 (en) | Device and method for synchronizing tasks executed in parallel on a platform comprising several calculation units | |
CN108845953B (en) | Interface testing method and device | |
CN110471851A (en) | A kind of automated testing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |