CN110515678B - Information processing method, equipment and computer storage medium - Google Patents
Information processing method, equipment and computer storage medium Download PDFInfo
- Publication number
- CN110515678B CN110515678B CN201910782782.1A CN201910782782A CN110515678B CN 110515678 B CN110515678 B CN 110515678B CN 201910782782 A CN201910782782 A CN 201910782782A CN 110515678 B CN110515678 B CN 110515678B
- Authority
- CN
- China
- Prior art keywords
- host application
- function
- information
- order
- host
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 12
- 238000003672 processing method Methods 0.000 title claims abstract description 11
- 238000000034 method Methods 0.000 claims abstract description 55
- 230000001960 triggered effect Effects 0.000 claims abstract description 5
- 230000006870 function Effects 0.000 claims description 236
- 238000009434 installation Methods 0.000 claims description 15
- 238000012795 verification Methods 0.000 claims description 13
- 238000012545 processing Methods 0.000 description 20
- 230000003287 optical effect Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000003190 augmentative effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4482—Procedural
- G06F9/4484—Executing subprograms
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Computer And Data Communications (AREA)
Abstract
The application provides an information processing method, equipment and a computer storage medium, wherein the method comprises the following steps: after a first host application in terminal equipment acquires an event that a small program triggers a host application function, if the first host application does not have the function, sending a function parameter to a second host application with the function in the terminal equipment; and receiving the execution result information returned after the second host application executes the function. According to the method and the device, when the first host application does not have the host application function triggered by the applet, the function can still be achieved through the second host application with the function in the terminal device, and therefore the applet is guaranteed to provide services successfully.
Description
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of computer application technologies, and in particular, to an information processing method and apparatus in an applet scenario, and a computer storage medium.
[ background of the invention ]
This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
A Mini Program (Mini Program) is an application that can be used without installation, and runs in an environment provided by a host application. The applet often uses some functions of the host application in providing the service, for example, when the applet triggers the payment function, the host application is needed to provide the payment channel. But if the host application in which the applet is located does not have the function, the applet will fail to service.
[ summary of the invention ]
In view of the above, the present application provides an information processing method, apparatus, and computer storage medium to facilitate solving the above-described problems.
The specific technical scheme is as follows:
in a first aspect, the present application provides an information processing method, executed by a first host application of a terminal device, the method including:
after an event that a small program triggers a host application function is acquired, if the first host application does not have the function, sending a function parameter to a second host application with the function in the terminal equipment;
and receiving the execution result information returned after the second host application executes the function.
According to a preferred embodiment of the present application, the method further comprises:
the first host application determines whether the first host application has the function by detecting whether information of the function exists in an installation package of the first host application or whether a package name of the first host application indicates that the function exists; or,
the first host application sends event information triggering a host application function to a server side of the first host application, and the server side of the first host application determines whether the first host application has the function.
According to a preferred embodiment of the present application, the method further comprises:
the first host application determines the host application with the function in the terminal device by enumerating a host application list of the terminal device and detecting whether information for identifying the function exists in an installation package of each host application in the list or whether a package name of each host application indicates that the function exists; or, the first host application sends the enumerated host application list of the terminal device to the server side of the first host application, the server side of the first host application determines the host application with the function in the host application list, and returns the information of the host application with the function to the first host application.
According to a preferred embodiment of the present application, the method further comprises:
and if a plurality of host applications with the functions exist in the terminal equipment, displaying the information of the plurality of host applications with the functions to a user so that the user can select one host application as the second host application.
According to a preferred embodiment of the present application, sending the function parameter to the second host application having the function in the terminal device includes:
invoking an interface of the function of the second host application and passing the function parameter through an Intent event.
According to a preferred embodiment of the present application, sending the function parameter to the second host application having the function in the terminal device includes:
encrypting the function parameters by using a session key negotiated in advance by the first host application and the second host application, and sending the encrypted function parameters to the second host application;
receiving an execution result returned by the second host application after executing the function includes:
and receiving an encrypted execution result returned after the second host application executes the function, and decrypting the encrypted execution result by using the session key.
According to a preferred embodiment of the present application, the functions include a payment function specifying a payment channel;
the function parameters comprise order information;
the execution result information includes: and (6) paying the result.
According to a preferred embodiment of the present application, the acquiring the event that the applet triggers the host application function includes: acquiring a request for the applet to create an order in the first host application, wherein the request comprises order information;
and after receiving order related information returned by the server side of the first host application, determining that the first host application does not have the function.
According to a preferred embodiment of the present application, the order related information includes: the encrypted order information, the encrypted key information and the order reconciliation information;
the functional parameters include: the encrypted order information, the encryption key information, the verification information and the timestamp.
According to a preferred embodiment of the present application, the order related information further includes order reconciliation information; the function parameters and the execution result information also respectively comprise the order reconciliation information;
the method further comprises the following steps:
and the first host application sends the execution result information to a server side of the first host application for storage, so that the server side of the first host application utilizes the order reconciliation information to perform bill reconciliation.
According to a preferred embodiment of the present application, if the execution result information includes information of execution failure, the sending of the function parameter to the second host application having the function in the terminal device is re-executed, or the sending of the function parameter to another host application having the function in the terminal device is re-executed.
In a second aspect, the present application provides an information processing method, executed by a second host application of a terminal device, the method including:
receiving a function parameter sent by a first host application in the terminal equipment, wherein the function parameter is sent after the first host application acquires an event that the applet triggers a host application function and determines that the first host application does not have the function;
executing the function using the function parameter;
and returning execution result information to the first host application.
According to a preferred embodiment of the present application, the receiving the function parameter sent by the first host application in the terminal device includes:
receiving the encrypted functional parameters sent by the first host application, and decrypting the encrypted functional parameters by using a session key negotiated in advance by the first host application and the second host application;
returning execution result information to the first host application comprises:
and encrypting the execution result information by using the session key, and returning the encrypted execution result information to the first host application.
According to a preferred embodiment of the present application, the functions include a payment function specifying a payment channel;
the function parameters comprise order information;
the execution result information includes: and (6) paying the result.
According to a preferred embodiment of the present application, the functional parameters include: the encrypted order information, the encrypted key information, the order reconciliation information, the verification information and the timestamp;
the execution result information comprises a payment result and the order reconciliation information;
the method further comprises the following steps: and sending the functional parameters to a server side of the second host application for storage, so that the server side of the second host application can perform order reconciliation by using the order reconciliation information.
According to a preferred embodiment of the present application, performing the function using the function parameter includes:
sending the function parameters to a server side of the second host application;
receiving a payment interface containing appointed payment channel information returned by the server side of the second host application;
sending payment information input by a user on the payment interface to a server side of the second host application;
and receiving a payment result returned by the server side of the second host application.
In a third aspect, the present application provides an information processing method, performed by a server side of a first host application, the method including:
receiving event information of a host application function triggered by an applet and sent by the first host application, and a host application list of the terminal device where the first host application is located, wherein the host application list is obtained by enumeration of the first host application;
and determining the host application with the function in the host application list, and returning the information of the host application with the function to the first host application so that the first host application sends the function parameters to a second host application with the function to execute the function.
According to a preferred embodiment of the present application, the functions include a payment function specifying a payment channel;
the event for acquiring the host application function triggered by the applet comprises the following steps: acquiring a request for the applet to create an order in the first host application, wherein the request comprises order information;
the method further comprises the following steps: returning order related information to the first host application, wherein the order related information comprises: the encrypted order information, the encrypted key information and the order reconciliation information;
receiving and storing a payment result and order reconciliation information sent by the first host application;
and the order reconciliation information is used for carrying out bill reconciliation.
In a fourth aspect, the present application provides an apparatus comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method as described above.
In a fifth aspect, the present application provides a storage medium containing computer-executable instructions for performing the method as described above when executed by a computer processor.
According to the technical scheme, if the first host application does not have the host application function triggered by the applet in the process of using the applet of the first host application by the user, the function can still be realized through the second host application with the function in the terminal device, so that the applet can be ensured to provide services successfully.
[ description of the drawings ]
FIG. 1 is a schematic diagram of a system architecture to which the present application relates;
fig. 2 is a flowchart of processing executed by the host application 1 according to an embodiment of the present application;
fig. 3 is a flowchart of processing executed by the host application 2 according to an embodiment of the present disclosure;
fig. 4 is a flowchart of a method for implementing a payment function according to an embodiment of the present application;
FIG. 5 is a flowchart of a method for implementing a search function according to an embodiment of the present application;
FIG. 6 illustrates a block diagram of an exemplary computer system/server suitable for use in implementing embodiments of the present application.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in detail below with reference to the accompanying drawings and specific embodiments.
To facilitate an understanding of the present application, a system architecture and main concepts related to the present application will be described first. As shown in fig. 1, the system architecture mainly includes a host application and a server corresponding to the host application.
The small program runs on the terminal equipment depending on the host application, and the environment where the small program runs is provided by the host application. Wherein the terminal devices may include, but are not limited to, devices such as: intelligent mobile terminals, intelligent home devices, network devices, wearable devices, intelligent medical devices, PCs (personal computers), and the like. Wherein the smart mobile device may include devices such as a cell phone, a tablet computer, a notebook computer, a PDA (personal digital assistant), an internet automobile, etc. The smart home device may include a smart home device, such as a smart television, a smart sound box, and the like. The network devices may include devices such as switches, wireless APs, servers, and the like. Wearable devices may include devices such as smart watches, smart glasses, smart bracelets, virtual reality devices, augmented reality devices, mixed reality devices (i.e., devices that can support virtual reality and augmented reality), and so forth.
Multiple host applications may be contained in the same terminal device, and fig. 1 illustrates an example of the host application 1 and the host application 2. Multiple applets may also be run in one host application, and different host applications may run different applets, or the same applet. As shown in fig. 1, the applet a1 and the applet b1 are run in the host application 1, and the applet a2 and the applet b2 are run in the host application 2.
Each host application has a corresponding server side, as shown in fig. 1, a host application 1 corresponds to a server side 1, and a host application 2 corresponds to a server side 2. Each host application can interact with the corresponding server side, and in the embodiment of the application, data interaction can be performed between different server sides.
Each server may be a single server or a server group consisting of a plurality of servers. It should be understood that the number of terminal devices, hosting applications, applets, server sides in fig. 1 is merely illustrative. Any number of terminal devices, host applications, applets, server sides may be present, as desired for implementation.
The core idea of the application is that when the applet triggers the host application function, if the host application of the applet does not have the function, the function parameter is sent to other host applications having the function in the same terminal device to replace the host application with the function.
In the subsequent embodiments of the present application, it is assumed that the user uses the applet a1 in the host application 1 of the system architecture shown in fig. 1, and the applet a1 needs to call the function of the host application 1. The host application 1 mainly performs the processing flow as shown in fig. 2:
in 201, the acquisition of the applet a1 by the host application 1 triggers the event of the host application function.
Depending on the specific function, the events that trigger the host application function also differ. When the applet a1 needs to use a certain function of the host application 1, an event triggering the function is generated, and when the host application 1 acquires the event, the fact that the function needs to be called can be known.
In 202, the host application 1 determines whether the host application has the function, and if so, the step 203 is executed; otherwise, 204 is performed.
In the embodiment of the present application, the detection of whether the host application 1 has the function may be performed by the host application 1 itself, or may be performed by the server 1 corresponding to the host application 1.
In this embodiment of the present application, it may be agreed in advance that information identifying a specific function is set in an installation package of a host application, and if the host application has the specific function, the installation package has the information identifying the specific function. The package name of the host application may be specified in advance for a specific function, and if the host application has the specific function, the host application may be indicated to have the specific function by the package name. Therefore, the host application 1 can determine whether the host application 1 has the function by detecting whether information of the function exists in the installation package of the host application 1 or whether the package name of the host application 1 indicates that the function exists.
Alternatively, the host application 1 may send event information that the applet a1 triggers the host application function to the server 1 of the host application 1, and the server 1 determines whether the host application 1 has the function. On the one hand, whether a host application has a certain function is related to the development of the service provider, i.e. whether the service provider integrates the function into the host application when developing the host application of this type, and on the other hand, also related to the version of the host application 1, there is a possibility that a high version has the function, and a low version does not. In short, the server 1 can determine whether the host application 1 has the function according to the development configuration information, the version information of the host application 1, and the like, and feed back information indicating whether the host application 1 has the function to the host application 1.
At 203, the host application 1 executes the function, and the flow ends.
If the host application 1 itself has the function, the function may be executed in a manner known in the art.
At 204, the host application 1 determines the host application 2 in the terminal device having the function.
As mentioned above, in the embodiment of the present application, it may be agreed in advance that information identifying a specific function is provided in the installation package of the host application, and if the host application has the specific function, the installation package thereof has the information identifying the specific function.
The package name of the host application may be specified in advance for a specific function, and if the host application has the specific function, the host application may be indicated to have the specific function by the package name.
Therefore, as one implementation manner, the host application 1 may enumerate a host application list of the terminal device, and then detect whether information identifying the function exists in an installation package of each host application in the host application list, or detect whether a package name of each host application indicates that the function exists, thereby determining a host application having the function in the terminal device.
Besides the above implementation, there is another implementation that the server side 1 determines the host application having the function in the terminal device. Specifically, the host application 1 may send a host application list of the terminal device obtained by enumeration to the server 1. The service providers may cooperate with each other in advance with some specific functions, and the server 1 is configured with information of the host application having the specific functions. After receiving the host application list sent by the host application 1, the server 1 determines the host application having the function corresponding to the event in the list, and returns the information of the host application having the function corresponding to the event to the host application 1.
If only one host application having the function is determined, the host application 1 may directly use the host application as the host application 2. If a plurality of host applications with the function are determined, the host application 1 may select one of the host applications as the host application 2 according to a preset rule. In addition, as a preferred embodiment, the determined host application information may be displayed to the user, so that the user may select one host application from the host application information as the host application 2.
In 205, the host application 1 sends the function parameters to the host application 2 with the function in the terminal device.
In this step, the host application 1 may call a corresponding functional interface of the host application 2 through an Intent event and transfer the functional parameter.
When the host application 1 sends the function parameters to the host application 2, in order to ensure the security of the information, the host application 1 and the host application 2 may negotiate a session key, and information transferred between the host application 1 and the host application 2 needs to be encrypted by using the session key. And then the host application 1 encrypts the functional parameters by using the session key obtained by negotiation and sends the encrypted functional parameters to the host application 2, and the host application 2 decrypts the received functional parameters by using the session key.
At 206, execution result information returned after the host application 2 executes the function is received.
After receiving the execution result information, the host application 1 may send the execution result information to the server 1 for storage.
The host application 2 mainly executes the processing flow shown in fig. 3:
in 301, the host application 2 receives the function parameters sent by the host application 1.
Also, the functional parameters involved in this step may be encrypted functional parameters. The host application 2 may decrypt the encrypted function parameters using the session key negotiated with the host application 1 in advance.
At 302, the corresponding function is performed using the function parameter.
In this step, the host application 2 may send the function parameters to the server 2, and the server 2 performs processing according to the function parameters, which may be an existing function execution process and is not described in detail herein.
In 303, execution result information is returned to the host application 1.
In this step, the host application 2 may encrypt the execution result with the pre-negotiated session key and send the encrypted execution result to the host application 1.
The host application function referred to in this application may be any function of the host application that the applet invokes during use, such as a search function, a payment function, etc. The following description is made with reference to examples, respectively.
Fig. 4 is a flowchart of a method for implementing a payment function according to an embodiment of the present application, and as shown in fig. 4, the method may include the following steps:
in 401, the host application 1 obtains a request to create an order for a applet a1 in the host application 1.
In the process of using applet a1 by the host application 1, the user needs to invoke the payment function of the host application when creating an order. Usually, when an order is created, the order also includes information of a payment channel in addition to information of an order number, order content and the like. The payment channel may be a service-specific payment channel or a user-selected payment channel. Therefore, the order information included in the request for creating an order includes information of the payment channel, so as to trigger the invocation of the payment function of the host application 1 that adopts the payment channel.
At 402, the host application 1 sends a request for creating an order to its own server, i.e., server 1.
In 403, the server 1 returns order related information to the host application 1, where the order related information includes encrypted order information, encryption key information, and order reconciliation information.
The server 1 determines that the host application 1 does not have the payment function of the payment channel and cannot directly perform payment processing, so that the server 1 returns order related information to the host application 1, and after receiving the order related information, the host application 1 can determine that the host application 1 does not have the payment function.
The order information contained in the order related information is encrypted, and the encryption key information adopted by the order information is also contained in the order related information. The encryption key information may be symmetric key information or asymmetric key information, as long as the encrypted order information can be decrypted by using the encryption key information.
The order reconciliation information is information which is generated by the server side 1 and has uniqueness and unforgeability, can uniquely identify the order and is difficult to crack by other equipment. The order reconciliation information can be obtained by encrypting random information such as a random number and a timestamp by using a key known only by the server 1, and of course, other methods can be used as long as uniqueness and non-falsification can be ensured.
In 404, the host application 1 determines a host application 2 with a payment function in the terminal device.
The host application 1 enumerates all host applications in the terminal device to obtain a host application list, and detects whether the installation package of each host application in the list has a payment function of identifying the appointed payment channel, so as to obtain the host application with the payment function of the appointed payment channel. If multiple host applications are available, the multiple host applications may be displayed to the user, such as in a pop-up window, from which the user selects one host application as the host application for performing the payment function. Assume that the user selected host application 2.
In addition to this method, the server 1 may also determine, by using the host application list of the terminal device uploaded by the host application 1, a host application having a payment function of a specified payment channel in the terminal device, and return information of the host applications to the host application 1. The host application 1 may send the host application list together with the request in step 402, or send the host application list separately after 403, or enumerate and upload the host application list to the server 1 after the host application 1 is started.
In 405, the host application 1 and the host application 2 negotiate a session key therebetween.
In order to ensure information security and prevent information forgery and information interception, in the embodiment of the present application, a session key may be negotiated between the host application 1 and the host application 2. The negotiation method of the session key may adopt a negotiation method existing in the prior art, and is not described in detail herein.
At 406, the host application 1 encrypts the payment function parameters with the session key and sends the encrypted parameters to the host application 2.
The payment function parameters are obtained from the order related information. The payment function parameters can also comprise verification information and a time stamp besides the encrypted order information, the encrypted key information and the order reconciliation information. The verification information is used to perform integrity verification on the payment function parameter, and may be, for example, information obtained by performing hash processing on encrypted order information, encrypted key information, and a timestamp.
In addition, since different host applications have different required information when performing the processing of the payment function, data adaptation of the parameters of the payment function needs to be performed according to the host application performing the payment function. The payment function parameters may be sent to the host application 2, for example, in a preset data format.
In this step, the host application 1 calls the payment function interface of the host application 2 through the Intent event and transmits the payment function parameter.
In 407, the host application 2 decrypts the payment function parameters using the session key.
In 408, the host application 2 sends the payment function parameter to the server side 2.
After receiving the payment function parameters, the server 2 performs integrity check by using the check information, for example, after performing hash processing on the encrypted order information, the encrypted key information, and the timestamp, compares a value obtained by the hash processing with the check information, and if the values are consistent, passes the integrity check, and if the integrity check fails, the integrity check is not successful.
And decrypting the encrypted order information by using the encryption key information to obtain the order information, and executing subsequent payment processing by using the order information.
The server 2 stores the corresponding relationship between the order information and the order reconciliation information so as to perform the order reconciliation in the following.
In 409, the server 2 returns a payment interface containing the information of the specified payment channel to the host application 2.
The order information comprises appointed payment channel information, payment amount, payee information and the like, the server generates a payment interface by using the information and returns the payment interface to the host application 2, and the host application 2 displays the payment interface to the user.
In 410, the host application 2 sends the payment information input by the user in the payment interface to the server 2.
The user can input payment information such as a password, an authentication code, biometric information and the like on the payment interface, and the host application 2 sends the payment information to the server 2. The password may be a digital key, a gesture password, a voice password, or the like. The verification code may be a picture type verification code, a short message verification code, or the like. The biological characteristic information can be fingerprint, voiceprint, iris, face and other characteristic information.
In 411, the server side 2 processes the payment information and returns execution result information to the host application 2.
The server 2 may verify the payment information locally, or may send the payment information to a third party payment platform or a bank system corresponding to the specified payment channel for verification. If the verification is passed, the payment is successful, otherwise the payment is failed.
In addition, the server 2 stores the payment result and the order reconciliation information so as to perform order reconciliation processing in the following.
The 409 to 411 are one implementation manner provided in the present application, and other payment processing manners may be adopted for the server 2. For example, if the user sets up the secret-free payment in the host application 2 in advance, the server 2 directly returns the information of successful payment to the host application 2.
At 412, the host application 2 encrypts the execution result information with the session key and sends the encrypted execution result information to the host application 1.
The execution result information includes a payment result and order reconciliation information.
In 413, the host application 1 decrypts the execution result information using the session key, and then transmits the execution result information to the server 1 for storage.
The server 1 stores the corresponding relationship between the payment result and the order reconciliation information.
If account checking is required to be performed subsequently for the transaction, in 414, the server 1 and the server 2 may perform order account checking processing by using the corresponding relationship between the order information, the payment result, and the order account checking information stored in them.
Fig. 5 is a flowchart of a method for implementing a search function according to an embodiment of the present application, and as shown in fig. 5, the method may include the following steps:
in 501, the host application 1 obtains a search request of the applet b1 in the host application 1.
When the user needs to invoke the search function of the host application through the host application 1 in the process of using the applet b1, a search request is sent, where the search request may include a search keyword, and may further include: the search type information is, for example, web page search, picture search, map search, or the like.
At 502, the host application 1 detects that it does not have the search function, and then identifies the host application 2 having the search function in the terminal device.
The host application 1 may detect whether the information identifying the search function exists in the self-installation package, and if not, may consider that the self-installation package does not have the search function.
Besides this way, a way of sending the search request to the server 1 of the host application 1 in the payment embodiment shown in fig. 4, and determining whether the host application 1 has the search function by the server 1 may also be adopted.
The host application 1 enumerates a host application list in the terminal device, and determines the host application with the search function in the terminal device by detecting whether information for identifying the search function exists in an installation package of each host application in the list. If there are multiple host applications with search functions, information of the multiple host applications may be displayed to the user, from which the user selects one host application, assuming that host application 2 is selected.
At 503, the host application 1 and the host application 2 negotiate a session key therebetween.
At 504, the host application 1 encrypts the search function parameter with the session key and sends it to the host application 2.
The search function parameter is derived from the search request. The search function parameters can include search information such as search keywords and search types, and also can include information such as verification information and timestamps. The search information may also be in an encrypted form, in which case the search function parameter further includes encryption key information.
In this step, the host application 1 may call the search function interface of the host application 2 through the Intent event and transfer the search function parameter.
In 505, the host application 2 decrypts the search function parameters using the session key.
At 506, the host application 2 sends the search function parameters to the server side 2.
And after receiving the search function parameters, the server 2 performs integrity check by using the check information. And decrypting the encrypted search information by using the encryption key information to obtain the search information, and performing search processing by using the search information.
At 507, the server side 2 returns the search result information to the host application 2.
After the search is performed, address information, such as a search results page, may be sent to the host application 2.
At 508, the host application 2 encrypts the search result information with the session key and sends the encrypted search result information to the host application 1.
In 509, the host application 1 decrypts the search result information using the session key, and then displays the search result.
Fig. 6 illustrates a block diagram of an exemplary computer system/server 012 suitable for use in implementing embodiments of the present application. The computer system/server 012 shown in fig. 6 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system/server 012 is embodied as a general purpose computing device. The components of computer system/server 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, and a bus 018 that couples various system components including the system memory 028 and the processing unit 016.
Computer system/server 012 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 012 and includes both volatile and nonvolatile media, removable and non-removable media.
Program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof might include an implementation of a network environment. Program modules 042 generally perform the functions and/or methodologies of embodiments described herein.
The computer system/server 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), in which case the computer system/server 012 communicates with an external radar device, and may also communicate with one or more devices that enable a user to interact with the computer system/server 012, and/or with any devices (e.g., network card, modem, etc.) that enable the computer system/server 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/server 012 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 020. As shown, the network adapter 020 communicates with the other modules of the computer system/server 012 via bus 018. It should be appreciated that although not shown in fig. 6, other hardware and/or software modules may be used in conjunction with the computer system/server 012, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 016 executes programs stored in the system memory 028, thereby executing various functional applications and data processing, such as implementing the method flows provided by the embodiments of the present application.
The computer program described above may be provided in a computer storage medium encoded with a computer program that, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations illustrated in the embodiments described above. For example, the method flows provided by the embodiments of the present application are executed by the one or more processors described above.
With the development of time and technology, the meaning of media is more and more extensive, and the propagation path of computer programs is not limited to tangible media any more, and can also be downloaded from a network directly and the like. Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (20)
1. An information processing method executed by a first host application of a terminal device, the method comprising:
after an event that a small program triggers a host application function is acquired, if the first host application does not have the function, sending a function parameter to a second host application with the function in the terminal equipment;
and receiving the execution result information returned after the second host application executes the function.
2. The method of claim 1, further comprising:
the first host application determines whether the first host application has the function by detecting whether information of the function exists in an installation package of the first host application or whether a package name of the first host application indicates that the function exists; or,
the first host application sends event information triggering a host application function to a server side of the first host application, and the server side of the first host application determines whether the first host application has the function.
3. The method of claim 1, further comprising:
the first host application determines the host application with the function in the terminal device by enumerating a host application list of the terminal device and detecting whether information for identifying the function exists in an installation package of each host application in the list or whether a package name of each host application indicates that the function exists; or,
and the first host application sends the enumerated host application list of the terminal device to a server side of the first host application, the server side of the first host application determines the host application with the function in the host application list, and returns the information of the host application with the function to the first host application.
4. The method of claim 3, further comprising:
and if a plurality of host applications with the functions exist in the terminal equipment, displaying the information of the plurality of host applications with the functions to a user so that the user can select one host application as the second host application.
5. The method of claim 1, wherein sending the function parameters to a second host application with the function in the terminal device comprises:
invoking an interface of the function of the second host application and passing the function parameter through an Intent event.
6. The method of claim 1, wherein sending the function parameters to a second host application with the function in the terminal device comprises:
encrypting the function parameters by using a session key negotiated in advance by the first host application and the second host application, and sending the encrypted function parameters to the second host application;
receiving an execution result returned by the second host application after executing the function includes:
and receiving an encrypted execution result returned after the second host application executes the function, and decrypting the encrypted execution result by using the session key.
7. The method of claim 1, wherein the function comprises a payment function specifying a payment channel;
the function parameters comprise order information;
the execution result information includes: and (6) paying the result.
8. The method of claim 7, wherein the event that the get applet triggers the host application function comprises: acquiring a request for the applet to create an order in the first host application, wherein the request comprises order information;
and after receiving order related information returned by the server side of the first host application, determining that the first host application does not have the function.
9. The method of claim 8, wherein the order-related information comprises: the encrypted order information, the encrypted key information and the order reconciliation information;
the functional parameters include: the encrypted order information, the encryption key information, the verification information and the timestamp.
10. The method of claim 9, wherein the order-related information further comprises order reconciliation information; the function parameters and the execution result information also respectively comprise the order reconciliation information;
the method further comprises the following steps:
and the first host application sends the execution result information to a server side of the first host application for storage, so that the server side of the first host application utilizes the order reconciliation information to perform bill reconciliation.
11. The method according to claim 1, wherein if the execution result information includes information of execution failure, the sending of the function parameter to the second host application having the function in the terminal device is re-executed, or the sending of the function parameter to another host application having the function in the terminal device is re-executed.
12. An information processing method executed by a second host application of a terminal device, the method comprising:
receiving a function parameter sent by a first host application in the terminal equipment, wherein the function parameter is sent after the first host application acquires an event that the applet triggers a host application function and determines that the first host application does not have the function;
executing the function using the function parameter;
and returning execution result information to the first host application.
13. The method of claim 12, wherein receiving the function parameters sent by the first host application in the terminal device comprises:
receiving the encrypted functional parameters sent by the first host application, and decrypting the encrypted functional parameters by using a session key negotiated in advance by the first host application and the second host application;
returning execution result information to the first host application comprises:
and encrypting the execution result information by using the session key, and returning the encrypted execution result information to the first host application.
14. The method of claim 12, wherein the function comprises a payment function specifying a payment channel;
the function parameters comprise order information;
the execution result information includes: and (6) paying the result.
15. The method of claim 14, wherein the functional parameters comprise: the encrypted order information, the encrypted key information, the order reconciliation information, the verification information and the timestamp;
the execution result information comprises a payment result and the order reconciliation information;
the method further comprises the following steps: and sending the functional parameters to a server side of the second host application for storage, so that the server side of the second host application can perform order reconciliation by using the order reconciliation information.
16. The method of claim 14, wherein performing the function using the function parameter comprises:
sending the function parameters to a server side of the second host application;
receiving a payment interface containing appointed payment channel information returned by the server side of the second host application;
sending payment information input by a user on the payment interface to a server side of the second host application;
and receiving a payment result returned by the server side of the second host application.
17. An information processing method executed by a server side of a first host application, the method comprising:
receiving event information of a host application function triggered by an applet and sent by the first host application, and a host application list of the terminal device where the first host application is located, wherein the host application list is obtained by enumeration of the first host application;
and determining the host application with the function in the host application list, and returning the information of the host application with the function to the first host application so that the first host application sends the function parameters to a second host application with the function to execute the function.
18. The method of claim 17, wherein the function comprises a payment function specifying a payment channel;
the event that the applet triggers the host application function includes: a request for the applet to create an order in the first host application, wherein the request comprises order information;
the method further comprises the following steps: returning order related information to the first host application, wherein the order related information comprises: the encrypted order information, the encrypted key information and the order reconciliation information;
receiving and storing a payment result and order reconciliation information sent by the first host application;
and the order reconciliation information is used for carrying out bill reconciliation.
19. An information processing apparatus characterized by comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-18.
20. A storage medium containing computer-executable instructions for performing the method of any one of claims 1-18 when executed by a computer processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782782.1A CN110515678B (en) | 2019-08-23 | 2019-08-23 | Information processing method, equipment and computer storage medium |
PCT/CN2020/109954 WO2021036877A1 (en) | 2019-08-23 | 2020-08-19 | Information processing method, device, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910782782.1A CN110515678B (en) | 2019-08-23 | 2019-08-23 | Information processing method, equipment and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110515678A CN110515678A (en) | 2019-11-29 |
CN110515678B true CN110515678B (en) | 2021-03-19 |
Family
ID=68626431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910782782.1A Active CN110515678B (en) | 2019-08-23 | 2019-08-23 | Information processing method, equipment and computer storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110515678B (en) |
WO (1) | WO2021036877A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110515678B (en) * | 2019-08-23 | 2021-03-19 | 上海连尚网络科技有限公司 | Information processing method, equipment and computer storage medium |
CN112835632B (en) * | 2019-11-06 | 2022-05-27 | 上海连尚网络科技有限公司 | Method and equipment for calling end capability and computer storage medium |
CN111476637B (en) * | 2020-04-07 | 2023-07-07 | 百度在线网络技术(北京)有限公司 | Commodity information management method, host platform and commodity information management component |
CN111475342B (en) * | 2020-04-15 | 2024-04-23 | 广州三星通信技术研究有限公司 | Application switching method and application switching device for electronic terminal |
CN111754269A (en) * | 2020-06-29 | 2020-10-09 | 嘉兴想天信息科技有限公司 | Short-speaking APP integrated community system |
CN114116037A (en) * | 2020-08-31 | 2022-03-01 | 支付宝实验室(新加坡)有限公司 | Method and system for launching small programs across sites |
CN112700238A (en) * | 2020-12-31 | 2021-04-23 | 车主邦(北京)科技有限公司 | Payment information processing method and device |
CN114531432A (en) * | 2022-02-14 | 2022-05-24 | 浙江吉利控股集团有限公司 | Cross-platform based service communication method and device |
CN114979300B (en) * | 2022-07-05 | 2024-06-04 | 北京弥特信息科技有限公司 | Multi-service communication method and device for client |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030033443A1 (en) * | 2001-03-01 | 2003-02-13 | Nikolay Igotti | Virtual machine integration application program interface |
US8458656B1 (en) * | 2008-08-25 | 2013-06-04 | United Services Automobile Association (Usaa) | Systems and methods for providing mobile browser access to mobile device functionalities |
CN104102537B (en) * | 2013-04-07 | 2017-09-29 | 华为技术有限公司 | A kind of application call method and user terminal |
CN107957911B (en) * | 2016-10-18 | 2019-07-05 | 腾讯科技(深圳)有限公司 | Method and apparatus, the method and apparatus of module data processing of component call |
CN109976922B (en) * | 2019-03-04 | 2021-02-02 | 上海连尚网络科技有限公司 | Discovery method, device and computer storage medium between small program platforms |
CN109933442B (en) * | 2019-03-04 | 2022-12-30 | 上海连尚网络科技有限公司 | Method, apparatus and computer storage medium for communication between small program platforms |
CN110515678B (en) * | 2019-08-23 | 2021-03-19 | 上海连尚网络科技有限公司 | Information processing method, equipment and computer storage medium |
-
2019
- 2019-08-23 CN CN201910782782.1A patent/CN110515678B/en active Active
-
2020
- 2020-08-19 WO PCT/CN2020/109954 patent/WO2021036877A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2021036877A1 (en) | 2021-03-04 |
CN110515678A (en) | 2019-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110515678B (en) | Information processing method, equipment and computer storage medium | |
US9799029B2 (en) | Securely receiving data input at a computing device without storing the data locally | |
CN110826043B (en) | Digital identity application system and method, identity authentication system and method | |
US20160087962A1 (en) | Method and system for authenticating user identity | |
US20130276087A1 (en) | Multifactor authentication | |
US10733594B1 (en) | Data security measures for mobile devices | |
CN111698312B (en) | Service processing method, device, equipment and storage medium based on open platform | |
US12132836B2 (en) | Verified presentation of non-fungible tokens | |
US20200412535A1 (en) | Authentication information transmission method, apparatus, and storage medium | |
CN113918904A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN112150113A (en) | Method, device and system for borrowing file data and method for borrowing data | |
CN110545542B (en) | Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment | |
CN118247093B (en) | Control method, device, equipment, storage medium and product for remains and certificates | |
CN106685945A (en) | Service request processing method, verifying method of service handling number, and terminal thereof | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN112711955B (en) | NFC information transmission method, NFC information transmission device and terminal | |
CN114785560B (en) | Information processing method, device, equipment and medium | |
CN110968860A (en) | Security verification method for application account, computer equipment and computer-readable storage medium | |
US20180341402A1 (en) | Method for executing of security keyboard, apparatus and system for executing the method | |
US20160014115A1 (en) | Apparatus used for security information interaction | |
CN112101922A (en) | Cloud payment method and device, cloud system, electronic device and storage medium | |
CN109525554B (en) | Financial data communication method, device, medium and electronic equipment | |
CN116702108A (en) | Authentication method, device and system | |
US20220051092A1 (en) | System and methods for translating error messages | |
CN116738500A (en) | Data deformation processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |