CN111061492A - Application program processing method and device and computer storage medium - Google Patents
Application program processing method and device and computer storage medium Download PDFInfo
- Publication number
- CN111061492A CN111061492A CN201911294116.XA CN201911294116A CN111061492A CN 111061492 A CN111061492 A CN 111061492A CN 201911294116 A CN201911294116 A CN 201911294116A CN 111061492 A CN111061492 A CN 111061492A
- Authority
- CN
- China
- Prior art keywords
- application program
- application
- preset function
- preset
- pull
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 87
- 230000008569 process Effects 0.000 claims abstract description 46
- 230000007246 mechanism Effects 0.000 claims description 20
- 238000012544 monitoring process Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 12
- 230000001934 delay Effects 0.000 claims description 3
- 230000002411 adverse Effects 0.000 abstract description 8
- 230000000694 effects Effects 0.000 abstract description 6
- 238000003672 processing method Methods 0.000 abstract description 4
- 230000006870 function Effects 0.000 description 65
- 230000003287 optical effect Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 206010010144 Completed suicide Diseases 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/485—Task life-cycle, e.g. stopping, restarting, resuming execution
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The application provides a processing method, equipment and a computer storage medium of an application program, wherein the method comprises the following steps: the first application program requests to pull up a preset function of the second application program; and ending the process of the first application program before the second application program starts the preset function. By the method and the device, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided.
Description
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of computer application technologies, and in particular, to a method and an apparatus for processing an application program, and a computer storage medium.
[ background of the invention ]
This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
Due to the diversity of channels, applications can be downloaded and installed into terminal devices in a variety of ways. E.g., by the application marketplace, by the browser, by other application program streams, etc. In a common manner, the first application provides a flow guide for the second application, and the user downloads and installs the second application through the entry provided by the first application. However, in some cases, the first application may be caused to be uninstalled after the first application invokes some functionality of the second application.
[ summary of the invention ]
In view of the foregoing, the present application provides an application processing method, an application processing apparatus, and a computer storage medium, which are used to avoid adverse effects on a first application after the first application invokes some functions of a second application.
The specific technical scheme is as follows:
in a first aspect, the present application provides a method for processing an application program, where the method includes:
the first application program requests to pull up a preset function of the second application program;
and ending the process of the first application program before the second application program starts the preset function.
According to a preferred embodiment of the present application, the second application is arranged to hide the icon.
According to a preferred embodiment of the present application, before the first application requests to pull up the preset function of the second application, the method further includes:
the first application program provides a download address of the second application program for the second application program to be downloaded and installed.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
and after receiving the notification sent by the second application program before the preset function is started, the first application program finishes the process of the first application program.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
the first application program finishes the process of the first application program when the first application program reaches a preset first time length after requesting to pull up the preset function of the second application program;
when the first application program requests to pull up the preset function of the second application program, transmitting preset second time length information to the second application program, so that the second application program starts the preset function after delaying the second time length, wherein the second time length is greater than or equal to the first preset time length.
In a second aspect, the present application provides a method for processing an application program, including:
a second application program acquires a preset function of the first application program requesting to pull up the second application program;
and the second application program finishes the process of the first application program before starting the preset function.
According to a preferred embodiment of the present application, the second application is arranged to hide the icon.
According to a preferred embodiment of the present application, before ending the process of the first application, the method further includes:
and the second application program judges whether the starting of the preset function triggers a monitoring mechanism, and if so, executes the process of ending the first application program before the second application program starts the preset function.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
and the second application program sends a notification to the first application program before the preset function is started, so that the first application program finishes the process of the first application program after receiving the notification.
According to a preferred embodiment of the present application, after the second application sends the notification to the first application, the method further includes:
and the second application program detects whether the process of the first application program is finished or not at a preset third time interval until the preset function is started after the process of the first application program is detected to be finished.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
the second application program acquires preset second duration information transmitted by the first application program when the first application program requests to pull up the preset function of the second application program;
after the second application program delays the second duration, starting the preset function;
and the first application program finishes the process of the first application program when a preset first time length is reached after the first application program requests to pull up the preset function of the second application program, wherein the second time length is greater than or equal to the first preset time length.
In a third aspect, the present application further provides an apparatus, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a method as in any above.
In a fourth aspect, the present application also provides a storage medium containing computer-executable instructions for performing the method as described in any one of the above when executed by a computer processor.
According to the technical scheme, after the first application program requests to pull up the preset function of the second application program, the process of the first application program is ended before the second application program starts the preset function. Therefore, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided.
[ description of the drawings ]
Fig. 1 illustrates an exemplary system architecture for a function processing method to which embodiments of the present application may be applied;
FIG. 2 is a flowchart of a method provided in an embodiment of the present application;
FIG. 3 is a flowchart of a method provided in the second embodiment of the present application;
FIG. 4 illustrates a block diagram of an exemplary computer system/server suitable for use in implementing embodiments of the present application.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in detail below with reference to the accompanying drawings and specific embodiments.
Fig. 1 shows an exemplary system architecture for a function processing method to which an embodiment of the present application can be applied.
As shown in fig. 1, the system architecture may include a terminal device 101, and the terminal device 101 may be various electronic devices. Including but not limited to smart phones, tablets, smart speakers, smart televisions, smart wearable devices, and the like. The terminal device 101 has various applications installed therein, and at least two applications are installed therein, as shown in fig. 1, a first application and a second application are installed, which may perform application processing by using the method provided in the present application.
The system architecture may further include a network 102 and a server 103. Network 102 is the medium used to provide communication links between terminal devices 101 and server 103. Network 102 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal device 101 to interact with server 103 through network 102. The server 103 may provide a download service as well as various function services for the application programs in the terminal apparatus 101. The server 103 may be a single server or a server group including a plurality of servers.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The core idea of the application is that after the first application program requests to pull up the preset function of the second application program, the process of the first application program is ended before the second application program starts the preset function. Therefore, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided. The method provided in the present application is described in detail below with reference to examples.
The first embodiment,
Fig. 2 is a flowchart of a detailed method provided in an embodiment of the present application, and as shown in fig. 2, the method may include the following steps:
in 201, a first application provides a download address of a second application for the second application to be downloaded and installed, wherein the second application is set to a hidden icon.
As a preferred embodiment, in order to avoid the second application being uninstalled by the user in a conventional manner, the second application may be set to hide the icon.
Hidden icons may be implemented using a packagemanager class, such as packagemanager, component _ enabled _ state _ disabled, for example, in an Android (Android) system.
In addition, the application name of the second application program can be set to the name of the similar system application, so that the second application program can be prevented from being deleted by mistake or being obviously recognized.
After the second application is set as the hidden icon, the second application cannot be published in the application market generally, so the second application cannot be downloaded and installed through the application market. In the present application, a manner of guiding by the first application program may be adopted, that is, the first application program provides a download address of the second application program. The embodiment of the present application does not limit the specific manner in which the first application provides the download address of the second application, and may adopt a manner such as embedding promotion information of the second application on an interface of the first application, where the promotion information includes the download address of the second application. And after the user clicks the download address of the second application program, downloading and installing the second application program to the terminal equipment.
At 202, a first application requests to pull up a preset function of a second application.
In the embodiment of the present application, the trigger mechanism for the first application to request to pull up the preset function of the second application is not limited. Such as based on a user action trigger, based on a preset policy in the first application, etc.
When the first application requests to pull up the preset function of the second application, the first application may use a mode such as an ACTION mechanism in Android, a URL (Uniform Resource Locator), a system broadcast, and the like. And carrying parameters such as an identifier of the second application program requested to be pulled up and an identifier of a preset function in the ACTION, the URL, the system broadcast and the like. After acquiring the parameters, the second application can know that the preset function is requested to be pulled up by the first application.
In addition, when the first application program requests to pull up the preset function of the second application program, some existing keep-alive mechanisms may be adopted, so as to ensure that the second application program can be pulled up smoothly, which is not described in detail herein.
The preset function of the second application program related in the embodiment of the present application may be functions such as displaying promotion information and reporting information, and the present application does not limit a specific function type.
In 203, the second application program determines whether the preset function is started to trigger a monitoring mechanism, and if so, executes 204; otherwise, it can directly execute 207, and turn on the preset function.
As a preferred embodiment, in this step, the second application first determines whether the activation of the preset function triggers a monitoring mechanism, where the monitoring mechanism may have a certain adverse effect on the first application. If the monitoring mechanism is not triggered, which means that the first application program is not adversely affected, the second application program directly starts the preset function.
Wherein the monitoring mechanism may include, but is not limited to, frequency control (i.e., frequency control), foreground application whitelisting/blacklisting, and the like. The monitoring mechanism may be a monitoring mechanism for operating system operation, or may be a monitoring mechanism for third party application program operation. For example, the operating system may perform white list control on an application running in the foreground, only the application in the white list may be able to run in the foreground, and if the preset function started by the second application program needs to run in the front section, the monitoring mechanism may be triggered.
At 204, the second application sends a notification to the first application.
In this embodiment, the second application may notify the first application that the preset function is to be started in a manner of sending a message, for example, in an Android system, the preset function may be started in a ContentProvider manner through the first application.
In 205, the first application receives the notification and then ends its process.
After receiving the notification, the first application may end its own process in a "suicide" manner. For example, in Android
android.Process.killProcess(android.os.process.myPid())
In 206, the second application program detects whether the process of the first application program is finished at a preset third time interval, and if not, continues to detect; if so, detection is stopped and execution 207 is performed.
After sending the notification to the first application, the second application may detect whether the first application is alive through the inter-process communication mechanism at a third time interval, for example, the detection is performed every 5 seconds. If it is detected that the process of the first application is still alive and not finished, the detection is performed again after 5 seconds.
In 207, the second application opens the default function.
And if the second application program detects that the process of the first application program is finished, the preset function is started, so that the first application program is not adversely affected by the starting of the preset function under the monitoring mechanism. Moreover, since the source of the second application has already been finished and the second application hides the icon, the user can only find the second application and finish the process of the second application when the task manager is opened, and it is also difficult for the user to uninstall the second application by normal means (i.e., by using the icon).
Example II,
Fig. 3 is a flowchart of a detailed method provided in the second embodiment of the present application, and as shown in fig. 3, the method may include the following steps:
in 301, the first application provides a download address for the second application to be downloaded and installed, wherein the second application is set to the hidden icon.
This step is the same as step 201 in the first embodiment, and is not described herein again.
In 302, after the first application requests to pull up the preset function of the second application and reaches the preset first time period, the process is ended.
Different from the first embodiment, in the present embodiment, after the first application requests to pull up the second application, the first application may actively end the process by itself in a suicide manner in a short time.
In 303, the second application obtains the preset second duration information transmitted by the first application when the first application requests to pull up the preset function of the second application.
As described in one embodiment, when the first application requests to pull up the preset function of the second application, the first application may use an ACTION mechanism in Android, a URL, a system broadcast, and the like. And carrying parameters such as an identifier of the second application program requested to be pulled up and an identifier of a preset function in the ACTION, the URL, the system broadcast and the like. The parameters carried in this embodiment may further include second duration information. And the second duration is greater than or equal to the first duration, so that the preset function is started when the process of the first application program is finished or after the process of the first application program is finished.
In 304, the second application determines whether the preset function is turned on to trigger the monitoring mechanism, and if so, executes 305; otherwise, 306 is executed, i.e. the default function is directly turned on.
For the triggering of the monitoring mechanism, reference is made to the relevant description in the first embodiment, which is not described herein again.
At 305, the second application program starts the preset function after delaying for a second duration.
The second application program may obtain the second duration and then start the preset function after the first application program requests to pull up the preset function of the second application program.
For example, the first application program requests to pull up the preset function of the second application program 1s to end its own process, and the second application program delays to start the application 5 s. Therefore, when the preset function of the second application program is started, the process of the first application program is already finished, and the condition that the starting of the preset function does not bring adverse effects to the first application program under a monitoring mechanism is ensured. Moreover, since the source of the second application has been terminated and the second application hides the icon, the user can only find the second application and terminate the process of the second application when the task manager is opened, but it is difficult to uninstall the second application by normal means (i.e., by applying the icon).
Fig. 4 illustrates a block diagram of an exemplary computer system/server 012 suitable for use in implementing embodiments of the present application. The computer system/server 012 shown in fig. 4 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present application.
As shown in fig. 4, the computer system/server 012 is embodied as a general purpose computing device. The components of computer system/server 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, and a bus 018 that couples various system components including the system memory 028 and the processing unit 016.
Computer system/server 012 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 012 and includes both volatile and nonvolatile media, removable and non-removable media.
Program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof might include an implementation of a network environment. Program modules 042 generally perform the functions and/or methodologies of embodiments described herein.
The computer system/server 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), in which case the computer system/server 012 communicates with an external radar device, and may also communicate with one or more devices that enable a user to interact with the computer system/server 012, and/or with any devices (e.g., network card, modem, etc.) that enable the computer system/server 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/server 012 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 020. As shown, the network adapter 020 communicates with the other modules of the computer system/server 012 via bus 018. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in conjunction with the computer system/server 012, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 016 executes programs stored in the system memory 028, thereby executing various functional applications and data processing, such as implementing the method flows provided by the embodiments of the present application.
The computer program described above may be provided in a computer storage medium encoded with a computer program that, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations illustrated in the embodiments described above. For example, the method flows provided by the embodiments of the present application are executed by the one or more processors described above.
With the development of time and technology, the meaning of media is more and more extensive, and the propagation path of computer programs is not limited to tangible media any more, and can also be downloaded from a network directly and the like. Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (13)
1. A method for processing an application, the method comprising:
the first application program requests to pull up a preset function of the second application program;
and ending the process of the first application program before the second application program starts the preset function.
2. The method of claim 1, wherein the second application is configured to hide icons.
3. The method according to claim 1, before the first application requests to pull up the preset function of the second application, further comprising:
the first application program provides a download address of the second application program for the second application program to be downloaded and installed.
4. The method according to claim 1, 2 or 3, wherein before the second application opens the preset function, ending the process of the first application comprises:
and after receiving the notification sent by the second application program before the preset function is started, the first application program finishes the process of the first application program.
5. The method according to claim 1, 2 or 3, wherein before the second application opens the preset function, ending the process of the first application comprises:
the first application program finishes the process of the first application program when the first application program reaches a preset first time length after requesting to pull up the preset function of the second application program;
when the first application program requests to pull up the preset function of the second application program, transmitting preset second time length information to the second application program, so that the second application program starts the preset function after delaying the second time length, wherein the second time length is greater than or equal to the first preset time length.
6. A method for processing an application, the method comprising:
a second application program acquires a preset function of the first application program requesting to pull up the second application program;
and the second application program finishes the process of the first application program before starting the preset function.
7. The method of claim 6, wherein the second application is configured to hide icons.
8. The method of claim 6, prior to ending the process of the first application, further comprising:
and the second application program judges whether the starting of the preset function triggers a monitoring mechanism, and if so, executes the process of ending the first application program before the second application program starts the preset function.
9. The method according to claim 6, 7 or 8, wherein the second application program ends the process of the first application program before the preset function is opened, and the method comprises the following steps:
and the second application program sends a notification to the first application program before the preset function is started, so that the first application program finishes the process of the first application program after receiving the notification.
10. The method of claim 8, after the second application sends a notification to the first application, further comprising:
and the second application program detects whether the process of the first application program is finished or not at a preset third time interval until the preset function is started after the process of the first application program is detected to be finished.
11. The method according to claim 6, 7 or 8, wherein the second application program ends the process of the first application program before the preset function is opened, and the method comprises the following steps:
the second application program acquires preset second duration information transmitted by the first application program when the first application program requests to pull up the preset function of the second application program;
after the second application program delays the second duration, starting the preset function;
and the first application program finishes the process of the first application program when a preset first time length is reached after the first application program requests to pull up the preset function of the second application program, wherein the second time length is greater than or equal to the first preset time length.
12. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-11.
13. A storage medium containing computer-executable instructions for performing the method of any one of claims 1-11 when executed by a computer processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911294116.XA CN111061492B (en) | 2019-12-16 | 2019-12-16 | Application processing method, device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911294116.XA CN111061492B (en) | 2019-12-16 | 2019-12-16 | Application processing method, device and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111061492A true CN111061492A (en) | 2020-04-24 |
CN111061492B CN111061492B (en) | 2023-12-29 |
Family
ID=70300767
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911294116.XA Active CN111061492B (en) | 2019-12-16 | 2019-12-16 | Application processing method, device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111061492B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103984576A (en) * | 2014-05-29 | 2014-08-13 | 北京网秦天下科技有限公司 | Method and terminal for preventing application from being uninstalled |
CN104376257A (en) * | 2014-12-12 | 2015-02-25 | 北京奇虎科技有限公司 | Application self-protection and active defense method and application self-protection and active defense device |
CN104424484A (en) * | 2013-09-11 | 2015-03-18 | 阿里巴巴集团控股有限公司 | Method and device for switching and adding entry information for application programs |
CN104750523A (en) * | 2015-03-16 | 2015-07-01 | 联想(北京)有限公司 | Information processing method and electronic equipment |
US20150254119A1 (en) * | 2014-03-10 | 2015-09-10 | Microsoft Corporation | Application dehydration and rehydration during application-to-application calls |
CN105242973A (en) * | 2015-11-10 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | Internal memory optimization method of Android system |
WO2017173899A1 (en) * | 2016-04-05 | 2017-10-12 | 中兴通讯股份有限公司 | Terminal, device server, network message processing method, system, and storage medium |
CN107436802A (en) * | 2017-08-25 | 2017-12-05 | 网易(杭州)网络有限公司 | For the control method of application program, system, medium and computing device |
CN107480513A (en) * | 2017-08-17 | 2017-12-15 | 深信服科技股份有限公司 | A kind of certification implementation method and device, computer installation, readable storage medium storing program for executing |
CN108196913A (en) * | 2018-01-05 | 2018-06-22 | 青岛海信移动通信技术股份有限公司 | The process method for cleaning and device of a kind of application program |
CN109189584A (en) * | 2018-07-05 | 2019-01-11 | 北京三快在线科技有限公司 | Communication means, device, electronic equipment and storage medium between application program |
CN110427749A (en) * | 2019-08-07 | 2019-11-08 | 连尚(新昌)网络科技有限公司 | A kind of implementation method of service, equipment and computer storage medium |
-
2019
- 2019-12-16 CN CN201911294116.XA patent/CN111061492B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424484A (en) * | 2013-09-11 | 2015-03-18 | 阿里巴巴集团控股有限公司 | Method and device for switching and adding entry information for application programs |
CN106104482A (en) * | 2014-03-10 | 2016-11-09 | 微软技术许可有限责任公司 | The application calling period being applied to application is dehydrated and rehydrated |
US20150254119A1 (en) * | 2014-03-10 | 2015-09-10 | Microsoft Corporation | Application dehydration and rehydration during application-to-application calls |
CN103984576A (en) * | 2014-05-29 | 2014-08-13 | 北京网秦天下科技有限公司 | Method and terminal for preventing application from being uninstalled |
CN104376257A (en) * | 2014-12-12 | 2015-02-25 | 北京奇虎科技有限公司 | Application self-protection and active defense method and application self-protection and active defense device |
CN104750523A (en) * | 2015-03-16 | 2015-07-01 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105242973A (en) * | 2015-11-10 | 2016-01-13 | 上海斐讯数据通信技术有限公司 | Internal memory optimization method of Android system |
WO2017173899A1 (en) * | 2016-04-05 | 2017-10-12 | 中兴通讯股份有限公司 | Terminal, device server, network message processing method, system, and storage medium |
CN107480513A (en) * | 2017-08-17 | 2017-12-15 | 深信服科技股份有限公司 | A kind of certification implementation method and device, computer installation, readable storage medium storing program for executing |
CN107436802A (en) * | 2017-08-25 | 2017-12-05 | 网易(杭州)网络有限公司 | For the control method of application program, system, medium and computing device |
CN108196913A (en) * | 2018-01-05 | 2018-06-22 | 青岛海信移动通信技术股份有限公司 | The process method for cleaning and device of a kind of application program |
CN109189584A (en) * | 2018-07-05 | 2019-01-11 | 北京三快在线科技有限公司 | Communication means, device, electronic equipment and storage medium between application program |
CN110427749A (en) * | 2019-08-07 | 2019-11-08 | 连尚(新昌)网络科技有限公司 | A kind of implementation method of service, equipment and computer storage medium |
Non-Patent Citations (1)
Title |
---|
石头前行记: "Android APP启动其他APP(一个APP拉起(跳转到)另一个APP)", Retrieved from the Internet <URL:《https://blog.csdn.net/sqj199567/article/details/88801780》> * |
Also Published As
Publication number | Publication date |
---|---|
CN111061492B (en) | 2023-12-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109213611B (en) | Cross-process communication method, device, terminal and storage medium | |
US8200962B1 (en) | Web browser extensions | |
US20160224207A1 (en) | Method and system for freezing and unfreezing applications | |
CN111159614B (en) | Webpage resource acquisition method and device | |
CN110825456B (en) | Loading time calculation method, loading time calculation device, computer equipment and storage medium | |
CN110018765B (en) | Page display method, device, terminal and storage medium | |
US9990214B2 (en) | Dynamic agent delivery | |
CN109857506B (en) | Method and device for realizing guide information, electronic equipment and storage medium | |
US10404568B2 (en) | Agent manager for distributed transaction monitoring system | |
CN110377341B (en) | Method, device, medium and electronic equipment for monitoring no-response exception | |
CN113420268B (en) | Watermark adding method, device, equipment and storage medium | |
CN113784049B (en) | Camera calling method of android system virtual machine, electronic equipment and storage medium | |
WO2019149150A1 (en) | Application processing method and device, and computer storage medium | |
US8001099B2 (en) | Maintaining and utilizing copy histories | |
CN111061492B (en) | Application processing method, device and computer storage medium | |
CN116010740A (en) | Data file updating method and device of browser, electronic equipment and storage medium | |
CN110262813B (en) | Method and apparatus for installing applications | |
CN111124627B (en) | Method and device for determining call initiator of application program, terminal and storage medium | |
CN111191249B (en) | Safeguarding method for a safeguarding device, safeguarding device and readable storage medium | |
CN114490266A (en) | Data acquisition method, device, equipment and storage medium | |
CN114090104A (en) | Applet starting control method and device | |
CN113515299A (en) | Software development kit SDK hot upgrading method, device, equipment and storage medium | |
CN107621997B (en) | Processing method and device | |
CN110597525A (en) | Method and apparatus for installing applications | |
CN112491940A (en) | Request forwarding method and device of proxy server, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |