CN111061492A - Application program processing method and device and computer storage medium - Google Patents

Application program processing method and device and computer storage medium Download PDF

Info

Publication number
CN111061492A
CN111061492A CN201911294116.XA CN201911294116A CN111061492A CN 111061492 A CN111061492 A CN 111061492A CN 201911294116 A CN201911294116 A CN 201911294116A CN 111061492 A CN111061492 A CN 111061492A
Authority
CN
China
Prior art keywords
application program
application
preset function
preset
pull
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911294116.XA
Other languages
Chinese (zh)
Other versions
CN111061492B (en
Inventor
吴培希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lianshang Xinchang Network Technology Co Ltd
Original Assignee
Lianshang Xinchang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lianshang Xinchang Network Technology Co Ltd filed Critical Lianshang Xinchang Network Technology Co Ltd
Priority to CN201911294116.XA priority Critical patent/CN111061492B/en
Publication of CN111061492A publication Critical patent/CN111061492A/en
Application granted granted Critical
Publication of CN111061492B publication Critical patent/CN111061492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides a processing method, equipment and a computer storage medium of an application program, wherein the method comprises the following steps: the first application program requests to pull up a preset function of the second application program; and ending the process of the first application program before the second application program starts the preset function. By the method and the device, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided.

Description

Application program processing method and device and computer storage medium
[ technical field ] A method for producing a semiconductor device
The present application relates to the field of computer application technologies, and in particular, to a method and an apparatus for processing an application program, and a computer storage medium.
[ background of the invention ]
This section is intended to provide a background or context to the embodiments of the application that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
Due to the diversity of channels, applications can be downloaded and installed into terminal devices in a variety of ways. E.g., by the application marketplace, by the browser, by other application program streams, etc. In a common manner, the first application provides a flow guide for the second application, and the user downloads and installs the second application through the entry provided by the first application. However, in some cases, the first application may be caused to be uninstalled after the first application invokes some functionality of the second application.
[ summary of the invention ]
In view of the foregoing, the present application provides an application processing method, an application processing apparatus, and a computer storage medium, which are used to avoid adverse effects on a first application after the first application invokes some functions of a second application.
The specific technical scheme is as follows:
in a first aspect, the present application provides a method for processing an application program, where the method includes:
the first application program requests to pull up a preset function of the second application program;
and ending the process of the first application program before the second application program starts the preset function.
According to a preferred embodiment of the present application, the second application is arranged to hide the icon.
According to a preferred embodiment of the present application, before the first application requests to pull up the preset function of the second application, the method further includes:
the first application program provides a download address of the second application program for the second application program to be downloaded and installed.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
and after receiving the notification sent by the second application program before the preset function is started, the first application program finishes the process of the first application program.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
the first application program finishes the process of the first application program when the first application program reaches a preset first time length after requesting to pull up the preset function of the second application program;
when the first application program requests to pull up the preset function of the second application program, transmitting preset second time length information to the second application program, so that the second application program starts the preset function after delaying the second time length, wherein the second time length is greater than or equal to the first preset time length.
In a second aspect, the present application provides a method for processing an application program, including:
a second application program acquires a preset function of the first application program requesting to pull up the second application program;
and the second application program finishes the process of the first application program before starting the preset function.
According to a preferred embodiment of the present application, the second application is arranged to hide the icon.
According to a preferred embodiment of the present application, before ending the process of the first application, the method further includes:
and the second application program judges whether the starting of the preset function triggers a monitoring mechanism, and if so, executes the process of ending the first application program before the second application program starts the preset function.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
and the second application program sends a notification to the first application program before the preset function is started, so that the first application program finishes the process of the first application program after receiving the notification.
According to a preferred embodiment of the present application, after the second application sends the notification to the first application, the method further includes:
and the second application program detects whether the process of the first application program is finished or not at a preset third time interval until the preset function is started after the process of the first application program is detected to be finished.
According to a preferred embodiment of the present application, before the second application starts the preset function, the process of ending the first application includes:
the second application program acquires preset second duration information transmitted by the first application program when the first application program requests to pull up the preset function of the second application program;
after the second application program delays the second duration, starting the preset function;
and the first application program finishes the process of the first application program when a preset first time length is reached after the first application program requests to pull up the preset function of the second application program, wherein the second time length is greater than or equal to the first preset time length.
In a third aspect, the present application further provides an apparatus, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a method as in any above.
In a fourth aspect, the present application also provides a storage medium containing computer-executable instructions for performing the method as described in any one of the above when executed by a computer processor.
According to the technical scheme, after the first application program requests to pull up the preset function of the second application program, the process of the first application program is ended before the second application program starts the preset function. Therefore, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided.
[ description of the drawings ]
Fig. 1 illustrates an exemplary system architecture for a function processing method to which embodiments of the present application may be applied;
FIG. 2 is a flowchart of a method provided in an embodiment of the present application;
FIG. 3 is a flowchart of a method provided in the second embodiment of the present application;
FIG. 4 illustrates a block diagram of an exemplary computer system/server suitable for use in implementing embodiments of the present application.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in detail below with reference to the accompanying drawings and specific embodiments.
Fig. 1 shows an exemplary system architecture for a function processing method to which an embodiment of the present application can be applied.
As shown in fig. 1, the system architecture may include a terminal device 101, and the terminal device 101 may be various electronic devices. Including but not limited to smart phones, tablets, smart speakers, smart televisions, smart wearable devices, and the like. The terminal device 101 has various applications installed therein, and at least two applications are installed therein, as shown in fig. 1, a first application and a second application are installed, which may perform application processing by using the method provided in the present application.
The system architecture may further include a network 102 and a server 103. Network 102 is the medium used to provide communication links between terminal devices 101 and server 103. Network 102 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal device 101 to interact with server 103 through network 102. The server 103 may provide a download service as well as various function services for the application programs in the terminal apparatus 101. The server 103 may be a single server or a server group including a plurality of servers.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The core idea of the application is that after the first application program requests to pull up the preset function of the second application program, the process of the first application program is ended before the second application program starts the preset function. Therefore, the possible adverse effect on the first application program after the preset function is started by the second application program can be avoided. The method provided in the present application is described in detail below with reference to examples.
The first embodiment,
Fig. 2 is a flowchart of a detailed method provided in an embodiment of the present application, and as shown in fig. 2, the method may include the following steps:
in 201, a first application provides a download address of a second application for the second application to be downloaded and installed, wherein the second application is set to a hidden icon.
As a preferred embodiment, in order to avoid the second application being uninstalled by the user in a conventional manner, the second application may be set to hide the icon.
Hidden icons may be implemented using a packagemanager class, such as packagemanager, component _ enabled _ state _ disabled, for example, in an Android (Android) system.
In addition, the application name of the second application program can be set to the name of the similar system application, so that the second application program can be prevented from being deleted by mistake or being obviously recognized.
After the second application is set as the hidden icon, the second application cannot be published in the application market generally, so the second application cannot be downloaded and installed through the application market. In the present application, a manner of guiding by the first application program may be adopted, that is, the first application program provides a download address of the second application program. The embodiment of the present application does not limit the specific manner in which the first application provides the download address of the second application, and may adopt a manner such as embedding promotion information of the second application on an interface of the first application, where the promotion information includes the download address of the second application. And after the user clicks the download address of the second application program, downloading and installing the second application program to the terminal equipment.
At 202, a first application requests to pull up a preset function of a second application.
In the embodiment of the present application, the trigger mechanism for the first application to request to pull up the preset function of the second application is not limited. Such as based on a user action trigger, based on a preset policy in the first application, etc.
When the first application requests to pull up the preset function of the second application, the first application may use a mode such as an ACTION mechanism in Android, a URL (Uniform Resource Locator), a system broadcast, and the like. And carrying parameters such as an identifier of the second application program requested to be pulled up and an identifier of a preset function in the ACTION, the URL, the system broadcast and the like. After acquiring the parameters, the second application can know that the preset function is requested to be pulled up by the first application.
In addition, when the first application program requests to pull up the preset function of the second application program, some existing keep-alive mechanisms may be adopted, so as to ensure that the second application program can be pulled up smoothly, which is not described in detail herein.
The preset function of the second application program related in the embodiment of the present application may be functions such as displaying promotion information and reporting information, and the present application does not limit a specific function type.
In 203, the second application program determines whether the preset function is started to trigger a monitoring mechanism, and if so, executes 204; otherwise, it can directly execute 207, and turn on the preset function.
As a preferred embodiment, in this step, the second application first determines whether the activation of the preset function triggers a monitoring mechanism, where the monitoring mechanism may have a certain adverse effect on the first application. If the monitoring mechanism is not triggered, which means that the first application program is not adversely affected, the second application program directly starts the preset function.
Wherein the monitoring mechanism may include, but is not limited to, frequency control (i.e., frequency control), foreground application whitelisting/blacklisting, and the like. The monitoring mechanism may be a monitoring mechanism for operating system operation, or may be a monitoring mechanism for third party application program operation. For example, the operating system may perform white list control on an application running in the foreground, only the application in the white list may be able to run in the foreground, and if the preset function started by the second application program needs to run in the front section, the monitoring mechanism may be triggered.
At 204, the second application sends a notification to the first application.
In this embodiment, the second application may notify the first application that the preset function is to be started in a manner of sending a message, for example, in an Android system, the preset function may be started in a ContentProvider manner through the first application.
In 205, the first application receives the notification and then ends its process.
After receiving the notification, the first application may end its own process in a "suicide" manner. For example, in Android
android.Process.killProcess(android.os.process.myPid())
In 206, the second application program detects whether the process of the first application program is finished at a preset third time interval, and if not, continues to detect; if so, detection is stopped and execution 207 is performed.
After sending the notification to the first application, the second application may detect whether the first application is alive through the inter-process communication mechanism at a third time interval, for example, the detection is performed every 5 seconds. If it is detected that the process of the first application is still alive and not finished, the detection is performed again after 5 seconds.
In 207, the second application opens the default function.
And if the second application program detects that the process of the first application program is finished, the preset function is started, so that the first application program is not adversely affected by the starting of the preset function under the monitoring mechanism. Moreover, since the source of the second application has already been finished and the second application hides the icon, the user can only find the second application and finish the process of the second application when the task manager is opened, and it is also difficult for the user to uninstall the second application by normal means (i.e., by using the icon).
Example II,
Fig. 3 is a flowchart of a detailed method provided in the second embodiment of the present application, and as shown in fig. 3, the method may include the following steps:
in 301, the first application provides a download address for the second application to be downloaded and installed, wherein the second application is set to the hidden icon.
This step is the same as step 201 in the first embodiment, and is not described herein again.
In 302, after the first application requests to pull up the preset function of the second application and reaches the preset first time period, the process is ended.
Different from the first embodiment, in the present embodiment, after the first application requests to pull up the second application, the first application may actively end the process by itself in a suicide manner in a short time.
In 303, the second application obtains the preset second duration information transmitted by the first application when the first application requests to pull up the preset function of the second application.
As described in one embodiment, when the first application requests to pull up the preset function of the second application, the first application may use an ACTION mechanism in Android, a URL, a system broadcast, and the like. And carrying parameters such as an identifier of the second application program requested to be pulled up and an identifier of a preset function in the ACTION, the URL, the system broadcast and the like. The parameters carried in this embodiment may further include second duration information. And the second duration is greater than or equal to the first duration, so that the preset function is started when the process of the first application program is finished or after the process of the first application program is finished.
In 304, the second application determines whether the preset function is turned on to trigger the monitoring mechanism, and if so, executes 305; otherwise, 306 is executed, i.e. the default function is directly turned on.
For the triggering of the monitoring mechanism, reference is made to the relevant description in the first embodiment, which is not described herein again.
At 305, the second application program starts the preset function after delaying for a second duration.
The second application program may obtain the second duration and then start the preset function after the first application program requests to pull up the preset function of the second application program.
For example, the first application program requests to pull up the preset function of the second application program 1s to end its own process, and the second application program delays to start the application 5 s. Therefore, when the preset function of the second application program is started, the process of the first application program is already finished, and the condition that the starting of the preset function does not bring adverse effects to the first application program under a monitoring mechanism is ensured. Moreover, since the source of the second application has been terminated and the second application hides the icon, the user can only find the second application and terminate the process of the second application when the task manager is opened, but it is difficult to uninstall the second application by normal means (i.e., by applying the icon).
Fig. 4 illustrates a block diagram of an exemplary computer system/server 012 suitable for use in implementing embodiments of the present application. The computer system/server 012 shown in fig. 4 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present application.
As shown in fig. 4, the computer system/server 012 is embodied as a general purpose computing device. The components of computer system/server 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, and a bus 018 that couples various system components including the system memory 028 and the processing unit 016.
Bus 018 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system/server 012 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 012 and includes both volatile and nonvolatile media, removable and non-removable media.
System memory 028 can include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)030 and/or cache memory 032. The computer system/server 012 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 034 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be connected to bus 018 via one or more data media interfaces. Memory 028 can include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the present application.
Program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof might include an implementation of a network environment. Program modules 042 generally perform the functions and/or methodologies of embodiments described herein.
The computer system/server 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), in which case the computer system/server 012 communicates with an external radar device, and may also communicate with one or more devices that enable a user to interact with the computer system/server 012, and/or with any devices (e.g., network card, modem, etc.) that enable the computer system/server 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/server 012 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 020. As shown, the network adapter 020 communicates with the other modules of the computer system/server 012 via bus 018. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in conjunction with the computer system/server 012, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 016 executes programs stored in the system memory 028, thereby executing various functional applications and data processing, such as implementing the method flows provided by the embodiments of the present application.
The computer program described above may be provided in a computer storage medium encoded with a computer program that, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations illustrated in the embodiments described above. For example, the method flows provided by the embodiments of the present application are executed by the one or more processors described above.
With the development of time and technology, the meaning of media is more and more extensive, and the propagation path of computer programs is not limited to tangible media any more, and can also be downloaded from a network directly and the like. Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (13)

1. A method for processing an application, the method comprising:
the first application program requests to pull up a preset function of the second application program;
and ending the process of the first application program before the second application program starts the preset function.
2. The method of claim 1, wherein the second application is configured to hide icons.
3. The method according to claim 1, before the first application requests to pull up the preset function of the second application, further comprising:
the first application program provides a download address of the second application program for the second application program to be downloaded and installed.
4. The method according to claim 1, 2 or 3, wherein before the second application opens the preset function, ending the process of the first application comprises:
and after receiving the notification sent by the second application program before the preset function is started, the first application program finishes the process of the first application program.
5. The method according to claim 1, 2 or 3, wherein before the second application opens the preset function, ending the process of the first application comprises:
the first application program finishes the process of the first application program when the first application program reaches a preset first time length after requesting to pull up the preset function of the second application program;
when the first application program requests to pull up the preset function of the second application program, transmitting preset second time length information to the second application program, so that the second application program starts the preset function after delaying the second time length, wherein the second time length is greater than or equal to the first preset time length.
6. A method for processing an application, the method comprising:
a second application program acquires a preset function of the first application program requesting to pull up the second application program;
and the second application program finishes the process of the first application program before starting the preset function.
7. The method of claim 6, wherein the second application is configured to hide icons.
8. The method of claim 6, prior to ending the process of the first application, further comprising:
and the second application program judges whether the starting of the preset function triggers a monitoring mechanism, and if so, executes the process of ending the first application program before the second application program starts the preset function.
9. The method according to claim 6, 7 or 8, wherein the second application program ends the process of the first application program before the preset function is opened, and the method comprises the following steps:
and the second application program sends a notification to the first application program before the preset function is started, so that the first application program finishes the process of the first application program after receiving the notification.
10. The method of claim 8, after the second application sends a notification to the first application, further comprising:
and the second application program detects whether the process of the first application program is finished or not at a preset third time interval until the preset function is started after the process of the first application program is detected to be finished.
11. The method according to claim 6, 7 or 8, wherein the second application program ends the process of the first application program before the preset function is opened, and the method comprises the following steps:
the second application program acquires preset second duration information transmitted by the first application program when the first application program requests to pull up the preset function of the second application program;
after the second application program delays the second duration, starting the preset function;
and the first application program finishes the process of the first application program when a preset first time length is reached after the first application program requests to pull up the preset function of the second application program, wherein the second time length is greater than or equal to the first preset time length.
12. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-11.
13. A storage medium containing computer-executable instructions for performing the method of any one of claims 1-11 when executed by a computer processor.
CN201911294116.XA 2019-12-16 2019-12-16 Application processing method, device and computer storage medium Active CN111061492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911294116.XA CN111061492B (en) 2019-12-16 2019-12-16 Application processing method, device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911294116.XA CN111061492B (en) 2019-12-16 2019-12-16 Application processing method, device and computer storage medium

Publications (2)

Publication Number Publication Date
CN111061492A true CN111061492A (en) 2020-04-24
CN111061492B CN111061492B (en) 2023-12-29

Family

ID=70300767

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911294116.XA Active CN111061492B (en) 2019-12-16 2019-12-16 Application processing method, device and computer storage medium

Country Status (1)

Country Link
CN (1) CN111061492B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984576A (en) * 2014-05-29 2014-08-13 北京网秦天下科技有限公司 Method and terminal for preventing application from being uninstalled
CN104376257A (en) * 2014-12-12 2015-02-25 北京奇虎科技有限公司 Application self-protection and active defense method and application self-protection and active defense device
CN104424484A (en) * 2013-09-11 2015-03-18 阿里巴巴集团控股有限公司 Method and device for switching and adding entry information for application programs
CN104750523A (en) * 2015-03-16 2015-07-01 联想(北京)有限公司 Information processing method and electronic equipment
US20150254119A1 (en) * 2014-03-10 2015-09-10 Microsoft Corporation Application dehydration and rehydration during application-to-application calls
CN105242973A (en) * 2015-11-10 2016-01-13 上海斐讯数据通信技术有限公司 Internal memory optimization method of Android system
WO2017173899A1 (en) * 2016-04-05 2017-10-12 中兴通讯股份有限公司 Terminal, device server, network message processing method, system, and storage medium
CN107436802A (en) * 2017-08-25 2017-12-05 网易(杭州)网络有限公司 For the control method of application program, system, medium and computing device
CN107480513A (en) * 2017-08-17 2017-12-15 深信服科技股份有限公司 A kind of certification implementation method and device, computer installation, readable storage medium storing program for executing
CN108196913A (en) * 2018-01-05 2018-06-22 青岛海信移动通信技术股份有限公司 The process method for cleaning and device of a kind of application program
CN109189584A (en) * 2018-07-05 2019-01-11 北京三快在线科技有限公司 Communication means, device, electronic equipment and storage medium between application program
CN110427749A (en) * 2019-08-07 2019-11-08 连尚(新昌)网络科技有限公司 A kind of implementation method of service, equipment and computer storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424484A (en) * 2013-09-11 2015-03-18 阿里巴巴集团控股有限公司 Method and device for switching and adding entry information for application programs
CN106104482A (en) * 2014-03-10 2016-11-09 微软技术许可有限责任公司 The application calling period being applied to application is dehydrated and rehydrated
US20150254119A1 (en) * 2014-03-10 2015-09-10 Microsoft Corporation Application dehydration and rehydration during application-to-application calls
CN103984576A (en) * 2014-05-29 2014-08-13 北京网秦天下科技有限公司 Method and terminal for preventing application from being uninstalled
CN104376257A (en) * 2014-12-12 2015-02-25 北京奇虎科技有限公司 Application self-protection and active defense method and application self-protection and active defense device
CN104750523A (en) * 2015-03-16 2015-07-01 联想(北京)有限公司 Information processing method and electronic equipment
CN105242973A (en) * 2015-11-10 2016-01-13 上海斐讯数据通信技术有限公司 Internal memory optimization method of Android system
WO2017173899A1 (en) * 2016-04-05 2017-10-12 中兴通讯股份有限公司 Terminal, device server, network message processing method, system, and storage medium
CN107480513A (en) * 2017-08-17 2017-12-15 深信服科技股份有限公司 A kind of certification implementation method and device, computer installation, readable storage medium storing program for executing
CN107436802A (en) * 2017-08-25 2017-12-05 网易(杭州)网络有限公司 For the control method of application program, system, medium and computing device
CN108196913A (en) * 2018-01-05 2018-06-22 青岛海信移动通信技术股份有限公司 The process method for cleaning and device of a kind of application program
CN109189584A (en) * 2018-07-05 2019-01-11 北京三快在线科技有限公司 Communication means, device, electronic equipment and storage medium between application program
CN110427749A (en) * 2019-08-07 2019-11-08 连尚(新昌)网络科技有限公司 A kind of implementation method of service, equipment and computer storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
石头前行记: "Android APP启动其他APP(一个APP拉起(跳转到)另一个APP)", Retrieved from the Internet <URL:《https://blog.csdn.net/sqj199567/article/details/88801780》> *

Also Published As

Publication number Publication date
CN111061492B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN109213611B (en) Cross-process communication method, device, terminal and storage medium
US8200962B1 (en) Web browser extensions
US20160224207A1 (en) Method and system for freezing and unfreezing applications
CN111159614B (en) Webpage resource acquisition method and device
CN110825456B (en) Loading time calculation method, loading time calculation device, computer equipment and storage medium
CN110018765B (en) Page display method, device, terminal and storage medium
US9990214B2 (en) Dynamic agent delivery
CN109857506B (en) Method and device for realizing guide information, electronic equipment and storage medium
US10404568B2 (en) Agent manager for distributed transaction monitoring system
CN110377341B (en) Method, device, medium and electronic equipment for monitoring no-response exception
CN113420268B (en) Watermark adding method, device, equipment and storage medium
CN113784049B (en) Camera calling method of android system virtual machine, electronic equipment and storage medium
WO2019149150A1 (en) Application processing method and device, and computer storage medium
US8001099B2 (en) Maintaining and utilizing copy histories
CN111061492B (en) Application processing method, device and computer storage medium
CN116010740A (en) Data file updating method and device of browser, electronic equipment and storage medium
CN110262813B (en) Method and apparatus for installing applications
CN111124627B (en) Method and device for determining call initiator of application program, terminal and storage medium
CN111191249B (en) Safeguarding method for a safeguarding device, safeguarding device and readable storage medium
CN114490266A (en) Data acquisition method, device, equipment and storage medium
CN114090104A (en) Applet starting control method and device
CN113515299A (en) Software development kit SDK hot upgrading method, device, equipment and storage medium
CN107621997B (en) Processing method and device
CN110597525A (en) Method and apparatus for installing applications
CN112491940A (en) Request forwarding method and device of proxy server, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant