CN111240750A - Target application program awakening method and device - Google Patents

Target application program awakening method and device Download PDF

Info

Publication number
CN111240750A
CN111240750A CN201811445175.8A CN201811445175A CN111240750A CN 111240750 A CN111240750 A CN 111240750A CN 201811445175 A CN201811445175 A CN 201811445175A CN 111240750 A CN111240750 A CN 111240750A
Authority
CN
China
Prior art keywords
program
target application
application program
fingerprint
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811445175.8A
Other languages
Chinese (zh)
Other versions
CN111240750B (en
Inventor
曹洋
王雪承
蒋祖君
张啸峰
赵壮
崔艳
盛忠良
解晓庆
斯登宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811445175.8A priority Critical patent/CN111240750B/en
Publication of CN111240750A publication Critical patent/CN111240750A/en
Application granted granted Critical
Publication of CN111240750B publication Critical patent/CN111240750B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4418Suspend and resume; Hibernate and awake
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides a method and a device for awakening a target application program, wherein the method comprises the following steps: attempting to wake up a first target application program when a service request directed to the first target application program is received on the application program; when the first target application program fails to be woken up, continuing to try to wake up the first target application program or trying to wake up a second target application program; the second target application is an associated application supporting the same service as the first target application. According to the embodiment of the application, when the first target application program is not awakened successfully, useless awakening can not be continued, but the first target application program can be continuously awakened or the second target application program can be awakened, so that the terminal awakening efficiency is maximized, the two target application programs can not be awakened simultaneously, the user requirements can be met, and the user traffic of the non-target application programs is converted into the user traffic of the target application programs.

Description

Target application program awakening method and device
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for waking up a target application, an electronic device, and a storage medium.
Background
Web pages (such as HTML5 pages) opened by a user through a browser or other application typically have their corresponding third party Application (APP) installed on the local device. The application program corresponding to the webpage can be accessed through the browser, and the process is called as calling. For example, when a certain webpage of the shopping platform is opened on a browser, an application program of the shopping platform on the local terminal can be awakened through the browser.
Disclosure of Invention
In view of the above problems, embodiments of the present application are proposed to provide a method and an apparatus for waking up an application program, an electronic device, and a storage medium, which overcome the above problems or at least partially solve the above problems.
In order to solve the above problem, the present application discloses a method for waking up a target application program, including:
attempting to wake up a first target application program when a service request directed to the first target application program is received on the application program;
when the first target application program fails to be woken up, continuing to try to wake up the first target application program or trying to wake up a second target application program; the second target application is an associated application supporting the same service as the first target application.
Preferably, the first target application program is judged to fail to be woken up by the following method:
and when the times of attempting to awaken the first target application program exceed the preset times, judging that the awakening of the first target application program fails.
Preferably, after the step of failing to wake up the first target application, the method further includes:
acquiring a program fingerprint of the application program;
and determining whether the local device is provided with a target application program or not by adopting the program fingerprint, wherein the target application program comprises a first target application program and/or a second target application program.
Preferably, the step of continuing to attempt to wake up the first target program or attempt to wake up a second target application includes:
if the first target application program is determined to be installed in the local equipment, continuing to try to awaken the first target program;
and if the first target application program is determined not to be installed in the local equipment, attempting to wake up the second target application program.
Preferably, before the step of attempting to wake up the first target application when the service request directed to the first target application is received at the application, the method further includes:
successfully waking up the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
the program fingerprint, program information, user information, and device information are stored at a local device.
Preferably, the method further comprises the following steps:
if the program fingerprint of the application program does not exist in the local equipment, sending a fingerprint request to a fingerprint server; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
Preferably, the step of determining whether the local device has the target application installed by using the program fingerprint includes:
acquiring corresponding user information and equipment information by adopting the program fingerprint, and further acquiring corresponding program information based on the user information and the equipment information;
and when the program information belongs to the target application program, determining that the target application program is installed in the local equipment.
Preferably, the method further comprises the following steps:
acquiring a program fingerprint of the application program;
sending the program fingerprint to a service server, wherein the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and receiving the personalized recommendation information fed back by the service server.
The embodiment of the present application further discloses a wake-up apparatus for a target application, including:
the first awakening module is used for attempting to awaken the first target application program when a service request pointing to the first target application program is received on the application program;
the second awakening module is used for continuously trying to awaken the first target program or trying to awaken a second target application program when the awakening of the first target application program fails; the second target application is an associated application supporting the same service as the first target application.
Preferably, the apparatus further comprises:
and the awakening failure judgment module is used for judging that the awakening of the first target application program fails when the times of attempting to awaken the first target application program exceed the preset times.
Preferably, the method further comprises the following steps:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
and the program installation determining module is used for determining whether the local equipment has installed the target application program or not by adopting the program fingerprint, and the target application program comprises a first target application program and/or a second target application program.
Preferably, the second wake-up module includes:
a wake-on-continue submodule, configured to, if it is determined that the first target application program is installed in the local device, continue to attempt to wake up the first target application program;
and the wake-up transfer sub-module is used for attempting to wake up the second target application program if the first target application program is not installed in the local equipment.
Preferably, the method further comprises the following steps:
the information acquisition module is used for successfully awakening the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
and the information storage module is used for storing the program fingerprint, the program information, the user information and the equipment information in local equipment.
Preferably, the method further comprises the following steps:
the fingerprint request module is used for sending a fingerprint request to a fingerprint server if the program fingerprint of the application program does not exist in the local equipment; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and the fingerprint receiving module is used for receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
Preferably, the program installation determining module includes:
the information acquisition submodule is used for acquiring corresponding user information and equipment information by adopting the program fingerprint and further acquiring corresponding program information based on the user information and the equipment information;
and the installation determining submodule is used for determining that the target application program is installed in the local equipment when the program information belongs to the target application program.
Preferably, the method further comprises the following steps:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
the program fingerprint sending module is used for sending the program fingerprint to a service server, and the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and the recommendation information receiving module is used for receiving the personalized recommendation information fed back by the service server.
The embodiment of the application also discloses an electronic device, which comprises:
one or more processors; and
one or more machine readable media having instructions stored thereon that, when executed by the one or more processors, cause the electronic device to perform one or more methods as described above.
Embodiments of the present application also disclose one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform one or more methods as described above.
The embodiment of the application has the following advantages:
according to the embodiment of the application, when a service request pointing to a first target application program is received on an application program, the first target application program can be tried to be awakened, if the first target application program is awakened unsuccessfully, the first target application program can be continuously awakened, or a second target application program supporting the same service as the first target application program is tried to be awakened.
Drawings
Fig. 1 is a flowchart illustrating steps of an embodiment 1 of a wake-up method for a target application according to the present application;
FIG. 2 is a flowchart illustrating steps of embodiment 2 of a wake-up method for a target application according to the present application;
FIG. 3 is a schematic diagram of an iframe scheme fingerprint sharing of the present application;
FIG. 4 is a schematic diagram of an overall architecture of the present application;
FIG. 5 is a schematic diagram of a link illustration of the present application;
FIG. 6 is a schematic diagram of an example of an application of the present application;
fig. 7 is a block diagram of a wake-up apparatus of a target application according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
In practical applications, when a user accesses a web page through a browser (or other application program), that is, when the browser or other application program receives a service request directed to a target application program, a call end is first called according to whether the APPA is installed in the local device, and if the APPA is not installed in the local device, the call end cannot be called. However, since the local device may simultaneously install the APPB supporting the web page, the same kind of effect can be achieved by waking up the APPB even when the APPA is not successfully woken up. However, due to the limitation of the prior art, the method cannot accurately wake up the APPB under the condition that the APPA is not woken up successfully, and the problem of low calling end efficiency is caused.
In order to solve the above problem, an existing solution is to try to wake up the APPB in a web page after the delay time is reached according to a delay setting after trying to wake up the APPA, so as to wake up the APPB again in case of failure to wake up the APPA. However, the disadvantages of the above solutions are: 1. the method has the advantages that the method is inaccurate, the user experience is poor, the calling end is felt to be slow, the failure rate is high, and most users abandon the browsing of the webpage within the delay time; 2. the current scheme has the defects that due to the performance of the device and the browser, delayed awakening cannot accurately realize awakening the APPB under the condition that the APPA is awakened unsuccessfully, and the two APPs are likely to be simultaneously awakened or a user performs other operations to jump out of a current webpage under the condition that the APPA is awakened unsuccessfully and the delay is not reached, so that the user is lost.
In view of the above problems, the core idea of the embodiment of the present application may include: 1. in an application program, fingerprint sharing of local equipment is carried out by using an iframe scheme, and the unique program fingerprint is subjected to cross-domain sharing and used for marking the running environment of the unique application program; 2. after the calling end is successful, reporting the program fingerprint, the device information collected by the application program and the like in real time through a customs SDK of the target application program, and recording the report to a server for storage; 3. the server records multiple information of program fingerprints, equipment information, user information, calling end efficiency information and the like through real-time matching and offline data calibration; 4. the goal of calling end (target application program), protocol parameters and the like are determined through the assistance of the server, so that the aim of maximizing calling end efficiency is fulfilled, and the user traffic of the non-target application program is converted into the user traffic of the target application program to the maximum extent. The following provides a detailed description of embodiments of the present application.
Referring to fig. 1, a flowchart of steps of an embodiment 1 of a wake-up method for a target application program of the present application is shown, which may specifically include the following steps:
step 101, when a service request directed to a first target application program is received on the application program, attempting to wake up the first target application program.
In a specific implementation, a user accesses a service through a target application on a local device, for example, accesses a certain commodity page on a certain shopping platform, and since the user information is provided when logging in the target application, the user behavior is conveniently recorded, so that a large number of operation means such as personalization and thousands of people and thousands of faces can be used to improve the conversion rate, however, when accessing a certain commodity page through a certain application (non-target application), for example, through a browser, because the user does not log in generally, no user information exists, and conventional operation cannot be performed. In the following, a browser is mainly used as an example of the non-target application.
In the embodiment of the present application, when a user opens a web page of a first target application on a browser, that is, a service request directed to the first target application is received on an application, the user will attempt to wake up the first target application on a local device. In this way, the user traffic of the browser can be converted into the user traffic of the target application program, so that the user behavior can be recorded conveniently. The target application may be an application supporting the current web page service.
Step 102, when the first target application program is failed to be awakened, continuously trying to awaken the first target application program or trying to awaken a second target application program; the second target application is an associated application supporting the same service as the first target application.
When the browser receives a service request pointing to the first target application program, the calling end is automatically carried out without any operation of a user, so that the first target application program installed on the local equipment is awakened.
In a preferred embodiment of the present invention, it may be determined that the first target application program fails to wake up by:
and when the times of attempting to awaken the first target application program exceed the preset times, judging that the awakening of the first target application program fails.
When the number of times of attempting to wake the first target application exceeds a preset number of times, such as three times, it is considered that the waking of the first target application fails.
When it is determined that the first target application program fails to be woken up, the method can choose to continue to try to wake up the first target application program or try to wake up a second target application program which supports the same service as the first target application program. Specifically, the support of the same service means that a service request received on a browser can be implemented as well, for example, a page of a certain commodity is opened.
According to the embodiment of the application, when a service request pointing to a first target application program is received on an application program, the first target application program can be tried to be awakened, if the first target application program is awakened unsuccessfully, the first target application program can be continuously awakened, or a second target application program supporting the same service as the first target application program is tried to be awakened.
Referring to fig. 2, a flowchart of steps of an embodiment 2 of a wake-up method for a target application program of the present application is shown, which may specifically include the following steps:
step 201, when receiving a service request directed to a first target application program on an application program, attempting to wake up the first target application program.
In an embodiment of the present invention, if a service request directed to a first target application is received at an application, such as a browser, the first target application may attempt to wake up. If the first target application can be successfully woken up, the user traffic of the non-target application can be converted into the user traffic of the target application.
Step 202, when the first target application program is failed to be woken up, acquiring a program fingerprint of the application program.
In practice, it may happen that the first target application is not woken up due to various reasons, such as not installing the first target application on the local device or network failure, and the browser fingerprint (program fingerprint) of the browser is acquired. Wherein, the program fingerprint refers to a character string which can uniquely mark the application program and is kept unchanged.
And step 203, determining whether the local device has the target application program installed by using the program fingerprint, wherein the target application program comprises the first target application program and/or the second target application program.
In the embodiment of the application, the installation situation of the target application program in the local device can be correspondingly recorded in the local device and the server according to the browser fingerprint, so that whether the target application program is installed in the local device can be determined based on the browser fingerprint.
Step 204, if it is determined that the first target application program is installed in the local device, continuing to attempt to wake up the first target application program.
When it is determined based on the browser fingerprint that the first target application is installed on the local device, the local device is indicated to install the first target application, and therefore, the first target application can be continuously tried to be woken up.
Step 205, if it is determined that the first target application program is not installed in the local device, attempting to wake up the second target application program.
If the first target application program is determined not to be installed in the local equipment based on the browser fingerprint, the attempt to wake up the first target application program can be stopped, and a second target application program supporting the same service can be woken up, so that useless work is avoided, and the calling-end efficiency is improved.
In an embodiment of the present application, when a service request directed to a first target application is received at an application, attempting to wake up the first target application, that is, before step 201, the following steps may be further included:
successfully waking up the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
in the embodiment of the application, if the target application program is successfully awakened through the browser, the browser fingerprint of the browser can be acquired, and meanwhile, program information, user information and equipment information of the target application program can be acquired. The program information is information that can uniquely identify the application, the user information includes user identification (userid) and other information related to the user, such as age, gender, hobbies, and the like, and the device information includes device identification (utdid), imei, imsi, idfa, and the like.
In one embodiment of the present application, the method may further include the steps of:
if the program fingerprint of the application program does not exist in the local equipment, sending a fingerprint request to a fingerprint server; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
In a specific implementation, if the browser fingerprint of the browser is not stored in the local device, a fingerprint request may be initiated to the fingerprint server, so that the fingerprint server allocates a character string capable of uniquely identifying the browser as the browser fingerprint, and the local device stores the browser fingerprint in the local device (localStorage) after receiving the browser fingerprint fed back by the fingerprint server.
It should be noted that, in the browser fingerprint of the embodiment of the present application, sharing is performed using an iframe scheme, and cross-domain sharing is performed on a unique browser fingerprint. Specifically, referring to fig. 3, the iframe scheme refers to that the same domain name is used to store a browser fingerprint (fingerprint ID), and information of a subnet page (upper right corner of the figure) of the browser is sent out by using message communication and received by a parent page (left side), so that different domain names share the browser fingerprint. In short, all web pages opened by a browser based on a service request have different domain names, but still share a browser fingerprint.
When the target application program is successfully awakened, namely the browser successfully jumps to the target application program, the browser fingerprint, the program information, the user information and the equipment information are sent to the fingerprint server, and after the fingerprint server receives the information, the user information, the equipment information and the program information are stored in a key value pair mode, and the browser fingerprint, the user information and the equipment information are bound.
Specifically, the target application in the embodiment of the present application has a flow customs SDK, which is an SDK acting on a client application, and may have multiple versions such as android and iOS, and is integrated in a target application supporting the same service, and its main functions include recording relevant information of a starting application, such as which application is opened by which other application in what scene, and finally which web page is opened, such as which platform detail page, the target application is opened, and which commodity detail page is opened.
In another embodiment of the present application, the step 203 may include the following sub-steps:
acquiring corresponding user information and equipment information by adopting the program fingerprint, and further acquiring corresponding program information based on the user information and the equipment information;
and when the program information belongs to the target application program, determining that the target application program is installed in the local equipment.
In a particular implementation, whether the local device has installed the target application is determined based on the browser fingerprint, the program information, the user information, and the device information that were saved in a binding in a previous local device. Specifically, if the program information corresponding to the program fingerprint saved in the local device belongs to the target application program, the target application program is installed in the local device.
If the target application is determined to be installed on the local device, the reason why the prior calling terminal fails is not because the target application is not installed on the local device, and therefore, the local device can try to continue to wake up the target application.
In one embodiment of the present application, the method may further include the steps of:
acquiring a program fingerprint of the application program;
sending the program fingerprint to a service server, wherein the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and receiving the personalized recommendation information fed back by the service server.
In the embodiment of the application, when a user logs in the browser, the browser fingerprint of the browser is obtained and sent to the service server, the service server obtains corresponding user information from the fingerprint server based on the browser fingerprint, and then obtains the interests and hobbies of the user based on the user information, so that personalized recommendation can be performed, and the recommendation effect is optimized.
In order to make the embodiments of the present application better understood by those skilled in the art, the following description will be given by using specific examples. Referring to fig. 4, an overall architecture diagram of the present application is shown, where a browser is an application program, and APP1 and APP2 are target application programs, and the main process includes the following parts:
1. a user accesses a webpage (HTML5 page) of APP1 through a browser;
2. registering and acquiring a browser fingerprint (fingerprint ID, fid) capable of uniquely identifying a browser with a fingerprint server;
3. the user successfully enters the APP1 through the browser;
4. binding the browser fingerprint and the device information with the user information, and simultaneously binding the device information and the user information with the APP 1;
5. when a user accesses a webpage of the APP1 through a browser, the browser fingerprint can be sent to a service server (service server), and the service server acquires user information from the fingerprint server based on the browser fingerprint and performs personalized recommendation to the user based on the user information.
Referring to fig. 5, a schematic diagram of a link description in the present application is shown, where FE refers to a front end, i.e., a browser (webView environment), Client refers to a target application, and server refers to a cloud server.
Firstly, in webVIew environment, smartBanner (SMB, intelligent advertisement banner) of a browser reads information of local equipment (localStorage) first, queries browser fingerprint (fid), and if not, acquires the fid from a server and stores the fid in localStorage; then, when the smartBanner wakes up the target application program, the fid is brought into the awakened target application program, and the customs SDK in the target application program acquires the browser fingerprint and reports the browser fingerprint to the server.
Finally, in the webView environment, if the user information is needed, fid in localStorage can be used to request the server, and the server determines corresponding user information (userid) and device information (utdid) based on the fid, so that the server can feed back corresponding service information (personalized recommendation information) based on the user information to achieve the purpose of optimizing service effect recommendation.
Referring to fig. 6, which is a schematic diagram illustrating an application example of the present application, based on the above structure and link, a process of converting a user traffic of a browser into a user traffic of a target application program according to the present application is as follows:
1. when a webpage (H5 page) of the APP1 is opened in a browser, a browser fingerprint (fid) of the browser is acquired, and smartBanner starts to request to wake up the APP1 corresponding to the webpage;
2. acquiring the number num of attempts to wake up the APP 1;
3. judging whether num is less than or equal to 3; if yes, the APP1 is tried to be awakened continuously, and if not, the step 4 is executed;
4. querying a target application program (APP) corresponding to the fid;
5. determining whether the APP comprises APP 1; if so, continuing to try to wake up the APP1, and if not, waking up the APP2 supporting the same service.
Wherein, APP corresponding to fid in step 4 is recorded by the following method:
s1, an AFC (AlibaFlowCustomsSDK) awakens the APP, and records user information (userid) and equipment information (utdid) corresponding to the fid;
s2, recording APP corresponding to fid; the APP may include APP1/APP 2;
s3, recording as a key-value pair: tair: fid: userid + utdid, Fid: APP1/APP 2.
Wherein, the hacker and nbcp in fig. 6 refer to two cloud servers, respectively having different functions. The left-hand hacker represents the network request logical link of the front-end webView environment, and the right-hand NBCP represents the network request logical link of the customs SDK in the target application program. The fingerprint server includes hacker and NBCP.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 7, a block diagram of a structure of an embodiment of a wake-up apparatus for a target application according to the present application is shown, which may specifically include the following modules:
a first wake-up module 301, configured to attempt to wake up a first target application when a service request directed to the first target application is received on an application;
a second wake-up module 302, configured to, when waking up the first target application program fails, continue to attempt to wake up the first target application program or attempt to wake up a second target application program; the second target application is an associated application supporting the same service as the first target application.
In the embodiment of the present invention, the apparatus may further include:
and the awakening failure judgment module is used for judging that the awakening of the first target application program fails when the times of attempting to awaken the first target application program exceed the preset times.
In an embodiment of the present invention, the apparatus further includes:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
and the program installation determining module is used for determining whether the local equipment has installed the target application program or not by adopting the program fingerprint, and the target application program comprises a first target application program and/or a second target application program.
In this embodiment of the present invention, the second wake-up module 302 may include:
a wake-on-continue submodule, configured to, if it is determined that the first target application program is installed in the local device, continue to attempt to wake up the first target application program;
and the wake-up transfer sub-module is used for attempting to wake up the second target application program if the first target application program is not installed in the local equipment.
In the embodiment of the present invention, the apparatus may further include:
the information acquisition module is used for successfully awakening the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
and the information storage module is used for storing the program fingerprint, the program information, the user information and the equipment information in local equipment.
In the embodiment of the present invention, the apparatus may further include:
the fingerprint request module is used for sending a fingerprint request to a fingerprint server if the program fingerprint of the application program does not exist in the local equipment; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and the fingerprint receiving module is used for receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
In an embodiment of the present invention, the program installation determining module may include:
the information acquisition submodule is used for acquiring corresponding user information and equipment information by adopting the program fingerprint and further acquiring corresponding program information based on the user information and the equipment information;
and the installation determining submodule is used for determining that the target application program is installed in the local equipment when the program information belongs to the target application program.
In the embodiment of the present invention, the apparatus may further include:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
the program fingerprint sending module is used for sending the program fingerprint to a service server, and the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and the recommendation information receiving module is used for receiving the personalized recommendation information fed back by the service server.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
An embodiment of the present invention further provides an electronic device, including:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the electronic device to perform methods as described in embodiments of the invention.
Embodiments of the invention also provide one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the methods described in embodiments of the invention.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above detailed description is given to a target application program wake-up method and apparatus, an electronic device, and a storage medium, and a specific example is applied in this document to explain the principle and implementation of the present application, and the description of the above embodiment is only used to help understand the method and core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (18)

1. A method for waking up a target application program, comprising:
attempting to wake up a first target application program when a service request directed to the first target application program is received on the application program;
when the first target application program fails to be woken up, continuing to try to wake up the first target application program or trying to wake up a second target application program; the second target application is an associated application supporting the same service as the first target application.
2. The method of claim 1, wherein the failure to wake up the first target application is determined by:
and when the times of attempting to awaken the first target application program exceed the preset times, judging that the awakening of the first target application program fails.
3. The method of claim 1 or 2, further comprising, after the step of failing to wake the first target application:
acquiring a program fingerprint of the application program;
and determining whether the local device is provided with a target application program or not by adopting the program fingerprint, wherein the target application program comprises a first target application program and/or a second target application program.
4. The method of claim 3, wherein the step of continuing to attempt to wake the first target program or attempt to wake a second target application comprises:
if the first target application program is determined to be installed in the local equipment, continuing to try to awaken the first target program;
and if the first target application program is determined not to be installed in the local equipment, attempting to wake up the second target application program.
5. The method of claim 1, wherein prior to the step of attempting to wake the first target application upon receiving a service request directed to the first target application at the application, further comprising:
successfully waking up the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
the program fingerprint, program information, user information, and device information are stored at a local device.
6. The method of claim 5, further comprising:
if the program fingerprint of the application program does not exist in the local equipment, sending a fingerprint request to a fingerprint server; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
7. The method of claim 3, 4, 5 or 6, wherein the step of using the program fingerprint to determine whether the target application has been installed on the local device comprises:
acquiring corresponding user information and equipment information by adopting the program fingerprint, and further acquiring corresponding program information based on the user information and the equipment information;
and when the program information belongs to the target application program, determining that the target application program is installed in the local equipment.
8. The method of claim 1, further comprising:
acquiring a program fingerprint of the application program;
sending the program fingerprint to a service server, wherein the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and receiving the personalized recommendation information fed back by the service server.
9. A wake-up apparatus for a target application, comprising:
the first awakening module is used for attempting to awaken the first target application program when a service request pointing to the first target application program is received on the application program;
the second awakening module is used for continuously trying to awaken the first target program or trying to awaken a second target application program when the awakening of the first target application program fails; the second target application is an associated application supporting the same service as the first target application.
10. The apparatus of claim 9, further comprising:
and the awakening failure judgment module is used for judging that the awakening of the first target application program fails when the times of attempting to awaken the first target application program exceed the preset times.
11. The apparatus of claim 9 or 10, further comprising:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
and the program installation determining module is used for determining whether the local equipment has installed the target application program or not by adopting the program fingerprint, and the target application program comprises a first target application program and/or a second target application program.
12. The apparatus of claim 11, wherein the second wake-up module comprises:
a wake-on-continue submodule, configured to, if it is determined that the first target application program is installed in the local device, continue to attempt to wake up the first target application program;
and the wake-up transfer sub-module is used for attempting to wake up the second target application program if the first target application program is not installed in the local equipment.
13. The apparatus of claim 9, further comprising:
the information acquisition module is used for successfully awakening the target application program on the application program; acquiring a program fingerprint of the application program, program information of a target application program, user information and equipment information from local equipment;
and the information storage module is used for storing the program fingerprint, the program information, the user information and the equipment information in local equipment.
14. The apparatus of claim 13, further comprising:
the fingerprint request module is used for sending a fingerprint request to a fingerprint server if the program fingerprint of the application program does not exist in the local equipment; the fingerprint server is used for generating a program fingerprint aiming at the fingerprint request;
and the fingerprint receiving module is used for receiving the program fingerprint fed back by the fingerprint server and storing the program fingerprint in the local equipment.
15. The apparatus of claim 11, 12, 13 or 14, wherein the program installation determination module comprises:
the information acquisition submodule is used for acquiring corresponding user information and equipment information by adopting the program fingerprint and further acquiring corresponding program information based on the user information and the equipment information;
and the installation determining submodule is used for determining that the target application program is installed in the local equipment when the program information belongs to the target application program.
16. The apparatus of claim 9, further comprising:
the program fingerprint acquisition module is used for acquiring a program fingerprint of the application program;
the program fingerprint sending module is used for sending the program fingerprint to a service server, and the service server is used for acquiring corresponding user information by adopting the program fingerprint and acquiring corresponding personalized recommendation information by adopting the user information;
and the recommendation information receiving module is used for receiving the personalized recommendation information fed back by the service server.
17. An electronic device, comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the electronic device to perform the method of one or more of claims 1-8.
18. One or more machine readable media having instructions stored thereon that, when executed by one or more processors, cause the processors to perform the method of one or more of claims 1-8.
CN201811445175.8A 2018-11-29 2018-11-29 Awakening method and device for target application program Active CN111240750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811445175.8A CN111240750B (en) 2018-11-29 2018-11-29 Awakening method and device for target application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811445175.8A CN111240750B (en) 2018-11-29 2018-11-29 Awakening method and device for target application program

Publications (2)

Publication Number Publication Date
CN111240750A true CN111240750A (en) 2020-06-05
CN111240750B CN111240750B (en) 2023-05-05

Family

ID=70877490

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811445175.8A Active CN111240750B (en) 2018-11-29 2018-11-29 Awakening method and device for target application program

Country Status (1)

Country Link
CN (1) CN111240750B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244826A (en) * 2022-01-18 2022-03-25 杭州盈高科技有限公司 Webpage identification information sharing method and device, storage medium and processor

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101556A2 (en) * 2005-03-18 2006-09-28 Yahoo! Inc. Enabling application wakeup on a mobile device with a hybrid client
US20100269115A1 (en) * 2009-04-16 2010-10-21 International Business Machines Corporation Managing Threads in a Wake-and-Go Engine
US20110173630A1 (en) * 2008-02-01 2011-07-14 Arimilli Ravi K Central Repository for Wake-and-Go Mechanism
US20150121398A1 (en) * 2013-10-28 2015-04-30 International Business Machines Corporation Launching and managing unattended application programs
CN105101343A (en) * 2015-08-11 2015-11-25 北京邮电大学 Energy saving method for enabling mobile terminal and wireless access point to be correlated and device
WO2016041468A1 (en) * 2014-09-16 2016-03-24 努比亚技术有限公司 Wakeup method, device and terminal
EP3005610A1 (en) * 2013-05-29 2016-04-13 Microsoft Technology Licensing, LLC Pattern coalescing for wake-enabled applications
CN106325985A (en) * 2015-06-30 2017-01-11 北京展讯高科通信技术有限公司 Timer adjusting method and system and mobile terminal
CN107168960A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of business performs method and device
CN107659641A (en) * 2017-09-22 2018-02-02 百度在线网络技术(北京)有限公司 Web wakes up method, apparatus, server, equipment and the storage medium of client

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006101556A2 (en) * 2005-03-18 2006-09-28 Yahoo! Inc. Enabling application wakeup on a mobile device with a hybrid client
US20110173630A1 (en) * 2008-02-01 2011-07-14 Arimilli Ravi K Central Repository for Wake-and-Go Mechanism
US20100269115A1 (en) * 2009-04-16 2010-10-21 International Business Machines Corporation Managing Threads in a Wake-and-Go Engine
EP3005610A1 (en) * 2013-05-29 2016-04-13 Microsoft Technology Licensing, LLC Pattern coalescing for wake-enabled applications
US20150121398A1 (en) * 2013-10-28 2015-04-30 International Business Machines Corporation Launching and managing unattended application programs
WO2016041468A1 (en) * 2014-09-16 2016-03-24 努比亚技术有限公司 Wakeup method, device and terminal
CN106325985A (en) * 2015-06-30 2017-01-11 北京展讯高科通信技术有限公司 Timer adjusting method and system and mobile terminal
CN105101343A (en) * 2015-08-11 2015-11-25 北京邮电大学 Energy saving method for enabling mobile terminal and wireless access point to be correlated and device
CN107168960A (en) * 2016-03-07 2017-09-15 阿里巴巴集团控股有限公司 A kind of business performs method and device
CN107659641A (en) * 2017-09-22 2018-02-02 百度在线网络技术(北京)有限公司 Web wakes up method, apparatus, server, equipment and the storage medium of client

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈晟;李永康;汪广超;王刘猛;姜之源;周盛;牛志升;: "超蜂窝网络分离方案设计与软件定义实现", 中国科学:信息科学 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114244826A (en) * 2022-01-18 2022-03-25 杭州盈高科技有限公司 Webpage identification information sharing method and device, storage medium and processor
CN114244826B (en) * 2022-01-18 2023-11-28 杭州盈高科技有限公司 Webpage identification information sharing method and device, storage medium and processor

Also Published As

Publication number Publication date
CN111240750B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN105592011B (en) Account login method and device
WO2019024161A1 (en) Block chain-based data management method, block chain system, server and readable storage medium
US11831617B2 (en) File upload control for client-side applications in proxy solutions
CN106302595B (en) Method and equipment for carrying out health check on server
CN106533944B (en) Distributed API gateway, management method and management system
WO2015057558A1 (en) Login method for client application and corresponding server
CN110035075A (en) Detection method, device, computer equipment and the storage medium of fishing website
AU2017215589A1 (en) Electronic payment service processing method and device, and electronic payment method and device
CN107040560B (en) Service processing method and device based on service platform
WO2017016408A1 (en) Service invocation-based fault handling method, device and system
CN109634753B (en) Data processing method, device, terminal and storage medium for switching browser kernels
CN112954043B (en) Method for identifying user based on website access log and computer equipment
CN109165112B (en) Fault recovery method, system and related components of metadata cluster
WO2012099795A1 (en) System and method for transmitting and filtering instant messaging information
CN106686151B (en) IP address obtaining method and device
US9665732B2 (en) Secure Download from internet marketplace
CN103327036A (en) Identification method of Internet browsing devices and Cookie server
US20170237825A1 (en) Resource Download Method, Electronic Device, and Apparatus
CN111240750B (en) Awakening method and device for target application program
CN106878252B (en) Method for establishing password-free login relationship, method for clearing account and device thereof
CN105242960A (en) Method for processing system function call request and browser
CN112579639A (en) Data processing method and device, electronic equipment and storage medium
CN116304403A (en) Webpage access method and device, computer equipment and storage medium
CN110971578B (en) User identity confirmation method and device
US20230022141A1 (en) Url refreshing method, apparatus and device in cdn, and cdn node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant