CN111563066A - Method and device for realizing application program singleton processing based on file lock - Google Patents

Method and device for realizing application program singleton processing based on file lock Download PDF

Info

Publication number
CN111563066A
CN111563066A CN202010332209.3A CN202010332209A CN111563066A CN 111563066 A CN111563066 A CN 111563066A CN 202010332209 A CN202010332209 A CN 202010332209A CN 111563066 A CN111563066 A CN 111563066A
Authority
CN
China
Prior art keywords
file
guid
name
singleton
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010332209.3A
Other languages
Chinese (zh)
Other versions
CN111563066B (en
Inventor
白肖
吴闽华
卫宣安
姜坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Genew Technologies Co Ltd
Original Assignee
Shenzhen Genew Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Genew Technologies Co Ltd filed Critical Shenzhen Genew Technologies Co Ltd
Priority to CN202010332209.3A priority Critical patent/CN111563066B/en
Publication of CN111563066A publication Critical patent/CN111563066A/en
Application granted granted Critical
Publication of CN111563066B publication Critical patent/CN111563066B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/176Support for shared access to files; File sharing support
    • G06F16/1767Concurrency control, e.g. optimistic or pessimistic approaches
    • G06F16/1774Locking methods, e.g. locking methods for file systems allowing shared and concurrent access to files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/52Program synchronisation; Mutual exclusion, e.g. by means of semaphores
    • G06F9/526Mutual exclusion algorithms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method and a device for realizing application program singleton processing based on a file lock, wherein the method comprises the following steps: acquiring a running program set GUID; judging whether a file with the GUID as the name exists or not; when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file; and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode. The invention provides a method for realizing application program singleton based on file lock, which is realized by the characteristic that the control access authority of a file is set to a sharing refusal mode, and other processes can be refused to access the file when accessing the file.

Description

Method and device for realizing application program singleton processing based on file lock
Technical Field
The invention relates to the technical field of software, in particular to a method and a device for realizing application program single-case processing based on a file lock, computer equipment and a storage medium.
Background
In the prior art, software can be run for multiple times without processing, and a corresponding instance process is in a task manager during each run. For example, notebook software, which belongs to application software running in multiple instances. Since there are multiple instances of application software running, this is a single instance of application software. Multiple cases and single cases respectively exert their own characteristics in different fields and different service requirements.
For the way of implementing the application program to run in a single instance, the current common method is: 1. and directly searching whether a process with the same name as the application process exists in the application process. 2. Mutex process Mutex locks are used. 3. A shared memory is used. For the method 1, a vulnerability exists, and a plurality of instance processes can still be opened after the name of the executable file is modified. Method 2 is a frequently used approach and care needs to be taken that the name of the mutex lock needs to remain unique. Method 3 uses shared memory with an increase in technical threshold, which increases the time and effort spent.
That is, the implementation manner of implementing single-instance operation of the application program in the prior art is time-consuming and labor-consuming, and is inconvenient for users to use.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The invention mainly aims to provide a method, a device, computer equipment and a storage medium for realizing application program singleton processing based on a file lock.
In order to achieve the above object, the present invention provides a method for implementing application singleton processing based on a file lock, wherein the method for implementing application singleton processing based on the file lock comprises the following steps:
a method for realizing application program singleton processing based on file lock includes following steps:
acquiring a running program set GUID;
judging whether a file with the GUID as the name exists or not;
when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file;
and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode.
The method for realizing application program singleton processing based on the file lock comprises the following steps that when a process accesses the file with the GUID as the name, the file is loaded to a memory in a sharing refusal mode:
when a process accesses the file with the GUID as the name, loading the file with the GUID as the name into a memory in a sharing refusing mode;
judging whether the loading is successful;
and when the loading is successful, the software corresponding to the file is operated for the first time, and the subsequent business process is continuously executed.
The method for realizing application program singleton processing based on the file lock comprises the following steps of, when loading is successful, operating software corresponding to the file for the first time and continuing to execute a subsequent business process:
and writing the PID and the software running path of the process corresponding to the file into the file.
The method for realizing application program singleton processing based on the file lock comprises the following steps that when a process accesses the file with the GUID as the name, the file is loaded to a memory in a sharing refusal mode:
when a process accesses the file with the GUID as the name, loading the file with the GUID as the name into a memory in a sharing refusing mode;
judging whether the loading is successful;
and when the loading is unsuccessful, the access to the file is refused to judge that the software corresponding to the file is running, the loading is directly prompted to be unsuccessful, and the software is quitted.
The method for realizing application program singleton processing based on the file lock comprises the following steps of:
and acquiring a GUID value of the program set, wherein the GUID value is used as the name of the file.
The method for realizing application program singleton processing based on the file lock comprises the following steps of:
judging whether a file with the GUID as the name exists or not;
if the file does not exist, creating a file with the GUID as a name;
files with GUIDs as names are created, and the access mode is set to be a sharing access refusing mode.
The method for realizing application program singleton processing based on the file lock is characterized in that the GUID is a global uniform identifier.
A device for realizing application program singleton processing based on file lock comprises:
the acquisition module is used for acquiring the running program set GUID;
the judging module is used for judging whether the file with the GUID as the name exists or not;
the sharing refusing setting module is used for setting an access mode of the file with the GUID as the name as a sharing refusing access mode by utilizing the control access authority of the file when the file with the GUID as the name exists;
and the access control module is used for loading the file to the memory in a sharing refusal mode when a process accesses the file with the GUID as the name.
A computer device, wherein the computer device comprises: the file lock based implementation application singleton processing program comprises a memory, a processor and a file lock based implementation application singleton processing program which is stored on the memory and can run on the processor, wherein when the file lock based implementation application singleton processing program is executed by the processor, the file lock based implementation application singleton processing program realizes the steps of any one of the file lock based implementation application singleton processing methods.
A storage medium, wherein the storage medium stores a file lock based implementation application singleton handler, and when the file lock based implementation application singleton handler is executed by a processor, the storage medium implements any one of the steps of the file lock based implementation application singleton processing method.
The invention provides a method for realizing application program singleton processing based on a file lock; the method comprises the following steps: acquiring a running program set GUID; judging whether a file with the GUID as the name exists or not; when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file; and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode. The method is essentially realized by utilizing the characteristic that the control access authority of the file is set to be in a sharing refusal mode, and other processes can be refused to access the file when accessing the file; the invention is simple and convenient to operate and use.
Drawings
FIG. 1 is a flowchart illustrating a method for implementing application singleton processing based on file locks according to a first preferred embodiment of the present invention.
FIG. 2 is a flowchart illustrating a second preferred embodiment of the method for implementing application singleton processing based on file locks.
FIG. 3 is a functional block diagram of a device for implementing a single instance of an application based on a file lock according to the present invention.
FIG. 4 is a schematic structural diagram of a computer apparatus according to a preferred embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The inventor finds that, in the prior art, for a way of implementing singleton running of an application, a current general method is as follows: 1. and directly searching whether a process with the same name as the application process exists in the application process. 2. Mutex process Mutex locks are used. 3. A shared memory is used. For the method 1, a vulnerability exists, and a plurality of instance processes can still be opened after the name of the executable file is modified. Method 2 is a frequently used approach and care needs to be taken that the name of the mutex lock needs to remain unique. Method 3 uses shared memory with an increase in technical threshold, which increases the time and effort spent. The method and the device have the advantages that the realization mode of realizing the single-case running of the application program in the prior art is time-consuming and labor-consuming, and the use by a user is inconvenient.
In order to solve the above problems, various non-limiting embodiments of the present invention will be described in detail below with reference to the accompanying drawings in the embodiments of the present invention. .
As shown in fig. 1, the method for implementing application singleton processing based on file locks according to the preferred embodiment of the present invention includes the following steps:
step S10, acquiring a running program set GUID;
in the embodiment of the invention, firstly, the GUID of the running program set is obtained, namely, the GUID value of the program set is obtained, and the GUID value is used as the name of a file.
Wherein the GUID is a global uniform identifier. In the present invention, the format of the GUID is "xxxxxxxx-xxxx-xxxx-xxxxxxxxxxxxxxxx", where each x is a hexadecimal number in the range of 0-9 or a-f. The purpose of this is to ensure uniqueness.
For example, the GUID is exemplified by 5C1F4798-7E05-4A3D-9C13-D61EE994BEA 4.
This has the advantage that each application has a unique GUID string. Using this as a file name prevents the existence of a file duplicate name.
Step S20, judging whether the file with the GUID as the name exists;
the method judges whether the file with the GUID as the name exists or not, and specifically comprises the following steps:
judging whether a file with the GUID as the name exists or not; if yes, go to step S30;
if the file does not exist, creating a file with the GUID as a name;
files with GUIDs as names are created, and the access mode is set to be a sharing access refusing mode.
For example: if no file name exists: "5C1F4798-7E05-4A3D-9C13-D61EE994BEA4", then a file can be created using a similar method as follows:
FileStream ("5C1F4798-7E05-4A3D-9C13-D61EE994BEA4", filemode. openoracrete, fileaccess. readwrite, fileshare. none) attribute filemode. openoracrete, sets the file to create if it does not exist, otherwise opens the file attribute fileshare. none, sets the file to a deny shared access mode.
Step S30, when the file with the GUID as the name exists, setting the access mode of the file with the GUID as the name as the sharing access refusal mode by using the control access authority of the file;
for example, if there is a file name: "5C1F4798-7E05-4A3D-9C13-D61EE994BEA4", a file FileStream ("5C1F4798-7E05-4A3D-9C13-D61EE994BEA4", FileMode.
And step S40, when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode.
In the invention, when a process accesses the file with the GUID as the name, the file with the GUID as the name is loaded to a memory in a sharing refusal mode;
judging whether the loading is successful;
and when the loading is successful, the software corresponding to the file is operated for the first time, and the subsequent business process is continuously executed. And writing the PID and the software running path of the process corresponding to the file into the file.
And when the loading is unsuccessful, the access to the file is refused to judge that the software corresponding to the file is running, the loading is directly prompted to be unsuccessful, and the software is quitted.
For example: for the file name: "5C1F4798-7E05-4A3D-9C13-D61EE994BEA 4".
Step 1, double-click software runs for the first time, the file is loaded firstly, the file can be accessed normally, and the file is set to be in a sharing access refusal mode (namely, the file cannot be opened by any other program, and if the file is attempted to be opened, an error is reported). And then continuing other business processes of the software.
And 2, when the software is in operation and then the file is operated by double clicking for the Nth time, the software continues to load the file at the moment, but the file is occupied by a program opened previously, so that the access fails. The software may be considered to have been run and the software executed the nth time is exited. Ensuring that the software runs in singleton mode.
The invention is further illustrated in detail by the following specific application examples:
as shown in fig. 2, the method for implementing application singleton processing based on file locks according to the second embodiment of the present invention includes the following steps:
step 1, acquiring a GUID value of a program set, wherein the GUID value is used as a name of a file (in order to ensure the uniqueness of the file);
that is, in this step, a program set GUID (global uniform identifier) value is obtained, and the GUID value is used as a name of a file (here, in order to ensure file uniqueness);
GUID (global uniform identifier) refers to a number generated on one machine that is guaranteed to be unique to all machines in the same space-time. Typically the platform will provide an API that generates GUIDs. The generation algorithm uses the address of the Ethernet card, nanosecond time, the chip ID code and many possible numbers. The only drawback of GUID is that the resulting string can be large.
The Globally Unique Identifier (GUID) used in the present invention is a numeric Identifier with a binary length of 128 bits generated by an algorithm. GUIDs are used primarily in networks or systems having multiple nodes, multiple computers. Ideally, no computer or cluster of computers will generate two identical GUIDs. The total number of GUIDs reaches 2^128(3.4 x 10^38), so the probability of randomly generating two identical GUIDs is very small, but not 0. Therefore, the algorithm used to generate the GUID typically adds a non-random parameter (e.g., time) to ensure that such duplication does not occur.
Step 2, judging whether a file with the GUID as the name exists or not, and if not, entering (step 3); otherwise, entering (step 4);
step 3, creating a file with the GUID as a name; and entering step 4;
step 4, setting the file access mode as 'refuse sharing'; loading the file to the memory in a sharing refusal mode, judging whether the file is loaded successfully or not, and entering (step 5) if the file is loaded successfully; otherwise, entering (step 6);
step 5, the file can be loaded normally, which indicates that other business processes are continuously executed when the software is operated for the first time; writing the PID and the software running path of the process into a file;
step 6, prompting a user that the program is operated and quitting the current operation; namely, the file cannot be loaded normally, the file is refused to be accessed, the software is operated, the user is prompted directly, and the software is quitted.
From the above, the invention provides a method for realizing application program singleton processing based on a file lock; the method comprises the following steps: acquiring a running program set GUID; judging whether a file with the GUID as the name exists or not; when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file; and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode. The method is essentially realized by utilizing the characteristic that the control access authority of the file is set to be in a sharing refusal mode, and other processes can be refused to access the file when accessing the file; the invention is simple and convenient to operate and use.
Further, based on the method for implementing application singleton processing based on the file lock, as shown in fig. 4, the present invention further provides an apparatus for implementing application singleton processing based on the file lock, where the apparatus includes:
an obtaining module 41, configured to obtain an operating program set GUID;
a judging module 42, configured to judge whether a file with a GUID as a name exists;
a sharing refusal setting module 43, configured to, when there is a file with a GUID as a name, set an access mode of the file with the GUID as the name as a sharing refusal access mode by using a control access right of the file;
the access control module 44 is configured to, when a process accesses the file named by the GUID, load the file into the memory in a sharing refusal mode, which is specifically described above.
In one embodiment, the present invention provides a computer device, which may be a terminal, having an internal structure as shown in fig. 4. The computer device includes a processor, a memory, a network interface, a display screen, and an input system connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of generating a natural language model. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input system of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the illustration in fig. 4 is merely a block diagram of a portion of the structure associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The embodiment of the invention provides computer equipment, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor executes the computer program to realize the following steps:
acquiring a running program set GUID;
judging whether a file with the GUID as the name exists or not;
when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file;
when a process accesses the file with the GUID as the name, loading the file to a memory in a sharing refusal mode; as described above.
In summary, compared with the prior art, the embodiment of the invention has the following advantages:
the invention provides a method and a device for realizing application program singleton processing based on a file lock, computer equipment and a readable storage medium, wherein the method comprises the following steps: acquiring a running program set GUID; judging whether a file with the GUID as the name exists or not; when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file; and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode. The method is essentially realized by utilizing the characteristic that the control access authority of the file is set to be in a sharing refusal mode, and other processes can be refused to access the file when accessing the file; the invention is simple and convenient to operate and use.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (10)

1. A method for realizing application program singleton processing based on file lock is characterized by comprising the following steps:
acquiring a running program set GUID;
judging whether a file with the GUID as the name exists or not;
when a file with the GUID as the name exists, setting an access mode of the file with the GUID as the name as a sharing access refusing mode by using the control access authority of the file;
and when a process accesses the file with the GUID as the name, loading the file to the memory in a sharing refusal mode.
2. The method for implementing application singleton processing based on the file lock as claimed in claim 1, wherein the step of loading the file to the memory in the sharing-refusal mode when the process accesses the file named by the GUID comprises:
when a process accesses the file with the GUID as the name, loading the file with the GUID as the name into a memory in a sharing refusing mode;
judging whether the loading is successful;
and when the loading is successful, the software corresponding to the file is operated for the first time, and the subsequent business process is continuously executed.
3. The method for implementing application singleton processing based on the file lock according to claim 2, wherein, when the loading is successful, the step of running the software corresponding to the file for the first time and continuing to execute the subsequent business process further comprises:
and writing the PID and the software running path of the process corresponding to the file into the file.
4. The method for implementing application singleton processing based on the file lock as claimed in claim 1, wherein the step of loading the file to the memory in the sharing-refusal mode when the process accesses the file named by the GUID comprises:
when a process accesses the file with the GUID as the name, loading the file with the GUID as the name into a memory in a sharing refusing mode;
judging whether the loading is successful;
and when the loading is unsuccessful, the access to the file is refused to judge that the software corresponding to the file is running, the loading is directly prompted to be unsuccessful, and the software is quitted.
5. The method for processing the application singleton based on the file lock as claimed in claim 1, wherein the step of obtaining the running assembly GUID comprises:
and acquiring a GUID value of the program set, wherein the GUID value is used as the name of the file.
6. The method of claim 1, wherein the step of determining whether the file named by the GUID exists further comprises:
judging whether a file with the GUID as the name exists or not;
if the file does not exist, creating a file with the GUID as a name;
files with GUIDs as names are created, and the access mode is set to be a sharing access refusing mode.
7. The method of claim 1, wherein the GUID is a global uniform identifier.
8. An apparatus for implementing application singleton processing based on file locks, comprising:
the acquisition module is used for acquiring the running program set GUID;
the judging module is used for judging whether the file with the GUID as the name exists or not;
the sharing refusing setting module is used for setting an access mode of the file with the GUID as the name as a sharing refusing access mode by utilizing the control access authority of the file when the file with the GUID as the name exists;
and the access control module is used for loading the file to the memory in a sharing refusal mode when a process accesses the file with the GUID as the name.
9. A computer device, characterized in that the computer device comprises: a memory, a processor, and a file lock implementation application singleton handler stored on the memory and executable on the processor, the file lock implementation application singleton handler, when executed by the processor, implementing the steps of the file lock implementation application singleton processing method of any of claims 1-7.
10. A storage medium storing a file lock based application singleton handler, wherein the file lock based application singleton handler is configured to implement the steps of the file lock based application singleton handling method of any one of claims 1-7 when executed by a processor.
CN202010332209.3A 2020-04-24 2020-04-24 Method and device for realizing application program single-instance processing based on file lock Active CN111563066B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010332209.3A CN111563066B (en) 2020-04-24 2020-04-24 Method and device for realizing application program single-instance processing based on file lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010332209.3A CN111563066B (en) 2020-04-24 2020-04-24 Method and device for realizing application program single-instance processing based on file lock

Publications (2)

Publication Number Publication Date
CN111563066A true CN111563066A (en) 2020-08-21
CN111563066B CN111563066B (en) 2023-08-11

Family

ID=72067864

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010332209.3A Active CN111563066B (en) 2020-04-24 2020-04-24 Method and device for realizing application program single-instance processing based on file lock

Country Status (1)

Country Link
CN (1) CN111563066B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2201275A1 (en) * 1997-03-27 1998-09-27 Chris L. Brealey Locking tool data objects in a framework environment
CN101563674A (en) * 2006-12-21 2009-10-21 国际商业机器公司 A method and system to manage memory accesses from multithread programs on multiprocessor systems
CN102016872A (en) * 2008-05-08 2011-04-13 微软公司 Controlling access to documents using file locks
CN102262559A (en) * 2010-05-24 2011-11-30 腾讯科技(深圳)有限公司 Resource sharing method and system
US9921878B1 (en) * 2015-12-07 2018-03-20 Amazon Technologies, Inc. Singleton coordination in an actor-based system
CN108664780A (en) * 2012-09-28 2018-10-16 英特尔公司 The various equipment of the unlocking mechanism based on different stage are allowed to access

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2201275A1 (en) * 1997-03-27 1998-09-27 Chris L. Brealey Locking tool data objects in a framework environment
CN101563674A (en) * 2006-12-21 2009-10-21 国际商业机器公司 A method and system to manage memory accesses from multithread programs on multiprocessor systems
CN102016872A (en) * 2008-05-08 2011-04-13 微软公司 Controlling access to documents using file locks
CN102262559A (en) * 2010-05-24 2011-11-30 腾讯科技(深圳)有限公司 Resource sharing method and system
CN108664780A (en) * 2012-09-28 2018-10-16 英特尔公司 The various equipment of the unlocking mechanism based on different stage are allowed to access
US9921878B1 (en) * 2015-12-07 2018-03-20 Amazon Technologies, Inc. Singleton coordination in an actor-based system

Non-Patent Citations (11)

* Cited by examiner, † Cited by third party
Title
CHENG JIAN: "QT中实现程序只运行一个实例--应用程序的单例化", 《HTTPS://BLOG.CSDN.NET/GATIEME/ARTICLE/DETAILS/50600172》 *
CHENG JIAN: "QT中实现程序只运行一个实例--应用程序的单例化", 《HTTPS://BLOG.CSDN.NET/GATIEME/ARTICLE/DETAILS/50600172》, 31 January 2016 (2016-01-31), pages 1 - 5 *
HOUZHENGQING: "java通过锁文件来实现应用程序单例", 《BLOG.SINA.COM.CN/S/BLOG_57FF21530100T1E4.HTML》 *
HOUZHENGQING: "java通过锁文件来实现应用程序单例", 《BLOG.SINA.COM.CN/S/BLOG_57FF21530100T1E4.HTML》, 16 December 2009 (2009-12-16), pages 1 - 3 *
KWSY2008: "python 利用文件锁单例执行脚本的方法", 《HTTPS://WWW.JB51.NET/ARTICLE/156548.HTM》 *
KWSY2008: "python 利用文件锁单例执行脚本的方法", 《HTTPS://WWW.JB51.NET/ARTICLE/156548.HTM》, 19 February 2019 (2019-02-19), pages 1 - 3 *
N大橘为重N: "应用单例启动(采用文件锁方式)", 《HTTPS://BLOG.CSDN.NET/BUKNOW/ARTICLE/DETAILS/102728238》 *
N大橘为重N: "应用单例启动(采用文件锁方式)", 《HTTPS://BLOG.CSDN.NET/BUKNOW/ARTICLE/DETAILS/102728238》, 24 October 2019 (2019-10-24), pages 1 - 5 *
水晶泡泡: "应用程序单例运行", 《HTTPS://WWW.CNBLOGS.COM/WANGMINGJIN/ARCHIVE/2011/08/02/2125172.HTML》 *
水晶泡泡: "应用程序单例运行", 《HTTPS://WWW.CNBLOGS.COM/WANGMINGJIN/ARCHIVE/2011/08/02/2125172.HTML》, 2 August 2011 (2011-08-02), pages 1 - 2 *
葛萌;欧阳宏基;陈伟: "单例设计模式的研究与实现", 微型电脑应用, pages 72 - 74 *

Also Published As

Publication number Publication date
CN111563066B (en) 2023-08-11

Similar Documents

Publication Publication Date Title
CN110651269B (en) Isolated container event monitoring
US8397290B2 (en) Granting least privilege access for computing processes
US8024564B2 (en) Automating configuration of software applications
US8087073B2 (en) Authentication architecture
US20200028848A1 (en) Secure access to application instances in a multi-user, multi-tenant computing environment
US11550899B2 (en) Systems and methods for hardening security systems using live patching
US8893272B2 (en) Method and device for recombining runtime instruction
CN104268229B (en) Resource obtaining method and device based on multi-process browser
EP3497586A1 (en) Discovery of calling application for control of file hydration behavior
US20230315909A1 (en) Computer device and method for managing privilege delegation
US9330266B2 (en) Safe data storage method and device
CN111190915A (en) Method for determining road tool identifier or role identifier, server and storage medium
CN111985906A (en) Remote office system, method, device and storage medium
US7849055B2 (en) Method and system for limiting instances of a client-server program within a restricted distributed network
US20140181502A1 (en) Dynamically manipulating rules for adding new devices
US20090217371A1 (en) System and method for dynamic creation of privileges to secure system services
CN113127906A (en) Unified authority management platform, method and storage medium based on C/S architecture
CN111563066B (en) Method and device for realizing application program single-instance processing based on file lock
US20220385596A1 (en) Protecting integration between resources of different services using service-generated dependency tags
US11983580B2 (en) Real-time modification of application programming interface behavior
WO2021223431A1 (en) Mimic storage system and method for data security of industrial control system
CN113296916A (en) Script scheduling method, device, storage medium and computer program product
US12039059B2 (en) Read-only security protection
US11893120B1 (en) Apparatus and method for efficient vulnerability detection in dependency trees
US20240265084A1 (en) Selectively validating and enabling resource enablers of a secure workspace

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant