CN112214287A - Service control method and device of application software and electronic equipment - Google Patents

Service control method and device of application software and electronic equipment Download PDF

Info

Publication number
CN112214287A
CN112214287A CN201910630532.6A CN201910630532A CN112214287A CN 112214287 A CN112214287 A CN 112214287A CN 201910630532 A CN201910630532 A CN 201910630532A CN 112214287 A CN112214287 A CN 112214287A
Authority
CN
China
Prior art keywords
service information
plug
service
request
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910630532.6A
Other languages
Chinese (zh)
Other versions
CN112214287B (en
Inventor
王浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910630532.6A priority Critical patent/CN112214287B/en
Publication of CN112214287A publication Critical patent/CN112214287A/en
Application granted granted Critical
Publication of CN112214287B publication Critical patent/CN112214287B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/466Transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons

Abstract

The disclosure provides a service control method and device of application software, a storage medium and electronic equipment, and relates to the technical field of computers. The service control method of the application software comprises the following steps: receiving a service control request, wherein the service control request comprises: a scan request and/or an optimization request; acquiring service information to be processed according to the service control request; calling a first plug-in to carry out pretreatment operation on the service information to be treated to obtain first service information; scanning the first service information according to the scanning request, and/or optimizing the first service information according to the optimizing request to obtain second service information; and calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information. The technical scheme provided by the disclosure can accurately control the service control process of the application software, and is beneficial to improving the service control flexibility of the application software.

Description

Service control method and device of application software and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a service control method for application software, a service control device for application software, and an electronic device implementing the service control method for application software.
Background
The application software running process includes various service control scenarios, and the service control scenarios of the application software are taken as an example for description. The safety software is software for maintaining the monitoring and safe operation of the computer, can clear program codes such as computer viruses and trojans which are harmful to the computer so as to ensure that the computer operates safely, and can clear computer garbage so as to ensure that the computer operates quickly. For example, security class software provides services with respect to initiating items. The startup item refers to an executable program loaded in the computer along with the system startup, such as a service item, a system plug-in item, a planning task, a right-click menu, a RUN item, and the like. Generally, computer security class software will be a point of basic capability for control of startup items.
In the related art, the control of the start-up item may include the following stages: a starting item scanning stage, namely scanning the starting item of the system; a starting item matching stage, namely classifying the scanned service information into specific types of starting items (such as RUN items, service items, planning tasks and right-click menus) under different software; and an initiating item optimization stage, namely performing default optimization on initiating items which are suggested to be forbidden and can be forbidden according to the guidance of the configuration file, and providing the rest suggestion types for a user to enter the manual optimization.
However, the related art provides a service control scheme of application software with poor flexibility.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to providing a service control method for application software, a service control device for application software, an electronic device, and a computer-readable storage medium, so as to improve the flexibility of a service control scheme for application software to a certain extent.
According to a first aspect of the present disclosure, there is provided a service control method for application software, the method including: receiving a service control request, wherein the service control request comprises: a scan request and/or an optimization request; acquiring service information to be processed according to the service control request; calling a first plug-in to carry out pretreatment operation on the service information to be treated to obtain first service information; scanning the first service information according to the scanning request, and/or optimizing the first service information according to the optimizing request to obtain second service information; and calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, before the obtaining the service information to be processed according to the service control request, the method further includes: encapsulating an extension layer to a core capability layer for the scan processing and/or the optimization processing, and loading the first plug-in and the second plug-in through the extension layer.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, after the loading the first and second plug-ins through the expansion layer, the method further includes: setting a first interface buried point in the first plug-in to call the realization of the first interface buried point to carry out the pretreatment operation; and setting a second interface embedded point in the second plug-in to call the realization of the second interface embedded point to carry out the post-processing operation.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the first plug-in and the second plug-in are implemented by a dynamic link library; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes: and determining that the dynamic link library realizes the first interface embedding point, and dynamically loading the first plug-in to the extension layer so as to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the invoking the second plug-in to perform post-processing operation on the second service information includes: and determining that the dynamic link library realizes the second interface embedding point, and dynamically loading the second plug-in to the extension layer so as to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information includes at least one of the following information: starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is start item service information; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes: performing, by the first plug-in, at least one of: the method comprises the steps of starting item suggestion type modification, starting item description modification, starting item classification modification and newly-added software item processing.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is start item service information; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes: performing, by the first plug-in, at least one of: logic insert before disabling, logic insert before resuming, logic insert before delaying enabling, logic insert before ignoring, and logic insert before cancelling ignoring; the calling of the second plug-in to perform post-processing operation on the second service information comprises: performing, by the second plugin, at least one of: disable post logic insertion, restore post logic insertion, delay post start logic insertion, ignore post logic insertion, cancel pre-ignore logic insertion, and cancel post-ignore logic insertion.
According to a second aspect of the present disclosure, there is provided a service control apparatus for application software, the apparatus including: a receiving module configured to receive a service control request, wherein the service control request includes: a scan request and/or an optimization request; the acquisition module is configured to acquire the service information to be processed according to the service control request; the preprocessing module is configured to call a first plug-in to perform preprocessing operation on the to-be-processed service information to obtain first service information; the control processing module is configured to perform scanning processing on the first service information according to the scanning request and/or perform optimization processing on the first service information according to the optimization request to obtain second service information; and the post-processing module is configured to call a second plug-in to perform post-processing operation on the second service information to obtain processed service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service control apparatus of the application software further includes: and (5) packaging the module.
Wherein the encapsulation module is configured to: before the service information to be processed is obtained according to the service control request, encapsulating an extension layer to a core capability layer for the scanning processing and/or the optimization processing, and loading the first plug-in and the second plug-in through the extension layer.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service control apparatus of the application software further includes: interface buries some modules.
Wherein the interface burial point module is configured to: after the first plug-in and the second plug-in are loaded through the expansion layer, setting a first interface buried point in the first plug-in so as to call the realization of the first interface buried point to perform the preprocessing operation; and setting a second interface embedded point in the second plug-in to call the realization of the second interface embedded point to carry out the post-processing operation.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the first plug-in and the second plug-in are implemented by a dynamic link library; wherein: the preprocessing module is specifically configured to: and determining that the dynamic link library realizes the first interface embedding point, and dynamically loading the first plug-in to the extension layer so as to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment of the disclosure, based on the foregoing embodiment, the post-processing module is specifically configured to: and determining that the dynamic link library realizes the second interface embedding point, and dynamically loading the second plug-in to the extension layer so as to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information includes at least one of the following information: starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is start item service information; wherein: the preprocessing module is specifically configured to: performing, by the first plug-in, at least one of: the method comprises the steps of starting item suggestion type modification, starting item description modification, starting item classification modification and newly-added software item processing.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is start item service information; wherein: the preprocessing module is specifically configured to: performing, by the first plug-in, at least one of: logic insert before disabling, logic insert before resuming, logic insert before delaying enabling, logic insert before ignoring, and logic insert before cancelling ignoring; and the post-processing module is specifically configured to: performing, by the second plugin, at least one of: disable post logic insertion, restore post logic insertion, delay post start logic insertion, ignore post logic insertion, cancel pre-ignore logic insertion, and cancel post-ignore logic insertion.
According to a third aspect of the present disclosure, there is provided a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the service control method of the application software according to any of the embodiments of the first aspect.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to execute the service control method of the application software according to any embodiment of the first aspect through executing the executable instructions.
Exemplary embodiments of the present disclosure may have some or all of the following benefits:
in the service control scheme of the application software provided in an exemplary embodiment of the present disclosure, a service control request is received, and service information to be processed is obtained according to the request, so as to perform scanning processing and/or optimization processing on the service information. In the technical scheme, a first plug-in can be called to carry out preprocessing operation before the service information is processed; the second plug-in may also be invoked for post-processing operations after processing the service information. According to the technical scheme, the service control capability of the traditional application software is subjected to plug-in encapsulation, and the service information can be correspondingly and differently processed before and after service processing through the plug-in, so that the service control process of the application software is accurately controlled, and the service control flexibility of the application software is favorably improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a schematic diagram illustrating an exemplary system architecture of a service control method and apparatus for application software to which an embodiment of the present disclosure may be applied;
FIG. 2 schematically shows a flow chart of a traffic control method of application software according to an embodiment of the present disclosure;
FIG. 3 illustrates a control framework diagram of security class software prior to packaging a plug-in according to an embodiment of the present disclosure;
FIG. 4 illustrates a control framework diagram of security class software after packaging a plug-in according to an embodiment of the present disclosure;
fig. 5 schematically shows a flow chart of a traffic control method of application software according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of a traffic control method of application software according to yet another embodiment of the present disclosure;
fig. 7 schematically shows a timing diagram of a traffic control method of application software according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a usage scenario diagram according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a usage scenario diagram according to another embodiment of the present disclosure;
fig. 10 schematically shows a structure diagram of a service control apparatus of application software according to an embodiment of the present disclosure;
FIG. 11 illustrates a schematic structural diagram of a computer system suitable for use in implementing an electronic device of an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram illustrating a system architecture of an exemplary application environment to which a service control method and apparatus for application software according to an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The service control method of the application software provided by the embodiment of the present disclosure is generally executed by the server 105, and accordingly, the service control device of the application software is generally disposed in the server 105. However, it is easily understood by those skilled in the art that the service control method of the application software provided in the embodiment of the present disclosure may also be executed by the terminal devices 101, 102, and 103, and accordingly, the service control device of the application software may also be disposed in the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment.
For example, in an exemplary embodiment, the server 105 may obtain the pending service information according to the received service control request. And before the service information is processed, calling a first plug-in to perform preprocessing operation on the service information to be processed, and further performing scanning processing and/or optimization processing on the service information. After the service information is processed, a second plug-in can be called to perform post-processing operation on the second service information. Finally, the service information processed as above may be transmitted to the terminal devices 101, 102, 103, and the terminal devices 101, 102, 103 may display the service information processed as above.
In the service control scheme of the application software provided by the related technology, timely and accurate operation cannot be achieved aiming at external complex user environment and fierce starting item attack and defense war. For example, after discovering an additional startup item of external third-party software or an additional defense point of an existing startup item, a measure (modifying an operation configuration file or updating core module logic) is generally taken to issue a new version and a full version of the core module. However, the above measures take a long time (for example, it takes about 2 weeks basically), so that the requirement of fast iteration of the security software cannot be met.
Based on one or more problems in the related art, the present disclosure provides a service control method and apparatus for application software, a computer-readable storage mechanism, and an electronic apparatus.
The technical solution of the embodiment of the present disclosure is explained in detail below:
the optimized object of the technical scheme aims at various service scenes provided by security class software, and specifically comprises scanning processing and optimized service scenes/product forms (such as startup optimization service, computer memory cleaning service and virus scanning service). The technical scheme can perform various logic access operations before and after scanning processing and before and after optimization processing, and has the technical effects of high flexibility, strong controllability and quick access.
The following technical solution is explained by taking a startup service scenario as an example:
fig. 2 schematically shows a flowchart of a service control method of application software according to an embodiment of the present disclosure. Specifically, referring to fig. 2, the embodiment shown in the figure includes:
step S210, receiving a service control request, where the service control request includes: a scan request and/or an optimization request;
step S220, obtaining the information of the service to be processed according to the service control request;
step S230, calling a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information;
step S240, performing scanning processing on the first service information according to the scanning request, and/or performing optimization processing on the first service information according to the optimization request, to obtain second service information; and the number of the first and second groups,
and step S250, calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information.
In the technical solution provided in the embodiment shown in fig. 2, a service control request is received, and service information to be processed is obtained according to the request, so as to perform scanning processing and/or optimization processing on the service information. In the technical scheme, a first plug-in can be called to carry out preprocessing operation before the service information is processed; the second plug-in may also be invoked for post-processing operations after processing the service information. According to the technical scheme, the service control capability of the traditional application software is subjected to plug-in encapsulation, and the service information can be correspondingly and differently processed before and after service processing through the plug-in, so that the service control process of the application software is accurately controlled, and the service control flexibility of the application software is favorably improved.
The following detailed description of the various steps in the example shown in fig. 2:
in an exemplary embodiment, the traffic control request includes: a scan request and/or an optimize request. And further, the service information acquired according to the service control request is subjected to scanning processing and/or optimization processing.
The service information may include at least one of startup service information, memory cleaning service information, operation acceleration service information, and virus processing service information. Taking the service information as the starting item service as an example, the scanning process may be to scan out the related information of the current starting item in the computer; the chemical treatment may be: disable launch item, restore launch item, delay loading launch item, ignore launch item, cancel ignore launch item, and the like.
In an exemplary embodiment, the scanning process and optimization process for the business information may be provided by a core capability layer in a security class software framework. Further, by performing plug-in encapsulation on the core capability layer in the security software framework, the preprocessing operation provided in step S220 for calling the first plug-in may be implemented, and the postprocessing operation provided in step S250 for calling the second plug-in may also be implemented.
In an exemplary embodiment, fig. 3 shows a control framework diagram 300 of security class software before packaging a plug-in according to an embodiment of the present disclosure, and fig. 4 shows a control framework diagram 400 of security class software after packaging a plug-in according to an embodiment of the present disclosure.
Specifically, referring to fig. 3 and 4, the core capability layer 330 using the security software can extend various services/product forms, such as services exhibited by the service layer 310, such as boot Tips, computer acceleration, homepage check, startup management, permission radar, application acceleration, boot time management, and interception Tips. These business/product aspects are typically implemented using a scan interface or optimization interface provided by the core capability layer 330. Wherein, service and logic isolation is realized by different service adaptation layers 320 between the core capability layer 330 and the service layer 310.
Specifically, the technical scheme aims at the improvement of a core capability layer module of the security software. Referring to fig. 4, on the basis of the framework shown in fig. 3, the encapsulation extension layer 410 is used to load plug-in modules (e.g., a first plug-in 411, a second plug-in 412, etc.). Thus, the intervention of the plug-in module on the core capability layer 330 can be directly reflected in the specific service scenario provided by the core capability layer 330.
Exemplarily, fig. 5 schematically shows a flowchart of a traffic control method of application software according to another embodiment of the present disclosure. Specifically, the embodiment shown in fig. 5 is based on the framework shown in fig. 4. Referring to fig. 5, an example of implementation of the figure includes steps S510 to S560.
In step S510, an extension layer is encapsulated to a core capability layer for the scan processing and/or the optimization processing, and the first plug-in and the second plug-in are loaded through the extension layer.
In an exemplary embodiment, referring to fig. 4, an extension layer 410 is encapsulated to a core capability layer 330 providing the business capability of security class software, and a first plug-in 411 for pre-processing and a second plug-in 412 for post-processing are loaded through the extension layer 410.
It should be noted that the first plug-in 411 for preprocessing is only a plug-in schematically shown, for example, the first plug-in 411 may be a plug-in for processing logic before "disabling startup item" (one control process), and the first plug-in 411 may also be a plug-in for processing logic before "starting startup item" (another control process). Similarly, the second plug-in 412 for post-processing is only a plug-in schematically shown, for example, the second plug-in 412 may be a plug-in for processing logic after "ignoring a startup item" (one control process), and the second plug-in 412 may also be a plug-in for processing logic after "cancelling the ignoring of a startup item" (another control process).
In step S520, a first interface burying point is set in the first plug-in to call the implementation of the first interface burying point to perform the preprocessing operation; and setting a second interface embedded point in the second plug-in to call the realization of the second interface embedded point to carry out the post-processing operation.
In an exemplary embodiment, the above logical intervention is achieved by implementing interface burial before and after the logic that initiates the item optimization process. Specifically, by implementing the interface burying point in the plug-in, it is possible to perform the processing corresponding to the plug-in before and after the optimization processing in a logic intrusion manner.
In step S530, a scanning request and/or an optimization request are received, and to-be-processed service information is obtained according to the request; in step S540, the first plug-in and the second plug-in are implemented by a dynamic link library; determining that the dynamic link library realizes the first interface embedding point, and dynamically loading the first plug-in to the extension layer so as to call the first plug-in to perform preprocessing operation on the service information to obtain first service information; in step S550, scanning the first service information according to the scanning request, and/or optimizing the first service information according to the optimization request to obtain second service information; and in step S560, determining that the dynamic link library realizes the second interface embedding point, and dynamically loading the second plug-in to the extension layer to call the second plug-in to perform post-processing operation on the second service information.
Illustratively, whether the plug-in is an extended plug-in is judged by monitoring a preset plug-in directory and according to whether a dynamic link library under the plug-in directory realizes a specified plug-in interface. And then dynamically loading the data to an extension layer, and performing logic intervention on each embedded point according to the specific logic of the plug-in when next item scanning processing or optimization processing is started, so that the requirement on flexibility is met.
In the exemplary embodiment, steps S530-S560 are a specific implementation of the embodiment shown in fig. 2. And acquiring the service information to be processed after receiving the service control request. Since the first plug-in is implemented by the dynamic link library, it is determined that the dynamic link library implements the first interface embedding point, the first plug-in 411 is dynamically loaded to the extension layer 330, and finally, the service information is preprocessed by the first plug-in.
Illustratively, since the second plug-in is implemented by a dynamic link library, and it is determined that the dynamic link library implements the second interface embedding point, the second plug-in 412 is dynamically loaded to the extension layer 330, and finally, the post-processing of the service information after the scanning processing and/or the optimization processing is implemented by the second plug-in.
The embodiment shown in fig. 5 provides a specific implementation of a preprocessing and a post-processing based on the framework shown in fig. 4, and based on the technical solution provided in this embodiment, a function of performing related processing before and after starting item optimization processing is implemented by expanding an original framework 300. And the optimized optimization capability of the startup item is accurately intervened and controlled through plug-in framework migration.
In an exemplary embodiment, the startup item core capability layer 61 initializes the extension layer 62 when loading, and the plug-in can flexibly control the core capability layer 61 as long as it implements a fixed point function.
In an exemplary embodiment, referring again to FIG. 4, the expansion of core capability layer 330 by expansion layer 410 is primarily in terms of both the scanning process and the optimization process.
Illustratively, in the process of starting the item service information scanning process: the calling the first plug-in to perform a preprocessing operation on the to-be-processed service information in step S210 includes: calling the first plug-in to perform at least one of the following processes: the method comprises the steps of starting item suggestion type modification, starting item description modification, starting item classification modification and newly-added software item processing.
Illustratively, during the optimization process summarizing: the calling the first plug-in to perform a preprocessing operation on the to-be-processed service information in step S210 includes: calling the first plug-in to perform at least one of the following processes: disable pre-logic insertion, restore pre-logic insertion, delay enable pre-logic insertion, ignore pre-logic insertion, and cancel pre-ignore logic insertion. And, the step S220 of calling the second plug-in to perform post-processing on the optimized service information includes: performing, by the second plugin, at least one of: disable post logic insertion, restore post logic insertion, delay post start logic insertion, ignore post logic insertion, cancel pre-ignore logic insertion, and cancel post-ignore logic insertion.
In an exemplary embodiment, fig. 6 schematically shows a flowchart of a traffic control method of application software according to still another embodiment of the present disclosure. Specifically, the embodiment shown in fig. 6 provides an optimization processing method for startup item services, and more specifically, provides a prohibition processing method for startup item services. Referring to fig. 6, an example of implementation of the figure includes steps S610 to S670.
In step S610, a startup item optimization request that prohibits the target startup item is sent.
In an exemplary embodiment, referring to fig. 7, the service layer 310 sends a request to the core capability layer 330 to disable the enablement item a, via step S71.
In step S620, it is determined whether a plug-in is present before the target startup item is prohibited.
For example, if it is determined that there is a plug-in before the target activation item is prohibited, step S630 is executed. If it is determined that no plug-in is connected before the target startup item is prohibited, step S640 is performed.
In step S630, the first plug-in is invoked to perform an additional operation (i.e., pre-processing) before disabling the target startup item.
In an exemplary embodiment, referring to FIG. 7, before disabling the initiating item A, step S72. before disable, a first plug-in logic 710 provided by the extension layer 410 is invoked to perform additional operations (i.e., pre-processing) before disabling the initiating item A. And processed by the first plug-in logic, the end of calling the first plug-in may be indicated by step s73.finish call.
In step S640, the logic of the core capability layer that disables the target startup item (i.e., the optimization principle) is invoked.
In an exemplary embodiment, referring to FIG. 7, disabling of startup item A, step S74.disable, is implemented by core capability layer 330.
In step S650, it is determined whether a plug-in is accessed after the target startup item is prohibited.
For example, if it is determined that a plug-in is available after the target startup item is prohibited, step S660 is performed. If it is determined that no plug-in is accessed after the target startup item is prohibited, step S670 is performed.
In step S660, the second plug-in is invoked to perform an additional operation (i.e., post-processing) after disabling the target startup item.
In an exemplary embodiment, referring to fig. 7, after disabling the startup item a, step s75.after disable, the second plug-in logic 720 provided by the extension layer 410 is invoked to perform additional operations (i.e., post-processing) after disabling the startup item a. And the second plug-in logic is invoked, the end of the invocation of the second plug-in may be indicated by step s76.finish call.
In step S670, a result of prohibiting the target startup item is returned to the business layer.
In an exemplary embodiment, referring to FIG. 7, core capability layer 330 returns the result of disabling startup item A to business layer 310, via step S77.
In the technical solution provided by the embodiment shown in fig. 6, due to the intervention in the service scenario provided by the plug-in logic to the core capability layer, the original flow of disabling the startup item is optimized. In particular, logical intervention may occur both between and after disabling the enablement items. Taking a certain service item S as an example, if the technology side needs to delete the relevant registry value V after disabling the startup item, the technology side may use the startup item extension plug-in framework 400 to implement, specifically, by issuing a plug-in for the startup item to the user computer, when the user disables the service item S, the user may trigger the operation of the plug-in, so that after disabling the service item S, the corresponding registry value V is cleared through the deletion logic provided by the plug-in.
In an exemplary embodiment, fig. 8 and 9 schematically show usage scenario diagrams according to an embodiment of the present disclosure, and specifically provide a control scenario for a startup service of security class software provided based on the foregoing embodiment.
The control scheme (specifically including the scanning process and the optimization process of the startup item) related to the startup item service can be divided into the following three stages:
1. scanning and detecting stage: and carrying out system scanning according to a plurality of scanning buried point positions in the core capability layer, and detecting specific starting item related information.
2. Starting item matching stage: according to the scanned startup item information, specific startup items are matched in combination with the operation configuration file, and then scattered various startup items are classified into specific types of startup items (such as RUN items, service items, planning tasks and right-click menus) under certain software. Then, the software is subjected to suggestion marking according to the behavior of a specific starting item under the software (such as suggestion forbidding, forbiddability, status keeping and suggestion enabling), and finally, the security class software can be subjected to default optimization and deep optimization according to suggestion types.
3. Starting item optimization stage: generally, the security class software will perform default optimization for suggested disablements and enabled items that can be disabled as directed by the configuration file, and the rest of the suggested types will provide the user with access to manual optimization.
In the above-mentioned three phases of the startup project work, generally, through the configuration file of the startup project maintained in advance, the core capability layer of the startup project marks the startup project according to the configuration file after scanning the specific startup project. The mark can determine the survival rate of a startup item on an acceleration module of the security software, and when the mark is 'forbidden advisedly' or 'forbidden able', the core capability layer of the startup service can close the corresponding startup item, so that the user machine cannot load the startup item after the next restart. However, the usage requirements of different users are different for the same initiator, for example, the corresponding flag of "EverNote occluding tool" in the initiator scan result shown in fig. 8 is "forbidden". However, the usage habit of a part of users N is that the frequency of using the "EverNote occluding tool" is higher than the preset threshold, and therefore, it is unreasonable that the "EverNote occluding tool" currently corresponding to the flag "can be prohibited" for the part of users N.
Therefore, in practical application, the use feedback information of the user to each startup item is acquired, and the configuration file of the startup item is further modified, so that the mark corresponding to the startup item is changed, and the mark corresponding to the startup item can reflect the actual requirements of the user. Referring to fig. 9, based on the plug-in package expansion back framework provided by this embodiment, for the above-mentioned part of user N, the corresponding label of "EverNote pruning tool" is "suggested to start". Therefore, for the situation that the corresponding configuration information of the startup item cannot be modified in time, the embodiment can intervene in the scanning result by issuing the corresponding plug-in item to realize the corresponding effect.
The startup service control scheme provided by the technical scheme performs plug-in packaging and expansion on the core capability layer, thereby obtaining a set of plug-in operation framework. Where the plug-in is a separate executable program (e.g., dll-dynamically linked library) that is independent of the startup item core capability layer. Specifically, the framework after the extension is encapsulated by the plug-in can perform service intervention aiming at the three phases of the startup service. Specifically, the control accuracy may be specifically related to service intervention and intervention on any one startup item (e.g., performing L service before scanning the startup item D, performing M service after optimizing the startup item D, etc.). In addition, the plug-in can work independently, multiple plug-ins can be issued simultaneously, and time efficiency control can be achieved. Therefore, the scheme can meet the requirements of flexibly and timely controlling the complex scenes under the condition of not updating the version of the safety software and the operation configuration file of the starting item so as to meet the operation requirements of the safety software.
Those skilled in the art will appreciate that all or part of the steps for implementing the above embodiments are implemented as computer programs executed by a processor (including a CPU and a GPU). Which when executed by a processor performs the above-described functions as defined by the above-described method provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Further, in this exemplary embodiment, a service control apparatus of application software is also provided. Referring to fig. 10, the service control apparatus 1000 of the application software includes: a receiving module 1001, an obtaining module 1002, a pre-processing module 1003, a control processing module 1004, and a post-processing module 1005.
The receiving module 1001 is configured to receive a service control request, where the service control request includes: a scan request and/or an optimization request; the obtaining module 1002 is configured to obtain service information to be processed according to the service control request; the preprocessing module 1003 is configured to invoke a first plug-in to perform a preprocessing operation on the to-be-processed service information, so as to obtain first service information; the control processing module 1004 is configured to perform scanning processing on the first service information according to the scanning request, and/or perform optimization processing on the first service information according to the optimization request to obtain second service information; and the post-processing module 1005 is configured to invoke a second plug-in to perform post-processing operation on the second service information, so as to obtain processed service information.
In an exemplary embodiment, based on the foregoing scheme, the service control apparatus 1000 of the application software further includes: and (5) packaging the module.
Wherein the encapsulation module is configured to: before the service information to be processed is obtained according to the service control request, encapsulating an extension layer to a core capability layer for the scanning processing and/or the optimization processing, and loading the first plug-in and the second plug-in through the extension layer.
In an exemplary embodiment, based on the foregoing scheme, the service control apparatus 1000 of the application software further includes: interface buries some modules.
Wherein the interface burial point module is configured to: after the first plug-in and the second plug-in are loaded through the expansion layer, setting a first interface buried point in the first plug-in so as to call the realization of the first interface buried point to perform the preprocessing operation; and setting a second interface embedded point in the second plug-in to call the realization of the second interface embedded point to carry out the post-processing operation.
In an exemplary embodiment, based on the foregoing scheme, the first plug-in and the second plug-in are implemented by a dynamic link library; wherein: the preprocessing module 1002 is specifically configured to: and determining that the dynamic link library realizes the first interface embedding point, and dynamically loading the first plug-in to the extension layer so as to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment, based on the foregoing scheme, the post-processing module 1004 is specifically configured to: and determining that the dynamic link library realizes the second interface embedding point, and dynamically loading the second plug-in to the extension layer so as to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment, based on the foregoing scheme, the service information includes at least one of the following information: starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment, based on the foregoing scheme, the service information is start item service information; wherein: the preprocessing module 1002 is specifically configured to: performing, by the first plug-in, at least one of: the method comprises the steps of starting item suggestion type modification, starting item description modification, starting item classification modification and newly-added software item processing.
In an exemplary embodiment, based on the foregoing scheme, the service information is start item service information; wherein: the preprocessing module 1002 is specifically configured to: performing, by the first plug-in, at least one of: logic insert before disabling, logic insert before resuming, logic insert before delaying enabling, logic insert before ignoring, and logic insert before cancelling ignoring; and, the post-processing module 1004 is specifically configured to: performing, by the second plugin, at least one of: disable post logic insertion, restore post logic insertion, delay post start logic insertion, ignore post logic insertion, cancel pre-ignore logic insertion, and cancel post-ignore logic insertion.
The specific details of each module or unit in the service control device of the application software have been described in detail in the service control method of the corresponding application software, and therefore are not described herein again.
FIG. 11 illustrates a schematic structural diagram of a computer system suitable for use with the electronic device to implement an embodiment of the invention.
It should be noted that the computer system 1100 of the electronic device shown in fig. 11 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiment of the present invention.
As shown in fig. 11, computer system 1100 includes a processor 1101, wherein processor 1101 may comprise: a Graphics Processing Unit (GPU), a Central Processing Unit (CPU), which can perform various appropriate actions and processes according to a program stored in a Read-Only Memory (ROM) 1102 or a program loaded from a storage section 1108 into a Random Access Memory (RAM) 1103. In the RAM 1103, various programs and data necessary for system operation are also stored. A processor (GPU/CPU)1101, a ROM 1102, and a RAM 1103 are connected to each other by a bus 1104. An Input/Output (I/O) interface 1105 is also connected to bus 1104.
The following components are connected to the I/O interface 1105: an input portion 1106 including a keyboard, mouse, and the like; an output section 1107 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 1108 including a hard disk and the like; and a communication section 1109 including a Network interface card such as a LAN (Local Area Network) card, a modem, or the like. The communication section 1109 performs communication processing via a network such as the internet. A driver 1110 is also connected to the I/O interface 1105 as necessary. A removable medium 1111 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1110 as necessary, so that a computer program read out therefrom is mounted into the storage section 1108 as necessary.
In particular, the processes described below with reference to the flowcharts may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 1109 and/or installed from the removable medium 1111. When the computer program is executed by the processor (GPU/CPU)1101, various functions defined in the system of the present application are executed. In some embodiments, computer system 1100 may also include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
It should be noted that the computer readable medium shown in the embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software, or may be implemented by hardware, and the described units may also be disposed in a processor. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method described in the above embodiments.
For example, the electronic device may implement the following as shown in fig. 2: step S210, receiving a service control request, where the service control request includes: a scan request and/or an optimization request; step S220, obtaining the information of the service to be processed according to the service control request; step S230, calling a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information; step S240, performing scanning processing on the first service information according to the scanning request, and/or performing optimization processing on the first service information according to the optimization request, to obtain second service information; and step S250, calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information.
As another example, the electronic device may implement the various steps shown in fig. 3-9.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a touch terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A service control method for application software is characterized in that the method comprises the following steps:
receiving a service control request, wherein the service control request comprises: a scan request and/or an optimization request;
acquiring service information to be processed according to the service control request;
calling a first plug-in to carry out pretreatment operation on the service information to be treated to obtain first service information;
scanning the first service information according to the scanning request, and/or optimizing the first service information according to the optimizing request to obtain second service information;
and calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information.
2. The service control method of application software according to claim 1, wherein before said obtaining the service information to be processed according to the service control request, the method further comprises:
encapsulating an extension layer to a core capability layer for the scan processing and/or the optimization processing;
loading the first plug-in and the second plug-in through the extension layer.
3. The service control method of application software according to claim 2, wherein after said loading the first plug-in and the second plug-in through the extension layer, the method further comprises:
setting a first interface buried point in the first plug-in to call the realization of the first interface buried point to carry out the pretreatment operation;
and setting a second interface embedded point in the second plug-in to call the realization of the second interface embedded point to carry out the post-processing operation.
4. The service control method of application software according to claim 3, wherein the first plug-in and the second plug-in are implemented by a dynamic link library; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes:
and determining that the dynamic link library realizes the first interface embedding point, and dynamically loading the first plug-in to the extension layer so as to call the first plug-in to perform preprocessing operation on the service information.
5. The service control method of application software according to claim 4, wherein said invoking the second plug-in to perform the post-processing operation on the second service information includes:
and determining that the dynamic link library realizes the second interface embedding point, and dynamically loading the second plug-in to the extension layer so as to call the second plug-in to perform post-processing operation on the second service information.
6. The service control method of application software according to any one of claims 1 to 5, wherein the service information includes at least one of the following information: starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
7. The service control method of application software according to claim 1, wherein the service information is startup service information; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes:
performing, by the first plug-in, at least one of: the method comprises the steps of starting item suggestion type modification, starting item description modification, starting item classification modification and newly-added software item processing.
8. The service control method of application software according to claim 1, wherein the service information is startup service information; wherein:
the calling of the first plug-in to perform preprocessing operation on the service information to be processed includes:
performing, by the first plug-in, at least one of: logic insert before disabling, logic insert before resuming, logic insert before delaying enabling, logic insert before ignoring, and logic insert before cancelling ignoring;
the calling of the second plug-in to perform post-processing operation on the second service information comprises:
performing at least one of the following processing on the second service information through the second plug-in: disable post logic insertion, restore post logic insertion, delay post start logic insertion, ignore post logic insertion, cancel pre-ignore logic insertion, and cancel post-ignore logic insertion.
9. An apparatus for controlling a service of an application, the apparatus comprising:
a receiving module configured to receive a service control request, wherein the service control request includes: a scan request and/or an optimization request;
the acquisition module is configured to acquire the service information to be processed according to the service control request;
the preprocessing module is configured to call a first plug-in to perform preprocessing operation on the to-be-processed service information to obtain first service information;
the control processing module is configured to perform scanning processing on the first service information according to the scanning request and/or perform optimization processing on the first service information according to the optimization request to obtain second service information;
and the post-processing module is configured to call a second plug-in to perform post-processing operation on the second service information to obtain processed service information.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to execute the service control method of the application software of any one of claims 1 to 8 via execution of the executable instructions.
CN201910630532.6A 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment Active CN112214287B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910630532.6A CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910630532.6A CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Publications (2)

Publication Number Publication Date
CN112214287A true CN112214287A (en) 2021-01-12
CN112214287B CN112214287B (en) 2023-10-27

Family

ID=74047807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910630532.6A Active CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Country Status (1)

Country Link
CN (1) CN112214287B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968407A (en) * 2022-05-30 2022-08-30 北京金堤科技有限公司 Plug-in calling method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005642A1 (en) * 2005-07-01 2007-01-04 Microsoft Corporation Modification of logic in an application
CN1968154A (en) * 2006-09-15 2007-05-23 华为技术有限公司 System and method for service expansion using plug
CN101847100A (en) * 2010-06-08 2010-09-29 用友软件股份有限公司 Method for expanding software application and device
CN109118065A (en) * 2018-07-26 2019-01-01 深圳市小赢信息技术有限责任公司 A kind of interactive mode Workflow system and its operation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005642A1 (en) * 2005-07-01 2007-01-04 Microsoft Corporation Modification of logic in an application
CN1968154A (en) * 2006-09-15 2007-05-23 华为技术有限公司 System and method for service expansion using plug
CN101847100A (en) * 2010-06-08 2010-09-29 用友软件股份有限公司 Method for expanding software application and device
CN109118065A (en) * 2018-07-26 2019-01-01 深圳市小赢信息技术有限责任公司 A kind of interactive mode Workflow system and its operation method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968407A (en) * 2022-05-30 2022-08-30 北京金堤科技有限公司 Plug-in calling method and device, electronic equipment and storage medium
CN114968407B (en) * 2022-05-30 2024-03-08 北京金堤科技有限公司 Plug-in calling method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN112214287B (en) 2023-10-27

Similar Documents

Publication Publication Date Title
CN109710384B (en) Safe Java intelligent contract interpretation execution engine and method
KR101971389B1 (en) Federation-based memory management
CN109951547B (en) Transaction request parallel processing method, device, equipment and medium
US9117079B1 (en) Multiple application versions in a single virtual machine
MX2013013970A (en) System and method for preserving references in sandboxes.
US10417412B2 (en) Protecting computer code against ROP attacks
CN112507102B (en) Predictive deployment system, method, apparatus and medium based on pre-training paradigm model
CN115378735B (en) Data processing method and device, storage medium and electronic equipment
CN107526623B (en) Data processing method and device
US9632816B2 (en) Scaling past the Java virtual machine thread limit
CN114372256A (en) Application program running method, device, equipment and storage medium
CN112529711B (en) Transaction processing method and device based on block chain virtual machine multiplexing
US20150160973A1 (en) Domain based resource isolation in multi-core systems
CN112214287A (en) Service control method and device of application software and electronic equipment
US20190220294A1 (en) Using lightweight jit compilation for short-lived jvms on parallel distributing computing framework
KR20210040322A (en) Scheduling method and apparatus, device and storage medium
US10769063B2 (en) Spin-less work-stealing for parallel copying garbage collection
CN112115738A (en) Image identification method and device applied to browser end
CN114416357A (en) Method and device for creating container group, electronic equipment and medium
CN114579054A (en) Data processing method and device, electronic equipment and computer readable medium
CN114401121A (en) Application program login method and device, electronic equipment and readable storage medium
CN113742104A (en) AI-based RPA (resilient packet Access) body-separating function generation method and device
US20210073355A1 (en) Controlling processor instruction execution
US9800692B2 (en) Expression based declarative data service execution chaining
CN113253995B (en) Method, device, equipment and storage medium for developing block chain system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant