CN112214287B - Service control method and device of application software and electronic equipment - Google Patents

Service control method and device of application software and electronic equipment Download PDF

Info

Publication number
CN112214287B
CN112214287B CN201910630532.6A CN201910630532A CN112214287B CN 112214287 B CN112214287 B CN 112214287B CN 201910630532 A CN201910630532 A CN 201910630532A CN 112214287 B CN112214287 B CN 112214287B
Authority
CN
China
Prior art keywords
plug
service information
service
processing
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910630532.6A
Other languages
Chinese (zh)
Other versions
CN112214287A (en
Inventor
王浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910630532.6A priority Critical patent/CN112214287B/en
Publication of CN112214287A publication Critical patent/CN112214287A/en
Application granted granted Critical
Publication of CN112214287B publication Critical patent/CN112214287B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/466Transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The disclosure provides a service control method and device of application software, a storage medium and electronic equipment, and relates to the technical field of computers. The service control method of the application software comprises the following steps: receiving a service control request, wherein the service control request comprises: a scan request and/or an optimization request; acquiring service information to be processed according to the service control request; invoking a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information; scanning the first service information according to the scanning request and/or optimizing the first service information according to the optimizing request to obtain second service information; and calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information. The technical scheme provided by the disclosure can accurately control the service control flow of the application software, and is beneficial to improving the service control flexibility of the application software.

Description

Service control method and device of application software and electronic equipment
Technical Field
The disclosure relates to the field of computer technology, and in particular, to a service control method of application software, a service control device of application software, and an electronic device for implementing the service control method of application software.
Background
The application software running process includes various service control scenarios, and the service control scenario of the application software is taken as an example for explanation. The security software is software for maintaining the monitoring and safe operation of the computer, can clean program codes harmful to the computer, such as computer viruses, trojans and the like, so that the computer can safely operate, and can clean garbage of the computer, so that the computer can rapidly operate. For example, security class software provides services regarding startup items. The startup item refers to an executable program loaded in the computer along with the startup of the system, such as a service item, a system plug-in item, a planning task, a right-click menu, a RUN item and the like. Generally, the computer security class software will control the startup item as a basic capability point.
In the related art, the control of the start-up item may include the following stages: a start item scanning stage, namely scanning out a start item of the system; a startup item matching stage, namely classifying scanned business information into specific types of startup items (such as RUN items, service items, planning tasks and right-key menus) under different software; and a startup optimization stage, namely default optimization is carried out on startup which is forbidden and can be forbidden according to the direction of the configuration file, and other suggestion types are provided for the entry of manual optimization for a user.
However, the related art provides a service control scheme of application software with poor flexibility.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The disclosure aims to provide a service control method of application software, a service control device of application software, electronic equipment and a computer readable storage medium, so that flexibility of a service control scheme of the application software is improved to a certain extent.
According to a first aspect of the present disclosure, there is provided a service control method of application software, the method including: receiving a service control request, wherein the service control request comprises: a scan request and/or an optimization request; acquiring service information to be processed according to the service control request; invoking a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information; scanning the first service information according to the scanning request and/or optimizing the first service information according to the optimizing request to obtain second service information; and calling a second plug-in to perform post-processing operation on the second service information to obtain the processed service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, before the obtaining the service information to be processed according to the service control request, the method further includes: and encapsulating an expansion layer to a core capability layer for the scanning process and/or the optimizing process, and loading the first plug-in and the second plug-in through the expansion layer.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, after the loading of the first plug-in and the second plug-in by the extension layer, the method further includes: setting a first interface buried point in the first plug-in unit to call the implementation of the first interface buried point to perform the preprocessing operation; and setting a second interface buried point in the second plug-in unit so as to call the realization of the second interface buried point to carry out the post-processing operation.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the first plug-in and the second plug-in are implemented through a dynamic link library; wherein:
the calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps: and determining that the dynamic link library realizes the first interface buried point, and dynamically loading the first plug-in to the expansion layer to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the invoking the second plug-in to perform a post-processing operation on the second service information includes: and determining that the dynamic link library realizes the second interface buried point, and dynamically loading the second plug-in to the expansion layer to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information includes at least one of the following information: the method comprises the steps of starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is startup service information; wherein:
the calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps: at least one of the following treatments is performed by the first plug-in: modification of the suggested type of the starting item, modification of the description of the starting item, modification of classification of the starting item and processing of the newly added software item.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is startup service information; wherein:
The calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps: at least one of the following treatments is performed by the first plug-in: disabling pre-logic insertion, resuming pre-logic insertion, delaying enabling pre-logic insertion, ignoring pre-logic insertion, and cancelling ignoring pre-logic insertion; and the calling a second plug-in to carry out post-processing operation on the second service information comprises the following steps: at least one of the following treatments is performed by the second plug-in: disabling post-logic insertion, resuming post-logic insertion, delaying post-start logic insertion, ignoring post-logic insertion, cancelling pre-ignore logic insertion, and cancelling post-ignore logic insertion.
According to a second aspect of the present disclosure, there is provided a service control apparatus of application software, the apparatus comprising: a receiving module configured to receive a service control request, wherein the service control request includes: a scan request and/or an optimization request; the acquisition module is configured to acquire service information to be processed according to the service control request; the preprocessing module is configured to call a first plug-in to perform preprocessing operation on the to-be-processed service information to obtain first service information; the control processing module is configured to scan the first service information according to the scanning request and/or optimize the first service information according to the optimizing request to obtain second service information; and the post-processing module is configured to call a second plug-in to carry out post-processing operation on the second service information to obtain the processed service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service control device of application software further includes: and packaging the module.
Wherein the package module is configured to: and before the service information to be processed is acquired according to the service control request, packaging an expansion layer into a core capacity layer for the scanning processing and/or the optimizing processing, and loading the first plug-in and the second plug-in through the expansion layer.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service control device of application software further includes: and the interface buries the point module.
Wherein, the above-mentioned interface buries some module and is configured as: after the first plug-in and the second plug-in are loaded through the expansion layer, a first interface embedded point is arranged in the first plug-in, and the preprocessing operation is carried out by calling the implementation of the first interface embedded point; and setting a second interface buried point in the second plug-in unit so as to call the implementation of the second interface buried point to perform the post-processing operation.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the first plug-in and the second plug-in are implemented through a dynamic link library; wherein: the preprocessing module is specifically configured to: and determining that the dynamic link library realizes the first interface buried point, and dynamically loading the first plug-in to the expansion layer to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the post-processing module is specifically configured to: and determining that the dynamic link library realizes the second interface buried point, and dynamically loading the second plug-in to the expansion layer to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information includes at least one of the following information: the method comprises the steps of starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is startup service information; wherein: the preprocessing module is specifically configured to: at least one of the following treatments is performed by the first plug-in: modification of the suggested type of the starting item, modification of the description of the starting item, modification of classification of the starting item and processing of the newly added software item.
In an exemplary embodiment of the present disclosure, based on the foregoing embodiment, the service information is startup service information; wherein: the preprocessing module is specifically configured to: at least one of the following treatments is performed by the first plug-in: disabling pre-logic insertion, resuming pre-logic insertion, delaying enabling pre-logic insertion, ignoring pre-logic insertion, and cancelling ignoring pre-logic insertion; and the post-processing module is specifically configured to: at least one of the following treatments is performed by the second plug-in: disabling post-logic insertion, resuming post-logic insertion, delaying post-start logic insertion, ignoring post-logic insertion, cancelling pre-ignore logic insertion, and cancelling post-ignore logic insertion.
According to a third aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the service control method of application software according to any embodiment of the first aspect.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to execute the service control method of the application software according to any embodiment of the first aspect via execution of the executable instructions.
Exemplary embodiments of the present disclosure may have some or all of the following advantages:
in the service control scheme of the application software provided in an example embodiment of the present disclosure, a service control request is received, and service information to be processed is obtained according to the request, so as to perform scanning processing and/or optimization processing on the service information. In the technical scheme, the first plug-in unit can be called to perform preprocessing operation before processing the service information; the second plug-in may also be invoked to perform post-processing operations after processing the business information. According to the technical scheme, the service control capability of the traditional application software is packaged in a plug-in manner, and the service information can be correspondingly processed differently before and after the service processing through the plug-in, so that the service control flow of the application software is accurately controlled, and the service control flexibility of the application software is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
FIG. 1 is a schematic diagram of an exemplary system architecture of a business control method and apparatus for application software to which embodiments of the present disclosure may be applied;
FIG. 2 schematically illustrates a flow chart of a method of traffic control of application software according to an embodiment of the present disclosure;
FIG. 3 illustrates a control framework diagram of security class software prior to packaging plug-ins in accordance with one embodiment of the present disclosure;
FIG. 4 illustrates a control framework diagram of security class software after packaging plug-ins in accordance with one embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of a method of traffic control of application software according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of a method of traffic control of application software according to yet another embodiment of the present disclosure;
FIG. 7 schematically illustrates a timing diagram of a method of traffic control of application software according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a usage scenario diagram according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a usage scenario diagram according to another embodiment of the present disclosure;
FIG. 10 schematically illustrates a block diagram of a business control device of application software according to an embodiment of the present disclosure;
fig. 11 shows a schematic diagram of a computer system suitable for use in implementing embodiments of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram of a system architecture of an exemplary application environment to which a service control method and apparatus of application software of an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of the terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others. The terminal devices 101, 102, 103 may be various electronic devices with display screens including, but not limited to, desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, the server 105 may be a server cluster formed by a plurality of servers.
The service control method of the application software provided in the embodiments of the present disclosure is generally executed by the server 105, and accordingly, the service control device of the application software is generally disposed in the server 105. However, it will be readily understood by those skilled in the art that the service control method of the application software provided in the embodiment of the present disclosure may be executed by the terminal devices 101, 102, 103, and accordingly, the service control device of the application software may be provided in the terminal devices 101, 102, 103, which is not particularly limited in the present exemplary embodiment.
For example, in one exemplary embodiment, the server 105 may obtain the service information to be processed according to the received service control request. Before the service information is processed, a first plug-in is called to conduct preprocessing operation on the service information to be processed, and further scanning processing and/or optimizing processing are conducted on the service information. After the service information is processed, a second plug-in unit can be also called to carry out post-processing operation on the second service information. Finally, the service information after the above processing may be transmitted to the terminal devices 101, 102, 103, and the terminal devices 101, 102, 103 may display the service information after the above processing.
In the service control scheme of the application software provided by the related technology, timely and accurate operation cannot be achieved aiming at an external complex user environment and a fierce starting item attack and defense. For example, after a new start-up item is discovered from external third party software or a new defensive point is found from an existing start-up item, the general actions taken (modifying the operating profile or updating the core module logic) are to release a new version and the full version of the core module issue. However, the time required for the above-mentioned measures is long (for example, it takes about 2 weeks basically), so that the requirement of rapid iteration of the security class software cannot be satisfied.
Based on one or more problems in the related art, the present disclosure provides a service control method, apparatus, computer-readable storage mechanism, and electronic device for application software.
The following describes the technical scheme of the embodiments of the present disclosure in detail:
the optimization object of the technical scheme aims at various service scenes provided by security software, and specifically comprises service scenes/product forms (such as a startup optimization service, a computer memory cleaning service and a virus scanning service) of scanning processing and optimization processing. The technical scheme can perform various logic access operations before and after scanning and before and after optimizing, and has the technical effects of high flexibility, strong controllability and quick access.
The following technical scheme is illustrated by taking a startup service scenario as an example:
fig. 2 schematically illustrates a flow chart of a method of traffic control of application software according to an embodiment of the present disclosure. Specifically, referring to fig. 2, the embodiment shown in this figure includes:
step S210, receiving a service control request, where the service control request includes: a scan request and/or an optimization request;
step S220, obtaining the service information to be processed according to the service control request;
step S230, invoking a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information;
step S240, performing scanning processing on the first service information according to the scanning request, and/or performing optimization processing on the first service information according to the optimization request, so as to obtain second service information; the method comprises the steps of,
step S250, call the second plug-in to carry on the post-processing operation to the said second business information, get the business information after processing.
In the technical solution provided in the embodiment shown in fig. 2, a service control request is received, and service information to be processed is obtained according to the request, so as to perform scanning processing and/or optimization processing on the service information. In the technical scheme, the first plug-in unit can be called to perform preprocessing operation before processing the service information; the second plug-in may also be invoked to perform post-processing operations after processing the business information. According to the technical scheme, the service control capability of the traditional application software is packaged in a plug-in manner, and the service information can be correspondingly processed differently before and after the service processing through the plug-in, so that the service control flow of the application software is accurately controlled, and the service control flexibility of the application software is improved.
The following describes in detail the specific implementation of each step in the embodiment shown in fig. 2:
in an exemplary embodiment, the service control request includes: scan requests and/or optimization requests. And further, scanning and/or optimizing the service information acquired according to the service control request.
The service information may include at least one of startup service information, memory clean service information, operation acceleration service information, and virus processing service information. Taking service information as an example of a startup service, the scanning process may be to scan out related information of a current startup item in the computer; the above-mentioned chemical treatment may be: disable launch item, resume launch item, delay load launch item, ignore launch item, cancel ignore launch item, etc.
In an exemplary embodiment, the scanning and optimization of the business information may be provided by a core capability layer in the security class software framework. Further, by performing plug-in packaging on the core capability layer in the security class software framework, the preprocessing operation provided in step S220 and implemented by calling the first plug-in may be implemented, and the post-processing operation provided in step S250 and implemented by calling the second plug-in may be implemented.
In an exemplary embodiment, fig. 3 illustrates a control framework diagram 300 of security class software before packaging plug-ins according to an embodiment of the present disclosure, and fig. 4 illustrates a control framework diagram 400 of security class software after packaging plug-ins according to an embodiment of the present disclosure.
Specifically, referring to fig. 3 and 4, the core capability layer 330 of the security software may be utilized to extend various service/product forms, for example, the service layer 310 displays services such as startup Tips, computer acceleration, home page physical examination, startup item management, permission radar, application acceleration, startup time management, and interception Tips. These business/product aspects are typically implemented using a scan interface or an optimization interface provided by the core capabilities layer 330. Wherein, the isolation of services from logic is implemented by different service adaptation layers 320 between the core capability layer 330 and the service layer 310.
Specifically, the technical scheme aims at improving a core capability layer module of security software. Referring to fig. 4, on the basis of the framework shown in fig. 3, a package extension layer 410 is used to load plug-in modules (e.g., a first plug-in 411, a second plug-in 412, etc.). Thus, the intervention of the plug-in module on the core capability layer 330 may directly reflect the specific business scenario provided by the core capability layer 330.
By way of example, fig. 5 schematically shows a flow chart of a method of traffic control of application software according to another embodiment of the present disclosure. Specifically, the embodiment shown in fig. 5 is based on the framework shown in fig. 4. Referring to fig. 5, an example of implementation of the diagram includes steps S510-S560.
In step S510, an extension layer is encapsulated into a core capability layer for the scan process and/or the optimization process, and the first plug-in and the second plug-in are loaded through the extension layer.
In an exemplary embodiment, referring to fig. 4, an extension layer 410 is encapsulated to a core capability layer 330 providing service capabilities of security-like software, and a first plug-in 411 for preprocessing and a second plug-in 412 for post-processing are loaded through the extension layer 410.
It should be noted that the first plugin 411 for preprocessing is only a plugin schematically shown, for example, the first plugin 411 may be a plugin for processing logic before "disable start-up item" (one control process), and the first plugin 411 may also be a plugin for processing logic before "start-up item" (another control process). Similarly, the second plugin 412 for post-processing is only a plugin schematically shown, for example, the second plugin 412 may be a plugin for processing logic after "ignore start item" (one control processing), and the second plugin 412 may also be a plugin for processing logic after "cancel ignore start item" (another control processing).
In step S520, a first interface buried point is set in the first plug-in to call implementation of the first interface buried point to perform the preprocessing operation; and setting a second interface buried point in the second plug-in unit so as to call the realization of the second interface buried point to carry out the post-processing operation.
In an exemplary embodiment, the above-described logical intervention is implemented by initiating the logic of the item optimization process before and after the interface burial. Specifically, by implementing the above-mentioned interface buried point in the plug-in, the corresponding processing of the plug-in can be performed before and after the optimization processing in a logically intrusive manner.
In step S530, a scanning request and/or an optimization request is received, and service information to be processed is obtained according to the request; in step S540, the first plug-in and the second plug-in are implemented through a dynamic link library; determining that the dynamic link library realizes the first interface buried point, dynamically loading the first plug-in to the expansion layer to call the first plug-in to perform preprocessing operation on the service information so as to obtain first service information; in step S550, the first service information is scanned according to the scanning request, and/or the first service information is optimized according to the optimizing request, so as to obtain second service information; and in step S560, it is determined that the dynamic link library implements the second interface buried point, and the second plug-in is dynamically loaded to the extension layer, so as to invoke the second plug-in to perform post-processing operation on the second service information.
By monitoring a preset plug-in directory, whether the plug-in is an expansion plug-in is judged according to whether a dynamic link library under the plug-in directory realizes a specified plug-in interface or not. Then, the embedded points are dynamically loaded to an expansion layer, and logic intervention is carried out on each embedded point according to specific logic of the plug-in when the item scanning processing or the optimizing processing is started next time, so that the requirement of flexibility is met.
In an exemplary embodiment, steps S530-S560 are a specific implementation of the embodiment shown in fig. 2. And after receiving the service control request, acquiring the service information to be processed. Because the first plug-in is implemented through the dynamic link library, if it is determined that the dynamic link library implements the first interface buried point, the first plug-in 411 is dynamically loaded to the expansion layer 410, and finally, preprocessing of the service information through the first plug-in is implemented.
For example, since the second plugin is implemented by using the dynamic link library, and thus it is determined that the dynamic link library implements the second interface buried point, the second plugin 412 is dynamically loaded to the extension layer 410, and finally, post-processing of the service information after the scanning process and/or the optimization process is implemented by using the second plugin.
The embodiment shown in fig. 5 provides a specific implementation manner of preprocessing and post-processing based on the framework shown in fig. 4, and based on the technical scheme provided by this embodiment, by expanding the original framework 300, the function of performing related processing before and after the startup item optimization processing is implemented. And through plug-in architecture migration, performing accurate intervention and control on the optimizing and optimizing capability of the starting item.
In an exemplary embodiment, the startup core capability layer 61 initializes the extension layer 62 when loading, and the plug-in can flexibly control the core capability layer 61 as long as the embedded point function is implemented.
In an exemplary embodiment, referring again to FIG. 4, the expansion of the core capability layer 330 by the expansion layer 410 is primarily embodied in both the scanning process and the optimization process.
Illustratively, during the startup business information scanning process: the step S210 of calling the first plug-in to perform a preprocessing operation on the service information to be processed includes: invoking the first plug-in to at least one of: modification of the suggested type of the starting item, modification of the description of the starting item, modification of classification of the starting item and processing of the newly added software item.
Illustratively, the process in the optimization process is summarized: the step S210 of calling the first plug-in to perform a preprocessing operation on the service information to be processed includes: invoking the first plug-in to at least one of: the pre-disable logic insert, the pre-restore logic insert, the delay enable pre-logic insert, the ignore pre-logic insert, and the cancel ignore pre-logic insert. And, invoking the second plugin to post-process the optimized service information in step S220, including: at least one of the following treatments is performed by the second plug-in: disabling post-logic insertion, resuming post-logic insertion, delaying post-start logic insertion, ignoring post-logic insertion, cancelling pre-ignore logic insertion, and cancelling post-ignore logic insertion.
In an exemplary embodiment, fig. 6 schematically shows a flowchart of a service control method of application software according to still another embodiment of the present disclosure. Specifically, the embodiment shown in fig. 6 provides an optimization processing method for the startup item service, and more specifically, provides a prohibition processing method for the startup item service. Referring to fig. 6, an example of implementation of the diagram includes steps S610-S670.
In step S610, a startup item optimization request to prohibit the target startup item is transmitted.
In an exemplary embodiment, referring to fig. 7, the service layer 310 transmits a request to disable the initiation item a to the core capability layer 330, through step S71.
In step S620, it is determined whether or not the plug-in is connected before the target startup item is prohibited.
For example, if it is determined that the plug-in access is prohibited before the target startup item, step S630 is performed. If it is determined that no plug-in is connected before the target startup item is prohibited, step S640 is executed.
In step S630, the first plug-in is invoked to perform an additional operation (i.e., preprocessing) before disabling the target startup item.
In an exemplary embodiment, referring to FIG. 7, before enabling item A is disabled, step S72, befor disable, first plug-in logic 710 provided by extension layer 410 is invoked to perform additional operations (i.e., preprocessing) before enabling item A is disabled. And after processing by the first plug-in logic, the invocation of the first plug-in may be indicated by step s73.Finish call.
In step S640, the logic (i.e., the optimization theory) of the disable target startup item of the core capability layer is invoked.
In an exemplary embodiment, referring to fig. 7, the inhibit initiation item a, step s74.Disable, is implemented by the core capability layer 330.
In step S650, it is determined whether or not a plug-in is connected after the target startup item is prohibited.
For example, if it is determined that the plug-in is connected after the target startup item is prohibited, step S660 is performed. If it is determined that no plug-in is connected after the target startup item is prohibited, step S670 is executed.
In step S660, the second plug-in is invoked to perform an additional operation (i.e., post-processing) after disabling the target startup item.
In an exemplary embodiment, referring to FIG. 7, after enabling item A is disabled, step S75. After disable, second plug-in logic 720 provided by extension layer 410 is invoked to perform additional operations (i.e., post-processing) After enabling item A is disabled. And invoking the second plug-in logic process, it may be indicated by step s76.Finish call that invoking the second plug-in is ended.
In step S670, a result about prohibiting the target startup item is returned to the business layer.
In an exemplary embodiment, referring to fig. 7, the core capability layer 330 returns a result regarding the prohibited start item a to the service layer 310 through step S77.
In the technical solution provided in the embodiment shown in fig. 6, the flow of the original disabling launch item is optimized due to the intervention in the service scenario provided by the plug-in logic to the nuclear capability layer. In particular, logical interventions can be made both between and after disabling the launch items. Taking a service item S as an example, the technical side needs to delete the relevant registry value V together after disabling the startup item, and then the startup item extension plug-in framework 400 can be used to implement, specifically, by issuing a plug-in for the startup item to a user computer, when the user disables the service item S, the user can trigger the operation of the plug-in, so that after disabling the service item S, the corresponding registry value V is cleared by the deletion logic provided by the plug-in.
In an exemplary embodiment, fig. 8 and fig. 9 schematically illustrate a usage scenario diagram according to an embodiment of the present disclosure, and specifically provide a control scenario of a startup service based on the security class software provided in the foregoing embodiment.
The control scheme (specifically including the scanning process and the optimizing process of the startup item) about the startup item service can be divided into the following three stages:
1. scanning detection stage: and performing system scanning according to a plurality of scanning buried points in the core capability layer, and detecting specific startup item related information.
2. A starting item matching stage: and according to the scanned startup information, carrying out specific startup matching by combining with an operation configuration file, and classifying scattered startup items into specific types of startup items (such as RUN items, service items, planning tasks and right-key menus) under certain software. Then, the specific start item under the software is marked with advice (such as advice disable, disablement, status hold and advice enable) according to the action of the specific start item, and finally, the security class software can perform default optimization and depth optimization according to the advice type.
3. A start item optimization stage: the security class software will default to optimizing for suggested disabled and disabled startup items according to the direction of the configuration file, and the rest of the suggested types will provide the user with access to manual optimization.
In the three stages of the above-mentioned startup operation, the startup core capability layer marks the startup according to a pre-maintained startup configuration file after scanning a specific startup. The mark can determine the survival rate of a startup item on an acceleration module of the security software, and when the mark is 'suggested forbidden' or 'forbidden', the core capability layer of the startup item service can close the corresponding startup item, so that the user machine can not reload the startup item after the next restart. However, the use requirements of different users are different for the same startup item, for example, the label corresponding to "eventnote cutting tool" in the startup item scanning result shown in fig. 8 is "forbidden". However, it is not reasonable for a portion of the users N to use the "EverNote cutting tool" frequently above the preset threshold, and therefore, for this portion of the users N, the "EverNote cutting tool" currently corresponding flag "can be disabled".
Therefore, in practical application, the use feedback information of the user on each starting item is obtained, and the configuration file of the starting item is further modified, so that the mark corresponding to the starting item is changed, and the mark corresponding to the starting item can reflect the practical requirement of the user. Referring to fig. 9, for the above-mentioned part of users N, the label corresponding to "EverNote clipping tool" is "suggested start" based on the package extension back frame of the plug-in provided in this embodiment. Therefore, aiming at the situation that the configuration information of the corresponding starting item cannot be timely modified, the embodiment can intervene on the scanning result to achieve the corresponding effect by issuing the corresponding plug-in item, and therefore the technical scheme has the technical effects of controlling timeliness manuscript and controlling high flexibility.
The service control scheme of the startup item provided by the technical scheme performs plug-in packaging and expansion on the core capability layer, so that a plug-in operation framework is obtained. Wherein the plug-in is a separate executable (e.g., dll-dynamically linked library) independent of the launch item core capability layer. Specifically, the framework expanded through the package of the plug-in can perform service intervention aiming at the three stages of starting the item service. Specifically, the control accuracy may be specific to the intervention and intervention of the service of any one of the startup items (e.g., performing an L service before the scanning process of the startup item D, performing an M service after the optimizing process of the startup item D, etc.). In addition, the plug-ins can work independently, can be issued simultaneously, and can also realize ageing control. Therefore, the scheme can realize flexible and timely control aiming at the complex scene under the condition that the safety software version is not updated and the operation configuration file of the starting item is not updated so as to meet the operation requirement of the safety software.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as a computer program executed by a processor (including a CPU and GPU). The computer program, when executed by a processor, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic disk or an optical disk, etc.
Furthermore, it should be noted that the above-described figures are merely illustrative of the processes involved in the method according to the exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily appreciated that the processes shown in the above figures do not indicate or limit the temporal order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, among a plurality of modules.
Further, in this example embodiment, a service control device for application software is also provided. Referring to fig. 10, the service control device 1000 of the application software includes: a receiving module 1001, an acquiring module 1002, a preprocessing module 1003, a control processing module 1004, and a post-processing module 1005.
Wherein the receiving module 1001 is configured to receive a service control request, where the service control request includes: a scan request and/or an optimization request; the acquiring module 1002 is configured to acquire service information to be processed according to the service control request; the preprocessing module 1003 is configured to invoke a first plug-in to perform a preprocessing operation on the to-be-processed service information, so as to obtain first service information; the control processing module 1004 is configured to perform a scanning process on the first service information according to the scanning request, and/or perform an optimization process on the first service information according to the optimization request, so as to obtain second service information; and the post-processing module 1005 is configured to call a second plug-in to perform post-processing operation on the second service information, so as to obtain the processed service information.
In an exemplary embodiment, based on the foregoing solution, the service control device 1000 of the application software further includes: and packaging the module.
Wherein the package module is configured to: and before the service information to be processed is acquired according to the service control request, packaging an expansion layer into a core capacity layer for the scanning processing and/or the optimizing processing, and loading the first plug-in and the second plug-in through the expansion layer.
In an exemplary embodiment, based on the foregoing solution, the service control device 1000 of the application software further includes: and the interface buries the point module.
Wherein, the above-mentioned interface buries some module and is configured as: after the first plug-in and the second plug-in are loaded through the expansion layer, a first interface embedded point is arranged in the first plug-in, and the preprocessing operation is carried out by calling the implementation of the first interface embedded point; and setting a second interface buried point in the second plug-in unit so as to call the implementation of the second interface buried point to perform the post-processing operation.
In an exemplary embodiment, based on the foregoing scheme, the first plug-in and the second plug-in are implemented through a dynamic link library; wherein: the preprocessing module 1003 is specifically configured to: and determining that the dynamic link library realizes the first interface buried point, and dynamically loading the first plug-in to the expansion layer to call the first plug-in to perform preprocessing operation on the service information.
In an exemplary embodiment, based on the foregoing scheme, the post-processing module 1005 is specifically configured to: and determining that the dynamic link library realizes the second interface buried point, and dynamically loading the second plug-in to the expansion layer to call the second plug-in to perform post-processing operation on the second service information.
In an exemplary embodiment, based on the foregoing scheme, the service information includes at least one of the following information: the method comprises the steps of starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
In an exemplary embodiment, based on the foregoing scheme, the service information is startup service information; wherein: the preprocessing module 1003 is specifically configured to: at least one of the following treatments is performed by the first plug-in: modification of the suggested type of the starting item, modification of the description of the starting item, modification of classification of the starting item and processing of the newly added software item.
In an exemplary embodiment, based on the foregoing scheme, the service information is startup service information; wherein: the preprocessing module 1003 is specifically configured to: at least one of the following treatments is performed by the first plug-in: disabling pre-logic insertion, resuming pre-logic insertion, delaying enabling pre-logic insertion, ignoring pre-logic insertion, and cancelling ignoring pre-logic insertion; and, the post-processing module 1005 is specifically configured to: at least one of the following treatments is performed by the second plug-in: disabling post-logic insertion, resuming post-logic insertion, delaying post-start logic insertion, ignoring post-logic insertion, cancelling pre-ignore logic insertion, and cancelling post-ignore logic insertion.
The specific details of each module or unit in the service control device of the application software are described in detail in the service control method of the corresponding application software, so that the details are not repeated here.
Fig. 11 shows a schematic diagram of a computer system suitable for use in implementing an embodiment of the invention.
It should be noted that, the computer system 1100 of the electronic device shown in fig. 11 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present invention.
As shown in fig. 11, the computer system 1100 includes a processor 1101, wherein the processor 1101 may comprise: a graphics processing unit (Graphics Processing Unit, GPU), a central processing unit (Central Processing Unit, CPU), which can perform various appropriate actions and processes according to a program stored in a Read-Only Memory (ROM) 1102 or a program loaded from a storage section 1108 into a random access Memory (Random Access Memory, RAM) 1103. In the RAM 1103, various programs and data required for system operation are also stored. A processor (GPU/CPU) 1101, a ROM 1102, and a RAM 1103 are connected to each other by a bus 1104. An Input/Output (I/O) interface 1105 is also connected to bus 1104.
The following components are connected to the I/O interface 1105: an input section 1106 including a keyboard, a mouse, and the like; an output portion 1107 including a Cathode Ray Tube (CRT), a liquid crystal display (Liquid Crystal Display, LCD), and a speaker; a storage section 1108 including a hard disk or the like; and a communication section 1109 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 1109 performs communication processing via a network such as the internet. The drive 1110 is also connected to the I/O interface 1105 as needed. Removable media 1111, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is installed as needed in drive 1110, so that a computer program read therefrom is installed as needed in storage section 1108.
In particular, according to embodiments of the present disclosure, the processes described below with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1109, and/or installed from the removable media 1111. The computer program, when executed by a processor (GPU/CPU) 1101, performs the various functions defined in the system of the present application. In some embodiments, the computer system 1100 may also include an AI (Artificial Intelligence ) processor for processing computing operations related to machine learning.
It should be noted that, the computer readable medium shown in the embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As another aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the methods described in the above embodiments.
For example, the electronic device may implement the method as shown in fig. 2: step S210, receiving a service control request, where the service control request includes: a scan request and/or an optimization request; step S220, obtaining the service information to be processed according to the service control request; step S230, invoking a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information; step S240, performing scanning processing on the first service information according to the scanning request, and/or performing optimization processing on the first service information according to the optimization request, so as to obtain second service information; and step S250, calling a second plug-in to carry out post-processing operation on the second service information to obtain the processed service information.
As another example, the electronic device may implement the various steps as shown in fig. 3-9.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method for controlling a service of application software, the method comprising:
receiving a service control request for a startup item, wherein the service control request comprises: a scan request and/or an optimization request; the starting item refers to an executable program loaded along with the starting of a system in a computer;
encapsulating the extension layer to a core capability layer for scan processing and/or optimization processing;
Loading a first plug-in and a second plug-in to the expansion layer according to the feedback information of the use of the starting item by a user; the first plug-in and the second plug-in are separate executable programs independent of the core capability layer;
acquiring service information to be processed according to the service control request;
invoking a first plug-in to perform preprocessing operation on the service information to be processed to obtain first service information; the preprocessing operation is a modification operation or a logic insertion operation executed before scanning or optimizing the starting item;
scanning the first service information according to the scanning request and/or optimizing the first service information according to the optimizing request to obtain second service information;
calling a second plug-in to perform post-processing operation on the second service information to obtain processed service information; the post-processing operation is a logic insertion operation performed after scanning or optimizing the start-up item.
2. The method for controlling services of application software according to claim 1, wherein after loading the first plug-in and the second plug-in to the extension layer, the method further comprises:
Setting a first interface buried point in the first plug-in unit to call the implementation of the first interface buried point to perform the preprocessing operation;
and setting a second interface buried point in the second plug-in unit so as to call the realization of the second interface buried point to carry out the post-processing operation.
3. The business control method of application software according to claim 2, wherein the first plug-in and the second plug-in are implemented by a dynamic link library; wherein:
the calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps:
and determining that the dynamic link library realizes the first interface buried point, and dynamically loading the first plug-in to the expansion layer to call the first plug-in to perform preprocessing operation on the service information.
4. The method for controlling services of application software according to claim 3, wherein said calling a second plug-in to perform a post-processing operation on the second service information includes:
and determining that the dynamic link library realizes the second interface buried point, and dynamically loading the second plug-in to the expansion layer to call the second plug-in to perform post-processing operation on the second service information.
5. The service control method of application software according to any one of claims 1 to 4, wherein the service information includes at least one of the following information: the method comprises the steps of starting item service information, memory cleaning service information, operation acceleration service information and virus processing service information.
6. The service control method of application software according to claim 1, wherein the service information is startup service information; wherein:
the calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps:
at least one of the following treatments is performed by the first plug-in: modification of the suggested type of the starting item, modification of the description of the starting item, modification of classification of the starting item and processing of the newly added software item.
7. The service control method of application software according to claim 1, wherein the service information is startup service information; wherein:
the calling the first plug-in unit to perform preprocessing operation on the service information to be processed comprises the following steps:
at least one of the following treatments is performed by the first plug-in: disabling pre-logic insertion, resuming pre-logic insertion, delaying enabling pre-logic insertion, ignoring pre-logic insertion, and cancelling ignoring pre-logic insertion;
And the calling a second plug-in to carry out post-processing operation on the second service information comprises the following steps:
and performing at least one of the following processing on the second service information through the second plug-in unit: disabling post-logic insertion, resuming post-logic insertion, delaying post-start logic insertion, ignoring post-logic insertion, cancelling pre-ignore logic insertion, and cancelling post-ignore logic insertion.
8. A service control device for application software, the device comprising:
a receiving module configured to receive a service control request for an initiation, wherein the service control request includes: a scan request and/or an optimization request; the starting item refers to an executable program loaded along with the starting of a system in a computer;
an acquisition module configured to encapsulate the extension layer to a core capability layer for scan processing and/or optimization processing; loading a first plug-in and a second plug-in to the expansion layer according to the feedback information of the use of the starting item by a user; the first plug-in and the second plug-in are separate executable programs independent of the core capability layer; acquiring service information to be processed according to the service control request;
the preprocessing module is configured to call a first plug-in to perform preprocessing operation on the to-be-processed service information to obtain first service information; the preprocessing operation is a modification operation or a logic insertion operation executed before scanning or optimizing the starting item;
The control processing module is configured to scan the first service information according to the scanning request and/or optimize the first service information according to the optimizing request to obtain second service information;
the post-processing module is configured to call a second plug-in to perform post-processing operation on the second service information to obtain processed service information; the post-processing operation is a logic insertion operation performed after scanning or optimizing the start-up item.
9. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to execute the service control method of the application software of any one of claims 1 to 7 via execution of the executable instructions.
10. A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a service control method of an application software according to any of claims 1 to 7.
CN201910630532.6A 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment Active CN112214287B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910630532.6A CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910630532.6A CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Publications (2)

Publication Number Publication Date
CN112214287A CN112214287A (en) 2021-01-12
CN112214287B true CN112214287B (en) 2023-10-27

Family

ID=74047807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910630532.6A Active CN112214287B (en) 2019-07-12 2019-07-12 Service control method and device of application software and electronic equipment

Country Status (1)

Country Link
CN (1) CN112214287B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114968407B (en) * 2022-05-30 2024-03-08 北京金堤科技有限公司 Plug-in calling method, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005642A1 (en) * 2005-07-01 2007-01-04 Microsoft Corporation Modification of logic in an application
CN1968154A (en) * 2006-09-15 2007-05-23 华为技术有限公司 System and method for service expansion using plug
CN101847100A (en) * 2010-06-08 2010-09-29 用友软件股份有限公司 Method for expanding software application and device
CN109118065A (en) * 2018-07-26 2019-01-01 深圳市小赢信息技术有限责任公司 A kind of interactive mode Workflow system and its operation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070005642A1 (en) * 2005-07-01 2007-01-04 Microsoft Corporation Modification of logic in an application
CN1968154A (en) * 2006-09-15 2007-05-23 华为技术有限公司 System and method for service expansion using plug
CN101847100A (en) * 2010-06-08 2010-09-29 用友软件股份有限公司 Method for expanding software application and device
CN109118065A (en) * 2018-07-26 2019-01-01 深圳市小赢信息技术有限责任公司 A kind of interactive mode Workflow system and its operation method

Also Published As

Publication number Publication date
CN112214287A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN115378735B (en) Data processing method and device, storage medium and electronic equipment
US9223974B2 (en) Anti-viral compiler
CN106203108A (en) Linux white list system protection method based on kernel module and device
CN112214287B (en) Service control method and device of application software and electronic equipment
CN113448545B (en) Method, apparatus, storage medium and program product for machine learning model servitization
CN103067246A (en) Method and apparatus used for processing file received based on instant communication service
CN112529711B (en) Transaction processing method and device based on block chain virtual machine multiplexing
CN105787359A (en) Course guarding method and device
CN105184177A (en) Process hiding method and apparatus
CN112560018B (en) Sample file detection method, device, terminal equipment and storage medium
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN114579054A (en) Data processing method and device, electronic equipment and computer readable medium
CN106203087B (en) Injection protection method, system, terminal and storage medium
CN115174192A (en) Application security protection method and device, electronic equipment and storage medium
CN114139079A (en) API request processing method, device, equipment and storage medium
CN114401121A (en) Application program login method and device, electronic equipment and readable storage medium
CN114035797A (en) Front-end code encryption method, operation method, device, equipment and storage medium
CN106648671A (en) Application upgrade method and terminal
US20200137059A1 (en) Method, device and computer program product for service access
CN109213815B (en) Method, device, server terminal and readable medium for controlling execution times
CN108459899B (en) Information protection method and device
CN104808985B (en) The management method and device of object in application program
CN111399928A (en) Application program starting method and device, electronic equipment and readable storage medium
CN112905254B (en) Method and device for sending request
KR20190125880A (en) Static analysis method and apparatus for activity injection detecting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant