CN112241473A - Method and equipment for configuring data for application - Google Patents

Method and equipment for configuring data for application Download PDF

Info

Publication number
CN112241473A
CN112241473A CN202010929409.7A CN202010929409A CN112241473A CN 112241473 A CN112241473 A CN 112241473A CN 202010929409 A CN202010929409 A CN 202010929409A CN 112241473 A CN112241473 A CN 112241473A
Authority
CN
China
Prior art keywords
configuration
information
target
application
index information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010929409.7A
Other languages
Chinese (zh)
Inventor
杨华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN202010929409.7A priority Critical patent/CN112241473A/en
Publication of CN112241473A publication Critical patent/CN112241473A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application aims to provide a method and equipment for configuring data for an application, wherein the method comprises the following steps: responding to starting operation of a user on an application, and detecting whether an index file copy of the application exists locally on user equipment; if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file; and sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information. The pressure of the server is reduced, and meanwhile, the application starting speed is improved.

Description

Method and equipment for configuring data for application
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for configuring data for an application.
Background
The application mainly refers to software installed on intelligent mobile equipment (such as a smart phone, a tablet computer and the like), and overcomes the defects and individuation of an original system. The method is a main means for improving the functions of the intelligent mobile equipment and providing richer use experience for the user.
Along with the popularization of intelligent mobile equipment, the application types are more and more. And, the configuration functions of each application are also increasing. More and more application configuration functions can improve the application functions and improve the user experience; on the other hand, the start time of the application is also increased, and the load of the application server is increased.
Disclosure of Invention
It is an object of the present application to provide a method and apparatus for configuring data for an application.
According to an aspect of the present application, there is provided a method for configuring data for an application, applied to a user equipment, the method including:
responding to starting operation of a user on an application, and detecting whether an index file copy of the application exists locally on user equipment;
if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file;
and sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information.
According to another aspect of the present application, there is provided a method for configuring data for an application, applied to a network device, the method including:
receiving a configuration request about an application, which is sent by user equipment, wherein the configuration request comprises target configuration index information, and the configuration request is sent by the user equipment in response to a starting operation of the application by a user and by detecting whether an index file copy of the application exists locally in the user equipment;
acquiring target configuration data and target version information of the target configuration data according to the target configuration index information;
and sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data and the target version information.
According to an aspect of the present application, there is provided a user equipment for configuring data for an application, the apparatus comprising:
the one-to-one module is used for responding to the starting operation of a user on an application and detecting whether an index file copy of the application exists in the local of the user equipment;
the first module and the second module are used for determining a configuration index information copy in the index file copy as target configuration index information if the configuration index information copy exists; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file;
a third module, configured to send a configuration request to a corresponding network device, where the configuration request includes the target configuration index information.
According to another aspect of the present application, there is provided a network device for configuring data for an application, the device comprising:
a module, configured to receive a configuration request about an application sent by user equipment, where the configuration request includes target configuration index information, where the configuration request is sent by the user equipment in response to a user starting an application by detecting whether an index file copy of the application exists locally on the user equipment;
the second module is used for acquiring target configuration data and target version information of the target configuration data according to the target configuration index information;
and a module for sending configuration result information to the user equipment, wherein the configuration result information includes the target configuration data and the target version information.
According to yet another aspect of the present application, there is provided a method for configuring data for an application, the method comprising:
the method comprises the steps that user equipment responds to starting operation of a user on an application, and whether an index file copy of the application exists in the local area of the user equipment is detected; if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file; sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information;
the network equipment receives the configuration request, and acquires target configuration data and target version information of the target configuration data according to the target configuration index information; sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data and the target version information;
and the user equipment receives the configuration result information.
According to an aspect of the present application, there is provided an apparatus for configuring data for an application, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, the method and the device have the advantages that in response to the starting operation of the user on the application, whether the index file copy exists locally or not is detected through the user equipment, if yes, the index file copy in the index file copy is determined as the target configuration index information, otherwise, the index file of the application is obtained, the initial configuration index information in the index file is determined as the target configuration index information, and the target configuration index information is sent to the corresponding network equipment. In other words, the configuration index information copies in the index file copies are added or deleted in time based on the addition or deletion of the configuration index information of the application by the network device, so that the corresponding configuration index information copies are added or deleted. When the index file copy locally exists in the user equipment, the configuration index information copy in the index file copy is determined as target configuration index information, and a configuration request is sent to the network equipment, so that the user equipment can be prevented from correspondingly deleting the deleted configuration index information when the deleted configuration index information exists in the application. The pressure of the server is relieved, and meanwhile, the application starting speed is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology diagram for configuring data for an application according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a system method for configuring data for an application according to one embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for configuring data for an application according to another embodiment of the present application;
FIG. 4 illustrates a flow diagram of a method for configuring data for an application according to yet another embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method for configuring data for an application according to one embodiment of the present application;
FIG. 6 illustrates a device structure diagram of a user device for configuring data for an application according to one embodiment of the present application;
FIG. 7 illustrates a device structure diagram of a network device for configuring data for an application according to one embodiment of the present application;
FIG. 8 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in the present application includes, but is not limited to, a terminal, a network device, or a device formed by integrating a terminal and a network device through a network. The terminal includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the terminal, the network device, or a device formed by integrating the terminal and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Here, "configuration index information", "configuration index information copy", "initial configuration index information" and "target configuration index information" described in the present application are used to pull corresponding configuration data. The target configuration index information is used for pulling corresponding target configuration data from corresponding network equipment.
FIG. 1 illustrates a system topology diagram for configuring data for an application according to one embodiment of the present application. The system comprises user equipment and network equipment, wherein the user equipment and the network equipment are communicated in a wired or wireless mode. The user equipment includes but is not limited to a mobile phone, a tablet computer, a computer and the like.
FIG. 2 illustrates a flow diagram of a system method for configuring data for an application according to one embodiment of the present application. The method comprises the following steps:
the method comprises the steps that user equipment responds to starting operation of a user on an application, and whether an index file copy of the application exists in the local area of the user equipment is detected; if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file; sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information;
the network equipment receives the configuration request, and acquires target configuration data and target version information of the target configuration data according to the target configuration index information; sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data and the target version information;
and the user equipment receives the configuration result information.
FIG. 3 shows a flowchart of a method for configuring data for an application, the method comprising step S11, step S12, and step S13, according to one embodiment of the present application.
Specifically, in step S11, the user device detects whether a copy of the index file of the application exists locally on the user device in response to a user starting operation on the application. In some embodiments, the index file copies include, but are not limited to, one or more configuration index information copies. For example, the user equipment monitors a starting operation of a user on the application, and when the user equipment monitors the starting operation of the application, the user equipment detects whether an index file copy of the application exists locally. In some embodiments, the index file copy has a mapping relationship with the application, for example, the user equipment queries whether the index file copy of the application exists locally in the user equipment according to the application identification information of the application.
In step S12, if yes, determining a copy of the configuration index information in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining the initial configuration index information in the index file to be the target configuration index information. In some embodiments, the index file includes one or more pieces of initial configuration index information, for example, the user equipment acquires one or more pieces of initial configuration index information of the application from a corresponding network device while downloading and installing the application, establishes the index file locally, and records the one or more pieces of initial configuration index information in the index file. In some embodiments, if the index file copy exists locally in the user equipment, determining a configuration index information copy in the index file copy as target configuration index information; if the index file copy does not exist locally in the user equipment, acquiring the index file of the application, and determining target configuration index information from initial configuration index information in the index file. In some embodiments, the index file of the application is not changed, for example, when the application is downloaded and installed, the index file is established, and the index file records the initial configuration index information of the application. In some embodiments, the index file copy is dynamically changed, for example, the index file copy is dynamically updated based on configuration result information returned by the network device, and for the establishment and updating of the index file copy, refer to the following embodiments.
In step S13, the user equipment sends a configuration request to the corresponding network device, where the configuration request includes the target configuration index information. In some embodiments, after the user equipment determines target configuration index information based on the index file or the index file copy of the application, the user equipment sends a configuration request to the network equipment to request the network equipment to return corresponding configuration result information (for example, the configuration result information includes target configuration data, so that the user equipment starts the application).
For example, the user equipment has an application V installed therein. The user equipment downloads and installs the application V, meanwhile, caches initial configuration index information (such as key1, key2 and key3) used for pulling configuration data of the application V, establishes an index file V of the application V, and records the key1, key2 and key3 in the index file V. Subsequently, the user equipment monitors the starting operation of the user on the application V, and when the starting operation is monitored, the user equipment detects whether an index file copy V of the application V exists locally. If so, the user equipment determines the configuration index information copy in the index file copy as target configuration index information; if the index file does not exist, the index file V of the application is obtained, and the initial configuration index information (such as key1, key2 and key3) in the index file V is determined as the target configuration index information. And sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information. In this embodiment, each time an application is started, the user equipment determines target configuration index information according to local actual conditions (for example, according to an index file copy or an index file), and sends the target configuration index information to the network device. In some embodiments, the index file copy is dynamically updated based on addition or deletion of configuration index information of the application, so that the user equipment is prevented from requesting network equipment to query and return unnecessary configuration data, the network equipment stress is reduced, and the application starting speed is increased.
In some embodiments, the step S11 includes a step S111 (not shown) and a step S112.
In step S111, the user equipment detects whether a configuration file of the application exists locally in the user equipment in response to a starting operation of the application by the user, where the configuration file includes configuration data of the application. In some embodiments, the configuration file includes configuration data for the application, the configuration data being used to launch the application. In some embodiments, the user equipment detects whether a configuration file of the application exists locally in response to a starting operation of the application by the user.
In step S112, if the configuration data exists, the user equipment starts the application by reading the configuration data; otherwise, detecting whether the index file copy of the application exists locally in the user equipment. In some embodiments, if the configuration file exists locally in the user equipment, the user equipment may directly read configuration data in the configuration file to start the application; if the configuration file does not exist locally in the user equipment, the user equipment detects whether an index file copy of the application exists locally. In this embodiment, in order to further reduce the stress of the network device and increase the starting speed of the application, when the configuration file of the application exists locally, the user equipment may directly start the application based on the configuration file.
In some embodiments, the step S112 includes: if the configuration file exists, sending a version query request about the configuration file to the network equipment, wherein the version query request comprises version information of configuration data in the configuration file; receiving version query result information which is returned by the network equipment and relates to the configuration file; if the version query result information comprises version update information, detecting whether an index file copy of the application exists locally in the user equipment; otherwise, starting the application by reading the configuration data in the configuration file. In some embodiments, in order to ensure that the version of the configuration file local to the user equipment is up-to-date, when detecting that the configuration file exists locally, the user equipment sends a version query request about the configuration file to a corresponding network equipment to request the network equipment to query whether the configuration data stored in the local configuration file by the user equipment is updated. In some embodiments, if the version query result information returned by the network device includes version update information, the user device detects whether an index file copy of the application exists locally; if the version query result information returned by the network equipment comprises no version update information, the user equipment can directly read the configuration data in the configuration file so as to start the application. In this embodiment, in order to avoid starting the application using the configuration data of the expired version, when detecting that the configuration file of the application exists locally, the user equipment first sends a version query request to the network device, and when the version query result returned by the network device includes no version update information, the user equipment starts the application by reading the configuration data in the local configuration file.
In some embodiments, the method further includes step S14 (not shown), in step S14, the user equipment receives configuration result information returned by the network device based on the configuration request, where the configuration result information includes the target configuration data and target version information of the target configuration data. In some embodiments, the network device obtains target configuration data and target version information of the target configuration data based on target configuration index information in a configuration request sent by the user device, and sends the target configuration data and the target version information of the target configuration data to the user device. In some embodiments, the user device starts the application by reading the target configuration data.
In some embodiments, the user device may create or update the index file copy based on the configuration result information. For example, the index file copy does not exist in the user equipment, the user equipment may determine whether the index file copy needs to be established based on the configuration result information, and if so, the user equipment establishes the index file copy; for another example, the index file copy already exists in the user equipment, the user equipment may determine whether the index file copy needs to be updated based on the configuration result information, and if so, the user equipment updates the index file copy in time. In this embodiment, the index file copy is in a dynamically changing state (e.g., established or dynamically updated) based on the configuration result information returned by the network device.
In some embodiments, the configuration result information further includes deleted target configuration index information, wherein the deleted target configuration index information includes deletion marker information; the method further includes step S15 (not shown), in step S15, the user device creates or updates the index file copy according to the deleted target configuration index information. For example, the configuration result information returned by the network device includes deleted target configuration index information, and the user device creates or updates the index file copy based on the deleted target configuration index information. In some embodiments, the delete marker information includes, but is not limited to, identification information such as "-1". For example, the network device queries that a certain key (e.g., key4) in the target configuration index information sent by the user device has been deleted, and the configuration result information sent by the network device to the user device further includes the deleted target configuration index information, where the deleted target configuration index information includes deletion flag information, such as "key 4-1". And the user equipment establishes or updates the index file copy according to the deleted target configuration index information.
In some embodiments, the step S15 includes: if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy; searching a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy. For example, when the configuration result information received by the user equipment further includes the deleted target configuration index information, and the index file copy does not exist locally in the user equipment, the user equipment establishes the index file copy. In some embodiments, the user equipment establishes an index file of the application when downloading and installing the application, and records initial configuration index information for pulling configuration data of an initial version of the application in the index file. When the user equipment initially establishes the index file copy, all initial configuration index information in the index file is recorded into the established index file copy to be used as a configuration index information copy. Further, the user equipment searches a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy. For example, the index file includes initial configuration index information key1, key2, and key 3. The user equipment does not have index file copies, and sends the keys 1, 2 and 3 as target configuration index information to the network equipment. The user equipment receives that the configuration result information sent by the network equipment comprises 'key 3-1', establishes an index file copy based on the configuration result information, for example, the user equipment establishes an index file copy, and records the keys 1, key2 and key3 as configuration index information copies in the index file copy. The user equipment searches the corresponding configuration index information copy key3 based on the key3-1 in the received configuration result information, and deletes the key3 from the index file copy.
In some embodiments, the step S15 includes: if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application, wherein the index file copy comprises a configuration index information copy; searching a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy. For example, the configuration result information received by the user equipment further includes target configuration index information that has been deleted, and when the index file copy already exists locally in the user equipment, the user equipment updates the index file copy. The user equipment searches a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy. For example, the index file copies include configuration index information copies key1, key2 and key 3. The configuration result information sent by the network equipment and received by the user equipment comprises 'key 3-1', and the user equipment updates the index file copy based on the configuration result information. For example, the user equipment searches the corresponding configuration index information copy key3 based on the "key 3-1" in the received configuration result information, and deletes key3 from the index file copy.
In some embodiments, the configuration result information further includes newly added configuration index information; the method further includes step S16 (not shown), in step S16, the user equipment creates or updates the index file copy according to the newly added configuration index information. For example, the configuration result information returned by the network device includes newly added configuration index information, and the user device establishes or updates the index file copy based on the newly added configuration index information.
In some embodiments, the step S16 includes: if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy; and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy. For example, when the configuration result information received by the user equipment further includes newly added configuration index information and the index file copy does not exist locally in the user equipment, the user equipment establishes the index file copy. In some embodiments, the user equipment establishes an index file of the application when downloading and installing the application, and records initial configuration index information for pulling configuration data of an initial version of the application in the index file. When the user equipment initially establishes the index file copy, all initial configuration index information in the index file is recorded into the established index file copy to be used as a configuration index information copy. Further, the user equipment adds the newly added configuration index information in the configuration result information to the index file copy as a new configuration index information copy. For example, the index file includes initial configuration index information key1, key2, and key 3. The user equipment does not have index file copies, and sends the keys 1, 2 and 3 as target configuration index information to the network equipment. When the user equipment receives that the configuration result information sent by the network equipment includes newly added configuration index information, such as "key 4", the user equipment adds the newly added configuration index information to the index file copy as a new configuration index information copy. For example, the index file copies established by the user equipment comprise configuration index information copies key1, key2, key3 and key 4.
In some embodiments, the step S16 includes: if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application; and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy. For example, the configuration result information received by the user equipment further includes newly added configuration index information, and when the index file copy already exists locally in the user equipment, the user equipment updates the index file copy. For example, the index file copies include configuration index information copies key1, key2 and key 3. The configuration result information received by the user equipment and sent by the network equipment comprises newly added configuration index information 'key 4', and the user equipment updates the index file copy based on the configuration result information. For example, the user device adds the key4 to the index file copy to update the index file copy, e.g., the updated index file copy includes configuration index information copies key1, key2, key3, key 4.
FIG. 4 shows a flowchart of a method for configuring data for an application according to another embodiment of the present application, the method comprising step S21, step S22, and step S23.
Specifically, in step S21, the network device receives a configuration request about an application, where the configuration request includes target configuration index information, and the configuration request is sent by the user device in response to a user starting an application, by detecting whether an index file copy of the application exists locally on the user device. In some embodiments, the index file copies include, but are not limited to, one or more configuration index information copies. For example, the user equipment monitors a starting operation of a user on the application, and when the user equipment monitors the starting operation of the application, the user equipment detects whether an index file copy of the application exists locally. In some embodiments, the index file copy has a mapping relationship with the application, for example, the user equipment queries whether the index file copy of the application exists locally in the user equipment according to the application identification information of the application. And if the index file copy exists locally in the user equipment, the user equipment sends the configuration request to the network equipment. In some embodiments, the target configuration index information is used to pull corresponding target configuration data.
In step S22, the network device obtains target configuration data and target version information of the target configuration data according to the target configuration index information. In some embodiments, the network device obtains corresponding target configuration data and target version information (e.g., 1.0, 2.0 …) of the target configuration data according to the target configuration index information. For example, the network device pulls target configuration data of the target configuration index information from an application database of the application according to the target configuration index information, and obtains target version information of the target configuration data.
In step S23, the network device sends configuration result information to the user device, where the configuration result information includes the target configuration data and the target version information. In some embodiments, the network device sends the target configuration data and target version information of the target configuration data as configuration result information to the user equipment. In some embodiments, the target configuration data is for the user equipment to launch the application.
In some embodiments, the method further includes step S24 (not shown), in step S24, the network device receives a version query request about the configuration file of the application, which is sent by the user device, wherein the version query request includes version information of the configuration file; acquiring the latest version information of the application, and detecting whether the configuration file of the application is updated or not by comparing the latest version information with the version information in the version inquiry request; returning version query result information about the configuration file to the user equipment, wherein the version query result information comprises version update information or no version update information. In some embodiments, the network device further receives a version query request sent by the user device about the locally cached configuration file, where the version query request includes version information of the configuration file, and the network device queries to obtain latest version information of the application, and detects whether the version information of the locally cached configuration file of the user device is the latest version by comparing the latest version information with the version information received by the user device. Further, the network device returns version query result information to the user device. For example, if the version information of the configuration file is the same as the latest version information, the version query result information returned to the user equipment by the network equipment includes no version update information; for another example, if the version information of the configuration file is different from the latest version information, the version query result information returned to the user equipment by the network equipment includes version update information.
In some embodiments, the configuration request includes one or more target configuration index information; the step S22 includes a step S221 (not shown), a step S222, and a step S223. In step S221, the network device obtains all the latest configuration index information of the application. In step S222, the network device detects whether there is a change in the amount of the one or more target configuration index information by comparing the one or more target configuration index information with the latest configuration index information. In step S223, the network device obtains target configuration data and target version information of the target configuration data according to the detection result. In some embodiments, the configuration request sent by the user equipment includes one or more target configuration index information (e.g., key1, key2, key3), and the network equipment obtains all the latest configuration index information of the application after receiving the configuration request (e.g., the network equipment obtains all the latest configuration index information of the application from an application database of the application). Further, the network device detects whether there is a change (e.g., a deletion or an added change) in the amount of the one or more target configuration index information by comparing the one or more target configuration index information with the latest configuration index information. Further, the network device obtains target configuration data and target version information of the target configuration data according to the comparison and detection result.
In some embodiments, the detection result comprises: the one or more pieces of target configuration index information include deleted target configuration index information, and the step S223 includes: the network equipment eliminates the deleted target configuration index information from the one or more target configuration index information; and the network equipment acquires the target configuration data and the target version information of the target configuration data according to the one or more target configuration index information after being removed. For example, the result of the network device comparison detection includes that the deleted target configuration index information exists in the one or more target configuration index information. For example, the latest configuration index information acquired by the network device includes key1, key 2; and the target configuration index information sent by the user equipment includes key1, key2, and key3, it may be determined that target configuration index information (e.g., key3) that has been deleted exists in the one or more target configuration index information. Further, the network device removes the deleted target configuration index information from the one or more target configuration index information, pulls target configuration data according to the removed target configuration index information, and obtains target version information of the target configuration data. For example, the network device only pulls the configuration data of keys 1, 2 as the target configuration data.
In some embodiments, the step S223 further includes: the network equipment generates the deleted marker information of the deleted target configuration index information; the step S23 includes: the network device sends configuration result information to the user device, wherein the configuration result information includes the target configuration data, the target version information, and the deleted target configuration index information includes deletion marker information. In some embodiments, when the target configuration index information sent by the user equipment has the deleted target configuration index information, the network device "notifies" the user equipment in time, so that the user equipment locally creates or updates a configuration index file copy. For example, the network device compares to detect that key3 has been deleted, and the network device makes deletion marker information (e.g., "-1" of deletion marker information) to key 3. Further, the configuration result information sent by the network device to the user device includes the target configuration data pulled by the network device based on the removed key3, the target version information, and the deleted target configuration index information, where the deleted target configuration index information includes deletion flag information (e.g., "key 3-1").
In some embodiments, the detection result comprises: the application has newly added configuration index information, and the step S22 includes: the network equipment adds the newly added configuration index information into the one or more target configuration index information; and the network equipment acquires the target configuration data and the target version information of the target configuration data according to the added one or more pieces of target configuration index information. In some embodiments, the network device compares the detected result to determine that there is newly added configuration index information for the application. For example, the latest configuration index information acquired by the network device includes key1, key2, key 3; and the target configuration index information sent by the user equipment comprises key1, key2, key3 and key 4. It may be determined that the application has newly added key 4. And the network equipment adds the newly added configuration index information into the one or more target configuration index information, pulls target configuration data according to the added target configuration index information, and acquires target version information of the target configuration data. For example, the network device pulls configuration data of keys 1, 2, key3, key4 as the target configuration data.
In some embodiments, the step S23 includes: and the network equipment sends configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data, the target version information and the newly added configuration index information. In some embodiments, when there is newly added configuration index information in the target configuration index information sent by the user equipment, the network device "notifies" the user equipment in time, so that the user equipment locally creates or updates a configuration index file copy. For example, the network device detects that a new configuration index information key4 is added, and the configuration result information sent to the user device by the network device includes the newly added configuration index information (e.g., "key 4") in addition to the target configuration data and the target version information.
FIG. 5 illustrates a flow diagram of a method for configuring data for an application, according to one embodiment of the present application. Referring to fig. 5, when starting an APP (e.g., the application), it is first determined whether a configured data file (which is tentatively a data file, for example, the "configuration file" for convenience of explanation herein) exists in a hardware storage device (e.g., local to a user device), and if the configured data file exists, the data file is read into a system memory for use by the APP. And meanwhile, acquiring the version of the data file, requesting whether the version is updated or not from a server (for example, the network equipment), and if the version is updated, ending the process. If the data file is not up-to-date, whether a copy file of the configuration index file (for example, the index file copy, which is tentatively referred to as a keyCopy file for convenience of explanation herein) exists in the hardware storage device is judged, if the keyCopy file exists, the configuration key of the keyCopy file (for example, the configuration index information copy) is read, the server is requested to issue the full amount of configuration data according to the configuration key, the configuration data is saved as the data file, and meanwhile, the version number of the data file is saved for the next use. Meanwhile, whether the expired configuration key exists or not is judged according to the issued data, and if the expired configuration key exists, the key is deleted from the key copy file, so that the reading time of the client can be greatly saved, the starting speed is optimized, the query of the server on the invalid key can be reduced, the query pressure of the server is reduced, and the issued data amount is reduced.
If the keyCopy does not exist, reading an original configuration file (for example, the configuration index file, which is temporarily referred to as a key file), requesting the server to issue the full amount of configuration data according to the configuration key (for example, the initial configuration index information), and saving the configuration data as a data file, and saving the version number of the data file for the next use. Meanwhile, whether an expired configuration key exists or not is judged according to the issued data, and if the expired configuration key exists, a new keyCopy file is generated for next use, so that the reading time of the client can be greatly saved, the starting speed is optimized, the query of the server on invalid keys can be reduced, the query pressure of the server is reduced, and the issued data amount is reduced. In this embodiment, a layer-by-layer cache mechanism is used, which can greatly reduce the pressure on the client and the server, and the number of configuration keys can be newly adjusted according to the data sent by the server, which is equal to a configuration of two-way interaction.
Fig. 6 shows a device structure diagram of a user equipment for configuring data for an application according to an embodiment of the present application, the device comprising a one-module, a two-module and a three-module.
Specifically, the module is configured to detect whether an index file copy of an application exists locally on the user equipment in response to a start operation of a user on the application. In some embodiments, the index file copies include, but are not limited to, one or more configuration index information copies. For example, the user equipment monitors a starting operation of a user on the application, and when the user equipment monitors the starting operation of the application, the user equipment detects whether an index file copy of the application exists locally. In some embodiments, the index file copy has a mapping relationship with the application, for example, the user equipment queries whether the index file copy of the application exists locally in the user equipment according to the application identification information of the application.
The first module and the second module are used for determining a configuration index information copy in the index file copy as target configuration index information if the configuration index information copy exists; otherwise, acquiring the index file of the application, and determining the initial configuration index information in the index file to be the target configuration index information. In some embodiments, the index file includes one or more pieces of initial configuration index information, for example, the user equipment acquires one or more pieces of initial configuration index information of the application from a corresponding network device while downloading and installing the application, establishes the index file locally, and records the one or more pieces of initial configuration index information in the index file. In some embodiments, if the index file copy exists locally in the user equipment, determining a configuration index information copy in the index file copy as target configuration index information; if the index file copy does not exist locally in the user equipment, acquiring the index file of the application, and determining target configuration index information from initial configuration index information in the index file. In some embodiments, the index file of the application is not changed, for example, when the application is downloaded and installed, the index file is established, and the index file records the initial configuration index information of the application. In some embodiments, the index file copy is dynamically changed, for example, the index file copy is dynamically updated based on configuration result information returned by the network device, and for the establishment and updating of the index file copy, refer to the following embodiments.
A third module, configured to send a configuration request to a corresponding network device, where the configuration request includes the target configuration index information. In some embodiments, after the user equipment determines target configuration index information based on the index file or the index file copy of the application, the user equipment sends a configuration request to the network equipment to request the network equipment to return corresponding configuration result information (for example, the configuration result information includes target configuration data, so that the user equipment starts the application).
For example, the user equipment has an application V installed therein. The user equipment downloads and installs the application V, meanwhile, caches initial configuration index information (such as key1, key2 and key3) used for pulling configuration data of the application V, establishes an index file V of the application V, and records the key1, key2 and key3 in the index file V. Subsequently, the user equipment monitors the starting operation of the user on the application V, and when the starting operation is monitored, the user equipment detects whether an index file copy V of the application V exists locally. If so, the user equipment determines the configuration index information copy in the index file copy as target configuration index information; if the index file does not exist, the index file V of the application is obtained, and the initial configuration index information (such as key1, key2 and key3) in the index file V is determined as the target configuration index information. And sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information. In this embodiment, each time an application is started, the user equipment determines target configuration index information according to local actual conditions (for example, according to an index file copy or an index file), and sends the target configuration index information to the network device. In some embodiments, the index file copy is dynamically updated based on addition or deletion of configuration index information of the application, so that the user equipment is prevented from requesting network equipment to query and return unnecessary configuration data, the network equipment stress is reduced, and the application starting speed is increased.
In some embodiments, the one-to-one modules include one-to-one module (not shown) and one-to-two modules.
And a module, configured to detect whether a configuration file of the application exists locally on the user equipment in response to a start operation of the application by the user, where the configuration file includes configuration data of the application. A second module, configured to, if the application exists, start the application by reading the configuration data by the ue; otherwise, detecting whether the index file copy of the application exists locally in the user equipment.
Here, the specific implementation of the one-to-one module and the one-to-two module is the same as or similar to the specific implementation of the step S111 and the step S112, and therefore, the detailed description is omitted, and the description is included herein by way of reference.
In some embodiments, the one-to-two module is configured to send a version query request about the configuration file to the network device if the configuration file exists, where the version query request includes version information of configuration data in the configuration file; receiving version query result information which is returned by the network equipment and relates to the configuration file; if the version query result information comprises version update information, detecting whether an index file copy of the application exists locally in the user equipment; otherwise, starting the application by reading the configuration data in the configuration file.
Here, the specific implementation of the first and second modules is the same as or similar to the specific implementation of the step S112, and thus the detailed description is omitted, and the specific implementation is included herein by reference.
In some embodiments, the device further includes a fourth module (not shown), and the fourth module is configured to receive configuration result information returned by the network device based on the configuration request, where the configuration result information includes the target configuration data and target version information of the target configuration data.
Here, the specific implementation corresponding to the four modules is the same as or similar to the specific implementation of the step S14, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the configuration result information further includes deleted target configuration index information, wherein the deleted target configuration index information includes deletion marker information; the device further comprises a five-module (not shown) for creating or updating the index file copy according to the deleted target configuration index information.
Here, the specific implementation manner corresponding to the fifth module is the same as or similar to the specific implementation manner of the step S15, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the one-five module is to: if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy; searching a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy.
Here, the specific implementation manner corresponding to the fifth module is the same as or similar to the specific implementation manner of the step S15, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the one-five module is to: if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application, wherein the index file copy comprises a configuration index information copy; searching a corresponding configuration index information copy according to the deleted target configuration index information; and deleting the configuration index information copy from the index file copy.
Here, the specific implementation manner corresponding to the fifth module is the same as or similar to the specific implementation manner of the step S15, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the configuration result information further includes newly added configuration index information; the device further comprises a sixth module (not shown) for creating or updating the index file copy according to the newly added configuration index information.
Here, the specific implementation manner corresponding to the six modules is the same as or similar to the specific implementation manner of the step S16, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the one or six modules are configured to: if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy; and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy.
Here, the specific implementation manner corresponding to the six modules is the same as or similar to the specific implementation manner of the step S16, and therefore, the detailed description is not repeated here and is included herein by way of reference.
In some embodiments, the one or six modules are configured to: if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application; and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy.
Here, the specific implementation manner corresponding to the six modules is the same as or similar to the specific implementation manner of the step S16, and therefore, the detailed description is not repeated here and is included herein by way of reference.
Fig. 7 is a device architecture diagram of a network device for configuring data for an application, the device including two to one modules, two to two modules, and two to three modules, according to another embodiment of the present application.
Specifically, the first module is configured to receive a configuration request about an application, where the configuration request includes target configuration index information, where the configuration request is sent by the user equipment in response to a user starting an application, by detecting whether an index file copy of the application exists locally in the user equipment. In some embodiments, the index file copies include, but are not limited to, one or more configuration index information copies. For example, the user equipment monitors a starting operation of a user on the application, and when the user equipment monitors the starting operation of the application, the user equipment detects whether an index file copy of the application exists locally. In some embodiments, the index file copy has a mapping relationship with the application, for example, the user equipment queries whether the index file copy of the application exists locally in the user equipment according to the application identification information of the application. And if the index file copy exists locally in the user equipment, the user equipment sends the configuration request to the network equipment. In some embodiments, the target configuration index information is used to pull corresponding target configuration data.
And the second module is used for acquiring target configuration data and target version information of the target configuration data according to the target configuration index information. In some embodiments, the network device obtains corresponding target configuration data and target version information (e.g., 1.0, 2.0 …) of the target configuration data according to the target configuration index information. For example, the network device pulls target configuration data of the target configuration index information from an application database of the application according to the target configuration index information, and obtains target version information of the target configuration data.
And a module for sending configuration result information to the user equipment, wherein the configuration result information includes the target configuration data and the target version information. In some embodiments, the network device sends the target configuration data and target version information of the target configuration data as configuration result information to the user equipment. In some embodiments, the target configuration data is for the user equipment to launch the application.
In some embodiments, the apparatus further includes a second-fourth module (not shown) for receiving a version query request sent by the user equipment about the configuration file of the application, where the version query request includes version information of the configuration file; acquiring the latest version information of the application, and detecting whether the configuration file of the application is updated or not by comparing the latest version information with the version information in the version inquiry request; returning version query result information about the configuration file to the user equipment, wherein the version query result information comprises version update information or no version update information.
Here, the specific implementation manners corresponding to the two or four modules are the same as or similar to the specific implementation manner of step S24, and thus are not repeated herein and are included herein by reference.
In some embodiments, the configuration request includes one or more target configuration index information; the two-two module includes two-one module (not shown), two-two module, and two-three module. And a module for two or one, which is used for acquiring all the most new configuration index information of the application. And the second-second module is used for detecting whether the quantity of the one or more target configuration index information is changed or not by comparing the one or more target configuration index information with the latest configuration index information. And the second, second and third modules are used for acquiring target configuration data and target version information of the target configuration data according to the detection result.
Here, the specific implementation manners of the two-in-one module, the two-in-two module, and the two-in-three module are the same as or similar to the specific implementation manners of the steps S221, S222, and S223, and thus are not described herein again and are included herein by reference.
In some embodiments, the detection result comprises: the second module, the third module and the fourth module are used for removing the deleted target configuration index information from the one or more target configuration index information; and the network equipment acquires the target configuration data and the target version information of the target configuration data according to the one or more target configuration index information after being removed.
Here, the specific implementation manner corresponding to the two, and three modules is the same as or similar to the specific implementation manner of step S223, and thus is not described again and is included herein by way of reference.
In some embodiments, the two three module is further to: generating deletion mark information of the deleted target configuration index information; the second and third modules are configured to send configuration result information to the user equipment, where the configuration result information includes the target configuration data, the target version information, and the deleted target configuration index information includes deletion marker information.
Here, the two-three module and the corresponding embodiments of the two-three module are the same as or similar to the embodiments of the step S223 and the step S23, and therefore, the detailed description is omitted, and the description is incorporated herein by reference.
In some embodiments, the detection result comprises: the second module is used for adding the newly added configuration index information into the one or more target configuration index information; and the network equipment acquires the target configuration data and the target version information of the target configuration data according to the added one or more pieces of target configuration index information.
Here, the specific implementation of the two modules is the same as or similar to the specific implementation of the step S22, and therefore, the detailed description is omitted here and is included herein by reference.
In some embodiments, the second module and the third module are configured to send configuration result information to the user equipment, where the configuration result information includes the target configuration data, the target version information, and the newly added configuration index information.
Here, the specific implementation manners corresponding to the two or three modules are the same as or similar to the specific implementation manner of step S23, and thus are not repeated herein and are included herein by reference.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 8 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 8, the system 300 can be implemented as any of the devices described in the various embodiments. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (20)

1. A method for configuring data for an application, applied to a user equipment, wherein the method comprises:
responding to starting operation of a user on an application, and detecting whether an index file copy of the application exists locally on user equipment;
if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file;
and sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information.
2. The method of claim 1, wherein the detecting whether the index file copy of the application exists locally on the user equipment in response to a user starting operation on the application comprises:
detecting whether a configuration file of the application exists locally on the user equipment or not in response to the starting operation of the application by the user, wherein the configuration file comprises configuration data of the application;
if yes, starting the application by reading the configuration data; otherwise, detecting whether the index file copy of the application exists locally in the user equipment.
3. The method of claim 2, wherein the application is launched by reading the configuration data, if any; otherwise, detecting whether the index file copy of the application exists locally in the user equipment, including:
if the configuration file exists, sending a version query request about the configuration file to the network equipment, wherein the version query request comprises version information of configuration data in the configuration file;
receiving version query result information which is returned by the network equipment and relates to the configuration file;
if the version query result information comprises version update information, detecting whether an index file copy of the application exists locally in the user equipment; otherwise, starting the application by reading the configuration data in the configuration file.
4. The method of any of claims 1-3, wherein the method further comprises:
and receiving configuration result information returned by the network equipment based on the configuration request, wherein the configuration result information comprises the target configuration data and target version information of the target configuration data.
5. The method of claim 4, wherein the configuration result information further includes deleted target configuration index information, wherein the deleted target configuration index information includes deletion flag information;
the method further comprises the following steps:
and establishing or updating the index file copy according to the deleted target configuration index information.
6. The method of claim 5, wherein the creating or updating the index file copy according to the deleted target configuration index information comprises:
if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy;
searching a corresponding configuration index information copy according to the deleted target configuration index information;
and deleting the configuration index information copy from the index file copy.
7. The method of claim 5, wherein the creating or updating the index file copy according to the deleted target configuration index information comprises:
if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application, wherein the index file copy comprises a configuration index information copy;
searching a corresponding configuration index information copy according to the deleted target configuration index information;
and deleting the configuration index information copy from the index file copy.
8. The method of claim 4, wherein the configuration result information further includes newly added configuration index information;
the method further comprises the following steps:
and establishing or updating the index file copy according to the newly added configuration index information.
9. The method of claim 8, wherein the creating or updating the index file copy according to the newly added configuration index information comprises:
if the index file copy of the application does not exist locally in the user equipment, establishing an index file copy of the application, wherein the index file copy comprises all initial configuration index information in the index file, and the initial configuration index information is used as a configuration index information copy in the index file copy;
and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy.
10. The method of claim 8, wherein the creating or updating the index file copy according to the newly added configuration index information comprises:
if the index file copy of the application exists locally in the user equipment, updating the index file copy of the application;
and adding the newly added configuration index information into the index file copy to serve as a new configuration index information copy.
11. A method for configuring data for an application, applied to a network device, wherein the method comprises:
receiving a configuration request about an application, which is sent by user equipment, wherein the configuration request comprises target configuration index information, and the configuration request is sent by the user equipment in response to a starting operation of the application by a user and by detecting whether an index file copy of the application exists locally in the user equipment;
acquiring target configuration data and target version information of the target configuration data according to the target configuration index information;
and sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data and the target version information.
12. The method of claim 11, wherein the method further comprises:
receiving a version query request about a configuration file of the application, which is sent by the user equipment, wherein the version query request comprises version information of the configuration file;
acquiring the latest version information of the application, and detecting whether the configuration file of the application is updated or not by comparing the latest version information with the version information in the version inquiry request;
returning version query result information about the configuration file to the user equipment, wherein the version query result information comprises version update information or no version update information.
13. The method of claim 11, wherein the configuration request includes one or more target configuration index information;
the acquiring target configuration data according to the target configuration index information and the target version information of the target configuration data includes:
acquiring all the most new configuration index information of the application;
detecting whether the quantity of the one or more target configuration index information is changed or not by comparing the one or more target configuration index information with the latest configuration index information;
and acquiring target configuration data and target version information of the target configuration data according to the detection result.
14. The method of claim 13, wherein the detection result comprises: the one or more pieces of target configuration index information include deleted target configuration index information, and the obtaining of the target configuration data and the target version information of the target configuration data according to the detection result includes:
removing the deleted target configuration index information from the one or more target configuration index information;
and acquiring the target configuration data and the target version information of the target configuration data according to the one or more target configuration index information after being removed.
15. The method of claim 14, wherein the removing the deleted target configuration index information from the one or more target configuration index information; acquiring the target configuration data and the target version information of the target configuration data according to the one or more target configuration index information after being removed, and further comprising:
generating deletion mark information of the deleted target configuration index information;
the sending of configuration result information to the user equipment, where the configuration result information includes the target configuration data and the target version information, includes:
and sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data, the target version information and the deleted target configuration index information, and the deleted target configuration index information comprises deletion mark information.
16. The method of claim 11, wherein the detection result comprises: the application has newly added configuration index information, and the acquiring of the target configuration data and the target version information of the target configuration data according to the target configuration index information includes:
adding the newly added configuration index information to the one or more target configuration index information;
and acquiring the target configuration data and the target version information of the target configuration data according to the added one or more pieces of target configuration index information.
17. The method of claim 16, wherein the sending configuration result information to the user equipment, wherein the configuration result information includes the target configuration data and the target version information, comprises:
and sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data, the target version information and the newly added configuration index information.
18. A method for configuring data for an application, wherein the method comprises:
the method comprises the steps that user equipment responds to starting operation of a user on an application, and whether an index file copy of the application exists in the local area of the user equipment is detected; if so, determining the configuration index information copy in the index file copy as target configuration index information; otherwise, acquiring the index file of the application, and determining target configuration index information from the initial configuration index information in the index file; sending a configuration request to corresponding network equipment, wherein the configuration request comprises the target configuration index information;
the network equipment receives the configuration request, and acquires target configuration data and target version information of the target configuration data according to the target configuration index information; sending configuration result information to the user equipment, wherein the configuration result information comprises the target configuration data and the target version information;
and the user equipment receives the configuration result information.
19. An apparatus for configuring data for an application, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 17.
20. A computer-readable medium storing instructions that, when executed, cause a system to perform operations to perform a method as recited in any of claims 1-17.
CN202010929409.7A 2020-09-07 2020-09-07 Method and equipment for configuring data for application Pending CN112241473A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010929409.7A CN112241473A (en) 2020-09-07 2020-09-07 Method and equipment for configuring data for application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010929409.7A CN112241473A (en) 2020-09-07 2020-09-07 Method and equipment for configuring data for application

Publications (1)

Publication Number Publication Date
CN112241473A true CN112241473A (en) 2021-01-19

Family

ID=74171190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010929409.7A Pending CN112241473A (en) 2020-09-07 2020-09-07 Method and equipment for configuring data for application

Country Status (1)

Country Link
CN (1) CN112241473A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1229944A (en) * 1998-03-20 1999-09-29 太阳微系统有限公司 System and method for reducing footprint of preloaded classes
CN101416188A (en) * 2006-04-06 2009-04-22 Nhn公司 System and method for executing program in local computer
CN103023981A (en) * 2012-11-21 2013-04-03 北京航空航天大学 Cloud computation system
CN106569859A (en) * 2016-10-28 2017-04-19 搜游网络科技(北京)有限公司 Method and device for loading object file
CN107817994A (en) * 2016-08-29 2018-03-20 北京雪球信息科技有限公司 The operation method of mobile terminal network application program
CN109582386A (en) * 2018-11-09 2019-04-05 聚好看科技股份有限公司 Service starting processing method, device, electronic equipment and readable storage medium storing program for executing
CN109901874A (en) * 2019-03-06 2019-06-18 珠海金山网络游戏科技有限公司 A kind of file loading method and device calculate equipment and storage medium
CN110287007A (en) * 2019-05-20 2019-09-27 深圳壹账通智能科技有限公司 Data call response method, server and computer readable storage medium
CN110377369A (en) * 2019-07-25 2019-10-25 上海连尚网络科技有限公司 A kind of method, equipment and computer storage medium running small routine
CN111562949A (en) * 2019-01-29 2020-08-21 飞狐信息技术(天津)有限公司 Model file loading method and device
CN111580881A (en) * 2020-04-30 2020-08-25 支付宝(杭州)信息技术有限公司 File loading method and device and electronic equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1229944A (en) * 1998-03-20 1999-09-29 太阳微系统有限公司 System and method for reducing footprint of preloaded classes
CN101416188A (en) * 2006-04-06 2009-04-22 Nhn公司 System and method for executing program in local computer
CN103023981A (en) * 2012-11-21 2013-04-03 北京航空航天大学 Cloud computation system
CN107817994A (en) * 2016-08-29 2018-03-20 北京雪球信息科技有限公司 The operation method of mobile terminal network application program
CN106569859A (en) * 2016-10-28 2017-04-19 搜游网络科技(北京)有限公司 Method and device for loading object file
CN109582386A (en) * 2018-11-09 2019-04-05 聚好看科技股份有限公司 Service starting processing method, device, electronic equipment and readable storage medium storing program for executing
CN111562949A (en) * 2019-01-29 2020-08-21 飞狐信息技术(天津)有限公司 Model file loading method and device
CN109901874A (en) * 2019-03-06 2019-06-18 珠海金山网络游戏科技有限公司 A kind of file loading method and device calculate equipment and storage medium
CN110287007A (en) * 2019-05-20 2019-09-27 深圳壹账通智能科技有限公司 Data call response method, server and computer readable storage medium
CN110377369A (en) * 2019-07-25 2019-10-25 上海连尚网络科技有限公司 A kind of method, equipment and computer storage medium running small routine
CN111580881A (en) * 2020-04-30 2020-08-25 支付宝(杭州)信息技术有限公司 File loading method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN109359237B (en) Method and equipment for searching hosted program
CN109408696B (en) Method and equipment for searching hosted program
US20130055371A1 (en) Storage control method and information processing apparatus
WO2016180055A1 (en) Method, device and system for storing and reading data
CN112104663B (en) Method and equipment for managing login user and user equipment
US11797494B2 (en) Snapshot management in distributed file systems
US9600486B2 (en) File system directory attribute correction
WO2020135212A1 (en) Method and device for searching for hosting program
CN111212183B (en) Method, device and computer readable medium for running hosted application
CN111506232B (en) Method and equipment for controlling menu display in reading application
CN111162990B (en) Method and equipment for presenting message notification
CN110780887A (en) Method and equipment for providing application installation package
WO2018233473A1 (en) Method and device for configuring wireless routing device
CN111325574A (en) Method and equipment for providing presence information
US20130282975A1 (en) Systems and methods for backing up storage volumes in a storage system
CN112866302B (en) Method, apparatus, medium and program product for integrity checking of cluster data
CN110768894A (en) Method and equipment for deleting session message
WO2019120226A1 (en) Data access prediction method and apparatus
CN114924696B (en) Method, apparatus, medium, and program product for storage management
CN112241473A (en) Method and equipment for configuring data for application
CN114296651B (en) Method and device for storing custom data information
WO2012171363A1 (en) Method and equipment for data operation in distributed cache system
CN111181864B (en) Method and apparatus for determining link congestion status from an application to a server
CN114697450A (en) Method, device and medium for determining outbound line
CN112788539A (en) Method and equipment for tracking user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination