CN113687891B - Data management method, device and equipment - Google Patents

Data management method, device and equipment Download PDF

Info

Publication number
CN113687891B
CN113687891B CN202110815672.8A CN202110815672A CN113687891B CN 113687891 B CN113687891 B CN 113687891B CN 202110815672 A CN202110815672 A CN 202110815672A CN 113687891 B CN113687891 B CN 113687891B
Authority
CN
China
Prior art keywords
application
host
data
data management
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110815672.8A
Other languages
Chinese (zh)
Other versions
CN113687891A (en
Inventor
黄智辉
高林峰
乐开明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Innovation Private Ltd
Original Assignee
Alibaba Innovation Private Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Innovation Private Ltd filed Critical Alibaba Innovation Private Ltd
Priority to CN202110815672.8A priority Critical patent/CN113687891B/en
Publication of CN113687891A publication Critical patent/CN113687891A/en
Application granted granted Critical
Publication of CN113687891B publication Critical patent/CN113687891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/34Graphical or visual programming
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the application provides a data management method, a device and equipment, wherein the method comprises the following steps: displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function; and calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program. The application can ensure the security and controllability of the data provided by the host application to the parasitic application and can reduce the development cost of the parasitic application.

Description

Data management method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data management method, apparatus, and device.
Background
An applet is an application that runs on a host application without downloading and installing.
In general, an applet running on a host application needs to provide a data management page, on one hand, the applet may obtain data through the data management page provided by the applet, and on the other hand, the applet needs to obtain data from the host application, so as to ensure the security and controllability of the data provided by the host application to the applet, and reduce the development cost of the applet developer, which is a problem that needs to be solved by the developer providing the host application.
Disclosure of Invention
The embodiment of the application provides a data management method, a device and equipment, which are used for solving the problems of ensuring the safety and controllability of data provided by a host application to an applet and reducing the development cost of an applet developer in the prior art.
In a first aspect, an embodiment of the present application provides a data management method, including:
Displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
And calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program.
In a second aspect, an embodiment of the present application provides a data management apparatus, including:
The display module is used for displaying a page of the parasitic application, wherein the page comprises a control used for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and the calling module is used for responding to the interactive operation aiming at the control, calling and running the public program and realizing data management through the public program.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions which, when executed by the processor, implement the method of any of the first aspects.
In a fourth aspect, embodiments of the present application provide a computer program product comprising computer instructions which, when executed by a processor, implement the steps of the method of any of the first aspects.
Embodiments of the present application also provide a computer readable storage medium storing a computer program, the computer program comprising at least one piece of code executable by a computer to control the computer to perform the method according to any one of the first aspects.
In the embodiment of the application, a developer of the host application can develop the public program for providing the data management function on the host application, the public program is positioned between the parasitic application and the host application, the data management is realized through the public program, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the public program can limit the parasitic application to acquire the host data, the host data can be prevented from being randomly acquired by the parasitic application, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a data management method according to an embodiment of the application;
FIG. 2 is a schematic diagram illustrating the relationship among a parasitic application, a common program and a host application according to an embodiment of the present application;
FIG. 3 is a schematic diagram showing the relationship among a parasitic application, a common program and a host application according to another embodiment of the present application;
FIG. 4 is a schematic flow chart of interaction among a parasitic application, a public program, a host application and a server according to an embodiment of the present application;
FIGS. 5A-5D are schematic diagrams of pages according to embodiments of the present application;
FIG. 6 is a schematic diagram of a data management device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plurality" generally includes at least two, but does not exclude the case of at least one.
It should be understood that the term "and/or" as used herein is merely one relationship describing the association of the associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a product or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such product or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a commodity or system comprising such elements.
In addition, the sequence of steps in the method embodiments described below is only an example and is not strictly limited.
In order to facilitate understanding of the technical solution provided by the embodiments of the present application by those skilled in the art, a technical environment in which the technical solution is implemented is first described below.
In the related art, the applet acquires data from the host application by calling an interface function provided by the host application, or the applet provides a data management page and acquires data through the data management page provided by the applet. However, the former method has a problem that data in the host application is randomly acquired by the applet, resulting in an uncontrolled and reduced security problem, and the latter method has a problem of high development cost of the applet, so there is a need in the related art for a data management method capable of guaranteeing the security and controllability of the data provided to the applet by the host application and reducing the development cost of the applet developer.
Based on the actual technical requirements similar to those described above, the data management method provided by the application can ensure the safety and controllability of the data provided by the host application to the applet by using a technical means, and reduce the development cost of the applet developer.
The data management method provided by the embodiment of the application can be applied to any type of electronic equipment capable of deploying Application (APP). An application program which can be used as a host of other application programs, namely a host application, can be deployed in the electronic equipment, and the application program which is parasitized in the host application and runs by depending on the host application, namely a parasitized application. In one embodiment, the parasitic application may be specifically an applet.
It should be noted that, when the application program includes a client application program and a server application program, the host application in the embodiment of the present application specifically refers to an application program client as a host.
In order to ensure the controllability of the parasitic application to acquire data from the host application and reduce the development cost of a developer of the parasitic application, in the embodiment of the application, the developer of the host application can develop a public program for providing a data management function on the host application, the public program is positioned between the parasitic application and the host application, the data management is realized through the public program, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the parasitic application can be limited to acquire host data by the public program, the host data is prevented from being acquired randomly by the parasitic application, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
It should be noted that, in the embodiment of the present application, the parasitic application is mainly exemplified as a applet.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is a flow chart of a data management method according to an embodiment of the present application, and an execution subject of the embodiment may be the aforementioned electronic device. As shown in fig. 1, the method of the present embodiment may include:
Step 11, displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and step 12, calling and running the common program in response to the interaction operation of the control, and realizing data management through the common program.
In the embodiment of the application, the specific form of the public program can be flexibly realized. In one embodiment, the common program may be implemented in the form of an applet. In another embodiment, the common program may be implemented in the form of a plug-in.
The relationship between the host application, the parasitic application and the common program may be as shown in fig. 2. Referring to fig. 2, a common program 21 is located between a host application 22 and a parasitic application 23, the parasitic application 23 may call the common program 21 under the triggering of an interactive operation, and the common program 21 may call an interface function of the host application 22 as needed. It should be noted that the number of parasitic applications that are parasitic in the same host application may be one or more. When the number of parasitic applications is plural, as shown in fig. 3, the plural parasitic applications may call the common program at different times.
In the embodiment of the present application, the control used for triggering the parasitic application to call the public program in the page of the parasitic application may be, for example, a button control, and of course, in other embodiments, may be other types of control. It is understood that the type of interaction for a control corresponds to the type of control. For example, when the control is a button control, the interactive operation for the control may be, for example, a click operation.
In the embodiment of the application, the public program can provide a data management function in a page mode. Pages in the common program may be rendered, for example, from a web page view (webview). In one embodiment, the page layout of the common program may be fixed, thereby facilitating simplified implementation.
Optionally, a return button for returning to the page of the parasitic application is included in the page of the common program. Therefore, the page of the public program can be regarded as the page of the parasitic application by the user, so that the public program is not perceived by the user, and the use experience of the user is improved.
In the embodiment of the application, the public program can provide a data management function and can be flexibly realized according to requirements. By way of example, the data management function may include at least one of: an add function, a query function, a modify function, a delete function, or an authorize function.
Where the query function refers to a function for providing query hosting data. Based on this, the implementation of data management by the common program may specifically include: the method includes invoking a first interface function of the host application by the common program to obtain host data from the host application and displaying the host data in a page of the common program. Therefore, the repeated input of the data existing in the host application by the user can be avoided, and the use experience is improved. Wherein the first interface function is an interface function provided by the host application for querying the data.
The authorization function refers to a function for providing authorization data, and in one embodiment, the authorization function may be used to authorize queried host data. Based on this, the page of the common program may include an authorization control, such as an authorization button, where the data management is implemented by the common program, and may further include: when an authorization operation instruction aiming at the queried host data is acquired through an authorization control, generating an authorization identifier of the host data; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the host data to the parasitic application as a call return value. Therefore, the user can select whether the queried host data is authorized to the parasitic application, and the problem that the parasitic application does not obtain the queried host data by the authorization of the user is avoided. The authorization identifier may be obtained, for example, by taking the information-Digest Algorithm 5 (MD 5) of the queried host data, which is beneficial to improving the security of the host data.
Further, if the authorization operation instruction is not acquired, the preset authorization failure data can be used as a call return value. So that the parasitic application can learn that the reason for not successfully obtaining the data is that the authorization failed, i.e. the user does not agree with the authorization.
Further, if the binding success indication returned by the server is not received, the preset internal abnormal data can be used as a call return value. Therefore, the parasitic application can know that the reason for unsuccessful data acquisition is internal abnormality, namely the user agrees with the authorization, but fails to return the data due to abnormality in the authorization process.
The modification function refers to a function for providing modified queried host data. Based on this, modification controls may be included in pages of the common program; the implementation of data management by the common program may further include: when a modification operation instruction aiming at the queried host data is acquired through a modification control, the queried host data is correspondingly modified according to the modification operation instruction, and modified host data is obtained.
Further, the implementing data management by the common program may further include: when a modification operation instruction for the queried host data is acquired through the modification control, a second interface function of the host application is called through the public program so as to correspondingly modify the host data in the host application. Therefore, the user can modify the queried host data in the process of using the public program, can be stored in the host application local, does not need repeated modification in the process of using the host application, and is beneficial to improving the use experience. Wherein the second interface function is an interface function provided by the host application for modifying the data.
In one embodiment, the authorization function may be used to authorize the modified host data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction aiming at the modified host data is obtained through an authorization control, an authorization identification of the modified host data is generated; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the modified host data to the parasitic application as a call return value. Therefore, the user can select whether to authorize the modified host data to the parasitic application, and the problem that the parasitic application does not acquire the modified host data through the authorization of the user is avoided.
The add function refers to a function for providing add data. Based on this, the implementing data management by the common program may include: and acquiring input data through the page of the public program.
Further, the implementing data management by the common program may further include: and calling a third interface function of the host application through the public program to transfer the input data to the host application. Therefore, the user can add the data in the process of using the public program, can act on the host application, is stored in the local area of the host application, does not need to repeatedly add the data in the process of using the host application, and is beneficial to improving the use experience. Wherein the third interface function is an interface function provided by the host application for the newly added data.
In one embodiment, an authorization function may be used to authorize input data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction aiming at input data is obtained through an authorization control, an authorization identification of the input data is generated; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the input data to the parasitic application as a call return value. Therefore, a user can select whether to authorize the input data to the parasitic application, and the problem that the parasitic application does not authorize the user to acquire the input data is avoided.
The deletion function refers to a function for providing deletion of the queried host data. Based on this, a delete control may be included in the page of the common program; the implementation of data management by the common program may further include: when a deletion operation instruction for the queried host data is acquired through a deletion control, deleting the queried host data according to the deletion operation instruction.
Further, the implementing data management by the common program may further include: when the deleting operation for the queried host data is obtained through the deleting control, a fourth interface function of the host application is called through the public program so as to delete the host data in the host application. Therefore, the user can delete the queried host data in the process of using the public program, can act on the host application and delete the host data locally from the host application, does not need to be repeatedly deleted in the process of using the host application, and is beneficial to improving the use experience. Wherein the fourth interface function is an interface function provided by the host application for deleting data.
In the embodiment of the application, the page layout of the public program can be variable, so that the flexibility of page display is improved. Based on this, the calling and running the common program may include: invoking and running the common program using the target parameters; the implementation of data management by the common program may further include: and rendering and displaying the pages of the common program by adopting display logic corresponding to the target parameters.
Taking the function of querying host data from a host application through a common program and deciding whether to authorize the queried host data to a parasitic application by a user as an example, interactions of the parasitic application, the common program, the host application, and the server may be as shown in fig. 4, for example. Referring to fig. 4, in step 41, a user inputs an interactive operation for a specific control in a page of a parasitic application for triggering a call to a common program. As shown in fig. 5A, taking the host application as a map-type application, the parasitic application as an applet x providing a vehicle violation query function as an example, the "add vehicle" button in fig. 5A may represent a specific control for triggering the invocation of the public program, and the user input of a click operation for the "add vehicle" button may trigger the applet x to invoke the public program. It will be appreciated that the page shown in FIG. 5A is that of applet x.
Next, in step 42, the parasitic application invokes a common procedure in response to the interactive operation for the particular control. In step 43 the common program invokes the first interface function of the host application and in step 44 the host application passes the queried host data to the common program as an invocation return value. The common program may display the queried host data in a page of the common program to request the user to authorize the queried host data in step 45. After steps 42 through 45, the page shown in fig. 5A may be jumped to the page shown in fig. 5B. The number "123" and the number "123456" in fig. 5B represent the queried host data, the "immediate grant" button may represent the grant control, and the "<" button in the upper left corner may represent the aforementioned return button.
Thereafter, if the common program obtains an authorized operation instruction for the queried host data from the user, the common program may send a binding request to the server for requesting binding of the queried host data and the parasitic application in step 46. For example, if a click operation for the "immediate authorization" button in fig. 5B is acquired, a binding request for requesting that applet x be bound with license plate number "123" and engine number "123456" may be sent to the server side.
If the server successfully binds the queried host data with the parasitic application, the server returns a binding success indication to the common program in step 47. Further, in step 48, the common program may pass the queried host data to the parasitic application as a call return value. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the host data). For example, on the basis of fig. 5B, if the common program first obtains the clicking operation of the user on the "immediate authorization" button and then obtains the clicking operation of the user on the "<" button, the common program may transmit the license plate number "123" and the engine number "123456" to the parasitic application, and the parasitic application may query the license plate number "123" and the engine number "123456" to obtain corresponding violation information, and display the obtained violation information in the page as shown in fig. 5C, where the violation information may include, for example, the number of violations, the fine to be paid, and the deduction. It will be appreciated that the page shown in FIG. 5C is also the page of applet x.
If the common program does not receive a binding success indication returned by the server, then the common program may pass the internal exception data to the parasitic application as a call return value in step 49. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the internal exception data).
If the common program does not obtain an authorization operation instruction for the queried authorization data, then the common program may pass authorization failure data to the parasitic application as a call return value in step 410. Thereafter, in step 411, the parasitic application may perform corresponding processing and display according to the returned data (i.e., the authorization failure data). For example, on the basis of fig. 5B, if the common program does not acquire the click operation instruction for the "immediate authorization" button before acquiring the click operation instruction for the "<" button, the common program may transfer authorization failure data to the parasitic application, the parasitic application may determine authorization failure according to the authorization failure data, and display prompt information for prompting the authorization failure in a page as shown in fig. 5D, and the prompt information for prompting the authorization failure may be "unauthorized", for example. It will be appreciated that the page shown in FIG. 5D is also the page of applet x.
It should be noted that the pages shown in fig. 5A to 5D are only examples.
According to the data management method provided by the embodiment of the application, the page of the parasitic application is displayed, the page comprises the control for triggering the parasitic application to call the public program, the public program is positioned between the parasitic application and the host application of the parasitic application, the public program is called and operated in response to the interaction operation aiming at the control, and the data management is realized through the public program, so that the data management is realized by the public program positioned between the host application and the parasitic application, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the public program can limit the parasitic application to acquire the host data, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
In addition, data management is realized through the public program, a User Interface (UI) style of a data management page can be unified, and the use experience of a User is improved. Under the condition that a plurality of host applications are operated in the same host application, the common program provides a data management function, so that resources required for operating the parasitic application can be saved, and the page loading speed of the parasitic application can be improved.
FIG. 6 is a schematic diagram of a data management device according to an embodiment of the present application; referring to fig. 6, the present embodiment provides a data management apparatus, which may perform the above-described data management method, and in particular, the data management apparatus may include:
A display module 61, configured to display a page of a parasitic application, where the page includes a control for triggering the parasitic application to call a common program, where the common program is located between the parasitic application and a host application thereof, and is configured to provide a data management function;
and the calling module 62 is used for calling and running the common program in response to the interaction operation for the space and realizing data management through the common program.
Optionally, the data management function includes at least one of: an add function, a query function, a modify function, a delete function, or an authorize function.
Optionally, the calling module 62 is configured to implement data management by using the common program, including: and calling a first interface function of the host application through the public program to acquire host data from the host application, and displaying the host data in a page of the public program.
Optionally, the page of the public program comprises an authorization control; the calling module 62 is configured to implement data management by using the common program, and further includes: when an authorization operation instruction for the host data is acquired through the authorization control, generating an authorization identifier of the host data; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the host data to the parasitic application as a call return value.
Optionally, the page of the public program includes a modification control; the calling module 62 is configured to implement data management by using the common program, and further includes: when a modification operation instruction for the host data is acquired through the modification control, a second interface function of the host application is called through the public program so as to correspondingly modify the host data in the host application.
Optionally, the calling module 62 is configured to implement data management by using the common program, including: acquiring input data through the displayed page of the public program; and invoking a third interface function of the host application via the common program to transfer the input data to the host application.
Optionally, the calling module 62 is configured to call and run the common program, including: invoking and running the common program using the target parameters; the calling module 62 is configured to implement data management by using the common program, and further includes: and rendering and displaying the page of the public program by adopting the display logic corresponding to the target parameter.
The apparatus shown in fig. 6 may perform the method of the embodiment shown in fig. 1, and reference is made to the relevant description of the embodiment shown in fig. 1 for parts of this embodiment not described in detail. The implementation process and the technical effect of this technical solution refer to the description in the embodiment shown in fig. 1, and are not repeated here.
In one possible implementation, the structure of the data management apparatus shown in fig. 6 may be implemented as an electronic device. As shown in fig. 7, the electronic device may include: a processor 71 and a memory 72. Wherein the memory 72 is for storing a program for supporting the electronic device to execute the data management method provided in the embodiment shown in fig. 1 described above, the processor 71 is configured for executing the program stored in the memory 72.
The program comprises one or more computer instructions, wherein the one or more computer instructions, when executed by the processor 71, are capable of performing the steps of:
Displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
And calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program.
Optionally, the processor 71 is further configured to perform all or part of the steps of 1 in the embodiment shown in fig. 1.
The electronic device may also include a communication interface 73 in its structure for communicating with other devices or communication networks.
In addition, an embodiment of the present application provides a computer storage medium for storing computer software instructions for an electronic device, where the computer storage medium includes a program for executing the data management method according to the embodiment of the method shown in fig. 1.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by adding necessary general purpose hardware platforms, or may be implemented by a combination of hardware and software. Based on such understanding, the foregoing aspects, in essence and portions contributing to the art, may be embodied in the form of a computer program product, which may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (9)

1.一种数据管理方法,其中,所述方法包括:1. A data management method, wherein the method comprises: 显示寄生应用的页面,所述页面中包括用于触发所述寄生应用调用公共程序的控件和授权控件,所述公共程序位于所述寄生应用与其宿主应用之间,用于提供数据管理功能,所述数据管理功能包括授权功能;Displaying a page of a parasitic application, the page including a control and an authorization control for triggering the parasitic application to call a public program, the public program being located between the parasitic application and its host application and being used to provide a data management function, the data management function including an authorization function; 响应于针对所述调用公共程序的控件的交互操作,调用并运行所述公共程序,并通过所述公共程序实现数据管理;In response to the interactive operation on the control that calls the public program, calling and running the public program, and implementing data management through the public program; 其中,所述通过所述公共程序实现数据管理,包括:Wherein, the data management is realized through the public program, including: 通过所述授权控件获取到针对宿主数据的授权操作指令时,生成所述宿主数据的授权标识;When obtaining the authorization operation instruction for the host data through the authorization control, generating the authorization identifier of the host data; 根据所述授权标识向所述宿主应用的服务端发送用于请求绑定所述授权标识与所述寄生应用的绑定请求;Sending a binding request for requesting to bind the authorization identifier with the parasitic application to the server of the host application according to the authorization identifier; 响应于所述服务端返回的绑定成功指示,将所述宿主数据作为调用返回值传递给所述寄生应用。In response to a binding success indication returned by the server, the host data is passed to the parasitic application as a call return value. 2.根据权利要求1所述的方法,其中,所述数据管理功能包括下述中的至少一种:添加功能、查询功能、修改功能、删除功能或授权功能。2 . The method according to claim 1 , wherein the data management function comprises at least one of the following: an adding function, a querying function, a modifying function, a deleting function or an authorizing function. 3.根据权利要求2所述的方法,其中,所述通过所述公共程序实现数据管理,还包括:3. The method according to claim 2, wherein the implementing data management through the public program further comprises: 通过所述公共程序调用所述宿主应用的第一接口函数,以从所述宿主应用获取宿主数据,并将所述宿主数据显示在所述公共程序的页面中。The first interface function of the host application is called by the public program to obtain host data from the host application, and the host data is displayed in the page of the public program. 4.根据权利要求3所述的方法,其中,所述公共程序的页面中包括修改控件;所述通过所述公共程序实现数据管理,还包括:4. The method according to claim 3, wherein the page of the public program includes a modification control; and the implementing data management through the public program further comprises: 通过所述修改控件获取到针对所述宿主数据的修改操作指令时,通过所述公共程序调用所述宿主应用的第二接口函数,以对所述宿主应用中的所述宿主数据进行相应修改。When a modification operation instruction for the host data is obtained through the modification control, the second interface function of the host application is called through the public program to modify the host data in the host application accordingly. 5.根据权利要求2所述的方法,其中,所述通过所述公共程序实现数据管理,包括:5. The method according to claim 2, wherein the implementing data management through the public program comprises: 通过展示的所述公共程序的页面获取输入数据;Acquiring input data through the displayed page of the public program; 通过所述公共程序调用所述宿主应用的第三接口函数,以将所述输入数据传递给所述宿主应用。The third interface function of the host application is called through the public program to pass the input data to the host application. 6.根据权利要求3或5所述的方法,其中,所述调用并运行所述公共程序,包括:使用目标参数调用并运行所述公共程序;6. The method according to claim 3 or 5, wherein the calling and running the public program comprises: calling and running the public program using a target parameter; 所述通过所述公共程序实现数据管理,还包括:采用与所述目标参数对应的展示逻辑,对所述公共程序的页面进行渲染显示。The implementing of data management through the public program further includes: using a display logic corresponding to the target parameter to render and display a page of the public program. 7.一种数据管理装置,其中,所述装置包括:7. A data management device, wherein the device comprises: 显示模块,用于显示寄生应用的页面,所述页面中包括用于触发所述寄生应用调用公共程序的控件和授权控件,所述公共程序位于所述寄生应用与其宿主应用之间,用于提供数据管理功能;A display module, used to display a page of a parasitic application, wherein the page includes a control and an authorization control for triggering the parasitic application to call a public program, wherein the public program is located between the parasitic application and its host application and is used to provide a data management function; 调用模块,用于响应于针对所述调用公共程序的控件的交互操作,调用并运行所述公共程序,并通过所述公共程序实现数据管理;A calling module, for calling and running the public program in response to an interactive operation on the control for calling the public program, and realizing data management through the public program; 其中,所述通过所述公共程序实现数据管理,包括:Wherein, the data management is realized through the public program, including: 通过所述授权控件获取到针对宿主数据的授权操作指令时,生成所述宿主数据的授权标识;When obtaining the authorization operation instruction for the host data through the authorization control, generating the authorization identifier of the host data; 根据所述授权标识向所述宿主应用的服务端发送用于请求绑定所述授权标识与所述寄生应用的绑定请求;Sending a binding request for requesting to bind the authorization identifier with the parasitic application to the server of the host application according to the authorization identifier; 响应于所述服务端返回的绑定成功指示,将所述宿主数据作为调用返回值传递给所述寄生应用。In response to a binding success indication returned by the server, the host data is passed to the parasitic application as a call return value. 8.一种电子设备,包括:存储器、处理器;其中,所述存储器用于存储一条或多条计算机指令,其中,所述一条或多条计算机指令被所述处理器执行时实现如权利要求1至6中任一项所述的方法。8. An electronic device, comprising: a memory and a processor; wherein the memory is used to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the method as described in any one of claims 1 to 6. 9.一种计算机程序产品,包括计算机指令,其中,该计算机指令被处理器执行时实现权利要求1至6中任一项所述方法的步骤。9. A computer program product, comprising computer instructions, wherein when the computer instructions are executed by a processor, the steps of the method according to any one of claims 1 to 6 are implemented.
CN202110815672.8A 2021-07-19 2021-07-19 Data management method, device and equipment Active CN113687891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110815672.8A CN113687891B (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110815672.8A CN113687891B (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Publications (2)

Publication Number Publication Date
CN113687891A CN113687891A (en) 2021-11-23
CN113687891B true CN113687891B (en) 2024-09-27

Family

ID=78577439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110815672.8A Active CN113687891B (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Country Status (1)

Country Link
CN (1) CN113687891B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531432A (en) * 2022-02-14 2022-05-24 浙江吉利控股集团有限公司 Cross-platform based service communication method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782300A (en) * 2020-07-08 2020-10-16 支付宝(杭州)信息技术有限公司 A data processing method, device, equipment and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110083413A (en) * 2019-03-13 2019-08-02 维沃移动通信有限公司 A kind of small routine call method and terminal device
CN110083465B (en) * 2019-04-26 2021-08-17 上海连尚网络科技有限公司 Data transmission method between boarded applications
CN111158799A (en) * 2019-12-31 2020-05-15 北京百度网讯科技有限公司 A page rendering method, device, electronic device and storage medium
CN111767069B (en) * 2020-06-30 2024-03-15 北京百度网讯科技有限公司 Mini program processing methods, servers, equipment and storage media
CN111737032B (en) * 2020-07-27 2020-11-20 腾讯科技(深圳)有限公司 Subprogram running method and device based on microkernel system and electronic equipment
CN112416613B (en) * 2020-10-23 2022-09-20 腾讯科技(深圳)有限公司 Application data processing method, device, equipment and medium
CN112559980B (en) * 2020-11-24 2023-05-05 深圳凡泰极客科技有限责任公司 Applet runtime capable of embedding a plurality of random APP

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782300A (en) * 2020-07-08 2020-10-16 支付宝(杭州)信息技术有限公司 A data processing method, device, equipment and system

Also Published As

Publication number Publication date
CN113687891A (en) 2021-11-23

Similar Documents

Publication Publication Date Title
CN109032691B (en) Applet running method and device and storage medium
CN110222533B (en) Distributed data security application method and system and electronic equipment
US20190324772A1 (en) Method and device for processing smart contracts
JP6092249B2 (en) Virtual channel for embedded process communication
EP3493057B1 (en) Method and apparatus for awakening application by means of mobile browser
US9858164B1 (en) Providing an information technology management prescription
US10592660B2 (en) Capability access management
CN109783118B (en) FPGA cloud host development method and system
CN113672353B (en) A container-based task execution method and device
EP2357560B1 (en) Method and system for managing by a controller a generic data lock to a data object
CN112506590B (en) Interface calling method, device and electronic device
CN113687891B (en) Data management method, device and equipment
CN110858242A (en) Page skipping method and device
CN112613063A (en) Data verification system construction method and device
CN113835889A (en) Method for acquiring input event and related device
CN114254220A (en) Webpage view processing method and device and electronic equipment
CN108470125B (en) OLE redirection method and system based on virtual desktop
CN117195203A (en) Process protection method and device for operating system, computer equipment and storage medium
CN116186452A (en) Vue3-based page display method, device, computer equipment and storage medium
CN113535429B (en) Data processing method, device, equipment, medium and program product
CN112099920A (en) Method and device for creating secure desktop, electronic equipment and readable storage medium
CN116340960B (en) Method, device and storage medium for processing vehicle key
CN109783156A (en) A kind of starting control method and device of application
CN111967010B (en) Trusted service method, trusted service device, trusted service equipment and storage medium
CN119537143A (en) Vehicle service management system, vehicle service management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240308

Address after: # 03-06, Lai Zan Da Building 1, 51 Belarusian Road, Singapore

Applicant after: Alibaba Innovation Co.

Country or region after: Singapore

Address before: Room 01, 45th Floor, AXA Building, 8 Shanton Road, Singapore

Applicant before: Alibaba Singapore Holdings Ltd.

Country or region before: Singapore

GR01 Patent grant
GR01 Patent grant