CN113687891B - Data management method, device and equipment - Google Patents
Data management method, device and equipment Download PDFInfo
- Publication number
- CN113687891B CN113687891B CN202110815672.8A CN202110815672A CN113687891B CN 113687891 B CN113687891 B CN 113687891B CN 202110815672 A CN202110815672 A CN 202110815672A CN 113687891 B CN113687891 B CN 113687891B
- Authority
- CN
- China
- Prior art keywords
- application
- host
- data
- data management
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/34—Graphical or visual programming
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/38—Creation or generation of source code for implementing user interfaces
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Stored Programmes (AREA)
- Debugging And Monitoring (AREA)
Abstract
The embodiment of the application provides a data management method, a device and equipment, wherein the method comprises the following steps: displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function; and calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program. The application can ensure the security and controllability of the data provided by the host application to the parasitic application and can reduce the development cost of the parasitic application.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data management method, apparatus, and device.
Background
An applet is an application that runs on a host application without downloading and installing.
In general, an applet running on a host application needs to provide a data management page, on one hand, the applet may obtain data through the data management page provided by the applet, and on the other hand, the applet needs to obtain data from the host application, so as to ensure the security and controllability of the data provided by the host application to the applet, and reduce the development cost of the applet developer, which is a problem that needs to be solved by the developer providing the host application.
Disclosure of Invention
The embodiment of the application provides a data management method, a device and equipment, which are used for solving the problems of ensuring the safety and controllability of data provided by a host application to an applet and reducing the development cost of an applet developer in the prior art.
In a first aspect, an embodiment of the present application provides a data management method, including:
Displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
And calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program.
In a second aspect, an embodiment of the present application provides a data management apparatus, including:
The display module is used for displaying a page of the parasitic application, wherein the page comprises a control used for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and the calling module is used for responding to the interactive operation aiming at the control, calling and running the public program and realizing data management through the public program.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions which, when executed by the processor, implement the method of any of the first aspects.
In a fourth aspect, embodiments of the present application provide a computer program product comprising computer instructions which, when executed by a processor, implement the steps of the method of any of the first aspects.
Embodiments of the present application also provide a computer readable storage medium storing a computer program, the computer program comprising at least one piece of code executable by a computer to control the computer to perform the method according to any one of the first aspects.
In the embodiment of the application, a developer of the host application can develop the public program for providing the data management function on the host application, the public program is positioned between the parasitic application and the host application, the data management is realized through the public program, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the public program can limit the parasitic application to acquire the host data, the host data can be prevented from being randomly acquired by the parasitic application, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a data management method according to an embodiment of the application;
FIG. 2 is a schematic diagram illustrating the relationship among a parasitic application, a common program and a host application according to an embodiment of the present application;
FIG. 3 is a schematic diagram showing the relationship among a parasitic application, a common program and a host application according to another embodiment of the present application;
FIG. 4 is a schematic flow chart of interaction among a parasitic application, a public program, a host application and a server according to an embodiment of the present application;
FIGS. 5A-5D are schematic diagrams of pages according to embodiments of the present application;
FIG. 6 is a schematic diagram of a data management device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plurality" generally includes at least two, but does not exclude the case of at least one.
It should be understood that the term "and/or" as used herein is merely one relationship describing the association of the associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a product or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such product or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a commodity or system comprising such elements.
In addition, the sequence of steps in the method embodiments described below is only an example and is not strictly limited.
In order to facilitate understanding of the technical solution provided by the embodiments of the present application by those skilled in the art, a technical environment in which the technical solution is implemented is first described below.
In the related art, the applet acquires data from the host application by calling an interface function provided by the host application, or the applet provides a data management page and acquires data through the data management page provided by the applet. However, the former method has a problem that data in the host application is randomly acquired by the applet, resulting in an uncontrolled and reduced security problem, and the latter method has a problem of high development cost of the applet, so there is a need in the related art for a data management method capable of guaranteeing the security and controllability of the data provided to the applet by the host application and reducing the development cost of the applet developer.
Based on the actual technical requirements similar to those described above, the data management method provided by the application can ensure the safety and controllability of the data provided by the host application to the applet by using a technical means, and reduce the development cost of the applet developer.
The data management method provided by the embodiment of the application can be applied to any type of electronic equipment capable of deploying Application (APP). An application program which can be used as a host of other application programs, namely a host application, can be deployed in the electronic equipment, and the application program which is parasitized in the host application and runs by depending on the host application, namely a parasitized application. In one embodiment, the parasitic application may be specifically an applet.
It should be noted that, when the application program includes a client application program and a server application program, the host application in the embodiment of the present application specifically refers to an application program client as a host.
In order to ensure the controllability of the parasitic application to acquire data from the host application and reduce the development cost of a developer of the parasitic application, in the embodiment of the application, the developer of the host application can develop a public program for providing a data management function on the host application, the public program is positioned between the parasitic application and the host application, the data management is realized through the public program, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the parasitic application can be limited to acquire host data by the public program, the host data is prevented from being acquired randomly by the parasitic application, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
It should be noted that, in the embodiment of the present application, the parasitic application is mainly exemplified as a applet.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Fig. 1 is a flow chart of a data management method according to an embodiment of the present application, and an execution subject of the embodiment may be the aforementioned electronic device. As shown in fig. 1, the method of the present embodiment may include:
Step 11, displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and step 12, calling and running the common program in response to the interaction operation of the control, and realizing data management through the common program.
In the embodiment of the application, the specific form of the public program can be flexibly realized. In one embodiment, the common program may be implemented in the form of an applet. In another embodiment, the common program may be implemented in the form of a plug-in.
The relationship between the host application, the parasitic application and the common program may be as shown in fig. 2. Referring to fig. 2, a common program 21 is located between a host application 22 and a parasitic application 23, the parasitic application 23 may call the common program 21 under the triggering of an interactive operation, and the common program 21 may call an interface function of the host application 22 as needed. It should be noted that the number of parasitic applications that are parasitic in the same host application may be one or more. When the number of parasitic applications is plural, as shown in fig. 3, the plural parasitic applications may call the common program at different times.
In the embodiment of the present application, the control used for triggering the parasitic application to call the public program in the page of the parasitic application may be, for example, a button control, and of course, in other embodiments, may be other types of control. It is understood that the type of interaction for a control corresponds to the type of control. For example, when the control is a button control, the interactive operation for the control may be, for example, a click operation.
In the embodiment of the application, the public program can provide a data management function in a page mode. Pages in the common program may be rendered, for example, from a web page view (webview). In one embodiment, the page layout of the common program may be fixed, thereby facilitating simplified implementation.
Optionally, a return button for returning to the page of the parasitic application is included in the page of the common program. Therefore, the page of the public program can be regarded as the page of the parasitic application by the user, so that the public program is not perceived by the user, and the use experience of the user is improved.
In the embodiment of the application, the public program can provide a data management function and can be flexibly realized according to requirements. By way of example, the data management function may include at least one of: an add function, a query function, a modify function, a delete function, or an authorize function.
Where the query function refers to a function for providing query hosting data. Based on this, the implementation of data management by the common program may specifically include: the method includes invoking a first interface function of the host application by the common program to obtain host data from the host application and displaying the host data in a page of the common program. Therefore, the repeated input of the data existing in the host application by the user can be avoided, and the use experience is improved. Wherein the first interface function is an interface function provided by the host application for querying the data.
The authorization function refers to a function for providing authorization data, and in one embodiment, the authorization function may be used to authorize queried host data. Based on this, the page of the common program may include an authorization control, such as an authorization button, where the data management is implemented by the common program, and may further include: when an authorization operation instruction aiming at the queried host data is acquired through an authorization control, generating an authorization identifier of the host data; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the host data to the parasitic application as a call return value. Therefore, the user can select whether the queried host data is authorized to the parasitic application, and the problem that the parasitic application does not obtain the queried host data by the authorization of the user is avoided. The authorization identifier may be obtained, for example, by taking the information-Digest Algorithm 5 (MD 5) of the queried host data, which is beneficial to improving the security of the host data.
Further, if the authorization operation instruction is not acquired, the preset authorization failure data can be used as a call return value. So that the parasitic application can learn that the reason for not successfully obtaining the data is that the authorization failed, i.e. the user does not agree with the authorization.
Further, if the binding success indication returned by the server is not received, the preset internal abnormal data can be used as a call return value. Therefore, the parasitic application can know that the reason for unsuccessful data acquisition is internal abnormality, namely the user agrees with the authorization, but fails to return the data due to abnormality in the authorization process.
The modification function refers to a function for providing modified queried host data. Based on this, modification controls may be included in pages of the common program; the implementation of data management by the common program may further include: when a modification operation instruction aiming at the queried host data is acquired through a modification control, the queried host data is correspondingly modified according to the modification operation instruction, and modified host data is obtained.
Further, the implementing data management by the common program may further include: when a modification operation instruction for the queried host data is acquired through the modification control, a second interface function of the host application is called through the public program so as to correspondingly modify the host data in the host application. Therefore, the user can modify the queried host data in the process of using the public program, can be stored in the host application local, does not need repeated modification in the process of using the host application, and is beneficial to improving the use experience. Wherein the second interface function is an interface function provided by the host application for modifying the data.
In one embodiment, the authorization function may be used to authorize the modified host data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction aiming at the modified host data is obtained through an authorization control, an authorization identification of the modified host data is generated; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the modified host data to the parasitic application as a call return value. Therefore, the user can select whether to authorize the modified host data to the parasitic application, and the problem that the parasitic application does not acquire the modified host data through the authorization of the user is avoided.
The add function refers to a function for providing add data. Based on this, the implementing data management by the common program may include: and acquiring input data through the page of the public program.
Further, the implementing data management by the common program may further include: and calling a third interface function of the host application through the public program to transfer the input data to the host application. Therefore, the user can add the data in the process of using the public program, can act on the host application, is stored in the local area of the host application, does not need to repeatedly add the data in the process of using the host application, and is beneficial to improving the use experience. Wherein the third interface function is an interface function provided by the host application for the newly added data.
In one embodiment, an authorization function may be used to authorize input data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction aiming at input data is obtained through an authorization control, an authorization identification of the input data is generated; sending a binding request for requesting binding the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the input data to the parasitic application as a call return value. Therefore, a user can select whether to authorize the input data to the parasitic application, and the problem that the parasitic application does not authorize the user to acquire the input data is avoided.
The deletion function refers to a function for providing deletion of the queried host data. Based on this, a delete control may be included in the page of the common program; the implementation of data management by the common program may further include: when a deletion operation instruction for the queried host data is acquired through a deletion control, deleting the queried host data according to the deletion operation instruction.
Further, the implementing data management by the common program may further include: when the deleting operation for the queried host data is obtained through the deleting control, a fourth interface function of the host application is called through the public program so as to delete the host data in the host application. Therefore, the user can delete the queried host data in the process of using the public program, can act on the host application and delete the host data locally from the host application, does not need to be repeatedly deleted in the process of using the host application, and is beneficial to improving the use experience. Wherein the fourth interface function is an interface function provided by the host application for deleting data.
In the embodiment of the application, the page layout of the public program can be variable, so that the flexibility of page display is improved. Based on this, the calling and running the common program may include: invoking and running the common program using the target parameters; the implementation of data management by the common program may further include: and rendering and displaying the pages of the common program by adopting display logic corresponding to the target parameters.
Taking the function of querying host data from a host application through a common program and deciding whether to authorize the queried host data to a parasitic application by a user as an example, interactions of the parasitic application, the common program, the host application, and the server may be as shown in fig. 4, for example. Referring to fig. 4, in step 41, a user inputs an interactive operation for a specific control in a page of a parasitic application for triggering a call to a common program. As shown in fig. 5A, taking the host application as a map-type application, the parasitic application as an applet x providing a vehicle violation query function as an example, the "add vehicle" button in fig. 5A may represent a specific control for triggering the invocation of the public program, and the user input of a click operation for the "add vehicle" button may trigger the applet x to invoke the public program. It will be appreciated that the page shown in FIG. 5A is that of applet x.
Next, in step 42, the parasitic application invokes a common procedure in response to the interactive operation for the particular control. In step 43 the common program invokes the first interface function of the host application and in step 44 the host application passes the queried host data to the common program as an invocation return value. The common program may display the queried host data in a page of the common program to request the user to authorize the queried host data in step 45. After steps 42 through 45, the page shown in fig. 5A may be jumped to the page shown in fig. 5B. The number "123" and the number "123456" in fig. 5B represent the queried host data, the "immediate grant" button may represent the grant control, and the "<" button in the upper left corner may represent the aforementioned return button.
Thereafter, if the common program obtains an authorized operation instruction for the queried host data from the user, the common program may send a binding request to the server for requesting binding of the queried host data and the parasitic application in step 46. For example, if a click operation for the "immediate authorization" button in fig. 5B is acquired, a binding request for requesting that applet x be bound with license plate number "123" and engine number "123456" may be sent to the server side.
If the server successfully binds the queried host data with the parasitic application, the server returns a binding success indication to the common program in step 47. Further, in step 48, the common program may pass the queried host data to the parasitic application as a call return value. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the host data). For example, on the basis of fig. 5B, if the common program first obtains the clicking operation of the user on the "immediate authorization" button and then obtains the clicking operation of the user on the "<" button, the common program may transmit the license plate number "123" and the engine number "123456" to the parasitic application, and the parasitic application may query the license plate number "123" and the engine number "123456" to obtain corresponding violation information, and display the obtained violation information in the page as shown in fig. 5C, where the violation information may include, for example, the number of violations, the fine to be paid, and the deduction. It will be appreciated that the page shown in FIG. 5C is also the page of applet x.
If the common program does not receive a binding success indication returned by the server, then the common program may pass the internal exception data to the parasitic application as a call return value in step 49. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the internal exception data).
If the common program does not obtain an authorization operation instruction for the queried authorization data, then the common program may pass authorization failure data to the parasitic application as a call return value in step 410. Thereafter, in step 411, the parasitic application may perform corresponding processing and display according to the returned data (i.e., the authorization failure data). For example, on the basis of fig. 5B, if the common program does not acquire the click operation instruction for the "immediate authorization" button before acquiring the click operation instruction for the "<" button, the common program may transfer authorization failure data to the parasitic application, the parasitic application may determine authorization failure according to the authorization failure data, and display prompt information for prompting the authorization failure in a page as shown in fig. 5D, and the prompt information for prompting the authorization failure may be "unauthorized", for example. It will be appreciated that the page shown in FIG. 5D is also the page of applet x.
It should be noted that the pages shown in fig. 5A to 5D are only examples.
According to the data management method provided by the embodiment of the application, the page of the parasitic application is displayed, the page comprises the control for triggering the parasitic application to call the public program, the public program is positioned between the parasitic application and the host application of the parasitic application, the public program is called and operated in response to the interaction operation aiming at the control, and the data management is realized through the public program, so that the data management is realized by the public program positioned between the host application and the parasitic application, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the public program can limit the parasitic application to acquire the host data, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
In addition, data management is realized through the public program, a User Interface (UI) style of a data management page can be unified, and the use experience of a User is improved. Under the condition that a plurality of host applications are operated in the same host application, the common program provides a data management function, so that resources required for operating the parasitic application can be saved, and the page loading speed of the parasitic application can be improved.
FIG. 6 is a schematic diagram of a data management device according to an embodiment of the present application; referring to fig. 6, the present embodiment provides a data management apparatus, which may perform the above-described data management method, and in particular, the data management apparatus may include:
A display module 61, configured to display a page of a parasitic application, where the page includes a control for triggering the parasitic application to call a common program, where the common program is located between the parasitic application and a host application thereof, and is configured to provide a data management function;
and the calling module 62 is used for calling and running the common program in response to the interaction operation for the space and realizing data management through the common program.
Optionally, the data management function includes at least one of: an add function, a query function, a modify function, a delete function, or an authorize function.
Optionally, the calling module 62 is configured to implement data management by using the common program, including: and calling a first interface function of the host application through the public program to acquire host data from the host application, and displaying the host data in a page of the public program.
Optionally, the page of the public program comprises an authorization control; the calling module 62 is configured to implement data management by using the common program, and further includes: when an authorization operation instruction for the host data is acquired through the authorization control, generating an authorization identifier of the host data; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server side of the host program according to the authorization identifier; and responding to the binding success indication returned by the server side, and transmitting the host data to the parasitic application as a call return value.
Optionally, the page of the public program includes a modification control; the calling module 62 is configured to implement data management by using the common program, and further includes: when a modification operation instruction for the host data is acquired through the modification control, a second interface function of the host application is called through the public program so as to correspondingly modify the host data in the host application.
Optionally, the calling module 62 is configured to implement data management by using the common program, including: acquiring input data through the displayed page of the public program; and invoking a third interface function of the host application via the common program to transfer the input data to the host application.
Optionally, the calling module 62 is configured to call and run the common program, including: invoking and running the common program using the target parameters; the calling module 62 is configured to implement data management by using the common program, and further includes: and rendering and displaying the page of the public program by adopting the display logic corresponding to the target parameter.
The apparatus shown in fig. 6 may perform the method of the embodiment shown in fig. 1, and reference is made to the relevant description of the embodiment shown in fig. 1 for parts of this embodiment not described in detail. The implementation process and the technical effect of this technical solution refer to the description in the embodiment shown in fig. 1, and are not repeated here.
In one possible implementation, the structure of the data management apparatus shown in fig. 6 may be implemented as an electronic device. As shown in fig. 7, the electronic device may include: a processor 71 and a memory 72. Wherein the memory 72 is for storing a program for supporting the electronic device to execute the data management method provided in the embodiment shown in fig. 1 described above, the processor 71 is configured for executing the program stored in the memory 72.
The program comprises one or more computer instructions, wherein the one or more computer instructions, when executed by the processor 71, are capable of performing the steps of:
Displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a common program, and the common program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
And calling and running the common program in response to the interaction operation for the control, and realizing data management through the common program.
Optionally, the processor 71 is further configured to perform all or part of the steps of 1 in the embodiment shown in fig. 1.
The electronic device may also include a communication interface 73 in its structure for communicating with other devices or communication networks.
In addition, an embodiment of the present application provides a computer storage medium for storing computer software instructions for an electronic device, where the computer storage medium includes a program for executing the data management method according to the embodiment of the method shown in fig. 1.
The apparatus embodiments described above are merely illustrative, wherein the elements illustrated as separate elements may or may not be physically separate, and the elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by adding necessary general purpose hardware platforms, or may be implemented by a combination of hardware and software. Based on such understanding, the foregoing aspects, in essence and portions contributing to the art, may be embodied in the form of a computer program product, which may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110815672.8A CN113687891B (en) | 2021-07-19 | 2021-07-19 | Data management method, device and equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110815672.8A CN113687891B (en) | 2021-07-19 | 2021-07-19 | Data management method, device and equipment |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113687891A CN113687891A (en) | 2021-11-23 |
| CN113687891B true CN113687891B (en) | 2024-09-27 |
Family
ID=78577439
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110815672.8A Active CN113687891B (en) | 2021-07-19 | 2021-07-19 | Data management method, device and equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113687891B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114531432A (en) * | 2022-02-14 | 2022-05-24 | 浙江吉利控股集团有限公司 | Cross-platform based service communication method and device |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111782300A (en) * | 2020-07-08 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | A data processing method, device, equipment and system |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110083413A (en) * | 2019-03-13 | 2019-08-02 | 维沃移动通信有限公司 | A kind of small routine call method and terminal device |
| CN110083465B (en) * | 2019-04-26 | 2021-08-17 | 上海连尚网络科技有限公司 | Data transmission method between boarded applications |
| CN111158799A (en) * | 2019-12-31 | 2020-05-15 | 北京百度网讯科技有限公司 | A page rendering method, device, electronic device and storage medium |
| CN111767069B (en) * | 2020-06-30 | 2024-03-15 | 北京百度网讯科技有限公司 | Mini program processing methods, servers, equipment and storage media |
| CN111737032B (en) * | 2020-07-27 | 2020-11-20 | 腾讯科技(深圳)有限公司 | Subprogram running method and device based on microkernel system and electronic equipment |
| CN112416613B (en) * | 2020-10-23 | 2022-09-20 | 腾讯科技(深圳)有限公司 | Application data processing method, device, equipment and medium |
| CN112559980B (en) * | 2020-11-24 | 2023-05-05 | 深圳凡泰极客科技有限责任公司 | Applet runtime capable of embedding a plurality of random APP |
-
2021
- 2021-07-19 CN CN202110815672.8A patent/CN113687891B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111782300A (en) * | 2020-07-08 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | A data processing method, device, equipment and system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113687891A (en) | 2021-11-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109032691B (en) | Applet running method and device and storage medium | |
| CN110222533B (en) | Distributed data security application method and system and electronic equipment | |
| US20190324772A1 (en) | Method and device for processing smart contracts | |
| JP6092249B2 (en) | Virtual channel for embedded process communication | |
| EP3493057B1 (en) | Method and apparatus for awakening application by means of mobile browser | |
| US9858164B1 (en) | Providing an information technology management prescription | |
| US10592660B2 (en) | Capability access management | |
| CN109783118B (en) | FPGA cloud host development method and system | |
| CN113672353B (en) | A container-based task execution method and device | |
| EP2357560B1 (en) | Method and system for managing by a controller a generic data lock to a data object | |
| CN112506590B (en) | Interface calling method, device and electronic device | |
| CN113687891B (en) | Data management method, device and equipment | |
| CN110858242A (en) | Page skipping method and device | |
| CN112613063A (en) | Data verification system construction method and device | |
| CN113835889A (en) | Method for acquiring input event and related device | |
| CN114254220A (en) | Webpage view processing method and device and electronic equipment | |
| CN108470125B (en) | OLE redirection method and system based on virtual desktop | |
| CN117195203A (en) | Process protection method and device for operating system, computer equipment and storage medium | |
| CN116186452A (en) | Vue3-based page display method, device, computer equipment and storage medium | |
| CN113535429B (en) | Data processing method, device, equipment, medium and program product | |
| CN112099920A (en) | Method and device for creating secure desktop, electronic equipment and readable storage medium | |
| CN116340960B (en) | Method, device and storage medium for processing vehicle key | |
| CN109783156A (en) | A kind of starting control method and device of application | |
| CN111967010B (en) | Trusted service method, trusted service device, trusted service equipment and storage medium | |
| CN119537143A (en) | Vehicle service management system, vehicle service management method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20240308 Address after: # 03-06, Lai Zan Da Building 1, 51 Belarusian Road, Singapore Applicant after: Alibaba Innovation Co. Country or region after: Singapore Address before: Room 01, 45th Floor, AXA Building, 8 Shanton Road, Singapore Applicant before: Alibaba Singapore Holdings Ltd. Country or region before: Singapore |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |