CN116048617A - Information acquisition method, device, chip, electronic equipment and medium - Google Patents
Information acquisition method, device, chip, electronic equipment and medium Download PDFInfo
- Publication number
- CN116048617A CN116048617A CN202210979156.3A CN202210979156A CN116048617A CN 116048617 A CN116048617 A CN 116048617A CN 202210979156 A CN202210979156 A CN 202210979156A CN 116048617 A CN116048617 A CN 116048617A
- Authority
- CN
- China
- Prior art keywords
- information
- application
- resource
- acquiring
- information set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 101
- 230000001419 dependent effect Effects 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 36
- 238000012360 testing method Methods 0.000 claims description 33
- 238000004891 communication Methods 0.000 claims description 28
- 238000013473 artificial intelligence Methods 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 23
- 238000012544 monitoring process Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 description 53
- 238000012545 processing Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 13
- 230000006399 behavior Effects 0.000 description 12
- 238000010295 mobile communication Methods 0.000 description 12
- 238000004088 simulation Methods 0.000 description 11
- 238000007726 management method Methods 0.000 description 10
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000013480 data collection Methods 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 238000013528 artificial neural network Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 238000012216 screening Methods 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 229920001621 AMOLED Polymers 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 230000001965 increasing effect Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000002787 reinforcement Effects 0.000 description 3
- 230000001960 triggered effect Effects 0.000 description 3
- 230000003416 augmentation Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 239000002096 quantum dot Substances 0.000 description 2
- XJEVHMGJSYVQBQ-SECBINFHSA-N (1r)-2,3-dihydro-1h-inden-1-amine Chemical compound C1=CC=C2[C@H](N)CCC2=C1 XJEVHMGJSYVQBQ-SECBINFHSA-N 0.000 description 1
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 101100391182 Dictyostelium discoideum forI gene Proteins 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013529 biological neural network Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 210000002569 neuron Anatomy 0.000 description 1
- 238000012913 prioritisation Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/76—Adapting program code to run in a different environment; Porting
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the application provides an information acquisition method, an information acquisition device, a chip, electronic equipment and a medium, wherein the method comprises the following steps: acquiring a first information set called by an application execution information calling operation; and acquiring target information in the first information set, wherein the target information is used as dependent information used by application operation, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set. According to the method and the device for obtaining the information, the information used by the application can be automatically obtained, and the information is obtained more efficiently.
Description
Technical Field
The present disclosure relates to the field of information acquisition technologies, and in particular, to an information acquisition method, an information acquisition device, a chip, an electronic device, and a medium.
Background
With the development of globalization, operators and three-party application manufacturers who need to deliver are increasing, and the custom requirements of operators are also increasing, wherein the requirements of three-party applications are not lacking, so that the three-party applications need to be preset and adapted.
But for reasons related to business, etc., the documents provided by the application manufacturer are not full or not provided. For the scene, a great deal of manpower can be input to fuze the application at the initial stage of the project, and the information used by the application can be judged.
Disclosure of Invention
The embodiment of the application provides an information acquisition method, an information acquisition device, a chip, electronic equipment and a medium, which can automatically acquire information used by an application, and the information acquisition is more efficient.
In a first aspect, an embodiment of the present application provides an information obtaining method, including: acquiring a first information set called by an application execution information calling operation; and acquiring target information in the first information set, wherein the target information is used as dependent information used by application operation, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
Optionally, before acquiring the first information set invoked by the application execution information invoking operation, the method further includes: simulating a first operation scene of the application used by the user by using artificial intelligence; and starting and running the application in the first running scene, and executing the using operation of the application in the process of running the application.
Optionally, the dependency information includes at least one of rights, broadcast, resource, and interface information.
Optionally, the resource includes at least one of configuration item, picture, audio, string information.
Optionally, before acquiring the first information set invoked by the application execution information invoking operation, the method further includes: responding to an information acquisition request sent by an application, and acquiring default call information of a system; according to default call information of a system, traversing a resource replacement application program package through a package management service to obtain a first information set; the first set of information is provided to the application.
Optionally, the method further comprises: monitoring whether an application executes information calling operation; and under the condition that the application execution information calling operation is monitored, executing the step of acquiring the first information set called by the application execution information calling operation.
Optionally, whether the listening application performs the information calling operation includes: monitoring whether an application runs a first code program, wherein the first code program is a code program for calling a first information set, and comprises first stack information added in a buried point mode;
the acquiring the first information set called by the application execution information calling operation comprises the following steps: under the condition that the application runs the first code program is monitored, determining a call point corresponding to the first information set according to the keywords in the first stack information; and obtaining a return value comprising the first information set according to the call point corresponding to the first information set.
Optionally, the acquiring the first information set called by the application execution information calling operation includes: acquiring a second information set called by an application execution information calling operation; and acquiring a first information set in the second information set, wherein each information in the first information set is the same kind of information.
Optionally, the acquiring the first information set in the second information set includes: determining a first hierarchy of corresponding applications; determining a resource replacement application program package of a corresponding application under a first level; and acquiring the first information set from the information corresponding to the determined resource replacement application program package in the second information set.
Optionally, the determining the resource replacement application package of the corresponding application under the first hierarchy includes: determining a target level of the corresponding application from the determined first levels when the number of the first levels is more than one, wherein the priority of the target level is higher than that of other levels of the corresponding application; a resource replacement application package for the corresponding application at the target tier is determined.
Optionally, the acquiring the target information in the first information set includes: according to the resource replacement application program package to which the information in the first information set belongs, obtaining target information in the first information set; the priority of the resource replacement application package to which the target information belongs is higher than the priority of the resource replacement application package to which other information belongs in the first information set.
Optionally, the method further comprises: acquiring a first test result, wherein the first test result is used for identifying whether the application runs successfully or not based on the target information; acquiring information for updating the replacement target information under the condition that the first test result indicates that the application does not run successfully based on the target information; and executing the step of acquiring the first information set called by the application execution information calling operation again according to the acquired information for updating the replacement target information.
In a second aspect, an embodiment of the present application provides an information acquisition apparatus, including: the first acquisition module is used for acquiring a first information set called by an application execution information calling operation; the second acquisition module is used for acquiring target information in the first information set, wherein the target information is used as dependent information used by application operation, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
In a third aspect, an embodiment of the present application provides an electronic chip, including: a processor for executing computer program instructions stored on a memory, wherein the computer program instructions, when executed by the processor, trigger the electronic chip to perform the method according to any of the first aspects.
In a fourth aspect, embodiments of the present application provide an electronic device comprising a memory for storing computer program instructions, a processor for executing the computer program instructions, and communication means, wherein the computer program instructions, when executed by the processor, trigger the electronic device to perform a method as in any of the first aspects.
In a fifth aspect, embodiments of the present application provide a computer-readable storage medium having a computer program stored therein, which when run on a computer, causes the computer to perform the method as in any of the first aspects.
In a sixth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method as in any of the first aspects.
According to the method and the device for obtaining the information, the information used by the application can be automatically obtained, and the information is obtained more efficiently.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an information obtaining method according to an embodiment of the present application;
fig. 3 is a flow chart of an information obtaining method according to an embodiment of the present application;
FIG. 4 is a flowchart of another information obtaining method according to an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of an artificial intelligence system according to an embodiment of the present application;
FIG. 6 is a flowchart of an implementation of acquiring call resources of an application according to one embodiment of the present application;
FIG. 7 is a schematic diagram of an implementation of hierarchical acquisition of resources according to an embodiment of the present application;
FIG. 8 is a schematic diagram of an implementation of obtaining resources based on rank and priority according to an embodiment of the present application;
fig. 9 is a schematic diagram of an information acquisition manner according to an embodiment of the present application.
Detailed Description
For a better understanding of the technical solutions of the present application, embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, of the embodiments of the present application. All other embodiments, based on the embodiments herein, which would be apparent to one of ordinary skill in the art without making any inventive effort, are intended to be within the scope of the present application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "at least one" as used herein means one or more, and "a plurality" means two or more. The term "and/or" as used herein is merely one association relationship describing the associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. Wherein A, B may be singular or plural. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be understood that although the terms first, second, etc. may be used in embodiments of the present application to describe the set threshold values, these set threshold values should not be limited to these terms. These terms are only used to distinguish the set thresholds from each other. For example, a first set threshold may also be referred to as a second set threshold, and similarly, a second set threshold may also be referred to as a first set threshold, without departing from the scope of embodiments of the present application.
The terminology used in the description section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting of the present application.
The information acquisition method provided in any embodiment of the present application may be applied to the electronic device 100 shown in fig. 1. Fig. 1 shows a schematic configuration of an electronic device 100.
The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It is to be understood that the structure illustrated in the embodiments of the present application does not constitute a specific limitation on the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present application is only illustrative, and does not limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also use different interfacing manners, or a combination of multiple interfacing manners in the foregoing embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied to the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, antenna 1 and mobile communication module 150 of electronic device 100 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that electronic device 100 may communicate with a network and other devices through wireless communication techniques. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data created during use of the electronic device 100 (e.g., audio data, phonebook, etc.), and so on. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like. The processor 110 performs various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like. The capacitive pressure sensor may be a capacitive pressure sensor comprising at least two parallel plates with conductive material. The capacitance between the electrodes changes when a force is applied to the pressure sensor 180A. The electronic device 100 determines the strength of the pressure from the change in capacitance. When a touch operation is applied to the display screen 194, the electronic apparatus 100 detects the touch operation intensity according to the pressure sensor 180A. The electronic device 100 may also calculate the location of the touch based on the detection signal of the pressure sensor 180A. In some embodiments, touch operations that act on the same touch location, but at different touch operation strengths, may correspond to different operation instructions. For example: and executing an instruction for checking the short message when the touch operation with the touch operation intensity smaller than the first pressure threshold acts on the short message application icon. And executing an instruction for newly creating the short message when the touch operation with the touch operation intensity being greater than or equal to the first pressure threshold acts on the short message application icon.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device 100. The air pressure sensor 180C is used to measure air pressure. In some embodiments, electronic device 100 calculates altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation. The magnetic sensor 180D includes a hall sensor. The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser. In some embodiments, the electronic device 100 may range using the distance sensor 180F to achieve quick focus. The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The ambient light sensor 180L is used to sense ambient light level. The fingerprint sensor 180H is used to collect a fingerprint. The electronic device 100 may utilize the collected fingerprint feature to unlock the fingerprint, access the application lock, photograph the fingerprint, answer the incoming call, etc. The temperature sensor 180J is for detecting temperature.
The touch sensor 180K, also referred to as a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a different location than the display 194.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device 100. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to realize functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, i.e.: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100. The software system of the electronic device 100 may employ a layered architecture, an event driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
Before introducing embodiments of the present application, some technical terms will be described first.
And the Overlay is a resource replacement mechanism provided for a third party (or third party) by an operating system and used for replacing various resources. The "resource" in the "resource replacement" is a resource file in the sense that it may include dependency information of applications such as rights, broadcasting, resources, interfaces, etc.
For example, there may be an Android overlay, which provides a resource replacement mechanism for Android (or Android operating system) to three parties.
Apk (Android application package ) is an application package file format used by the android operating system.
The overlay apk (resource replacement android application package) is a resource replacement mechanism provided for the android to three parties and is used for replacing various resources.
With the growing globalization, there are more and more operators and third party application (App) vendors that need to deliver, and more custom needs for operators, where the needs of the third party applications are not compromised. For example, a handset manufacturer may cooperate with an operator to push out models in which three-party applications specified by the operator are required to be preset.
For non-operator customized models directly introduced by mobile phone manufacturers, there is also a general need to preset some three-party applications. For example, for non-operator customized models, there may be a common list of preset application partners And the like.
Aiming at the preset requirements of the applications, the mobile phone manufacturer needs to preset the three-party applications and needs to adapt the three-party applications and the mobile phone manufacturer custom system so as to ensure that the functions of the three-party applications are normal.
But for reasons related to business, etc., documents provided by the application manufacturer are often not full or provided. For this scenario, please refer to fig. 2, based on the three-party application to be adapted, the mobile phone manufacturer may input a lot of manpower (such as developer and tester) to fudge the application in the early stage of the project, and determine the dependency information of application use, such as the authority, resource and other information on which the application is dependent. Based on the dependency information, applications may be preset and adapted.
By way of example, the rights may include rights to access a phone list, rights to access a short message, rights to obtain a location, and the like.
Illustratively, the resource may include a system default dialer package name (in order toSuch an application is an example), system default InCallUI (InCallUI is responsible for displaying information such as incoming call interface, etc.), and the like.
For example, assume thatThe implementation of an icon function of this application depends on the configuration item information, and when the configuration item information is configured, the icon will display the function and will take effect, so that acquisition is requiredInformation about the configuration items on which the icon function is implemented.
By way of example, the configuration item may include whether an icon is displayed, whether data is stored in a database, and so forth.
In one scenario, in the requirements of preset three-party applications, three-party application manufacturers may only provide Apk (android application packages) of the applications, but specific functions of the applications are not clear, and information such as what authority and resources are relied on for realizing the functions is unclear, so that developers and testers of mobile phone manufacturers are required to invest in the model to judge the dependency information of application use.
Illustratively, a developer can quickly learn the code blocks that need to be adapted after knowing the dependency information used by the application. After knowing the dependency information of application use, the tester can know the test preset conditions and design test cases for verification.
Considering that the fuzzing workload is large and the fuzzing is not uniform in specification, the problems of incomplete fuzzing, inaccuracy, legacy and low efficiency are caused.
For example, the self-research application test cases can be manually examined to find out the resources, rights and the like on which the application depends, but the problems of low manual examination efficiency and incomplete and missing manual examination exist.
As shown in fig. 3, an embodiment of the present application provides an information obtaining method, including steps 301 to 302:
The application may perform a corresponding information invocation operation to invoke a corresponding first set of information (which may include all of the information that the application may use to run the function) for running any of its functions, and then use some of the information in the first set of information (which is the dependency information that the application uses to run the function). Thus, in order to obtain the dependency information used by the application running, the embodiment may first obtain the first information set called by the application execution information calling operation.
In one implementation, an application's operational scenario may be simulated using artificial intelligence, and the application started and run in the simulated scenario. In another implementation, the application may also be launched and run in an existing scenario. The present application is not limited in this regard.
During the running of the application, a use operation (specifically, an operation of using a function of the application) of the application may be performed, and the use operation may be performed by a user or may be performed by artificial intelligence simulation.
In one embodiment of the present application, prior to step 301, the method may further include: simulating a first operational scenario of the application using artificial intelligence (Artificial Intelligence, AI); and starting and running the application in the first running scene, and executing the using operation of the application in the process of running the application.
Based on execution of the usage operation of the application, the application may perform a respective information invocation operation for running the respective function to invoke the respective first information set. The information acquiring means may acquire the first information set invoked by the application execution information invoking operation in response to the operation of the application invoking information.
In one embodiment, the number of the acquired first information sets may be one.
In another embodiment, the number of the acquired first information sets may be plural. In this case, each first information set may include dependency information used for running an application.
In step 302, the target information in the first information set is obtained and used as the dependency information used by the application running, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
The respective information in the first set of information may be the same kind of information. For example, the information names of the same kind of information may be the same. Taking the resource as an example, the resources with the same name are the same resource.
The dependency information used by the information having the relatively highest priority for the application running may be determined according to the priorities corresponding to the respective information.
In one embodiment, the priority of the information may depend on the priority of the resource replacement application package to which the information belongs.
For example, the overlay apk (resource replacement android application package) may possess information, so that the target information may be determined according to the priority of the overlay apk to which the information belongs.
For example, taking application use resource a as an example, assume that three overlayapks (Apk 1 to Apk3 respectively) can be determined according to the application, and the priorities of the three are sequentially increased to be 1, 2 and 3 respectively. If Apk1 and Apk2 both possess the information of resource a, and Apk3 does not possess resource a, then resource a owned by Apk1 and resource a owned by Apk2 may form a first information set.
Because Apk2 has a higher priority than Apk1, the target information in the first information set is resource a in Apk2, resource a in Apk2 is the dependency information used by the application running, and resource a in Apk1 is not the dependency information used by the application running.
By way of example, the dependency information used by the application running may relate to various information shown in table 1 below.
TABLE 1
Referring to table 1, at least some or all of the dependency information used for running the application may be authority (Permission), broadcast (Broadcast), resource (Resource), and interface (Function) as shown in table 1. The Resource (Resource) may have at least some or all of the configuration items, pictures, audio, strings as shown in table 1. Functions may have definitions of functions, methods.
In one embodiment, the Resource (Resource) may be generally embodied in the form of a Resource unique code (Resource Id). Id is Identity document, chinese paraphrasing is an identification number of an identification card or a unique code.
Taking the example that the dependency information used by the application running includes a resource, when the dependency information used by the application running is acquired, the resource Id finally invoked by the application can be acquired through scanning. If the application cannot operate correctly based on the resource Id to realize the corresponding function, a corresponding possibly correct resource (the possibly correct resource is used for updating and replacing the original resource which does not support the correct operation of the application) can be input, and a new resource Id with the highest priority is automatically generated for callback verification so as to verify whether the application can operate correctly according to the new resource Id. If the callback verification is passed, the function adaptation is completed.
Based on the foregoing, in one embodiment, the dependency information used by the application to run may include at least one of rights, broadcast, resources, and interfaces.
The dependency information used by the application running may include one, more or all of the information listed herein in the embodiments of the application, as well as other possible information not shown herein in the embodiments of the application. This embodiment is not limited thereto.
In one embodiment, the resources used by the application running may include at least one of configuration items, pictures, audio, strings of information.
The resources used by the application running may include one, more or all of the information listed herein in the embodiments of the present application, as well as other possible information not shown herein in the embodiments of the present application. This embodiment is not limited thereto.
Alternatively, when the user uses the application or the computer simulates the user using the application, the application may issue an information acquisition request to acquire the information set invoked by the application to run the corresponding function. In response to the request, the information acquiring device may acquire system default call information, and traverse a resource replacement application package (such as an overlay apk) through a PMS (package manager service) to acquire the information set, and then provide the information set as an application to supply the application call.
In one embodiment of the present application, before acquiring the first information set invoked by the application execution information invoking operation, the method may further include: responding to an information acquisition request sent by an application, and acquiring default call information of a system; according to default call information of a system, traversing a resource replacement application program package through a package management service to obtain a first information set; the first set of information is provided to the application.
The listener may be used to monitor the operation of the application call information, and the collection of information invoked by the application running may be obtained based on the listening operation.
In one embodiment of the present application, the method may further include: monitoring whether an application executes information calling operation; and under the condition that the information calling operation is monitored, executing the step of acquiring the first information set called by the application executing the information calling operation.
The information collection invoked by the application may be obtained in response to an information invocation operation performed by the application.
In one embodiment of the present application, whether the listening application performs the information calling operation may include: monitoring whether an application runs a first code program, wherein the first code program is a code program for calling a first information set, and comprises first stack information added in a buried point mode;
the acquiring the first information set called by the application execution information calling operation may include: under the condition that the application runs the first code program is monitored, determining a call point corresponding to the first information set according to the keywords in the first stack information; and obtaining a return value comprising the first information set according to the call point corresponding to the first information set.
In one implementation, the return value may be the first set of information.
In another implementation, the return value may include the first set of information and other information.
In one embodiment, there may be different kinds of information in the information obtained according to the return value, and the first information set may be obtained according to the information.
In one embodiment, the acquiring the first information set invoked by the application executing the information invoking operation may include: acquiring a second information set called by an application execution information calling operation; and acquiring a first information set in the second information set, wherein each information in the first information set is the same kind of information.
For example, the same kind of information with the same name in the second information set can be formed into a corresponding first information set according to the name of the information.
The first information set called by the application execution information calling operation can be obtained by a hierarchical screening mode according to the hierarchy corresponding to the application and the resource replacement application program package under the hierarchy.
In one embodiment of the present application, the acquiring the first information set in the second information set may include: determining a first hierarchy of corresponding applications; determining a resource replacement application program package of a corresponding application under a first level; and acquiring the first information set from the information corresponding to the determined resource replacement application program package in the second information set.
In one implementation, the first set of information may be determined from each tier to which the application corresponds without regard to tier priority.
In another implementation, the tiers may have priorities, and the first set of information may be determined in accordance with the tier of the relative highest priority to which the application corresponds in combination with the priorities of the tiers.
In one embodiment of the present application, the determining the resource replacement application package of the corresponding application under the first hierarchy may include: determining a target level of the corresponding application from the determined first levels when the number of the first levels is more than one, wherein the priority of the target level is higher than that of other levels of the corresponding application; a resource replacement application package for the corresponding application at the target tier is determined.
Alternatively, the resource replacement application package (such as an overlayApk) may have information, and the resource replacement application package may have priority, so that the target information may be determined from the first information set according to the priority of the resource replacement application package to which the information belongs.
In one embodiment of the present application, the acquiring the target information in the first information set may include: according to the resource replacement application program package to which the information in the first information set belongs, obtaining target information in the first information set; the priority of the resource replacement application package to which the target information belongs is higher than the priority of the resource replacement application package to which other information belongs in the first information set.
In one embodiment of the present application, the method may further include: acquiring a first test result, wherein the first test result is used for identifying whether the application runs successfully or not based on the target information; acquiring information for updating the replacement target information under the condition that the first test result indicates that the application does not run successfully based on the target information; and executing the step of acquiring the first information set called by the application execution information calling operation again according to the acquired information for updating the replacement target information.
Wherein by updating the replacement target information with the acquired information, there is a corresponding update of the information set invoked by the application (the updated information set may no longer include the target information but include the acquired information), so that the information set obtained by executing step 301 again is an updated information set.
If the test result indicates that the application fails to run, the current dependency information may be considered incorrect, so that new dependency information may be generated accordingly, and the above steps (i.e., steps 301 to 303) may be executed again to verify whether the new dependency information is correct.
If the test result shows that the application is successfully operated, the current dependency information can be considered to be correct, so that the application can be preset and adapted accordingly.
As shown in fig. 4, another information obtaining method provided in the embodiment of the present application may include the following steps 401 to 404.
In this embodiment, the artificial intelligence is used to simulate the running scenario of the application, and the number of simulated scenarios may be one or more.
The use operation of the application may involve a user's use operation of any function of the application.
Artificial intelligence may be used to simulate user operation of an application. As with the user's use of the application, the application may use corresponding dependency information (e.g., rights, resources, etc. information) for running the corresponding function when simulating the user's use of the application.
Step 402 may be implemented by steps 301 to 302 above.
In the embodiment of the application, after the application is used based on the simulated user scene, a test report corresponding to the operation result can be generated according to the operation result of the application.
Depending on whether the dependency information used by the application is correct or not, the application may run successfully or fail. Step 403 may obtain a test report reflecting the results of the application running.
For example, in a case where a plurality of scenes are simulated and applications are respectively run in the respective scenes, the test report may record the running results of the applications in the respective scenes. Since the dependency information of the application running in different scenarios may be correspondingly different, the running result of the application in different scenarios may be different, such as that the application runs successfully in one scenario and fails to run in another scenario (indicating that the scenario is a problem scenario). As such, scene callbacks may be made subsequently only for problem scenes.
For example, a scenario may be simulated in which an application is running, and a test report may record the results of the application running in the scenario. If the test report indicates that the application fails to run, then scene callback can be performed on the scene later.
Illustratively, due to the custom nature of the handset vendor's own system, the system is more or less adapted to three-party applicationsNative logic is inconsistent, so that errors often occur after a three-way application is run using a mobile phone manufacturer custom system. Thus, the allocation can be performed according to the error result in the test report.
In one embodiment, a determination may be made based on the test report to determine if there is an erroneous result in the test report. If the error result is not found, the dependence information of application use can be considered to be correct, the application is matched with a mobile phone manufacturer system, and the application function is normal. If the error result exists, the dependence information of application use can be considered to be incorrect, the application is not adapted to the mobile phone manufacturer system, and the application function is abnormal.
Optionally, the test report may be manually judged to determine an error condition. Alternatively, the computer may automatically judge the test report based on preset judgment rules to determine the error condition.
In one embodiment, under the condition that an error result is determined, corresponding possibly correct dependency information can be generated, and then callback is performed according to the possibly correct dependency information to check whether the possibly correct dependency information is correct or not.
Possibly, the possibly correct dependency information can be designed manually. Alternatively, the dependency information may be automatically designed by the computer based on preset design rules.
If no error result exists in the test report obtained by callback, the possibly correct dependency information can be considered to be correct. If an error result still exists in the test report obtained by callback, the possibly correct dependency information can be considered to be incorrect. So that the corresponding and new possibly correct dependency information can be generated again, and callback is performed again accordingly, and the process is circulated until no error result exists in the obtained test report.
If the application fails to run, the dependency information used by the application running can be considered to be wrong, and new possibly correct dependency information can be obtained according to the dependency information, and the new dependency information can be updated to replace the original corresponding dependency information. And then scene callback can be performed based on the new dependency information, namely, the application is triggered to run again in the simulated corresponding scene based on the new dependency information. Step 402 may then be performed to obtain dependency information used by the application to run again.
If the application is successfully run, the dependency information used by the application running can be considered to be correct, and the application can be preset and configured according to the dependency information.
In one embodiment of the application, in order to solve the preset requirement of the application, related operations mainly relate to AI (artificial intelligence) scene simulation, data collection, data sequencing and scene callback, so as to solve various functional problems caused by incorrect dependency information used by the application implementation function in the process of presetting the three-party application.
By way of example, the dependency information may have rights, broadcasts, resources, interfaces, etc., which in turn may be subdivided into pictures, audio, strings, configuration items, etc.
Illustratively, the functional problem may be: if the configuration item is incorrect, the corresponding function of the application may be disabled, and if the packet name is incorrect, the pulled application may be incorrect.
The realization based on the embodiment can obtain the correct dependency information used by the application realization function, thereby solving the application preset requirement, enabling the intelligent mobile phone and the three-party application to be better adapted and avoiding various functional problems caused by incorrect dependency information.
The operations of AI scene simulation, data collection, data sorting, and scene callback will be described below.
1) The operation in this aspect of AI scene simulation will be described.
In the AI scene simulation process, the number of the simulated user scenes (i.e. the scenes of the application used by the user) can be one or more, and the simulated scenes can relate to the use operation of any function of the application by the user.
In one embodiment, a virtual user community WW may be designed using Web-modeling techniques (Web-Enabled Simulation, WES) to allow the user community WW to interact directly with applications.
In one possible implementation, a reinforcement learning algorithm (Reinforcement Learning) may be employed to train the simulated behavior of the robot to possess different behavioral preferences. And then, the simulation behavior simulation system interacts with the application, and dynamically sets parameters (such as parameters related to user preference, behavior constraint, user quantity, malicious operation and the like) so as to ensure the reliability and the integrity of the simulation behavior.
In one embodiment, AI scene simulation may be performed using the artificial intelligence system 50 as shown in FIG. 5.
Referring to FIG. 5, an artificial intelligence system 50 may include an integrated Services system (e.g., may be referred to as an R-Services module) 501 and an artificial intelligence module (e.g., may be referred to as an R-AI module) 502.
The integrated services system 501 may be used to perform data collection, build user behavior algorithm models, and perform automated functional testing.
The integrated service system 501 may, possibly, include a functional automation module 5011, a big data analysis module 5012, and an algorithm service module 5013.
The functional automation module 5011 may be used to perform automated functional testing.
The big data analysis module 5012 may be used for data collection.
The algorithm service module 5013 may be used to build a user behavior algorithm model.
The artificial intelligence module 502 can be used to identify information used by applications in automation runs, to perform information identification and capture of abnormal behavior, to output results, and to perform correct information verification callbacks.
Usefully, the artificial intelligence module 502 can include an information identification module (e.g., can be referred to as an R-Robot module) 5021, an anomaly identification and capture module (e.g., can be referred to as an R-ESP module) 5022, and a result output and callback module (e.g., can be referred to as an R-Ops module) 5023.
The information identifying module 5021 may be used at least to identify information used by an application in an automation run.
The information recognition module 5021 may include at least an element recognition module 50211. The element identification module 50211 may be used to identify information used by an application in an automation run.
The anomaly identification and capture module 5022 can be used at least for information identification and capture of anomaly behavior.
The anomaly identification and capture module 5022 may include at least an anomaly identification module 50221 and an anomaly capture module 50222. The anomaly identification module 50221 can be used for carrying out information identification of the anomaly behavior, and the anomaly capture module 50222 can be used for carrying out information capture of the anomaly behavior.
The result output and callback module 5023 can be at least used for outputting results and performing correct information verification callback.
The result output and callback module 5023 may include at least a use case generation module 50231 and a problem reproduction module 50232. The use case generation module 50231 may be used to generate a use case, and the problem reproduction module 50232 may be used to perform problem reproduction processing. In one possible implementation, a correct information verification callback may be made by generating a use case and performing a problem reproduction process.
2) The operation of this aspect of data collection is described.
During the data collection process, the information set invoked by the application running may be obtained. In one embodiment, the data collection process may be implemented based on step 301 in the embodiment shown in FIG. 3.
In one embodiment, a listener may be used to listen for call operations of the system of the application to information by listening for call points and return values to obtain information sets called by the system of the application. When the function of the application is abnormal, the corresponding abnormal reason can be judged by inquiring the monitoring value of the monitor.
In one embodiment, corresponding different listeners can be respectively generated for different types of dependency information such as rights, broadcasting, resources, interfaces and the like to monitor call points and return values thereof.
As shown in table 1, the permissions may include at least system permissions and custom permissions, for which the manner in which the call and return values are monitored may be different.
As shown in table 1, the broadcast may include at least a system broadcast and a custom broadcast, for which the manner in which the call site and return value are monitored may be the same.
As shown in table 1, the resources may include at least a system resource, a three-party resource, and an overlay resource, and for these three resources, the manner of monitoring their call points and return values may be the same.
As shown in table 1, the interfaces may include at least a system interface and a three-way interface, for both of which the manner in which call points and return values are monitored may be the same.
The application needs to call the corresponding information in order to run its function. In one embodiment, a system of an electronic device (e.g., a smart phone) may obtain default call information of the system, and traverse an overlay apk (resource replacement android application package) through a PMS (package management service) to obtain a full (or all) call information provisioning application call. The full call information may be the first information set or the second information set described in other embodiments of the present application.
The system default call information can be updated and replaced according to the resource replacement information obtained by traversing the overlayApk, and the call information obtained after updating and replacing can be used for calling.
Possibly, in the context callback process, the possibly correct dependency information can be obtained by traversing the overlayApk, and the possibly correct dependency information can be used for updating and replacing original dependency information which causes the application to run failure.
In one embodiment, a listener may be used to listen for call operations of an application to information, thereby obtaining a set of information for an application call (i.e., obtaining the full call information described above).
In one embodiment, the obtained first information set of the application call may be prioritized and hierarchically filtered, and finally the dependency information of the application running use is obtained.
In another embodiment, the obtained first set of information for application invocation may be prioritized to obtain dependency information for application running use.
Illustratively, an application requires some resources to run a function. Taking the example of acquiring the call resource of the application as an example, in one embodiment, please refer to the flowchart of the implementation of acquiring the call resource of the application shown in fig. 6, the implementation may include the following steps 601 to 605:
The associated implementation code of this step may include, for example: app: getdragable (r.id). And acquiring corresponding resources according to the acquired resource serial numbers.
The associated implementation code of this step may include, for example: system: getResource (id.cfg). And acquiring corresponding resources according to the acquired resource serial numbers.
In step 603, a resource replacement android application package list is obtained through the package management service (i.e. the overlayApkList is traversed through the PMS).
The associated implementation code of this step may include, for example: pms.getapklist (). And acquiring the resource replacement information in the resource replacement android application package list by acquiring the resource replacement android application package list.
The method comprises the steps of obtaining a corresponding resource according to an obtained resource serial number, and updating and replacing the obtained resource according to the resource replacement information in the started resource replacement android application package list so as to obtain a full resource set for supply and application calling.
In the embodiment shown in fig. 6, the self-contained resources in the application may be acquired first, then the resources corresponding to the default call in the system are acquired, then the overlayApk list is traversed through the PMS, and finally the full resource set is acquired to supply the application call.
The steps of obtaining the resource serial number of the self-contained resource in the application, obtaining the resource serial number of the default resource in the system and obtaining the resource replacement android application package list are not limited. For example, in other embodiments, the step 602 may be performed first, and then the step 601 may be performed.
In one embodiment, the acquisition Resource may specifically be an acquisition Resource unique code (Resource Id).
Illustratively, the default invoked resources of the system are default resources preset by the system, such as dialer package names default to Google native dialer (in order toThis application is exemplified).
A listener (e.g., a resource id listener) of the corresponding resource may listen for call operations of the application on the resource, thereby obtaining the resource called by the application: a ResourceId set. The ResourceId set may be the first information set or the second information set described in other embodiments of the present application.
And then, the resource id set can be subjected to priority ordering and hierarchical screening, and finally the resources used by the application are obtained. The obtained resources used by the application may be the target information described in other embodiments of the present application.
For the buried point technology, a mark can be added at a certain position in a program, when a certain code block is triggered, data is collected, and then the data is reported to a certain position for storage.
Based on this, in one embodiment, a buried point may be performed to add stack information in the code program of the application call information to obtain critical return value information.
Illustratively, the code program that adds stack information may have: the application invokes programs of certain system interfaces, programs of application request rights, programs of application receiving and transmitting broadcasts, and the like.
The stack information may be used to output a return value, which may include call information.
Keywords in the stack information may be retrieved, if applicable, to determine a specific call site. And further, corresponding call information can be obtained according to the call points.
Referring to table 2, corresponding stack information may be added to a program to which the application requests rights according to the contents shown in table 2.
TABLE 2
Application name | Data interface (rights control) | |
Application | ||
1 | Telephone rights | xxx.xx.xx- |
Application | ||
2 | Telephone rights | xxx.xx.xx- |
Application | ||
3 | Telephone rights | xxx.xx.aa-getsn |
By way of example, a program for an application to request telephony rights may include the following code:
getSn(){
Throwable ex=Throwable();
StackTraceElement[]stackElements=ex.getStackTrace();
}
in one embodiment, when the application runs the program, the Framework of the electronic device may obtain a keyword in stack information added in the program to confirm a specific call point.
3) The operation in this aspect of data ordering is described.
In the data sorting process, priority sorting and hierarchical screening can be performed on the collected call information to obtain dependency information for application use. The same information (e.g., same resource) may be higher priority and may cover lower priority.
In one embodiment, a hierarchy corresponding to an application may be obtained through hierarchical filtering, and then an information set composed of the same kind of information is obtained according to information corresponding to the obtained hierarchy in the information set of the application running call. And then, by priority order, determining the information with the highest relative priority from the information set composed of the same information, wherein the information can be the dependent information used by the application.
In one embodiment, from the perspective of overseas delivery of versions of an application, please refer to fig. 7, for example, there may be levels of customization (cure), version (version), vendor, product, system (system).
Taking the resource as an example, these levels may correspond to a resource set (e.g., denoted Collection [ overlay ]) as shown in fig. 7, such as a resource set composed of equivalent information of resource A1, resource A2, a resource set composed of resource B alone, and a resource set composed of resource C.
The Chinese paraphrasing of Collection may be a Collection.
For example, the number of overseas delivery versions of the same application may be greater than the number of domestic delivery versions of the application, such as tens of versions more.
For example, referring to fig. 7, the resulting information set composed of the same kind of information may be: a resource set composed of equivalent information of the resource A1 and the resource A2, a resource set composed of the resource B alone, and a resource set composed of the resource C.
In one embodiment, there may be one or more overlayapks in effect under the effective path of the hierarchy, the overlayApk under the non-effective path of the hierarchy being non-effective. The overlayApk may have priority and the overlayApk may have information that may be used by the application running. As such, the priority of the information may depend on the priority of the overlayApk to which the information corresponds.
In one embodiment, the data ordering process may include: and acquiring a hierarchy corresponding to the current version of the application, acquiring each overlayApk corresponding to the application (overlayApk corresponding to the application is effective) under the effective path of the acquired hierarchy, acquiring information owned by each overlayApk in the information set called by the running of the application, forming a set by the acquired same kind of information, and selecting the information with the corresponding highest priority in the set as the dependent information of the running use of the application.
The information with the highest relative priority belongs to the overlayApk with a higher priority than the overlayApk of other information in the set. That is, the information with high priority will cover the information with low priority, and the information that is ultimately used by the application is the information with relatively highest priority.
In one embodiment, the dependency information for application running use may be obtained in combination with a version level of an electronic device (e.g., a smart phone), a priority of information, and a level corresponding to the information. The level of the dependency information used by the application run is not higher than the version level of the electronic device, and the dependency information used by the application run has the highest priority.
Taking a mobile phone as an example, mobile phone versions may be classified in grades. For example, assume that the current handset version level is 2, and there are 3 resources of the same kind (resource A1, resource A2, and resource A3):
resource A1, its corresponding level is 3, its priority is 2;
resource A2, its corresponding level is 2, its priority is 2;
resource A3, which corresponds to a level of 1, has a priority of 3.
According to the mobile phone version level, the effective resources at this time can be determined to be the resources A2 and A3, and the resources finally used by the application can be determined to be the resources A3 because the priority of the resources A3 is higher than that of the resources A2.
Taking the resources as an example, fig. 8 shows priorities and corresponding levels of some same resources, and resources used by the application running can be obtained based on the priorities and corresponding levels of the resources and the version level of the electronic device.
The above hierarchy may be referred to as a flying horse hierarchy, which in the present embodiment is a version priority concept. The flying horse hierarchy may include, for example, the above-described custom, version, vendor, product, system hierarchy.
Correspondingly, the path may be, for example, denoted as a fly path, which is a path for placing information (such as resources) under the corresponding hierarchy. The effective path is the effective path and is different from the non-effective path. The overlayApk may also be regarded as a resource, placed under the fly path of the fly level.
According to the embodiment of the application, the overlayApk which is not effective can be removed, the overlayApk which is effective is reserved, and the dependency information of application operation is obtained based on the information under the overlayApk which is effective.
In one embodiment, the determination of whether the overlayApk is in effect or not may specifically be to determine whether the state of the overlayApk is an enabled state, where the overlayApk in the enabled state is in effect, and the overlayApk in the enabled state is not in effect.
In one embodiment, the enablement status of the overlayApk may be controlled by way of static enablement, dynamic enablement, manual enablement, and the like.
For static enablement, for example, automatic enablement after installation may be possible.
For dynamic enablement, for example, dynamic enablement in code may be possible.
For manual enablement, for example, manual enablement may be based on an adb shell command in the android operating system.
For example, for the corresponding "Glory 50 custom version "application, which can be determined by hierarchical screening that the hierarchy corresponding to the application is availableThe vendor and product, in turn, can be made available to the vendor-level under the effective pathIs effective, and is effective for "glory 50 (glory 50 is a custom product name)", under the effective path of the product level.
Wherein other overlayapks under the vendor hierarchy are not in effect, e.g. forIs not validated; other overlayapks under the product level are not effective, such as for "glory 60 (glory 60 is another product name customized)".
Assuming that 3 valid overlayapks (respectively designated as Apk1 to Apk 3) are obtained here, an information set composed of the same kind of information can be obtained from information owned by the 3 valid overlayapks in the information set called by the application running. Assuming that only Apk1 and Apk2 of the 3 valid overlayapks possess resource a, an information set composed of two identical information of resource a under the two overlayapks can be obtained.
And determining the dependency information of the application running use according to the priority of the overlayApk to which each resource A belongs in the information set. Assuming that the priority of Apk1 is lower than that of Apk2, the resource a owned by Apk2 is the dependency information used by the application running.
In another embodiment, the priority of each hierarchy may be different. In this way, dependency information for use by an application may be derived based on the priority of the hierarchy in addition to hierarchical filtering and prioritization.
Thus, in one embodiment, the hierarchy to which the application corresponds may be obtained via hierarchy screening, and then the hierarchy having the relatively highest priority is obtained from the obtained hierarchies according to the priorities of the hierarchies. And then obtaining an information set composed of the same kind of information according to the information corresponding to the hierarchy in the information set called by the application operation. And then, by priority order, determining the information with the highest relative priority from the information set composed of the same information, wherein the information can be the dependent information used by the application.
For example, for the corresponding "The application of the glory 50 customized version "can be determined that the corresponding level of the application has suppliers and products through level screening, and the corresponding level of the suppliers can be obtained if the priority of the level of the suppliers is higher than the priority of the level of the products >Is effective.
Assuming that 2 valid overlayapks (respectively designated as Apk1 and Apk 3) are obtained here, an information set composed of the same kind of information can be obtained from information owned by the 2 valid overlayapks in the information set of the application running call. Assuming that only Apk1 of the 2 valid overlayapks has resource a, an information set of the same kind of information composed of resource a itself under Apk1 can be obtained.
Because the information set only comprises one resource A, namely the resource A is defaulted to have the relative highest priority, namely the resource A owned by Apk1 is the dependent information used by the application operation.
4) The operation of this aspect of scene callback is described.
In the scene callback process, the problem scene can be callback according to the new dependency information (the new dependency information is the dependency information which is possibly correct, i.e. the new information is possibly correct or incorrect) so as to verify the possibly correct dependency information.
By simulating the use of the application by the user, a problem scene that the running function of the application has problems can be obtained.
In one implementation, in a simulated scenario, if an application does not properly implement a function, the scenario may be determined to be a problem scenario.
In one embodiment, the problem scenario may be determined by looking at the video at the point in time when the anomaly and flow blockage occurred.
In one embodiment, the corresponding possibly correct dependency information may be obtained based on the problem scenario and the obtained dependency information corresponding to the problem scenario. For example, according to the dependency information, phenomena and abnormal log analysis of scene use, corresponding possibly correct dependency information can be obtained.
Taking the resource-dependent information as an example, the potentially correct resource may be used to generate the relative highest priority overlayApk. For example, an overlayApk may be generated that has a relatively highest flying horse level priority, a relatively highest overlayApk priority, and contains the resource. The resources in the overlayApk are resources used by the application running, and the verification problem scene can be adjusted back and forth accordingly. For example, the application may be triggered to run the corresponding function using the generated overridapk to see if the application can normally run the function. If the function is functioning properly, it may indicate that the correct resource is being used.
Considering that there may be multiple resources, but each authority, broadcast, and system interface is unique, the implementation of the problem scene callback based on the resource may be different from the implementation of the problem scene callback based on the authority, broadcast, and system interface.
For the dependency information such as authority, broadcasting and system interfaces, the return value of the dependency information can be controlled to carry out the callback of the problem scene.
Illustratively, the return value of the rights may be: no authority exception reporting error.
Illustratively, the return value of the broadcast may be: no broadcast or broadcast action error is received.
Illustratively, the return value of the interface may be: specific object services or basic type parameters.
The embodiment can verify whether the modified dependency information is correct or not and whether the application corresponding function is normal or not by re-executing the problem scene once.
In the embodiment, the user scene is simulated first, then the application is used based on the simulated user scene, and the dependency information used by the running of the application can be obtained. The information acquisition implementation manner provided by the embodiment can automatically acquire the dependency information used by the application (namely automatically generating the application related dependency), does not need to acquire the dependency information manually, is more efficient in information acquisition, and is beneficial to more efficient and rapid delivery when developers and testers meet the requirements.
The information acquisition method provided by the embodiment of the invention can improve the development efficiency of the three-party application presets, can quickly sort out the rights and resources which need to be adapted for different three-party applications, and can reduce the development cost of the three-party application presets.
Fig. 9 is a schematic diagram of an information acquisition manner according to an embodiment of the present application. Referring to fig. 9, the implementation of the information acquisition manner may include the following.
First, an artificial intelligence Engine (AI Engine) may be used to simulate the use scenario of a user for an Application (APP), and reinforcement learning algorithms may be employed to train the simulated behavior of the robot to have different behavioral preferences. To ensure the reliability, integrity of the simulated behavior, the user may dynamically set relevant parameters (such as parameters regarding user preferences, behavior constraints, number of users, malicious operations, etc.) as desired.
After simulating the usage scenario, the application may be launched and run under the usage scenario to simulate the use of the application by the user. When the application is used in a simulation mode, the application can send out an information acquisition request for acquiring an information set called by the application operation in order to operate the corresponding function.
In response to the information obtaining request, the electronic device may take the resource obtaining as an example, firstly obtain a resource serial number (for example, app: getextensible (r.id)) of a self-contained resource in the application, and then obtain a resource serial number (for example, system: getResource (id.cfg)) of a default resource in the System, and obtain a corresponding resource according to the obtained resource serial number (for example, id.cfg). Based on the system framework application package (e.g., framework-res. Apk), the default resources (e.g., 0x 01) in the corresponding system can be obtained according to the resource sequence number. Based on the application package (e.g., app.apk) of the application, the corresponding in-application self-contained resource (e.g., 0x7 f) can be obtained according to the resource serial number. Based on the resource replacement application package (such as overlay. Apk), a resource replacement android application package list (such as pms. Getapklist ()) can be obtained through the package management service to obtain resource replacement information. Based on the obtained self-contained resources in the application, default resources in the system and resource replacement information, resource replacement can be performed, so that a full resource set (such as Date) is obtained to supply the application call. The full resource set includes dependency information used by the application to run.
A frame (Framework) of the electronic device may use a preset Listener (Listener) to monitor an information calling operation by an application, and when the information calling operation is monitored, an information set called by the application running may be acquired. The information set includes dependency information used by the application running, where the dependency information may be at least some or all of rights (Permission), broadcast (Broadcast), resource serial number (Resource ID), and interface (Function) as shown in fig. 9.
Stack (stack) information may be added in a buried manner in a code program that applies call information, as applicable. When the application running the code program is monitored, the calling point of the information can be determined according to the keywords in the stack information, and then the information set called by the application running can be obtained according to the calling point.
The framework of the electronic device may obtain anomaly information (error) of the application running, and further generate a test report according to the anomaly information. The exception information may be used to indicate whether the application is running successfully based on the dependency information used.
The electronic device may obtain a test report of the application running, which may record whether the application is running successfully based on the dependency information used. If the operation is successful, the dependent information can be considered to be correct, otherwise, the dependent information is considered to be wrong.
An embodiment of the present application further provides an information obtaining apparatus, which may include: the first acquisition module is used for acquiring a first information set called by an application execution information calling operation; the second acquisition module is used for acquiring target information in the first information set, wherein the target information is used as dependent information used by application operation, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
One embodiment of the present application also provides an electronic chip, which is mounted in an electronic device (UE), the electronic chip including: a processor for executing computer program instructions stored on a memory, wherein the computer program instructions, when executed by the processor, trigger an electronic chip to perform the method steps provided by any of the method embodiments of the present application.
An embodiment of the present application further proposes a terminal device, which includes a communication module, a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the terminal device to execute the method steps provided by any of the method embodiments of the present application.
An embodiment of the present application further proposes a server device comprising a communication module, a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the server device to perform the method steps provided by any of the method embodiments of the present application.
An embodiment of the present application also provides an electronic device, including a plurality of antennas, a memory for storing computer program instructions, a processor for executing the computer program instructions, and a communication means (such as a communication module that may enable 5G communication based on an NR protocol), where the computer program instructions, when executed by the processor, trigger the electronic device to perform the method steps provided by any of the method embodiments of the present application.
In particular, in an embodiment of the present application, one or more computer programs are stored in the memory, the one or more computer programs comprising instructions which, when executed by the apparatus, cause the apparatus to perform the method steps described in the embodiments of the present application.
Specifically, in an embodiment of the present application, the processor of the electronic device may be a System On Chip (SOC), where the processor may include a central processing unit (Central Processing Unit, CPU), and may further include other types of processors. Specifically, in an embodiment of the present application, the processor of the electronic device may be a PWM control chip.
In particular, in an embodiment of the present application, the processor may include, for example, a CPU, DSP (digital signal processor ) or microcontroller, and may further include a GPU (graphics processing unit, graphics processor), an embedded Neural network processor (Neural-network Process Units, NPU), and an image signal processor (Image Signal Processing, ISP), where the processor may further include a necessary hardware accelerator or logic processing hardware circuit, such as an ASIC, or one or more integrated circuits for controlling the execution of the program of the present application, and so on. Further, the processor may have a function of operating one or more software programs, which may be stored in a storage medium.
In particular, in an embodiment of the present application, the memory of the electronic device may be a read-only memory (ROM), other type of static storage device capable of storing static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device capable of storing information and instructions, an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (compact disc read-only memory, CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any computer readable medium capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by a computer.
In particular, in an embodiment of the present application, the processor and the memory may be combined into a processing device, more commonly separate components, and the processor is configured to execute the program code stored in the memory to implement the method described in the embodiment of the present application. In particular, the memory may also be integrated into the processor or may be separate from the processor.
Further, the devices, apparatuses, modules illustrated in the embodiments of the present application may be implemented by a computer chip or entity, or by a product having a certain function.
It will be apparent to those skilled in the art that embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied therein.
In several embodiments provided herein, any of the functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
Specifically, in an embodiment of the present application, there is further provided a computer readable storage medium, where a computer program is stored, when the computer program is executed on a computer, to cause the computer to perform the method steps provided in the embodiments of the present application.
An embodiment of the present application also provides a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method steps provided by the embodiments of the present application.
The description of embodiments herein is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments herein. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the elements is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or units, which may be in electrical, mechanical, or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in hardware plus software functional units.
The integrated units, implemented in the form of software functional units, may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a Processor (Processor) to perform part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In the present embodiments, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments in part.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The foregoing description of the preferred embodiments of the present invention is not intended to limit the invention to the precise form disclosed, and any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention are intended to be included within the scope of the present invention.
Claims (16)
1. An information acquisition method, characterized by comprising:
acquiring a first information set called by an application execution information calling operation;
and acquiring target information in the first information set, wherein the target information is used as dependent information used by the running of the application, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
2. The method of claim 1, wherein prior to the acquiring the first set of information invoked by the application execution information invocation operation, the method further comprises:
simulating a first running scenario of the application using artificial intelligence;
and starting and running the application in the first running scene, and executing the using operation of the application in the process of running the application.
3. The method of claim 1, wherein the dependency information comprises at least one of rights, broadcast, resources, and interfaces.
4. A method according to claim 3, wherein the resource comprises at least one of configuration item, picture, audio, string information.
5. The method of claim 1, wherein prior to the acquiring the first set of information invoked by the application execution information invocation operation, the method further comprises:
responding to an information acquisition request sent by the application to acquire system default calling information;
according to the default call information of the system, traversing a resource replacement application program package through a package management service to obtain the first information set;
the first set of information is provided to the application.
6. The method according to claim 1, wherein the method further comprises:
monitoring whether the application executes the information calling operation or not;
and under the condition that the application executes the information calling operation is monitored, executing the step of acquiring the first information set called by the application executing the information calling operation.
7. The method of claim 6, wherein the listening whether the application performs the information call operation comprises:
monitoring whether the application runs a first code program, wherein the first code program is a code program for calling the first information set, and comprises first stack information added in a buried point mode;
The acquiring the first information set called by the application execution information calling operation comprises the following steps:
determining a call point corresponding to the first information set according to the keywords in the first stack information under the condition that the application runs the first code program is monitored;
and obtaining a return value comprising the first information set according to the call point corresponding to the first information set.
8. The method of claim 1, wherein the obtaining the first set of information invoked by the application execution information invocation operation comprises:
acquiring a second information set called by the application executing the information calling operation;
and acquiring the first information set in the second information set, wherein each piece of information in the first information set is the same kind of information.
9. The method of claim 8, wherein the obtaining the first set of information in the second set of information comprises:
determining a first hierarchy corresponding to the application;
determining a resource replacement application program package corresponding to the application under the first level;
and acquiring the first information set from the information corresponding to the determined resource replacement application program package in the second information set.
10. The method of claim 9, wherein the determining a resource replacement application package corresponding to the application at the first level comprises:
determining a target level corresponding to the application from the determined first levels in the case that the number of the first levels is more than one, wherein the priority of the target level is higher than that of other levels corresponding to the application;
and determining a resource replacement application program package corresponding to the application under the target level.
11. The method of claim 1, wherein the obtaining the target information in the first set of information comprises:
according to the resource replacement application program package to which the information in the first information set belongs, obtaining target information in the first information set;
the priority of the resource replacement application program package to which the target information belongs is higher than the priority of the resource replacement application program package to which other information belongs in the first information set.
12. The method according to claim 1, wherein the method further comprises:
acquiring a first test result, wherein the first test result is used for identifying whether the application runs successfully or not based on the target information;
Acquiring information for updating and replacing the target information under the condition that the first test result indicates that the application does not run successfully based on the target information;
and executing the step of acquiring the first information set called by the application execution information calling operation again according to the acquired information for updating and replacing the target information.
13. An information acquisition apparatus, characterized by comprising:
the first acquisition module is used for acquiring a first information set called by an application execution information calling operation;
the second acquisition module is used for acquiring target information in the first information set as the dependency information used by the application running, and the priority corresponding to the target information is higher than the priority corresponding to other information in the first information set.
14. An electronic chip, comprising:
a processor for executing computer program instructions stored on a memory, wherein the computer program instructions, when executed by the processor, trigger the electronic chip to perform the method of any of claims 1-12.
15. An electronic device comprising a memory for storing computer program instructions, a processor for executing the computer program instructions, and communication means, wherein the computer program instructions, when executed by the processor, trigger the electronic device to perform the method of any of claims 1-12.
16. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when run on a computer, causes the computer to perform the method according to any of claims 1-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210979156.3A CN116048617B (en) | 2022-08-16 | 2022-08-16 | Information acquisition method, device, chip, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210979156.3A CN116048617B (en) | 2022-08-16 | 2022-08-16 | Information acquisition method, device, chip, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116048617A true CN116048617A (en) | 2023-05-02 |
CN116048617B CN116048617B (en) | 2024-05-24 |
Family
ID=86127884
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210979156.3A Active CN116048617B (en) | 2022-08-16 | 2022-08-16 | Information acquisition method, device, chip, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116048617B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04141733A (en) * | 1990-10-02 | 1992-05-15 | Fujitsu Ltd | Level-up management system for software package |
CN105912342A (en) * | 2016-04-29 | 2016-08-31 | 乐视控股(北京)有限公司 | APK (Android Package) development method and system based on overlay mechanism |
CN110149540A (en) * | 2018-04-27 | 2019-08-20 | 腾讯科技(深圳)有限公司 | Recommendation process method, apparatus, terminal and the readable medium of multimedia resource |
CN110971564A (en) * | 2018-09-28 | 2020-04-07 | 华为技术有限公司 | Method, client and server for transmitting media data |
CN111767063A (en) * | 2019-04-02 | 2020-10-13 | 青岛海信移动通信技术股份有限公司 | Resource updating method, device and equipment for application program |
US20200334885A1 (en) * | 2018-09-28 | 2020-10-22 | Snap Inc. | System and method of generating targeted user lists using customizable avatar characteristics |
CN112214325A (en) * | 2020-10-20 | 2021-01-12 | 杭州电子科技大学 | FPGA task dynamic arrangement method, device, chip and storage medium |
US20210200501A1 (en) * | 2019-12-27 | 2021-07-01 | Abalta Technologies, Inc. | Projection, control, and management of user device applications using a connected resource |
CN113076128A (en) * | 2020-01-03 | 2021-07-06 | 北京猎户星空科技有限公司 | Method and device for robot configuration, electronic equipment and storage medium |
CN113805797A (en) * | 2021-06-17 | 2021-12-17 | 荣耀终端有限公司 | Network resource processing method, electronic device and computer readable storage medium |
CN114202366A (en) * | 2021-12-15 | 2022-03-18 | 广东电力信息科技有限公司 | Prediction method based on real-time data of marketing system in power industry |
CN114297061A (en) * | 2021-12-27 | 2022-04-08 | 南京中孚信息技术有限公司 | Software project fault positioning method and device and electronic equipment |
-
2022
- 2022-08-16 CN CN202210979156.3A patent/CN116048617B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH04141733A (en) * | 1990-10-02 | 1992-05-15 | Fujitsu Ltd | Level-up management system for software package |
CN105912342A (en) * | 2016-04-29 | 2016-08-31 | 乐视控股(北京)有限公司 | APK (Android Package) development method and system based on overlay mechanism |
CN110149540A (en) * | 2018-04-27 | 2019-08-20 | 腾讯科技(深圳)有限公司 | Recommendation process method, apparatus, terminal and the readable medium of multimedia resource |
CN110971564A (en) * | 2018-09-28 | 2020-04-07 | 华为技术有限公司 | Method, client and server for transmitting media data |
US20200334885A1 (en) * | 2018-09-28 | 2020-10-22 | Snap Inc. | System and method of generating targeted user lists using customizable avatar characteristics |
CN111767063A (en) * | 2019-04-02 | 2020-10-13 | 青岛海信移动通信技术股份有限公司 | Resource updating method, device and equipment for application program |
US20210200501A1 (en) * | 2019-12-27 | 2021-07-01 | Abalta Technologies, Inc. | Projection, control, and management of user device applications using a connected resource |
CN113076128A (en) * | 2020-01-03 | 2021-07-06 | 北京猎户星空科技有限公司 | Method and device for robot configuration, electronic equipment and storage medium |
CN112214325A (en) * | 2020-10-20 | 2021-01-12 | 杭州电子科技大学 | FPGA task dynamic arrangement method, device, chip and storage medium |
CN113805797A (en) * | 2021-06-17 | 2021-12-17 | 荣耀终端有限公司 | Network resource processing method, electronic device and computer readable storage medium |
CN114202366A (en) * | 2021-12-15 | 2022-03-18 | 广东电力信息科技有限公司 | Prediction method based on real-time data of marketing system in power industry |
CN114297061A (en) * | 2021-12-27 | 2022-04-08 | 南京中孚信息技术有限公司 | Software project fault positioning method and device and electronic equipment |
Non-Patent Citations (3)
Title |
---|
GRAYMONKEY: "Android Overlay机制", pages 1, Retrieved from the Internet <URL:https://www.jianshu.com/p/9304089c513d> * |
李翰超;李伟楠;石文昌;: "一种借助系统调用实现基于信息流的完整性度量的方法", 计算机与数字工程, no. 08 * |
杨天雨;: "基于Android Overlay机制的资源替换方法研究", 江苏经贸职业技术学院学报, no. 06, 28 December 2019 (2019-12-28) * |
Also Published As
Publication number | Publication date |
---|---|
CN116048617B (en) | 2024-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021027630A9 (en) | Patching method, related apparatus, and system | |
CN113672420B (en) | Fault detection method and electronic equipment | |
CN114124980B (en) | Method, device, system, terminal and storage medium for starting application | |
CN116055712B (en) | Method, device, chip, electronic equipment and medium for determining film forming rate | |
CN114741256B (en) | Sensor monitoring method and device and terminal equipment | |
CN115309431A (en) | Parameter updating method, readable medium and electronic equipment | |
CN114065229A (en) | Authority management method and terminal equipment | |
CN115185652B (en) | Application optimization method and device and electronic equipment | |
WO2022057567A1 (en) | Database repair method and electronic device | |
CN116669064B (en) | Wireless protocol testing method and electronic equipment | |
CN116048617B (en) | Information acquisition method, device, chip, electronic equipment and medium | |
CN113656089B (en) | Class verification method and device in application program | |
CN114692137A (en) | Application security analysis method, device, equipment and storage medium | |
CN117707628A (en) | Device initialization method, electronic equipment and readable storage medium | |
CN115314427A (en) | Protocol testing method, electronic equipment and chip system | |
CN117707562B (en) | Parameter updating method and terminal equipment | |
CN117130808B (en) | Log acquisition method and electronic equipment | |
CN116048594B (en) | Software upgrading method and related device | |
CN118260121A (en) | Application repair method and device and electronic equipment | |
CN116841575B (en) | Method and related device for generating image file | |
CN116450026B (en) | Method and system for identifying touch operation | |
CN116048710B (en) | Application identifier display method, electronic device and readable storage medium | |
CN117950677A (en) | Software distribution method, electronic equipment and system | |
CN116662129A (en) | Log acquisition method, device, chip, electronic equipment and medium | |
CN116662284A (en) | Log management method, device, chip, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |