CN116302454B - Method for applying network resources and electronic equipment - Google Patents

Method for applying network resources and electronic equipment Download PDF

Info

Publication number
CN116302454B
CN116302454B CN202310573017.5A CN202310573017A CN116302454B CN 116302454 B CN116302454 B CN 116302454B CN 202310573017 A CN202310573017 A CN 202310573017A CN 116302454 B CN116302454 B CN 116302454B
Authority
CN
China
Prior art keywords
application
network
interface
network access
access authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310573017.5A
Other languages
Chinese (zh)
Other versions
CN116302454A (en
Inventor
李兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202310573017.5A priority Critical patent/CN116302454B/en
Publication of CN116302454A publication Critical patent/CN116302454A/en
Application granted granted Critical
Publication of CN116302454B publication Critical patent/CN116302454B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides a method for applying network resources and electronic equipment, and relates to the technical field of terminals. The application provides a method for applying network resources, wherein a display screen of electronic equipment is in a screen-off state, and the method comprises the following steps: triggering and detecting whether the network access authority of the first application is opened or not when the first application detects that the preset condition is met; if the network access authority of the first application is detected to be forbidden, the first application registers a first callback function and sends a network recovery request (such as identification information of the first application and the first callback function) to the second application; the second application responds to the network restoration request, controls the network module to restore the network access authority of the first application and acquires the network restoration result of the first application; and calling a first callback function to return the network recovery result of the first application to the first application. By adopting the method, the failure probability of searching the package, downloading the installation package or authenticating the software updating application can be reduced, and the use experience of a user can be improved.

Description

Method for applying network resources and electronic equipment
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method for applying for network resources and an electronic device.
Background
When a user uses a mobile terminal, a plurality of application programs are usually started, and after the terminal is off-screen, the application programs still run in the background, so that the power consumption of the terminal is increased and the system resources are wasted. In order to reduce resource waste (such as electricity consumption) when the mobile terminal is off-screen, an application program (such as a power-saving sprite) in the mobile terminal generally limits network access rights of the application program not in the white list when the mobile terminal is off-screen, for example, the power-saving sprite in the mobile terminal closes the network access rights of the game application when the mobile terminal is off-screen.
When the mobile terminal is in the off-screen state and the software update application of the mobile terminal triggers searching for a new installation package of the installed software, the network access authority is applied to the power-saving eidolon. However, the failure probability of the software update application of the mobile terminal to search for a new installation package of installed software is very high, degrading the user's use experience.
Disclosure of Invention
In order to solve the technical problems, the application provides a method for applying network resources and electronic equipment, which can reduce the failure probability of executing requests such as searching, downloading installation packages or authenticating by a software updating application and improve the use experience of users.
In a first aspect, the present application provides a method for applying network resources, applied to an electronic device, where a display screen of the electronic device is in a screen-off state, and the electronic device is installed with a first application and a second application, and the second application is used for managing network access rights of each application, where the method includes: triggering and detecting whether the network access authority of the first application is opened or not when the first application detects that the preset condition is met; if the network access right of the first application is detected to be forbidden, the first application registers the first callback function and sends a network recovery request to the second application, wherein the network recovery request comprises: identification information of a first application and a first callback function; the second application responds to the network restoration request, controls the network module to restore the network access authority of the first application and acquires the network restoration result of the first application; the second application returns the network recovery result of the first application to the first application by calling the first callback function.
In this way, the second application responds to the network recovery request (including the first callback function and the identification information of the first application), and controls the network module to recover the network access right of the first application, the second application synchronously returns the network recovery result of the first application to the first application through the first callback function instead of directly returning the information that the network has been recovered after receiving the network recovery request, so that the accuracy of the returned network recovery result is ensured, and the problem that the electronic equipment subsequently fails to operate based on the network state of the wrong first network (namely, the state of the network access right of the first application) is avoided.
According to the first aspect, the second application responds to the network restoration request, controls the network module to restore the network restoration authority of the first application and obtains the network restoration result of the first application, and includes: the first interface of the second application responds to the network recovery request, the identification information of the first callback function and the first application is transmitted to the second interface of the second application, and the second interface is used for receiving the asynchronously processed information and waiting for a network recovery result returned by the third interface of the second application; the second interface transmits the identification information of the first application to the third interface; the third interface marks the identification information of the first application so that the network module can recover the network access authority of the first application; and the network module executes the operation of recovering the network access right to the first application and returns the network recovery result to the third interface. Thus, the second application transmits the first callback function to the second interface, and the second interface waits for the third interface to return the network recovery result, so that the network recovery result can be synchronized back to the first application in time.
According to a first aspect, the marking, by the third interface, identification information of the first application for the network module to recover network access rights of the first application includes: the third interface adds a first mark for the identification information of the first application, wherein the first mark is used for indicating that the application to which the first mark belongs is allowed to open the network access right; the third interface transmits the marked identification information of the first application to the network module; the network module recognizes that the first application is allowed to open the network access right, restores the network access right of the first application, and returns a network restoration result of the first application to the third interface. In this way, the third interface of the second application adds the first flag to the identification information of the first application, so that the network module can quickly identify that the first application is an application that allows the network access to be opened.
According to a first aspect, the second application returns a network recovery result of the first application to the first application by calling a first callback function, including: the third interface returns the network recovery result to the second interface; the second interface calls a first callback function, and returns a network recovery result of the first application to the first application. In this way, the second interface (such as the handlekeepalive action interface) of the first application can directly feed back the network recovery result of the first application to the first application by calling the first callback function, thereby realizing the function of synchronizing the network recovery result of the first application to the first application.
According to a first aspect, the method further comprises: and prohibiting the fourth interface from returning first information to the first application, wherein the first information is used for indicating that the network access authority of the first application is opened, and the fourth interface is positioned between the first interface and the second interface and is used for transmitting the first callback function and the identification information of the first application to the second interface for the first interface. In this way, the fourth interface is disabled from returning the first information to the first application, avoiding a wrong network state of the first application returned by the fourth interface.
According to a first aspect, the first application is a software update application.
According to a first aspect, the first application detecting the preset condition comprises: the first application detects that a first trigger is triggered, the first trigger is used for indicating that the first application meets software searching conditions, and the software searching conditions comprise: the duration of the electronic equipment in the screen-off state reaches the preset duration; or the first application searches for a new version of the application installation package; or alternatively; the first application detects that a new version of the application installation package has been downloaded. In this way, when the first application is in the package searching scene, the package downloading installation package or the authentication scene before installing the installation package, the first application is triggered to detect the network access authority of the first application, and in this example, the second application can synchronize the network recovery result of the first application to the first application through the first callback function, so as to reduce the failure probability of executing the package searching request, the package downloading installation package or the authentication request by the first application.
According to a first aspect, in case the first application detects that the first trigger is triggered, the method further comprises: and if the network restoration result of the first application indicates that the network access authority of the first application is restored, executing the step of searching the new version of application installation package. In this way, the first application determines whether to continue to perform the packet searching operation based on the network recovery result of the first application returned by the second application, instead of performing the packet searching operation based on the first information returned by the first application (i.e., the first information is used to indicate the information that the network has recovered), which can reduce the probability of packet searching failure.
According to a first aspect, if the first application searches for a new version of the application installation package, the method further comprises: if the network restoration result of the first application indicates that the network access authority of the first application is restored, downloading an application installation package of a new version; responding to a screen-lighting operation input by a user, and displaying first prompt information on a display interface of the electronic equipment, wherein the first prompt information is used for indicating the electronic equipment to successfully download the new version of application installation package; if the network restoration result of the first application indicates that the network access authority of the first application is not restored, responding to the screen-lighting operation, and displaying second prompt information on a display interface, wherein the second prompt information is used for indicating that the electronic equipment does not successfully download the new version of application installation package. In this way, the first application executes subsequent operations based on the network recovery result of the first application, and when the electronic equipment corresponds to the screen-lighting operation input by the user, the first prompt information is displayed, so that the user can be informed that the installation package of the new version of the application is successfully downloaded; if the downloading fails, the second prompt message is displayed, and the user can be informed of the downloading failure, so that the user can manually recover the network, and the electronic equipment can timely download the new version of installation package again.
According to a first aspect, if the first application has downloaded a new version of the application installation package, the method further comprises: if the network restoration result of the first application indicates that the network access right of the first application is restored, executing authentication operation; responding to the screen-lighting operation input by the user, and displaying third prompt information on a display interface of the electronic equipment, wherein the third prompt information is used for indicating that the authentication of the first application is successful; if the network restoration result of the first application indicates that the network access right of the first application is not restored, fourth prompt information is displayed on a display interface in response to the screen-lighting operation input by the user, wherein the reason that the fourth prompt information is used for indicating that the authentication of the electronic equipment fails is that the first application has no network access right. In this way, the first application executes subsequent operations based on the network recovery result of the first application, and when the electronic equipment responds to the screen-lighting operation input by the user, third prompt information is displayed, so that the user can be informed of successful installation authentication operation of the new version application installation package, and subsequent installation steps can be executed; if the installation authentication fails, displaying a fourth prompt message, and informing the user of the installation authentication failure of the new version of the application installation package, so that the user can manually recover the network, the electronic equipment can authenticate the installation of the new version of the installation package again, and the installation step is executed.
In a second aspect, the present application provides an electronic device comprising: one or more processors; a memory; and one or more computer programs, wherein the one or more computer programs are stored on the memory, which when executed by the one or more processors, cause the electronic device to perform the first aspect and a method of applying for network resources corresponding to any implementation of the first aspect.
Any implementation manner of the second aspect and the second aspect corresponds to any implementation manner of the first aspect and the first aspect, respectively. The technical effects corresponding to the second aspect and any implementation manner of the second aspect may be referred to the technical effects corresponding to the first aspect and any implementation manner of the first aspect, which are not described herein.
In a third aspect, the present application provides a computer readable medium storing a computer program, where the computer program when executed on an electronic device causes the electronic device to execute a method for applying for a network resource according to any implementation manner of the first aspect or the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments of the present application will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram illustrating a failure of a software update application to update software;
FIG. 2 is a flow chart of an exemplary illustrated software update application search package;
fig. 3 is a schematic structural view of an exemplary illustrated electronic device;
FIG. 4 is a block diagram of a software architecture of an exemplary electronic device;
FIG. 5 is a flow chart illustrating a method of applying for network resources;
FIG. 6 is a schematic diagram of an exemplary software update application applying for network resources in a search scenario;
FIG. 7 is a schematic diagram illustrating the success of a software update application download installation package;
FIG. 8 is a schematic diagram illustrating a failure of a software update application to download an installation package;
FIG. 9 is a schematic diagram illustrating an exemplary failure of a software update application to install a new version of an installation package;
FIG. 10 is a schematic diagram illustrating the success of installing a new version of an installation package for a software update application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone.
The terms first and second and the like in the description and in the claims of embodiments of the application, are used for distinguishing between different objects and not necessarily for describing a particular sequential order of objects. For example, the first target object and the second target object, etc., are used to distinguish between different target objects, and are not used to describe a particular order of target objects.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the description of the embodiments of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more. For example, the plurality of processing units refers to two or more processing units; the plurality of systems means two or more systems.
Before the technical scheme of the embodiment of the application is described, an application scenario of applying network resources in the embodiment of the application is described with reference to the accompanying drawings. In order to reduce power consumption in the off-screen state, a mobile phone may perform network management and control on applications running in the background, for example, the mobile phone is installed with a power-saving smart, and the power-saving smart is used for managing and controlling network access rights of each application. When the mobile phone is off-screen, the power-saving eidolon controls the network module to close the network access authority of the application which is not in the network white list (or the limited network white list, hereinafter also referred to as the white list); controlling the network module to open network access rights for the application in the network white list; thereby reducing the power consumption of the application.
The mobile phone is provided with a software update application which can search whether a new version exists based on the version information of the application installed on the current mobile phone, for example, the mobile phone is provided with 11 types of applications, and the software update application can search whether an installation package of the new version of the 11 types of applications exists in a network based on the version information of the current 11 types of applications. The application may also download a new version of the installation package for the application from the server and install the new version of the installation package. In general, when the software updating application detects that the mobile phone is in a screen-off state, whether a packet searching condition is met is detected, and the packet searching condition can be: the duration of detecting that the mobile phone is in the off-screen state reaches a first preset duration (such as half an hour, 15 minutes, etc.). Triggering and detecting the network state of the software updating application when the software updating application detects that the package searching condition is met, and if the network access authority of the software updating application is forbidden by the power-saving eidolon; the software update application applies for restoration of network access rights to the power saving puck. And recovering the network access authority of the software updating application by the power-saving eidolon control network module. Although the power saving wizard responds to the application of the software update application, the control network module restores the network access rights of the software update application, but the probability that the software update application fails to search for a package (i.e., search for a new software installation package) is still high.
In some embodiments, when the software update application detects a new software installation package and is in an off-screen state, detecting a network state of the software update application is required before downloading, if the network access rights of the software update application are disabled by the power saving puck; the software update application applies for restoration of network access rights to the power saving puck. And the network module is controlled by the power-saving eidolon to restore the network access authority of the software updating application. Although the power saving eidolon responds to the application of the software updating application, the control network module restores the network access authority of the software updating application, but the probability of failure of the software updating application in downloading the installation package due to no network is still high. As shown in fig. 1a, the mobile phone is in an off-screen state, and the display interface 101 of the mobile phone is not turned on. When the user turns on the mobile phone, as shown in 1b in fig. 1, the display interface 102 displays a prompt message 103 of the download failure.
The process of the software update application search package is specifically described below in conjunction with fig. 2, including:
step 201: the power saving eidolon manages the network.
In this example, the electronic device takes a mobile phone as an example, and a power saving smart application (also referred to as a power saving smart) and a software update application are installed in the mobile phone. The power saving eidolon can be used to manage network access rights for applications in the handset. Optionally, the power saving eidolon may perform the network limiting operation when it detects that the duration of the mobile phone screen-off reaches a second preset duration (e.g., half an hour, 15 minutes, 1 hour, etc.).
The net limiting operation comprises the following steps: the power saving puck initializes a whitelist that records identification information of applications that the power saving puck allows for opening network access. The identification information of the application in the white list may be set by a user, and the power saving puck adds the identification information of the application in the white list in response to an adding operation of the user. The application types belonging to the whitelist may be a message push application, an instant messaging (Instant Messaging, "IM") application, a user aware class application, etc. The power saving puck issues a network limiting policy to the network module, which may be a whitelist. And after the network module receives the white list, the application outside the white list is forbidden to use the network resource, namely, the application outside the white list is forbidden to open the network access right.
The network module prohibits the application outside the white list from using the network resource, and the network state of the application outside the white list is in the interrupt state (i.e. in the Block state).
Step 202: a search for package alarm (alarm) in the software update application is triggered, executing step 203.
For example, the software updating application may trigger the packet searching alarm when the duration of detecting that the mobile phone is in the off-screen state reaches the first preset duration. The first preset time period may be half an hour, 1 hour or 15 minutes. In this example, the first preset time period is exemplified by half an hour.
Step 203: the software update application detects the network status of a software update (application). If it is detected that the network state is the interrupt (Block) state, a network recovery request is sent to the power saving wizard, and step 204 is executed; if the network state is detected to be a Connected (Connected) state; the search request is performed, step 213.
The software update application detects the current network state of the software update application, and if it is detected that the network state of the software update application is an interrupt (i.e., block) state, it is determined that the network access rights of the software update application are disabled, and step 204 may be performed. If it is detected that the network state of the software update application is a Connected (Connected) state, it is determined that the software update application has access to the network, i.e. step 213 is performed.
Step 204: the software update application applies for recovering network access rights to the power saving puck.
Illustratively, the software update application applies for recovering network access rights to the power saving puck, and specifically, the software update application sends an application request to the power saving puck, where the application request includes: the software updates the identification information of the application. The identification information of the software update application is a unique identification of the software update application, and the identification information of the software update application may be a UID (e.g., user Identification, user identification) of the application. The application request may further include: information such as a type of resource application, application duration, application reason and the like, wherein the type of the resource application is used for indicating a type of resource applied to the power-saving eidolon by the software updating application, and the type of the resource application in the example can be a type for applying to recover network access rights; the application duration is the duration that the software update application is allowed to access the network; the application cause may be used to indicate the role of the applied network resource, such as: the network is used to search for new software installation packages.
In this example, the software update application invokes a resource application interface (i.e., an application forresourceuse interface, also referred to as a first interface in the present application), and transmits information of an application request, such as an application forresourceuse (String module, int resource type, long time lnms, string request), to the resource application interface, where module is a package name of an application program applying for a resource (for example, may be identification information of the software update application), and resource type is a type of resource application (for example, a type of recovering network access rights); timeoutInMs are the duration of the application and reason is the reason for the application.
The resource application interface in the power saving eidolon receives the application request, passes the request to the next interface (e.g., handleRequestResmsg), and the next interface processes the application request.
Step 205: the power saving puck processes the request to restore network access rights.
The resource application interface sends a first message to the handleRequestResmsg interface according to the application request, where the first message carries information such as a package name of the software update application, a type of the application, and the like. The handleRequestResmsg interface processes received messages using an asynchronous processing mechanism (i.e., handle mechanism). In this example, the handleRequestResmsg interface issues a second message to the next interface (i.e., the keepalifereq interface), where the second message carries information about the package name of the software update application, the type of application, and the like.
Step 206: the power saving wizard returns the network restored information to the software update application.
Illustratively, the keepalifeq interface returns information (also referred to as first information) indicating that the network has been restored directly to the software update application upon receiving the second message, such as a return of "true" directly to the software update application indicating that the software update application has restored network access rights. Because the handleRequestResmsg interface in the power saving eidolon adopts an asynchronous mechanism to issue messages, the keepalifeq interface returns a message immediately when receiving the message, and the message is not processed at this time. That is, when the keepalive req interface returns information indicating that the network has been restored to the software update application, the keepalive req interface also processes the received second message, as in this example, the keepalive req interface distributes messages to the dispatchkeepalive stateaction interface.
Step 207: the power saving wizard distributes the message and performs asynchronous processing.
The dispatchKeepAlyStateAction interface receives a message distributed by the keepAlyReq interface, wherein the distributed message carries the package name of the software update application and the type of the application. The dispatchkeepaleavStateAction interface may asynchronously process received messages. In this example, the step of asynchronous processing will not be described in detail, and the dispatchkeepalive stateaction interface may continue to issue a message to the next interface, where the message issued by the dispatchkeepalive stateaction interface carries the package name of the software update application and the type of the application.
Step 208: the power saving eidolon issues messages and performs asynchronous processing operations.
The NotifyPowerActionChange interface in the power saving eidolon receives the message issued by the dispatchKeepAlyStateAction interface, executes asynchronous processing operation, and issues a message containing the package name of the software update application and the type of application to the next interface.
Step 209: the power saving puck receives the processed message.
The HandleKeepAlveAction interface of the power-saving eidolon can receive the message issued by the NotifyPowerActionChange interface and asynchronously process the received message. Meanwhile, the HandleKeepAlveAction interface can determine the package name of the soft update application sent to the white list update interface according to the type of the application.
Step 210: the power saving eidolon updates the whitelist and issues the whitelist to the network module.
The white list update interface (updateFirewall whiteList interface) obtains the package name of the software update application, and adds the package name of the software update application to the white list. The updateFirewall whiteList interface transmits the updated whitelist to the network module.
Step 211: the network module sets up a white list.
The network module receives the updated white list, identifies the packet name of each application in the white list, determines that the software update application is allowed to use the network, and recovers the network access rights of the software update application.
Step 212: the network module queries the network status of each application in the white list.
For example, after the network module restores the network access rights of the software update application, the network state of the software update application may be synchronized, i.e., the network module may return the network restoration results of the software update application to the updateFirewall WhiteList interface. In this example, after the network module updates the network access rights of the application, a query interface (connectivitymanager interface) may be invoked to query the network state of the software update application, where the query result is network restoration.
It will be appreciated that this step 212 may not be performed.
Step 213: and the software updating software receives the network recovery result and executes the packet searching request.
Specifically, since the keepalifeq interface returns information indicating that the network has been restored to the software update application, the step 207 is performed in synchronization. The actual restoration of network access rights for the software update application may take tens of ms to hundreds of ms. When the software update application receives the keepalifeq interface and returns information (i.e., the first information) for indicating that the network has been recovered, the network access authority of the software update application is not actually recovered, and as shown in fig. 2, the real state of the network is unavailable, so that the packet searching request fails, and the failure probability of the packet searching request of the software update application is increased.
The embodiment of the application provides a method for applying network resources, which is executed by electronic equipment, wherein the electronic equipment is provided with a software updating application and a power-saving eidolon. When the electronic equipment is in the off-screen state and the preset condition is met, triggering and detecting whether the network state of the software updating application is available or not. If the network state of the software updating application is detected to be unavailable, a first callback function is realized in the software updating application, and a network recovery request is sent to the power saving eidolon, wherein the network recovery request comprises the first callback function and identification information of the software updating application. The power-saving eidolon responds to the network restoration request, controls the network module to restore the network access authority of the software updating application, and returns the network restoration result of the software updating application to the software updating application through the first callback function. In this example, since the first callback function is implemented in the software update application, when the network module recovers the network range query right of the software update application, the power saving eidolon can timely synchronize the network recovery result of the software update application back to the software update application by calling the first callback function; the method avoids the software updating application from receiving the wrong network recovery result and reduces the probability of the software updating application packet searching failure.
Fig. 3 is a schematic structural diagram of an electronic device 100 according to an embodiment of the present application. It should be understood that the electronic device 100 shown in fig. 3 is only one example of an electronic device, and that the electronic device 100 may have more or fewer components than shown in the figures, may combine two or more components, or may have different component configurations. The various components shown in fig. 3 may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The electronic device 100 may include: processor 110, external memory interface 120, internal memory 121, universal serial bus (universal serial bus, USB) interface 130, charge management module 140, power management module 141, battery 142, antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headset interface 170D, sensor module 180, keys 190, motor 191, indicator 192, camera 193, display 194, and subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor, a gyroscope sensor, a barometric sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, and the like.
Fig. 4 is a software configuration block diagram of the electronic device 100 according to the embodiment of the present application.
The layered architecture of the electronic device 100 divides the software into several layers, each with a distinct role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into three layers, an application layer, an application framework layer and a kernel layer from top to bottom. It will be appreciated that the layers and components contained in the layers in the software structure of fig. 4 do not constitute a particular limitation of the electronic device 100.
As shown in fig. 4, the application layer may include a series of application packages. The application packages may include software update applications, maps, WLANs, gallery, calendars, short messages, conversations, navigation, bluetooth, camera, etc. applications. The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions.
The software updating application can trigger to detect the current network state of the software updating application when the electronic equipment is detected to be in a screen-off state and meets the preset condition, and execute the preset operation when the network availability of the software updating application is detected, wherein the preset operation can be a package searching operation, an operation of downloading an application installation package or an authentication operation and the like, and the package searching operation is used for searching whether the installation package of a new version of installed software exists in the network.
As shown in fig. 5, the application framework layer may include a power saving puck and a network module. The power saving puck may disable or restore network access rights for the application by controlling the network module. The application framework layer may also include a window manager, resource manager, content provider, view system, phone manager, notification manager, etc.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is used to provide the communication functions of the electronic device 100. Such as the management of call status (including on, hung-up, etc.).
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification managers are used to notify an application of completion of a download of an installation package, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
In other embodiments of the application, electronic device 100 may include more or fewer layers than shown and may include more or fewer components per layer, as the application is not limited.
Fig. 5 is a flow chart illustrating a method of applying for network resources. As shown in fig. 5, the method for applying for network resources by the electronic device includes:
step 501: when the first application detects that the preset condition is met, triggering and detecting whether the network access right of the first application is opened or not, namely triggering and executing step 502.
By way of example, the electronic device may be a cell phone, tablet computer, bracelet, smartwatch, notebook computer, or the like. The electronic device in this example is illustrated by taking a mobile phone as an example. Optionally, the first application is a software update application, and the second application is a power saving wizard (application), where the power saving wizard is used to manage network access rights of each application through a network module, and names of the second application in mobile phones of different manufacturers are different, for example, the second application may also be a mobile phone manager, a power saving application, and the names of the second application are not listed one by one in this example.
When the mobile phone is in the screen-off state, the power-saving eidolon can start to detect whether the time length of the mobile phone in the screen-off state reaches a second preset time length, and if the power-saving eidolon determines that the time length of the mobile phone in the screen-off state reaches the second preset time length, the power-saving eidolon is triggered to start the network limiting operation. The process of the network limiting operation is the same as that in step 201, and reference may be made to the description of the network limiting operation in step 201.
When the mobile phone is in the off-screen state, the first application detects whether the duration of the mobile phone in the off-screen state reaches a first preset duration, and the first preset duration and the second preset duration can be the same or different. If the first application detects that the duration of the mobile phone in the off-screen state reaches the first preset duration, the execution step 502 is triggered.
In some scenarios, when the first application detects that the first application has found that the installed application has a new version of the installation package in the network, the execution of step 502 may also be triggered.
In some scenarios, the first application may trigger execution of step 502 when the mobile phone is in an off-screen state and it is detected that the first application has successfully downloaded a new version of the installation package.
Step 502: the first application detects whether the network access right of the first application is opened. If it is determined that the first application is not turned on, step 503 is executed, and if it is determined that the first application is turned on, the first application may execute a preset operation.
Illustratively, a first application may invoke a query interface (e.g., connectivityManager) to detect network access rights of the first application. If the first application detects that the network state of the first application is "Block", determining that the network access right of the current first application is closed, and executing step 503; if the first application detects that the network state of the first application is "Connected", the subsequent preset operation may be continued, where the preset operation may be a packet searching operation, a downloading operation or an authentication operation.
Step 503: the first application registers the first callback function and sends a network restoration request to the second application.
In this example, the first application may be bound with the power saving puck first; after the first application is successfully bound with the power-saving eidolon, a first callback function can be registered in the first application, and a network recovery operation is executed, namely a network recovery request is sent to the second application, wherein the network recovery request comprises the following steps: the first callback function and the identification information of the first application. The first callback function acts as a parameter in the network restoration request. Optionally, the first callback function is declared by the second application; the first application implements the first callback function. For example, the first application implements PowerKitCallback (class name of the first callback function) and sends a network restoration request to the second application by calling the first interface (i.e., the applyForResourceUse interface).
Step 504: the second application responds to the network restoration request, controls the network module to restore the network access authority of the first application and acquires the network restoration result of the first application.
Illustratively, the second application declares a first callback function, and a first parameter is added to the input parameters of the first interface of the second application, where the first parameter is of a type of the first callback function. And adding the first parameter into the input parameter of the first interface so that the first interface can receive the first callback function transmitted by the first application. For example, input parameters of the apply ForResourceUse interface may further include: the package name of the first application, the type of the resource application, the application duration and the application reason. Wherein, module is the package name of the application program (such as the identification information of the software update application) applying for the resource, and resource type is the type of the resource application (such as the type of recovering the network access authority); timeoutInMs are the duration of the application, reason is the cause of the application, and callback is the pointer to the first callback function.
Similarly, the first parameter is also added to the input parameter of the next interface (such as the handleRequestResmsg interface). The handleRequestResmsg interface receives a first callback function passed by an applyForResourceUse interface. And newly adding a first parameter into the input parameters of the keepalive req interface, and receiving a first callback function transmitted by the handleRequestResmsg interface. And newly adding a first parameter into the input parameters of the dispatchKeepAlyStateAction interface, and receiving a first callback function transmitted by the keepAlyReq interface. And newly adding a first parameter into the input parameters of the NotifyPowerActionChange interface, and receiving a first callback function transmitted by the dispatchKeepAlyStateAction interface. And newly adding a first parameter into the input parameters of the handlekeepalive action interface, and receiving a first callback function transmitted by the NotifyPowerActionChange interface.
The handlekeep alive action interface (i.e., the second interface) calls an updateFirewall whiteList interface according to the packet name of the first application, and adds the packet name of the first application to the white list. The updateFirewall whiteList interface synchronizes the updated whitelist to the network module. And the network module restores the network access authority of the first application in the white list according to the received white list and the information in the white list, and returns the network restoration result of the first application to the handlekeepalive action interface.
In this example, the handleRequestResmsg interface, the keepalifeq interface, the dispatchkeepalifetstateeaction interface, and the NotifyPowerActionChange interface are configured to pass through the first callback function and the identification information of the first application.
Step 505: the second application returns the network recovery result of the first application to the first application by calling the first callback function.
The handlekeepalive action interface of the second application calls the first callback function, and returns the network recovery result of the first application to the first application.
Optionally, the first application receives a network recovery result of the first application; if the network recovery result of the first application indicates that the network of the first application is available, performing a preset operation, where the preset operation may be: a package searching operation, an installation package downloading operation or an authentication operation, etc. If the first application detects that the network recovery result indicates that the network of the first application is unavailable, a request failure of a preset operation can be prompted.
The following preset operation takes a packet searching operation as an example, and specifically describes a process of applying network resources by the first application.
Step 600: the power saving eidolon manages the network.
This step is similar to step 201 and reference may be made to the relevant description in step 201.
Step 601: the search package alarm in the software update application triggers and step 602 is performed.
For example, a search alarm may be set in the software update application, which may be a timer (alarm). The software update application is triggered when it detects that the duration of the off-screen state of the mobile phone reaches a first duration, such that the software update application triggers execution of step 602. The first preset time period may be half an hour, 1 hour or 15 minutes. In this example, the first preset time period is exemplified by half an hour.
Step 602: the software update application detects the network status of the software update application, if it detects that the network status is an interrupted status, then step 603 is performed, and if it detects that the network status is a connected status, then step 615 is performed.
This step is similar to step 502 and reference may be made to the description of step 502, which will not be repeated here.
Step 603: the software updating application newly adds a PowerkitCallback interface and waits for receiving a network recovery result.
For example, the software update application may be first bound to the power saving wizard, and the software update application creates a PowerKitCallback interface (class name of the first callback function), so that when the PowerKitCallback interface is called by other degrees, the first application software may synchronously obtain data that is transferred when other programs call the PowerKitCallback interface, such as a real network recovery result of the software update application.
It should be noted that the first callback function is already declared in the power saving puck, so that the power saving puck can call the first callback function (i.e., the PowerKitCallback interface).
Step 604: the software update application transmits the newly added PowerKitCallback parameter to the power saving puck.
Illustratively, the software update initiates a network restoration request to an application forresourceuse interface (i.e., a first interface) of the power saving eidolon, where the network restoration request includes identification information of the software update application and the first callback function. In this example, the software update application passes the pointer of the first callback function as a parameter to the applyForResourceUse interface so that the power saving puck can call the first callback function to return the acquired network restoration request to the software update application.
The identification information of the software update application may be the Uid of the software update application.
Step 605: an applyForResourceUse interface in the power saving puck passes a PowerKitCallback parameter to a handleRequestResmsg interface.
For example, the applietrequestrexconse interface may pass the identification information of the software update application and the first callback function to the handleRequestResmsg interface. The handleRequestResmsg interface is used in the present application to pass through identification information of the software update application and the first callback function to the next layer.
Step 606: the handleRequestResmsg interface in the power-saving eidolon passes the PowerKitCallback parameter to the keepAliveReq interface.
For example, the handlerequestiresmsg interface may pass the identification information of the software update application and the first callback function to the keepalifeq interface. The keepalifeq interface is used for transparently transmitting identification information of a software update application and a first callback function to the next layer in the application.
The keepalifeq interface no longer returns information (i.e., "true") to the software update application indicating that the network has been restored. Optionally, the keepalifeq interface (i.e. the fourth interface) is prohibited from returning any information to the software update application, or the keepalifeq interface is prohibited from returning "true" information to the software update application.
Step 607: the keepalifeq interface in the power saving eidolon transmits a PowerKitCallback parameter to the dispatchkeepalifestateaction interface.
For example, the keepalifeq interface may pass identification information of the software update application and the first callback function to the dispatchkeepalifestateaction interface. The dispatchKeepAlveStateAction interface is used for transmitting the identification information of the software update application and the first callback function to the next layer.
Step 608: the dispatchKeepAlyStateAction interface in the power saving eidolon communicates a PowerKitCallback parameter to the NotifyPowerActionChange interface.
Illustratively, the dispatchkeepalystateaction interface receives a callback parameter (i.e., powerKitCallback parameter), which may be written into a message to be issued (denoted poweraction). Optionally, the dispatchkeepalive stateaction interface may also write the identification information of the software update application into the poweraction.
The dispatchkeepaleavStateAction interface will issue a poweraction message to the notifyPowerActionChange interface.
Step 608: the notifypoweractiveChange interface in the power saving eidolon transmits a callback parameter to the handlekeepalive activeInterface.
Illustratively, the NotifyPowerActionChanged interface issues poweractions in a handler asynchronous manner. Alternatively, the second application may not pass the first callback function down through the NotifyPowerActionChanged interface.
Step 609: the power saving puck receives the processed message.
Illustratively, the handlekeepalive action interface (i.e., the second interface) receives a poweraction issued by the NotifyPowerActionChanged interface, and may obtain a callback from the poweraction. The handlekeepalive action interface may call an updateFirewall whiteList interface (third interface) according to the application type to update the whitelist of the limited network. When the handlekeep alive action interface calls the updateFirewall whiteList interface, the identification information of the software update application is transmitted into the updateFirewall whiteList interface.
Step 610: the power saving eidolon updates the whitelist and issues the whitelist to the network module.
Illustratively, the updateFirewall whiteList interface of the power saving puck obtains the Uid of the software update application, and adds the Uid of the software update application to the whitelist. The updateFirewall whiteList interface issues the updated whitelist to the network module.
Step 611: the network module sets up a white list.
Illustratively, the network module receives the updated whitelist and resets the network access rights of the applications belonging to the whitelist according to the Uid of each application in the whitelist. For example, the network access identifier of the software update application is updated to "ALLOW".
Step 612: and the network module returns a network recovery result to the power-saving eidolon.
Illustratively, the network module returns a network restoration result of the software update application to the updateFirewall whiteList interface when restoring the network access rights of the software update application.
Step 613: and the whitelist updating interface of the power-saving eidolon returns a network recovery result to the handlekeep alive action interface.
Illustratively, the updated Firewall whiteList interface is called by the HandleKeepAlyAction interface to indicate the network access permission of the recovery software update application, and after receiving the network recovery result of the software update application returned by the network module, the updated Firewall whiteList interface returns the network recovery result of the software update application to the HandleKeepAlyAction interface.
Step 614: and the HandleKeepAlveAction interface of the power-saving eidolon returns a network recovery result to the software updating application through the first callback function. If the software updating application detects that the network recovery result indicates network recovery failure, determining that the current packet searching request fails. If the software update application detects that the network restoration result indicates a network restoration, step 615 is performed.
For example, because the PowerKitCallback is a parameter in the handlekeepalive action interface, the handlekeepalive action interface can synchronize the network recovery result of the software update application to the first callback function of the software update application by calling the PowerKitCallback interface.
The first callback function of the software updating application receives a network restoration result returned by the power saving eidolon, and if the network restoration result indicates that the network access authority of the software updating application is restored, the package searching request is executed, namely, step 615 is executed; and if the network restoration result indicates that the network access authority of the software updating application is not restored, indicating that the packet searching request fails.
Step 615: the software update application performs a search request.
The software update application performs a search for packages operation, i.e. searching through the network if there is a software version that needs to be updated. If so, an operation of downloading the installation package may be performed. If not, ending the flow of searching the package.
In the scenario of downloading the installation package, as shown at 7a in fig. 7, when the mobile phone is in the off-screen state, the display interface 101 of the mobile phone is not lit. When the power saving eidolon detects that the time length of the mobile phone in the screen-off state exceeds a second preset time length (for example, 15 minutes), the power saving eidolon controls the network access rights of all applications, for example, the network access rights of the software updating application are closed. The software updating application determines that an A application (version 2.0) exists in the server A, and triggers the software updating application to execute steps 602-614; the specific process of steps 602 to 614 will not be described here.
When the software update application determines that the network restoration result returned by the power saving puck is that the network has been restored, the software update application executes a version 2.0 of the download a application from server a. After the software update application is downloaded successfully, when the mobile phone receives a screen-lighting operation (such as pressing an unlocking button), the display interface displays first prompt information, as shown in 7b in fig. 7, and the display interface 702 displays the first prompt information 703 to prompt that the version 2.0 of the application of the user a is downloaded successfully. Alternatively, the software update application installs version 2.0 of the A application in response to an installation operation by the user.
When the software updating application determines that the network recovery result returned by the power saving eidolon is that the network is not recovered, the software updating application generates second prompt information, and when the mobile phone receives a screen-on operation (such as pressing an unlocking button), the display interface displays the second prompt information, as shown in fig. 8, and the display interface 801 displays the first prompt information 802 to prompt the user that the version 2.0 of the application fails to download. Optionally, the second prompt information may include a reason for the download failure.
In a scenario where the software update application detects an authentication operation, as shown in 9a of fig. 9, when the mobile phone is in an off-screen state, the display interface 901 of the mobile phone is not lit. When the power saving eidolon detects that the time length of the mobile phone in the screen-off state exceeds a second preset time length (for example, 15 minutes), the power saving eidolon controls the network access rights of all applications, for example, the network access rights of the software updating application are closed. The software updating application detects that the installation package of version 2.0 of the application A is successfully downloaded, and triggers the software updating application to execute steps 602-614 when the authentication operation is determined to be executed; the specific process of steps 602 to 614 will not be described here.
When the software updating application determines that the network recovery result returned by the power saving eidolon is that the network is not recovered, the software updating application generates third prompt information, and when the mobile phone receives a screen-on operation (such as pressing an unlocking button), the display interface displays the third prompt information, and as shown by 9b in fig. 9, the display interface 902 displays the third prompt information 903 to prompt the user that the installation of version 2.0 of the application a fails. Optionally, the third prompt information may include a reason for the installation failure.
When the software updating application determines that the network recovery result returned by the power saving eidolon is network recovery, and the authentication is successful, the software updating application executes the step of installing the installation package of version 2.0 of the application A. After the software update application is installed successfully, when the mobile phone receives a screen-brightening operation (such as pressing an unlocking button), the display interface displays prompt information of successful update, as shown in fig. 10, and the display interface 1001 displays the first prompt information 1002 to prompt the user a that the version 2.0 of the application is updated successfully. Alternatively, the software update application installs version 2.0 of the A application in response to an installation operation by the user.
It will be appreciated that the electronic device, in order to achieve the above-described functions, includes corresponding hardware and/or software modules that perform the respective functions. The present application can be implemented in hardware or a combination of hardware and computer software, in conjunction with the example algorithm steps described in connection with the embodiments disclosed herein. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Those skilled in the art may implement the described functionality using different approaches for each particular application in conjunction with the embodiments, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The present embodiment also provides a computer storage medium having stored therein computer instructions which, when executed on an electronic device, cause the electronic device to perform the above-mentioned related method steps to implement the method for applying for network resources in the above-mentioned embodiments. The storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The present embodiment also provides a computer program product which, when run on a computer, causes the computer to perform the above-mentioned related steps to implement the method of applying for network resources in the above-mentioned embodiments.
The electronic device, the computer storage medium, the computer program product, or the chip provided in this embodiment are used to execute the corresponding methods provided above, so that the beneficial effects thereof can be referred to the beneficial effects in the corresponding methods provided above, and will not be described herein.
Any of the various embodiments of the application, as well as any of the same embodiments, may be freely combined. Any combination of the above is within the scope of the application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (12)

1. The method for applying the network resource is characterized by being applied to the electronic equipment, wherein the display screen of the electronic equipment is in a screen-off state, the electronic equipment is provided with a first application and a second application, and the second application is used for managing the network access authority of each application, and the method comprises the following steps:
triggering and detecting whether the network access authority of the first application is opened or not when the first application detects that the preset condition is met;
if the network access authority of the first application is detected to be disabled, the first application registers a first callback function and sends a network recovery request to the second application, wherein the network recovery request comprises: the identification information of the first application and a first callback function;
the second application responds to the network restoration request, controls a network module to restore the network access authority of the first application and acquires a network restoration result of the first application;
and the second application returns the network recovery result of the first application to the first application by calling the first callback function.
2. The method of claim 1, wherein the second application controlling a network module to restore network restoration rights of the first application and obtain network restoration results of the first application in response to the network restoration request comprises:
The first interface of the second application responds to the network recovery request, the identification information of the first callback function and the first application is transmitted to the second interface of the second application, and the second interface is used for receiving asynchronously processed information and waiting for a network recovery result returned by the third interface of the second application;
the second interface transmits the identification information of the first application to the third interface;
the third interface marks the identification information of the first application so that the network module can recover the network access authority of the first application;
and the network module executes the operation of recovering the network access right to the first application and returns the network recovery result to the third interface.
3. The method of claim 2, wherein the third interface marks the identification information of the first application for the network module to recover network access rights of the first application, comprising:
the third interface adds a first mark for the identification information of the first application, wherein the first mark is used for indicating that the application to which the first mark belongs is allowed to open network access rights;
The third interface transmits the marked identification information of the first application to the network module;
the network module identifies that the first application is allowed to open network access rights, restores the network access rights of the first application, and returns a network restoration result of the first application to the third interface.
4. The method of claim 3, wherein the second application returns the network recovery result of the first application to the first application by calling the first callback function, comprising:
the third interface returns the network recovery result to the second interface;
and the second interface calls the first callback function and returns the network recovery result of the first application to the first application.
5. A method according to claim 3, characterized in that the method further comprises:
and prohibiting a fourth interface from returning first information to the first application, wherein the first information is used for indicating that the network access authority of the first application is opened, and the fourth interface is positioned between the first interface and the second interface and is used for transparently transmitting the identification information of the first callback function and the first application to the second interface for the first interface.
6. The method of claim 1, wherein the first application is a software update application.
7. The method of claim 6, wherein the first application detecting a preset condition comprises:
the first application detects that a first trigger is triggered, and the first trigger is used for indicating that the first application meets software search conditions, wherein the software search conditions comprise: the duration of the electronic equipment in the screen-off state reaches the preset duration;
or alternatively, the process may be performed,
the first application searches for a new version of application installation package;
or alternatively;
the first application detects that a new version of the application installation package has been downloaded.
8. The method according to claim 6 or 7, wherein in case the first application detects that a first trigger is triggered, the method further comprises:
and if the network restoration result of the first application indicates that the network access authority of the first application is restored, executing the step of searching the new version of application installation package.
9. The method of claim 6 or 7, wherein if the first application searches for a new version of the application installation package, the method further comprises:
If the network restoration result of the first application indicates that the network access authority of the first application is restored, downloading the new version of application installation package; responding to a screen-lighting operation input by a user, displaying first prompt information on a display interface of the electronic equipment, wherein the first prompt information is used for indicating the electronic equipment to successfully download the new version of application installation package;
if the network restoration result of the first application indicates that the network access authority of the first application is not restored, responding to a screen-lighting operation, and displaying second prompt information on the display interface, wherein the second prompt information is used for indicating that the electronic equipment does not successfully download the new version of application installation package.
10. The method of claim 6 or 7, wherein if the first application has downloaded a new version of the application installation package, the method further comprises:
if the network restoration result of the first application indicates that the network access authority of the first application is restored, executing authentication operation; responding to a screen-lighting operation input by a user, and displaying third prompt information on a display interface of the electronic equipment, wherein the third prompt information is used for indicating that the authentication of the first application is successful;
If the network restoration result of the first application indicates that the network access authority of the first application is not restored, a fourth prompt message is displayed on a display interface in response to a screen-lighting operation input by a user, wherein the fourth prompt message is used for indicating that the authentication failure of the electronic equipment is caused by the fact that the first application has no network access authority.
11. An electronic device, comprising:
a memory and a processor, the memory coupled with the processor;
the memory stores program instructions that, when executed by the processor, cause the electronic device to perform the method of applying for network resources of any one of claims 1-10.
12. A computer readable storage medium comprising a computer program, characterized in that the computer program, when run on an electronic device, causes the electronic device to perform the method of applying for network resources according to any one of claims 1-10.
CN202310573017.5A 2023-05-22 2023-05-22 Method for applying network resources and electronic equipment Active CN116302454B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310573017.5A CN116302454B (en) 2023-05-22 2023-05-22 Method for applying network resources and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310573017.5A CN116302454B (en) 2023-05-22 2023-05-22 Method for applying network resources and electronic equipment

Publications (2)

Publication Number Publication Date
CN116302454A CN116302454A (en) 2023-06-23
CN116302454B true CN116302454B (en) 2023-10-20

Family

ID=86824339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310573017.5A Active CN116302454B (en) 2023-05-22 2023-05-22 Method for applying network resources and electronic equipment

Country Status (1)

Country Link
CN (1) CN116302454B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8041787B2 (en) * 2007-01-31 2011-10-18 Hitachi, Ltd. Application software and data management method, management system, and thin client terminal, management server and remote computer used therefor
US9032385B2 (en) * 2011-12-28 2015-05-12 Lg Electronics Inc. Mobile terminal and control method thereof
CN107659998A (en) * 2017-08-30 2018-02-02 深圳市金立通信设备有限公司 A kind of method, terminal and the computer-readable medium of control data connection
CN108449198A (en) * 2018-01-25 2018-08-24 捷开通讯(深圳)有限公司 A kind of method, system and the storage device of OTA upgradings
CN113055451A (en) * 2021-03-08 2021-06-29 Oppo广东移动通信有限公司 Resource downloading method and device, electronic equipment and storage medium
CN111200541B (en) * 2019-12-31 2022-04-12 山石网科通信技术股份有限公司 Network data processing method and device
CN114630325A (en) * 2020-12-10 2022-06-14 Oppo广东移动通信有限公司 Network access method, electronic equipment and storage medium
CN114461240B (en) * 2021-06-30 2023-04-14 荣耀终端有限公司 Software upgrading method, software upgrading system and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8041787B2 (en) * 2007-01-31 2011-10-18 Hitachi, Ltd. Application software and data management method, management system, and thin client terminal, management server and remote computer used therefor
US9032385B2 (en) * 2011-12-28 2015-05-12 Lg Electronics Inc. Mobile terminal and control method thereof
CN107659998A (en) * 2017-08-30 2018-02-02 深圳市金立通信设备有限公司 A kind of method, terminal and the computer-readable medium of control data connection
CN108449198A (en) * 2018-01-25 2018-08-24 捷开通讯(深圳)有限公司 A kind of method, system and the storage device of OTA upgradings
CN111200541B (en) * 2019-12-31 2022-04-12 山石网科通信技术股份有限公司 Network data processing method and device
CN114630325A (en) * 2020-12-10 2022-06-14 Oppo广东移动通信有限公司 Network access method, electronic equipment and storage medium
CN113055451A (en) * 2021-03-08 2021-06-29 Oppo广东移动通信有限公司 Resource downloading method and device, electronic equipment and storage medium
CN114461240B (en) * 2021-06-30 2023-04-14 荣耀终端有限公司 Software upgrading method, software upgrading system and electronic equipment

Also Published As

Publication number Publication date
CN116302454A (en) 2023-06-23

Similar Documents

Publication Publication Date Title
EP3073379B1 (en) Firmware recovery method, device and terminal
EP3701674A1 (en) Blockchain-based smart contract call methods and apparatus, and electronic device
EP3822835B1 (en) Method for deleting secure service, and electronic apparatus
CN107844341B (en) Process starting control method and device, storage medium and mobile terminal
CN114489917B (en) Processing method for abnormal exit of application program, electronic equipment and readable storage medium
CN115086481B (en) Incoming call reminding method and electronic equipment
WO2021143168A1 (en) Trusted execution environment operating system crash processing method and electronic device
CN113051015B (en) Page rendering method and device, electronic equipment and storage medium
CN117234698B (en) Program exception handling method, electronic equipment and storage medium
CN116302454B (en) Method for applying network resources and electronic equipment
CN110865823B (en) Pre-installation application control method, pre-installation application control device and storage medium
EP3001652B1 (en) Method for providing information and an electronic device thereof
CN111158735A (en) Hot patch file processing method and communication terminal
WO2022021534A1 (en) Data reading method, storage medium, and mobile terminal
CN115543500A (en) Window processing method and electronic equipment
CN116775084B (en) System upgrading method and electronic equipment
CN116541188B (en) Notification display method, terminal device and storage medium
CN115344860B (en) Method for managing application program and electronic equipment
CN117290164B (en) Information recording method at restarting, electronic device and readable storage medium
CN116048829B (en) Interface calling method, device and storage medium
CN117131491B (en) Unlocking control method and related device
CN116662150B (en) Application starting time-consuming detection method and related device
WO2024066837A1 (en) Incoming call alert method and electronic device
CN117130627B (en) Fitting upgrading method and electronic equipment
CN115017473B (en) Authorization method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant