CN117708801A - Resource access method and electronic equipment - Google Patents

Resource access method and electronic equipment Download PDF

Info

Publication number
CN117708801A
CN117708801A CN202311478456.4A CN202311478456A CN117708801A CN 117708801 A CN117708801 A CN 117708801A CN 202311478456 A CN202311478456 A CN 202311478456A CN 117708801 A CN117708801 A CN 117708801A
Authority
CN
China
Prior art keywords
application
operating system
resource
resources
resource database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311478456.4A
Other languages
Chinese (zh)
Inventor
王田田
韩锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202311478456.4A priority Critical patent/CN117708801A/en
Publication of CN117708801A publication Critical patent/CN117708801A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides a resource access method and electronic equipment, wherein the method is applied to the electronic equipment comprising a first application and a second application and comprises the following steps: the first application determines application resources of the second application to be accessed, the first application obtains the application resources of the second application from a resource database, the resource database comprises application identifiers and application resources of at least one application, and the application resources of each application in the resource database are obtained from application program packages of each application. In the method, the first application can acquire the application resources of the second application from the resource database instead of acquiring the application program package of the second application, so that the private data leakage in the application program package of the second application can be effectively avoided.

Description

Resource access method and electronic equipment
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a resource access method and an electronic device.
Background
The terminal equipment comprises various applications, and the situation of cross-application resource access is inevitably encountered. For example, if the application a needs to share the content in the application a to the application B, the application a needs to acquire the application resource of the application B, such as the icon, the name, and the like of the application B. Under the scene of cross-application resource access, the disclosure of private data of a user is easy to cause, and how to solve the potential safety hazard existing in the cross-application resource access is a technical problem which needs to be solved at present.
Disclosure of Invention
The application provides a resource access method and electronic equipment, which are used for solving the technical problem of potential safety hazards existing in cross-application resource access.
In a first aspect, an embodiment of the present application provides a resource access method, where the method is applied to an electronic device including a first application and a second application, and the method includes: the first application determines application resources of the second application to be accessed, the first application obtains the application resources of the second application from a resource database, the resource database comprises application identifiers and application resources of at least one application, and the application resources of each application in the resource database are obtained from application program packages of each application. In the method, the first application can acquire the application resources of the second application from the resource database instead of acquiring the application program package of the second application, so that the private data leakage in the application program package of the second application can be effectively avoided. In addition, the problem of overlarge occupied memory resources can be effectively avoided because the application program package of the second application is not required to be loaded.
In one possible design, the electronic device includes an operating system, and the first application obtains an application resource of the second application from a resource database, which may include: the method comprises the steps that an operating system obtains a first access request of a first application, wherein the first access request is used for requesting application resources of a second application, the first access request comprises an application identifier of the second application, the operating system determines the application resources of the second application from a resource database according to the application identifier of the second application, and then the operating system sends the application resources of the second application to the first application. By the design, a method for a first application to acquire application resources of a second application is provided.
In one possible design, before the operating system determines the application resource of the second application from the resource database according to the application identifier of the second application, the method may further include: and the operating system determines that the application resource of the second application does not exist in the cache of the operating system according to the application identifier of the second application.
In one possible design, before the operating system determines the application resource of the second application from the resource database according to the application identifier of the second application, the method further includes: the method comprises the steps that an operating system obtains resource access rights of a first application; the operating system determines the resource access rights of the first application as allowed access.
In one possible design, the electronic device includes an operating system, and the first application obtains an application resource of the second application from a resource database, which may include: the method comprises the steps that an operating system obtains a first access request of a first application, wherein the first access request is used for requesting application resources of a second application, the first access request comprises application identification of the second application, the operating system mounts a storage path of a resource database under a process corresponding to the first access request, and then the first application obtains the application resources of the second application from the resource database based on the storage path of the resource database. By the design, a method for a first application to acquire application resources of a second application is provided.
In one possible design, before the operating system mounts the storage path of the application resource of the second application in the resource database under the process corresponding to the first access request, the method may further include: the operating system acquires the resource access authority of the first application, and the operating system determines the resource access authority of the first application as the allowed access.
In one possible design, the method may further include: when the second application is updated, the operating system updates the application resources of the second application in the resource database, and the second application update comprises any one of installation, upgrading and unloading.
In one possible design, when the second application is updated, the operating system updating the application resources of the second application in the resource database may include: when the second application is installed or upgraded, the operating system acquires an application program package of the second application, acquires application resources of the second application from the application program package of the second application, and updates the resource database based on the identification of the second application and the application resources. Through the design, when the second application is installed or upgraded, the operating system can update the resource database based on the application identifier and the application resource of the second application, so that the application resource of the second application can be directly acquired from the resource database.
In one possible design, the method may further include: the resource database is located in a first storage space, the application package of the second application is located in a second storage space, and the first storage space is different from the second storage space.
In one possible design, the method may further include: when the first application does not acquire the application resources of the second application from the resource database, the first application outputs prompt information, and the prompt information is used for prompting that the application resources of the second application cannot be accessed.
In one possible design, the second storage space is configured for access by only the second application.
In one possible design, the method may further include: the operating system receives a first operation request, wherein the first operation request is used for requesting partial resources of the second application, the first operation request comprises an application identifier of the second application, and the operating system updates the partial resources of the second application into a resource database according to the first operation request. By the design, the application resources of the second application can be dynamically added to the resource database, so that the flexibility is enhanced.
In a second aspect, the present application further provides an electronic device, which is capable of implementing the method in any possible implementation manner of the first aspect and the first aspect. The electronic device may be implemented by hardware, or may be implemented by hardware executing corresponding software. The hardware or software includes one or more units or modules corresponding to the functions described above.
In a third aspect, embodiments of the present application further provide an electronic device, which includes a module/unit that performs the method in the first aspect and any possible implementation manner of the first aspect. These modules/units may be implemented by hardware, or may be implemented by hardware executing corresponding software.
In a fourth aspect, embodiments of the present application provide an electronic device comprising a processor, a memory, and one or more programs; wherein one or more programs are stored in the memory, the one or more programs comprising instructions, which when executed by the processor, cause the electronic device to implement the method of the first aspect and any possible implementation of the first aspect.
In a fifth aspect, embodiments of the present application further provide a computer readable storage medium, where the computer readable storage medium includes a computer program, where the computer program when executed on an electronic device causes the computer readable storage medium to implement the method according to the first aspect and any possible implementation manner of the first aspect.
In a sixth aspect, embodiments of the present application further provide a computer program product for, when run on an electronic device, causing the electronic device to implement the method of the first aspect and any possible implementation manner of the first aspect.
These and other aspects of the present application will be more readily apparent from the following description of the embodiments.
Drawings
Fig. 1A is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 1B is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 1C is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an application resource for displaying a second application according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an application resource for displaying a second application according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic flow chart of an installation or upgrade method of a second application according to an embodiment of the present application;
fig. 6 is a flow chart of an unloading method of a second application according to an embodiment of the present application;
fig. 7 is a flowchart of a second type of application update method of a second application according to an embodiment of the present application;
fig. 8 is a flow chart of a resource access method according to an embodiment of the present application;
fig. 9 is a flowchart of a method for obtaining application resources of a second application according to an embodiment of the present application;
Fig. 10 is a flowchart of a method for obtaining application resources of a second application according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail with reference to the accompanying drawings. The specific methods of operation, functional descriptions, etc. in the method embodiments may also be applied in the apparatus embodiments or the system embodiments.
For a better explanation of embodiments of the present application, related terms or techniques in the present application are explained first:
(1) Application (application, app)
A software program that is capable of performing one or more specific functions. The applications may be of various types, such as video playback type applications, image capturing type applications, instant messaging applications, and the like. Video playback applications include, for example, tencel video, excellent video, B-station, etc. Image capture type applications include, for example, beauty cameras, light-weight cameras, and the like. Instant messaging applications include, for example, huacheng smooth connection applications, various mailbox applications, weChat, tencel chat software (QQ), whatsApp Messenger, liou (Line), kakao Talk, and the like. The application mentioned below may be an application installed when the electronic device leaves the factory, or may be an application downloaded from a network or acquired from another electronic device by a user during use of the electronic device (for example, an application transmitted by another electronic device).
(2) In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s).
And, unless otherwise indicated, the terms "first," "second," and the like in the embodiments herein are used for distinguishing between multiple objects and are not used for limiting the size, content, order, timing, priority, importance, or the like of the multiple objects. For example, the first terminal, the second terminal, etc. are only for distinguishing different terminals, and are not indicative of the difference in priority, importance, etc. of these terminals.
The cross-application information interaction method in the same device provided by the embodiment of the application can be applied to electronic devices, and the electronic devices, graphical user interfaces (graphical user interface, GUI) for the electronic devices and embodiments for using the electronic devices are described below. In some embodiments of the present application, the electronic device may be a portable electronic device, such as a mobile phone, a PAD, a portable computer, a wearable device (e.g., a smart watch, smart glasses, smart bracelet, or smart helmet, etc.) with wireless communication function, or a vehicle-mounted device, etc. Exemplary embodiments of portable electronic devices include, but are not limited to, piggy-back Or other operating system.
By way of example, fig. 1A shows a schematic structural diagram of an electronic device.
As shown in fig. 1A, the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, a user identification module (subscriber identification module, SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a memory, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors. The controller can be a neural center and a command center of the electronic device. The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution. A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
Optionally, the processor 110 may be configured to perform a resource access method provided in an embodiment of the present application.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge an electronic device, or may be used to transfer data between the electronic device and a peripheral device. The charge management module 140 is configured to receive a charge input from a charger. The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like. The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied on an electronic device. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc. for application on an electronic device. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, the antenna 1 and the mobile communication module 150 of the electronic device are coupled, and the antenna 2 and the wireless communication module 160 are coupled, so that the electronic device can communicate with the network and other devices through wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The display 194 is used to display a display interface of an application or the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device may include 1 or N display screens 194, N being a positive integer greater than 1.
The camera 193 is used to capture still images or video. The camera 193 may include a front camera and a rear camera.
The internal memory 121 may be used to store computer executable program code including instructions. The processor 110 executes various functional applications of the electronic device and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an operating system, and software code of at least one application program (e.g., an aiqi application, a WeChat application, etc.), etc. The storage data area may store data (e.g., images, video, etc.) generated during use of the electronic device, and so forth. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as pictures and videos are stored in an external memory card.
The electronic device may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The gyro sensor 180B may be used to determine a motion gesture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (i.e., x, y, and z axes) may be determined by the gyro sensor 180B.
The gyro sensor 180B may be used for photographing anti-shake. The air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronics calculate altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation. The magnetic sensor 180D includes a hall sensor. The electronic device may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device is a flip machine, the electronic device may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set. The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device is stationary. The electronic equipment gesture recognition method can also be used for recognizing the gesture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device may measure the distance by infrared or laser. In some embodiments, the scene is photographed and the electronic device can range using the distance sensor 180F to achieve quick focus. The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device emits infrared light outwards through the light emitting diode. The electronic device uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it may be determined that an object is in the vicinity of the electronic device. When insufficient reflected light is detected, the electronic device may determine that there is no object in the vicinity of the electronic device. The electronic device may detect that the user holds the electronic device near the ear to talk using the proximity light sensor 180G, so as to automatically extinguish the screen for power saving purposes. The proximity light sensor 180G may also be used in holster mode, pocket mode to automatically unlock and lock the screen.
The ambient light sensor 180L is used to sense ambient light level. The electronic device can adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect if the electronic device is in a pocket to prevent false touches. The fingerprint sensor 180H is used to collect a fingerprint. The electronic equipment can utilize the collected fingerprint characteristics to realize fingerprint unlocking, access the application lock, fingerprint photographing, fingerprint incoming call answering and the like.
The temperature sensor 180J is for detecting temperature. In some embodiments, the electronic device performs a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, the electronics perform a reduction in performance of a processor located near temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other embodiments, when the temperature is below another threshold, the electronic device heats the battery 142 to avoid low temperatures causing the electronic device to shut down abnormally. In other embodiments, the electronic device performs boosting of the output voltage of the battery 142 when the temperature is below a further threshold to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device. The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc. The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device.
It will be appreciated that the components shown in fig. 1A do not constitute a particular limitation of the electronic device. The electronic device in embodiments of the invention may include more or fewer components than in fig. 1A. Furthermore, the combination/connection relationship between the components in fig. 1A is also adjustable and modifiable.
Fig. 1B shows a software architecture block diagram of an electronic device according to an embodiment of the present application.
As shown in fig. 1B, the software structure of the electronic device may be a hierarchical architecture, for example, the software may be divided into several layers, each layer having a distinct role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into five layers, from top to bottom, an application layer, an application framework layer (FWK), an Zhuoyun row (Android run) and system library, a kernel layer, and a hardware layer, respectively.
The application layer may include a series of application packages. As shown in fig. 1B, the application layer may include a camera, settings, skin modules, user Interfaces (UIs), three-way applications, and the like. The three-party application program can comprise WeChat, QQ, gallery, calendar, call, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer may include some predefined functions. As shown in FIG. 1B, the application framework layer may include a window manager, a content provider, a view system, a telephony manager, a resource manager, a notification manager, a package management service, a resource database, and the like. The package management service may be located at an application framework layer, or may be located at any layer of a software structure, and the resource database may be located at an application framework layer, or may be located at any layer of a software structure, which is not limited herein.
The API interface of the application framework layer may provide communication between the application and the packet management service in an upper layer (i.e., the application layer), with corresponding communication contents including access requests, application resources, storage paths of the resource database, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like. The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is for providing communication functions of the electronic device. Such as the management of call status (including on, hung-up, etc.).
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the electronic device vibrates, and an indicator light blinks, etc.
Android runtimes include core libraries and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android. The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media library (media library), three-dimensional graphics processing library (e.g., openGL ES), 2D graphics engine (e.g., SGL), process management services, etc. The process management service may be located in a system library, or may be located in any layer of a software structure, which is not limited herein.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The hardware layer may include various types of sensors, such as acceleration sensors, gyroscopic sensors, touch sensors, etc., as referred to in embodiments of the present application.
The implementation principle of the technical solution of the embodiment of the present application is described below in conjunction with fig. 1B, including the following two possible implementations.
One possible implementation manner is that after a first application (the first application may be any application) in the application program layer is started, if it is determined that an application resource of a second application needs to be accessed, a package management service in a lower layer, that is, an application program framework layer, may be called, for example, the application program framework layer includes an API interface, the first application sends a first access request to the package management service in the application program framework layer through the API interface, after receiving the first access request, the package management service obtains an application resource of the second application in a resource database, and then returns the application resource of the second application to the first application through the API interface.
In another possible implementation manner, after a first application (the first application may be any application) in the application program layer is started, if it is determined that an application resource of the second application needs to be accessed, a process management service in the system library may be called, for example, the system library includes an API interface, the first application sends a first access request to the process management service in the system library through the API interface, and after the process management service receives the first access request, a storage path of the resource database is mounted on a process of the first application, so that the first application may obtain the application resource of the second application from the resource database.
Fig. 1C illustrates each module included in an application layer and each module included in an application framework layer in a software architecture block diagram of an electronic device according to an embodiment of the present application.
The application layer of the electronic device includes a display module and other modules. The display module is used for displaying application resources of the installed application on the user interface, and the installed application can comprise two forms of system application and common application. The system application is an application carried by the electronic equipment when leaving the factory and is used for guaranteeing the basic operation of the electronic equipment. A general application is an application provided by each developer for realizing a certain function. In the case that the installed application is a system application, the application resources of the installed application include a system font style, a system language type, and the like, for example, the system font style is a regular script, and the system language type is chinese. In the case where the installed application is a normal application, the application resources of the installed application include an application identification and an application icon.
The application framework layer of the electronic device comprises a downloading module, an installing module, an unloading module and other modules. The downloading module is used for downloading application program packages of various applications from an application market or other channels. The installation module is used for installing each application program according to the application program package of each application. Wherein the application program package of any application comprises the application resource of the application. The uninstalling module is used for uninstalling each installed application and deleting the corresponding application program package.
The scenario in which the first application obtains the application resources of other applications is described in detail below by taking the first application as an example, where the first application may be any application installed in the electronic device.
In the case that the first application is a system application, if the first application is a desktop display application, the desktop display application needs to acquire application resources of a plurality of common applications and display the application resources on a desktop of the electronic device. For example, as shown in fig. 2, the desktop display application obtains the application resource of the WeChat, and displays the application identifier of the WeChat (i.e., the "WeChat") and the application icon of the WeChat on the desktop of the electronic device.
If the first application is a common application, if the user needs to share the content of the first application, and the user clicks the sharing button of the first application, the first application obtains application resources of other common applications, displays the application resources of other common applications in the sharing interface of the first application, and facilitates the user to select a target application from the displayed other common applications to share the content of the first application.
For example, when a user listens to a song using internet music, as shown in fig. 3 (a), if the user clicks the sharing button, the internet music pops up the sharing interface, as shown in fig. 3 (b), where the sharing interface includes an icon and an identifier of the microblog, an icon and an identifier of a friend circle of the WeChat, and an icon and an identifier of a friend of the WeChat, the user can select any application from the sharing interface to share the song.
For convenience of description, taking the second application as an example, how the first application obtains the application resource of the second application is explained below, where the first application is a system application or a general application, and the second application is a general application. Generally, when determining that an application resource of a second application needs to be acquired, the first application may read an application package of the second application, acquire an application identifier and an application icon of the second application from the application package of the second application, parse the application icon of the second application to obtain an application icon in a binary stream form, and finally display the application identifier and the application icon of the second application on a desktop of the electronic device or a sharing interface of the first application according to the acquired application identifier and the application icon in the binary stream form.
In the above resource access process, since the first application can directly read the application package of the second application, if privacy data exists in the application package, the disclosure of the privacy data in the second application is easily caused.
In order to solve the above problems, the embodiments of the present application propose a resource access method that can be implemented on the electronic device 100 having the above-described hardware structure. For the electronic device, the application provides a new software structure block diagram, an application program layer and an application program framework layer in the software structure block diagram are shown in fig. 4, and the application program layer of the electronic device comprises a display module and other modules. The display module is used for displaying application resources of the installed application on the user interface.
The application program framework layer of the electronic equipment comprises a downloading module, an installing module, an analyzing module, a message processing module, a resource database module, a permission module, an unloading module and other modules. The downloading module is used for downloading application packages of various applications from an application market or other channels, and the downloaded application packages can be stored in a second storage space of the electronic device, wherein the second storage space is configured to be accessible by only the second application. The installation module is used for installing each application program according to the application program package of each application. Wherein the application program package of any application comprises the application resource of the application. The analysis module is used for analyzing the application resource from the application program package, storing the application resource into the resource database module, and after the storage of the application resource is completed, sending a storage completion message by the message processing module. The resource database is located in a first storage space on the electronic device, the first storage space being different from the second storage space. The uninstalling module is used for uninstalling each installed application and deleting the corresponding application program package.
The electronic equipment comprises an operating system, and the operating system can provide services such as installation, upgrading and unloading of common applications through a display module in an application program layer, a downloading module, an installation module, an analysis module, a message processing module, a resource database module, a permission module and an unloading module in an application program framework layer. The operating system in the electronic device may be a hong system, IOS system, android system, etc., without limitation.
In order to facilitate the detailed description of the installation, upgrading and uninstalling of the common application, the second application is taken as the common application, and the installation, upgrading and uninstalling of the second application is described in detail.
In a possible implementation manner, when the second application generates the first type of application update, the operating system may update the application resources of the second application in the resource database in addition to implementing the application update of the second application, where the first type of application update includes any one of installation, upgrading and uninstallation.
The installation or upgrade of the second application, explained in detail below, may include the following steps as shown in fig. 5.
S501, when the second application is installed or upgraded, the operating system acquires an application program package of the second application.
In the embodiment of the present application, the operating system performing the step of fig. 5 may be a packet management service in the hong-mo system, or may be a service in another operating system, which is not limited herein.
In one possible implementation, the operating system may obtain an application package of the second application through the download module, and store the application package of the second application in the second storage space of the electronic device.
S502, the operating system acquires application resources of the second application from an application program package of the second application. The application resources of the second application comprise application identifiers and application icons of the second application.
In the embodiment of the application, the operating system may acquire the application resource of the second application from the application program package of the second application through the parsing module.
Optionally, the operating system may further parse the application resource of the second application through the parsing module to obtain an application resource in a binary stream form.
S503, the operating system updates the resource database based on the application identification of the second application and the application resource.
The operating system searches the application identifier of the second application in the resource database, and if the application identifier of the second application does not exist in the resource database, the operating system directly adds the application identifier of the second application and the application resource into the resource database.
If the application identifier of the second application exists in the resource database, replacing the application identifier and the application resource of the second application existing in the resource database by adopting the application identifier and the application resource of the second application acquired at the time.
It should be appreciated that the application identification and application resources of the second application may be stored in a key-value manner, such as < application identification of the second application, application resources of the second application >.
When the operating system determines that the application identifier of the second application exists in the resource database, the operating system can also search the application identifier of the second application in the cache of the operating system, and if the application identifier of the second application exists in the cache of the operating system, the operating system replaces the application identifier and the application resource of the second application existing in the cache of the operating system by adopting the acquired application identifier and application resource of the second application. If the application identifier of the second application does not exist in the cache of the operating system, the operating system may not perform any processing.
It should be appreciated that the application resources of the second application in the resource database may be in the form of a binary stream. The application resources of the second application in the cache of the operating system may be in the form of a binary stream.
After updating the resource database, the operating system may further determine a resource access right of the second application, and add the application identifier of the second application and the resource access right of the second application to the right module.
And if the second application applies the access authority of the resource database to the operating system and the application is successful, the resource access authority of the second application is allowed to be accessed. If the second application applies the access authority of the resource database to the operating system but fails, the resource access authority of the second application is not allowed to be accessed. And if the second application does not apply the access authority of the resource database to the operating system, the resource access authority of the second application is not allowed to be accessed.
It should be appreciated that the application identifier of the second application and the resource access rights of the second application may be stored in a key-value manner, for example, if the resource access rights of the second application are allowed access, the rights module may store < the application identifier of the second application, allowed access >.
S504, the operating system installs or upgrades the second application according to the application program package of the second application.
In the embodiment of the application, the operating system may implement installation or upgrading of the second application by using an application program package of the second application through the installation module.
The execution sequence of S502 and S504 is not sequential.
In the method, when the second application is installed or upgraded, the operating system can update the resource database based on the application identifier and the application resource of the second application, so that the application resource of the second application can be directly acquired from the resource database.
Optionally, the user performs a first operation on the electronic device, where the first operation may include the user determining an application identifier of the second application, the user determining the number of resources to be updated, and so on. The electronic device may generate a first operation request based on a first operation of the user. The first operation request is used for requesting part of resources of the second application, and the first operation request can include an application identifier of the second application and the number of resources to be updated. The operating system receives the first operation request and updates part of the resources of the second application to the resource database according to the first operation request. The part of the resources of the second application are determined according to the application identification of the second application in the first operation request and the quantity of the resources to be updated. The operating system can acquire the application resources corresponding to the number of the resources to be updated from the application program package of the second application, and the application resources are used as part of the resources of the second application. Wherein the partial resources of the second application may be resources that have not been added to the resource database.
For example, the first operation request includes an application identifier of the second application and the number of resources to be updated 2, and after receiving the first operation request, the operating system obtains 2 resources that are not added to the resource database from the application package of the second application, and adds the resources as part of the resources of the second application to the resource database.
By the method, the application resources of the second application can be dynamically added to the resource database, so that the flexibility is enhanced.
The unloading of the second application is explained in detail below, and may include the following steps as shown in fig. 6.
S601, when the second application is unloaded, the operating system deletes the application identification and the application resource of the second application from the resource database.
In the embodiment of the present application, the operating system performing the step of fig. 6 may be a packet management service in the hong-mo system, or may be a service in another operating system, which is not limited herein.
In one possible implementation, the operating system may also delete the application identifier of the second application and the application resource from the cache of the operating system.
In one possible implementation, the operating system may further delete the application identifier of the second application and the resource access rights of the second application from the rights module.
S602, the operating system uninstalls the second application according to the identification of the second application.
In one possible implementation, the operating system may offload the second application through the offload module.
It should be understood that, in S601, the operating system deletes the identifier of the second application and the application resource from the resource database, and the execution order of unloading the second application from the operating system in S602 is not sequential.
In the method, when the second application is unloaded, the operating system deletes the application identifier and the application resource of the second application from the resource database, so that the subsequent failure to acquire the application resource of the second application from the resource database is ensured.
In order to facilitate the detailed description of the system theme switching or the system language switching corresponding to the system application, the second application is used as the system application, and the system theme switching or the system language switching corresponding to the second application is described in detail.
In a possible implementation manner, when the second application generates a second type of application update, the operating system may update the application resources of the third application stored in the resource database, where the second type of application update includes any one of a system theme switch and a system language switch. The third application is any common application, and the application resources of the third application comprise application identifiers and application icons of the third application.
The second type of application update of the second application, explained in detail below, may include the following steps as shown in fig. 7:
and S701, when the second application generates the second type of application update, the operating system acquires an application program package of the second application.
In the embodiment of the present application, the operating system performing the step of fig. 7 may be a packet management service in the hong-mo system, or may be a service in another operating system, which is not limited herein.
S702, the operating system acquires application resources of the second application from the application program package of the second application.
In the case that the second application performs system theme switching, the application resources of the second application include a system font style and the like, for example, the system font style is a regular script; in the case that the second application is subjected to system language switching, the application resources of the second application include a system language type and the like, for example, the system language type is chinese.
S703, the operating system updates the application resources of the third application stored in the resource database based on the application resources of the second application.
In a possible implementation manner, in the case that the second application performs system theme switching, the operating system updates the application identifier and the application icon of the third application stored in the resource database by adopting a system font style and the like. For example, the application identifier of the third application stored in the resource database is Song Ti type, and after the second application performs system theme switching, the application identifier of the third application stored in the resource database is regular script type.
And under the condition that the second application is subjected to system language switching, the operating system updates the application identifier and the application icon of the third application stored in the resource database by adopting the system language type. For example, the application identifier of the third application stored in the resource database is of english type, and the application identifier of the third application stored in the resource database is of chinese type after the second application is subjected to system language switching.
Fig. 8 is a schematic flow chart illustrating a resource access method according to an embodiment of the present application. The resource access method may include the steps of:
s801, a first application determines that application resources of a second application need to be accessed.
In a possible implementation manner, after determining that an application resource of the second application needs to be accessed, the first application may generate a first access request, where the first access request is used to request the application resource of the second application, and the first access request includes an application identifier of the second application.
It should be understood that the first application may be a system application, and may also be a general application, which is not limited herein. The second application is a general application.
S802, the first application acquires application resources of the second application from a resource database.
In a possible implementation manner, the first application may obtain the application resource of the second application from the resource database according to the application identifier of the second application. After the first application obtains the application resource of the second application, the application resource of the second application can be displayed.
In the embodiment of the application, the resource database includes at least one application identifier and application resources of at least one application, and the application resources of each application in the resource database are obtained from an application program package of each application. The steps in fig. 5 have been described in detail as to how the application resources of each application are added to the resource database, and are not described in detail herein.
When the first application does not acquire the application resources of the second application from the resource database, the first application outputs prompt information, and the prompt information is used for prompting that the application resources of the second application cannot be accessed.
In this embodiment of the present application, the first application obtains the application resource of the second application from the resource database, which may include the following two possible embodiments:
a first possible implementation may include the following steps as shown in fig. 9:
s901, the first application sends a first access request. Accordingly, the operating system obtains a first access request of the first application.
In the embodiment of the present application, the operating system performing the step of fig. 9 may be a packet management service in the hong-mo system, or may be a service in another operating system, which is not limited herein.
In a possible implementation manner, after obtaining the first access request, the operating system obtains the resource access right of the first application from the right module according to the identifier of the first application, and if the resource access right of the first application is allowed to be accessed, the operating system executes S902; if the resource access authority of the first application is not allowed to be accessed, the operating system does not perform any processing.
S902, the operating system determines application resources of the second application from the resource database according to the application identification of the second application.
In the first embodiment, the operating system may directly obtain the application resource of the second application from the resource database according to the application identifier of the second application. Specifically, the operating system sends a resource query request to the resource database, wherein the resource query request includes an application identifier of the second application. And the resource database determines the application resources of the second application according to the application identification of the second application in the resource query request, and sends the application resources of the second application to the operating system.
In the second embodiment, the operating system may determine, according to the application identifier of the second application, whether an application resource of the second application exists in the cache of the operating system. If the cache of the operating system does not contain the application resource of the second application, the operating system determines the application resource of the second application from the resource database; if the application resource of the second application exists in the cache of the operating system, the operating system determines the application resource of the second application from the cache.
In the method, if the application resource of the second application exists in the cache of the operating system, the application resource of the second application can be directly obtained from the cache without searching in the resource database, and the efficiency of obtaining the application resource of the second application can be improved.
S903, the operating system sends the application resource of the second application to the first application.
After the first application acquires the application resource of the second application, if the application resource of the second application is in a binary stream form, the application resource can be directly displayed without analysis, and the display speed of the application resource can be effectively improved.
A second possible implementation may include the following steps as shown in fig. 10:
S1001, the first application sends a first access request. Accordingly, the operating system obtains a first access request of the first application.
In the embodiment of the present application, the operating system performing the step of fig. 10 may be a process management service in the hong-mo system, or may be a service in another operating system, which is not limited herein.
In a possible implementation manner, after obtaining the first access request, the operating system obtains the resource access right of the first application from the right module according to the identifier of the first application, and if the resource access right of the first application is allowed to be accessed, the operating system executes S1002; if the resource access authority of the first application is not allowed to be accessed, the operating system does not perform any processing.
S1002, the operating system mounts the storage path of the resource database to the process corresponding to the first access request.
The operating system mounts the storage path of the resource database under the process corresponding to the first access request, so that the first application can access the resource database directly according to the storage path of the resource database.
S1003, the first application obtains application resources of the second application from the resource database based on the storage path of the resource database.
In the first embodiment, the first application may directly obtain the application resource of the second application from the resource database according to the application identifier of the second application.
In the second embodiment, the first application may determine, according to the application identifier of the second application, whether an application resource of the second application exists in the cache of the operating system. If the cache of the operating system does not contain the application resource of the second application, the first application determines the application resource of the second application from the resource database; if the application resources of the second application exist in the cache of the operating system, the first application determines the application resources of the second application from the cache.
After the first application acquires the application resource of the second application, if the application resource of the second application is in a binary stream form, the application resource can be directly displayed without analysis, and the display speed of the application resource can be effectively improved.
In the method, the first application can acquire the application resources of the second application from the resource database instead of acquiring the application program package of the second application, so that the private data leakage in the application program package of the second application can be effectively avoided. In addition, the problem of overlarge occupied memory resources can be effectively avoided because the application program package of the second application is not required to be loaded.
Based on the same conception, fig. 11 shows an electronic device 1100 provided by the present application. As shown in fig. 11, an electronic device 1100 may include: one or more processors 1101; one or more memories 1102; a communication interface 1103, and one or more computer programs 1104, each of which may be connected via one or more communication buses 1105. Wherein the communication interface 1103 is used to enable communication with other devices, e.g. the communication interface may be a transceiver. One or more computer programs 1104 are stored in the memory 1102 and configured to be executed by the one or more processors 1101, the one or more computer programs 1104 comprising instructions that can be used to perform the relevant steps as provided in the respective embodiments above.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is described from the point of view that the electronic device is the execution subject. In order to implement the functions in the methods provided in the embodiments of the present application, the electronic device may include a hardware structure and/or a software module, where the functions are implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module. Some of the functions described above are performed in a hardware configuration, a software module, or a combination of hardware and software modules, depending on the specific application of the solution and design constraints.
As used in the above embodiments, the term "when …" or "after …" may be interpreted to mean "if …" or "after …" or "in response to determination …" or "in response to detection …" depending on the context. Similarly, the phrase "at the time of determination …" or "if detected (a stated condition or event)" may be interpreted to mean "if determined …" or "in response to determination …" or "at the time of detection (a stated condition or event)" or "in response to detection (a stated condition or event)" depending on the context. In addition, in the above-described embodiments, relational terms such as first and second are used to distinguish one entity from another entity without limiting any actual relationship or order between the entities.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc. The schemes of the above embodiments may be used in combination without conflict.
It is noted that a portion of this patent document contains material which is subject to copyright protection. The copyright owner has reserved copyright rights, except for making copies of patent documents or recorded patent document content of the patent office.

Claims (14)

1. A method for accessing resources, applied to an electronic device, where the electronic device includes a first application and a second application, the method comprising:
the first application determines application resources which need to be accessed to the second application;
the first application acquires application resources of the second application from a resource database, the resource database comprises application identifiers and application resources of at least one application, and the application resources of each application in the resource database are acquired from application program packages of each application.
2. The method of claim 1, wherein the electronic device comprises an operating system, the first application obtaining application resources of the second application from a resource database, comprising:
the operating system acquires a first access request of the first application, wherein the first access request is used for requesting application resources of the second application, and the first access request comprises an application identifier of the second application;
The operating system determines the application resources of the second application from the resource database according to the application identifier of the second application;
and the operating system sends the application resource of the second application to the first application.
3. The method of claim 2, wherein the operating system is further configured to, prior to determining the application resource of the second application from the resource database based on the application identification of the second application:
and the operating system determines that the application resource of the second application does not exist in the cache of the operating system according to the application identifier of the second application.
4. The method of claim 2, wherein the operating system is further configured to, prior to determining the application resource of the second application from the resource database based on the application identification of the second application:
the operating system obtains the resource access authority of the first application;
the operating system determines that the resource access rights of the first application are allowed access.
5. The method of claim 1, wherein the electronic device comprises an operating system, the first application obtaining application resources of the second application from a resource database, comprising:
The operating system acquires a first access request of the first application, wherein the first access request is used for requesting application resources of the second application, and the first access request comprises an application identifier of the second application;
the operating system mounts the storage path of the resource database under the process corresponding to the first access request;
the first application obtains application resources of the second application from the resource database based on the storage path of the resource database.
6. The method of claim 5, wherein the operating system mounts the storage path of the application resource of the second application in the resource database under the process corresponding to the first access request, the method further comprising:
the operating system obtains the resource access authority of the first application;
the operating system determines that the resource access rights of the first application are allowed access.
7. The method of any one of claims 1-6, wherein the method further comprises:
and when the second application is updated, the operating system updates the application resources of the second application in the resource database, wherein the second application update comprises any one of installation, upgrading and unloading.
8. The method of claim 7, wherein the operating system updating the application resources of the second application in the resource database when the second application is updated comprises:
when the second application is installed or upgraded, the operating system acquires an application program package of the second application;
the operating system acquires application resources of the second application from an application program package of the second application;
and the operating system updates the resource database based on the identification of the second application and the application resource.
9. The method of any one of claims 1-8, wherein the method further comprises:
the resource database is located in a first storage space, the application program package of the second application is located in a second storage space, and the first storage space is different from the second storage space.
10. The method of any one of claims 1-9, wherein the method further comprises:
and when the first application does not acquire the application resources of the second application from the resource database, outputting prompt information, wherein the prompt information is used for prompting that the application resources of the second application cannot be accessed.
11. The method of claim 9, wherein the second storage space is configured to be accessed by only the second application.
12. The method of claim 11, wherein the method further comprises:
the operating system receives a first operation request, wherein the first operation request is used for requesting part of resources of the second application, and the first operation request comprises an application identifier of the second application;
and the operating system updates partial resources of the second application into the resource database according to the first operation request.
13. An electronic device, comprising:
a processor, a memory, and one or more programs;
wherein the one or more programs are stored in the memory, the one or more programs comprising instructions, which when executed by the processor, cause the electronic device to perform the method steps of any of claims 1-12.
14. A computer readable storage medium, characterized in that a computer program or instructions is stored which, when run on a computer, causes the computer readable storage medium to implement the method of any one of claims 1 to 12.
CN202311478456.4A 2023-11-07 2023-11-07 Resource access method and electronic equipment Pending CN117708801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311478456.4A CN117708801A (en) 2023-11-07 2023-11-07 Resource access method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311478456.4A CN117708801A (en) 2023-11-07 2023-11-07 Resource access method and electronic equipment

Publications (1)

Publication Number Publication Date
CN117708801A true CN117708801A (en) 2024-03-15

Family

ID=90154093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311478456.4A Pending CN117708801A (en) 2023-11-07 2023-11-07 Resource access method and electronic equipment

Country Status (1)

Country Link
CN (1) CN117708801A (en)

Similar Documents

Publication Publication Date Title
WO2021083378A1 (en) Method for accelerating starting of application, and electronic device
US11947974B2 (en) Application start method and electronic device
CN113254409B (en) File sharing method, system and related equipment
CN115809139A (en) Memory management method and electronic equipment
CN113805797B (en) Processing method of network resource, electronic equipment and computer readable storage medium
CN112817634B (en) COTA package downloading method and device
WO2021073337A1 (en) Method and apparatus for installing plug-in, and storage medium
WO2022253158A1 (en) User privacy protection method and apparatus
CN114741256B (en) Sensor monitoring method and device and terminal equipment
WO2021238376A1 (en) Function pack loading method and apparatus, and server and electronic device
CN117708801A (en) Resource access method and electronic equipment
CN113467821A (en) Application program repairing method, device, equipment and readable storage medium
CN117009023B (en) Method for displaying notification information and related device
CN116048629B (en) System service switching method, control device, electronic equipment and storage medium
CN115952564B (en) Data writing method and terminal equipment
CN116795476B (en) Wallpaper deleting method and electronic equipment
CN115774560A (en) Resource searching method and related device
CN117707562A (en) Parameter updating method and terminal equipment
CN117784990A (en) Method and related device for displaying icons of application programs in task bar
CN117667864A (en) Media file storage method and electronic equipment
CN117251223A (en) Cloud function plug-in configuration and scheduling method, system and electronic equipment
CN117632534A (en) Inter-process communication method and electronic equipment
CN117241234A (en) Satellite short message communication charging calibration method and device
CN117687707A (en) Application hot start method and electronic equipment
CN115114618A (en) Application processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination