WO2013067856A1 - 一种实现应用的方法及设备 - Google Patents
一种实现应用的方法及设备 Download PDFInfo
- Publication number
- WO2013067856A1 WO2013067856A1 PCT/CN2012/081650 CN2012081650W WO2013067856A1 WO 2013067856 A1 WO2013067856 A1 WO 2013067856A1 CN 2012081650 W CN2012081650 W CN 2012081650W WO 2013067856 A1 WO2013067856 A1 WO 2013067856A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- implemented
- behavior
- server
- identifier
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/541—Interprogram communication via adapters, e.g. between incompatible applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/547—Messaging middleware
Definitions
- the present invention relates to the field of communications, and in particular, to a method and device for implementing an application.
- Each software implements an application in which various behaviors are defined, and the client can execute the behaviors included in the software to implement the application corresponding to the software.
- the technicians encode the various behaviors included in the software in the software in an orderly manner; after the client installs the software, the various behaviors included in the software may be executed in the order of various behaviors included in the software. After the client performs various actions included in the software, the corresponding application of the software is implemented.
- the present invention provides a method and apparatus for implementing an application.
- the technical solution is as follows:
- a method of implementing an application comprising:
- a behavior configuration table of an application to be implemented where the behavior configuration table includes the The application to be implemented includes the identification and configuration information of the API (Application Programming Interface) corresponding to the behavior;
- API Application Programming Interface
- the application to be implemented is implemented according to the identifier and configuration information of the API corresponding to the behavior included in the application to be implemented.
- the receiving server sends a behavior configuration table of the application to be implemented, including:
- the receiving server sends a behavior configuration table of the application to be implemented, including:
- the application to be implemented is implemented according to the identifier and configuration information of the API corresponding to the behavior of the application to be implemented, including:
- the application to be implemented is implemented by executing an API corresponding to the behavior included in the application to be implemented, according to the configuration information of the behavior of the application to be implemented.
- the method further includes:
- a device for implementing an application comprising:
- a receiving module configured to receive, by the server, a behavior configuration table of the application to be implemented, where the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior included in the application to be implemented;
- the implementation module is configured to implement the application to be implemented according to the identifier and configuration information of the API corresponding to the behavior included in the application to be implemented.
- the receiving module includes:
- a first sending unit configured to send a command packet request to the server, and the command packet request carries an identifier of the application to be implemented;
- a first receiving unit configured to receive, by the server, a behavior configuration table of an application to be implemented, where the server sends a behavior configuration table of the application to be implemented, where the server is configured according to the identifier of the application to be implemented. Obtained in the behavior configuration table of the application stored by itself.
- the receiving module includes:
- a second sending unit configured to send a command packet request to the server
- a second receiving unit configured to receive, by the server, a behavior configuration table of an application to be implemented, where the server sends a behavior configuration table of the application to be implemented, and the behavior of the application stored by the server according to the selection policy from the server Select from the configuration table.
- the implementation module includes:
- a calling unit configured to invoke an API corresponding to the behavior included in the application to be implemented according to the identifier of the API corresponding to the behavior of the application to be implemented;
- the execution unit is configured to implement the application to be implemented by executing an API corresponding to the behavior included in the application to be implemented according to the configuration information of the behavior of the application to be implemented.
- the device further includes:
- a decryption module configured to perform decryption processing on the behavior configuration information of the application to be implemented, if the server performs encryption processing on the behavior configuration table of the application to be implemented.
- the receiving server sends a behavior configuration table of the application to be implemented, the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior of the application to be implemented, and an API corresponding to the behavior included in the application to be implemented.
- the identification and configuration information implements the application to be implemented. In this way, when the application to be implemented is modified, the technician can modify the identifier and configuration information of the API corresponding to the behavior included in the application to be implemented on the server, so that the flexibility of modifying the application and the development cost of modifying the application can be improved.
- FIG. 1 is a flowchart of a first method for implementing an application according to Embodiment 1 of the present invention
- Embodiment 3 is a flowchart of a third method for implementing an application provided by Embodiment 1 of the present invention.
- FIG. 4 is a flowchart of a fourth method for implementing an application according to Embodiment 1 of the present invention.
- FIG. 5 is a flowchart of a method for implementing an application according to Embodiment 2 of the present invention.
- FIG. 6 is a flowchart of an apparatus for implementing an application according to Embodiment 3 of the present invention.
- BEST MODE FOR CARRYING OUT THE INVENTION the specific implementation manner, structure, characteristics and functions of the information feedback method and the corresponding server according to the present invention will be described in detail below with reference to the accompanying drawings and preferred embodiments.
- an embodiment of the present invention provides a method for implementing an application, including: Step 101: Receive, by a server, a behavior configuration table of an application to be implemented, where the behavior configuration table includes behaviors corresponding to an application to be implemented. API identification and configuration information;
- Step 102 Identify and configure information of an API corresponding to the behavior included in the application to be implemented. Implement the application to be implemented.
- the foregoing step 101 may include:
- Step 101a Send a command packet request to the server, and the command packet request carries an identifier of the application to be implemented;
- Step 101b The receiving server sends a behavior configuration table of the application to be implemented, and the server sends the behavior configuration table of the application to be implemented, so that the server obtains the behavior configuration table of the application stored by the server according to the identifier of the application to be implemented. owned.
- the foregoing step 101 may include:
- Step 101c Send a command packet request to the server
- Step 101d The receiving server sends a behavior configuration table of the application to be implemented, and the behavior configuration table of the application to be implemented by the server is selected by the server according to the selection policy from the behavior configuration table of the application stored by the server.
- the foregoing step 102 may include:
- Step 102a Call an API corresponding to the behavior included in the application to be implemented according to the identifier of the API corresponding to the behavior included in the application to be implemented;
- Step 102b The application to be implemented is implemented by executing an API corresponding to the behavior included in the application to be implemented, according to the configuration information of the behavior included in the application to be implemented.
- the method may further include:
- the server performs encryption processing on the behavior configuration table of the implemented application, the behavior configuration information of the application to be implemented is decrypted.
- the receiving server sends a behavior configuration table of the application to be implemented, where the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior of the application to be implemented, and corresponding to the behavior included in the application to be implemented.
- the identification and configuration information of the API implements the application to be implemented. In this way, when the application to be implemented is modified, the technician can modify the identifier and configuration information of the API corresponding to the behavior included in the application to be implemented on the server, so that the flexibility of modifying the application and the development cost of modifying the application can be improved.
- an embodiment of the present invention provides a method for implementing an application, including: Step 201: Receive, by a server, a behavior configuration table of an application to be implemented, where the behavior configuration table includes behaviors corresponding to an application to be implemented.
- the identification and configuration information of the API, and the configuration information of each behavior includes at least the configuration parameters of each behavior;
- Each behavior corresponds to one or more APIs; the process of the client implementing a certain behavior may be specifically as follows: The client invokes the API corresponding to the behavior, and executes the invoked API according to configuration information such as configuration parameters of the behavior.
- the behavior that the client needs to implement is to find the file a.sis, and the API to be called by the behavior is Find ( ) for implementing the lookup function, and the configuration parameter of the behavior is the file name a.sis; the client calls the The behavior is to call Find ( ), according to the configuration parameter a.sis of the behavior, and find the file a.sis by calling find().
- the configuration information of the behavior may further include information such as a trigger condition of the behavior, a display specification, an implemented behavior description information, and/or an induced behavior.
- the client may be a mobile phone or a personal computer, etc.
- the server may be a cloud or the like, and the cloud is a software platform including one or more servers.
- the technician may configure the identifier and configuration information of the API corresponding to each behavior included in the application to be implemented in the server, and perform the behaviors of the application to be implemented according to the sequence of the behaviors included in the application to be implemented.
- the identity and configuration information of the corresponding API is stored in the behavior configuration table.
- the server may select a behavior configuration table of the application to be implemented according to the selection policy from the behavior configuration table of the application, and actively send the behavior configuration table of the application to be implemented to the client; or, the client sends the command packet.
- the server selects the behavior configuration table of the application to be implemented from the behavior configuration table of the application stored by the server according to the selection policy, and sends the behavior configuration table of the application to be implemented to the client; or, the client sends a command.
- the packet is requested to the server, and the command packet request carries the identifier of the application to be implemented, and the server requests the identifier of the application to be implemented according to the command packet request, and obtains the application to be implemented from the behavior configuration table of the application stored by the server.
- the behavior configuration table and sends the behavior configuration table of the application to be implemented to the client.
- the selection policy may be a preference configuration table for the application recently configured by the technician; for example, the technician first serves The service configuration table of the application 1 is configured, and then the behavior configuration table of the application 2 is configured; correspondingly, the server selects the behavior configuration table of the recently configured application 2 according to the selection policy, and selects the behavior configuration table of the selected application 2 as The behavior configuration table of the application to be implemented.
- the client may first encrypt the command packet request, and then send the encrypted command packet request to the server; correspondingly, after receiving the command packet request, the server first The received command packet requests a decoding process, and then performs a step of acquiring a behavior configuration table of the application to be implemented.
- the server may first perform encryption processing on the behavior configuration table of the implemented application, and then send the behavior configuration table of the application to be implemented after the encryption process to the client. Client.
- the application to be implemented is the process of killing the Trojan C in the client, and the client implements the application to be implemented, specifically: finding hidden files - a.sis, deleting hidden files - a.sis, killing process A1 and A2, and then uninstall the files a.sis and b.sis, thus implementing the killing Trojan C;
- the applications to be implemented include finding hidden files - a.sis behavior 1, deleting hidden files - a.sis behavior 2 , killing the behavior of processes A1 and A2 3 and the behavior of the unloading files a.sis and b.sis 4;
- the API corresponding to behavior 1 is Find ( ) for finding files, and the identifier of Find ( ) is ID1
- the configuration information of 1 includes at least the configuration parameter of behavior 1, and the configuration parameter of behavior 1 is the file name—a.sis;
- the API corresponding to behavior 2 is Delete ( ) for deleting the file, and the identifier of Delete ( ) is
- the configuration information of the behavior 2 includes at least the configuration parameter of the behavior 2, and the configuration parameter of the behavior 2 is the file name - a.sis;
- the API corresponding to the behavior 3 is the Kill ( ) for the killing process, and the identifier of the Kill ( ) Configuration letter for ID3, and behavior 3
- the information includes at least the configuration parameters of behavior 3, and the configuration parameters of behavior 3 are process names A1 and A2;
- the API corresponding to behavior 4 is Uninstall ( ) for uninstalling files, and the identifier of Uninstall ( ) is ID4, and behavior 4
- the configuration information includes at least the configuration parameters of behavior 4, and the configuration parameters of behavior 4 are file names a.sis and b.sis.
- the technicians respectively configure the behaviors to be implemented in the server to be implemented in the server.
- the identifier and configuration information of the corresponding API, the identifier and configuration information of the API corresponding to the behavior 2, the identifier and configuration information of the API corresponding to the behavior 3, and the behavior 4 The identification and configuration information of the API is stored in the behavior configuration table as shown in Table 1.
- the server can send the behavior configuration table of the application to be implemented as shown in Table 1 to the client.
- Step 202 Set a pointer to the identifier and configuration information of the API corresponding to the first behavior included in the application to be implemented in the behavior configuration table of the application to be implemented, and read the identifier and configuration information of the API corresponding to the behavior pointed by the pointer. ;
- the client first decrypts the behavior configuration table of the implemented application, and then performs this step.
- the client receiving server sends a behavior configuration table of the application to be implemented as shown in Table 1, and setting the pointer to the identifier and configuration of the API corresponding to the behavior 1 in the behavior configuration information of the application to be implemented shown in Table 1.
- Information read the identifier ID1 and configuration information of the API corresponding to the behavior 1 pointed to by the pointer - a. sis.
- Step 203 Call the corresponding API according to the identifier of the API corresponding to the read behavior, and execute the invoked API according to the configuration information of the read behavior;
- various APIs are defined in the operating system of the client, and each API has a corresponding identifier, so the client can call the corresponding API from the operating system of the client according to the identifier of the API corresponding to the read behavior. API.
- Step 204 Determine whether the identifier and configuration information of the API corresponding to the behavior pointed by the pointer is the identifier and configuration information of the API corresponding to the last behavior included in the application to be implemented, and if not, proceed to step 205;
- the client determines that the identifier and the configuration information of the API corresponding to the behavior of the pointer is the identifier and configuration information of the API corresponding to the last behavior included in the application to be implemented, the application to be implemented is completed, and the operation ends.
- Step 205 Set the pointer and the configuration information of the API corresponding to the next behavior in the behavior configuration table of the application to be implemented, read the identifier and configuration information of the API corresponding to the behavior pointed by the pointer, and then return to step 203.
- the client when the client reads the identifier and configuration information of the API corresponding to the last behavior included in the application to be implemented, invokes the API corresponding to the last behavior, and executes the invoked API according to the configuration information of the last behavior, the client
- the last action included in the application to be implemented is to complete the implementation of the application to be implemented.
- the client determines that the identifier and configuration information of the API corresponding to the behavior 1 of the pointer is not the identifier and configuration information of the API corresponding to the last behavior of the application to be implemented, and the application to be implemented is shown in Table 1.
- the pointer is pointed to the identifier and configuration information of the API corresponding to the behavior 2; the pointer is pointed to the identifier ID2 of the API corresponding to the behavior 2 and the configuration information—a. sis, according to the identifier ID2 of the API corresponding to the behavior 2
- the corresponding API in the client's operating system is called Delete ( ).
- _a.sis deletes the hidden file by executing the called Delete ( ) - a.sis.
- the client determines that the identifier and configuration information of the API corresponding to the behavior 2 pointed by the pointer is not the identifier and configuration information of the API corresponding to the last behavior included in the application to be implemented, and the behavior of the application to be implemented shown in Table 1
- the setting pointer in the configuration table points to the identifier and configuration information of the API corresponding to the behavior 3; the pointer is pointed to the identifier ID3 of the API corresponding to the behavior 3 and the configuration parameters A1 and A2, and the identifier ID3 of the API corresponding to the behavior 3 is operated from the client.
- the corresponding API is called Kill ( ) in the system, and the processes A1 and A2 are killed by executing the called Kill ( ) according to the configuration parameters A1 and A2 of the behavior 3.
- the client determines that the identifier and configuration information of the API corresponding to the behavior 3 pointed by the pointer is not the identifier and configuration information of the API corresponding to the last behavior included in the application to be implemented, and the behavior of the application to be implemented shown in Table 1
- the setting pointer in the configuration table points to the identifier and configuration information of the API corresponding to the behavior 4; the pointer is pointed to the identifier ID4 of the API corresponding to the behavior 4 and the configuration parameters a. sis and b.sis, according to the identifier ID4 of the API corresponding to the behavior 4
- the corresponding API is called Uninstall ( ) from the client's operating system, and the configuration parameters a. sis and b.sis according to behavior 4 are deleted by executing the called Uninsrall ( ) to delete the files a. sis and b.sis.
- the client determines that the identifier and configuration information of the API corresponding to the behavior of the pointer is the identifier and configuration information of the API corresponding to the last behavior of the application to be implemented, thereby completing the behavior to be implemented, that is, killing the Trojan C, and end the operation.
- the receiving server sends a behavior configuration table of the application to be implemented, where the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior of the application to be implemented, and corresponding to the behavior included in the application to be implemented.
- the identification and configuration information of the API implements the application to be implemented. In this way, when modifying the application to be implemented, the technician can modify the identification and configuration information of the API corresponding to the behavior included in the application to be implemented on the server side, thereby improving the flexibility of modifying the application and reducing the development cost of modifying the application.
- an embodiment of the present invention provides an apparatus for implementing an application, including: a receiving module 301, configured to receive, by a server, a behavior configuration table of an application to be implemented, where the behavior configuration table includes an application to be implemented, including The behavior of the corresponding API identification and configuration information;
- the implementation module 302 is configured to implement an application to be implemented according to the identifier and configuration information of the API corresponding to the behavior included in the application to be implemented.
- the receiving module 301 includes:
- a first sending unit configured to send a command packet request to the server, and the command packet request carries an identifier of the application to be implemented;
- the first receiving unit is configured to receive, by the server, a behavior configuration table of the application to be implemented, where the server sends the behavior configuration table of the application to be implemented, and the server obtains the identifier according to the identifier of the application to be implemented.
- the stored application's behavior is configured in the configuration table.
- the receiving module 301 includes:
- a second sending unit configured to send a command packet request to the server
- a second receiving unit configured to receive, by the server, a behavior configuration table of the application to be implemented, where the server sends the behavior configuration table of the application to be implemented, and the server selects the behavior configuration table of the application stored by the server according to the selection policy.
- the implementation module 302 includes:
- the calling unit is configured to invoke an API corresponding to the behavior included in the application to be implemented according to the identifier of the API corresponding to the behavior included in the application to be implemented;
- the execution unit is configured to implement an application to be implemented by executing an API corresponding to the behavior included in the application to be implemented according to the configuration information of the behavior included in the application to be implemented.
- the device further includes:
- the decryption module is configured to perform decryption processing on the behavior configuration information of the application to be implemented if the behavior configuration table of the application to be implemented by the server is encrypted.
- the receiving server sends a behavior configuration table of the application to be implemented, where the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior of the application to be implemented, and corresponding to the behavior included in the application to be implemented.
- the identification and configuration information of the API implements the application to be implemented. In this way, when modifying the application to be implemented, the technician can modify the identification and configuration information of the API corresponding to the behavior included in the application to be implemented on the server side, thereby improving the flexibility of modifying the application and reducing the development cost of modifying the application.
- the device for implementing an application provided by the foregoing embodiment is only illustrated by dividing the foregoing functional modules. In an actual application, the foregoing functions may be allocated by different functional modules according to requirements. Upon completion, the internal structure of the device is divided into different functional modules to perform all or part of the functions described above.
- the foregoing embodiment provides a device for implementing an application and a method for implementing the application. The specific implementation process is described in detail in the method embodiment, and details are not described herein again.
- the completion of the hardware may also be performed by a program to instruct related hardware.
- the program may be stored in a computer readable storage medium.
- the storage medium mentioned above may be a read only memory, a magnetic disk or an optical disk.
- the receiving server sends a behavior configuration table of the application to be implemented, the behavior configuration table includes an identifier and configuration information of an API corresponding to the behavior of the application to be implemented, and an API corresponding to the behavior included in the application to be implemented.
- the identification and configuration information implements the application to be implemented. In this way, when modifying the application to be implemented, the technician can modify the identification and configuration information of the API corresponding to the behavior included in the application to be implemented on the server side, thereby improving the flexibility of modifying the application and reducing the development cost of the modified application.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN4036CHN2014 IN2014CN04036A (zh) | 2011-11-07 | 2012-09-20 | |
EP12848311.2A EP2778909B1 (en) | 2011-11-07 | 2012-09-20 | Application implementation method and device |
BR112014004517A BR112014004517A2 (pt) | 2011-11-07 | 2012-09-20 | método e dispositivo de implementação de aplicativo |
US14/346,939 US20140237489A1 (en) | 2011-11-07 | 2012-09-20 | Application implementation method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110348337.8A CN103092639B (zh) | 2011-11-07 | 2011-11-07 | 一种实现应用的方法及设备 |
CN201110348337.8 | 2011-11-07 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013067856A1 true WO2013067856A1 (zh) | 2013-05-16 |
Family
ID=48205250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2012/081650 WO2013067856A1 (zh) | 2011-11-07 | 2012-09-20 | 一种实现应用的方法及设备 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20140237489A1 (zh) |
EP (1) | EP2778909B1 (zh) |
CN (1) | CN103092639B (zh) |
BR (1) | BR112014004517A2 (zh) |
IN (1) | IN2014CN04036A (zh) |
WO (1) | WO2013067856A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106681787A (zh) * | 2017-01-24 | 2017-05-17 | 东软集团股份有限公司 | 应用开发方法及装置 |
US20190156024A1 (en) * | 2017-11-20 | 2019-05-23 | Somansa Co., Ltd. | Method and apparatus for automatically classifying malignant code on basis of malignant behavior information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1357820A (zh) * | 2000-12-15 | 2002-07-10 | 无敌科技(西安)有限公司 | 一种程序界面的变换方法 |
CN101431523A (zh) * | 2007-11-05 | 2009-05-13 | 国际商业机器公司 | 用于更新计算机中的目标系统的配置的方法及微系统 |
CN101582908A (zh) * | 2009-06-30 | 2009-11-18 | 杭州华三通信技术有限公司 | 一种参数配置方法和设备 |
CN101673199A (zh) * | 2009-08-10 | 2010-03-17 | 厦门敏讯信息技术股份有限公司 | 终端参数配置服务器及其软件界面的自动生成方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6782527B1 (en) * | 2000-01-28 | 2004-08-24 | Networks Associates, Inc. | System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets |
US20040083465A1 (en) * | 2002-10-28 | 2004-04-29 | Weijia Zhang | Method and system for connecting to an application programming interface |
US7750913B1 (en) * | 2006-10-24 | 2010-07-06 | Adobe Systems Incorporated | System and method for implementing graphics processing unit shader programs using snippets |
US20090007067A1 (en) * | 2007-06-28 | 2009-01-01 | International Business Machines Corporation | Composite portal application |
CN102158370B (zh) * | 2011-04-12 | 2013-08-21 | 瑞斯康达科技发展股份有限公司 | 一种自动化测试方法和系统 |
-
2011
- 2011-11-07 CN CN201110348337.8A patent/CN103092639B/zh active Active
-
2012
- 2012-09-20 EP EP12848311.2A patent/EP2778909B1/en active Active
- 2012-09-20 WO PCT/CN2012/081650 patent/WO2013067856A1/zh active Application Filing
- 2012-09-20 BR BR112014004517A patent/BR112014004517A2/pt not_active Application Discontinuation
- 2012-09-20 US US14/346,939 patent/US20140237489A1/en not_active Abandoned
- 2012-09-20 IN IN4036CHN2014 patent/IN2014CN04036A/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1357820A (zh) * | 2000-12-15 | 2002-07-10 | 无敌科技(西安)有限公司 | 一种程序界面的变换方法 |
CN101431523A (zh) * | 2007-11-05 | 2009-05-13 | 国际商业机器公司 | 用于更新计算机中的目标系统的配置的方法及微系统 |
CN101582908A (zh) * | 2009-06-30 | 2009-11-18 | 杭州华三通信技术有限公司 | 一种参数配置方法和设备 |
CN101673199A (zh) * | 2009-08-10 | 2010-03-17 | 厦门敏讯信息技术股份有限公司 | 终端参数配置服务器及其软件界面的自动生成方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2778909A4 * |
Also Published As
Publication number | Publication date |
---|---|
BR112014004517A2 (pt) | 2017-03-28 |
EP2778909A1 (en) | 2014-09-17 |
EP2778909B1 (en) | 2021-01-06 |
CN103092639A (zh) | 2013-05-08 |
US20140237489A1 (en) | 2014-08-21 |
CN103092639B (zh) | 2016-05-25 |
EP2778909A4 (en) | 2015-05-13 |
IN2014CN04036A (zh) | 2015-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5830102B2 (ja) | 取得ファイルの評判チェック | |
EP2122476B1 (en) | Bidirectional dynamic offloading of tasks between a host and a mobile device | |
US8990902B2 (en) | Client authentication during network boot | |
JP4676744B2 (ja) | セキュリティ関連プログラミング・インターフェース | |
WO2017084555A1 (zh) | 用于可信执行环境的可信应用生成及安装方法 | |
KR20080068647A (ko) | 이형, 분산 컴퓨팅 시스템에 서비스 애플리케이션 실행환경을 형성하기 위한 방법 및 시스템, 그리고 상기 서비스애플리케이션 실행 환경에서 실행하는 사용자 친화적데이터 전달 서비스 애플리케이션 | |
JP2019522282A (ja) | クラウドコンピューティングノードのセキュアな設定 | |
US20130111542A1 (en) | Security policy tokenization | |
Adekotujo et al. | A comparative study of operating systems: Case of windows, unix, linux, mac, android and ios | |
CN109522055B (zh) | 基于分布式服务调用的连接预热方法及系统 | |
WO2016069595A1 (en) | Method and system for exchanging content between applications | |
JP2007528064A (ja) | 無線装置オペレーティング環境における未検証プログラムの実行 | |
CN109831779B (zh) | 一种升级包下载方法、装置、服务器、终端及系统 | |
WO2013067856A1 (zh) | 一种实现应用的方法及设备 | |
US11227032B1 (en) | Dynamic posture assessment to mitigate reverse engineering | |
US9363290B2 (en) | Access control information generating system | |
CN112187734B (zh) | 一种IPSec组件架构及VPN隧道建立方法 | |
US11487895B2 (en) | Client-side encryption and processing of telemetry data | |
US10623492B2 (en) | Service processing method, related device, and system | |
WO2013057795A1 (ja) | 転送制御プログラム、制御装置及び転送制御方法 | |
WO2024130565A1 (zh) | 任务处理方法、装置及电子设备 | |
CN117319992A (zh) | 车辆软件升级方法、系统、装置、电子设备及存储介质 | |
WO2018176492A1 (zh) | 一种配置文件的管理方法及装置 | |
CN117857095A (zh) | 一种无私钥tls握手解决方法 | |
CN113127038A (zh) | 一种产品升级方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12848311 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012848311 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2012334595 Country of ref document: AU Date of ref document: 20120920 Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14346939 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112014004517 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 112014004517 Country of ref document: BR Kind code of ref document: A2 Effective date: 20140226 |