WO2019184053A1 - 一种浏览应用页面的方法及终端 - Google Patents

一种浏览应用页面的方法及终端 Download PDF

Info

Publication number
WO2019184053A1
WO2019184053A1 PCT/CN2018/086140 CN2018086140W WO2019184053A1 WO 2019184053 A1 WO2019184053 A1 WO 2019184053A1 CN 2018086140 W CN2018086140 W CN 2018086140W WO 2019184053 A1 WO2019184053 A1 WO 2019184053A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
free
identifier
terminal
installation
Prior art date
Application number
PCT/CN2018/086140
Other languages
English (en)
French (fr)
Inventor
邹现军
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201880043747.1A priority Critical patent/CN110869907B/zh
Publication of WO2019184053A1 publication Critical patent/WO2019184053A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating

Definitions

  • the present invention relates to the field of computers, and in particular, to a method and a terminal for browsing an application (APP) page.
  • APP application
  • the page of the second application is displayed by the first application.
  • the method for browsing the application page cannot implement automatic jump of the application.
  • the first application on the terminal receives the request for accessing the second application, regardless of whether the second application is installed on the terminal, the first application displays the first application.
  • the second application page has a poor user experience.
  • a second method for browsing an application page when the first application on the terminal receives the request for accessing the second application, if the second application is installed on the terminal, the second application is displayed by the second application. page.
  • the method of browsing the application page can implement automatic jump of the application, the premise is that the second application is installed on the terminal.
  • the first application on the terminal receives the request to access the second application
  • the second application if the second application is not installed on the terminal, the first scenario is adopted for the specific scenario.
  • the application displays the page of the second application, and the application jump in a specific scenario cannot be implemented, and the user experience is not good.
  • the embodiment of the invention provides a method for browsing an application page and a terminal, which can implement an application jump in a specific scenario, and the user experience is good.
  • a method of browsing an application page receives a first request to access the second application; the first application sends a second request to the installation-free application running engine on the terminal, and the second request is used to request access to the second Application, the second request carries an identifier of the second application, the second application is an installation-free application and is not installed on the terminal; and the installation-free application running engine acquires the second application from a download server Free application package; the free application runtime engine loads and runs the free application package of the second application; the second application displays a page of the second application.
  • the first application on the terminal receives the first request for accessing the second application, where the second application is an installation-free application and is not installed on the terminal.
  • the first application notifies the installation-free application running engine of the identifier of the second application, and the free-install application running engine loads and runs the second-installed application-free application package.
  • the second application displays the page of the second application, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • the first application sends an intent request to the installation-free application running engine on the terminal, where the intent request carries an identifier of the second application.
  • the first application sends an intent request, and the intent request is directly received by the installation-free application running engine, and the first application notifies the installation application running engine to identify the identifier of the second application by sending an intent request.
  • the install-free application running engine before the download-free application running engine acquires the free-installation application package of the second application from the download server, the install-free application running engine sends the second application to the policy server. And determining, by the policy server, that the second application is legal according to the identifier of the second application; and the free installation application running engine receives the second application legal indication information from the policy server.
  • the installation-free application running engine first determines that the second application is legal, and then obtains the installation-free application package of the second application from the download server, so as to provide the experience of the other application to start the installation-free application. To ensure that the installation-free application is legal.
  • the install-free application running engine before the download-free application running engine acquires the free-installation application package of the second application from the download server, the install-free application running engine sends the first application to the policy server. And signing, so that the policy server determines that the first application is legal according to the signature of the first application; and the free installation application running engine receives the first application legal indication information from the policy server.
  • the installation-free application running engine first determines that the first application is legal, and then obtains the installation-free application package of the second application from the download server, so as to provide the experience of the other application to start the installation-free application. To ensure that the other application is legal.
  • the first application sends an http request to a firewall on the terminal, where the http request carries a uniform resource locator (URL) for positioning to the second application.
  • the firewall determines that the URL matches a URL regular expression; the firewall sends the URL to the Instant Install Application Run Engine, the URL carrying an identifier of the second application.
  • the first application sends an http request, and the http request is first intercepted by a firewall, and the firewall notifies the installation-free application running engine after determining that the URL for locating the second application matches the URL regular expression. The identification of the second application, thereby providing an experience for other applications to launch an installation-free application.
  • the firewall sends the URL to a system application on the terminal, the URL carries an identifier of the second application, and the system application sends the application to the installation-free application running engine.
  • the URL the URL carrying an identifier of the second application.
  • the firewall does not directly notify the identifier of the second application of the installation-free application running engine, but notifies the installation application running engine of the second application by the system application, thereby enhancing the controllability of the system.
  • the firewall first determines that the identifier of the first application belongs to the first identifier set, and then determines that the URL matches the URL regular expression.
  • the first identifier set may be a list of package names of the request source. According to this embodiment, the legitimacy of the first application (ie, the caller) can be verified to ensure that the legitimate caller invokes the installation-free application execution engine.
  • the system application on the terminal first obtains the first identifier set and the URL regular expression from a policy server, and the system application sends the first identifier set to the firewall. And the URL regular expression, and then the firewall determines that the identifier of the first application belongs to the first identifier set.
  • the system application may obtain an interception matching policy from the policy server, where the interception matching policy includes the first identifier set and the URL regular expression. According to this embodiment, a manner in which a firewall acquires the first identity set and the URL regular expression is provided.
  • the second request carries an identifier, a page path, and an input parameter of the second application; the second application displays the second application according to the page path and the input parameter.
  • Page the second application may display the page of the second application according to the page path and the input parameter instead of displaying the default page of the second application.
  • the embodiment of the present invention provides a terminal, which can implement the functions performed in the foregoing method design of the first aspect, and the functions can be implemented by using hardware or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the terminal includes a processor configured to support the terminal to perform the corresponding functions of the first aspect method described above.
  • the terminal can also include a memory for coupling with the processor that retains the program instructions and data necessary for the terminal.
  • the terminal may also include a communication interface for transmitting or receiving information and the like.
  • the terminal may also include a display screen for displaying a page of the application or the like.
  • an embodiment of the present invention provides a communication device, which may be, for example, a chip, and the communication device may be disposed in a terminal, where the communication device includes a processor and an interface.
  • the processor is configured to support the communication device to perform the corresponding functions of the first aspect method described above.
  • the interface is used to support communication between the communication device and other communication devices or other network elements.
  • the communication device can also include a memory for coupling with the processor that retains the program instructions and data necessary for the communication device.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores instructions, when executed on a computer, causing the computer to perform any of the foregoing first aspect or the first aspect. The method described in the design.
  • an embodiment of the present invention provides a computer program product, comprising: instructions, when executed by a computer, causing a computer to perform any of the above aspects or any one of the possible aspects of the first aspect The method described in the above.
  • an embodiment of the present invention provides a computer program, including instructions, when the program is executed by a computer, the instructions cause the computer to perform any of the above first aspect or any of the possible aspects of the first aspect. Said method.
  • the first application on the terminal receives the first request for accessing the second application, where the second application is an installation-free application and is not installed on the terminal.
  • the first application notifies the installation-free application running engine of the identifier of the second application, and the free-install application running engine loads and runs the second-installed application-free application package.
  • the second application displays the page of the second application, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • FIG. 1 is a schematic structural diagram of a system based on a method for browsing an application page according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of another system architecture on which a method for browsing an application page is provided according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of communication of a method for browsing an application page according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a first application interface according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic diagram of a user interface change according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of another user interface change according to an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of another user interface change according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • FIG. 11 is a schematic diagram of another user interface change according to an embodiment of the present invention.
  • FIG. 12 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • FIG. 13 is a schematic diagram of another user interface change according to an embodiment of the present invention.
  • FIG. 14 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • FIG. 15 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure.
  • FIG. 16 is a schematic diagram of a communication apparatus according to an embodiment of the present application.
  • FIG. 1 is a schematic diagram of a system architecture based on a method for browsing an application page according to an embodiment of the present invention. Embodiments of the invention may be, but are not limited to, implemented based on deeplink techniques.
  • the system includes a terminal 101 and a download server 102.
  • the first application 1011 and the installation-free application running engine 1012 are installed on the terminal 101, and the second application 1013 is not installed.
  • the first application 1011 can serve as an initiator of the deep link request for requesting a link to the second application 1013.
  • the first application 1011 can be a plurality of types of applications, such as a browser application or an instant messaging application.
  • the second application 1013 can be a plurality of types of applications, such as a shopping application or a multimedia playback application.
  • the second application 1013 is an installation-free application.
  • the free-to-install application is a point-and-click application form that is executed through the installation-free application runtime environment.
  • the application running engine 1012 is free to install, providing an operating environment for the installation-free application.
  • the download server 102 is configured to provide a free application package of the second application 1013.
  • Embodiments of the present invention provide a method for browsing an application page.
  • the first application 1011 on the terminal 101 receives a first request to access the second application; the first application 1011 sends a second request to the installation-free application running engine 1012 on the terminal, the second request is used to request access a second application, the second request carries an identifier of the second application 1013, the second application 1013 is an installation-free application and is not installed on the terminal 101; and the installation-free application running engine 1012 is from a download server Obtaining the installation-free application package of the second application 1013; the maintenance-free application execution engine 1012 loads and runs the installation-free application package of the second application 1013; and the second application 1013 displays the second application The page of the app.
  • the first application 1011 on the terminal 101 receives the first request for accessing the second application
  • the second application 1013 is an installation-free application and is not installed on the terminal 101.
  • the first application 1011 notifies the installation-free application running engine 1012 of the identifier of the second application
  • the free-install application running engine 1012 loads and runs the free application of the second application 1013.
  • the package displays the page of the second application by the second application 1013, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • accessing the second application may include accessing a page of the second application.
  • the second request may further include a page path and an input parameter, and the second application 1013 may display the second application according to the page path and the input parameter carried in the second request, in addition to the identifier of the second application 1013.
  • Page Alternatively, the second request carries only the identifier of the second application 1013, does not carry a page path and input parameters, and the second application 1013 may display the page of the second application according to a default page path and an input parameter. .
  • the download address of the second application 1013 may be pre-stored on the terminal 101, and the terminal 101 determines whether the second application 1013 is legal. When the terminal 101 determines that the second application 1013 is legal, the download according to the second application 1013 is performed. The address obtains the free installation application package of the second application 1013 from the download server 102.
  • the system includes not only the terminal 101 and the download server 102 but also the policy server 103.
  • the first application 1011 and the installation-free application running engine 1012 are installed on the terminal 101, and the second application 1013 is not installed.
  • the first application 1011 can serve as an initiator of the deep link request for requesting a link to the second application 1013.
  • the first application 1011 can be a plurality of types of applications, such as a browser application or an instant messaging application.
  • the second application 1013 can be a plurality of types of applications, such as a shopping application or a multimedia playback application.
  • the second application 1013 is an installation-free application.
  • the free-to-install application is a point-and-click application form that is executed through the installation-free application runtime environment.
  • the application running engine 1012 is free to install, providing an operating environment for the installation-free application.
  • the download server 102 is configured to provide a free application package of the second application 1013.
  • the download address of the second application 1013 may not be pre-stored on the terminal 101, and the download-free application running engine 1012 needs to obtain the download address of the second application 1013 from the policy server 103.
  • the policy server 103 is configured to determine whether the second application 1013 is legal, and sends the second application 1013 legal indication information to the installation-free application running engine 1012 when determining that the second application 1013 is legal, and the second application 1013 is free of the installed application.
  • the download address of the package is sent to the Instant App Run Engine 1012, so that the Instant App Run Engine 1012 can obtain the Instant App Package of the second App 1013 from the download server 102 according to the download address of the second application 1013.
  • the terminal may also be referred to as a user equipment (UE), a terminal equipment (TE), a mobile station (MS), a mobile terminal (MT), a 5G user equipment, and the like.
  • the terminal device can be a mobile phone, a tablet, a computer with wireless transceiver function, a virtual reality (VR) terminal device, an augmented reality (AR) terminal device, and an industrial control (industrial control).
  • a wireless terminal, a wireless terminal in a smart city, a wireless terminal in a smart home, and the like are not limited in this application.
  • the terminal provided by the embodiment of the present invention includes: a radio frequency (English: Radio Frequency:: RF) circuit 110, a memory 120, an input unit 130, a display unit 140, a processor 150, and a power source 160 and a sensor 170.
  • RF Radio Frequency
  • the terminal structure shown in FIG. 3 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements.
  • the terminal provided by the embodiment of the present invention can be used to perform the method for browsing the application page provided by the following embodiments of the present invention.
  • the terminal provided by the embodiment of the present invention can be used to perform the method for browsing the application page provided by the following embodiments of the present invention.
  • the RF circuit 110 can be used to send and receive information, for example, to interact with devices such as servers, and to process the received information to the processor 150.
  • the RF circuit 110 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 110 can also communicate with the network and other devices via wireless communication.
  • wireless communication can adopt any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and code division. Multiple Division (English): Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Message Service (English) :Short Messaging Service, SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • code division Multiple Division (English): Code Division Multiple Access (
  • the memory 120 can be used to store software programs and modules, and the processor 150 causes the terminal to execute a method of browsing application pages by running software programs and modules stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system and an application required to implement a method of browsing an application page, and the like.
  • the storage data area can store an application's configuration file and the like.
  • the memory 120 may be a volatile memory, such as a random access memory (English: random-access memory, abbreviation: RAM); the memory 120 may also be a non-volatile memory (English: Non-volatile memory, such as read-only memory (English: read-only memory, abbreviation: ROM), flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid state drive (English) : solid-state drive, abbreviated: SSD); the memory 120 may also include a combination of the above types of memory.
  • RAM random access memory
  • the memory 120 may also be a non-volatile memory (English: Non-volatile memory, such as read-only memory (English: read-only memory, abbreviation: ROM), flash memory (English: flash memory), hard disk (English: hard disk drive, abbreviation: HDD) or solid state drive (English) : solid-state drive, abbreviated: SSD); the memory 120 may also include a combination of the above types of
  • the input unit 130 can be used to receive numeric or character information input by the user or operation information of the user clicking the application link.
  • the input unit 130 can include the touch panel 131 and other input devices 132.
  • the touch panel 131 also referred to as a touch screen, can collect touch operations on or near the user (such as a user using a finger, a stylus, or the like on the touch panel 131 or near the touch panel 131. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 131 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 150 is provided and can receive commands from the processor 150 and execute them.
  • the input unit 130 can implement the touch panel 131 by using various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 may also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 140 can be used to display information input by the user or information provided to the user, and the like.
  • the display unit 140 may include a display panel 141.
  • the display panel 141 may be configured in the form of a liquid crystal display (LCD) or an organic light-emitting diode (OLED).
  • the touch panel 131 can cover the display panel 141.
  • the touch panel 131 detects an operation of clicking an application link on or near the touch panel 131, it is transmitted to the processor 150 to determine that the application is a legitimate application, and then the processor 150
  • the visual output of the applied page is provided on the display panel 141 after a series of processing.
  • the touch panel 131 and the display panel 141 are used as two independent components to implement the input and output functions of the terminal in FIG. 3, in some embodiments, the touch panel 131 may be integrated with the display panel 141. Realize the input and output functions of the terminal.
  • the processor 150 is the control center of the terminal, and connects various parts of the entire terminal using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 120, and calling data stored in the memory 120, executing The way to browse the app page.
  • processor 150 may include one or more processing units.
  • the processor 150 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, etc., and the modem processor mainly processes wireless communication. It can be understood that the above modem processor may not be integrated into the processor 150.
  • the terminal also includes a power source 160 (such as a battery) that supplies power to the various components.
  • a power source 160 such as a battery
  • the power source can be logically coupled to the processor 150 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the terminal further includes a sensor 170.
  • the terminal may include one or more sensors. Only one sensor is shown as an example.
  • the terminal may include various types of sensors, which may be, but are not limited to, a pressure sensor, a distance sensor, an acceleration sensor, and a gyro sensor. , GPS sensor, direction sensor, temperature sensor, etc.
  • the terminal may further include a camera, a Bluetooth module, an audio circuit, a USB module, and the like, and details are not described herein again.
  • the method for browsing an application page may be implemented based on a deep link technology.
  • deep link technology is used to implement jumps between two installed applications on a terminal.
  • the first application receives the request for accessing the second application
  • the second application is installed on the terminal
  • the page of the second application is displayed by the second application according to the Uniform Resource Identifier (URI) corresponding to the request.
  • URI Uniform Resource Identifier
  • the Android application's deeplink technical solution needs to pre-configure the intent filter ⁇ intent-filter/> corresponding to the second application, when the first application receives the access to the second application.
  • the first application sends an intent Intent.
  • the URI corresponding to the Intent matches ⁇ intent-filter/>
  • the component corresponding to ⁇ intent-filter/> can respond to the request.
  • the web page jump link configuration can simply evoke the app from the web page by simply adding a link.
  • the URI usually contains one or more of an application identifier, a page path, and an input parameter.
  • the application that can receive the URI is automatically opened, and the input parameters can be received in the corresponding component for subsequent processing.
  • FIG. 4 is a schematic diagram of communication of a method for browsing an application page according to an embodiment of the present invention.
  • the method can be based on the system architecture shown in FIG. 1 or FIG. 2, and based on the terminal shown in FIG.
  • the method includes:
  • Step 401 The first application on the terminal receives the first request for accessing the second application.
  • the accessing the second application may include accessing a page of the second application.
  • the display panel 141 of the terminal displays a first application interface (ie, a page of the first application), the first application interface includes a search bar and/or a page link of the second application, when the first application passes the touch
  • the panel 131 receives an operation of inputting page information of the second application in the search bar or an operation of triggering a page link of the second application
  • the first application on the terminal receives a request to access the page of the second application.
  • FIG. 5 is a schematic diagram of a first application interface according to an embodiment of the present invention.
  • the first application interface 500 includes an icon 501 of the second application and a search bar 502, and the icon 501 can be linked to the page of the second application.
  • the first application on the terminal receives a request to access a page of the second application.
  • the search bar on the touch panel 131 to input the name of the second application
  • the first application on the terminal receives a request to access the page of the second application.
  • the first application may determine the URI according to the search term input in the search bar, or determine the URI corresponding to the page link of the second application according to the pre-configured page link of the second application, and may determine by analyzing the URI.
  • Step 402 The first application sends a second request to the installation-free application running engine on the terminal, where the second request is used to request access to the second application, and the second request carries the identifier of the second application.
  • the second application is an installation-free application and is not installed on the terminal.
  • the second request also carries a page path and/or input parameters.
  • the second request is an intent request (which may be simply referred to as an intent or an intent), and the first application sends an intent request to the installation-free application running engine on the terminal, where the intent request carries the second application.
  • intent request (which may be simply referred to as an intent or an intent)
  • the first application sends an intent request to the installation-free application running engine on the terminal, where the intent request carries the second application.
  • the first application starts the second application by sending an intent request, and when the intent request does not have a matching installed application, the intent request is received by the installation-free application running engine.
  • the javascript code in the first application sends an Intent using the Intent action mode of the android standard deeplink, and carries the identifier of the second application (also referred to as the package name of the second application), the page path, and the input parameters in the Intent.
  • the second request is an http request
  • the first application sends an http request to a firewall on the terminal, where the http request carries a uniform resource locator for positioning to the second application.
  • the http request carries a uniform resource locator for positioning to the second application.
  • URL uniform resource locator
  • the firewall determines that the URL matches a URL regular expression
  • the firewall sends the URL to the installation-free application running engine, and the URL carries an identifier of the second application .
  • the URL carries a page path and a parameter that is transmitted to the page, in addition to carrying the identifier of the second application, such as an application package name. It can be understood that if the URL does not carry a page path, then it will jump to the first application's home page.
  • the first application sends an http request
  • the http request is first intercepted by a firewall, and the firewall notifies the installation-free application running engine after determining that the URL for locating the second application matches the URL regular expression.
  • the identity of the second application is described, thereby providing an experience for other applications to launch an instant install application.
  • the firewall sends the URL to a system application on the terminal, the URL carries an identifier of the second application, and the system application sends the application to the installation-free application running engine.
  • the URL the URL carrying an identifier of the second application.
  • the firewall does not directly notify the identifier of the second application of the installation-free application running engine, but notifies the installation application running engine of the second application by the system application, thereby enhancing the controllability of the system.
  • the firewall does not send the URL directly to the installation-free application engine, but sends the URL to the mobile phone housekeeper through a system application (such as a framework), and then the mobile housekeeper sends the URL to the installation-free application engine.
  • Step 403 The installation-free application running engine acquires the installation-free application package of the second application from the download server.
  • the installation-free application running engine may first send the download address of the second application to the download server, and then receive the installation-free application package of the second application from the download server.
  • the no-install application runtime engine first sends the download address of the second application to the download server via the RF circuit 110, and then receives the second-application free-installation application package from the download server via the RF circuit 110.
  • the installation-free application running engine may perform integrity and legality verification on the received application-free application package, and then perform step 404 after the verification is passed, otherwise step 404 is not performed.
  • the identifier of the storage application and the download address of the application may be correspondingly stored in the memory 120 of the terminal.
  • the application-free running engine may obtain the second application from the memory 120 of the terminal according to the identifier of the second application. Download address.
  • the identifier of the storage application and the download address of the application may be correspondingly mapped in the policy server.
  • the application-free running engine may send the identifier of the second application to the policy server, where the application is not installed.
  • the running engine receives a download address of the second application from the policy server.
  • step 403 the legality of the first application and/or the second application may be determined first.
  • the free installation application running engine obtains the free application package of the second application from the download server, and the free application running engine Sending, to the policy server, the identifier of the second application, so that the policy server determines that the second application is legal according to the identifier of the second application; and the free installation application running engine receives the first 2. Apply legal indication information.
  • the installation-free application running engine first determines that the second application is legal, and then obtains the installation-free application package of the second application from the download server, so as to provide the experience of the other application to start the installation-free application. To ensure that the installation-free application is legal.
  • the policy server determines that the identifier of the second application belongs to the identifier list of the legal application, it is determined that the second application is legal.
  • the free installation application running engine obtains the free application package of the second application from the download server, and the free application running engine Sending, to the policy server, the signature of the first application, so that the policy server determines that the first application is legal according to the signature of the first application; and the free installation application running engine receives the first from the policy server A legal indication is applied.
  • the installation-free application running engine first determines that the first application is legal, and then obtains the installation-free application package of the second application from the download server, so as to provide the experience of the other application to start the installation-free application. To ensure that the other application is legal.
  • the first application sends an identifier of the second application, the page path, the input parameter, a timestamp, a random number, and the first application to the installation-free application running engine on the terminal.
  • the signature generated by the private key to perform signature calculation on the identifier of the second application, the page path, the input parameter, the timestamp, and the random number.
  • the policy server checks the signature to verify whether the first application is legal. When the verification succeeds, the address of the second application is sent to the installation-free application running engine, otherwise the address of the second application is not sent.
  • the terminal may verify whether the first application is legal according to its own capabilities.
  • the firewall first determines that the identifier of the first application belongs to the first identifier set, and then determines that the URL matches the URL regular expression.
  • the first identifier set may be a list of package names of the request source. According to this embodiment, the legitimacy of the first application (ie, the caller) can be verified to ensure that the legitimate caller invokes the installation-free application execution engine.
  • the system application on the terminal first obtains the first identifier set and the URL regular expression from a policy server, and the system application sends the first identifier set to the firewall. And the URL regular expression, and then the firewall determines that the identifier of the first application belongs to the first identifier set.
  • the system application may obtain an interception matching policy from the policy server, where the interception matching policy includes the first identifier set and the URL regular expression. According to this embodiment, a manner in which a firewall acquires the first identity set and the URL regular expression is provided.
  • Step 404 The installation-free application running engine loads and runs the installation-free application package of the second application; the second application displays a page of the second application.
  • the second application displays the page of the second application according to the page path and/or the input parameter.
  • the Instant App Run Engine loads and runs the Instant App package of the second app, displaying the page of the second app on the display panel 141 according to the page path and input parameters.
  • FIG. 6 is a schematic diagram of a user interface change according to an embodiment of the present invention.
  • 6(a) is a user interface of the terminal before the first application on the terminal of step 401 receives the request to access the page of the second application, and the terminal displays the page of the first application.
  • FIG. 6(b) is a user interface of the terminal after the first application on the terminal of step 401 receives the request to access the page of the second application, and the terminal 404 is not executed, and the terminal displays the page of the second application through the first application.
  • FIG. 6(c) is a user interface of the terminal when the execution of step 404 is completed, and the terminal displays the page of the second application through the second application.
  • FIG. 7 is a schematic diagram of another user interface change according to an embodiment of the present invention. It can be understood that, in step 402, when the first application determines that the second application is not installed on the terminal, the dialog box 701 may be popped up, and the dialog box 701 displays prompt information that the second application is not installed on the terminal. And requesting the user to confirm whether the second application is installed, and when receiving the instruction that the user confirms to install the second application, the first application sends the identifier of the second application to the installation-free application running engine on the terminal. The page path and the input parameters.
  • the first application on the terminal receives a first request for accessing a page of the second application, where the second application is an installation-free application and is not installed on the terminal.
  • the first application notifies the installation-free application running engine of the identifier of the second application, and the free-install application running engine loads and runs the second-installed application-free application package.
  • the second application displays the page of the second application, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • FIG. 8 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • the method can be based on the system architecture shown in FIG. 2 and the terminal shown in FIG. 3, and the policy server verifies the legitimacy of the second application.
  • the method is implemented using deeplink technology, and the method includes:
  • Step 801 The browser application on the terminal receives a request for accessing a page of the second application, where the request includes an identifier, a page path, and an input parameter of the second application for accessing the second application.
  • Step 802 When the browser application determines that the second application is not installed on the terminal, the browser application sends the identifier of the second application, the page path, and the installation-free application running engine on the terminal. The input parameters.
  • Step 803 The installation-free application running engine sends the identifier of the second application to the policy server.
  • Step 804 The policy server determines that the identifier of the second application belongs to the identifier list of the legal application, and sends the download address of the second application to the installation-free application running engine.
  • the download address of the second application is not sent to the installation-free application running engine, but the The installation application runtime engine sends a notification message for notifying that the second application is not a legitimate application. At this time, the application jump cannot be implemented, and the terminal displays the page of the second application through the first application.
  • FIG. 9 is a schematic diagram of another user interface change according to an embodiment of the present invention. It can be understood that when the above-mentioned notification message is received by the application-free running engine, the dialog box 901 may be displayed, and the dialog box 901 displays the prompt information that the second application is not a legal application and cannot install the second application.
  • Step 805 The installation-free application running engine sends the download address of the second application to the download server, and receives the installation-free application package of the second application from the download server.
  • Step 806 The installation-free application running engine loads and runs the free-installation application package of the second application; the second application displays the page of the second application according to the page path and the input parameter.
  • the step 801 is the same as the step 401 in the embodiment shown in FIG. 4, and the step 802 is the same as the step 402 in the embodiment shown in FIG. 4.
  • the step 805 is the same as the step 403 in the embodiment shown in FIG. 806 is the same as step 404 in the embodiment shown in FIG. 4, and details are not described herein.
  • the validity of the second application may be verified by the policy server. If the second application is legal, the installation-free application running engine can obtain the download address of the second application, otherwise the download address of the second application cannot be obtained, and the Installing an application run engine can only run legitimate, free-to-install applications.
  • FIG. 10 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • the method may be based on the system architecture shown in FIG. 2 and the terminal shown in FIG. 3, and the policy server verifies the legitimacy of the second application (ie, the installation-free application) and the legitimacy of the first application (ie, the browser application).
  • the method is implemented using deeplink technology, and the method includes:
  • Step 1001 The browser application on the terminal receives a request for accessing a page of the second application, where the request includes an identifier of the second application, a page path, and an input parameter.
  • Step 1002 When the browser application determines that the second application is not installed on the terminal, use the private key of the browser application to identify the second application, the page path, the input parameter, and a timestamp. The random number is used for signature calculation to generate a signature.
  • the original data and the signature calculation method for performing signature calculation are not limited.
  • the signature of the second application may be used as the original data, and the original data may be signed and calculated to generate a signature.
  • Step 1003 The browser application sends an identifier of the second application, the page path, the input parameter, a timestamp, a random number, and a private use of the first application to an installation-free application running engine on the terminal.
  • the signature generated by the key to perform signature calculation on the identifier of the second application, the page path, the input parameter, the timestamp, and the random number.
  • the javascript code in the browser application will use the Intent action mode of the android standard deeplink to send the Intent, and carry the content to be sent in the Intent.
  • Step 1004 The installation-free application running engine sends the identifier of the second application, the page path, the input parameter, the timestamp, the random number, and using the first application to the policy server.
  • the signature generated by the private key to perform signature calculation on the identifier of the second application, the page path, the input parameter, the timestamp, and the random number.
  • step 1003 and step 1004 are the same, but the sending manner can be different.
  • the Instant App Run Engine may transparently pass the content received at step 1003 to the Policy Server.
  • Step 1005 The policy server verifies the signature, and determines that the identifier of the second application belongs to the identifier list of the legal application.
  • the policy server uses the public key of the browser application to check the signature to determine whether the first application is legal. On the other hand, the policy server determines whether the identifier of the second application belongs to the identifier list of the legitimate application, to determine the first Whether the application is legal. When both the first application and the second application are legal, step 1006 is performed; otherwise, step 1006 is not performed.
  • step 1006 the policy server sends the download address of the second application to the installation-free application running engine.
  • step 1006 when at least one of the first application and the second application is not legal, step 1006 is not performed, but the policy server may send a notification message to the installation-free application running engine, where the notification message is used to notify the first application and At least one of the second applications is illegal.
  • FIG. 11 is a schematic diagram of another user interface change according to an embodiment of the present invention. It can be understood that when the above-mentioned notification message is received by the application-free running engine, the dialog box 1101 may be popped up, and the dialog box 1101 displays that the first application is not a prompt message that the legitimate application cannot invoke the second application.
  • Step 1007 The installation-free application running engine sends the download address of the second application to the download server, and receives the installation-free application package of the second application from the download server.
  • Step 1008 The installation-free application running engine loads and runs the free-installation application package of the second application; the second application displays the page of the second application according to the page path and the input parameter.
  • the above step 1001 is the same as step 401 in the embodiment shown in FIG. 4.
  • the above step 1007 is the same as step 403 in the embodiment shown in FIG. 4, and the above step 1008 is the same as step 404 in the embodiment shown in FIG. Do not repeat them.
  • the browser application not only sends the identifier of the second application, the page path and the input parameter to the installation-free application running engine, but also sends a signature generated by using the private key of the browser application;
  • the free installation application running engine not only sends the identifier of the second application, the page path and the input parameter to the policy server, but also sends a signature generated by using a private key of the browser application. .
  • the validity of the installation-free application (ie, the second application) can be verified not only by the policy server according to the identifier of the second application, but also by the policy server, according to the signature, the legality of the caller (ie, the first application) is
  • the installation-free application and the caller are both legal.
  • the installation-free application runtime engine can obtain the download address of the second application. Otherwise, the download address of the second application cannot be obtained, thereby ensuring that the application-free running engine can only run legitimate free installation applications, and Ensure that only legitimate callers can launch the Instant App Run Engine to run legitimate, free install apps.
  • FIG. 12 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • the method may be based on the system architecture shown in FIG. 2 and the terminal shown in FIG. 3, and the policy server transmits the interception matching policy to the firewall of the terminal, and the firewall determines whether the request sent by the first application (such as a browser application) is consistent. Intercept the matching strategy.
  • the method includes:
  • Step 1201 The system application on the terminal acquires an interception matching policy from the policy server.
  • the above system application can be, but is not limited to, an Android system application, for example, an iOS system application, a Linux system application, a Windows system application, or a Framework system application.
  • the Android system application sends a request message to the policy server, the request message is used to request to acquire an interception matching policy (including a first identity set and a Uniform Resource Locator (url) regular expression).
  • the policy server sends a response message to the Android system application, the response message including a first identity set and a URL regular expression.
  • the first identifier set may be a list of package names of the request source, and the list includes the package name of the legal application. For example: url regular expression: http://com.union.bac/*; application package name: com.union.app, com.we.app.
  • Step 1202 The system application sends the interception matching policy to the firewall.
  • the manner in which the system application sends the interception matching policy to the firewall may be in a general manner, and is not described herein.
  • Step 1203 The browser application on the terminal receives a request for accessing a page of the second application, where the request includes an identifier of the second application, a page path, and an input parameter.
  • the URI corresponding to the request is:
  • step 401 For details, refer to the description of step 401, and details are not described herein.
  • Step 1204 The browser application sends the identifier of the second application, the page path, and the input parameter to a firewall on the terminal.
  • the browser application starts the second application by sending an http request
  • the http request includes a url for accessing the second application
  • the url includes an identifier of the second application, the page path And the input parameters.
  • the firewall intercepts the http request.
  • step 1205 the firewall determines whether the request meets the interception matching policy.
  • the interception matching policy includes a first set of identities and a URL regular expression.
  • the firewall determines that the identity of the browser application belongs to the first set of identities, and the URL matches the URL regular expression.
  • the prompt information may be displayed on the user interface, where the prompt information is used to prompt the browser application that the application is not legitimate and cannot be jumped to the installation-free installation. application. At this time, the application jump cannot be implemented, and the terminal displays the page of the second application through the browser application.
  • FIG. 13 is a schematic diagram of another user interface change according to an embodiment of the present invention. It can be understood that when the firewall determines that the identifier of the browser application does not belong to the first identifier set, the dialog box 1301 may be popped up, and the dialog box 1301 displays that the browser application is not a prompt message that the legitimate application cannot invoke the second application.
  • the browser application is a legal application.
  • the second application is an installation-free application.
  • step 1206 is performed.
  • Step 1206 The firewall sends the identifier of the second application, the page path, and the input parameter to the installation-free application running engine.
  • step 1204 the browser application launches a second application by sending an http request, the http request including an identifier of the second application, the page path, and the input parameter.
  • the firewall intercepts the http request.
  • step 1206 the firewall forwards the http request.
  • Step 1207 The installation-free application running engine parses out the identifier of the second application, the page path, and the input parameter.
  • parsing can be in a general way, and will not be described here.
  • Step 1208 The installation-free application running engine sends the download address of the second application to the download server, and receives the installation-free application package of the second application from the download server.
  • Step 1209 The installation-free application running engine loads and runs the free-installation application package of the second application; the second application displays the page of the second application according to the page path and the input parameter.
  • step 1208 is the same as the step 403 in the embodiment shown in FIG. 4, and the above-mentioned step 1209 is the same as step 404 in the embodiment shown in FIG. 4, and details are not described herein.
  • the request sent by the browser on the terminal matches the interception matching policy, so that the request of the illegal source can be intercepted, the security is high, and unnecessary signaling can be reduced.
  • FIG. 14 is a schematic diagram of communication of another method for browsing an application page according to an embodiment of the present invention.
  • the method may be based on the system architecture shown in FIG. 2 and the terminal shown in FIG. 3, and the policy server transmits the interception matching policy to the firewall of the terminal, and the firewall determines whether the request sent by the first application (such as a browser application) is consistent.
  • the matching policy is intercepted, and the application running engine is invoked through the system application after determining that the matching matching policy is met.
  • the method includes:
  • Step 1401 The system application on the terminal acquires an interception matching policy from the policy server.
  • Step 1402 The system application sends the interception matching policy to the firewall.
  • Step 1403 The browser application on the terminal receives a request to access a page of the second application, where the request includes an identifier, a page path, and an input parameter of the second application for accessing the second application.
  • Step 1404 The browser application sends the identifier of the second application, the page path, and the input parameter to a firewall on the terminal.
  • step 1405 the firewall determines whether the request meets the interception matching policy.
  • the interception matching policy includes a first set of identities and a URL regular expression.
  • the firewall determines that the identity of the browser application belongs to the first set of identities, and the URL matches the URL regular expression.
  • Step 1406 The firewall sends the identifier of the second application, the page path, and the input parameter to a system application.
  • the browser application launches a second application by sending an http request, the http request including an identification of the second application, the page path, and the input parameter.
  • the firewall intercepts the http request.
  • the firewall forwards the http request.
  • Step 1407 The system application sends the identifier of the second application, the page path, and the input parameter to the installation-free application running engine.
  • step 1404 the browser application launches a second application by sending an http request, the http request including an identification of the second application, the page path, and the input parameter.
  • the firewall intercepts the http request.
  • step 1406 the firewall forwards the http request.
  • step 1407 the system application forwards the http request.
  • Step 1408 The installation-free application running engine parses the identifier of the second application, the page path, and the input parameter.
  • Step 1409 The installation-free application running engine sends the download address of the second application to the download server, and receives the installation-free application package of the second application from the download server.
  • Step 1410 The installation-free application running engine loads and runs the free-installation application package of the second application; the second application displays the page of the second application according to the page path and the input parameter.
  • the steps 1401 to 1405 are the same as the steps 1201 to 1205 in the embodiment shown in FIG. 12, and the steps 1408 to 1410 are the same as the steps 1207 to 1209 in the embodiment shown in FIG. 12, and details are not described herein.
  • the firewall does not directly send the identifier, page path, and input parameters of the second application to the installation-free application running engine, but indirectly transmits the identifier, page path, and input parameters of the second application through the system application, thereby enhancing the system. Controllability.
  • the second application can still be started and run.
  • each network element such as a terminal, a server, etc.
  • each network element includes hardware structures and/or software modules corresponding to the execution of the respective functions.
  • the present invention can be implemented in a combination of hardware or hardware and computer software in combination with the elements and algorithm steps of the various examples described in the embodiments disclosed herein. Whether a function is implemented in hardware or computer software to drive hardware depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods for implementing the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present invention.
  • the embodiment of the present invention may divide a function module into a terminal, a server, and the like according to the foregoing method example.
  • each function module may be divided according to each function, or two or more functions may be integrated into one processing module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules. It should be noted that the division of the module in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
  • FIG. 15 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure.
  • the terminal is used to perform a method for browsing an application page according to an embodiment of the present invention.
  • the terminal includes:
  • the processing unit 1501 is configured to receive, by the first application on the terminal, a first request for accessing the second application, where the first application sends a second request to the installation-free application running engine on the terminal, where the second request is used for Requesting to access the second application, where the second request carries an identifier of the second application, and the second application is an installation-free application and is not installed on the terminal;
  • the communication unit 1502 is configured to obtain, by the download-free application running engine, the free-installation application package of the second application from the download server;
  • the processing unit 1501 is further configured to: the free installation application running engine loads and runs the free application package of the second application;
  • the display unit 1503 is configured to display, by the second application, a page of the second application.
  • the second request is an intent request.
  • the communication unit 1502 before the communication unit 1502 is configured to obtain the installation-free application package of the second application from the download server, the communication unit 1502 is further configured to perform the free installation.
  • the application running engine sends an identifier of the second application to the policy server, so that the policy server determines that the second application is legal according to the identifier of the second application; and the free installation application running engine receives the policy from the policy server.
  • the second application is legal indication information.
  • the communication unit 1502 before the communication unit 1502 is configured to obtain the installation-free application package of the second application from the download server, the communication unit 1502 is further configured to perform the free installation. Sending, by the application running engine, the signature of the first application to the policy server, so that the policy server determines that the first application is legal according to the signature of the first application; and the free installation application running engine receives the policy from the policy server The first application is legal indication information.
  • the processing unit 1501 is configured to send, by the first application, a second request to the installation-free application running engine on the terminal, where the second request carries the identifier of the second application, including:
  • the first application sends an http request to the firewall on the terminal, where the http request carries a uniform resource locator URL for positioning to the second application;
  • the firewall determines that the URL matches a URL regular expression; the firewall sends the URL to the installation-free application running engine, the URL carrying an identifier of the second application.
  • the processing unit 1501 is configured to send, by the firewall, the URL of the second application to the installation-free application running engine, where the URL carries the identifier of the second application, including:
  • the system application sends the URL to the installation-free application running engine, and the URL carries an identifier of the second application.
  • the processing unit 1501 before the processing unit 1501 is configured to determine that the URL matches the URL regular expression, the processing unit 1501 is further configured to: determine, by the firewall, that the identifier of the first application belongs to A collection of logos.
  • the processing unit 1501 is configured to: before the firewall determines that the identifier of the first application belongs to the first identifier set, the processing unit 1501 is further configured to obtain, by the system application on the terminal, from the policy server. The first identification set and the URL regular expression; the system application sends the first identification set and the URL regular expression to the firewall.
  • the second request carries the identifier, the page path, and the input parameter of the second application; the display unit 1503 is specifically configured to display, according to the page path and the input parameter, the second application The page of the second application.
  • the processing unit 1501 is configured to receive, by the first application on the terminal, a first request for accessing the second application, where the second application is an installation-free application and is not installed on the terminal.
  • the first application notifies the installation-free application running engine of the identifier of the second application, and the free-install application running engine loads and runs the second-installed application-free application package.
  • the second application displays the page of the second application, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • the RF circuit 110 (which may also be referred to as a communication interface) in the terminal shown in FIG. 3 may correspond to the communication unit 1502 of the terminal in FIG. 15; the processor 150 shown in FIG. 3 may correspond to the processing unit in FIG. 1501;
  • the display unit 140 (which may also be referred to as a display screen) shown in FIG. 3 may correspond to the display unit 1503 in FIG. It will not be elaborated here.
  • the memory 120 is configured to store program instructions.
  • the processor 150 is configured to execute program instructions stored in the memory 120 to cause the terminal to perform the following operations:
  • the first application on the terminal receives a first request to access the second application
  • the first application sends a second request to the installation-free application running engine on the terminal, the second request is used to request access to the second application, and the second request carries an identifier of the second application,
  • the second application is an installation-free application and is not installed on the terminal;
  • the free installation application running engine acquires the installation-free application package of the second application from the download server through the communication interface 110;
  • the maintenance-free application execution engine loads and runs the free-installation application package of the second application; the second application displays a page of the second application through the display screen 140.
  • the second request is an intent request.
  • the processor 150 before the processor 150 executes the operation of the installation-free application running engine to obtain the installation-free application package of the second application from the download server through the communication interface 110, the processor 150 further uses The following operations are performed according to the program instructions stored in the memory 120:
  • the installation-free application running engine receives the second application legal indication information from the policy server through the communication interface 110.
  • the processor 150 before the processor 150 executes the operation of the installation-free application running engine to obtain the installation-free application package of the second application from the download server through the communication interface 110, the processor 150 further uses The following operations are performed according to the program instructions stored in the memory 120:
  • the installation-free application running engine receives, by the communication interface 110, the indication information that the first application is legal from the policy server.
  • the processor 150 performs the operation that the first application sends a second request to the installation-free application running engine on the terminal, and the second request carries the identifier of the second application, including:
  • the first application sends an http request to the firewall on the terminal, where the http request carries a uniform resource locator URL for positioning to the second application;
  • the firewall determines that the URL matches a URL regular expression; the firewall sends the URL to the installation-free application running engine, the URL carrying an identifier of the second application.
  • the processor 150 performs the operation of the firewall to send the URL to the installation-free application running engine, where the URL carries the identifier of the second application, including:
  • the system application sends the URL to the installation-free application running engine, and the URL carries an identifier of the second application.
  • the processor 150 before the processor 150 performs the operation of the firewall to determine that the URL matches the URL regular expression, the processor 150 is further configured to perform the following operations according to the program instructions stored in the memory 120. :
  • the firewall determines that the identifier of the first application belongs to the first identifier set.
  • the processor 150 before the processor 150 performs the operation of the firewall to determine that the identifier of the first application belongs to the first identifier set, the processor 150 is further configured to execute according to the program instructions stored in the memory 120. The following operations:
  • the system application on the terminal acquires the first identifier set and the URL regular expression from the policy server by using the communication interface 110;
  • the system application sends the first set of identifiers and the URL regular expression to the firewall.
  • the second request carries an identifier, a page path, and an input parameter of the second application; the processor 150 is specifically configured to: pass, by the second application, according to the page path and the input parameter
  • the display screen 140 displays a page of the second application.
  • the processor 150 is configured to receive, by the first application on the terminal, a first request for accessing the second application, where the second application is an installation-free application and is not installed on the terminal.
  • the first application notifies the installation-free application running engine of the identifier of the second application, and the free-install application running engine loads and runs the second-installed application-free application package.
  • the second application displays the page of the second application, so that the application jump in a specific scenario can be implemented, and the user experience is good.
  • FIG. 16 is a schematic diagram of a communication apparatus according to an embodiment of the present disclosure.
  • the communication apparatus 1600 may be a chip, and the chip includes a processing unit and a communication unit.
  • the processing unit may be a processor 1610, which may be various types of processors as described above.
  • the communication unit may be, for example, an input/output interface 1620, a pin or a circuit, etc., and the communication unit may include or be coupled to a system bus.
  • the communication device further includes a storage unit, and the storage unit may be a memory 1630 inside the chip, such as a register, a cache, a random access memory (RAM), an EEPROM, or a FLASH.
  • RAM random access memory
  • EEPROM electrically erasable programmable read-only memory
  • the memory unit may also be a memory external to the chip, which may be various types of memory as described above.
  • the processor is coupled to the memory, and the processor can execute instructions stored in the memory to cause the communication device to perform the method illustrated in Figures 4, 8, 10, 12 or 14 above.
  • the present invention may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable medium to another computer readable medium, for example, the computer instructions can be wired from a website site, computer, server or data center (for example, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (eg, a solid state hard disk) or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明实施例涉及一种浏览应用页面的方法及终端。该方法包括:终端上的第一应用接收访问第二应用的第一请求;所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包;所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用显示所述第二应用的页面。本发明实施例,能够实现特定场景下的应用跳转,用户体验佳。

Description

一种浏览应用页面的方法及终端
本申请要求于2018年03月28日提交中国专利局、申请号为201810265838.1、申请名称为“一种免安装应用的deeplink方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及计算机领域,尤其涉及一种浏览应用(application,APP)页面的方法及终端。
背景技术
随着计算机技术的飞速发展,浏览应用页面的方法也逐渐多样化。
现有的第一种浏览应用页面的方法中,当终端上的第一应用接收到访问第二应用的请求时,通过第一应用显示该第二应用的页面。这种浏览应用页面的方法无法实现应用的自动跳转,当终端上的第一应用接收到访问第二应用的请求时,不管终端上是否安装了第二应用,均通过第一应用显示该第二应用的页面,用户体验不佳。
现有的第二种浏览应用页面的方法中,当终端上的第一应用接收到访问第二应用的请求时,若终端上安装了第二应用,则通过第二应用显示该第二应用的页面。这种浏览应用页面的方法虽然能够实现应用的自动跳转,但是前提是终端上安装了第二应用。当终端上的第一应用接收到访问第二应用的请求时,若终端上未安装第二应用,则仍需通过第一应用显示该第二应用的页面,用户体验不佳。
综上,现有技术的浏览应用页面的方法中,当终端上的第一应用接收到访问第二应用的请求时,若终端上未安装第二应用,针对这种特定场景,则通过第一应用显示该第二应用的页面,无法实现特定场景下的应用跳转,用户体验不佳。
发明内容
本发明实施例提供了一种浏览应用页面的方法及终端,能够实现特定场景下的应用跳转,用户体验佳。
第一方面,提供了一种浏览应用页面的方法。终端上的第一应用接收访问第二应用的第一请求;所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包;所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用显示所述第二应用的页面。
本发明实施例,终端上的第一应用接收访问第二应用的第一请求,所述第二应用为免安装应用且未在所述终端上安装。在该特定场景下,所述第一应用通知免安装应用运行引擎所述第二应用的标识,由所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包,由所述第二应用显示所述第二应用的页面,从而能够实现特定场景下的应用 跳转,用户体验佳。
在一种可能的实施方式中,所述第一应用向所述终端上的免安装应用运行引擎发送intent请求,所述intent请求携带所述第二应用的标识。根据该实施方式,所述第一应用发送intent请求,所述intent请求直接被免安装应用运行引擎接收,所述第一应用通过发送intent请求通知免安装应用运行引擎所述第二应用的标识。
在一种可能的实施方式中,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述免安装应用运行引擎向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第二应用合法的指示信息。根据该实施方式,所述免安装应用运行引擎先确定第二应用合法后,再从下载服务器获取所述第二应用的免安装应用程序包,从而在提供其他应用启动免安装应用的体验的同时,确保免安装应用合法。
在一种可能的实施方式中,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述免安装应用运行引擎向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第一应用合法的指示信息。根据该实施方式,所述免安装应用运行引擎先确定第一应用合法后,再从下载服务器获取所述第二应用的免安装应用程序包,从而在提供其他应用启动免安装应用的体验的同时,确保该其他应用合法。
在一种可能的实施方式中,所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符(uniform resource locator,URL);所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。根据该实施方式,所述第一应用发送http请求,所述http请求先被防火墙拦截,防火墙在确定用于定位到第二应用的URL与URL正则表达式相匹配后再通知免安装应用运行引擎所述第二应用的标识,从而提供了其他应用启动免安装应用的体验。
在一种可能的实施方式中,所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。根据该实施方式,防火墙不是直接通知免安装应用运行引擎所述第二应用的标识,而是通过系统应用通知免安装应用运行引擎所述第二应用的标识,从而增强系统的可控性。
在一种可能的实施方式中,所述防火墙先确定所述第一应用的标识属于第一标识集合,再确定所述URL与URL正则表达式相匹配。其中,第一标识集合可以为请求来源的包名列表。根据该实施方式,可以验证第一应用(即调用方)的合法性,确保合法的调用方调用免安装应用运行引擎。
在一种可能的实施方式中,所述终端上的系统应用先从策略服务器获取所述第一标识集合和所述URL正则表达式,所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式,然后所述防火墙再确定所述第一应用的标识属于第一标识集合。其中,系统应用可以从策略服务器获取拦截匹配策略,该拦截匹配策略中包括所述第一标识集合和所述URL正则表达式。根据该实施方式,提供了一种防火墙获取所述第一标识集合和所述URL正则表达式的方式。
在一种可能的实施方式中,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。根据该实施方式,第二应用可以根据所述页面路径和所述输入参数显示所述第二应用的页面,而不是显示所述第二应用的默认页面。
第二方面,本发明实施例提供了一种终端,该终端可以实现上述第一方面方法设计中所执行的功能,所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,该终端的结构中包括处理器,该处理器被配置为支持该终端执行上述第一方面方法中相应的功能。该终端还可以包括存储器,该存储器用于与处理器耦合,其保存该终端必要的程序指令和数据。该终端还可以包括通信接口,该通信接口用于发送或接收信息等。该终端还可以包括显示屏,该显示屏用于显示应用的页面等。
第三方面,本发明实施例提供了一种通信装置,该通信装置可以例如是芯片,该通信装置可以设置于终端中,该通信装置包括处理器和接口。该处理器被配置为支持该通信装置执行上述第一方面方法中相应的功能。该接口用于支持该通信装置与其他通信装置或其他网元之间的通信。该通信装置还可以包括存储器,该存储器用于与处理器耦合,其保存该通信装置必要的程序指令和数据。
第四方面,本发明实施例提供了一种计算机存储介质,所述计算机存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述第一方面或第一方面的任意一种可能的设计中所述的方法。
第五方面,本发明实施例提供了一种计算机程序产品,其包含指令,当所述程序被计算机所执行时,该指令使得计算机执行上述第一方面或第一方面的任意一种可能的设计中所述的方法。
第六方面,本发明实施例提供了一种计算机程序,其包含指令,当所述程序被计算机所执行时,该指令使得计算机执行上述第一方面或第一方面的任意一种可能的设计中所述的方法。
本发明实施例,终端上的第一应用接收访问第二应用的第一请求,所述第二应用为免安装应用且未在所述终端上安装。在该特定场景下,所述第一应用通知免安装应用运行引擎所述第二应用的标识,由所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包,由所述第二应用显示所述第二应用的页面,从而能够实现特定场景下的应用跳转,用户体验佳。
附图说明
图1为本发明实施例提供的浏览应用页面的方法所基于的一种系统架构示意图;
图2为本发明实施例提供的浏览应用页面的方法所基于的另一种系统架构示意图;
图3为本发明实施例提供的一种终端的结构示意图;
图4为本发明实施例提供的一种浏览应用页面的方法的通信示意图;
图5为本发明实施例提供的一种第一应用界面示意图;
图6为本发明实施例提供的一种用户界面变化示意图;
图7为本发明实施例提供的另一种用户界面变化示意图;
图8为本发明实施例提供的另一种浏览应用页面的方法的通信示意图;
图9为本发明实施例提供的另一种用户界面变化示意图;
图10为本发明实施例提供的另一种浏览应用页面的方法的通信示意图;
图11为本发明实施例提供的另一种用户界面变化示意图;
图12为本发明实施例提供的另一种浏览应用页面的方法的通信示意图;
图13为本发明实施例提供的另一种用户界面变化示意图;
图14为本发明实施例提供的另一种浏览应用页面的方法的通信示意图;
图15为本发明实施例提供的另一种终端的结构示意图;
图16为本申请实施例提供的一种通信装置示意图。
具体实施方式
图1为本发明实施例提供的浏览应用页面的方法所基于的一种系统架构示意图。本发明实施例可以但不限于基于深度链接(deeplink)技术实现。参照图1,该系统包括终端101和下载服务器102。其中,终端101上已安装第一应用1011和免安装应用运行引擎1012,未安装第二应用1013。第一应用1011可作为深度链接请求的发起方,用于请求链接到第二应用1013。第一应用1011可以为多种类型的应用,例如浏览器应用或即时通信应用。第二应用1013可以为多种类型的应用,例如购物应用或多媒体播放应用。第二应用1013为免安装应用。免安装应用是一种即点即用的应用形态,通过免安装应用运行环境执行。免安装应用运行引擎1012,提供免安装应用的运行环境。下载服务器102,用于提供第二应用1013的免安装应用程序包。
本发明实施例提供了一种浏览应用页面的方法。终端101上的第一应用1011接收访问第二应用的第一请求;所述第一应用1011向所述终端上的免安装应用运行引擎1012发送第二请求,所述第二请求用于请求访问第二应用,所述第二请求携带所述第二应用1013的标识,所述第二应用1013为免安装应用且未在所述终端101上安装;所述免安装应用运行引擎1012从下载服务器102获取所述第二应用1013的免安装应用程序包;所述免安装应用运行引擎1012加载并运行所述第二应用1013的免安装应用程序包;所述第二应用1013显示所述第二应用的页面。
本发明实施例,终端101上的第一应用1011接收访问第二应用的第一请求,所述第二应用1013为免安装应用且未在所述终端101上安装。在该特定场景下,所述第一应用1011通知免安装应用运行引擎1012所述第二应用的标识,由所述免安装应用运行引擎1012加载并运行所述第二应用1013的免安装应用程序包,由所述第二应用1013显示所述第二应用的页面,从而能够实现特定场景下的应用跳转,用户体验佳。
需要说明的是,访问第二应用可以包括访问第二应用的页面。所述第二请求除了携带所述第二应用1013的标识,还可以携带页面路径和输入参数,所述第二应用1013可以根据第二请求中携带的页面路径和输入参数显示所述第二应用的页面。或者,所述第二请求中仅携带所述第二应用1013的标识,未携带页面路径和输入参数,所述第二应用1013可以根据默认的页面路径和输入参数显示所述第二应用的页面。
此外,在一个示例中,终端101上可以预先存储第二应用1013的下载地址,由终端101判断第二应用1013是否合法,当终端101确定第二应用1013合法时,根据第二应用 1013的下载地址从下载服务器102获取第二应用1013的免安装应用程序包。
图2为本发明实施例提供的浏览应用页面的方法所基于的另一种系统架构示意图。本发明实施例可以但不限于基于深度链接(deeplink)技术实现。参照图2,该系统不仅包括终端101和下载服务器102,还包括策略服务器103。其中,终端101上已安装第一应用1011和免安装应用运行引擎1012,未安装第二应用1013。第一应用1011可作为深度链接请求的发起方,用于请求链接到第二应用1013。第一应用1011可以为多种类型的应用,例如浏览器应用或即时通信应用。第二应用1013可以为多种类型的应用,例如购物应用或多媒体播放应用。第二应用1013为免安装应用。免安装应用是一种即点即用的应用形态,通过免安装应用运行环境执行。免安装应用运行引擎1012,提供免安装应用的运行环境。下载服务器102,用于提供第二应用1013的免安装应用程序包。
在一个示例中,终端101上可以不预先存储第二应用1013的下载地址,免安装应用运行引擎1012需要从策略服务器103获取第二应用1013的下载地址。策略服务器103用于判断第二应用1013是否合法,并在确定第二应用1013合法时向免安装应用运行引擎1012发送第二应用1013合法的指示信息,以及将第二应用1013的免安装应用程序包的下载地址发送给免安装应用运行引擎1012,以使免安装应用运行引擎1012可以根据第二应用1013的下载地址从下载服务器102获取第二应用1013的免安装应用程序包。
终端也可以称为用户设备(user equipment,UE)、终端设备(Terminal equipment,TE)、移动台(mobile station,MS)、移动终端(mobile terminal,MT)、5G用户设备等。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(Virtual Reality,VR)终端设备、增强现实(Augmented Reality,AR)终端设备、工业控制(industrial control)中的无线终端、无人驾驶(self-driving)中的无线终端、远程手术(remote medical surgery)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端等等,本申请对此不做限定。
参见图3,本发明实施例提供的终端包括:射频(英文:Radio Frequency,:RF)电路110、存储器120、输入单元130、显示单元140、处理器150、以及电源160和传感器170等部件。本领域技术人员可以理解,图3示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
本发明实施例提供的终端,可用于执行本发明以下实施例提供的浏览应用页面的方法,相应的特征和描述可参见下述方法相关的内容,此实施例不再赘述。
下面结合图3对终端的各个构成部件进行具体的介绍:
RF电路110可用于收发信息,例如,与服务器等设备进行信息交互,并将接收到的信息给处理器150处理。通常,RF电路110包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(英文:Low Noise Amplifier,LNA)、双工器等。此外,RF电路110还可以通过无线通信与网络和其他设备进行通信。其中,无线通信可以采用任一通信标准或协议,包括但不限于全球移动通讯系统(英文:Global System of Mobile communication,GSM)、通用分组无线服务(英文:General Packet Radio Service,GPRS)、码分多址(英文:Code Division Multiple Access,CDMA)、宽带码分多址(英文:Wideband Code Division Multiple Access,WCDMA)、长期演进(英文:Long Term Evolution,LTE)、 电子邮件、短消息服务(英文:Short Messaging Service,SMS)等。
存储器120可用于存储软件程序以及模块,处理器150通过运行存储在存储器120的软件程序以及模块,从而使得该终端执行浏览应用页面的方法。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统以及实现浏览应用页面的方法所需的应用程序等。存储数据区可存储应用的配置文件等。此外,存储器120可以为易失性存储器(英文:volatile memory),例如随机存取存储器(英文:random-access memory,缩写:RAM);所述存储器120也可以为非易失性存储器(英文:non-volatile memory),例如只读存储器(英文:read-only memory,缩写:ROM),快闪存储器(英文:flash memory),硬盘(英文:hard disk drive,缩写:HDD)或固态硬盘(英文:solid-state drive,缩写:SSD);所述存储器120还可以包括上述种类的存储器的组合。
输入单元130可用于接收用户输入的数字或字符信息或用户点击应用链接的操作信息,具体地,输入单元130可包括触控面板131以及其他输入设备132。触控面板131,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板131上或在触控面板131附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板131可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器150,并能接收处理器150发来的命令并加以执行。此外,输入单元130可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板131。除了触控面板131,输入单元130还可以包括其他输入设备132。具体地,其他输入设备132可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元140可用于显示用户输入的信息或提供给用户的信息等。显示单元140可包括显示面板141,可选的,可以采用液晶显示器(英文:Liquid Crystal Display,LCD)、有机发光二极管(英文:Organic Light-Emitting Diode,OLED)等形式来配置显示面板141。进一步的,触控面板131可覆盖显示面板141,当触控面板131检测到在其上或附近的点击应用链接的操作后,传送给处理器150以确定应用为合法的应用,随后处理器150经过一系列处理后在显示面板141上提供应用的页面的视觉输出。虽然在图3中,触控面板131与显示面板141是作为两个独立的部件来实现终端的输入和输出功能,但是在某些实施例中,可以将触控面板131与显示面板141集成而实现终端的输入和输出功能。
处理器150是终端的控制中心,利用各种接口和线路连接整个终端的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行浏览应用页面的方法。可选的,处理器150可包括一个或多个处理单元。优选的,处理器150可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器150中。
终端还包括给各个部件供电的电源160(比如电池),优选的,电源可以通过电源管理系统与处理器150逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
终端还包括传感器170,终端可以包括一个或多个传感器,图中仅画出一个传感器作为示例,终端可以包括多种类型的传感器,可以但不限于压力传感器、距离传感器、加速度传感器、陀螺仪传感器、GPS传感器、方向传感器、温度传感器等。
尽管未示出,终端还可以包括摄像头、蓝牙模块、音频电路、USB模块等,在此不再赘述。
本发明实施例中,浏览应用页面的方法可以基于深度链接(deeplink)技术实现。下面对于深度链接技术进行简要说明。通常地,深度链接技术技术用于实现终端上两个已安装应用之间的跳转。当第一应用接收到访问第二应用的请求时,若终端上安装了第二应用,则根据该请求对应的统一资源标识符(UniformResourceIdentifier,URI)通过第二应用显示第二应用的页面。
安卓(Android)标准的deeplink技术方案,为了实现第一应用跳转到第二应用,需要预先配置第二应用对应的意图过滤器<intent-filter/>,当第一应用接收到访问第二应用的页面的请求时,第一应用发送意图Intent,当Intent对应的URI符合<intent-filter/>时,<intent-filter/>对应的组件可以响应该请求。例如,如果要实现可以接收浏览器应用发送的Intent的<intent-filter/>,就必须在配置<intent-filter/>时添加两项属性:<actionandroid:name="android.intent.action.VIEW"/>和<category android:name="android.intent.category.DEFAULT"/>。同时<intent-filter/>还必须能够接收特定的scheme,所以添加<data/>的属性,并指定scheme的名称。通常地,在AndroidManifest.xml文件中配置<intent-filter/>,例如,具体配置如下:
Figure PCTCN2018086140-appb-000001
web页面跳转链接配置只需简单地添加一个链接就可以实现从web页面唤起APP。例如,链接如下:open app with uri-scheme,URI为lkmedemo://com.huawei.hicloud/index?click_id=IEGyekes7,其中lkmedemo对应的就是<intent-filter/>中配置的scheme,这样操作系统通过URI就能找到应用和应用中相应的组件。URI中通常包含了应用标识、页面路径和输入参数中的一项或多项,例如,前述URI包含了应用标识scheme和输入参数query两部分,其中lkmedemo属于scheme部分,?click_id=IEGyekes7部分属于query部分,在query部分,可以添加一些参数。query部分的“?”是必须包含的。当用户点击该链接的时候会自动打开能接收该URI的应用, 并且可以在相应的组件中接收输入参数并进行后续处理。
图4为本发明实施例提供的一种浏览应用页面的方法的通信示意图。该方法可以基于图1或图2所示的系统架构,以及基于图3所示的终端。该方法包括:
步骤401,终端上的第一应用接收访问第二应用的第一请求。
其中,访问第二应用可以包括访问第二应用的页面。
在一个示例中,终端的显示面板141显示第一应用界面(即第一应用的页面),所述第一应用界面包括搜索栏和/或第二应用的页面链接,当第一应用通过触控面板131接收到在搜索栏输入第二应用的页面信息的操作或触发该第二应用的页面链接的操作时,终端上的第一应用接收到访问该第二应用的页面的请求。
图5为本发明实施例提供的一种第一应用界面示意图。如图5所示,第一应用界面500上包括第二应用的图标501和搜索栏502,该图标501能够链接到第二应用的页面,当用户点击触控面板131上的该图标501时,终端上的第一应用接收到访问该第二应用的页面的请求。或者,用户点击触控面板131上的搜索栏输入第二应用的名称时,终端上的第一应用接收到访问该第二应用的页面的请求。
本申请实施例中,第一应用可以根据搜索栏中输入的搜索词确定URI,或者,根据预先配置的第二应用的页面链接确定该第二应用的页面链接对应的URI,通过分析URI可以确定第二应用的标识、页面路径和输入参数。其中,第二应用的标识也可以称为第二应用的包名。例如第二应用的包名:com.eleme.cpp;页面路径:/home;输入参数:key1=value1&key2=value2。
步骤402,所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装。
可选地,第二请求还携带页面路径和/或输入参数。
在一个示例中,第二请求为intent请求(可简称为intent或Intent),所述第一应用向所述终端上的免安装应用运行引擎发送intent请求,所述intent请求携带所述第二应用的标识。
该示例中,所述第一应用通过发送intent请求的方式启动第二应用,当该intent请求没有匹配的已安装应用时,由免安装应用运行引擎接收该intent请求。
例如,第一应用中的javascript代码会采用android标准deeplink的Intent action模式发送Intent,在Intent中携带第二应用的标识(也称为第二应用的包名)、页面路径和输入参数。
以URI为fastapp://com.union.app/index?param1=value为例,Intent的具体格式可以如表一所示:
Figure PCTCN2018086140-appb-000002
Figure PCTCN2018086140-appb-000003
表一
在另一个示例中,所述第二请求为http请求,所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符(uniform resource locator,URL);所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。可选地,所述URL除了携带第二应用的标识(如应用包名)外,还携带页面路径和传给此页面的参数。可以理解的是,如果所述URL不携带页面路径,那么就会跳转到第二应用的首页。
该示例中,所述第一应用发送http请求,所述http请求先被防火墙拦截,防火墙在确定用于定位到第二应用的URL与URL正则表达式相匹配后再通知免安装应用运行引擎所述第二应用的标识,从而提供了其他应用启动免安装应用的体验。
在一种可能的实施方式中,所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。根据该实施方式,防火墙不是直接通知免安装应用运行引擎所述第二应用的标识,而是通过系统应用通知免安装应用运行引擎所述第二应用的标识,从而增强系统的可控性。例如,防火墙不是将所述URL直接发给免安装应用引擎,而是通过系统应用(如framework)将所述URL发送给手机管家,然后手机管家再将所述URL发送给免安装应用引擎。
步骤403,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包。
可以理解的是,免安装应用运行引擎可以先向下载服务器发送所述第二应用的下载地址,然后从所述下载服务器接收所述第二应用的免安装应用程序包。
在一个示例中,免安装应用运行引擎通过RF电路110先向下载服务器发送第二应用的下载地址,然后通过RF电路110从下载服务器接收第二应用的免安装应用程序包。
在一个示例中,免安装应用运行引擎可以对接收到的免安装应用程序包进行完整性和合法性校验,校验通过后再执行步骤404,否则不执行步骤404。
在一个示例中,终端的存储器120中可以预先对应存储应用的标识与应用的下载地址,在步骤402之后,免安装应用运行引擎可以根据第二应用的标识从终端的存储器120中获取第二应用的下载地址。
在另一个示例中,策略服务器中可以预先对应存储应用的标识与应用的下载地址,在步骤402之后,免安装应用运行引擎可以向策略服务器发送所述第二应用的标识,所述免安装应用运行引擎从所述策略服务器接收所述第二应用的下载地址。
需要说明的是,在步骤403之前,可以先确定第一应用和/或第二应用的合法性。
当上述第二请求为intent请求时,在一种可能的实施方式中,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述免安装应用运行引擎向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第二应用合法的 指示信息。根据该实施方式,所述免安装应用运行引擎先确定第二应用合法后,再从下载服务器获取所述第二应用的免安装应用程序包,从而在提供其他应用启动免安装应用的体验的同时,确保免安装应用合法。
例如,当所述策略服务器确定所述第二应用的标识属于合法应用的标识列表时,确定所述第二应用合法。
当上述第二请求为intent请求时,在一种可能的实施方式中,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述免安装应用运行引擎向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第一应用合法的指示信息。根据该实施方式,所述免安装应用运行引擎先确定第一应用合法后,再从下载服务器获取所述第二应用的免安装应用程序包,从而在提供其他应用启动免安装应用的体验的同时,确保该其他应用合法。
例如,所述第一应用向所述终端上的免安装应用运行引擎发送所述第二应用的标识、所述页面路径、所述输入参数、时间戳、随机数和利用所述第一应用的私钥对所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数进行签名计算生成的签名。所述免安装应用运行引擎向所述策略服务器发送所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数和利用所述第一应用的私钥对所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数进行签名计算生成的签名。以使策略服务器对上述签名进行校验,以验证第一应用是否合法,当校验成功时向免安装应用运行引擎发送第二应用的地址,否则不发送第二应用的地址。
当上述第二请求为http请求时,终端可以结合自身能力校验第一应用是否合法。
在一种可能的实施方式中,所述防火墙先确定所述第一应用的标识属于第一标识集合,再确定所述URL与URL正则表达式相匹配。其中,第一标识集合可以为请求来源的包名列表。根据该实施方式,可以验证第一应用(即调用方)的合法性,确保合法的调用方调用免安装应用运行引擎。
在一种可能的实施方式中,所述终端上的系统应用先从策略服务器获取所述第一标识集合和所述URL正则表达式,所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式,然后所述防火墙再确定所述第一应用的标识属于第一标识集合。其中,系统应用可以从策略服务器获取拦截匹配策略,该拦截匹配策略中包括所述第一标识集合和所述URL正则表达式。根据该实施方式,提供了一种防火墙获取所述第一标识集合和所述URL正则表达式的方式。
步骤404,所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用显示所述第二应用的页面。
可以理解的是,当第二请求还携带页面路径和/或输入参数时,所述第二应用根据所述页面路径和/或所述输入参数显示所述第二应用的页面。
在一个示例中,免安装应用运行引擎加载并运行第二应用的免安装应用程序包,根据页面路径和输入参数在显示面板141上显示第二应用的页面。
图6为本发明实施例提供的一种用户界面变化示意图。图6(a)为步骤401终端上的第一应用接收访问第二应用的页面的请求之前终端的用户界面,此时终端显示的为第一 应用的页面。图6(b)为步骤401终端上的第一应用接收访问第二应用的页面的请求之后且步骤404未执行完成时终端的用户界面,此时终端通过第一应用显示第二应用的页面。图6(c)为步骤404执行完成时终端的用户界面,此时终端通过第二应用显示第二应用的页面。
图7为本发明实施例提供的另一种用户界面变化示意图。可以理解的是,步骤402中,第一应用确定所述终端上未安装所述第二应用时,可以弹出对话框701,该对话框701中显示终端上未安装所述第二应用的提示信息,并请求用户确认是否安装第二应用,当接收到用户确认安装第二应用的指令时,所述第一应用向所述终端上的免安装应用运行引擎发送所述第二应用的标识、所述页面路径和所述输入参数。
本发明实施例,终端上的第一应用接收访问第二应用的页面的第一请求,所述第二应用为免安装应用且未在所述终端上安装。在该特定场景下,所述第一应用通知免安装应用运行引擎所述第二应用的标识,由所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包,由所述第二应用显示所述第二应用的页面,从而能够实现特定场景下的应用跳转,用户体验佳。
下面以第一应用为浏览器应用为例,从浏览器应用和免安装应用运行引擎交互的角度来提供如下实施例。
图8为本发明实施例提供的另一种浏览应用页面的方法的通信示意图。该方法可以基于图2所示的系统架构和图3所示的终端,并且由策略服务器校验第二应用的合法性。该方法使用deeplink技术实现,该方法包括:
步骤801,终端上的浏览器应用接收访问第二应用的页面的请求,所述请求包括用于访问所述第二应用的第二应用的标识、页面路径和输入参数。
步骤802,浏览器应用确定所述终端上未安装所述第二应用时,所述浏览器应用向所述终端上的免安装应用运行引擎发送所述第二应用的标识、所述页面路径和所述输入参数。
步骤803,免安装应用运行引擎向策略服务器发送所述第二应用的标识。
步骤804,策略服务器确定所述第二应用的标识属于合法应用的标识列表,向所述免安装应用运行引擎发送所述第二应用的下载地址。
可以理解的是,当策略服务器确定所述第二应用的标识不属于合法应用的标识列表时,不向所述免安装应用运行引擎发送所述第二应用的下载地址,但是可以向所述免安装应用运行引擎发送通知消息,该通知消息用于通知第二应用不是合法应用。此时,无法实现应用跳转,终端通过第一应用显示第二应用的页面。
图9为本发明实施例提供的另一种用户界面变化示意图。可以理解的是,当免安装应用运行引擎接收到上述通知消息时,可以弹出对话框901,该对话框901中显示第二应用不是合法应用无法安装第二应用的提示信息。
步骤805,免安装应用运行引擎向下载服务器发送所述第二应用的下载地址;并从所述下载服务器接收所述第二应用的免安装应用程序包。
步骤806,免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
上述步骤801与图4所示实施例中的步骤401相同,上述步骤802与图4所示实施例中的步骤402相同,上述步骤805与图4所示实施例中的步骤403相同,上述步骤806 与图4所示实施例中的步骤404相同,在此不做赘述。
本发明实施例,可以由策略服务器校验第二应用的合法性,如果第二应用合法,免安装应用运行引擎能够获得第二应用的下载地址,否则无法获得第二应用的下载地址,确保免安装应用运行引擎只能运行合法的免安装应用。
图10为本发明实施例提供的另一种浏览应用页面的方法的通信示意图。该方法可以基于图2所示的系统架构和图3所示的终端,并且由策略服务器校验第二应用(即免安装应用)的合法性以及第一应用(即浏览器应用)的合法性。该方法使用deeplink技术实现,该方法包括:
步骤1001,终端上的浏览器应用接收访问第二应用的页面的请求,所述请求包括第二应用的标识、页面路径和输入参数。
步骤1002,浏览器应用确定所述终端上未安装所述第二应用时,利用所述浏览器应用的私钥对所述第二应用的标识、所述页面路径、所述输入参数、时间戳、随机数进行签名计算生成签名。
本发明实施例,对于进行签名计算的原数据和签名计算方法不做限定。例如,可以仅将第二应用的标识作为原数据,对该原数据进行签名计算生成签名。
步骤1003,浏览器应用向所述终端上的免安装应用运行引擎发送所述第二应用的标识、所述页面路径、所述输入参数、时间戳、随机数和利用所述第一应用的私钥对所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数进行签名计算生成的签名。
在一个示例中,浏览器应用中的javascript代码会采用android标准deeplink的Intent action模式发送Intent,在Intent中携带上述要发送的内容。
步骤1004,所述免安装应用运行引擎向所述策略服务器发送所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数和利用所述第一应用的私钥对所述第二应用的标识、所述页面路径、所述输入参数、所述时间戳、所述随机数进行签名计算生成的签名。
可以理解的是,步骤1003和步骤1004发送的内容相同,但是发送方式可以不同。在一个示例中,免安装应用运行引擎可以将步骤1003接收到的内容透传给策略服务器。
步骤1005,策略服务器对上述签名进行校验,并确定第二应用的标识属于合法应用的标识列表。
一方面,策略服务器使用浏览器应用的公钥对上述签名进行校验,以确定第一应用是否合法;另一方面,策略服务器确定第二应用的标识是否属于合法应用的标识列表,以确定第二应用是否合法。当第一应用和第二应用均合法时,执行步骤1006,否则不执行步骤1006。
步骤1006,策略服务器向免安装应用运行引擎发送第二应用的下载地址。
可以理解的是,当第一应用和第二应用至少有一个不合法时,则不执行步骤1006,但是策略服务器可以向免安装应用运行引擎发送通知消息,该通知消息用于通知第一应用和第二应用至少有一个不合法。
图11为本发明实施例提供的另一种用户界面变化示意图。可以理解的是,当免安装应用运行引擎接收到上述通知消息时,可以弹出对话框1101,该对话框1101中显示第一 应用不是合法应用无法调用第二应用的提示信息。
步骤1007,免安装应用运行引擎向下载服务器发送所述第二应用的下载地址;并从所述下载服务器接收所述第二应用的免安装应用程序包。
步骤1008,免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
上述步骤1001与图4所示实施例中的步骤401相同,上述步骤1007与图4所示实施例中的步骤403相同,上述步骤1008与图4所示实施例中的步骤404相同,在此不做赘述。
本发明实施例,浏览器应用不仅向免安装应用运行引擎发送所述第二应用的标识、所述页面路径和所述输入参数,还要发送利用所述浏览器应用的私钥生成的签名;相应地,所述免安装应用运行引擎不仅向所述策略服务器发送所述第二应用的标识、所述页面路径和所述输入参数,还要发送利用所述浏览器应用的私钥生成的签名。从而不仅可以由策略服务器根据第二应用的标识校验免安装应用(即第二应用)的合法性,还可以由策略服务器根据上述签名校验调用方(即第一应用)的合法性,当免安装应用和调用方均合法,免安装应用运行引擎能够获得第二应用的下载地址,否则无法获得第二应用的下载地址,从而确保免安装应用运行引擎只能运行合法的免安装应用,以及确保只有合法的调用方能够启动免安装应用运行引擎运行合法的免安装应用。
图12为本发明实施例提供的另一种浏览应用页面的方法的通信示意图。该方法可以基于图2所示的系统架构和图3所示的终端,并且由策略服务器将拦截匹配策略传递给终端的防火墙,由防火墙确定第一应用(如浏览器应用)发出的请求是否符合拦截匹配策略。该方法包括:
步骤1201,终端上的系统应用从策略服务器获取拦截匹配策略。
可以理解的是,上述系统应用可以但不限于为Android系统应用,例如,还可以为iOS系统应用、Linux系统应用、Windows系统应用或Framework系统应用。
在一个示例中,Android系统应用向策略服务器发送请求消息,该请求消息用于请求获取拦截匹配策略(包括第一标识集合和统一资源定位符(Uniform ResourceLocator,url)正则表达式)。策略服务器向Android系统应用发送响应消息,该响应消息包括第一标识集合和URL正则表达式。可以理解的是,上述第一标识集合可以为请求来源的包名列表,该列表中包括合法应用的包名。例如:url正则表达式:http://com.union.bac/*;应用的包名:com.union.app,com.we.app。
步骤1202,系统应用向防火墙发送所述拦截匹配策略。
其中,系统应用向防火墙发送所述拦截匹配策略的方式可以采用通用的方式,在此不做赘述。
步骤1203,终端上的浏览器应用接收访问第二应用的页面的请求,所述请求包括第二应用的标识、页面路径和输入参数。
例如,该请求对应的URI为:
http://com.union.com/fastapp?packageName=com.ele&path=urlencode(‘/index’)&query=urlencode(‘key1=value1&key2=value2’)
具体可以参见步骤401的描述,在此不做赘述。
步骤1204,浏览器应用向所述终端上的防火墙发送所述第二应用的标识、所述页面路径和所述输入参数。
在一个示例中,所述浏览器应用通过发送http请求的方式启动第二应用,该http请求包括用于访问第二应用的url,所述url包括所述第二应用的标识、所述页面路径和所述输入参数。防火墙拦截该http请求。
步骤1205,防火墙判断请求是否符合拦截匹配策略。
在一个示例中,拦截匹配策略包括第一标识集合和URL正则表达式。防火墙确定所述浏览器应用的标识属于第一标识集合,并且所述URL与URL正则表达式相匹配。
可以理解的是,当防火墙确定所述浏览器应用的标识不属于第一标识集合时,可以在用户界面上显示提示信息,该提示信息用于提示浏览器应用不是合法应用无法跳转到免安装应用。此时,无法实现应用跳转,终端通过浏览器应用显示第二应用的页面。
图13为本发明实施例提供的另一种用户界面变化示意图。可以理解的是,当防火墙确定所述浏览器应用的标识不属于第一标识集合时,可以弹出对话框1301,该对话框1301中显示浏览器应用不是合法应用无法调用第二应用的提示信息。
当所述浏览器应用的标识属于第一标识集合时,说明所述浏览器应用为合法应用。
当所述URL与URL正则表达式相匹配时,说明第二应用为免安装应用。
当所述浏览器应用的标识属于第一标识集合且所述URL与URL正则表达式相匹配时,执行如下步骤1206。
步骤1206,所述防火墙向所述免安装应用运行引擎发送所述第二应用的标识、所述页面路径和所述输入参数。
在一个示例中,步骤1204中,所述浏览器应用通过发送http请求的方式启动第二应用,该http请求包括所述第二应用的标识、所述页面路径和所述输入参数。防火墙拦截该http请求。步骤1206中,防火墙转发该http请求。
步骤1207,免安装应用运行引擎解析出所述第二应用的标识、所述页面路径和所述输入参数。
解析的方式可以采用通用的方式,在此不做赘述。
步骤1208,免安装应用运行引擎向下载服务器发送所述第二应用的下载地址;并从所述下载服务器接收所述第二应用的免安装应用程序包。
步骤1209,免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
上述步骤1208与图4所示实施例中的步骤403相同,上述步骤1209与图4所示实施例中的步骤404相同,在此不做赘述。
本发明实施例,通过终端上的防火墙对浏览器应用发出的请求与拦截匹配策略相匹配,从而可以拦截非法来源的调用请求,安全性高并且可以减少不必要的信令。
图14为本发明实施例提供的另一种浏览应用页面的方法的通信示意图。该方法可以基于图2所示的系统架构和图3所示的终端,并且由策略服务器将拦截匹配策略传递给终端的防火墙,由防火墙确定第一应用(如浏览器应用)发出的请求是否符合拦截匹配策略,并在确定出符合拦截匹配策略后通过系统应用调用免安装应用运行引擎。该方法包括:
步骤1401,终端上的系统应用从策略服务器获取拦截匹配策略。
步骤1402,系统应用向防火墙发送所述拦截匹配策略。
步骤1403,终端上的浏览器应用接收访问第二应用的页面的请求,所述请求包括用于访问所述第二应用的第二应用的标识、页面路径和输入参数。
步骤1404,浏览器应用向所述终端上的防火墙发送所述第二应用的标识、所述页面路径和所述输入参数。
步骤1405,防火墙判断请求是否符合拦截匹配策略。
在一个示例中,拦截匹配策略包括第一标识集合和URL正则表达式。防火墙确定所述浏览器应用的标识属于第一标识集合,并且所述URL与URL正则表达式相匹配。
步骤1406,所述防火墙向系统应用发送所述第二应用的标识、所述页面路径和所述输入参数。
在一个示例中,步骤1404中,所述浏览器应用通过发送http请求的方式启动第二应用,该http请求包括所述第二应用的标识、所述页面路径和所述输入参数。防火墙拦截该http请求。步骤1406中,防火墙转发该http请求。
步骤1407,系统应用向免安装应用运行引擎发送所述第二应用的标识、所述页面路径和所述输入参数。
在一个示例中,步骤1404中,所述浏览器应用通过发送http请求的方式启动第二应用,该http请求包括所述第二应用的标识、所述页面路径和所述输入参数。防火墙拦截该http请求。步骤1406中,防火墙转发该http请求。步骤1407中,系统应用转发该http请求。
步骤1408,免安装应用运行引擎解析出所述第二应用的标识、所述页面路径和所述输入参数。
步骤1409,免安装应用运行引擎向下载服务器发送所述第二应用的下载地址;并从所述下载服务器接收所述第二应用的免安装应用程序包。
步骤1410,免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
上述步骤1401至1405分别与图12所示实施例中的步骤1201至1205相同,上述步骤1408至1410分别与图12所示实施例中的步骤1207至1209相同,在此不做赘述。
本发明实施例,防火墙不是直接向免安装应用运行引擎发送第二应用的标识、页面路径和输入参数,而是通过系统应用间接传递第二应用的标识、页面路径和输入参数,从而增强系统的可控性。针对第一应用对标准的Android Deeplink Intent做了拦截的场景,仍然可以启动并运行第二应用。
上述主要从各个网元之间交互的角度对本发明实施例的方案进行了介绍。可以理解的是,各个网元,例如终端,服务器等为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,本发明能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
本发明实施例可以根据上述方法示例对终端、服务器等进行功能模块的划分,例如, 可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本发明实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
图15为本发明实施例提供的另一种终端的结构示意图,该终端用于执行本发明实施例提供的浏览应用页面的方法,相应的特征和描述可参见上述方法相关的内容,此实施例不再赘述。该终端包括:
处理单元1501,用于终端上的第一应用接收访问第二应用的第一请求;所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;
通信单元1502,用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包;
所述处理单元1501,还用于所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;
显示单元1503,用于所述第二应用显示所述第二应用的页面。
在一个示例中,所述第二请求为intent请求。
在一个示例中,在所述通信单元1502用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述通信单元1502,还用于所述免安装应用运行引擎向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第二应用合法的指示信息。
在一个示例中,在所述通信单元1502用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述通信单元1502,还用于所述免安装应用运行引擎向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第一应用合法的指示信息。
在一个示例中,所述处理单元1501用于所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求携带所述第二应用的标识,包括:
所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符URL;
所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
在一个示例中,所述处理单元1501用于所述防火墙向所述免安装应用运行引擎发送所述第二应用的URL,所述URL携带所述第二应用的标识,包括:
所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;
所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
在一个示例中,所述处理单元1501用于所述防火墙确定所述URL与URL正则表达式相匹配之前,所述处理单元1501,还用于所述防火墙确定所述第一应用的标识属于第一标识集合。
在一个示例中,所述处理单元1501用于所述防火墙确定所述第一应用的标识属于第一标识集合之前,所述处理单元1501,还用于所述终端上的系统应用从策略服务器获取所述第一标识集合和所述URL正则表达式;所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式。
在一个示例中,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述显示单元1503,具体用于所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
本发明实施例,处理单元1501用于终端上的第一应用接收访问第二应用的第一请求,所述第二应用为免安装应用且未在所述终端上安装。在该特定场景下,所述第一应用通知免安装应用运行引擎所述第二应用的标识,由所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包,由所述第二应用显示所述第二应用的页面,从而能够实现特定场景下的应用跳转,用户体验佳。
另外,图3所示的终端中的RF电路110(也可称为通信接口)可以对应于图15中终端的通信单元1502;图3所示的处理器150可以对应于图15中的处理单元1501;图3所示的显示单元140(也可称为显示屏)可以对应于图15中的显示单元1503。此处不再进行详细阐述。
基于图3所示的终端结构,所述存储器120,用于存储程序指令;
所述处理器150,用于执行所述存储器120中存储的程序指令以使得所述终端执行以下操作:
所述终端上的第一应用接收访问第二应用的第一请求;
所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;
所述免安装应用运行引擎通过所述通信接口110从下载服务器获取所述第二应用的免安装应用程序包;
所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用通过所述显示屏140显示所述第二应用的页面。
在一个示例中,所述第二请求为intent请求。
在一个示例中,所述处理器150执行所述免安装应用运行引擎通过所述通信接口110从下载服务器获取所述第二应用的免安装应用程序包的操作之前,所述处理器150还用于根据所述存储器120中存储的程序指令执行以下操作:
所述免安装应用运行引擎通过所述通信接口110向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;
所述免安装应用运行引擎通过所述通信接口110从所述策略服务器接收所述第二应用合法的指示信息。
在一个示例中,所述处理器150执行所述免安装应用运行引擎通过所述通信接口110 从下载服务器获取所述第二应用的免安装应用程序包的操作之前,所述处理器150还用于根据所述存储器120中存储的程序指令执行以下操作:
所述免安装应用运行引擎通过所述通信接口110向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;
所述免安装应用运行引擎通过所述通信接口110从所述策略服务器接收所述第一应用合法的指示信息。
在一个示例中,所述处理器150执行所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求携带所述第二应用的标识的操作,包括:
所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符URL;
所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
在一个示例中,所述处理器150执行所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识的操作,包括:
所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;
所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
在一个示例中,所述处理器150执行所述防火墙确定所述URL与URL正则表达式相匹配的操作之前,所述处理器150还用于根据所述存储器120中存储的程序指令执行以下操作:
所述防火墙确定所述第一应用的标识属于第一标识集合。
在一个示例中,所述处理器150执行所述防火墙确定所述第一应用的标识属于第一标识集合的操作之前,所述处理器150还用于根据所述存储器120中存储的程序指令执行以下操作:
所述终端上的系统应用通过所述通信接口110从策略服务器获取所述第一标识集合和所述URL正则表达式;
所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式。
在一个示例中,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述处理器150,具体用于所述第二应用根据所述页面路径和所述输入参数通过所述显示屏140显示所述第二应用的页面。
本发明实施例,处理器150用于终端上的第一应用接收访问第二应用的第一请求,所述第二应用为免安装应用且未在所述终端上安装。在该特定场景下,所述第一应用通知免安装应用运行引擎所述第二应用的标识,由所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包,由所述第二应用显示所述第二应用的页面,从而能够实现特定场景下的应用跳转,用户体验佳。
图16为本申请实施例提供的一种通信装置示意图,如图16所示,所述通信装置1600可以是芯片,所述芯片包括处理单元和通信单元。所述处理单元可以是处理器1610,所述处理器可以是前文所述的各种类型的处理器。所述通信单元例如可以是输入/输出接口1620、 管脚或电路等,所述通信单元可以包括系统总线或者与系统总线连接。可选地,所述通信装置还包括存储单元,所述存储单元可以是所述芯片内部的存储器1630,例如寄存器、缓存、随机存取存储器(random access memory,RAM)、EEPROM或者FLASH等;所述存储单元还可以是位于所述芯片外部的存储器,该存储器可以是前文所述的各种类型的存储器。处理器连接到存储器,该处理器可以运行存储器存储的指令,以使该通信装置执行上述图4、8、10、12或14所示的方法。
在上述各个本发明实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读介质向另一个计算机可读介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(digital subscriber line,DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如,固态硬盘)等。
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。

Claims (29)

  1. 一种浏览应用页面的方法,其特征在于,所述方法包括:
    终端上的第一应用接收访问第二应用的第一请求;
    所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;
    所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包;
    所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用显示所述第二应用的页面。
  2. 如权利要求1所述的方法,其特征在于,所述第二请求为intent请求。
  3. 如权利要求2所述的方法,其特征在于,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述方法还包括:
    所述免安装应用运行引擎向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;
    所述免安装应用运行引擎从所述策略服务器接收所述第二应用合法的指示信息。
  4. 如权利要求2所述的方法,其特征在于,所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述方法还包括:
    所述免安装应用运行引擎向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;
    所述免安装应用运行引擎从所述策略服务器接收所述第一应用合法的指示信息。
  5. 如权利要求1所述的方法,其特征在于,所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求携带所述第二应用的标识,包括:
    所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符URL;
    所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  6. 如权利要求5所述的方法,其特征在于,所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识,包括:
    所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;
    所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  7. 如权利要求5或6所述的方法,其特征在于,所述防火墙确定所述URL与URL正则表达式相匹配之前,所述方法还包括:
    所述防火墙确定所述第一应用的标识属于第一标识集合。
  8. 如权利要求7所述的方法,其特征在于,所述防火墙确定所述第一应用的标识属于第一标识集合之前,所述方法还包括:
    所述终端上的系统应用从策略服务器获取所述第一标识集合和所述URL正则表达式;
    所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式。
  9. 如权利要求1至8中任一项所述的方法,其特征在于,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
  10. 一种终端,其特征在于,所述终端包括:
    处理单元,用于终端上的第一应用接收访问第二应用的第一请求;所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;
    通信单元,用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包;
    所述处理单元,还用于所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;
    显示单元,用于所述第二应用显示所述第二应用的页面。
  11. 如权利要求10所述的终端,其特征在于,所述第二请求为intent请求。
  12. 如权利要求11所述的终端,其特征在于,在所述通信单元用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述通信单元,还用于所述免安装应用运行引擎向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第二应用合法的指示信息。
  13. 如权利要求11所述的终端,其特征在于,在所述通信单元用于所述免安装应用运行引擎从下载服务器获取所述第二应用的免安装应用程序包之前,所述通信单元,还用于所述免安装应用运行引擎向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;所述免安装应用运行引擎从所述策略服务器接收所述第一应用合法的指示信息。
  14. 如权利要求10所述的终端,其特征在于,所述处理单元用于所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求携带所述第二应用的标识,包括:
    所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符URL;
    所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  15. 如权利要求14所述的终端,其特征在于,所述处理单元用于所述防火墙向所述免安装应用运行引擎发送所述第二应用的URL,所述URL携带所述第二应用的标识,包括:
    所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;
    所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  16. 如权利要求14或15所述的终端,其特征在于,所述处理单元用于所述防火墙确 定所述URL与URL正则表达式相匹配之前,所述处理单元,还用于所述防火墙确定所述第一应用的标识属于第一标识集合。
  17. 如权利要求16所述的终端,其特征在于,所述处理单元用于所述防火墙确定所述第一应用的标识属于第一标识集合之前,所述处理单元,还用于所述终端上的系统应用从策略服务器获取所述第一标识集合和所述URL正则表达式;所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式。
  18. 如权利要求10至17中任一项所述的终端,其特征在于,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述显示单元,具体用于所述第二应用根据所述页面路径和所述输入参数显示所述第二应用的页面。
  19. 一种终端,其特征在于,所述终端包括:存储器、处理器、通信接口和显示屏;
    所述存储器,用于存储程序指令;
    所述处理器,用于根据所述存储器中存储的程序指令执行以下操作:
    所述终端上的第一应用接收访问第二应用的第一请求;
    所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求用于请求访问所述第二应用,所述第二请求携带所述第二应用的标识,所述第二应用为免安装应用且未在所述终端上安装;
    所述免安装应用运行引擎通过所述通信接口从下载服务器获取所述第二应用的免安装应用程序包;
    所述免安装应用运行引擎加载并运行所述第二应用的免安装应用程序包;所述第二应用通过所述显示屏显示所述第二应用的页面。
  20. 如权利要求19所述的终端,其特征在于,所述第二请求为intent请求。
  21. 如权利要求20所述的终端,其特征在于,所述处理器执行所述免安装应用运行引擎通过所述通信接口从下载服务器获取所述第二应用的免安装应用程序包的操作之前,所述处理器还用于根据所述存储器中存储的程序指令执行以下操作:
    所述免安装应用运行引擎通过所述通信接口向策略服务器发送所述第二应用的标识,以使所述策略服务器根据所述第二应用的标识确定所述第二应用合法;
    所述免安装应用运行引擎通过所述通信接口从所述策略服务器接收所述第二应用合法的指示信息。
  22. 如权利要求20所述的终端,其特征在于,所述处理器执行所述免安装应用运行引擎通过所述通信接口从下载服务器获取所述第二应用的免安装应用程序包的操作之前,所述处理器还用于根据所述存储器中存储的程序指令执行以下操作:
    所述免安装应用运行引擎通过所述通信接口向策略服务器发送所述第一应用的签名,以使所述策略服务器根据所述第一应用的签名确定所述第一应用合法;
    所述免安装应用运行引擎通过所述通信接口从所述策略服务器接收所述第一应用合法的指示信息。
  23. 如权利要求19所述的终端,其特征在于,所述处理器执行所述第一应用向所述终端上的免安装应用运行引擎发送第二请求,所述第二请求携带所述第二应用的标识的操作,包括:
    所述第一应用向所述终端上的防火墙发送http请求,所述http请求携带用于定位到所述第二应用的统一资源定位符URL;
    所述防火墙确定所述URL与URL正则表达式相匹配;所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  24. 如权利要求23所述的终端,其特征在于,所述处理器执行所述防火墙向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识的操作,包括:
    所述防火墙向所述终端上的系统应用发送所述URL,所述URL携带所述第二应用的标识;
    所述系统应用向所述免安装应用运行引擎发送所述URL,所述URL携带所述第二应用的标识。
  25. 如权利要求23或24所述的终端,其特征在于,所述处理器执行所述防火墙确定所述URL与URL正则表达式相匹配的操作之前,所述处理器还用于根据所述存储器中存储的程序指令执行以下操作:
    所述防火墙确定所述第一应用的标识属于第一标识集合。
  26. 如权利要求25所述的终端,其特征在于,所述处理器执行所述防火墙确定所述第一应用的标识属于第一标识集合的操作之前,所述处理器还用于根据所述存储器中存储的程序指令执行以下操作:
    所述终端上的系统应用通过所述通信接口从策略服务器获取所述第一标识集合和所述URL正则表达式;
    所述系统应用向所述防火墙发送所述第一标识集合和所述URL正则表达式。
  27. 如权利要求19至26中任一项所述的终端,其特征在于,所述第二请求携带所述第二应用的标识、页面路径和输入参数;所述处理器,具体用于所述第二应用根据所述页面路径和所述输入参数通过所述显示屏显示所述第二应用的页面。
  28. 一种计算机可读存储介质,包括指令,其特征在于,当所述指令在计算机上运行时,使所述计算机执行根据权利要求1至9任一项所述的方法。
  29. 一种包含指令的计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如权利要求1至9任一项所述的方法。
PCT/CN2018/086140 2018-03-28 2018-05-09 一种浏览应用页面的方法及终端 WO2019184053A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201880043747.1A CN110869907B (zh) 2018-03-28 2018-05-09 一种浏览应用页面的方法及终端

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810265838.1 2018-03-28
CN201810265838 2018-03-28

Publications (1)

Publication Number Publication Date
WO2019184053A1 true WO2019184053A1 (zh) 2019-10-03

Family

ID=68060851

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/086140 WO2019184053A1 (zh) 2018-03-28 2018-05-09 一种浏览应用页面的方法及终端

Country Status (2)

Country Link
CN (1) CN110869907B (zh)
WO (1) WO2019184053A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488151A (zh) * 2020-04-17 2020-08-04 上海数禾信息科技有限公司 Android各模块间页面交互的方法、装置
CN112527330A (zh) * 2020-12-16 2021-03-19 Vidaa美国公司 一种管理方法及显示设备
KR20210040874A (ko) * 2020-06-30 2021-04-14 베이징 바이두 넷컴 사이언스 앤 테크놀로지 코., 엘티디. 애플릿 처리 방법, 서버, 기기, 저장 매체 및 컴퓨터 프로그램
CN114189445A (zh) * 2021-12-03 2022-03-15 威创集团股份有限公司 一种usb信号透传处理方法、装置、终端及存储介质
CN114285815A (zh) * 2021-12-21 2022-04-05 中国农业银行股份有限公司 应用跳转方法和应用跳转装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552977A (zh) * 2020-04-16 2020-08-18 北京达佳互联信息技术有限公司 一种应用权限的确定方法、装置及系统
CN111722885B (zh) * 2020-06-19 2023-08-08 抖音视界有限公司 程序运行方法、装置以及电子设备
CN111930440A (zh) * 2020-08-10 2020-11-13 湖南快乐阳光互动娱乐传媒有限公司 唤醒免安装应用的方法及相关装置、计算机存储介质
CN112069430B (zh) * 2020-09-22 2023-01-06 深圳市欢太科技有限公司 快应用预览方法、装置、电子设备及存储介质
CN112291412B (zh) * 2020-10-29 2022-04-22 维沃移动通信(杭州)有限公司 应用程序控制方法、装置及电子设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103620583A (zh) * 2011-06-16 2014-03-05 微软公司 根据浏览活动显现应用
US20150033219A1 (en) * 2013-07-28 2015-01-29 Oded Haim Breiner Method and system for displaying a non-installed android application and for requesting an action from a non-installed android application
US20160359945A1 (en) * 2015-06-08 2016-12-08 Wesley John Boudville Cookies and anti-ad blocker using deep links in mobile apps
CN106293652A (zh) * 2015-05-20 2017-01-04 王筱娜 一种应用动态初始化技术、系统和应用
CN107315833A (zh) * 2017-07-12 2017-11-03 北京多点在线科技有限公司 基于应用程序的检索与下载的方法和装置
CN107515764A (zh) * 2017-07-28 2017-12-26 平安科技(深圳)有限公司 应用程序页面打开方法、终端以及计算机可读存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9244709B2 (en) * 2011-06-13 2016-01-26 Microsoft Technology Licensing, Llc Automatic recognition of web application
CN103473082A (zh) * 2012-06-08 2013-12-25 腾讯科技(深圳)有限公司 一种启动WebApp的方法及装置
CN104079528A (zh) * 2013-03-26 2014-10-01 北大方正集团有限公司 一种Web应用的安全防护方法及系统
CN105446750B (zh) * 2014-05-30 2019-12-03 阿里巴巴集团控股有限公司 WebApp启动运行、生成镜像文件的方法和装置
CN107463833A (zh) * 2017-07-27 2017-12-12 北京小米移动软件有限公司 Web应用的校验方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103620583A (zh) * 2011-06-16 2014-03-05 微软公司 根据浏览活动显现应用
US20150033219A1 (en) * 2013-07-28 2015-01-29 Oded Haim Breiner Method and system for displaying a non-installed android application and for requesting an action from a non-installed android application
CN106293652A (zh) * 2015-05-20 2017-01-04 王筱娜 一种应用动态初始化技术、系统和应用
US20160359945A1 (en) * 2015-06-08 2016-12-08 Wesley John Boudville Cookies and anti-ad blocker using deep links in mobile apps
CN107315833A (zh) * 2017-07-12 2017-11-03 北京多点在线科技有限公司 基于应用程序的检索与下载的方法和装置
CN107515764A (zh) * 2017-07-28 2017-12-26 平安科技(深圳)有限公司 应用程序页面打开方法、终端以及计算机可读存储介质

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488151A (zh) * 2020-04-17 2020-08-04 上海数禾信息科技有限公司 Android各模块间页面交互的方法、装置
CN111488151B (zh) * 2020-04-17 2023-09-26 上海数禾信息科技有限公司 Android各模块间页面交互的方法、装置
KR20210040874A (ko) * 2020-06-30 2021-04-14 베이징 바이두 넷컴 사이언스 앤 테크놀로지 코., 엘티디. 애플릿 처리 방법, 서버, 기기, 저장 매체 및 컴퓨터 프로그램
JP2021121972A (ja) * 2020-06-30 2021-08-26 ベイジン バイドゥ ネットコム サイエンス アンド テクノロジー カンパニー リミテッド ミニプログラム処理方法、サーバー、設備、記憶媒体、及びプログラム
EP3828701A3 (en) * 2020-06-30 2021-09-01 Beijing Baidu Netcom Science And Technology Co. Ltd. Mini app processing method, server, device and storage medium
KR102501968B1 (ko) * 2020-06-30 2023-02-21 베이징 바이두 넷컴 사이언스 앤 테크놀로지 코., 엘티디. 애플릿 처리 방법, 서버, 기기, 저장 매체 및 컴퓨터 프로그램
JP7232866B2 (ja) 2020-06-30 2023-03-03 ベイジン バイドゥ ネットコム サイエンス テクノロジー カンパニー リミテッド ミニプログラム処理方法、サーバー、設備、記憶媒体、及びプログラム
CN112527330A (zh) * 2020-12-16 2021-03-19 Vidaa美国公司 一种管理方法及显示设备
CN114189445A (zh) * 2021-12-03 2022-03-15 威创集团股份有限公司 一种usb信号透传处理方法、装置、终端及存储介质
CN114189445B (zh) * 2021-12-03 2023-03-10 威创集团股份有限公司 一种usb信号透传处理方法、装置、终端及存储介质
CN114285815A (zh) * 2021-12-21 2022-04-05 中国农业银行股份有限公司 应用跳转方法和应用跳转装置
CN114285815B (zh) * 2021-12-21 2024-05-14 中国农业银行股份有限公司 应用跳转方法和应用跳转装置

Also Published As

Publication number Publication date
CN110869907A (zh) 2020-03-06
CN110869907B (zh) 2021-10-01

Similar Documents

Publication Publication Date Title
WO2019184053A1 (zh) 一种浏览应用页面的方法及终端
US9712562B2 (en) Method, device and system for detecting potential phishing websites
CN107222485B (zh) 一种授权方法以及相关设备
CN107147647B (zh) 一种网页授权方法及装置
KR101724811B1 (ko) 라우터 액세스 제어 방법, 장치, 시스템, 프로그램 및 기록매체
US20150302215A1 (en) Sensitive operation verification method, terminal device, server, and verification system
WO2019178869A1 (zh) 一种eSIM卡的开户方法及终端
US11379573B2 (en) Trusted application access control method and terminal
WO2017211205A1 (zh) 一种白名单更新方法和装置
WO2019072039A1 (zh) 一种业务证书管理方法、终端及服务器
KR101760822B1 (ko) 보안을 구현하기 위한 방법, 방화벽, 단말 및 판독가능 저장 매체
US10152660B2 (en) Smart card read/write method and apparatus
WO2019227450A1 (zh) 应用功能的实现方法及电子设备
WO2018045873A1 (zh) 即时通信应用的消息处理方法及相关产品
WO2014000652A1 (zh) 浏览器插件安装方法、装置及终端
WO2014206143A1 (zh) 未读消息数目显示方法、装置和设备
WO2020024929A1 (zh) 对电子身份证的业务适用范围进行升级的方法和终端设备
WO2018000370A1 (zh) 一种移动终端的认证方法及移动终端
US11546768B2 (en) Application download monitoring method and device
CN113347242A (zh) 跨设备资源访问方法、装置、存储介质及电子设备
CN108090345B (zh) linux系统外部命令执行方法及装置
US20150089600A1 (en) Methods, devices and systems for router access control
US10764038B2 (en) Method and apparatus for generating terminal key
US10341346B2 (en) Information processing method, information processing apparatus, and storage medium
EP2869229B1 (en) Method, device and equipment for installing an application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18913150

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18913150

Country of ref document: EP

Kind code of ref document: A1