WO2020233048A1 - Procédé et système de génération de logiciel personnalisé, dispositif électronique et support d'informations - Google Patents

Procédé et système de génération de logiciel personnalisé, dispositif électronique et support d'informations Download PDF

Info

Publication number
WO2020233048A1
WO2020233048A1 PCT/CN2019/120661 CN2019120661W WO2020233048A1 WO 2020233048 A1 WO2020233048 A1 WO 2020233048A1 CN 2019120661 W CN2019120661 W CN 2019120661W WO 2020233048 A1 WO2020233048 A1 WO 2020233048A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
configuration
file
user
application
Prior art date
Application number
PCT/CN2019/120661
Other languages
English (en)
Chinese (zh)
Inventor
徐彬彬
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020233048A1 publication Critical patent/WO2020233048A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Definitions

  • This application relates to the field of computers, and in particular to methods, systems, electronic devices, and storage media for generating customized software.
  • This application provides customized software generation methods, systems, electronic devices, and storage media to solve the technical problem of high cost of customized software.
  • this application provides a method for generating customized software.
  • the method includes the following steps:
  • the customization requirements include target application types and target configuration requirements
  • the front-end page is used to display one or more application types and multiple Configuration requirement options, different application types correspond to different configuration requirement options, the target application type is one of the application types, and the target configuration requirement includes one or more of the configuration requirement options;
  • the target basic file includes a calling function for calling the target configuration file
  • the target configuration file includes the startup of all configuration modules Identifies that the configuration module has a corresponding relationship with the configuration requirement option
  • Target configuration module modify the startup identifier of each configuration module in the target configuration file, so that the target basic file can call the target configuration file through the calling function and start the corresponding target configuration requirement.
  • Target configuration module to obtain the installation package of the target application;
  • a customized software generation system includes a first obtaining unit, a second obtaining unit, a modification unit, and a sending unit, wherein:
  • the first obtaining unit is configured to obtain the user's customization requirements for the target application from a front-end page, where the customization requirements include target application types and target configuration requirements;
  • the second obtaining unit is configured to obtain a target basic file and a target configuration file of the target application according to the target application type, wherein the target basic file includes a calling function for calling the target configuration file, and the target
  • the configuration file includes the startup identifiers of all configuration modules, and the configuration module corresponds to the configuration requirement option;
  • the modification unit is used to modify the startup identifier of each configuration module in the target configuration file according to the target configuration requirements, so that the target basic file can call the target configuration file through the calling function and start the connection
  • the target configuration module corresponding to the target configuration requirement is described, so as to obtain the installation package of the target application;
  • the sending unit is configured to send the installation package of the target application to the user.
  • an electronic device including a processor, an input device, an output device, and a memory, the processor, input device, output device, and memory are connected to each other, wherein the memory is used to store a computer program,
  • the computer program includes program instructions, and the processor is configured to invoke the program instructions to execute the method described in the first aspect above
  • a computer non-volatile readable storage medium stores a computer program.
  • the computer program includes program instructions that, when executed by a processor, cause the processing
  • the device executes the method of the first aspect described above.
  • the target configuration requirement is to modify the start identifier of each configuration module in the target configuration file, so that the target basic file can call the target configuration file through the calling function and start the target corresponding to the target configuration requirement Configure the module to obtain the installation package of the target application, and send the installation package of the target application to the user.
  • This allows users to wait for the installation package to be generated just by checking the required functions on the front-end page. For users, the entire process is fast and convenient. For developers, they only need to maintain the system, which improves the efficiency of customized software and solves the technical problem of high cost of customized software.
  • Fig. 1 is a schematic flowchart of a method for generating customized software provided by the present application
  • Figure 2 is a schematic diagram of a front-end page provided by this application.
  • Figure 3 is a schematic diagram of the workflow of a recording file provided by this application.
  • Figure 4 is a schematic structural diagram of a customized software generation system provided by this application.
  • Fig. 5 is a schematic block diagram of the structure of an electronic device provided by the present application.
  • Figure 1 is a schematic flow chart of a method for generating customized software provided by this application. As can be seen from Figure 1, the method for generating customized software provided by this application includes the following steps:
  • the customization requirements include target application types and target configuration requirements
  • the front-end page is used to display one or more application types and multiple configuration requirement options to the user, and different application types correspond to different
  • the target application type is one of the application types
  • the target configuration requirement includes one or more of the configuration requirement options.
  • the front-end page can be a web page or an app page.
  • the front-end page can first show the user a customizable target application type. After the user selects an application type, it can show the user multiple types of target applications that can be owned by the user.
  • Configuration requirement options that is, the additional functions that the target application can add.
  • the front-end page displays the configuration requirement options corresponding to category 1 of the application as A, B, C, D, E, and F.
  • the user can configure the requirements according to the required functions. Selection, for example, the user selects the target application category as Category 1, and the configuration requirement is ABC. Specifically, the configuration requirements A, B, C, D, E, and F respectively represent the functions of different services in the case of different business classifications.
  • the type 1 application selected by the user 1 refers to the financial lending program.
  • the configuration requirement option A can represent the loan application interception function
  • the configuration requirement option B can represent the loan application timing retransmission function
  • the configuration requirement option C can represent the debit credit review function
  • the 2 types of applications selected by user 2 refer to e-commerce
  • configuration requirement option A can represent similar product recommendation function
  • configuration requirement option B can represent product image search function
  • configuration requirement option C can represent receipt confirmation function, etc.
  • Figure 2 is a kind provided by this application
  • the "Contact Us” button in Figure 2 communicates with developers. For example, developers are required to add function G that is not displayed on the front-end page. At the same time, when multiple user needs add configuration requirements option G, developers can add configuration requirements options G is added to the front-end page. It should be understood that the above examples are only for illustration and cannot constitute a specific limitation.
  • S102 Acquire a target basic file and a target configuration file of the target application according to the target application category.
  • the target basic file includes a calling function for calling the target configuration file
  • the target configuration file includes the startup identifiers of all configuration modules
  • the configuration module corresponds to the configuration requirement option .
  • each application category corresponds to a basic file.
  • the target configuration files obtained in step S102 are all the same, including A, B, C, D, E , F Six configuration files for the startup identification of the configuration module.
  • the basic file can be used to obtain the main program of the target application
  • the configuration file can be used to obtain one or more secondary programs of the target application.
  • the main program is used to implement the basic functions of the target application.
  • These functions are basic functions summarized according to the common needs of other users; the secondary program realizes other configuration requirements functions of the target application, and these configuration requirements functions are based on The function of classifying and summarizing the different needs of other users.
  • the target application type is a loan assistance application
  • the basic function is: sending a borrowing request from the borrower to the capital, and after the capital has passed the credit review of the borrower, it will feed back to the borrower when the loan is successful.
  • the configuration requirement function can be whether to send a successful loan email to the debit account, or, because some capitals can only conduct credit checks during working hours, the configuration requirement function can also be whether to intercept the loan request at a fixed time, and whether it is at a fixed time Reissue loan request, etc. Therefore, after analyzing the functional requirements of multiple users, the user functional requirements of similar products can be classified, one is the basic functional requirements, the corresponding main program is produced, and the basic file is generated, and the other is the user's different requirements. Each functional requirement is made into a configuration module and written into the configuration file. It should be understood that the pre-designated configuration modules are completed and stored, which reduces the development difficulty of software customization and shortens the implementation cycle of software customization.
  • the target basic file includes a calling function for calling the target configuration file. It is understandable that the purpose of this is to be able to add or delete the configuration requirement function according to the change of the user requirement, so the configuration module is developed as a dynamically loadable option.
  • the specific implementation may be to set the configuration file as a global object, so that all objects or functions of this program can refer to the configuration file, and secondly add a loop traversal to read the configuration file logic in the main program.
  • the user selects the target application category as Category 1 and the function as ABC, then the finally generated configuration file of the target application installation package file includes the calling interface addresses of all configuration modules of ABCDEF, However, when the main function loops through the configuration file, only the three configuration modules ABC are loaded. Similarly, if the function selected by the user is ABCDE, when the main function loops through the configuration file, the five configuration modules ABCDE are loaded. It is understandable that developing the configuration module as a dynamically loadable option can not only increase the speed of product delivery, but also greatly improve the efficiency of later product maintenance and product upgrades after the product is delivered.
  • the configuration file is an Extensible Markup Language (XML) file
  • the target configuration module is a dynamic link library DLL file
  • the configuration file includes multiple calls of the configuration module Interface address, where the calling interface address and the configuration module are in a one-to-one correspondence.
  • each configuration module can be packaged as a dynamic link library (Dynamic Link Library, DLL), and the startup mode of each configuration module can refer to the interface of calling the target configuration module DLL in the configuration file.
  • DLL Dynamic Link Library
  • the user selects a type 1 application on the front-end page and configures the requirements options A and B. Therefore, by modifying the startup identifiers of configuration module A and configuration module B in the configuration file of the type 1 application from 0 (not loaded) 1 (load), the startup flags of other configuration modules remain 0 unchanged, and the configuration file modification can be completed. It is understandable that for product maintenance after product delivery, this application saves user-differentiated configuration modules as DLL files, which can more easily repair and upgrade various configuration modules without affecting Other parts of the program.
  • the target configuration file further includes a target record file
  • the target record file is used to record the target call interface address and version information of the last call of the target application
  • the version information includes at least all Describe the creation time, modification time and file size of the target configuration file.
  • the target application program can directly read the last called target call interface address in the target record file when the version information of the record file is completely consistent with the version information of the target configuration file. The next time it is started, the waste of resources caused by circular traversal reading is avoided.
  • the target application is used to compare the version information of the target record file with the version information of the target configuration file according to the target record file in the case of receiving the start application of the user.
  • the version information is matched. If the matching results are consistent, read the last called target calling interface in the target record file, and use the calling function to call the target configuration through the target calling interface File and start the target configuration module corresponding to the target configuration requirement, thereby completing the start of the target application. That is to say, in order to achieve the purpose of dynamically loading the module, the main function adds the logic of cyclic traversal to read the configuration file. When the program is in use, it will cyclically read the configuration file.
  • this application provides another XML file as the record file. Each time the program runs, it only needs to read the configuration record in the record file to load the corresponding module without looping.
  • the target application program is further configured to traverse the target configuration file to obtain the target calling interface address including the startup identifier when the matching result is inconsistent; Record the target calling interface address and the version information of the target configuration file in the target record file; call the interface address through the calling function to start the target configuration module corresponding to the target configuration requirement, thereby completing the target application Start of the program.
  • Figure 3 shows a schematic diagram of the workflow of a recording file. First, when the user starts the program for the first time, the configuration file is read once, the functional modules used in the configuration file are written into the recording file, and the reading Get the version information of the configuration file, such as creation time, modification time, version number, and file size, etc.
  • the system will read the configuration file and the record file at the same time. If the version information in the record file is The configuration file is different, indicating that the configuration file has been updated. At this time, the configuration file is traversed again, and the calling interface address corresponding to the updated configuration module is recorded in the record file. If the version information in the record file is completely consistent with the configuration file, the configuration The file has not been updated, so it is enough to read the last call interface address directly from the record file, thus avoiding the waste of resources caused by circular traversal reading, and achieving dynamic loading of the module, thereby improving delivery efficiency and maintenance efficiency purpose.
  • the method further includes: receiving a modification configuration request of the user; according to the modification configuration request, modifying the startup identifier of each configuration module in the target configuration file so that the target basic file
  • the target configuration module corresponding to the target configuration requirement can be loaded by calling the target, so as to obtain the modified target application installation package; and the modified target application installation package can be sent to the user. That is to say, each target application is generated and modified by modifying the startup identification of each configuration module in the configuration file, and selecting the configuration module to be loaded according to the configuration requirement option selected by the user on the front-end page.
  • the user selects the target application category as Category 1, and the function is changed from ABC to ABDE.
  • Configuration file modify the startup identification of configuration module D and E in the configuration file from 0 (not loaded) to 1 (load), modify the startup identification of configuration module C from 1 (load) to 0 (not load), other configurations
  • the module's startup logo remains unchanged, so that when the main program loops through the configuration files, only the DLLs of the four configuration modules of ABDE are loaded.
  • the target application is packaged to obtain the modified application installation package.
  • the target configuration file XML may be an encrypted configuration file
  • the encapsulated configuration module DLL file may also be an encrypted configuration file.
  • the modifying the startup identifier of each configuration module in the target configuration file according to the target configuration requirement includes: in the case that the target configuration file is successfully decrypted, modifying the target configuration file according to the target configuration requirement Startup ID of each configuration module in Specifically, the main function loop traverses the configuration file before adding the step of decrypting the configuration file, or you can add the decryption step before the main function traversal loop configuration file loads each target configuration module, that is, calling the DLL file needs to be decrypted. transfer. This is because the installation package may actually include the DLL module corresponding to the configuration requirement option that the user has not selected. Therefore, encrypting the DLL file and/or configuration file can ensure data security.
  • S104 Send the installation package of the target application to the user.
  • the installation package of the target application may be sent to the user through the mail system, and a download link may also be generated for the user to download by himself. I will not repeat them here. It is understandable that the installation package of the target application sent to the user can be a time-limited or restricted-use installation package for the user to try it out, and then send the complete installation package after confirming the payment. Wherein, the payment operation can also be performed through the customized software generation system provided by this application or a third-party transaction platform, which is not limited by this application.
  • the method further includes: obtaining user evaluation information of the target application, the evaluation information including the user Use the evaluation algorithm to output the scoring results according to the scoring information and the scoring information of other users; obtain the configuration recommendation model corresponding to the user according to the target application, and obtain the recommendation result according to the configuration recommendation model, where The configuration recommendation model is obtained according to one or more of the user’s address information, historical search records, historical customization records, historical click records and historical reading records; uploading the user’s comment content, recommendation results and scoring results to Front page.
  • the user after sending the target application installation package to the user, the user can evaluate and score the customized target application, and display the evaluation and scoring results on the front-end page for reference by other users.
  • Other types of application programs or configuration modules can also be recommended to the user.
  • a user who customizes the target program of category 1 also customizes the target program of category 2 and also selects functions corresponding to other configuration modules.
  • the main program of each type in the customized software generation system and the corresponding multiple configuration modules are regularly updated and upgraded, and new configuration modules are added to enrich the functions of the customized software generation system. .
  • the method further includes: in the case where the scoring information is higher than a threshold, sending a customized request to the user Other users with the same customization requirements send the installation package of the target application.
  • the user can be classified according to the registration information of the new user.
  • the classification rule can be a rule determined based on the history of other users' customized needs, so that after the new user is registered, the user can be registered with the user. Class roles are often customized application categories and configuration requirements options.
  • users of financial companies can be divided into financial users, and the products often customized by financial users can be lending, insurance, and credit review programs;
  • users of e-commerce platforms can be divided into e-commerce users, and Products often customized by e-commerce users can be related programs of e-commerce platforms;
  • school users can be classified as educational users, and products often customized by educational users can be educational management programs of schools.
  • the user’s customization requirements for the target application are obtained from the front-end page, the target basic file and the target configuration file of the target application are obtained according to the target application type, and the target configuration requirements are modified according to the target configuration requirements.
  • the start identifier of each configuration module in the target configuration file enables the target basic file to call the target configuration file through the calling function and start the target configuration module corresponding to the target configuration requirement, thereby obtaining the target application
  • the installation package sends the installation package of the target application to the user.
  • the user can wait for the installation package to be generated just by checking the required function on the front-end page. For users, the entire process is fast and convenient. For developers, they only need to maintain the system, which improves the efficiency of customized software and solves the technical problem of high cost of customized software.
  • FIG. 4 is a schematic structural diagram of a customized software generation system provided by this application. It can be seen from Figure 4 that the customized software generation system provided by this application includes a first acquisition unit 410, a second acquisition unit 420, a modification unit 430, and a sending Unit 440 and evaluation unit 450, wherein
  • the first obtaining unit 410 is configured to obtain the user's customization requirements for the target application from a front-end page, where the customization requirements include target application types and target configuration requirements, and the front-end page is used to display to the user One or more application types and multiple configuration requirement options, different application types correspond to different configuration requirement options, the target application type is one of the application types, and the target configuration requirement includes the configuration requirement option One or more of;
  • the second obtaining unit 420 is configured to obtain a target basic file and a target configuration file of the target application according to the target application type, wherein the target basic file includes a calling function for calling the target configuration file, and The target configuration file includes the startup identifiers of all configuration modules, and the configuration modules correspond to the configuration requirement options;
  • the modification unit 430 is configured to modify the startup identifier of each configuration module in the target configuration file according to the target configuration requirements, so that the target basic file can call the target configuration file through the calling function and start the The target configuration module corresponding to the target configuration requirement, so as to obtain the installation package of the target application;
  • the sending unit 440 is configured to send the installation package of the target application to the user.
  • the customization requirements include target application types and target configuration requirements
  • the front-end page is used to display one or more application types and configuration requirements to the user.
  • Different application types correspond to different configuration requirements.
  • the front-end page can be a WEB page or an app page.
  • the front-end page can first show the user the target application type that can be customized. After the user selects the application type, it can show the user multiple configuration requirements options that the target application of that type can have. That is, the additional functions that the target application can add.
  • the front-end page displays the configuration requirement options corresponding to the application category 1 as A, B, C, D, E, and F.
  • the user can select the configuration requirements according to the required functions, such as users Select the target application type as Category 1, and the configuration requirement as ABC.
  • the configuration requirements options A, B, C, D, E, and F respectively represent the functions of different businesses in the case of different business classifications.
  • the application category 1 selected by user 1 refers to financial lending programs
  • the configuration requirement option A can represent the loan application interception function
  • the configuration requirement option B can represent the loan application timing retransmission function
  • the configuration requirement option C can represent the debit credit review function
  • the type 2 application selected by user 2 refers to the e-commerce platform Class program
  • the configuration requirement option A can represent the similar product recommendation function
  • the configuration requirement option B can represent the product image search function
  • the configuration requirement option C can represent the confirmation receipt reminder function
  • Figure 2 is a front-end provided by this application A schematic diagram of the page, where the application type selected by the user is an e-commerce platform, and the configuration requirement options displayed on the front-end page can be six types of ABCDEF as shown in Figure 2.
  • the front-end page can also set the options for online dialogue.
  • the "Contact Us" button in 2 communicates with developers, such as asking developers to add function G that is not displayed on the front-end page.
  • developers can set configuration requirement option G Add to the front page.
  • the target configuration file includes all configuration requirement options corresponding to the target application category
  • the target basic file includes a calling function for calling the target configuration file.
  • each application category corresponds to a basic file.
  • the target configuration files obtained in step S102 are all the same, including A, B, C, D, E , F Six configuration files for the startup identification of the configuration module.
  • the basic file can be used to obtain the main program of the target application
  • the configuration file can be used to obtain one or more secondary programs of the target application.
  • the main program is used to implement the basic functions of the target application.
  • These functions are basic functions summarized according to the common needs of other users; the secondary program realizes other configuration requirements functions of the target application, and these configuration requirements functions are based on The function of classifying and summarizing the different needs of other users.
  • the target application type is a loan assistance application
  • the basic function is: sending a borrowing request from the borrower to the capital, and after the capital has passed the credit review of the borrower, it will feed back to the borrower when the loan is successful.
  • the configuration requirement function can be whether to send a successful loan email to the debit account, or, because some capitals can only conduct credit checks during working hours, the configuration requirement function can also be whether to intercept the loan request at a fixed time, and whether it is at a fixed time Reissue loan request, etc. Therefore, after analyzing the functional requirements of multiple users, the user functional requirements of similar products can be classified, one is the basic functional requirements, the corresponding main program is produced, and the basic file is generated, and the other is the user's different requirements. Each functional requirement is made into a configuration module and written into the configuration file. It should be understood that the pre-designated configuration modules are completed and stored, which reduces the development difficulty of software customization and shortens the implementation cycle of software customization.
  • the target basic file includes a calling function for calling the target configuration file. It is understandable that the purpose of this is to be able to add or delete configuration requirements functions according to changes in user requirements, so the configuration module is developed as a dynamically loadable option. When customizing software development, different configuration modules are loaded according to different user needs, and configuration modules that are not related to user needs need not be loaded, thereby saving system resources.
  • the specific implementation may be to set the configuration file as a global object, so that all objects or functions of this program can refer to the configuration file, and secondly add a loop traversal to read the configuration file logic in the main program.
  • the configuration file of the installation package file of the target application generated finally includes the calling interface addresses of all configuration modules of ABCDEF, but the main When the function loops through the configuration file, only the three configuration modules ABC are loaded. Similarly, if the function selected by the user is ABCDE, then the main function loops through the configuration file and loads the five configuration modules ABCDE. It is understandable that developing the configuration module as a dynamically loadable option can not only increase the speed of product delivery, but also greatly improve the efficiency of later product maintenance and product upgrades after the product is delivered.
  • the configuration file is an Extensible Markup Language (XML) file
  • the target configuration module is a dynamic link library DLL file
  • the configuration file includes multiple calls of the configuration module Interface address, where the calling interface address and the configuration module are in a one-to-one correspondence.
  • each configuration module can be packaged as a dynamic link library (Dynamic Link Library, DLL), and the startup mode of each configuration module can refer to the interface of calling the target configuration module DLL in the configuration file.
  • DLL Dynamic Link Library
  • the user selects a type 1 application on the front-end page and configures the requirements options A and B. Therefore, by modifying the startup identifiers of configuration module A and configuration module B in the configuration file of the type 1 application from 0 (not loaded) 1 (load), the startup flags of other configuration modules remain 0 unchanged, and the configuration file modification can be completed. It is understandable that for product maintenance after product delivery, this application saves user-differentiated configuration modules as DLL files, which can more easily repair and upgrade various configuration modules without affecting Other parts of the program.
  • the target configuration file further includes a target record file
  • the target record file is used to record the target call interface address and version information of the last call of the target application
  • the version information includes at least all Describe the creation time, modification time and file size of the target configuration file.
  • the target application program can directly read the last called target call interface address in the target record file when the version information of the record file is completely consistent with the version information of the target configuration file. The next time it is started, the waste of resources caused by circular traversal reading is avoided.
  • the target application is used to compare the version information of the target record file with the version information of the target configuration file according to the target record file in the case of receiving the start application of the user.
  • the version information is matched. If the matching results are consistent, read the last called target calling interface in the target record file, and use the calling function to call the target configuration through the target calling interface File and start the target configuration module corresponding to the target configuration requirement, thereby completing the start of the target application. That is to say, in order to achieve the purpose of dynamically loading the module, the main function adds the logic of cyclic traversal to read the configuration file. When the program is in use, it will cyclically read the configuration file.
  • this application provides another XML file as the record file. Each time the program runs, it only needs to read the configuration record in the record file to load the corresponding module without looping.
  • the target application program is further configured to traverse the target configuration file to obtain the target calling interface address including the startup identifier when the matching result is inconsistent; Record the target calling interface address and the version information of the target configuration file in the target record file; call the interface address through the calling function to start the target configuration module corresponding to the target configuration requirement, thereby completing the target application Start of the program.
  • Figure 3 shows a schematic diagram of the workflow of a recording file. First, when the user starts the program for the first time, the configuration file is read once, the functional modules used in the configuration file are written into the recording file, and the read configuration is written at the same time. File version information, such as creation time, modification time, and file size, etc.
  • the system will read the configuration file and the record file at the same time. If the creation time, modification time and file size in the record file are recorded Different from the configuration file, it means that the configuration file has been updated. At this time, traverse the configuration file again and put the calling interface address corresponding to the updated configuration module in the record file. If the version information in the record file is exactly the same as the configuration file, it means The configuration file is not updated, so it is enough to read the last call interface address directly from the record file, thus avoiding the waste of resources caused by cyclic traversal reading, and achieving dynamic loading of the module, thereby improving delivery efficiency and maintenance efficiency the goal of.
  • the modification unit 430 is further configured to receive a modification configuration request of the user; the modification unit 430 is further configured to modify each configuration module in the target configuration file according to the modification configuration requirement
  • the target basic file can call the configuration module corresponding to the modified configuration requirement by calling the function to obtain the modified target application installation package; the modification unit 430 is also used to provide the user Send the modified installation package of the target application. That is to say, each target application is generated and modified by modifying the startup identification of each configuration module in the configuration file, and selecting the configuration module to be loaded according to the configuration requirement option selected by the user on the front-end page. Specifically, still taking the above example as an example, the user selects the target application category as Category 1, and the function is changed from ABC to ABDE.
  • Configuration file modify the startup identification of configuration module D and E in the configuration file from 0 (not loaded) to 1 (load), modify the startup identification of configuration module C from 1 (load) to 0 (not load), other configurations
  • the module's startup logo remains unchanged, so that when the main program loops through the configuration files, only the DLLs of the four configuration modules of ABDE are loaded.
  • the target application is packaged to obtain the modified application installation package.
  • the target configuration file XML may be an encrypted configuration file
  • the encapsulated configuration module DLL file may also be an encrypted configuration file.
  • the modification unit is configured to modify the startup identifier of each configuration module in the target configuration file according to the target configuration requirement when the target configuration file is successfully decrypted. That is to say, the main function loop traverses the configuration file before adding the step of decrypting the configuration file, or you can add the decryption step before the main function traversal loop configuration file loads each target configuration module, that is, calling the DLL file needs to be decrypted. Can be called. This is because the installation package may actually include DLL modules corresponding to configuration requirements options that other users have not selected. Therefore, encrypting the DLL files and/or configuration files can ensure data security.
  • the installation package of the target application may be sent to the user through the mail system, and a download link may also be generated for the user to download by himself. I will not repeat them here. It is understandable that the target application installation package sent to the user may be a time-limited or restricted-use installation package for the user to try and confirm, and then send the complete installation package after payment. Wherein, the payment operation can also be performed through the customized software generation system provided by this application or a third-party transaction platform, which is not limited by this application.
  • the system further includes an evaluation unit 450 configured to obtain evaluation information of the target application by the user after sending the target application installation package to the user.
  • the information includes the user’s comment content and scoring information; the evaluation unit 450 is used to output the scoring results using an evaluation algorithm according to the scoring information and other users’ scoring information; the evaluation unit 450 is used to obtain user correspondence according to the user’s customization needs
  • the recommendation result is obtained according to the configuration recommendation model, wherein the configuration recommendation model is a model obtained by training a neural network using a sample set, and the sample set includes address information of other users, historical search records, One or more of historical customization records, historical click records, and historical reading records; the evaluation unit 450 is used for uploading user comment content, recommendation results, and scoring results to the front-end page.
  • the user after sending the target application installation package to the user, the user can evaluate and score the customized target application, and display the evaluation and scoring results on the front-end page for reference by other users.
  • Other types of application programs or configuration modules can also be recommended to the user.
  • a user who customizes the target program of category 1 also customizes the target program of category 2 and also selects functions corresponding to other configuration modules.
  • the main program of each type in the customized software generation system and the corresponding multiple configuration modules are regularly updated and upgraded, and new configuration modules are added to enrich the functions of the customized software generation system. .
  • the evaluation unit 450 is further configured to upload the user’s comment content, recommendation results, and scoring results to the front-end page, and when the scoring information is higher than a threshold, provide customized requirements and Other users with the same customization requirements of the user send the installation package of the target application.
  • the user can be classified according to the registration information of the new user.
  • the classification rule can be a rule determined based on the history of other users' customized needs, so that after the new user is registered, the user can be registered with the user. Class roles are often customized application categories and configuration requirements options.
  • users of financial companies can be divided into financial users, and the products often customized by financial users can be lending, insurance, and credit review programs;
  • users of e-commerce platforms can be divided into e-commerce users, and Products often customized by e-commerce users can be related programs of e-commerce platforms;
  • school users can be classified as educational users, and products often customized by educational users can be educational management programs of schools.
  • the user's customization requirements for the target application are obtained from the front-end page, the target basic file and the target configuration file of the target application are obtained according to the target application type, and the target configuration is modified according to the target configuration requirements
  • the startup identifier of each configuration module in the file so that the target basic file can call the target configuration file through the calling function and start the target configuration module corresponding to the target configuration requirement, thereby obtaining the installation package of the target application
  • the user can wait for the installation package to be generated just by checking the required functions on the front page. For users, the entire process is fast and convenient. For developers, they only need to maintain the system, which improves the efficiency of customized software and solves the technical problem of high cost of customized software.
  • FIG. 5 is a schematic structural diagram of an electronic device provided by the present application.
  • the electronic device in this embodiment as shown in the figure may include: one or more processors 511, a memory 512, and a communication interface 513.
  • the processor 511, the memory 512, and the communication interface 513 may be connected through a bus 514.
  • the processor 511 includes one or more general-purpose processors, where the general-purpose processor may be any type of device capable of processing electronic instructions, including a central processing unit (CPU), a graphics processing unit (GPU) ), microprocessor, microcontroller, main processor, controller and application specific integrated circuit (ASIC), digital signal processor (Digital Signal Processor, DSP), programmable gate array (Field-Programmable Gate) Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the processor 511 is configured to execute program instructions stored in the memory 512.
  • the memory 512 may include volatile memory, such as random access memory (Random Access Memory, RAM); the memory may also include non-volatile memory, such as read-only memory (Read-Only Memory, ROM), and flash memory (Flash memory). Memory), Hard Disk Drive (HDD), or Solid-State Drive (SSD). The memory may also include a combination of the above types of memories.
  • RAM random access memory
  • ROM read-only memory
  • flash memory flash memory
  • Memory Hard Disk Drive
  • SSD Solid-State Drive
  • the memory may also include a combination of the above types of memories.
  • the memory 512 may adopt centralized storage or distributed storage, which is not specifically limited here. It is understandable that the memory 512 is used to store computer programs, such as computer program instructions. In the embodiment of the present application, the memory 512 may provide instructions and data to the processor 511.
  • the communication interface 513 may be a wired interface (such as an Ethernet interface) or a wireless interface (such as a cellular network interface or using a wireless local area network interface) for communicating with other computer devices or users.
  • the communication interface 513 can adopt the protocol family above the network communication protocol (Transmission Control Protocol/Internet Protocol, TCP/IP), for example, the remote function call (Remote Function Call, RFC) protocol, simple Object Access Protocol (Simple Object Access Protocol, SOAP) protocol, Simple Network Management Protocol (Simple Network Management Protocol, SNMP), Common Object Request Broker Architecture (CORBA), distributed protocol, etc.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • RFC Remote Function Call
  • Simple Object Access Protocol Simple Object Access Protocol
  • SOAP Simple Network Management Protocol
  • SNMP Simple Network Management Protocol
  • CORBA Common Object Request Broker Architecture
  • the communication interface 513 is a wireless interface
  • cellular communication can be used in accordance with the Global System for Mobile Communication (GSM) or Code Division Multiple Access (CDMA) standards, so it includes wireless for data transmission.
  • GSM Global System for Mobile Communication
  • CDMA Code Division Multiple Access
  • Modem electronic processing equipment, one or more digital memory devices, and dual antennas.
  • the processor 511, the memory 512, the communication interface 513, and the bus 514 can execute the implementation described in any embodiment of the customized software generation method provided in the embodiment of the present application, and will not be repeated here. .
  • a computer non-volatile readable storage medium stores a computer program
  • the computer program includes program instructions
  • the program instructions are executed by a processor
  • the computer non-volatile readable storage medium may be the internal storage unit of the terminal described in any of the foregoing embodiments, such as the hard disk or memory of the terminal.
  • the computer-readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk equipped on the terminal, a Smart Media Card (SMC), or a Secure Digital (SD) card , Flash Card, etc.
  • the computer-readable storage medium may also include both an internal storage unit of the terminal and an external storage device.
  • the computer-readable storage medium is used to store the computer program and other programs and data required by the terminal.
  • the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.
  • the disclosed method and device can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of the units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or It can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present application.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application is essentially or the part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium It includes several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

La présente invention concerne un procédé et un système de génération de logiciel personnalisé, un dispositif électronique et un support d'informations. Le procédé consiste : à acquérir, à partir d'une page frontale, une exigence de personnalisation d'un utilisateur pour un programme d'application cible (S101) ; à acquérir un fichier de base cible et un fichier de configuration cible du programme d'application cible selon le type de programme d'application cible (S102) ; à modifier, selon une exigence de configuration cible, un identifiant initial de chaque module de configuration dans le fichier de configuration cible, de telle sorte que le fichier de base cible puisse appeler le fichier de configuration cible au moyen d'une fonction d'appel et qu'il puisse démarrer un module de configuration cible correspondant à l'exigence de configuration cible, de façon à obtenir un progiciel d'installation du programme d'application cible (S103) ; et à envoyer le progiciel d'installation du programme d'application cible à l'utilisateur (S104).
PCT/CN2019/120661 2019-05-21 2019-11-25 Procédé et système de génération de logiciel personnalisé, dispositif électronique et support d'informations WO2020233048A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910422042.7 2019-05-21
CN201910422042.7A CN110244977A (zh) 2019-05-21 2019-05-21 定制化软件生成方法、系统、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2020233048A1 true WO2020233048A1 (fr) 2020-11-26

Family

ID=67884686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/120661 WO2020233048A1 (fr) 2019-05-21 2019-11-25 Procédé et système de génération de logiciel personnalisé, dispositif électronique et support d'informations

Country Status (2)

Country Link
CN (1) CN110244977A (fr)
WO (1) WO2020233048A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138790A (zh) * 2021-05-14 2021-07-20 广东九联科技股份有限公司 Android机顶盒客制化集成方法、装置及机顶盒集成开发系统
CN113743895A (zh) * 2021-08-30 2021-12-03 深圳壹账通智能科技有限公司 一种组件管理方法、装置、计算机设备及存储介质
CN113741949A (zh) * 2021-09-07 2021-12-03 北京百度网讯科技有限公司 一种应用程序安装包的生成方法、装置、设备及存储介质
CN113836025A (zh) * 2021-09-28 2021-12-24 湖南快乐阳光互动娱乐传媒有限公司 页面测试方法及装置、存储介质及电子设备
CN115037787A (zh) * 2022-06-09 2022-09-09 上海禾骋科技有限公司 一种测试汽车网络通信的方法、系统和装置
CN115242628A (zh) * 2022-06-20 2022-10-25 平安普惠企业管理有限公司 基于模块部署的应用下载方法、装置、设备及存储介质
CN115827060A (zh) * 2022-12-09 2023-03-21 广州文石信息科技有限公司 一种应用适配方法、装置、设备和存储介质
CN116339736A (zh) * 2023-05-29 2023-06-27 英诺达(成都)电子科技有限公司 Tcl交互界面的配置方法、装置、设备及存储介质

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110244977A (zh) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 定制化软件生成方法、系统、电子设备及存储介质
CN110990049A (zh) * 2019-11-15 2020-04-10 烽火通信科技股份有限公司 一种差异化Android软件生成方法及系统
CN110865844B (zh) * 2019-11-28 2021-09-28 安徽江淮汽车集团股份有限公司 基于车联网平台的应用配置系统及方法
CN111124483B (zh) * 2019-12-26 2024-01-30 深圳创维-Rgb电子有限公司 一种系统软件适配方法、终端及存储介质
CN111475143A (zh) * 2020-04-07 2020-07-31 四川虹美智能科技有限公司 定制软件的方法及装置
CN113515389B (zh) * 2020-04-09 2024-03-01 奇安信安全技术(珠海)有限公司 中间接口的调用方法及装置、系统、存储介质、电子装置
CN111475230B (zh) * 2020-04-15 2023-03-14 望海康信(北京)科技股份公司 应用的功能配置方法、装置和电子设备
CN111880767A (zh) * 2020-06-11 2020-11-03 广州华多网络科技有限公司 书籍阅读应用程序配置方法、装置及电子设备
CN111880781A (zh) * 2020-07-29 2020-11-03 北京浪潮数据技术有限公司 一种rpm安装包的生成方法、装置、设备及存储介质
CN112068877A (zh) * 2020-08-14 2020-12-11 深圳市卓智荟教育科技有限公司 教育数字化应用的配置方法、装置和可读存储介质
CN112306530B (zh) * 2020-11-10 2022-07-15 珠海格力电器股份有限公司 软件更新法、装置、电子设备和计算机可读介质
CN112650509B (zh) * 2020-12-24 2023-02-28 苏州达家迎信息技术有限公司 应用安装包生成方法、装置、计算机设备和存储介质
CN115002214A (zh) * 2021-02-20 2022-09-02 京东科技控股股份有限公司 一种信息处理方法、装置、系统、电子设备及存储介质
CN113411203B (zh) * 2021-05-14 2022-12-20 深圳市广和通无线股份有限公司 终端的配置方法、装置、计算机设备和存储介质
CN113485677B (zh) * 2021-06-01 2024-03-19 成都节节高教育科技有限公司 基于用户需求驱动的app程序开发者辅助系统及方法
CN113467825A (zh) * 2021-06-30 2021-10-01 完美世界(北京)软件科技发展有限公司 Ipa数据展示系统及其方法、装置、设备及计算机可读介质
CN113900703A (zh) * 2021-09-30 2022-01-07 苏州浪潮智能科技有限公司 一种安装包的生成方法、装置、电子设备及存储介质
CN113961292B (zh) * 2021-10-21 2024-03-26 安天科技集团股份有限公司 一种安全产品生成方法、装置、电子设备及储存介质
CN113986387A (zh) * 2021-10-28 2022-01-28 上海米哈游璃月科技有限公司 项目配置信息的加载方法、装置、电子设备及存储介质
CN114880043A (zh) * 2022-04-28 2022-08-09 北京市商汤科技开发有限公司 应用程序的处理方法、装置、终端设备及可读存储介质
CN115016804A (zh) * 2022-06-01 2022-09-06 阿尔特(北京)汽车数字科技有限公司 一种数据交互的方法、系统、装置、设备和存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020053070A1 (en) * 2000-10-27 2002-05-02 Kabushiki Kaisha Toshiba Application development system and method
CN107688464A (zh) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 软件定制服务器、方法及计算机可读存储介质
CN109683893A (zh) * 2018-12-14 2019-04-26 五八有限公司 应用程序生成方法、装置、服务器及存储介质
CN109725897A (zh) * 2018-12-03 2019-05-07 深圳市多元世纪信息技术股份有限公司 软件定制方法、装置和系统、终端
CN110244977A (zh) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 定制化软件生成方法、系统、电子设备及存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060248508A1 (en) * 2005-04-29 2006-11-02 Symbol Technologies, Inc. Method and system for applet extensibility application program interface (API)
CN107783795B (zh) * 2017-07-26 2021-05-28 深圳壹账通智能科技有限公司 应用程序启动方法、装置、计算机设备和存储介质
CN108319460B (zh) * 2018-01-24 2021-09-17 广东小天才科技有限公司 应用程序安装包的生成方法、装置、电子设备及存储介质
CN109582342A (zh) * 2018-11-29 2019-04-05 珠海豹趣科技有限公司 一种oem软件的处理方法和相关装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020053070A1 (en) * 2000-10-27 2002-05-02 Kabushiki Kaisha Toshiba Application development system and method
CN107688464A (zh) * 2017-06-28 2018-02-13 上海壹账通金融科技有限公司 软件定制服务器、方法及计算机可读存储介质
CN109725897A (zh) * 2018-12-03 2019-05-07 深圳市多元世纪信息技术股份有限公司 软件定制方法、装置和系统、终端
CN109683893A (zh) * 2018-12-14 2019-04-26 五八有限公司 应用程序生成方法、装置、服务器及存储介质
CN110244977A (zh) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 定制化软件生成方法、系统、电子设备及存储介质

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138790A (zh) * 2021-05-14 2021-07-20 广东九联科技股份有限公司 Android机顶盒客制化集成方法、装置及机顶盒集成开发系统
CN113138790B (zh) * 2021-05-14 2023-11-10 广东九联科技股份有限公司 Android机顶盒客制化集成方法、装置及机顶盒集成开发系统
CN113743895A (zh) * 2021-08-30 2021-12-03 深圳壹账通智能科技有限公司 一种组件管理方法、装置、计算机设备及存储介质
CN113741949A (zh) * 2021-09-07 2021-12-03 北京百度网讯科技有限公司 一种应用程序安装包的生成方法、装置、设备及存储介质
CN113741949B (zh) * 2021-09-07 2023-09-29 北京百度网讯科技有限公司 一种应用程序安装包的生成方法、装置、设备及存储介质
CN113836025A (zh) * 2021-09-28 2021-12-24 湖南快乐阳光互动娱乐传媒有限公司 页面测试方法及装置、存储介质及电子设备
CN115037787A (zh) * 2022-06-09 2022-09-09 上海禾骋科技有限公司 一种测试汽车网络通信的方法、系统和装置
CN115242628A (zh) * 2022-06-20 2022-10-25 平安普惠企业管理有限公司 基于模块部署的应用下载方法、装置、设备及存储介质
CN115827060A (zh) * 2022-12-09 2023-03-21 广州文石信息科技有限公司 一种应用适配方法、装置、设备和存储介质
CN116339736A (zh) * 2023-05-29 2023-06-27 英诺达(成都)电子科技有限公司 Tcl交互界面的配置方法、装置、设备及存储介质
CN116339736B (zh) * 2023-05-29 2023-07-28 英诺达(成都)电子科技有限公司 Tcl交互界面的配置方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN110244977A (zh) 2019-09-17

Similar Documents

Publication Publication Date Title
WO2020233048A1 (fr) Procédé et système de génération de logiciel personnalisé, dispositif électronique et support d'informations
CN111819589B (zh) 用于建立共同请求处理的系统和方法
US20120246122A1 (en) Integrating data-handling policies into a workflow model
US10521834B2 (en) Mobile solution for purchase orders
US11620444B2 (en) Providing action associated with event detected within communication
CN102810057A (zh) 一种记录日志的方法
US20150370674A1 (en) Tenant provisioning for testing a production multi-tenant service
CN107862425B (zh) 风控数据采集方法、设备、系统及可读存储介质
CN101390122A (zh) Edi交换的可缩放变换和配置
US10509641B2 (en) Optimizing feature deployment based on usage pattern
WO2023179725A1 (fr) Procédé et dispositif d'intégration d'applications
CN107015794B (zh) 软件即服务参考流程扩展验证框架
CN112732547B (zh) 业务测试方法、装置、存储介质及电子设备
US20230267430A1 (en) Data processing method and device, and computer-readable storage medium
CN111324645B (zh) 区块链的数据处理方法及装置
WO2019233454A1 (fr) Procédé et dispositif de mise à niveau de code de chaîne
CN111801696A (zh) 支付页面管理方法、设备、支付系统以及存储介质
US10289978B2 (en) Method and apparatus for integrating health care payers and provider systems with health care transaction systems using a single HIPAA EDI response generation component
CN111652580B (zh) 一种对节点的数据处理方法及装置
CN112182400B (zh) 消息处理方法、消息处理装置、电子设备及存储介质
CN111865726B (zh) 业务消息测试方法、装置、计算机系统和存储介质
CN108984318B (zh) 基于驱动模型的消息投递方法、装置及可读存储介质
CN113094048A (zh) 数据显示规则确定方法、显示方法、装置、设备及介质
CN113448960A (zh) 一种导入表格文件的方法和装置
US20230244859A1 (en) System and method for automatically sharing verified user information across remote systems

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929982

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 04/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19929982

Country of ref document: EP

Kind code of ref document: A1