CN108334779B - Application processing method, device and computing storage medium - Google Patents
Application processing method, device and computing storage medium Download PDFInfo
- Publication number
- CN108334779B CN108334779B CN201810089564.5A CN201810089564A CN108334779B CN 108334779 B CN108334779 B CN 108334779B CN 201810089564 A CN201810089564 A CN 201810089564A CN 108334779 B CN108334779 B CN 108334779B
- Authority
- CN
- China
- Prior art keywords
- webview
- application
- detection thread
- independent
- run
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title abstract description 5
- 238000000034 method Methods 0.000 claims abstract description 163
- 230000008569 process Effects 0.000 claims abstract description 131
- 230000002159 abnormal effect Effects 0.000 claims abstract description 17
- 238000001514 detection method Methods 0.000 claims description 28
- 230000015654 memory Effects 0.000 claims description 22
- 230000005856 abnormality Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 claims description 7
- 230000001960 triggered effect Effects 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 abstract description 5
- 238000004590 computer program Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 230000018109 developmental process Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 206010010144 Completed suicide Diseases 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000002513 implantation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application provides an application processing method, equipment and a computer storage medium, wherein the method comprises the following steps: the WebView associated with the application is run in a separate process. In the present application, webView and the application host process are separated so that they run in a single process. Therefore, even if the WebView is abnormal, the problem of application blocking caused by the application main process cannot be influenced.
Description
[ field of technology ]
The present application relates to the field of computer applications, and in particular, to an application processing method, apparatus, and computer storage medium.
[ background Art ]
WebView is a control based on webkit engine for showing web pages, and has powerful functions, and can perform powerful processing on URL requests, page loading, rendering and page interaction besides the attributes and settings of general views. More and more mobile applications now use the WebView kernel of the system to access URLs and make hybrid developments.
When the existing mobile application accesses certain pages, the WebView may enter a dead loop because the pages are implanted with malicious JavaScript code or the rog appears, so that the situation that the mobile application is blocked or subsequent content cannot be accessed is involved, and the application must be killed and restarted to work normally.
[ application ]
In view of the above, the present application provides a method, apparatus and computer storage medium for processing applications, so as to solve the above problem that WebView abnormality affects mobile applications.
The specific technical scheme is as follows:
the application provides an application processing method, which comprises the following steps:
the WebView associated with the application is run in a separate process.
According to an embodiment of the present application, the running WebView related to the application in a separate process includes:
when the application host process invokes the WebView, a separate process is created to run the WebView.
According to an embodiment of the present application, the running WebView related to the application in a separate process includes:
and configuring the Process attribute of the WebView in an operating system declaration file so that the WebView runs in an independent Process.
According to one embodiment of the application, the independent process comprises a Tools process.
According to an embodiment of the present application, the application host process calls WebView, and creating an independent process to run WebView includes:
the application main process detects an event that a webpage link on an application main interface is triggered;
creating an independent process to run the WebView and transferring the URL of the web page to the WebView.
According to a specific embodiment of the application, the application main process and the process where the WebView is located communicate through a description language of an inter-process communication interface.
According to one embodiment of the application, the method further comprises:
and creating a detection thread, wherein the detection thread is used for detecting whether the WebView has an abnormality or not.
According to one embodiment of the application, the method further comprises:
and if the detection thread detects that the WebView has an abnormality, ending the process of the WebView.
According to an embodiment of the present application, ending the process in which the WebView is located includes:
and calling a self-destruction method by the process of the WebView.
According to an embodiment of the present application, detecting whether the WebView has an anomaly includes:
the detection thread detects whether the loading progress of the WebView is abnormal or not; or,
the detection thread detects whether the WebView loads malicious content or not; or,
and the detection thread detects whether the occupation of the memory by the WebView is abnormal or not.
According to an embodiment of the present application, after the process in which the WebView is located is ended, if the application host process calls the WebView again, an independent process is recreated to run the WebView.
According to one embodiment of the application, the method further comprises:
if the detection thread does not detect that the WebView has an abnormality, when an event of exiting the browser is detected, the process where the WebView is located is reserved.
The application also provides an apparatus comprising:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods described above.
The application also provides a storage medium containing computer executable instructions for performing the above-described method when executed by a computer processor.
As can be seen from the above technical solution, in the present application, the WebView and the application host process are separated so that they run in a separate process. Therefore, even if the WebView is abnormal, the problem of application blocking caused by the application main process cannot be influenced.
[ description of the drawings ]
FIG. 1 is a diagram of a principal architecture as applied in the prior art;
FIG. 2 is a main architecture diagram of an application provided by an embodiment of the present application;
FIG. 3 is a flow chart of a method according to an embodiment of the present application;
FIG. 4 illustrates a block diagram of an exemplary computer system suitable for use in implementing embodiments of the application.
[ detailed description ] of the application
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described in detail with reference to the accompanying drawings and specific embodiments.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one relationship describing the association of the associated objects, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
Depending on the context, the word "if" as used herein may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to detection". Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
In order to solve the technical problems in the prior art, the manner of integrating WebView in the existing mobile application is first generally known. As shown in fig. 1, in the existing mobile application, webView runs in the application main process, starts up and runs as one thread. Once the WebView is abnormal, the application main process is blocked, other services such as an application UI and the like are inevitably involved, and the application must be restarted to work normally.
The main architecture of the present application can be as shown in fig. 2. In the embodiment of the application, the WebView process and the application main process are separated and run in a separate process, and the Tools process is taken as an example in the figure. Therefore, even if the WebView is abnormal, the problem of application blocking caused by the application main process cannot be influenced.
Further, a detecting thread may be provided in the process where the WebView is located, where the detecting thread is used to detect whether the WebView has an exception. If the abnormality of the WebView is detected, ending the process of the WebView. Therefore, after the WebView is restarted, the contents of other pages can be continuously accessed, and the tired application host process is avoided.
The starting and running process of the application will be described in detail with reference to the examples. As shown in fig. 3, the process may include the steps of:
at 101, the Process attribute of WebView is configured in an operating system declaration file.
In order to enable the WebView of the application to run in an independent Process, corresponding configuration can be performed in an operating system declaration file, and for example, an Android system can find the WebView activity class of the application in Android management, and a Process attribute is configured for the WebView activity class to define the independent Process in which the Android system runs. In the embodiment of the application, an independent process operated by the application-related WebView can be configured as a Tools process.
At 102, an application master process is started.
The launching of an application host process is typically triggered based on a specific event, such as a user clicking on an application ICON (ICON) on the mobile device, launching the application host process, exposing an application host interface, i.e., an application UI interface. In addition, the starting of the application main process can be triggered based on other events, such as jump events among applications, and the application does not limit the events triggering the starting of the application main process.
At 103, when the application host process invokes the WebView, a separate process is created to run the WebView.
In this step, the application host process will call WebView, typically in the case of a need to access a web page. For applications, the application main interface, the application UI interface, is typically launched in the application main process. If the application main process detects the event that the webpage link on the application main interface is triggered, an independent process is created to run the WebView, and the URL of the webpage is transferred to the WebView, so that the WebView accesses the URL and loads corresponding webpage content. The independent Process is established according to the configuration of the Process attribute of WebView, and in the embodiment of the application, a Tools Process is taken as an example.
For example, suppose a user clicks on an ICON of a news APP on a cell phone, and a main process of the news APP is started to display a main interface. When a user clicks on a link of a certain news on the main interface, a Tools process of the application is created, and WebView is run in the Tools process. The host process of the news class APP passes the URL of the clicked news link to the WebView so that the WebView accesses the URL and loads the specific news web page content.
Communication between the application host process and the process where WebView is located is achieved through an inter-process communication mechanism, and specifically, communication can be performed through a description language such as AIDL (Android Interface definition language, intra-process communication interface).
At 104, a detection thread is created in the process where WebView resides.
The Tools process of the application is created, and a thread for detecting whether the WebView is abnormal is created in the process, which is called as a detection thread in the embodiment of the application.
In addition, in the present embodiment, the detection thread is created in the process where the WebView is located, but the implementation is not limited to this, and the detection thread may be created in another process to detect whether the WebView has an exception. The detection thread may be created, for example, in the application host process, or in another, separate process, etc.
In 105, the detecting thread detects whether the WebView has an abnormality, if not, the detecting is continued; if so, then 106 is performed.
The detecting thread may employ, but is not limited to, at least one of the following ways in detecting whether the WebView has an exception:
in the first mode, the detecting thread detects whether the loading progress of the WebView is abnormal or not. For example, if the load speed of the WebView detected by the detection thread is smaller than the preset threshold under the condition that the network is unobstructed, the WebView is considered to have a stuck state, and an abnormality exists. For example, if the detection thread detects that the loading progress of WebView stays 10% for a long time, and the network condition is good, then it can be considered that WebView is stuck and abnormal exists.
And secondly, detecting whether the WebView loads malicious content or not by the detection thread. For example, the detection thread may detect whether the content loaded by the WebView has malicious content by using a Javascript code scanner or the like, and if so, consider that the WebView has an exception.
The malicious content may be caused by malicious implantation of the loaded page Javascript code, or may be caused by code non-standardization caused by Javascript developer level or error, for example, the WebView enters a dead loop due to the non-standardization of the Javascript code.
And thirdly, detecting whether the occupation of the memory by the WebView is abnormal or not by the detection thread. For example, the detecting thread monitors the occupancy of the memory by the WebView, and if the occupancy of the memory by the WebView exceeds a preset threshold, the WebView may be considered to have an exception.
If the WebView is detected to have an abnormality, the abnormality can be recorded by setting a specific variable value. For example, the value of the variable loop may be set to true to identify that WebView has an exception.
In 106, the process where the WebView is located is ended, and when the WebView is called by the application host process again, the process goes to execution 103.
In the embodiment of the application, when the abnormality of the WebView is detected, the process of the WebView can be destroyed (also called killing). The process of the WebView can be destroyed when the specific event is triggered. For example, when the user exits the browser through the BACK key, the process of WebView is acquired by the Tools process, and if the specific variable value identifies that the WebView has an exception, the process of WebView is destroyed.
Specifically, a method of self-destruction (also referred to as "suicide") may be invoked by a process in which WebView resides, for example, a system. Exit (0) method may be invoked.
The blocking and ending of the process where the WebView is located can not affect the application host process. Once the WebView process is completed, the occupied memory is fully released. If the user clicks the web page link on the application main interface again, the WebView is called by the application main process again, so that the process goes to step 103 again, and a new process is created to run the WebView, so that the problem that the WebView is blocked and other web pages cannot be loaded is solved.
Taking the news APP as an example, if the user clicks the news link 1 on the main interface, after the WebView is operated through the newly-built Tools process, the news webpage content corresponding to the news link 1 is loaded on the WebView. If malicious content (including the condition that Javascript codes are not standard) exists in the news webpage content, the WebView is blocked, and at the moment, a detection thread in a Tools process detects that the WebView is abnormal, so that the Tools process can be destroyed when a user returns to an application main interface, and the application main process cannot be influenced, namely the application main interface can be normally displayed. If the user clicks on another news link, such as news link 2, on the application main interface again, a Tools process is created again to run WebView, and the news web page content corresponding to the news link 2 is loaded on the WebView, so that after the WebView is restarted, other web page content is normally displayed.
In addition, because the overhead of the creating process is large, the process in which the WebView is destroyed is adopted under the condition that the detecting thread only detects that the WebView is abnormal in the embodiment of the application. If the WebView is normal, the process of the WebView can be reserved, and even if the browser exits, the process of the WebView can be run in the background without being destroyed, so that the overhead of frequently creating the process is avoided.
The execution body of the method provided by the embodiment of the present application may be an application processing apparatus, where the apparatus may be embodied as a computer program of a terminal device, or may also be embodied as a functional unit such as a plug-in unit of the computer program or a software development kit (Software Development Kit, SDK), or may also be located at a server side, and the embodiment of the present application is not limited in particular.
Fig. 4 illustrates a block diagram of an exemplary computer system 012 suitable for use in implementing embodiments of the present application. The computer system 012 shown in fig. 4 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present application.
As shown in FIG. 4, the computer system 012 is in the form of a general purpose computing device. Components of computer system 012 may include, but are not limited to: one or more processors or processing units 016, a system memory 028, a bus 018 connecting the various system components, including the system memory 028 and the processing unit 016.
Bus 018 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a graphics accelerator port, a processor, or a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, micro channel architecture (MAC) bus, enhanced ISA bus, video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer system 012 typically includes a variety of computer system readable media. Such media can be any available media that can be accessed by computer system 012 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 028 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM) 030 and/or cache memory 032. The computer system 012 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 034 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard disk drive"). Although not shown in fig. 4, a magnetic disk drive for reading from and writing to a removable non-volatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from or writing to a removable non-volatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In such cases, each drive may be coupled to bus 018 by one or more data media interfaces. Memory 028 may include at least one program product having a set (e.g., at least one) of program modules configured to carry out the functions of embodiments of the application.
A program/utility 040 having a set (at least one) of program modules 042 can be stored, for example, in memory 028, such program modules 042 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 042 generally carry out the functions and/or methodologies of the embodiments described herein.
The computer system 012 may also communicate with one or more external devices 014 (e.g., keyboard, pointing device, display 024, etc.), in the present application, the computer system 012 communicates with an external radar device, one or more devices that enable a user to interact with the computer system 012, and/or any device (e.g., network card, modem, etc.) that enables the computer system 012 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 022. Also, the computer system/012 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet via a network adapter 020. As shown, the network adapter 020 communicates with other modules of the computer system 012 via bus 018. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in connection with computer system 012, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
The processing unit 016 executes various functional applications and data processing by running a program stored in the system memory 028, for example, realizes a flow of a method provided by the embodiment of the present application.
The computer program described above may be provided in a computer storage medium, i.e. the computer storage medium is encoded with a computer program which, when executed by one or more computers, causes the one or more computers to perform the method flows and/or apparatus operations shown in the above-described embodiments of the application. For example, the method flow provided by embodiments of the present application may be performed by one or more of the processors described above.
With the development of time and technology, the media has a wider meaning, and the propagation path of the computer program is not limited to a tangible medium any more, and can be directly downloaded from a network, etc. Any combination of one or more computer readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
From the foregoing, it can be seen that the method, apparatus and computer storage medium provided by the present application may have the following advantages:
1) The application related WebView runs in an independent process and is separated from the application main process, so that even if the WebView is abnormal, the problem of application blocking caused by the application main process is not tired.
2) The detection thread provided in the process where the WebView is located can detect whether the WebView is abnormal or not, so that when the WebView is abnormal, the process where the WebView is located can be ended. Thus, after the WebView is restarted, the contents of other pages can be continuously accessed.
3) Independent processes can allocate independent memories, and application-related webviews run in the independent processes can enable applications to be allocated with more memories.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather to enable any modification, equivalent replacement, improvement or the like to be made within the spirit and principles of the application.
Claims (8)
1. A method of processing an application, the method comprising:
the method comprises the steps that WebView related to an application is operated in an independent process, and the process where the WebView is located comprises a detection thread; wherein the operating the WebView related to the application in a separate process includes: when the application host process calls the WebView, creating an independent process to run the WebView; creating the detection thread for detecting whether the WebView is abnormal in the independent process while the independent process is created;
if the detection thread detects that the WebView has an abnormality, ending the process of the WebView; the process of ending the WebView includes: calling a self-destruction method by a process in which the WebView is positioned;
if the detection thread does not detect that the WebView has an abnormality, reserving a process where the WebView is located when an event of exiting the browser is detected;
wherein detecting whether the WebView has an anomaly comprises:
the detection thread detects whether the loading progress of the WebView is abnormal or not; or,
the detection thread detects whether the WebView loads malicious content or not; or,
and the detection thread detects whether the occupation of the memory by the WebView exceeds a preset threshold value.
2. The method of claim 1, wherein running WebView associated with an application in a separate process comprises: and configuring the Process attribute of the WebView in an operating system declaration file so that the WebView runs in an independent Process.
3. The method of claim 1 or 2, wherein the independent process comprises a Tools process.
4. The method of claim 1, wherein the application host process calls WebView, creating a separate process to run WebView comprises:
the application main process detects an event that a webpage link on an application main interface is triggered;
creating an independent process to run the WebView and transferring the URL of the web page to the WebView.
5. The method of claim 1, wherein the application host process communicates with the process in which WebView is located via a description language of an inter-process communication interface.
6. The method of claim 1, wherein after ending the process in which the WebView is located, if the application host process calls WebView again, then recreating an independent process to run WebView.
7. An apparatus, the apparatus comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-6.
8. A storage medium containing computer executable instructions for performing the method of any of claims 1-6 when executed by a computer processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810089564.5A CN108334779B (en) | 2018-01-30 | 2018-01-30 | Application processing method, device and computing storage medium |
PCT/CN2019/073172 WO2019149150A1 (en) | 2018-01-30 | 2019-01-25 | Application processing method and device, and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810089564.5A CN108334779B (en) | 2018-01-30 | 2018-01-30 | Application processing method, device and computing storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108334779A CN108334779A (en) | 2018-07-27 |
CN108334779B true CN108334779B (en) | 2023-11-21 |
Family
ID=62926238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810089564.5A Active CN108334779B (en) | 2018-01-30 | 2018-01-30 | Application processing method, device and computing storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108334779B (en) |
WO (1) | WO2019149150A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108334779B (en) * | 2018-01-30 | 2023-11-21 | 上海连尚网络科技有限公司 | Application processing method, device and computing storage medium |
CN111104621A (en) * | 2019-11-29 | 2020-05-05 | 紫光云(南京)数字技术有限公司 | Network view memory optimization method and device, electronic equipment and computer-readable storage medium |
CN111782297A (en) * | 2020-06-30 | 2020-10-16 | 珠海全志科技股份有限公司 | Method for rapidly improving application starting performance based on Android virtual machine |
CN114625428B (en) * | 2020-12-10 | 2024-03-26 | 荣耀终端有限公司 | Application exception processing method and electronic equipment |
CN112667481B (en) * | 2020-12-31 | 2024-05-10 | 中国建设银行股份有限公司 | Data acquisition tool kit, method and equipment |
CN113806014A (en) * | 2021-08-26 | 2021-12-17 | 浪潮卓数大数据产业发展有限公司 | Webview loading optimization method based on virtual multi-open |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103064680A (en) * | 2012-12-25 | 2013-04-24 | 北京奇虎科技有限公司 | Plug-in playing method and device in browser |
CN103716295A (en) * | 2012-09-28 | 2014-04-09 | 株式会社得那 | Network system and non-transitory computer-readable storage medium |
EP2750069A1 (en) * | 2012-12-25 | 2014-07-02 | Kaspersky Lab, ZAO | Method and system for detecting malware using isolated environment |
CN104268019A (en) * | 2014-09-23 | 2015-01-07 | 广州金山网络科技有限公司 | Software operating method and device and terminal |
CN106649105A (en) * | 2016-12-08 | 2017-05-10 | 武汉斗鱼网络科技有限公司 | Detection methods and devices for memory leaks |
CN106874763A (en) * | 2017-01-16 | 2017-06-20 | 西安电子科技大学 | The Android software malicious act triggering system and method for modelling customer behavior |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102010027746A1 (en) * | 2010-04-14 | 2011-10-20 | Robert Bosch Gmbh | Method for operating a locking device and a locking device |
EP2864876B1 (en) * | 2012-06-26 | 2017-10-04 | Lynuxworks, Inc. | Systems and methods involving features of hardware virtualization such as separation kernel hypervisors, hypervisors, hypervisor guest context, hypervisor context, rootkit detection/prevention, and/or other features |
US20160057159A1 (en) * | 2014-08-22 | 2016-02-25 | Syracuse University | Semantics-aware android malware classification |
CN107145372A (en) * | 2017-05-09 | 2017-09-08 | 北京京东尚科信息技术有限公司 | information generating method and device |
CN108334779B (en) * | 2018-01-30 | 2023-11-21 | 上海连尚网络科技有限公司 | Application processing method, device and computing storage medium |
-
2018
- 2018-01-30 CN CN201810089564.5A patent/CN108334779B/en active Active
-
2019
- 2019-01-25 WO PCT/CN2019/073172 patent/WO2019149150A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103716295A (en) * | 2012-09-28 | 2014-04-09 | 株式会社得那 | Network system and non-transitory computer-readable storage medium |
CN103064680A (en) * | 2012-12-25 | 2013-04-24 | 北京奇虎科技有限公司 | Plug-in playing method and device in browser |
EP2750069A1 (en) * | 2012-12-25 | 2014-07-02 | Kaspersky Lab, ZAO | Method and system for detecting malware using isolated environment |
CN104268019A (en) * | 2014-09-23 | 2015-01-07 | 广州金山网络科技有限公司 | Software operating method and device and terminal |
CN106649105A (en) * | 2016-12-08 | 2017-05-10 | 武汉斗鱼网络科技有限公司 | Detection methods and devices for memory leaks |
CN106874763A (en) * | 2017-01-16 | 2017-06-20 | 西安电子科技大学 | The Android software malicious act triggering system and method for modelling customer behavior |
Also Published As
Publication number | Publication date |
---|---|
CN108334779A (en) | 2018-07-27 |
WO2019149150A1 (en) | 2019-08-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108334779B (en) | Application processing method, device and computing storage medium | |
US20200057660A1 (en) | Method and system for rendering user interfaces | |
CN110865888B (en) | Resource loading method and device, server and storage medium | |
EP2948846B1 (en) | Resource calling for hybrid applications | |
CN109194606B (en) | Attack detection system, method, computer device and storage medium | |
US20200057658A1 (en) | Method and system for loading resources | |
US20210182147A1 (en) | Method for memory management for browser of terminal, terminal, and non-transitory computer-readable storage medium | |
US20150222512A1 (en) | Event pages for web applications and extensions | |
US20140365861A1 (en) | Prefetching binary data for use by a browser plugin | |
CN111078367A (en) | Request processing method and device, electronic equipment and storage medium | |
CN110413432B (en) | Information processing method, electronic equipment and storage medium | |
CN109150956B (en) | Method, device and equipment for realizing SDK pushing and computer storage medium | |
CN110704131B (en) | Method and device for calling native application by HTML5 application | |
CN110045952B (en) | Code calling method and device | |
CN114205156A (en) | Message detection method and device for tangent plane technology, electronic equipment and medium | |
CN109783261B (en) | Crash processing method and device for terminal application, electronic equipment and storage medium | |
CN109933444A (en) | A kind of instant communication method between applying of lodging | |
CN111124627A (en) | Method, device, terminal and storage medium for determining application program caller | |
CN114490265A (en) | Data acquisition method, device, equipment and storage medium | |
CN113282363A (en) | Method and device for optimizing hybrid APP | |
CN112596824A (en) | Information interaction method and device, electronic equipment and storage medium | |
CN110990167A (en) | Front-end communication method and device, storage medium and electronic equipment | |
CN115617496B (en) | Method, device, electronic equipment and medium for communication between user mode and kernel mode | |
CN114266037B (en) | Sample detection method and device, electronic equipment and storage medium | |
CN113127051B (en) | Application resource packaging process monitoring method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |