CN111625288A - Application program starting control method and device, computer equipment and storage medium - Google Patents

Application program starting control method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111625288A
CN111625288A CN202010342166.7A CN202010342166A CN111625288A CN 111625288 A CN111625288 A CN 111625288A CN 202010342166 A CN202010342166 A CN 202010342166A CN 111625288 A CN111625288 A CN 111625288A
Authority
CN
China
Prior art keywords
information
application program
component
preset
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010342166.7A
Other languages
Chinese (zh)
Other versions
CN111625288B (en
Inventor
林泽楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN202010342166.7A priority Critical patent/CN111625288B/en
Publication of CN111625288A publication Critical patent/CN111625288A/en
Application granted granted Critical
Publication of CN111625288B publication Critical patent/CN111625288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Stored Programmes (AREA)

Abstract

The application relates to a method and a device for controlling starting of an application program, computer equipment and a storage medium. The method comprises the following steps: acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in a terminal is started in an off-line state; analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information; acquiring preset key information corresponding to the component information; matching the character string information with the preset key information; and when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program. By adopting the method, the complicated operation flow and the consumption of a large amount of time can be effectively avoided, the operation flow for changing the setting is greatly simplified, and convenience is provided for users.

Description

Application program starting control method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for controlling starting of an application program, a computer device, and a storage medium.
Background
With the development of computer technology, various types of communication equipment are increasing, and convenience is brought to daily work and life of people. In the actual use process of various communication devices, some problems may be caused by operation problems of users or defects of the communication devices, and configuration information of related components of the communication devices needs to be reset.
For example, when a user uses a certain specific function of the 5G communication device overseas, it is often necessary to return the configuration information change process to the factory in conjunction with the 5G communication device identification code information.
However, in the conventional method, when configuration information of a certain component in the communication device needs to be changed, the component needs to be returned to the original factory and the corresponding USB hardware needs to be installed, and then a professional can perform an operation of rewriting the configuration information after decryption by combining the USB hardware, which is cumbersome to operate and requires a lot of time.
Disclosure of Invention
In view of the above, it is desirable to provide a method and apparatus for controlling the start of an application program, a computer device, and a storage medium, which can simplify operations.
A method of controlling the launching of an application, the method comprising:
acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in a terminal is started in an off-line state;
analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
acquiring preset key information corresponding to the component information;
matching the character string information with the preset key information;
and when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program.
In one embodiment, when the application program in the terminal is started, the acquiring component information, positioning information, and time tolerance information corresponding to a preset protocol includes:
sending an information query request to a mapped preset interface;
receiving the component information which is sent by the preset interface according to the information query request and supports the expansion of the preset interface equipment;
and acquiring the positioning information corresponding to the current system according to the component information.
In one embodiment, when the application program in the terminal is started, the acquiring component information, positioning information, and time tolerance information corresponding to a preset protocol includes:
acquiring epoch time corresponding to a current system and preset use time of the application program;
and performing mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information.
In one embodiment, the parsing the component information, the positioning information, and the time tolerance information to generate corresponding character string information includes:
performing hybrid operation on the component information, the positioning information and the time tolerance information by using a hash function to generate a corresponding hash value;
and performing correlation operation on the hash value to generate corresponding character string information.
In one embodiment, after generating the corresponding character string information, the method further includes:
extracting key character information of the character string information;
matching the key character information with preset key information;
when the matching is successful, triggering the application program to run in the corresponding component;
and when the matching fails, triggering the application program to automatically close, and exiting the application program interface.
An apparatus for controlling the start of an application, the apparatus comprising:
the acquisition module is used for acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in the terminal is started in an off-line state; acquiring preset key information corresponding to the component information;
the analysis module is used for analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
the matching module is used for matching the character string information with the preset key information;
and the modification module is used for allowing the application program to run in the component when the matching is successful, and modifying the setting of the component by using the application program.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in a terminal is started in an off-line state;
analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
acquiring preset key information corresponding to the component information;
matching the character string information with the preset key information;
and when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in a terminal is started in an off-line state;
analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
acquiring preset key information corresponding to the component information;
matching the character string information with the preset key information;
and when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program.
According to the starting control method and device of the application program, the computer equipment and the storage medium, when the application program in the terminal is started in an off-line state, the component information, the positioning information and the time tolerance information corresponding to the preset protocol are obtained. Compared with the traditional mode of changing the configuration information of the communication equipment, the corresponding character string information is generated by analyzing the component information, the positioning information and the time tolerance information. And acquiring preset key information corresponding to the component information, and matching the character string information with the preset key information. And when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program. Therefore, when the configuration information of a certain component in the communication equipment needs to be changed, the configuration information of the certain component in the communication equipment can be changed and set by acquiring the component information, the positioning information and the time tolerance information corresponding to the preset protocol, generating the corresponding character string information by utilizing the component information, the positioning information and the time tolerance information, matching the character string information with the preset key information, dynamically regulating the corresponding time tolerance range by comprehensively controlling the specific component information, the position information and the time tolerance information, and starting the application program to modify the configuration information of the specific component when the character string information generated by the client is successfully matched with the preset key information, thereby effectively avoiding the complicated operation flow and the consumption of a large amount of time in the traditional mode, the operation flow for changing the setting is greatly simplified, and convenience is provided for the user.
Drawings
FIG. 1 is a flowchart illustrating a method for controlling the start of an application according to an embodiment;
FIG. 2 is a flowchart illustrating a step of obtaining time tolerance information corresponding to a predetermined protocol when an application in a terminal is started according to an embodiment;
FIG. 3 is a flowchart illustrating the steps of analyzing the component information, the positioning information, and the time tolerance information to generate corresponding string information according to an embodiment;
FIG. 4 is a block diagram showing the configuration of an application start control device according to an embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In one embodiment, as shown in fig. 1, a method for controlling the start of an application is provided, and this embodiment is exemplified by applying the method to a terminal, which may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. It is understood that the method can also be applied to a server, and can also be applied to a system comprising a terminal and a server, and is realized through the interaction of the terminal and the server. In this embodiment, the method includes the steps of:
step 102, acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in the terminal is started in an off-line state.
The intelligent terminal is one kind of embedded computer system equipment, and the software structure may be divided into system software and application software. In the software structure of the intelligent terminal, system software mainly comprises an operating system and middleware, and common intelligent terminal operating systems include Linux, Windows CE, Symbian OS, iPhone OS and the like. Users using mobile terminals with different operating systems can download various types of application programs through application market interfaces in the intelligent terminal, and the application programs can include system application programs, desktop application programs, driving application programs, network application programs, mobile phone application programs, Internet of things application programs and the like. From the functional division of the user's usage of the application, the different types of applications may include, in turn, instant messaging applications, online shopping applications, video and audio entertainment applications, and the like. In a traditional mode, an intelligent terminal can communicate with a server corresponding to a software developer through a network, and the intelligent terminal is kept in an online state through network communication connection. Different types of terminal equipment may be connected to a wireless network or a local area network, for example, using carrier-stabilized network transmissions, however, for some software developers with physical hardware, most software products in some specific industry fields communicate with the hardware, and the communication connection with the server by setting the account number for login needs to consume huge development cost and maintenance cost, therefore, for some tool software products which do not need to keep connecting with the server for communication transmission in real time, such as a system maintenance tool, a file filing tool and the like used for a 5G communication module, or under the condition that the region where the intelligent terminal is located cannot be connected to a domestic server or the intelligent terminal cannot be networked at all, the existing mode of communicating with the server corresponding to the software developer through the network cannot meet the requirements of the client. The tool software may include various types, for example, the system class mainly includes a hardware tool and a system maintenance tool. The image class includes a host of software for creating, editing, modifying, viewing, etc. The multimedia category mainly includes audio and video playing of media and file format conversion. The network class may include small commercial software developed by a software vendor, an advantageous tool to solve some specific problems.
When the terminal does not communicate with a server corresponding to a software developer through a network, namely, when an application program in the terminal is started in an off-line state, the terminal acquires component information, positioning information and time tolerance information corresponding to a preset protocol. The mobile terminal is a kind of embedded computer system equipment, and the software structure can be divided into system software and application software. In the software structure of the mobile terminal, the system software is mainly an operating system and middleware, and common operating systems of the mobile terminal include IOS of apple, Android of ***, WebOS of hewlett packard, MeeGo of open source, microsoft Windows, and the like. Users of the mobile terminal using different operating systems can download various types of tool applications through the application market interface in the mobile terminal, for example, the currently common tool applications including but not limited to a file archiving application, a video clip application, a picture beautifying application and the like all support the offline state to use corresponding functions. Specifically, an Android operating system is taken as an example. In the off-line state, a user can start an application program into a page corresponding to the application program by clicking the application program with a specific function in the main interface of the mobile terminal device. When the mobile terminal detects that a user presses an application icon with a certain specific function on a main interface of a display screen, namely the user starts an application program in the mobile terminal, the mobile terminal acquires corresponding component information, positioning information and time tolerance information according to a preset protocol. The preset protocol may include preset information of the designated use time, information of the designated use place, information of the designated running component module, and the like of the application program.
And 104, analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information.
In an off-line state, when the terminal detects that a user presses an application icon with a certain specific function on a main interface of a display screen, namely the user starts an application program in the mobile terminal, the terminal acquires corresponding component information, positioning information and time tolerance information according to a preset protocol. Further, the terminal analyzes the acquired component information, positioning information and time tolerance information to generate corresponding character string information. The component information may include factory serial number information (SN), international mobile equipment identity information (IMEI), central processing unit serial number information (CPUID), and the like corresponding to a specific module, where the serial number information is used to uniquely identify the corresponding module. The positioning information refers to the real-time geographic position information of the current communication equipment obtained through a Global Navigation Satellite System (Global Navigation Satellite System), different types of radar sensors are installed on the terminal, and the terminal can receive corresponding transmission data through the radar sensors to obtain the real-time longitude and latitude coordinate data of the current position. The time tolerance information refers to a time range set when the application program is used, and the larger the time tolerance is, the larger the range of the use time is, and the purpose of the time tolerance is to effectively control the use time of the application program. Specifically, the terminal can obtain corresponding component information, positioning information and time tolerance information through a serial port set in a preset protocol, and the terminal can analyze the component information, the positioning information and the time tolerance information according to a function set in the preset protocol, so that the allowable deviation time can be adjusted in a user-defined manner, and corresponding character string information is generated. The character string information includes character string information corresponding to a time tolerance operator.
And step 106, acquiring preset key information corresponding to the component information.
The terminal analyzes the acquired component information, positioning information and time tolerance information, generates corresponding character string information, and then can acquire preset key information corresponding to the component information in various ways. The key information is corresponding sequence information generated according to a preset function algorithm. For example, in an offline state in which the terminal device cannot be in communication connection with the server, the user may obtain key information corresponding to the current device component from the developer through the third-party device, which may include but is not limited to obtaining the preset key information through a mail, a telephone, third-party communication software, and the like. The user can negotiate with the software developer to specify the specific time range, geographical location and specific module to be used, and only when the specified time, location and module are met, the user can use the tool software, i.e. the application is started to perform the setting and updating operation. The preset key information is generated by a software developer according to the time range appointed by a user, the appointed geographic position and the appointed component module, and the key information corresponding to the appointed terminal equipment has the unique identification function.
And step 108, matching the character string information with preset key information.
After the terminal can acquire the preset key information corresponding to the component information in various ways, the terminal matches the character string information with the preset key information. Namely, the terminal matches the character string information generated in the current state with the acquired key information preset by the terminal equipment. Specifically, the terminal may decode the acquired preset key information to obtain corresponding original character string information, for example, 3des is used for parsing to obtain original character string information corresponding to the preset key information, and complete matching is performed according to the original character string information and the character string information generated by the current terminal device, that is, it is verified whether the character string information generated by the current terminal device is completely matched with the preset key information, for example, it is determined whether the generated character string type is matched with the character string type of the preset key, or it is determined whether the character string length is matched with the character string length of the preset key, and only when the character string information generated by the current terminal device is completely matched with the preset key information, that is, when the verification is successful, the terminal may perform the next operation.
And step 110, when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program.
And the terminal matches the character string information generated in the current state with the acquired key information preset by the terminal equipment, and when the matching is successful, the terminal allows the application program to run in the component and modifies the setting of the component by using the application program. Specifically, the terminal matches the character string information generated in the current state with the acquired key information preset by the terminal device, and when the matching is successful, that is, the character string information generated by the current terminal device is verified to be completely matched with the preset key information, the user can operate the application program in the specified component, and change the setting of the specified component by using the application program. The designated components may include different types of modules in the end system, such as system modules, network modules, multimedia modules, and the like.
In this embodiment, in an offline state, when the application program in the terminal is started, component information, positioning information, and time tolerance information corresponding to a preset protocol are acquired. Compared with the traditional mode of changing the configuration information of the communication equipment, the corresponding character string information is generated by analyzing the component information, the positioning information and the time tolerance information. And acquiring preset key information corresponding to the component information, and matching the character string information with the preset key information. And when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program. Therefore, when the configuration information of a certain component in the communication equipment needs to be changed, the configuration information of the certain component in the communication equipment can be changed and set by acquiring the component information, the positioning information and the time tolerance information corresponding to the preset protocol, generating the corresponding character string information by utilizing the component information, the positioning information and the time tolerance information, matching the character string information with the preset key information, dynamically regulating the corresponding time tolerance range by comprehensively controlling the specific component information, the position information and the time tolerance information, and starting the application program to modify the configuration information of the specific component when the character string information generated by the client is successfully matched with the preset key information, thereby effectively avoiding the complicated operation flow and the consumption of a large amount of time in the traditional mode, the operation flow for changing the setting is greatly simplified, and convenience is provided for the user.
In one embodiment, when the application program in the terminal is started, the step of acquiring the component information, the positioning information and the time tolerance information corresponding to the preset protocol includes:
sending an information query request to the mapped preset interface, receiving the component information which is sent by the preset interface according to the information query request and is supported and expanded by the preset interface equipment, and acquiring the positioning information corresponding to the current system according to the component information.
In an off-line state, when the terminal detects that a user presses an application icon with a certain specific function on a main interface of a display screen, namely the user starts an application program in the mobile terminal, the terminal acquires corresponding component information, positioning information and time tolerance information according to a preset protocol. Specifically, the terminal sends an information query request to the mapped preset interface, the terminal receives the component information that the preset interface device supports expansion and is sent by the preset interface according to the information query request, and the terminal acquires the positioning information corresponding to the current system according to the component information. For example, the terminal may send an information query request to a preset MBIM interface, and the MBIM interface sends the component information supporting the extension to the terminal according to the information query request, that is, the terminal receives the corresponding component information supporting the extension, and the terminal obtains the positioning information corresponding to the current system according to the component information. The user may communicate with the corresponding module through the AT instruction, and the acquired corresponding module information may include factory serial number information (SN), international mobile equipment identity information (IMEI), central processing unit serial number information (CPU ID), and the like. Therefore, the terminal equipment can acquire the appointed component information and the position information corresponding to the current component information according to the preset protocol, namely, the specific component information and the position information are comprehensively controlled, the position information range corresponding to the component information is dynamically adjusted, the terminal equipment can be started in the appointed component and the appointed position through the control application program, the change setting permission of the appointed component configuration information is further controlled, the operation flow of changing the setting is greatly simplified, a user can modify and change the setting of the appointed component at any time and any place, and convenience is brought to the user.
In one embodiment, as shown in fig. 2, when the application program in the terminal is started, the step of acquiring the time tolerance information corresponding to the preset protocol includes:
step 202, obtaining the epoch time corresponding to the current system and the preset use time of the application program.
And 204, performing mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information.
In an off-line state, when the terminal detects that a user presses an application icon with a certain specific function on a main interface of a display screen, namely the user starts an application program in the mobile terminal, the terminal acquires corresponding component information, positioning information and time tolerance information according to a preset protocol. Specifically, the terminal obtains epoch time corresponding to the current system and preset use time of the application program, and the terminal performs mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information. Where epoch time refers to the Unix timestamp is a time representation defined as the total number of seconds from greenwich mean time 1970, 01, 00 minutes 00 seconds to the present, regardless of leap seconds. The Unix epoch time is theoretically the same on all computers, and there may be very small deviations for some machines, which record the total number of seconds from Greenwich mean time 1970, 01, 00 hours, 00 minutes, 00 seconds, to the present. The numerical value is not influenced by time in a system calendar and cannot be changed easily in theory, and even if two different terminal devices are used, the same time numerical value can be calculated according to Unix epoch time, so that the Unix epoch time is adopted as one of operators participating in function operation. Specifically, the terminal acquires epoch time, namely a Unix timestamp, corresponding to the current system, meanwhile, the terminal acquires preset service time of the application program through a preset protocol, and the terminal performs mixed operation on the epoch time and the preset service time of the application program to obtain corresponding time tolerance information. For example, the terminal may perform a hybrid operation on the epoch time and the preset use time of the application program by using a hash algorithm and a square-sum method to obtain corresponding time tolerance information. The Unix epoch time is accurate to the second, and assuming that the preset use time of the application program is 1 minute, the terminal acquires the Unix epoch time of the current system, divides the Unix epoch time by 60s, rounds the result, and discards the remainder, so that from this moment, the Unix epoch time generated by all terminal equipment in 60 seconds is divided by 60, rounds the result, discards the remainder, and the obtained numerical values are the same, and are 60-second tolerance, and the corresponding time tolerance information can be freely controlled. Therefore, Unix epoch time is used as an operator participating in function operation, effective control over starting time of the application program on different terminal devices can be guaranteed, the application program can be used only in preset protocol designated time, designated modules and designated place ranges, and cannot be started under other conditions, timeliness and safety of changing and setting certain component configuration information in communication equipment are effectively guaranteed, operation procedures of changing and setting are greatly simplified, and convenience is provided for users.
In one embodiment, as shown in fig. 3, the step of analyzing the component information, the positioning information, and the time tolerance information to generate corresponding character string information includes:
step 302, a hash function is used to perform a hybrid operation on the component information, the positioning information, and the time tolerance information, so as to generate a corresponding hash value.
Step 304, the hash value is subjected to correlation operation to generate corresponding character string information.
In an off-line state, when the terminal detects that a user presses an application icon with a certain specific function on a main interface of a display screen, namely the user starts an application program in the mobile terminal, the terminal acquires corresponding component information, positioning information and time tolerance information according to a preset protocol. Further, the terminal analyzes the acquired component information, positioning information and time tolerance information to generate corresponding character string information. Specifically, the terminal performs a hybrid operation on the component information, the positioning information, and the time tolerance information by using a hash function to generate a corresponding hash value, and performs a correlation operation on the hash value by using the terminal to generate corresponding character string information. Among them, a Hash algorithm (Hash) is a Hash function. The hash algorithm is a one-way cryptosystem, i.e. an irreversible mapping from plaintext to ciphertext, only an encryption process and no decryption process. Meanwhile, the hash function can change the input with any length to obtain the output with fixed length. This one-way feature of the hash function and the fixed-length feature of the output data enable it to generate messages or data. In the analysis stage, the terminal calculates a fixed hash value and a hash value and character string corresponding relation table according to the acquired component information, positioning information and time tolerance information, so as to ensure that the calculated hash values of the same character strings are the same. Further, the terminal may use a square-of-middle method, i.e., a hash function construction method. The terminal extracts the square of the keyword according to the algorithm, and then selects the middle bits of the square number as hash function values according to the size of the usable space, namely the generated character string information. The hash function values generated by the method are uniform, the hash function values obtained by different keywords are not easy to conflict, the generated character string information and the preset key information can be guaranteed to have uniqueness, when the character string information generated by the client is successfully matched with the preset key information, the configuration information of the specific component can be modified by starting the application program, the complex operation flow and the consumption of a large amount of time in the traditional mode are effectively avoided, the application program is controlled to be started in the specific component, the configuration information of a certain component in the communication equipment can be changed and set, the operation flow for changing the setting is greatly simplified, and convenience is provided for a user.
In one embodiment, after generating the corresponding character string information, the method further includes a step of matching the key character information with preset key information, which specifically includes:
and extracting key character information of the character string information.
And matching the key character information with preset key information.
And when the matching is successful, triggering the application program to run in the corresponding component.
And when the matching fails, triggering the application program to automatically close, and quitting the application program interface.
The terminal analyzes the acquired component information, the positioning information and the time tolerance information, generates corresponding character string information, extracts key character information of the character string information according to a preset protocol, and matches the key character information with preset key information. And when the matching is successful, the terminal triggers the application program to run in the corresponding component. And when the matching fails, the terminal triggers the application program to automatically close and quits the application program interface. Specifically, the terminal extracts key character information corresponding to the character string information according to a preset protocol, and the terminal matches the key character information with preset key information. That is, it is checked whether the character string information generated by the current terminal device is completely matched with the preset key information, for example, it may be determined whether the generated character string type is matched with the character string type of the preset key, or it may be determined whether the character string length is matched with the character string length of the preset key, only when the character string information generated by the current terminal device is completely matched with the preset key information, that is, when the check is successful, the terminal triggers the application program to operate in the corresponding component, and the user may modify the setting of the component by using the application program. When matching fails, namely when the character string information generated by the current terminal equipment is inconsistent with the preset key information, namely verification fails, the terminal triggers the application program to automatically close, an application program interface is quitted, and a user cannot modify the setting of the component by using the application program. Therefore, only when the character string information generated by the client is successfully matched with the preset key information, the configuration information of the specific component can be modified by starting the application program, the self starting and non-starting of the application program can be effectively controlled, the complex operation flow and the consumption of a large amount of time in the traditional mode are effectively avoided, the configuration information of a certain component in the communication equipment can be changed and set by controlling the application program to be started in the specific component, the operation flow for changing the setting is greatly simplified, and convenience is provided for a user.
It should be understood that although the various steps in the flow charts of fig. 1-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 4, there is provided an application start control apparatus including: an obtaining module 402, a parsing module 404, a matching module 406, and a modifying module 408, wherein:
an obtaining module 402, configured to obtain component information, positioning information, and time tolerance information corresponding to a preset protocol when an application in a terminal is started in an offline state; and acquiring preset key information corresponding to the component information.
And an analyzing module 404, configured to analyze the component information, the positioning information, and the time tolerance information, and generate corresponding character string information.
And a matching module 406, configured to match the character string information with preset key information.
And a modification module 408, configured to allow the application to run in the component when the matching is successful, and modify the setting of the component by using the application.
In one embodiment, the apparatus further comprises: the device comprises a sending module and a receiving module.
The sending module is used for sending an information query request to the mapped preset interface. The receiving module is used for receiving the component information which is sent by the preset interface according to the information query request and supports the expansion of the preset interface equipment. The acquisition module is further used for acquiring the positioning information corresponding to the current system according to the component information.
In one embodiment, the apparatus further comprises: and an operation module.
The operation module is used for acquiring epoch time corresponding to the current system and preset use time of the application program, and performing mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information.
In one embodiment, the operation module is further configured to perform a hybrid operation on the component information, the positioning information, and the time tolerance information by using a hash function to generate a corresponding hash value; and performing correlation operation on the hash value to generate corresponding character string information.
In one embodiment, the apparatus further comprises: and an extraction module.
The extraction module is used for extracting key character information of the character string information. The matching module is also used for matching the key character information with preset key information; when the matching is successful, triggering the application program to run in the corresponding component; and when the matching fails, triggering the application program to automatically close, and quitting the application program interface.
For specific limitations of the start control device of the application program, reference may be made to the above limitations of the start control method of the application program, which are not described herein again. The modules in the starting control device of the application program can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a startup control method of an application program. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the steps of the above-described method embodiments being implemented when the computer program is executed by the processor.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of controlling the launching of an application, the method comprising:
acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in a terminal is started in an off-line state;
analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
acquiring preset key information corresponding to the component information;
matching the character string information with the preset key information;
and when the matching is successful, allowing the application program to run in the component, and modifying the setting of the component by using the application program.
2. The method of claim 1, wherein the acquiring component information, positioning information, and time tolerance information corresponding to a preset protocol when the application program in the terminal is started comprises:
sending an information query request to a mapped preset interface;
receiving the component information which is sent by the preset interface according to the information query request and supports the expansion of the preset interface equipment;
and acquiring the positioning information corresponding to the current system according to the component information.
3. The method of claim 1, wherein the acquiring component information, positioning information, and time tolerance information corresponding to a preset protocol when the application program in the terminal is started comprises:
acquiring epoch time corresponding to a current system and preset use time of the application program;
and performing mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information.
4. The method of claim 1, wherein the parsing the component information, the positioning information, and the time tolerance information to generate corresponding string information comprises:
performing hybrid operation on the component information, the positioning information and the time tolerance information by using a hash function to generate a corresponding hash value;
and performing correlation operation on the hash value to generate corresponding character string information.
5. The method of claim 4, wherein after generating the corresponding string information, the method further comprises:
extracting key character information of the character string information;
matching the key character information with preset key information;
when the matching is successful, triggering the application program to run in the corresponding component;
and when the matching fails, triggering the application program to automatically close, and exiting the application program interface.
6. An apparatus for controlling the start of an application program, the apparatus comprising:
the acquisition module is used for acquiring component information, positioning information and time tolerance information corresponding to a preset protocol when an application program in the terminal is started in an off-line state; acquiring preset key information corresponding to the component information;
the analysis module is used for analyzing the component information, the positioning information and the time tolerance information to generate corresponding character string information;
the matching module is used for matching the character string information with the preset key information;
and the modification module is used for allowing the application program to run in the component when the matching is successful, and modifying the setting of the component by using the application program.
7. The device for controlling the start of an application according to claim 6, characterized by further comprising:
the operation module is used for acquiring epoch time corresponding to a current system and preset service time of the application program; and performing mixed operation on the epoch time and the preset use time of the application program to obtain corresponding time tolerance information.
8. The device for controlling the start of an application according to claim 6, characterized by further comprising:
the operation module is further used for performing mixed operation on the component information, the positioning information and the time tolerance information by using a hash function to generate a corresponding hash value; and performing correlation operation on the hash value to generate corresponding character string information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202010342166.7A 2020-04-27 2020-04-27 Method and device for controlling starting of application program, computer equipment and storage medium Active CN111625288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010342166.7A CN111625288B (en) 2020-04-27 2020-04-27 Method and device for controlling starting of application program, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010342166.7A CN111625288B (en) 2020-04-27 2020-04-27 Method and device for controlling starting of application program, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111625288A true CN111625288A (en) 2020-09-04
CN111625288B CN111625288B (en) 2023-09-08

Family

ID=72270857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010342166.7A Active CN111625288B (en) 2020-04-27 2020-04-27 Method and device for controlling starting of application program, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111625288B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112463156A (en) * 2020-11-25 2021-03-09 福建天泉教育科技有限公司 Method and terminal for linkage verification of component attributes

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229144A (en) * 2018-01-12 2018-06-29 百富计算机技术(深圳)有限公司 A kind of verification method of application program, terminal device and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229144A (en) * 2018-01-12 2018-06-29 百富计算机技术(深圳)有限公司 A kind of verification method of application program, terminal device and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112463156A (en) * 2020-11-25 2021-03-09 福建天泉教育科技有限公司 Method and terminal for linkage verification of component attributes
CN112463156B (en) * 2020-11-25 2023-04-28 福建天泉教育科技有限公司 Method and terminal for component attribute linkage verification

Also Published As

Publication number Publication date
CN111625288B (en) 2023-09-08

Similar Documents

Publication Publication Date Title
CN108595970B (en) Configuration method and device of processing assembly, terminal and storage medium
US20180336049A1 (en) Crowdsourced on-boarding of digital assistant operations
JP4293234B2 (en) Connection management method and connection management server in thin client
CN110620812B (en) Interactive information pushing method and device, computer equipment and storage medium
US20160210363A1 (en) Contextual search using natural language
US20120260202A1 (en) Customized launching of applications
JP2003114806A (en) Os updating method, security control method, and apparatus for accomplishing the same
WO2014012449A1 (en) Method, device, processing center and system for desktop synchronization
CN104756080A (en) Augmenting capabilities of a host device
CN111744174A (en) Account management method and device of cloud game, account login method and device and electronic equipment
CN113568699B (en) Content display method, device, equipment and storage medium
CN112527397A (en) Method and device for modifying basic input output system options and computer equipment
CN113553218A (en) Method for cloning and backing up real machine based on cloud mobile phone, terminal device and storage medium
CN108664274A (en) Implementation method, system and the device of operating system initialization configuration
CN113393367A (en) Image processing method, apparatus, device and medium
CN111222153A (en) Application program authority management method and device and storage medium
CN111625288B (en) Method and device for controlling starting of application program, computer equipment and storage medium
US10847135B2 (en) Sharing commands and command groups across digital assistant operations
US9785711B2 (en) Online location sharing through an internet service search engine
US8838596B2 (en) Systems and methods to process enquires by receving and processing user defined scopes first
WO2019083604A1 (en) Sharing commands and command groups across digital assistant operations
CN114238806A (en) Page display method, page display device, computer equipment, storage medium and program product
CN113312672B (en) Method and device for hiding user identity aiming at target applet
US11789972B2 (en) Data synchronization for content consumed via a client application
CN114328272B (en) Application testing method, device and system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant