CN113687891A - Data management method, device and equipment - Google Patents

Data management method, device and equipment Download PDF

Info

Publication number
CN113687891A
CN113687891A CN202110815672.8A CN202110815672A CN113687891A CN 113687891 A CN113687891 A CN 113687891A CN 202110815672 A CN202110815672 A CN 202110815672A CN 113687891 A CN113687891 A CN 113687891A
Authority
CN
China
Prior art keywords
application
program
host
data
data management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110815672.8A
Other languages
Chinese (zh)
Inventor
黄智辉
高林峰
乐开明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Innovation Co
Original Assignee
Alibaba Singapore Holdings Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Singapore Holdings Pte Ltd filed Critical Alibaba Singapore Holdings Pte Ltd
Priority to CN202110815672.8A priority Critical patent/CN113687891A/en
Publication of CN113687891A publication Critical patent/CN113687891A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/34Graphical or visual programming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides a data management method, a device and equipment, wherein the method comprises the following steps: displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function; and responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program. The application can guarantee the safety and controllability of the data provided by the host application to the parasitic application, and can reduce the development cost of the parasitic application.

Description

Data management method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data management method, apparatus, and device.
Background
An applet is an application that runs on the host application without requiring download installation.
Generally, an applet running on a host application needs to provide a data management page, on one hand, the applet can obtain data through the data management page provided by the applet, and on the other hand, the applet needs to obtain data from the host application, so as to ensure the security and controllability of the data provided by the host application to the applet and reduce the development cost of an applet developer, which is a problem that needs to be solved by the developer providing the host application.
Disclosure of Invention
Embodiments of the present application provide a data management method, an apparatus, and a device, so as to solve the problem in the prior art of how to ensure the security and controllability of data provided by a host application to an applet, and reduce the development cost of an applet developer.
In a first aspect, an embodiment of the present application provides a data management method, including:
displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
In a second aspect, an embodiment of the present application provides a data management apparatus, including:
the display module is used for displaying a page of a parasitic application, the page comprises a control used for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and used for providing a data management function;
and the calling module is used for responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory, a processor; wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the method of any of the first aspects.
In a fourth aspect, the present application provides a computer program product comprising computer instructions, wherein the computer instructions, when executed by a processor, implement the steps of the method according to any one of the first aspect.
Embodiments of the present application further provide a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, and the computer program includes at least one piece of code, which is executable by a computer to control the computer to perform the method according to any one of the first aspect.
In the embodiment of the application, a developer of the host application can develop a public program for providing a data management function on the host application, the public program is located between the parasitic application and the host application, data management is achieved through the public program, the parasitic application is not required to provide a data management page, development cost of the parasitic application is reduced, host data obtained by the parasitic application can be limited by the public program, the host data can be prevented from being obtained by the parasitic application at will, and safety and controllability of data provided by the host application to the parasitic application are guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a data management method according to an embodiment of the present application;
FIG. 2 is a diagram illustrating the relationship between a parasitic application, a common program, and a host application according to an embodiment of the present disclosure;
FIG. 3 is a diagram illustrating relationships among parasitic applications, common programs, and host applications according to another embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating the interaction among a hosted application, a main program, a main application, and a server according to an embodiment of the present application;
FIGS. 5A-5D are schematic views of pages provided by embodiments of the present application;
fig. 6 is a schematic structural diagram of a data management apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, and "a" and "an" typically include at least two, but do not exclude the presence of at least one.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
In addition, the sequence of steps in each method embodiment described below is only an example and is not strictly limited.
For the convenience of those skilled in the art to understand the technical solutions provided in the embodiments of the present application, a technical environment for implementing the technical solutions is described below.
In the related art, the applet acquires data from the host application by calling an interface function provided by the host application, or the applet provides a data management page and acquires data through the data management page provided by the applet. However, the former method has a problem that data in the host application is randomly acquired by the applet, resulting in uncontrolled data and reduced security, and the latter method has a problem that the development cost of the applet is high, so that there is a need in the related art for a data management method that can ensure the security and controllability of data provided by the host application to the applet and reduce the development cost of the applet developer.
Based on the actual technical requirements similar to those described above, the data management method provided by the application can ensure the security and controllability of the data provided by the host application to the applet by using a technical means, and reduce the development cost of the applet developer.
The data management method provided by the embodiment of the Application can be applied to any type of electronic equipment capable of deploying Application programs (APPs). An application program that can serve as a host of another application program, that is, a host application, may be deployed in the electronic device, and an application program that is hosted in the host application and runs by relying on the host application is a hosted application. In one embodiment, the parasitic application may be specifically a small program.
It should be noted that, when the application includes a client application and a server application, the hosted application in the embodiment of the present application specifically refers to an application client as a host.
In order to ensure the controllability of data acquisition from the host application by the parasitic application and reduce the development cost of a developer of the parasitic application, in the embodiment of the application, the developer of the host application can develop a public program for providing a data management function on the host application, the public program is positioned between the parasitic application and the host application, the data management is realized through the public program, the parasitic application is not required to provide a data management page, the development cost of the parasitic application is reduced, the public program can limit the parasitic application to acquire the host data, the host data is prevented from being acquired by the parasitic application at will, and the safety and the controllability of the data provided by the host application to the parasitic application are ensured.
It should be noted that, in the embodiments of the present application, the parasitic application is mainly exemplified as a small program.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Fig. 1 is a schematic flow chart of a data management method according to an embodiment of the present application, and an execution subject of the embodiment may be the electronic device. As shown in fig. 1, the method of this embodiment may include:
step 11, displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and step 12, responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
In the embodiment of the application, the specific form of the common program can be flexibly realized. In one embodiment, the common program may be implemented in the form of an applet. In another embodiment, the common program may be implemented in the form of a plug-in.
The relationship between the host application, the parasitic application and the common program may be as shown in fig. 2. Referring to fig. 2, the common program 21 is located between the host application 22 and the parasitic application 23, the parasitic application 23 may call the common program 21 under the trigger of the interaction operation, and the common program 21 may call the interface function of the host application 22 as needed. It should be noted that the number of parasitic applications parasitic in the same host application may be one or more. When the number of the parasitic applications is plural, as shown in fig. 3, the plural parasitic applications may call a common program at different times.
In the embodiment of the present application, the control used for triggering the parasitic application to call the common program in the page of the parasitic application may be, for example, a button control, and certainly, in other embodiments, other types of controls may also be used, which is not limited in the present application. It will be appreciated that the type of interactive operation for the control corresponds to the type of control. For example, when the control is a button control, the interactive operation for the control may be, for example, a click operation.
In the embodiment of the application, the public program can provide a data management function in a page mode. Pages in a common program may be rendered by a web view (webview), for example. In one embodiment, the page layout of the common program may be fixed, thereby facilitating simplified implementation.
Optionally, the page of the common program includes a return button for returning to the page of the parasitic application. Therefore, the user can regard the page of the public program as the page of the parasitic application, so that the public program is not aware of the user, and the use experience of the user is improved.
In the embodiment of the application, the public program can provide a data management function and can be flexibly realized according to requirements. Illustratively, the data management functions may include at least one of: add function, query function, modify function, delete function, or authorize function.
The query function refers to a function for providing query host data. Based on this, the implementing data management by the common program may specifically include: and calling a first interface function of the host application through the public program to acquire host data from the host application and display the host data in a page of the public program. Therefore, the situation that the user repeatedly inputs data existing in the host application can be avoided, and the use experience is improved. Wherein the first interface function is an interface function provided by the host application for querying data.
Authorization function refers to a function for providing authorization data, and in one embodiment, the authorization function may be used to authorize the queried host data. Based on this, the page of the public program may include an authorization control, such as an authorization button, and the implementing data management by the public program may further include: when an authorization operation instruction for the inquired host data is obtained through an authorization control, an authorization identifier of the host data is generated; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the host data to the parasitic application as a call return value. Therefore, the user can select whether to authorize the inquired host data to the parasitic application, and the problem that the parasitic application obtains the inquired host data without authorization of the user is avoided. The authorization identifier may be obtained by means of an information-summarization Algorithm 5(MD5, Message-Digest Algorithm 5) on the queried host data, which is beneficial to improve the security of the host data.
Further, if the authorization operation instruction is not obtained, preset authorization failure data may be used as a call return value. So that the parasitic application can know that the reason for unsuccessful acquisition of data is an authorization failure, i.e. the user does not agree with the authorization.
Further, if a binding success indication returned by the server is not received, the preset internal abnormal data can be used as a call return value. So that the parasitic application can know that the reason for unsuccessful acquisition of data is an internal exception, i.e. the user agrees to authorize, but fails to return the data due to the exception occurring during the authorization process.
The modification function refers to a function for providing host data to which a modification is made. Based on this, a modification control can be included in the page of the common program; the implementing data management by the common program may further include: and when a modification operation instruction for the queried host data is obtained through the modification control, correspondingly modifying the queried host data according to the modification operation instruction to obtain the modified host data.
Further, the implementing data management by the common program may further include: and when the modification operation instruction aiming at the inquired host data is obtained through the modification control, calling a second interface function of the host application through the public program so as to correspondingly modify the host data in the host application. Therefore, the modification of the queried host data by the user in the process of using the public program can be stored in the host application locally, the user does not need to repeatedly modify the host application, and the use experience is improved. Wherein the second interface function is an interface function provided by the host application for modifying the data.
In one embodiment, the authorization function may be used to authorize the modified host data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction for the modified host data is obtained through the authorization control, an authorization identifier of the modified host data is generated; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the modified host data serving as a call return value to the parasitic application. Therefore, the user can select whether to authorize the modified host data to the parasitic application, and the problem that the parasitic application obtains the modified host data without authorization of the user is avoided.
The add function refers to a function for providing add data. Based on this, the implementing data management by the common program may include: and acquiring input data through the displayed page of the public program.
Further, the implementing data management by the common program may further include: calling, by the common program, a third interface function of the host application to pass the input data to the host application. Therefore, the data added by the user in the process of using the public program can be used as the host application and stored in the local host application, the user does not need to add the data repeatedly in the process of using the host application, and the use experience is improved. And the third interface function is an interface function provided by the host application and used for adding the new data.
In one embodiment, an authorization function may be used to authorize the input data. Similarly, the implementing data management by the common program may further include: when an authorization operation instruction for input data is acquired through an authorization control, an authorization identifier of the input data is generated; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the input data to the parasitic application as a call return value. Therefore, the user can select whether to authorize the input data to the parasitic application, and the problem that the parasitic application does not authorize the user to obtain the input data is avoided.
The delete function is a function for providing deletion of the queried host data. Based on this, a delete control can be included in the page of the common program; the implementing data management by the common program may further include: and when a deletion operation instruction for the inquired host data is acquired through the deletion control, deleting the inquired host data according to the deletion operation instruction.
Further, the implementing data management by the common program may further include: and when the deletion operation aiming at the inquired host data is acquired through the deletion control, calling a fourth interface function of the host application through a public program so as to delete the host data in the host application. Therefore, the deletion of the queried host data in the process of using the public program by the user can be acted on the host application and deleted from the host application locally, the repeated deletion of the user in the process of using the host application is not needed, and the use experience is favorably improved. Wherein the fourth interface function is an interface function provided by the host application for deleting data.
In the embodiment of the application, the page layout of the public program can also be variable, so that the flexibility of page display is favorably improved. Based on this, the calling and running the common program may include: calling and running the common program by using the target parameters; the implementing data management by the common program may further include: and rendering and displaying the page of the public program by adopting display logic corresponding to the target parameter.
Taking the function of querying hosted data from a hosted application through a public program and deciding by a user whether to authorize the queried hosted data to a hosted application, the interaction of the hosted application, the public program, the hosted application, and a server may be as shown in fig. 4, for example. Referring to fig. 4, in step 41, a user input is directed to an interactive operation in a page of the parasitic application for triggering a specific control that invokes a common program. As shown in fig. 5A, taking the host application as a map-like application and the parasitic application as an applet x providing a vehicle violation query function as an example, the "add vehicle" button in fig. 5A may represent a specific control for triggering to invoke a public program, and the applet x may be triggered to invoke the public program by a user inputting a click operation for the "add vehicle" button. It will be appreciated that the page shown in FIG. 5A is a page of applet x.
Next, in step 42, the parasitic application invokes the common program in response to the interaction with the particular control. In step 43, the common program calls a first interface function of the host application, and in step 44 the host application passes the queried host data to the common program as a call return value. The common program may display the queried host data in a page of the common program in step 45 to request the user to authorize the queried host data. After the steps 42 to 45, the page shown in fig. 5B can be jumped to from the page shown in fig. 5A. The vehicle number "123" and engine number "123456" in fig. 5B represent the queried host data, the "immediate authorization" button may represent the authorization control, and the "<" button in the upper left corner may represent the return button described previously.
Thereafter, if the public program obtains an authorized operation instruction of the user for the queried host data, the public program may send a binding request for requesting to bind the queried host data and the parasitic application to the server in step 46. For example, if a click operation for the "immediate authorization" button in fig. 5B is acquired, a binding request for requesting binding of the applet x with the license plate number "123" and the engine number "123456" may be sent to the server.
If the server successfully binds the queried host data and the hosted application, the server returns a binding success indication to the common program in step 47. Further, in step 48, the common program may pass the queried host data to the hosted application as a call return value. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the host data). For example, on the basis of fig. 5B, if the public program acquires the click operation of the user on the "immediate authorization" button first and then acquires the click operation of the user on the "<" button, the public program may transmit the license plate number "123" and the engine number "123456" to the parasitic application, the parasitic application may obtain corresponding violation information according to the query of the license plate number "123" and the engine number "123456", and display the obtained violation information in the page as shown in fig. 5C, where the violation information may include, for example, the number of violations, the amount to be penalized, and the deduction. It will be appreciated that the page shown in FIG. 5C is also a page of applet x.
If the common program does not receive a binding success indication returned by the server, the common program may pass the internal exception data to the parasitic application as a call return value in step 49. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the internal exception data).
If the public program does not obtain an authorization operation instruction for the queried authorization data, the public program may pass authorization failure data to the parasitic application as a call return value in step 410. Thereafter, in step 411, the parasitic application may perform corresponding processing and presentation according to the returned data (i.e., the authorization failure data). For example, on the basis of fig. 5B, if the public program does not acquire a click operation instruction for the "immediate authorization" button before acquiring a click operation instruction for the "<" button, the public program may transfer authorization failure data to the parasitic application, and the parasitic application may determine that authorization fails according to the authorization failure data and display prompt information for prompting the authorization failure in a page as shown in fig. 5D, where the prompt information for the authorization failure may be "unauthorized acquisition", for example. It will be appreciated that the page shown in FIG. 5D is also a page of applet x.
It should be noted that the pages shown in fig. 5A to 5D are only examples.
According to the data management method provided by the embodiment of the application, the page of the parasitic application is displayed, the page comprises the control used for triggering the parasitic application to call the public program, the public program is located between the parasitic application and the host application of the parasitic application, the public program is called and operated in response to the interactive operation aiming at the control, the data management is realized through the public program located between the host application and the parasitic application, the parasitic application is not required to provide the data management page, the development cost of the parasitic application is reduced, the parasitic application can be limited by the public program to obtain the host data, and the safety and controllability of the data provided by the host application to the parasitic application are guaranteed.
In addition, data management is realized through a public program, the User Interface (UI) style of a data management page can be unified, and the use experience of a User is improved. Under the condition that a plurality of host applications are operated in the same host application, the data management function is provided by the common program, so that the resources required by the operation of the parasitic application can be saved, and the page loading speed of the parasitic application is improved.
Fig. 6 is a schematic structural diagram of a data management apparatus according to an embodiment of the present application; referring to fig. 6, the present embodiment provides a data management apparatus, which may execute the data management method described above, and specifically, the data management apparatus may include:
the display module 61 is configured to display a page of a parasitic application, where the page includes a control for triggering the parasitic application to call a common program, and the common program is located between the parasitic application and a host application thereof, and is used to provide a data management function;
and the calling module 62 is used for responding to the interactive operation aiming at the space, calling and running the public program, and realizing data management through the public program.
Optionally, the data management function includes at least one of the following: add function, query function, modify function, delete function, or authorize function.
Optionally, the calling module 62 is configured to implement data management through the common program, and includes: and calling a first interface function of the host application through the public program so as to acquire host data from the host application and display the host data in a page of the public program.
Optionally, the page of the public program includes an authorization control; the calling module 62 is configured to implement data management through the common program, and further includes: when an authorization operation instruction for the host data is obtained through the authorization control, an authorization identifier of the host data is generated; sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server of the host program according to the authorization identifier; and responding to the binding success indication returned by the server, and transmitting the host data serving as a call return value to the parasitic application.
Optionally, the page of the public program includes a modification control; the calling module 62 is configured to implement data management through the common program, and further includes: and when a modification operation instruction for the host data is acquired through the modification control, calling a second interface function of the host application through the public program so as to correspondingly modify the host data in the host application.
Optionally, the calling module 62 is configured to implement data management through the common program, and includes: acquiring input data through the displayed page of the public program; and calling a third interface function of the host application through the common program to transfer the input data to the host application.
Optionally, the calling module 62 is configured to call and run the common program, and includes: calling and running the common program by using the target parameters; the calling module 62 is configured to implement data management through the common program, and further includes: and rendering and displaying the page of the public program by adopting display logic corresponding to the target parameter.
The apparatus shown in fig. 6 can perform the method of the embodiment shown in fig. 1, and reference may be made to the related description of the embodiment shown in fig. 1 for a part of this embodiment that is not described in detail. The implementation process and technical effect of the technical solution refer to the description in the embodiment shown in fig. 1, and are not described herein again.
In one possible implementation, the structure of the data management apparatus shown in fig. 6 may be implemented as an electronic device. As shown in fig. 7, the electronic device may include: a processor 71 and a memory 72. Wherein the memory 72 is used for storing a program for supporting the electronic device to execute the data management method provided in the embodiment shown in fig. 1, and the processor 71 is configured for executing the program stored in the memory 72.
The program comprises one or more computer instructions which, when executed by the processor 71, are capable of performing the steps of:
displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
Optionally, the processor 71 is further configured to perform all or part of the steps in the embodiment 1 shown in fig. 1.
The electronic device may further include a communication interface 73 for communicating with other devices or a communication network.
In addition, the present application provides a computer storage medium for storing computer software instructions for an electronic device, which includes a program for executing the data management method of the method embodiment shown in fig. 1.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by adding a necessary general hardware platform, and of course, can also be implemented by a combination of hardware and software. With this understanding in mind, the above-described technical solutions and/or portions thereof that contribute to the prior art may be embodied in the form of a computer program product, which may be embodied on one or more computer-usable storage media having computer-usable program code embodied therein (including but not limited to disk storage, CD-ROM, optical storage, etc.).
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A method of data management, wherein the method comprises:
displaying a page of a parasitic application, wherein the page comprises a control for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and is used for providing a data management function;
and responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
2. The method of claim 1, wherein the data management function comprises at least one of: add function, query function, modify function, delete function, or authorize function.
3. The method of claim 2, wherein said implementing data management by said common program comprises:
and calling a first interface function of the host application through the public program so as to acquire host data from the host application and display the host data in a page of the public program.
4. The method of claim 3, wherein a page of the common program includes an authorization control; the data management is realized through the public program, and the method further comprises the following steps:
when an authorization operation instruction for the host data is obtained through the authorization control, an authorization identifier of the host data is generated;
sending a binding request for requesting to bind the authorization identifier and the parasitic application to a server of the host program according to the authorization identifier;
and responding to the binding success indication returned by the server, and transmitting the host data to the parasitic application as a call return value.
5. The method of claim 3, wherein a modification control is included in a page of the common program; the data management is realized through the public program, and the method further comprises the following steps:
and when a modification operation instruction for the host data is acquired through the modification control, calling a second interface function of the host application through the public program so as to correspondingly modify the host data in the host application.
6. The method of claim 2, wherein said implementing data management by said common program comprises:
acquiring input data through the displayed page of the public program;
calling, by the common program, a third interface function of the host application to pass the input data to the host application.
7. The method of claim 3 or 6, wherein said invoking and running the common program comprises: calling and running the common program by using the target parameters;
the data management is realized through the public program, and the method further comprises the following steps: and rendering and displaying the page of the public program by adopting display logic corresponding to the target parameter.
8. A data management apparatus, wherein the apparatus comprises:
the display module is used for displaying a page of a parasitic application, the page comprises a control used for triggering the parasitic application to call a public program, and the public program is positioned between the parasitic application and a host application thereof and used for providing a data management function;
and the calling module is used for responding to the interactive operation aiming at the control, calling and running the public program, and realizing data management through the public program.
9. An electronic device, comprising: a memory, a processor; wherein the memory is to store one or more computer instructions, wherein the one or more computer instructions, when executed by the processor, implement the method of any of claims 1 to 7.
10. A computer program product comprising computer instructions, wherein the computer instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 7.
CN202110815672.8A 2021-07-19 2021-07-19 Data management method, device and equipment Pending CN113687891A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110815672.8A CN113687891A (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110815672.8A CN113687891A (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Publications (1)

Publication Number Publication Date
CN113687891A true CN113687891A (en) 2021-11-23

Family

ID=78577439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110815672.8A Pending CN113687891A (en) 2021-07-19 2021-07-19 Data management method, device and equipment

Country Status (1)

Country Link
CN (1) CN113687891A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531432A (en) * 2022-02-14 2022-05-24 浙江吉利控股集团有限公司 Cross-platform based service communication method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110083465A (en) * 2019-04-26 2019-08-02 上海连尚网络科技有限公司 A kind of data transferring method between applying of lodging
CN110083413A (en) * 2019-03-13 2019-08-02 维沃移动通信有限公司 A kind of small routine call method and terminal device
CN111158799A (en) * 2019-12-31 2020-05-15 北京百度网讯科技有限公司 Page rendering method and device, electronic equipment and storage medium
CN111737032A (en) * 2020-07-27 2020-10-02 腾讯科技(深圳)有限公司 Subprogram running method and device based on microkernel system and electronic equipment
CN111782300A (en) * 2020-07-08 2020-10-16 支付宝(杭州)信息技术有限公司 Data processing method, device, equipment and system
CN112416613A (en) * 2020-10-23 2021-02-26 腾讯科技(深圳)有限公司 Application data processing method, device, equipment and medium
CN112559980A (en) * 2020-11-24 2021-03-26 珠海凡泰极客科技有限责任公司 Applet operation capable of embedding numerous arbitrary APPs
US20210211522A1 (en) * 2020-06-30 2021-07-08 Beijing Baidu Netcom Science and Technology Co., Ltd Mini app processing method, server, device and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110083413A (en) * 2019-03-13 2019-08-02 维沃移动通信有限公司 A kind of small routine call method and terminal device
CN110083465A (en) * 2019-04-26 2019-08-02 上海连尚网络科技有限公司 A kind of data transferring method between applying of lodging
CN111158799A (en) * 2019-12-31 2020-05-15 北京百度网讯科技有限公司 Page rendering method and device, electronic equipment and storage medium
US20210211522A1 (en) * 2020-06-30 2021-07-08 Beijing Baidu Netcom Science and Technology Co., Ltd Mini app processing method, server, device and storage medium
CN111782300A (en) * 2020-07-08 2020-10-16 支付宝(杭州)信息技术有限公司 Data processing method, device, equipment and system
CN111737032A (en) * 2020-07-27 2020-10-02 腾讯科技(深圳)有限公司 Subprogram running method and device based on microkernel system and electronic equipment
CN112416613A (en) * 2020-10-23 2021-02-26 腾讯科技(深圳)有限公司 Application data processing method, device, equipment and medium
CN112559980A (en) * 2020-11-24 2021-03-26 珠海凡泰极客科技有限责任公司 Applet operation capable of embedding numerous arbitrary APPs

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114531432A (en) * 2022-02-14 2022-05-24 浙江吉利控股集团有限公司 Cross-platform based service communication method and device

Similar Documents

Publication Publication Date Title
US11762986B2 (en) System for securing software containers with embedded agent
CN110363026B (en) File operation method, device, equipment, system and computer readable storage medium
US20190324772A1 (en) Method and device for processing smart contracts
US20200120082A1 (en) Techniques for securing credentials used by functions
CN108255497B (en) Application deployment method and device
CN109478134A (en) With the on-demand network code of across account nickname execution
CN109818937A (en) For the control method of Android permission, device and storage medium, electronic device
CN109783118B (en) FPGA cloud host development method and system
US20160350525A1 (en) Application Program Management Method, Device, Terminal, and Computer Storage Medium
CN113672353B (en) Task execution method and device based on container
CN109923547B (en) Program behavior monitoring device, distributed object generation management device, storage medium, and program behavior monitoring system
CN108334404B (en) Application program running method and device
CN115048642B (en) Communication method between trusted applications in multi-trusted execution environment and electronic equipment
CN113687891A (en) Data management method, device and equipment
CN112988062B (en) Metadata reading limiting method and device, electronic equipment and medium
CN116578957A (en) Account operation request response method and device and electronic equipment
US10698703B2 (en) Mobile application management by run-time insertion of a substitute application class loader into a mobile application process
CN109388770B (en) Web page generation method and device
CN109783156B (en) Application starting control method and device
CN113282363A (en) Method and device for optimizing hybrid APP
CN113254108A (en) Store operation method and device based on small program, electronic equipment and storage medium
CN112988353A (en) Operation control method and device for application program
CN106909408B (en) Method and device for calling APK plug-in of application program
CN109150863B (en) Desktop cloud access control method and device and desktop cloud terminal equipment
US20240095148A1 (en) Automatic assignment of changed permissions for diagnostic purposes for work container instances that have already been started

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240308

Address after: # 03-06, Lai Zan Da Building 1, 51 Belarusian Road, Singapore

Applicant after: Alibaba Innovation Co.

Country or region after: Singapore

Address before: Room 01, 45th Floor, AXA Building, 8 Shanton Road, Singapore

Applicant before: Alibaba Singapore Holdings Ltd.

Country or region before: Singapore