Application program execution method and device
A technology of application programs and execution methods, applied in the field of communication, can solve problems such as failure to use normally, abnormalities, program crashes, etc., to achieve the effect of avoiding application program crashes, improving stability, and ensuring normal operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0032] see figure 1 , figure 1 It is a schematic flowchart of the method for executing an application program provided in the first embodiment of the present invention. The methods include:
[0033] Step S101, acquiring an operation instruction set corresponding to an execution object. Wherein, the operation instruction set includes several operation instructions arranged in execution order.
[0034] It can be understood that when an application program is executed, several operation instructions need to be executed in the process of processing the execution object by the application program. The execution object may include multiple files.
[0035] For example, the application program needs to execute the following operation instructions when processing all files in the execution object, such as file opening, reading, writing, parsing, closing and other operation instructions. It can be understood that the operation instruction set corresponding to the file includes seve...
no. 2 example
[0049] Please also refer to figure 2 , figure 2 It is a schematic flowchart of the method for executing an application program provided by the second embodiment of the present invention. The methods include:
[0050] Step S201, performing a hash operation on the execution object to generate an identifier.
[0051] It can be understood that the hash operation is performed by a hash algorithm. The hash algorithm generates a fixed-length character string by performing operations on a character string of any length, and the generated character string represents all characters in the original character string, and is unique. The hash algorithm is a one-way cryptographic system, which is an irreversible mapping from plaintext to ciphertext. There is only an encryption process and no decryption process. Commonly used hash algorithms include MD4 (Message-Digest Algorithm 4, Message Digest Algorithm 4th Edition), MD5 (Message-Digest Algorithm 5, Message Digest Algorithm 5th Editi...
no. 3 example
[0080] see image 3 , image 3 It is a schematic structural diagram of a device for executing an application program provided by the third embodiment of the present invention. The device includes a first acquisition module 32 , a search module 33 , a judgment module 34 , an execution module 35 , and a second acquisition module 36 .
[0081] Wherein, the first acquiring module 32 is configured to acquire an operation instruction set corresponding to an execution object. Wherein, the operation instruction set includes several operation instructions arranged in execution order.
[0082] For example, the first obtaining module 32 obtains the operation instruction set U corresponding to the execution object, U={F 1 , F 2 , F 3 ...,F n}.
[0083] The search module 33 is configured to search in the exception record table whether there is an exception record for the first operation instruction.
[0084] For example, when executing file N 1 , the search module 33 searches the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


