A multiplexing method of a service module and a reusable service module
A business module and business processing technology, applied in the communication field, can solve problems such as business processes affecting application development efficiency, and achieve the effect of improving development efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0049] see figure 1 , which is a flow chart of a service module multiplexing method provided in the embodiment of the present application. This method is applied to business modules.
[0050] Such as figure 1 As shown, the multiplexing method of the business module provided by the embodiment of the present application includes:
[0051] Step 101: After the identification field of the configuration class is changed from the identification of the first application program to the identification of the second application program under the call of the second application program, the business module reads the identification field in the configuration class, Executing a service function according to the identifier of the second application program.
[0052]In this embodiment, the first application program and the second application program have the same functions with different business processes. As an example, the same function of the first application program and the second ap...
no. 2 example
[0066] see figure 2 , which is a flow chart of another service module multiplexing method provided by the embodiment of the present application.
[0067] Such as figure 2 As shown, the multiplexing method of the service module provided in this embodiment includes:
[0068] Step 201: After the identification field of the configuration class is changed from the identification of the first application program to the identification of the second application program under the call of the second application program, the business module reads the identification field.
[0069] It should be noted that, in this embodiment, both the first application program and the second application program have an encryption function and a registration function. Encapsulate the encryption function and the registration function into a business module in advance. When the second application program calls the business module, it transfers its own identity to the configuration class of the business ...
no. 3 example
[0083] see image 3 , which is a flow chart of another service module multiplexing method provided by the embodiment of the present application.
[0084] Such as image 3 As shown, the multiplexing method of the service module provided in this embodiment includes:
[0085] Step 301: Under the invocation of the second application program, the identification field of the configuration class changes from the identification of the first application program to the identification of the second application program, and the user interface UI configuration parameters of the configuration class change from the first application program After the UI configuration parameters of the second application program become the UI configuration parameters of the second application program, the service module reads the identification field, and executes the service function according to the identification of the second application program.
[0086] In this embodiment, the configuration class incl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


