Application access method, device and equipment

An access method and access request technology, applied in the computer field, can solve problems such as user information leakage and resource loss, and achieve the effect of reducing resource loss and reducing the probability of information leakage

Active Publication Date: 2019-07-26
ADVANCED NEW TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, external applications can evoke other applications by tampering with URL Schemes, and then steal the user's information of the application or induce the user to perform some involuntary behaviors, etc., resulting in user information leakage and even resource loss. Therefore, it is necessary to provide a control scheme for application access with lower risk of user information leakage and less capital loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application access method, device and equipment
  • Application access method, device and equipment
  • Application access method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Such as figure 1 As shown, the embodiment of this specification provides an application access method, and the execution body of the method may be a terminal device or a server, etc., wherein the terminal device may be a mobile terminal device such as a mobile phone or a tablet computer, or a personal computer, etc. equipment. This method can be used in processes such as judging whether to allow access to the redirected application program when the user jumps from one application program to another. The method specifically may include the following steps:

[0078] In step S102, the access request to the second application triggered in the first application is obtained, and the first application is an external application program of the second application.

[0079] Wherein, the first application may be any application, such as an instant messaging application, a shopping application, or a browser. The second application may be any application different from the first ...

Embodiment 2

[0101] Such as Figure 4 As shown, the embodiment of this specification provides a method for accessing an application. The method may be executed by a terminal device and a server, where the terminal device may be a personal computer or the like. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be a background server of a certain business (such as financial services, etc.), or a website (such as an online shopping website or payment application, etc.) background server, etc. This method can be used in processes such as judging whether to allow access to the redirected application program when the user jumps from one application program to another. The method specifically may include the following steps:

[0102] In step S402, the terminal device acquires an access request to the second application triggered by a target link in the first application based on the URL Schemes mechanism.

[0103] Wherein, the access ...

Embodiment 3

[0127] Such as Figure 5 As shown, the embodiment of this specification provides a method for accessing an application, and the execution subject of the method may be a terminal device, where the terminal device may be a personal computer or the like. This method can be used in processes such as judging whether to allow access to the redirected application program when the user jumps from one application program to another. This embodiment can be a detailed description of the situation where the access rules of an application are stored in the terminal device, and the method can specifically include the following steps:

[0128] In step S502, the terminal device acquires an access request to the second application triggered by a target link in the first application based on the URL Schemes mechanism.

[0129] In step S504, the terminal device obtains the access rule of the second application.

[0130] In step S506, the terminal device verifies the access rule according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an application access method, device and equipment, and the method comprises the steps: obtaining an access request for triggering a second application in a first application, and enabling the first application to be an external application program of the second application; obtaining an access rule of the second application, and performing skip identification on the access request according to the access rule to obtain an identification result; and determining whether to allow access to the second application according to the identification result.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to an application access method, device and equipment. Background technique [0002] All applications have URL (Uniform Resource Locator, Uniform Resource Locator) Schemes that open internal applications or functions. Based on URL Schemes, people can use a special URL to locate an application, or even one or some of the applications. Features. If the program code of an application program includes codes related to URL Schemes, the application program has a mechanism for calling other applications. [0003] Usually, URL Scheme can realize mutual calling between different applications. However, external applications can evoke other applications by tampering with URL Schemes, and then steal the user's information of the application or induce the user to perform some involuntary behaviors, etc., resulting in user information leakage and even resource loss. Therefore, it is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/2141
Inventor 张鹏
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products