Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key algorithm adding method and system of client, client and service end

A client-side and server-side technology, applied in the field of communications, can solve problems such as multi-system processing resources, reduced user experience, and large storage space.

Inactive Publication Date: 2017-01-18
GUANGZHOU PINWEI SOFTWARE
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since the user is downloading the new version of the APP, the required transmission traffic is relatively large, and the storage space occupied is also relatively large, and during the installation of the APP, it will occupy more system processing resources, thereby reducing the user's ability to use the APP. User experience in the process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key algorithm adding method and system of client, client and service end
  • Key algorithm adding method and system of client, client and service end
  • Key algorithm adding method and system of client, client and service end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] Embodiment 1 is a client key algorithm addition method provided by the embodiment of the present invention, refer to figure 1 As shown, the method includes:

[0106] 101. The client APP detects whether the key algorithm meets the preset condition, and if so, sends the key algorithm to the server.

[0107] Specifically, through any one of the following operations, the client APP detects whether the key algorithm meets the preset conditions:

[0108] detect missing key algorithms; or

[0109] The version of the detection key algorithm is lower than the current latest version; or

[0110] Detect critical algorithm corruption.

[0111] 102. The server encapsulates the key algorithm into a plug-in, and sends the plug-in to the client APP.

[0112] Specifically, set the communication configuration data between the key algorithm and the data layer;

[0113] Encapsulate communication configuration data and key algorithms into plug-ins.

[0114] 103. The client APP loads t...

Embodiment 2

[0121] Embodiment 2 is a client key algorithm addition method provided by the embodiment of the present invention, refer to figure 2 As shown, the method includes:

[0122] 201. Detect whether the key algorithm is missing, and if so, perform step 204.

[0123] Specifically, abnormal events during the running process of the client APP are detected, and the abnormal events include running errors, slow running speeds, normal running of the client APP, errors in loading content, and the like.

[0124] The above abnormal events can be realized by detecting the operation log of the client APP.

[0125] Analyze the abnormal event and detect whether the abnormal event is caused by the lack of a key algorithm.

[0126] 202. Detect whether the version of the key algorithm is lower than the current latest version, and if so, execute step 204.

[0127] Specifically, periodically check whether the version of the key algorithm is lower than the latest version released by the server, and...

Embodiment 3

[0156] Embodiment 3 is a client 3 provided by the embodiment of the present invention, refer to image 3 As shown, the client 3 includes:

[0157] A detection module 31, configured to detect whether the key algorithm meets a preset condition;

[0158] The sending module 32 is used to send the key algorithm to the server when the detection module detects that the key algorithm meets the preset conditions, so that the server encapsulates the key algorithm into the plug-in;

[0159] The receiving module 33 is used to receive the plug-in sent by the server;

[0160] The first loading module 34 is used to load the plug-in into the plug-in environment;

[0161] The second loading module 35 is configured to load key algorithms in the plug-in in the plug-in environment.

[0162] Optionally, the detection module 31 includes:

[0163] The first detection sub-module 311 is used to detect the absence of key algorithms;

[0164] The second detection submodule 312 is used to detect tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key algorithm adding method and system of a client, the client and a service end, and belongs to the communication field. The method comprises that a client APP detects whether a key algorithm satisfies a preset condition, and if YES, the key algorithm is sent to the service end; the service end packages the key algorithm into a plug-in, and sends the plug-in to the client APP; the client APP loads the plug-in in a plug-in environment; and the client APP loads the key algorithm in the plug-in in the plug-in environment. The key algorithm is added to the client via the plug-in; and compared with the prior art, the key algorithm is not added to the client by downloading and installing an APP, the data transmission flow in the key algorithm adding process of the client is reduced, occupation in the storage space and system processing resources is reduced, and user experience is improved.

Description

technical field [0001] The invention relates to the communication field, in particular to a client key algorithm adding method, system, client and server. Background technique [0002] On current smart terminals, users can install third-party application programs (Application, APP) to meet their own usage needs. In order to facilitate the use of users and improve the user experience, it is often necessary to update the key algorithms built into the APP. [0003] However, in the prior art, the process of updating the key algorithm built in the APP usually requires the APP provider to release a new version of the APP, and the user needs to download and install the new version of the APP to update the key algorithm built in the APP. [0004] Since the user is downloading the new version of the APP, the required transmission traffic is relatively large, and the storage space occupied is also relatively large, and during the installation of the APP, it will occupy more system pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725G06F9/445
CPCG06F8/61G06F8/65H04M1/72403
Inventor 陈焯浩许杰锋容金松
Owner GUANGZHOU PINWEI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products