[go: up one dir, main page]

WO2018185919A1 - Programme, procédé d'exécution de programme et dispositif terminal - Google Patents

Programme, procédé d'exécution de programme et dispositif terminal Download PDF

Info

Publication number
WO2018185919A1
WO2018185919A1 PCT/JP2017/014423 JP2017014423W WO2018185919A1 WO 2018185919 A1 WO2018185919 A1 WO 2018185919A1 JP 2017014423 W JP2017014423 W JP 2017014423W WO 2018185919 A1 WO2018185919 A1 WO 2018185919A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
program
application
terminal device
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2017/014423
Other languages
English (en)
Japanese (ja)
Inventor
悠吾 松田
康弘 露木
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to PCT/JP2017/014423 priority Critical patent/WO2018185919A1/fr
Priority to JP2019511027A priority patent/JP7017161B2/ja
Publication of WO2018185919A1 publication Critical patent/WO2018185919A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication

Definitions

  • the present invention relates to a program, a program execution method, and a terminal device.
  • the function of an application may be expanded by adding a plug-in to the application that operates on the terminal device.
  • the prior art for example, there is one that acquires identification information of an activation source program corresponding to an operation object on which a predetermined operation has been performed, and switches a moving image to be reproduced based on the identification information of the activation source program. Further, for example, when receiving attribute information of a user who uses a serial code, there is a technique of responding with a reward specifying information previously associated with the attribute information of the user. In addition, for example, there is a technology for extracting Web API identification information included in an OS function execution request acquired from a Web application via Web API, and executing a function module stored in association with the extracted Web API identification information. is there.
  • an object of the present invention is to provide a program that can be linked between programs, a method for executing the program, and a terminal device.
  • activation is performed in accordance with an operation instruction including instruction identification information from another program operating on the terminal device, an operation corresponding to the operation instruction is executed, and data is output to the operation Is included, a program that operates on the terminal device is proposed in which the data is associated with the instruction identification information and stored in a storage area that can be referred to by the other program.
  • FIG. 1 is an explanatory diagram of an example of a program execution method according to the embodiment.
  • FIG. 2 is a block diagram illustrating a hardware configuration example of the terminal device 100.
  • FIG. 3 is an explanatory diagram showing an example of the contents stored in the instruction management DB 300.
  • FIG. 4 is an explanatory diagram showing an example of the contents stored in the content DB 400.
  • FIG. 5 is an explanatory diagram showing an example of the contents stored in the file DB 500.
  • FIG. 6 is a block diagram illustrating a functional configuration example of the terminal device 100.
  • FIG. 7 is an explanatory diagram (part 1) illustrating the first embodiment.
  • FIG. 8 is an explanatory diagram (part 2) of the first embodiment.
  • FIG. 1 is an explanatory diagram of an example of a program execution method according to the embodiment.
  • FIG. 2 is a block diagram illustrating a hardware configuration example of the terminal device 100.
  • FIG. 3 is an explanatory diagram showing an example of the contents stored in the instruction management
  • FIG. 9 is a flowchart (part 1) illustrating an example of a cooperation processing procedure executed by the mobile application 710.
  • FIG. 10 is a flowchart (part 2) illustrating an example of the cooperation processing procedure executed by the mobile application 710.
  • FIG. 11 is a flowchart illustrating an example of an operation processing procedure executed by the external application 720.
  • FIG. 1 is an explanatory diagram of an example of a program execution method according to the embodiment.
  • the terminal device 100 is a computer that operates a plurality of programs on its own device.
  • the plurality of programs are, for example, a plurality of applications.
  • the plurality of applications include, for example, a mobile application and an external application.
  • mobile applications may be referred to as “mobile apps”.
  • an external application may be referred to as “external application”.
  • the terminal device 100 is, for example, a smartphone or a tablet terminal.
  • adding a plug-in to the mobile application leads to an increase in the data size of the mobile application.
  • changing the plug-in may increase the data size of the mobile application. For this reason, when distributing a mobile application, the communication burden concerning a smart phone etc. will increase.
  • the plug-in added to the mobile application uses the memory capacity allocated from the OS (Operating System) for the mobile application in common with the main routine of the mobile application. For this reason, the memory capacity used by the mobile application becomes larger than the memory capacity allocated from the OS to the mobile application, and the memory capacity may be insufficient.
  • OS Operating System
  • the mobile application may start an external application such as a barcode reader via a URL scheme (Uniform Resource Locator Scheme).
  • a URL scheme Uniform Resource Locator Scheme
  • a user can cause an external application to read a plurality of data one by one, but each time the external application reads the data, the data is transmitted to the mobile application and moved to the background. Become. For this reason, whenever a user makes an external application read data, an external application will be moved to a foreground again, and the convenience, such as a smart phone, will fall.
  • the external application sends a plurality of data to the mobile app after the user has read a plurality of data, but when the external app reads some of the plurality of data May be forcibly terminated and the read data may be lost. For this reason, after having the external application read some of the multiple data to the external application, if the external application is forcibly terminated, the user will be able to read multiple data again, reducing the convenience of smartphones, etc. Resulting in.
  • the mobile app may receive data via the URL scheme even from an unauthorized app different from the activated external app. For this reason, there is a possibility that the mobile application may cause a decrease in security of a smartphone or the like.
  • identification information for identifying the mobile application is passed to the external application, and if the identification information is not attached to the received data, the data is discarded. If you want to. However, even in this case, the mobile application cannot discard the data from the unauthorized application if the identification information passed to the external application in the past is diverted to the unauthorized application.
  • cooperation between applications is realized by using instruction identification information that is included in an instruction issued by a mobile application to an external application via a URL scheme and identifies the instruction itself.
  • instruction identification information that is included in an instruction issued by a mobile application to an external application via a URL scheme and identifies the instruction itself.
  • the terminal device 100 can operate the first application 101 and the second application 102 on its own device.
  • the first application 101 is an external application activated by a mobile application.
  • the external application is, for example, a barcode reader.
  • the second application 102 is a mobile application.
  • the first application 101 is activated in response to an operation instruction including instruction identification information from the second application 102.
  • the mobile application activates an external application through the OS by executing a URL scheme including instruction identification information. Thereby, the external application can acquire the instruction identification information.
  • the first application 101 executes an operation corresponding to the operation instruction.
  • the external application reads data from the barcode based on, for example, a user operation input. Thereby, the external application is an output target and can read data to be acquired by the mobile application.
  • the first application 101 associates the data with the instruction identification information and stores the data in a storage area that can be referred to by the second application 102.
  • the external application stores the read data in a storage area that can be referred to by the mobile application in association with the instruction identification information included in the operation instruction.
  • the second application 102 can read out and acquire the data saved by the first application 101 from the storage area, and can use the data.
  • an external application can implement
  • the terminal device 100 can suppress an increase in the data size of the mobile application by linking the mobile application and the external application. And even if the creator of a mobile application changes the external application and increases the data size of the external application, the mobile application need not be changed and the data size of the mobile application need not be increased. For this reason, if the producer redistributes the external application, the mobile application does not have to be redistributed, and the communication burden on the terminal device 100 can be reduced. Similarly, the producer does not have to redistribute the external application even when the mobile application is changed.
  • the terminal device 100 can allocate a memory capacity to each of the mobile application and the external application by the OS. For this reason, the terminal device 100 can reduce the possibility that the memory capacity used by the mobile application becomes larger than the memory capacity allocated to the mobile application from the OS and the memory capacity becomes insufficient. Similarly, the terminal device 100 can reduce the possibility that the memory capacity used by the external application becomes larger than the memory capacity assigned to the external application from the OS, and the memory capacity is insufficient.
  • each time an external application acquires data it can store the data. For this reason, even if the external application is forcibly terminated, the possibility of losing data can be reduced. Further, each time an external application acquires data, the possibility of losing data can be reduced without transmitting the data to the mobile application.
  • the external application need not transmit the data to the mobile application and move the mobile application to the foreground. For this reason, the external application moves to the foreground every time data is acquired when the user tries to perform an operation input for acquiring a plurality of data continuously, making it difficult for the user to perform an operation input. It is possible to reduce the possibility of the occurrence.
  • FIG. 2 is a block diagram illustrating a hardware configuration example of the terminal device 100.
  • the terminal device 100 includes a CPU (Central Processing Unit) 201, a memory 202, a network I / F (Interface) 203, a recording medium I / F 204, a recording medium 205, and a touch panel 206. Each component is connected by a bus 200.
  • the CPU 201 controls the entire terminal device 100.
  • the memory 202 includes, for example, a ROM (Read Only Memory), a RAM (Random Access Memory), a flash ROM, and the like. Specifically, for example, a flash ROM or ROM stores various programs, and a RAM is used as a work area of the CPU 201. The program stored in the memory 202 is loaded on the CPU 201 to cause the CPU 201 to execute the coded process.
  • the network I / F 203 is connected to the network 210 via a communication line, and is connected to another computer via the network 210.
  • the network I / F 203 controls an internal interface with the network 210 and controls data input / output from other computers.
  • a modem or a LAN adapter can be employed as the network I / F 203.
  • the recording medium I / F 204 controls reading / writing of data with respect to the recording medium 205 according to the control of the CPU 201.
  • the recording medium I / F 204 is, for example, a disk drive, an SSD (Solid State Drive), a USB (Universal Serial Bus) port, or the like.
  • the recording medium 205 is a non-volatile memory that stores data written under the control of the recording medium I / F 204.
  • the recording medium 205 is, for example, a disk, a semiconductor memory, a USB memory, or the like.
  • the recording medium 205 may be detachable from the terminal device 100.
  • the recording medium 205 may store the application according to the embodiment.
  • the touch panel 206 has a display for displaying data such as a document, an image, and function information as well as a cursor, an icon or a tool box.
  • the touch panel 206 is provided on the display or on the outer periphery of the display, and has a detection device that detects the contact position of the user on the touch panel 206.
  • the detection device detects the contact position using, for example, a resistance film method, a capacitance method, an ultrasonic method, an optical method, or an electromagnetic induction method.
  • the touch panel 206 inputs characters, numbers, various instructions and the like according to the contact position of the user.
  • the terminal device 100 may include, for example, a keyboard, a mouse, a display, and the like in addition to the above-described components. Further, the terminal device 100 may not include the recording medium I / F 204 and the recording medium 205.
  • the instruction management DB 300 is realized by, for example, the memory 202 or the recording medium 205 of the terminal device 100 illustrated in FIG.
  • FIG. 3 is an explanatory diagram showing an example of the contents stored in the instruction management DB 300.
  • the instruction management DB 300 includes fields for an identification ID, a content ID, a user ID, a data storage destination, and an issue date / time.
  • the instruction management DB 300 stores the operation instruction information as a record by setting information in each field for each operation instruction.
  • an identification ID for identifying a URL scheme to be an operation instruction is set.
  • the content ID field is set with a content ID for identifying content that is provided by the mobile application and uses one or more data stored by the external application activated by the URL scheme.
  • a user ID for identifying a user of the mobile application is set.
  • the data storage destination field a path of a target file in which the external application activated by the URL scheme stores data is set.
  • the issue date field the date and time when the URL scheme is created is set.
  • Content DB 400 (Contents stored in content DB 400) Next, contents stored in the content DB 400 stored in a storage area that can be referred to by the mobile application will be described with reference to FIG.
  • the content DB 400 is realized, for example, by the memory 202 or the recording medium 205 of the terminal device 100 illustrated in FIG.
  • FIG. 4 is an explanatory diagram showing an example of the contents stored in the content DB 400.
  • the content DB 400 includes fields for content ID, content name, user ID, and data.
  • the content DB 400 stores content information as a record by setting information in each field for each content.
  • a content ID for identifying content that is provided by the mobile application and uses one or more data saved by an external application activated by the URL scheme is set.
  • the content name field the name of the content is set.
  • the user ID field a user ID for identifying a user of the mobile application is set.
  • the data field parameters related to contents are set, and for example, one or more data stored by an external application is set.
  • the file DB 500 is realized by, for example, a server capable of communicating via the memory 202, the recording medium 205, or the network 210 of the terminal device 100 illustrated in FIG.
  • FIG. 5 is an explanatory diagram showing an example of the contents stored in the file DB 500.
  • the file DB 500 includes fields for an identification ID, data, and input date / time.
  • the file DB 500 stores information as a record by setting information in each field for each data.
  • the identification ID field is included in a URL scheme that is an operation instruction, and an identification ID for identifying the URL scheme is set. Data obtained by an operation based on the URL scheme is set in the data field. In the input date and time field, the date and time when data is set in the data field is set.
  • FIG. 6 is a block diagram illustrating a functional configuration example of the terminal device 100.
  • the terminal device 100 includes an activation unit 601, an execution unit 602, and an output unit 603.
  • the starting unit 601 to the output unit 603 are functions serving as control units. Specifically, the activation unit 601 to the output unit 603, for example, cause the CPU 201 to execute a program stored in a storage area such as the memory 202 and the recording medium 205 illustrated in FIG. By realizing the function.
  • the processing result of each functional unit is stored in a storage area such as the memory 202 and the recording medium 205 shown in FIG.
  • the activation unit 601 activates the first application 101.
  • the first application 101 is an application that operates on the terminal device 100.
  • the first application 101 is, for example, an external application.
  • the activation unit 601 activates the first application 101 based on an operation instruction including instruction identification information from the second application 102.
  • the second application 102 is an application that operates on the terminal device 100.
  • the second application 102 is, for example, a mobile application.
  • the instruction identification information is, for example, an identification ID.
  • the operation instruction includes, for example, an identification ID that identifies the operation instruction.
  • the operation instruction may further include a path of the target file that is a storage destination for storing data obtained by the operation corresponding to the operation instruction.
  • the operation instruction is, for example, a URL scheme.
  • the activation unit 601 activates the external application by executing the URL scheme including the identification ID created by the mobile application.
  • the external application can acquire an identification ID for identifying the URL scheme based on the URL scheme, and a target file that is a storage destination for storing data obtained by performing an operation corresponding to the URL scheme. Can get the path.
  • the execution unit 602 executes the first application 101.
  • the execution unit 602 executes an operation corresponding to the operation instruction by executing the first application 101.
  • the operation is, for example, reading data from a barcode and outputting read data.
  • the execution unit 602 associates the data with the instruction identification information and stores the data in a storage area that can be referred to by the second application 102.
  • the execution unit 602 reads the data from the barcode based on the URL scheme from the mobile application, for example, by executing an external application, and stores the data in the target file in association with the identification ID. Accordingly, the execution unit 602 can cause the mobile application to identify and acquire data created by the external application corresponding to the URL scheme created by the mobile application.
  • the operation may include an operation of interrupting the process performed when the first application 101 is activated or terminating the first application 101 when the instruction identification information does not satisfy a predetermined condition.
  • the execution unit 602 may interrupt the process performed when starting the external application and terminate the external application if the identification ID does not match the preset format.
  • the format is, for example, the format of the first character of the identification ID.
  • the format may be, for example, a format in which parity is included in the identification ID. Thereby, the execution part 602 can suppress that an external application is used by an unauthorized application.
  • the execution unit 602 interrupts the processing performed when the external application is activated.
  • the external application may be terminated.
  • the execution part 602 can suppress that an external application is utilized by an unauthorized application even if the unauthorized application diverts an identification ID created in the past by the mobile application.
  • the operation instruction may further include information indicating a storage area designated by the second application 102 and storing the instruction identification information.
  • the storage area in which the instruction identification information is stored is, for example, a target file.
  • the execution unit 602 stores the identification ID in the target file by the external application in response to the activation of the external application. Thereby, the execution part 602 can preserve
  • the execution unit 602 may store time information regarding the data in association with the data, for example, when storing the data in the target file. Specifically, the execution unit 602 stores time information indicating the time when data is acquired, the time when data is created, the time when data is stored, and the like. Thereby, the execution part 602 can preserve
  • the execution unit 602 executes the second application 102. By executing the second application 102, the execution unit 602 identifies information indicating a storage area that can be referred to by the first application 101 as an operation instruction to the first application 101, and the operation instruction. Instruction identification information can be included. Then, the execution unit 602 can issue an operation instruction to the first application 101.
  • the execution unit 602 includes, for example, a URL scheme that is an operation instruction to an external application, including an identification ID that identifies the URL scheme, and a path of a target file that is a storage destination of data acquired by the external application. Can be issued. Accordingly, the execution unit 602 can cause the external application to save data in the target file in association with the identification ID. For this reason, the execution unit 602 can specify and acquire data corresponding to the issued URL scheme by the mobile application.
  • the execution unit 602 monitors the storage area by executing the second application 102, and is stored in the storage area in association with the instruction identification information by the first application 101 activated in response to the operation instruction. Get the data.
  • the execution unit 602 can monitor the target file and acquire data written in the target file by the external application in association with the identification ID.
  • the execution unit 602 may delete the data from the storage area when the difference between the time when the operation instruction is issued and the time when the data is written to the storage area is equal to or greater than the threshold value. For example, when the difference between the issue date / time of the instruction management DB 300 and the input date / time of the file DB 500 is equal to or greater than a threshold, the execution unit 602 deletes the data without acquiring data from the target file. Thereby, the execution part 602 can suppress the fall of security.
  • the execution unit 602 may delete the data from the storage area when acquiring the data. For example, when the execution unit 602 acquires data from the target file, the execution unit 602 copies the data to the content DB 400 and deletes the data from the target file. As a result, the execution unit 602 can prevent a decrease in security by preventing data written by an external application from being illegally used later.
  • the output unit 603 has a function of outputting data acquired by the first application 101 and the second application 102. Further, the output unit 603 may further have a function of outputting information indicating the activation state and the cooperation state of the first application 101 and the second application 102.
  • the output format is, for example, display on the display, display on the touch panel 206, print output to the printer, transmission to an external device via the network I / F 203, or storage in a storage area such as the memory 202 or the recording medium 205. It is.
  • Example 1 Next, Example 1 will be described with reference to FIGS.
  • FIG. 7 and 8 are explanatory diagrams showing Example 1.
  • the terminal device 100 can operate the mobile application 710 and the external application 720 on its own device.
  • the mobile application 710 includes a UI processing unit 711 and an application management unit 713.
  • the UI processing unit 711 provides one or more contents via the browser 712.
  • the UI processing unit 711 receives an operation input from the user 701 through the browser 712.
  • the application management unit 713 activates the external application 720.
  • the application management unit 713 includes a monitoring unit 714.
  • the monitoring unit 714 monitors data stored by the external application 720.
  • the mobile application 710 requests the UI processing unit 711 to start the external application 720 from the user 701 using the touch panel 206 or the like for any content provided by the browser 712. An operation input is received. The mobile application 710 notifies an operation input for requesting activation of the external application 720 from the UI processing unit 711 to the application management unit 713.
  • the mobile application 710 notifies the content ID of the content that has received the operation input from the UI processing unit 711 to the application management unit 713. Thereby, the mobile application 710 can notify the application management unit 713 which external application 720 is to be activated, and which content uses data stored in the external application 720.
  • the mobile application 710 uses the application management unit 713 to generate an identification ID for identifying an operation instruction to be issued next.
  • the mobile application 710 generates, in the file DB 500, a target file in which data is stored by the external application 720 activated by an operation instruction to be issued next by the application management unit 713, and generates a path of the target file.
  • the mobile application 710 generates a content ID of content for which an operation input has been received by the application management unit 713.
  • the mobile application 710 causes the application management unit 713 to store the generated identification ID, path, and content ID in the instruction management DB 300 in association with each other.
  • the mobile application 710 uses the application management unit 713 to create a URL scheme that serves as an operation instruction including the generated identification ID and path.
  • the mobile application 710 starts monitoring the state of data writing to the generated target file by the monitoring unit 714. As a result, the mobile application 710 can reduce the time taken from the time the external application 720 writes data to the target file until the data is acquired.
  • the mobile application 710 does not include the content ID in the URL scheme, the possibility that the content ID is diverted to an unauthorized application can be reduced.
  • the mobile application 710 executes the created URL scheme by the application management unit 713. Thereby, the mobile application 710 can start the external application 720 through the OS. In addition, the mobile application 710 can cause the external application 720 to perform a predetermined operation corresponding to the operation instruction and save the data in the target file. Moreover, since the mobile application 710 does not pass the content ID to the external application 720, the possibility that the content ID is diverted to an unauthorized application can be reduced.
  • the external application 720 is activated through the OS.
  • the external application 720 acquires an identification ID included in the URL scheme and a path of the target file. Based on the acquired path, the external application 720 associates the acquired identification ID with the input date and time and saves it in the target file of the file DB 500.
  • the mobile application 710 acquires data such as the identification ID and the input date / time written in the target file by the monitoring unit 714 and stores the data in the content DB 400.
  • the mobile application 710 can detect that the external application 720 has been activated by the monitoring unit 714 even if the external application 720 does not respond to the URL scheme.
  • the mobile application 710 can acquire the date and time when the external application 720 is activated by the monitoring unit 714.
  • the mobile application 710 can grasp whether or not the external application 720 has been successfully activated by the monitoring unit 714.
  • the external application 720 acquires data in response to an operation input from the user 701 using the touch panel 206 or the like.
  • the external application 720 implements, for example, a barcode reader function and reads data from the barcode.
  • the external application 720 encrypts the read data using the identification ID. Based on the acquired path, the external application 720 associates the acquired identification ID, the encrypted data obtained by encryption, and the input date and time with each other, and stores it in the target file of the file DB 500. Here, the external application 720 may encrypt the identification ID and the input date / time stored in the target file. As a result, the external application 720 can improve security.
  • the mobile application 710 uses the monitoring unit 714 to acquire the identification ID, encrypted data, and input date / time written in the target file, and decrypts the encrypted data.
  • the mobile application 710 may delete the encrypted data without decrypting it if the acquired identification ID is an identification ID for which a predetermined time has elapsed since generation based on the issue date of the instruction management DB 300. Further, when the mobile application 710 acquires the encrypted data, the mobile application 710 deletes the encrypted data from the target file. Thereby, the mobile application 710 can prevent the acquired encrypted data from being used by an unauthorized application, and can improve security.
  • the mobile application 710 uses the monitoring unit 714 to set the acquired identification ID to the acquired identification ID based on the instruction management DB 300 if the acquired identification ID is an identification ID for which a predetermined time has not elapsed since generation.
  • the corresponding content ID is specified.
  • the mobile application 710 causes the monitoring unit 714 to associate the acquired identification ID, the data obtained by decryption, and the specified content ID with each other and store them in the content DB 400. Thereby, the mobile application 710 can specify which content is to use the acquired data.
  • the mobile application 710 is moved to the foreground by the UI processing unit 711 in response to an operation input from the user 701 using the touch panel 206 or the like.
  • the external application 720 performs the operation
  • the mobile application 710 does not move to a foreground, but can perform the operation input of the user 701 via the external application 720 easily. can do.
  • the mobile application 710 calls and executes an API (Application Programming Interface) that acquires data from the content DB 400 by the UI processing unit 711.
  • the mobile application 710 acquires data by the UI processing unit 711. Thereby, the mobile application 710 can use the acquired data for the content for which the operation input is accepted.
  • API Application Programming Interface
  • the mobile application 710 uses the UI processing unit 711 to process the acquired data in the content that has received the operation input. Thereby, the terminal device 100 can implement
  • the terminal device 100 can allocate a memory capacity to each of the mobile application 710 and the external application 720 depending on the OS.
  • the external application 720 can store the data every time the data is acquired. Further, each time the external application 720 acquires data, the external application 720 does not need to transmit the data to the mobile application 710 and move the mobile application 710 to the foreground.
  • the mobile application 710 can confirm that the activated external application 720 and the external application 720 storing the data in the target file are the same by confirming the identification ID. For this reason, the mobile application 710 can suppress erroneous acquisition of data stored by an unauthorized application different from the external application 720 that has issued the operation instruction including the identification ID.
  • the mobile application 710 can determine whether the data stored by the same external application 720 is data stored by the operation based on the operation instruction corresponding to the identification ID by confirming the identification ID. it can. For this reason, the mobile application 710 can suppress erroneously acquiring data stored by an operation based on an operation instruction different from the operation instruction corresponding to the identification ID. In addition, the mobile application 710 can acquire the data stored by the external application 720 in the background without moving to the foreground.
  • the external application 720 can specify the order in which the mobile application 710 acquires the data based on the input date and time of the file DB 500 without transmitting the data to the mobile application 710 each time the data is acquired. can do.
  • the mobile application 710 can specify the order in which the external application 720 acquires data based on the input date and time of the file DB 500.
  • the external application 720 can divide the file for storing the data into target files designated by the respective mobile applications 710. For this reason, the external application 720 can prevent the data acquired by each mobile application 710 from being mixed, and can suppress competition among the plurality of mobile applications 710.
  • the external application 720 can interrupt the start-up process if the unauthorized application is activated using the identification ID and using the URL scheme if it is a URL scheme based on the identification ID that has been used in the past. Security can be improved. Further, when the target file has not been created, the external application 720 may interrupt the startup process to improve security.
  • the producer does not need to change the mobile application 710 when changing the external application 720.
  • the producer does not need to change the external application 720 when changing the mobile application 710. This makes it easier for the producer to manage the mobile application 710 and the external application 720.
  • FIG. 9 and FIG. 10 are flowcharts showing an example of a cooperation processing procedure executed by the mobile application 710.
  • the terminal device 100 receives an operation input for starting the external application 720 from the user 701 (step S901).
  • the terminal device 100 When the terminal device 100 receives the operation input, the terminal device 100 creates an identification ID and a file as a data storage destination by the external application 720 (step S902). The terminal device 100 associates the created identification ID with the created file identification information and stores them in the instruction management DB 300 in the mobile application 710 (step S903).
  • the terminal device 100 creates a URL scheme that is an operation instruction of the external application 720 (step S904).
  • the terminal device 100 starts monitoring the created file (step S905).
  • the terminal device 100 executes the created URL scheme (step S906).
  • the terminal device 100 proceeds to the process of step S1001 in FIG.
  • the terminal device 100 determines whether or not encrypted data has been written to the file by monitoring the created file (step S1001). Here, when encrypted data is not written (step S1001: No), the terminal device 100 returns to the process of step S1001.
  • step S1001 when the encrypted data is written (step S1001: Yes), the terminal device 100 decrypts the encrypted data written in the file using the identification ID (step S1002). When the terminal apparatus 100 obtains the data by decryption, the terminal apparatus 100 deletes the encrypted data from the file (step S1003).
  • the terminal device 100 determines whether or not the data acquired by decryption matches the identification ID (step S1004). Here, when it does not correspond (step S1004: No), the terminal device 100 determines whether or not the identification ID is valid (step S1005). Here, when it is not effective (step S1005: No), the terminal device 100 complete
  • step S1005 if it is valid (step S1005: Yes), the terminal device 100 stores the data acquired by decryption in the content DB 400 in the mobile application 710 (step S1006).
  • the terminal device 100 moves the mobile application 710 to the foreground (step S1007).
  • the terminal device 100 executes an API for acquiring data from the content DB 400 (step S1008).
  • the terminal device 100 reflects the data (step S1009).
  • the terminal device 100 returns to the process of step S1001.
  • step S1004 determines whether or not the input date / time and the issue date / time are less than the threshold (step S1010).
  • step S1010 determines whether or not the input date / time and the issue date / time are less than the threshold.
  • step S1010 determines whether or not the input date / time and the issue date / time are less than the threshold.
  • step S1010 determines whether it is less than the threshold (step S1010: Yes).
  • the terminal device 100 validates the identification ID (step S1012).
  • the terminal device 100 returns to the process of step S1001. Thereby, the terminal device 100 can acquire the data written in the file by the external application 720 by the mobile application 710, and can realize cooperation between the mobile application 710 and the external application 720.
  • FIG. 11 is a flowchart illustrating an example of an operation processing procedure executed by the external application 720.
  • the terminal device 100 accepts an operation instruction using a URL scheme (step S1101).
  • the terminal device 100 stores the identification ID assigned to the operation instruction in a file in association with the date and time (step S1102).
  • the terminal device 100 performs an operation according to the received operation instruction (step S1103).
  • the terminal device 100 acquires data as a result of performing the operation according to the operation instruction (step S1104).
  • the terminal device 100 encrypts the acquired data with the identification ID (step S1105).
  • the terminal device 100 stores the encrypted data obtained by the encryption in a file in association with the date and time (step S1106). Accordingly, the terminal device 100 can store data in a state where the mobile application 710 can acquire, and can realize cooperation between the mobile application 710 and the external application 720.
  • the first application 101 is activated in response to the operation instruction including the instruction identification information from the second application 102 operating on the terminal device 100. Can do.
  • the second application 102 can refer to the data by associating the data with the instruction identification information. It can be saved in a certain storage area.
  • the first application 101 can store data so that the second application 102 can acquire it, and can realize cooperation with the second application 102.
  • the terminal device 100 can suppress an increase in the data size of the second application 102 by cooperation between the first application 101 and the second application 102. Further, the terminal device 100 can allocate memory capacities to the first application 101 and the second application 102, respectively, depending on the OS. Further, the first application 101 can store the data every time the data is acquired. Further, each time the first application 101 acquires data, the first application 101 does not have to transmit the data to the second application 102 and move the second application 102 to the foreground.
  • the first application 101 when the instruction identification information does not satisfy a predetermined condition, an operation for interrupting the processing performed when the first application 101 is activated or terminating the first application 101. Can be executed. Accordingly, the first application 101 can be prevented from operating according to an operation instruction from an unauthorized application.
  • the first application 101 can be activated through the OS by the URL scheme from the second application 102. Thereby, the first application 101 does not need to respond to the second application 102.
  • the instruction identification information can be stored in the first storage area included in the operation instruction and designated by the second application 102 in response to the activation.
  • the first application 101 can enable the second application 102 to grasp the activation success of the first application 101.
  • the data and the instruction identification information are associated with each other and included in the operation instruction, and can be stored in the second storage area designated by the second application 102.
  • the first application 101 can be acquired by the second application 102 and can store data in a storage area that is not specified by an unauthorized application other than the second application 102. Improvements can be made.
  • the data, the instruction identification information, and the time point information regarding the data can be stored in association with each other. Accordingly, the first application 101 can make it easier for the second application 102 to manage data.
  • the operation instruction to the first application 101 includes information indicating a storage area that can be referred to by the second application 102 and instruction identification information for identifying the operation instruction. Can be issued. Further, according to the second application 102, the storage area can be monitored, and data stored in association with the instruction identification information by the first application 101 activated in response to the operation instruction can be acquired. Thereby, the second application 102 can cooperate with the first application 101.
  • the second application 102 if the difference between the time when the operation instruction is issued and the time when data is written to the storage area is equal to or greater than the threshold value, the data can be deleted from the storage area. it can. As a result, the second application 102 can improve security.
  • the second application 102 when data is acquired, the data can be deleted from the storage area. As a result, the second application 102 can improve security.
  • the program execution method described in the present embodiment can be realized by executing a program prepared in advance on a computer such as a personal computer or a workstation.
  • the program described in this embodiment is recorded on a computer-readable recording medium such as a hard disk, a flexible disk, a CD-ROM, an MO, and a DVD, and is executed by being read from the recording medium by the computer.
  • the program described in this embodiment may be distributed via a network such as the Internet.
  • Terminal device 101 102 Application 200 Bus 201 CPU 202 Memory 203 Network I / F 204 Recording medium I / F 205 Recording Medium 206 Touch Panel 210 Network 300 Instruction Management DB 400 Content DB 500 file DB 601 Start-up unit 602 Execution unit 603 Output unit 701 User 710 Mobile application 711 UI processing unit 712 Browser 713 Application management unit 714 Monitoring unit 720 External application

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Telephone Function (AREA)

Abstract

Dans la présente invention, une première application (101) est lancée en réponse à une instruction d'exploitation provenant d'une seconde application (102), ladite instruction d'exploitation comprenant des informations d'identification d'instruction. L'instruction d'exploitation est, par exemple, un schéma URL. La première application (101) effectue une exploitation conformément à l'instruction d'exploitation. Si l'exploitation consiste à délivrer des données, alors la première application (101) associe et mémorise les données et les informations d'identification d'instruction dans une région de mémoire à laquelle peut se référer la seconde application (102). Par ce moyen, la première application (101) et la seconde application (102) coopèrent l'une avec l'autre.
PCT/JP2017/014423 2017-04-06 2017-04-06 Programme, procédé d'exécution de programme et dispositif terminal Ceased WO2018185919A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/JP2017/014423 WO2018185919A1 (fr) 2017-04-06 2017-04-06 Programme, procédé d'exécution de programme et dispositif terminal
JP2019511027A JP7017161B2 (ja) 2017-04-06 2017-04-06 プログラム、プログラムの実行方法、および端末装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2017/014423 WO2018185919A1 (fr) 2017-04-06 2017-04-06 Programme, procédé d'exécution de programme et dispositif terminal

Publications (1)

Publication Number Publication Date
WO2018185919A1 true WO2018185919A1 (fr) 2018-10-11

Family

ID=63713269

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2017/014423 Ceased WO2018185919A1 (fr) 2017-04-06 2017-04-06 Programme, procédé d'exécution de programme et dispositif terminal

Country Status (2)

Country Link
JP (1) JP7017161B2 (fr)
WO (1) WO2018185919A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020246205A1 (fr) * 2019-06-03 2020-12-10 ヤマハ株式会社 Programme, dispositif terminal et procédé de fonctionnement d'un dispositif terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06301618A (ja) * 1993-04-15 1994-10-28 Matsushita Electric Ind Co Ltd 遠隔手続き呼び出し方法
JP2010511255A (ja) * 2006-11-29 2010-04-08 クゥアルコム・インコーポレイテッド 保護領域境界を越えるオブジェクトの起動のための方法、システム、及び装置
WO2014034060A1 (fr) * 2012-08-30 2014-03-06 日本電気株式会社 Dispositif de contrôle de traitement d'événement, dispositif de nœud, système de traitement d'événement et procédé de contrôle de traitement d'événement

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5219770B2 (ja) * 2008-12-12 2013-06-26 キヤノンソフトウェア株式会社 情報処理装置、セッション管理方法、プログラム、及び、記録媒体
JP5802116B2 (ja) * 2011-11-18 2015-10-28 Tis株式会社 データ共有機能を有した通話システム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06301618A (ja) * 1993-04-15 1994-10-28 Matsushita Electric Ind Co Ltd 遠隔手続き呼び出し方法
JP2010511255A (ja) * 2006-11-29 2010-04-08 クゥアルコム・インコーポレイテッド 保護領域境界を越えるオブジェクトの起動のための方法、システム、及び装置
WO2014034060A1 (fr) * 2012-08-30 2014-03-06 日本電気株式会社 Dispositif de contrôle de traitement d'événement, dispositif de nœud, système de traitement d'événement et procédé de contrôle de traitement d'événement

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
IKUYA FUKUMOTO: "iOS Application no Secure Coding Nyumon", JSSEC.ORG, 23 March 2016 (2016-03-23), pages 1, 20 - 25, XP055612455, Retrieved from the Internet <URL:https://www.jssec.org/dl/20160323_Ikuya_Fukumoto.pdf> [retrieved on 20170605] *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020246205A1 (fr) * 2019-06-03 2020-12-10 ヤマハ株式会社 Programme, dispositif terminal et procédé de fonctionnement d'un dispositif terminal

Also Published As

Publication number Publication date
JP7017161B2 (ja) 2022-02-08
JPWO2018185919A1 (ja) 2019-12-12

Similar Documents

Publication Publication Date Title
US9864736B2 (en) Information processing apparatus, control method, and recording medium
CN102592069B (zh) 通过挂钩内核本地api管理数字权限的设备和方法
US20150082242A1 (en) Providing Context Menu Based on Predicted Commands
US20120050336A1 (en) Touch-based remote control
CN110022558A (zh) 一种升级包的加密、解密方法和电子装置及存储介质
CN106254551A (zh) 一种双系统的文件传输方法及移动终端
JP2016085609A (ja) 電子著作物のコンテンツの二次利用を支援する方法、並びに、電子著作物のコンテンツの二次利用を支援する為のサーバ・コンピュータ、及びそのサーバ・コンピュータ用プログラム
WO2019144547A1 (fr) Procédé et appareil d&#39;entrée de données, dispositif informatique et support d&#39;informations
US9665723B2 (en) Watermarking detection and management
KR101757407B1 (ko) 바이너리 병합 장치, 방법 및 컴퓨터 프로그램
JP4707748B2 (ja) 外部記憶デバイス、外部記憶デバイスに記憶されたデータを処理するための方法、プログラムおよび情報処理装置
JP7017161B2 (ja) プログラム、プログラムの実行方法、および端末装置
CN112889055A (zh) 数据处理方法、装置、系统、服务器以及电子设备
CN116821968A (zh) 一种文件权限管控方法及装置
US9672383B2 (en) Functionality watermarking and management
JP5062687B2 (ja) 情報処理装置
US9552463B2 (en) Functionality watermarking and management
JP4498012B2 (ja) 電子機器
CN111309698A (zh) 磁盘重定向方法、装置和系统
JP2009169868A (ja) 記憶領域アクセス装置及び記憶領域のアクセス方法
JP2011040044A (ja) 仮想シンクライアント化装置、仮想シンクライアント化システム、仮想シンクライアント化プログラム、及び仮想シンクライアント化方法
CN108351888A (zh) 生成可推迟数据流
JP4882550B2 (ja) オブジェクト管理システム及びオブジェクト管理方法、並びにコンピュータ・プログラム
JP5229855B2 (ja) メモリシステム及びコンピュータシステム
CN110569171A (zh) 一种文件的监测方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17904943

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019511027

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17904943

Country of ref document: EP

Kind code of ref document: A1