Disclosure of Invention
In view of the foregoing, it is necessary to provide a resource calling method, device, computer device and storage medium capable of improving resource calling efficiency and resource security.
A method of resource invocation, the method comprising:
acquiring a resource calling task generated by a webpage application, wherein the resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator;
checking the specific resource locator;
when the verification is successful, acquiring an expansion parameter and an interface identifier in the specific resource locator;
determining the inherent parameter type in the specific resource locator according to the version identifier, and acquiring the inherent parameter corresponding to the inherent parameter type;
and calling resources corresponding to the inherent parameters and the expansion parameters through a client application interface corresponding to the interface identification.
In one embodiment, the method further comprises:
generating a webpage application authentication request according to the resource calling task, wherein the webpage application authentication request carries a signature corresponding to the webpage application;
sending the webpage application authentication request to an authentication server;
receiving an authorization list returned after the authentication server authenticates the webpage application according to the signature;
checking the interface identifier according to the authorization list;
and when the verification fails, generating abnormal prompt information.
In one embodiment, the method further comprises:
acquiring a specific resource locator generating task triggered by the webpage application, wherein the specific resource locator generating task carries an expansion parameter;
and calling a standard resource locator, and encapsulating the standard resource locator and the expansion parameters to obtain the specific resource locator.
In one embodiment, the invoking the standard resource locator comprises:
acquiring a corresponding version identifier from the authorization list according to the specific resource locator generating task;
and calling a standard resource locator corresponding to the version identifier, wherein the authorization list comprises a mapping relation between the version identifier and the standard resource locator.
In one embodiment, the method further comprises:
acquiring a standard resource locator test task, and acquiring a corresponding standard resource locator according to the standard resource locator test task;
analyzing the standard resource locator to obtain a standard parameter type corresponding to the standard resource locator;
obtaining a test parameter corresponding to the standard parameter type according to the standard parameter type;
and testing the standard resource locator by using the testing parameters.
An apparatus for resource invocation, the apparatus comprising:
the system comprises a task obtaining module, a task processing module and a task processing module, wherein the task obtaining module is used for obtaining a resource calling task generated through a webpage application, and the resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator;
the locator checking module is used for checking the specific resource locator; when the verification is successful, acquiring an expansion parameter and an interface identifier in the specific resource locator;
a parameter obtaining module, configured to determine an intrinsic parameter type in the specific resource locator according to the version identifier, and obtain an intrinsic parameter corresponding to the intrinsic parameter type;
and the resource calling module is used for calling the resources corresponding to the inherent parameters and the expansion parameters through the client application interface corresponding to the interface identifier.
In one embodiment, the apparatus further includes an authentication module, configured to generate a web application authentication request according to the resource call task, where the web application authentication request carries a signature corresponding to the web application; sending the webpage application authentication request to an authentication server; receiving an authorization list returned after the authentication server authenticates the webpage application according to the signature; checking the interface identification according to the authorization list; and when the verification fails, generating abnormal prompt information.
In one embodiment, the apparatus further includes a locator generating module, configured to acquire a specific resource locator generating task triggered by the web application, where the specific resource locator generating task carries an extension parameter; and calling a standard resource locator, and encapsulating the standard resource locator and the expansion parameters to obtain the specific resource locator.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the above-described resource calling method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned resource calling method.
According to the resource calling method, the resource calling device, the computer equipment and the storage medium, the specific resource locator carried in the resource calling task is verified, and the expansion parameter in the specific resource locator is obtained after the verification is successful. Determining the inherent parameter type in the specific resource locator according to the version identifier corresponding to the specific resource locator, acquiring the inherent parameter corresponding to the inherent parameter type, and calling the resource corresponding to the inherent parameter and the expansion parameter through the client application interface corresponding to the interface identifier. Compared with the traditional mode, after the specific resource locator in the resource calling task is obtained, the specific resource locator is verified, and the corresponding resource is called by using the inherent parameter and the extended parameter in the specific resource locator when the verification is successful, so that the safety of the resource is effectively improved. And the number of all parameters in the specific resource locator does not need to be counted, and the parameter type corresponding to each parameter is judged in sequence. The whole process of calling the corresponding resources according to the specific resource locator is simplified, and the efficiency of calling the resources is effectively improved.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The resource calling method provided by the application can be applied to a terminal and can also be applied to an application environment as shown in fig. 1. Here, the application to the application environment shown in fig. 1 is taken as an example. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 uploads the resource invocation request to the server 104 through the web application. The server 104 generates a resource calling task according to the resource calling request, wherein the resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator. The server 104 checks for a particular resource locator. And when the verification is successful, acquiring the expansion parameters and the interface identifiers in the specific resource locator. And determining the inherent parameter type in the specific resource locator according to the version identifier corresponding to the specific resource locator, and acquiring the inherent parameter corresponding to the inherent parameter type. The server 104 calls the resources corresponding to the intrinsic parameters and the extension parameters through the client application interface corresponding to the interface identifier. The server 104 may return the invoked resource to the terminal 102. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by multiple servers.
In an embodiment, as shown in fig. 2, a resource calling method is provided, which is described by taking an example that the method is applied to a terminal, and includes the following steps:
step 202, a resource calling task generated by the web application is obtained, and the resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator.
The terminal can run mixed-mode mobile applications, and one mixed-mode mobile application can correspond to one client and a plurality of webpage applications. The client application can be directly run on an operating system of the terminal, and an environment is provided for realizing the webpage application. On the premise that the client application is operated, the webpage application can be operated and used on the client application of the terminal without downloading and installing. A web application is an application program implemented in the environment provided by a client application. The web application running on the client application may invoke a variety of resources corresponding to the client application. For example, the web application may call data and information in the client application, and may also call a function corresponding to the client application.
The terminal can acquire the resource calling task generated by the webpage application and execute the acquired resource calling task to call the corresponding resource. Specifically, the web application may generate the resource invocation task in a variety of ways. For example, the web application may generate a resource invocation task in response to a resource invocation control triggered through the display interface. The resource calling control can be displayed on a display interface of the webpage application. The webpage application can also directly generate a resource calling task according to the actual application requirement in the running process so as to call the resources of the client application.
The resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator. The specific Resource Locator is a specific Uniform Resource Locator (URL), and the specific Resource Locator is a standard Resource Locator with an unchangeable communication protocol and is encapsulated with an extension parameter. The specific resource locator may include a transmission protocol used by the web application and the client application, parameters corresponding to the resource to be called, a path identifier, an interface identifier, and the like. The specific resource locator of each version has a mapping relation with the corresponding version identification. The version identification may be one of a variety of identifications used to mark the version of a particular resource locator. For example, the version identifier may be a version number corresponding to a version of the specific resource locator, or may be a version name corresponding to the version.
Step 204, the specific resource locator is checked.
And step 206, when the verification is successful, acquiring the expansion parameters and the interface identifiers in the specific resource locator.
And the terminal executes the acquired resource calling task and acquires the specific resource locator carried in the resource calling task according to the resource calling task. The terminal may check the acquired specific resource locator. Specifically, the terminal may obtain the transport protocol included in the specific resource locator, check the transport protocol used by the web application using the authorization list, and determine whether the transport protocol used in the specific resource locator is a usable transport protocol within the web application permission range. And when the transmission protocol used by the webpage application is the transmission protocol within the authority range, the verification is successful. Otherwise, the check fails. In one embodiment, when the check of the specific resource locator fails, the terminal returns a check failure prompt message to the web application. The authorization list is an authority range corresponding to the webpage application returned by the authentication server after the authority verification is performed on the signature corresponding to the webpage application by the terminal through the authentication server, and the authorization list comprises a transmission protocol within the authority range corresponding to the webpage application, a version identifier corresponding to the transmission protocol, an interface identifier and the like. The terminal can verify the acquired specific resource locator, and when the verification is successful, the terminal calls the corresponding resource by using the inherent parameter and the expansion parameter included in the successfully verified specific resource locator, so that the safety of the resource is effectively improved.
After the specific resource locator is successfully checked, the terminal may analyze the acquired specific resource locator. Specifically, the terminal may analyze the specific resource locator by using an SDK (Software Development Kit) to obtain an extension parameter and an interface identifier in the specific resource locator. The interface identifier is used for marking a client application interface corresponding to the resource to be called, and the terminal can call the corresponding resource through the client application interface corresponding to the interface identifier.
The parameters in a particular resource locator may include an extension parameter and an intrinsic parameter. The extension parameter in the specific resource locator may be a Json (JavaScript Object Notation) character string, and the extension parameter may be set according to an actual service requirement. In the service upgrading process, the requirement on the required resources can be increased by setting expansion parameters. For example, the expansion parameter of the image compression size can be increased on the basis of acquiring the resource locator of the image resource. By setting the extension parameters in the specific resource locator, the inherent parameter types in the specific resource locator can be changed without changing only by setting the added parameters as the extension parameters during upgrading. The whole specific resource locator does not need to be tested again after being upgraded, and the testing cost is effectively reduced. When the terminal analyzes the specific resource locator, the Json character string can be analyzed into a Json object. In one embodiment, when the Json character string analysis fails, calling failure prompt information is generated and displayed through a display page corresponding to the webpage application.
And 208, determining the inherent parameter type in the specific resource locator according to the version identifier, and acquiring the inherent parameter corresponding to the inherent parameter type.
The parameters in a particular resource locator include intrinsic parameters and extended parameters. The intrinsic parameters describe the basic parameters of the called resource. For example, when the web application needs to call the image resource corresponding to the client application, the intrinsic parameters include basic parameters of the image resource, such as the size and resolution of the image. The inherent parameters have corresponding inherent parameter types, and the inherent parameter types and the inherent parameter number included in the specific resource locator of the same version are invariable. The values of the intrinsic parameters corresponding to different specific resource locators of the same version may all be the same, may be partially the same, or may all be different. The terminal can determine the inherent parameter type in the specific resource locator through the version identifier corresponding to the specific resource locator carried in the resource calling task, and acquire a plurality of inherent parameters corresponding to the inherent parameter type.
And step 210, calling resources corresponding to the inherent parameters and the expansion parameters through the client application interface corresponding to the interface identifier.
Since the inherent parameter types and the inherent parameter numbers corresponding to the inherent parameters in the specific resource locator are determined, the terminal does not need to read the inherent parameter types respectively corresponding to the inherent parameters included in the specific resource locator. After the terminal analyzes the expansion parameters, the corresponding resources can be directly called according to the expansion parameters. The terminal can directly forward the acquired intrinsic parameters and the expansion parameters to the client application interface corresponding to the interface identifier, and the resources of the client application corresponding to the intrinsic parameters and the expansion parameters are called through the client application interface, so that the resource calling process is simplified, and the resource calling efficiency is effectively improved.
In this embodiment, the specific resource locator carried in the resource calling task is verified, and after the verification is successful, the extension parameter in the specific resource locator is obtained. Determining the inherent parameter type in the specific resource locator according to the version identifier corresponding to the specific resource locator, acquiring the inherent parameter corresponding to the inherent parameter type, and calling the resource corresponding to the inherent parameter and the expansion parameter through the client application interface corresponding to the interface identifier. Compared with the traditional mode, after the specific resource locator in the resource calling task is obtained, the specific resource locator is verified, and the corresponding resource is called by using the inherent parameter and the extended parameter in the specific resource locator when the verification is successful, so that the safety of the resource is effectively improved. In addition, the expansion parameters in the embodiment are general Json character strings, and the terminal does not need to identify and count the parameter types and the number of the expansion parameters. The inherent parameter type corresponding to each version identification is also certain, and the terminal can directly read the inherent parameters without identifying and counting the parameter types and the quantity of the inherent parameters. The terminal can directly forward the obtained intrinsic parameters and the obtained expansion parameters to the client application interface and call corresponding resources. The whole process of calling the corresponding resources according to the specific resource locator is simplified, and the efficiency of calling the resources is effectively improved.
In an embodiment, as shown in fig. 3, the resource calling method further includes:
step 302, generating a web application authentication request according to the resource calling task, wherein the web application authentication request carries a token corresponding to the web application.
Step 304, sending a web application authentication request to an authentication server.
Step 306, receiving an authorization list returned after the authentication server authenticates the webpage application according to the signature.
Step 308, the interface identifier is checked against the authorization list.
In step 310, when the verification fails, an abnormal prompt message is generated.
The resource calling task generated by the webpage application also carries a signature corresponding to the webpage application. The signature corresponding to the web application may be generated by the web application server according to the valid token when the web application generates the resource calling task, and is issued to the web application front end. And the terminal generates a webpage application authentication request according to the signature corresponding to the webpage application carried in the resource calling task, wherein the signature corresponding to the webpage application is carried in the webpage application authentication request.
And the terminal uploads the webpage application authentication request to the authentication server so that the authentication server determines the authority of the webpage application according to the signature corresponding to the webpage application. Specifically, after receiving a web application authentication request uploaded by the terminal, the authentication server parses the web application authentication request to obtain a signature carried in the web application authentication request. The authentication server determines the authority range of the webpage application by using the signature corresponding to the webpage application, and generates an authorization list corresponding to the webpage application according to the authority range of the webpage application. The authorization list includes a transmission protocol within a right range corresponding to the web application, a version identifier and an interface identifier corresponding to the transmission protocol.
In one embodiment, the terminal may further check the specific resource locator through a communication protocol within a corresponding authority range of the web application included in the authorization list. And when the communication protocol used by the webpage application is not in the corresponding authority range of the webpage application, generating abnormal prompt information. In case the communication protocol is not authorized, the terminal does not need to continue to perform the resource invocation task.
And the authentication server returns the generated authorization list to the corresponding terminal, and the terminal receives the authorization list returned after the authentication server authenticates the webpage application according to the signature. And the terminal checks the interface identifier in the specific resource locator according to the authorization list.
Specifically, the terminal compares the interface identifier obtained by analyzing the specific resource locator with the interface identifier included in the authorization list, and determines whether the interface identifier is in the authorization list. The check is successful when the interface identification contained in the particular resource locator is in the authorization list. And the terminal forwards the inherent parameters and the expansion parameters in the specific resource locator to the client application interface corresponding to the interface identifier so as to call the resources corresponding to the inherent parameters and the expansion parameters. When the interface identification contained in the particular resource locator is not in the authorization list, then the check fails. And the corresponding webpage application has no permission to call the corresponding resource through the client application interface corresponding to the interface identifier, and the terminal does not forward the inherent parameters and the expansion parameters to the client application interface and generates abnormal prompt information. The terminal can display the abnormal prompt information through a display interface corresponding to the webpage application to prompt that the webpage application does not have the right to access the corresponding client application interface, and the resource calling fails.
In this embodiment, the terminal sends a web application authentication request to the authentication server by using the signature corresponding to the web application, and receives an authorization list corresponding to the web application. And checking the interface identifier in the specific resource locator according to the authorization list, and judging whether the webpage application has the authority to call the client application interface corresponding to the interface identifier. The webpage application is prevented from randomly calling the client application interface without the permission, and the resource safety of the client application is effectively improved.
In an embodiment, before the web application calls the resource of the client application for the first time, the web application may register in the authentication server and apply for obtaining the application identifier and the application key corresponding to the web application. The webpage application server can obtain the corresponding token through the application key, and generate the corresponding signature according to the obtained token and send the signature to the webpage application. And the terminal generates a resource calling task carrying a corresponding signature through the webpage application, and confirms the authority range of the webpage application by using the signature.
In one embodiment, the web application may also obtain a token issued by the server, and the terminal confirms the authorization list corresponding to the web application to the authentication server by generating a web application authentication request carrying the corresponding token. The web application server may also determine whether the token is valid. When the token has expired, a new valid token is requested from the authentication server.
In this embodiment, all web applications that call resources of the client application need to be registered in the authentication server, so that access of untrusted web applications to the client application is avoided. Before the accessed webpage application calls the resources of the client application, the valid token needs to be obtained, so that the webpage application without permission is prevented from calling the resources of the client application when the application key is leaked, and the safety of the resources of the client application is effectively improved.
In one embodiment, the resource calling method further includes: acquiring a specific resource locator generating task triggered by a webpage application, wherein the specific resource locator generating task carries an expansion parameter; and calling the standard resource locator, and encapsulating the standard resource locator and the expansion parameters to obtain the specific resource locator.
When the webpage application needs to call the resources of the client application, a specific resource locator can be generated, and the specific resource locator is utilized to communicate with the client application. The terminal may obtain a specific resource locator generation task triggered by the web application. The web application may trigger the specific resource locator generation task in a variety of ways. For example, the web application may trigger a particular resource locator generation task in response to a resource invocation control triggered through the display interface. The web application can also trigger a specific resource locator to generate a task according to the actual requirement of calling the resource of the client application in the running process.
The specific resource locator generation task carries an expansion parameter, and the expansion parameter corresponds to the actual requirement of the resource to be called by the webpage application. When the actual requirements for calling the resources are different, the method can correspond to different expansion parameters. The extension parameter is a general Json string. And the terminal generates a task calling standard resource locator according to the specific resource locator, and encapsulates the standard resource locator and the expansion parameters by using the SDK to obtain the specific resource locator.
In this embodiment, the specific resource locator can be obtained by encapsulating the extension parameter and the standard resource locator. The generation process of the resource locator is simplified. Moreover, compared with the traditional mode that the communication protocol itself needs to be tested to test the newly generated uniform resource locator, when the specific resource locator generated by the mode in the embodiment is tested, the standard resource locator is fixed, that is, the communication protocol itself is not changed, so that the consistency of the communication protocol is ensured. After the communication protocol of the standard resource locator is tested for the first time, only the newly added extension parameters need to be tested during the upgrade test, and the communication protocol in the specific resource locator does not need to be tested, so that the test cost of the specific resource locator is effectively reduced.
In one embodiment, the step of invoking the standard resource locator comprises: generating a task according to the specific resource locator to obtain a corresponding version identifier from the authorization list; and calling a standard resource locator corresponding to the version identifier, wherein the authorization list comprises a mapping relation between the version identifier and the standard resource locator.
The specific resource locator generation task has the requirements for different standard resource locators when the web application is communicated with the client application, and the terminal can acquire the corresponding version identification from the authorization list according to the acquired specific resource locator, so that the called standard resource locator is ensured to be within the authority range of the web application. The authorization list includes the mapping relationship between the version identification and the standard resource locator. The terminal can call the standard resource locator corresponding to the version identifier through the version identifier, and the called standard resource locator and the expansion parameter are packaged by using the SDK to obtain the specific resource locator.
In this embodiment, the terminal obtains the corresponding version identifier from the authorization list, thereby ensuring the validity of the called standard resource locator. Moreover, the terminal directly calls the standard resource locator from the authorization list, and specific communication protocols in the standard resource locator are hidden. Even if the front-end code is leaked, only the authorization list can be obtained through analysis, the specific communication protocol cannot be obtained, the communication protocol is effectively prevented from being forged to call resources, and the safety of the resources of the client application is improved.
In one embodiment, the resource calling method further includes: acquiring a standard resource locator test task, and acquiring a corresponding standard resource locator according to the standard resource locator test task; analyzing the standard resource locator to obtain a standard parameter type corresponding to the standard resource locator; acquiring a test parameter corresponding to the standard parameter type according to the standard parameter type; and testing the standard resource locator by using the testing parameters.
And the terminal acquires the standard resource locator test task and acquires the corresponding standard resource locator according to the standard resource locator test task. Only one standard resource locator is included in each standard resource locator test task. The standard resource locator includes a communication protocol between the web application and the client application. Different communication protocols may correspond to different parameter types and numbers of parameters.
And the terminal analyzes the standard resource locator and acquires at least one parameter type corresponding to the standard parameter in the standard resource locator. The terminal can extract the test parameters corresponding to each standard parameter type from the database. The test parameters may be stored in a database. The database also stores the mapping relationship between the test parameters and the standard parameter types, and the mapping relationship between the test parameters and the standard parameter types can be stored in the database in the form of a data table. The terminal may test the standard resource locator using the test parameters. Specifically, the terminal may perform unit testing on the corresponding standard parameter type by using the test parameters, and obtain and display a test result through the terminal display interface.
In this embodiment, when generating the specific resource locator according to the standard resource locator, only the parameter of the standard resource locator may be modified without changing the parameter type and the parameter number corresponding to the parameter. The terminal tests the parameters which can be included by the standard resource locator by executing the test task of the identification resource locator, thereby determining the parameter application range of the standard resource locator and reducing the test cost of the generated specific resource locator.
It should be understood that although the various steps in the flow diagrams of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided a resource calling apparatus, including: a task obtaining module 402, a locator parsing module 404, a parameter obtaining module 406, and a resource calling module 408, wherein:
the task obtaining module 402 is configured to obtain a resource calling task generated by a web application, where the resource calling task carries a specific resource locator and a version identifier corresponding to the specific resource locator.
A locator check module 404, configured to check a specific resource locator; and when the verification is successful, acquiring the expansion parameters and the interface identifiers in the specific resource locator.
A parameter obtaining module 406, configured to determine the intrinsic parameter type in the specific resource locator according to the version identifier, and obtain an intrinsic parameter corresponding to the intrinsic parameter type.
And the resource calling module 408 is configured to call the resource corresponding to the inherent parameter and the extended parameter through the client application interface corresponding to the interface identifier.
In one embodiment, the resource invoking device further includes an authentication module, configured to generate a web application authentication request according to the resource invoking task, where the web application authentication request carries a signature corresponding to the web application; sending a web application authentication request to an authentication server; receiving an authorization list returned after the authentication server authenticates the webpage application according to the signature; verifying the interface identification according to the authorization list; and when the verification fails, generating abnormal prompt information.
In one embodiment, the resource invoking apparatus further includes a locator generating module, configured to obtain a specific resource locator generating task triggered by a web application, where the specific resource locator generating task carries an extension parameter; and calling the standard resource locator, and encapsulating the standard resource locator and the expansion parameters to obtain the specific resource locator.
In one embodiment, the locator generation module is further configured to obtain a corresponding version identifier from the authorization list according to the specific resource locator generation task; and calling a standard resource locator corresponding to the version identifier, wherein the authorization list comprises a mapping relation between the version identifier and the standard resource locator.
In one embodiment, the resource invoking device further includes a parameter testing module, configured to obtain a standard resource locator testing task, and obtain a corresponding standard resource locator according to the standard resource locator testing task; analyzing the standard resource locator to obtain a standard parameter type corresponding to the standard resource locator; acquiring a test parameter corresponding to the standard parameter type according to the standard parameter type; and testing the standard resource locator by using the testing parameters.
For the specific definition of the resource calling device, reference may be made to the above definition of the resource calling method, which is not described herein again. The modules in the resource calling device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a resource invocation method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the above-mentioned resource calling method embodiment when executing the computer program.
In one embodiment, a computer readable storage medium is provided, having stored thereon a computer program, which when executed by a processor, performs the steps in the above-described resource invocation method embodiment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.