CN104573489A - Method and device for forbidding application to establish desktop icon - Google Patents

Method and device for forbidding application to establish desktop icon Download PDF

Info

Publication number
CN104573489A
CN104573489A CN201510025525.5A CN201510025525A CN104573489A CN 104573489 A CN104573489 A CN 104573489A CN 201510025525 A CN201510025525 A CN 201510025525A CN 104573489 A CN104573489 A CN 104573489A
Authority
CN
China
Prior art keywords
application
desktop icons
creates
creating
forbidding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510025525.5A
Other languages
Chinese (zh)
Inventor
李元
宋爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510025525.5A priority Critical patent/CN104573489A/en
Publication of CN104573489A publication Critical patent/CN104573489A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a method for forbidding an application to establish a desktop icon. The method comprises the steps of monitoring behavior of establishing the desktop icon of an application program, intercepting an execution function of establishing the desktop icon of the application program and obtaining a package name of the application; forbidding the application to establish the desktop icon when the package name of the application exists in preset application data records forbidden to be establish the desktop icon. Correspondingly, the invention further provides a device for forbidding the application to establish the desktop icon and a method and device for pushing a blacklist of desktop icon establishing applications. Desktop icon management performed by a user can be facilitated, and meanwhile the safety risk caused by the fact that the user mistakenly clicks rogue programs disguising desktop icon establishment can be also avoided.

Description

Forbid that application creates desk-top picture calibration method and device
Technical field
The present invention relates to computer realm, specifically, the present invention relates to one and forbid that application creates desk-top picture calibration method and device.
Background technology
Along with the development of mobile Internet industry, the application program of mobile terminal gets more and more, each application is wished to have more user, so mobile phone desktop has just become the hotly contested spot of application program, if application creates icon on the table, meeting adding users uses the frequency of this application program, is applied in when installing or enable can sets up desktop icons so each.But too much desk-top picture rotating savings causes the desktop management of user chaotic, if having Malware also to create desktop icons simultaneously, easily produce the overdue desktop icons hitting Malware camouflage and generate of user, thus cause the safety problem of mobile terminal.So-called Malware, specifically refers to that acquiescence creates the application program of shortcut icon by force at desktop when not providing selection right to user.The invention provides one and forbid that application creates desk-top picture calibration method, make user can application programs desktop icons create select, make the more clean and tidy manageability of desktop icons, the security risk that the desktop icons simultaneously also avoiding Malware to create bring to user.
Summary of the invention
Object of the present invention is intended to solve at least one problem above-mentioned, and application creates desk-top picture calibration method to provide one to forbid, the selection according to user is forbidden applying the behavior creating desktop icons.Correspondingly, the present invention also provides a kind of forbidding to apply the device creating desktop icons.Meanwhile, also provide a kind of and push the method and device that create desktop icons application blacklist.
To achieve these goals, the invention provides following scheme:
One forbids that application creates desk-top picture calibration method, comprises the following steps:
Monitoring native application creates the behavior of desktop icons;
Interception pre-creates the execution function of the application program establishment desktop icons of desktop icons, obtains the bag name of this application;
When this application bag name be present in default be prohibited to create in the application data record of desktop icons time, then forbid that this application creates desktop icons.
Preferably, if the Action attribute of described application program is INSTALL_SHORTCUT, then this is applied as the application program pre-creating desktop icons.
Concrete, the described default application data record being prohibited to create desktop icons characterizes with database form, and this database has the mapping relations between the status items of the application program establishment desktop icons whether application Bao Mingyu allows this corresponding to application bag name.
Further, described method also comprises provides a user interface, for showing the application data record being prohibited to create desktop icons.
Forbid applying the device creating desktop icons, comprising:
Monitoring unit: monitoring native application creates the behavior of desktop icons;
Interception unit: interception pre-creates the application program of desktop icons, obtains the bag name of this application;
Forbid unit: forbid that being present in the default application program created in the application data record of desktop icons that is prohibited creates desktop icons.
Preferably, if the Action attribute of described application program is INSTALL_SHORTCUT, then this is applied as the application program pre-creating desktop icons.
Further, described device also comprises a request unit, for sending the request obtaining and create desktop icons application blacklist to cloud server.
Further, described device also comprises a feedback unit, for forbidding the application message creating desktop icons to cloud server feedback user.
Push the method creating desktop icons application blacklist, comprise the following steps:
Receive and the request of customer in response end;
Push the blacklist forbidding creating desktop icons application of cloud server record;
What return according to client forbids that the application message creating desktop icons upgrades blacklist.
Push the device creating desktop icons application blacklist, comprising:
Receive request unit: receive and the request of customer in response end transmission;
Push unit: the blacklist forbidding creating desktop icons application pushing cloud server record;
Updating block: what return according to client forbids that the application message creating desktop icons upgrades blacklist.
The solution of the present invention has the following advantages:
1, the invention provides one and forbid that application creates desk-top picture calibration method, the execution function of the application program establishment desktop icons of desktop icons is pre-created by interception, user is selected to the application forbidding creating desktop icons, the function return value that transmitting system is broadcasted is revised as failure, forbid that its transmitting system is broadcasted, thus realize forbidding that it creates desktop icons, facilitate user management desktop icons.
2, the data record being prohibited to create desktop icons preset described in method provided by the invention, characterized with the form of database, this database has the mapping relations between the status items of the application program establishment desktop icons whether application Bao Mingyu allows this corresponding to application bag name, the application forbidden by user can be determined by these mapping relations, contrast with the application bag name intercepted, thus determine whether the application intercepted is the application being prohibited to create desktop icons fast.
3, the invention provides a kind of method pushing establishment desktop icons application blacklist, cloud server counting user forbids the application creating desktop icons, most of user is forbidden blacklist is charged in the application creating desktop icons, and be pushed to client, the application in blacklist creates desktop icons to recommend user to forbid, Malware can be avoided to create desktop icons, thus prevent the safety problem that the overdue desktop icons hitting Malware of user cause.
The aspect that the present invention adds and advantage will part provide in the following description, and these will become obvious from the following description, or be recognized by practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or additional aspect and advantage will become obvious and easy understand from the following description of the accompanying drawings of embodiments, wherein:
Fig. 1 applies the method flow block diagram creating desktop icons a kind of forbidding
Fig. 2 applies the principle of device block diagram creating desktop icons a kind of forbidding
Fig. 3 is a kind of method flow block diagram pushing establishment desktop icons application blacklist
Fig. 4 is a kind of principle of device block diagram pushing establishment desktop icons application blacklist
Embodiment
Be described below in detail embodiments of the invention, the example of described embodiment is shown in the drawings, and wherein same or similar label represents same or similar element or has element that is identical or similar functions from start to finish.Being exemplary below by the embodiment be described with reference to the drawings, only for explaining the present invention, and can not limitation of the present invention being interpreted as.
Those skilled in the art of the present technique are appreciated that unless expressly stated, and singulative used herein " ", " one ", " described " and " being somebody's turn to do " also can comprise plural form.Should be further understood that, the wording used in instructions of the present invention " comprises " and refers to there is described feature, integer, step, operation, element and/or assembly, but does not get rid of and exist or add other features one or more, integer, step, operation, element, assembly and/or their group.Should be appreciated that, when we claim element to be " connected " or " coupling " to another element time, it can be directly connected or coupled to other elements, or also can there is intermediary element.In addition, " connection " used herein or " coupling " can comprise wireless connections or wirelessly to couple.Wording "and/or" used herein comprises one or more whole or arbitrary unit listing item be associated and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (comprising technical term and scientific terminology), have the meaning identical with the general understanding of the those of ordinary skill in field belonging to the present invention.It should also be understood that, those terms defined in such as general dictionary, should be understood to that there is the meaning consistent with the meaning in the context of prior art, unless and by specific definitions as here, otherwise can not explain by idealized or too formal implication.
Those skilled in the art of the present technique are appreciated that, here used " terminal ", " terminal device " had both comprised the equipment of wireless signal receiver, it only possesses the equipment of the wireless signal receiver without emissive ability, comprise again the equipment receiving and launch hardware, it has and on bidirectional communication link, can perform the reception of two-way communication and launch the equipment of hardware.This equipment can comprise: honeycomb or other communication facilitiess, its honeycomb or other communication facilities of having single line display or multi-line display or not having multi-line display; PCS (Personal Communications Service, PCS Personal Communications System), it can combine voice, data processing, fax and/or its communication ability; PDA (PersonalDigital Assistant, personal digital assistant), it can comprise radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, calendar and/or GPS (Global PositioningSystem, GPS) receiver; Conventional laptop and/or palmtop computer or other equipment, it has and/or comprises the conventional laptop of radio frequency receiver and/or palmtop computer or other equipment.Here used " terminal ", " terminal device " can be portable, can transport, be arranged in the vehicles (aviation, sea-freight and/or land), or be suitable for and/or be configured at local runtime, and/or with distribution form, any other position operating in the earth and/or space is run.Here used " terminal ", " terminal device " can also be communication terminal, access terminals, music/video playback terminal, can be such as PDA, MID (Mobile Internet Device, mobile internet device) and/or there is the mobile phone of music/video playing function, also can be the equipment such as intelligent television, Set Top Box.
Those skilled in the art of the present technique are appreciated that used remote network devices here, and it includes but not limited to the cloud that computing machine, network host, single network server, multiple webserver collection or multiple server are formed.At this, cloud is formed by based on a large amount of computing machine of cloud computing (Cloud Computing) or the webserver, and wherein, cloud computing is the one of Distributed Calculation, the super virtual machine be made up of a group loosely-coupled computing machine collection.In embodiments of the invention, realize communicating by any communication mode between remote network devices, terminal device with WNS server, include but not limited to, the mobile communication based on 3GPP, LTE, WIMAX, the computer network communication based on TCP/IP, udp protocol and the low coverage wireless transmission method based on bluetooth, Infrared Transmission standard.
Those skilled in the art should predict, and because disclosed technology relates to calling android system level resources, thus, need the Root authority of acquisition system before implementing the present invention.
As everyone knows, Root authority refers to system manager's authority of Unix type operating system (comprising Linux, Android), is similar to Administrator (keeper) authority in Windows (form) system; File (android system file and user file, do not comprise ROM) nearly all in the mobile device of user can be accessed and revise to Root authority.But, because current mobile terminal system is strict for the management of Root authority, most application or program do not possess Root authority under normal circumstances, therefore need the operation possessing Root authority just cannot perform for some, such as, install or unload the operations such as application; , all need to system application Root authority when this type of operation calls process performs corresponding operating at every turn meanwhile, if but now other application processes using Root authority to carry out associative operation, then the Root authority application of this calling process just cannot be successful; What is more, if user is provided with the operation of forbidding Root authority in systems in which, then relevant calling process just cannot carry out associative operation.
Based on this, the present invention proposes only to need to send a Root authority to system and obtains request, specifically by SU (Super User that calling system is built-in, power user) order acquisition Root authority, or by obtain have Root authority shell obtain Root authority and in shell startup process, then, after the Root authority mandate obtaining described system, when other calling process follow-up can be made need to perform associative operation, Root authority is applied for without the need to repeating; Concrete Root authority acquisition process can refer to the Root authority call function of prior art, and the present invention does not repeat them here.
Can find out, the obtain manner of Root authority, from the life cycle of authority effect, comprise permanent Root authority and temporary Root authority, as the term suggests, in permanent Root authority situation, application program is authorized once Root, can carry out Root later again and propose power operation; And in temporary Root authority situation, the life cycle of authority effect is the process of once shutting down from starting shooting to of operating system, next time, start still needed to carry out Root.Realization of the present invention is not by this classification restriction.
Certainly, implementer's formula that power is put forward about Root in this area is varied, thus, note that the enforcement of method and apparatus of the present invention, obtains Root authority though depend on, and is not limited to the embodiment obtaining Root mandate.
The present invention, using the running environment based on Android operation system as embodiment, refers to Fig. 1, and the specific embodiment of the invention is as follows:
S11, monitoring native application create the behavior of desktop icons
Basic thought of the present invention, is the application establishment desktop icons forbidding pre-creating desktop icons by default, and when user selects to allow application to create desktop icons, then allows it to create.Create the Behavior-Based control of desktop icons to realize application programs, the present invention, by the service processes on a resident backstage, monitors the event behavior that this application creates desktop icons.Application programs carries out event behavior monitoring, and the general Hook Function that adopts realizes, and also namely adopts known technology Hook function to realize creating application the behavior monitoring of desktop icons.
First the system root authority of equipment is obtained, then to system registry communication service process, the Binder communication mechanism that this service processes is provided by android system, and between the application service process of its monitoring, set up the communication pipe of C/S framework.
Wherein, service processes memory-resident of the present invention, after intended application is run by user, just can monitor the call instruction of this application.
It should be noted that when the call instruction that Hook Function monitors application runs, based on Hook know-why, Hook Function will be performed prior to this application call instruction.Be appreciated that, Hook Function monitors application call instruction, refer to the entrance monitoring this application call instruction (function) in intended application process, though at this moment application call instruction has the feature of operation, do not have the fact performing this application call instruction built-in function to occur.And namely Hook Function is linked up with at this entrance place, made by the amendment of address pointer intended application process turn to and perform Hook Function itself, when after the execution completing Hook Function, then the entrance of this application call instruction is turned to go to perform this component call instruction by Hook Function.
Specifically, first obtain the Root authority of system, then inject monitoring module to system service process, step is:
First, Break-Up System service processes;
Then, the library file of amended system service process is covered former library file; Wherein, the function in amended library file comprises the function code, jar bag .so file etc. of monitoring module.Thus by the service processes of monitoring module injected system, the service processes of other application in supervisory system.
The application program that S12, interception pre-create desktop icons creates the execution function of desktop icons, obtains the bag name of this application
The Intent information such as data, additional data that the responsible action to single job in application, action relate in Android is described, corresponding assembly is found in the description of android system intent accordingly, intent is passed to the assembly called, and complete calling of assembly.Intent not only may be used between application program, mutual between the Activity/Service that also may be used for application program inside.Intent can also initiate a broadcast broadcast, has the attributes such as action (Action), data (data), classification (category), type (type), assembly (component) and expansion letter (extra).Wherein Action refers to the action that Intent will complete, and is a character constant.Data is the URI and mime type that perform an action, and different Action has different data data to specify.Category is the additional information of Action of performing an action.The data type of Type attribute Explicit designation Intent, the data type of general Intent can judge according to data itself, but by arranging this attribute, can force adopt the type of Explicit designation and no longer derive.The target element class title of component attribute assigned I ntent, android system is searched according to such as the attributes such as Action, data, category usually, find a target element mated with Intent, if but component has appointment, then directly use the assembly of specifying.Extra attribute is the additional information of adding some assemblies, as the information such as icon, display Name.
Desktop is controlled by launcher, launcher can be allowed to create shortcut icon by sending broadcast to launcher, also can be the IntentFilter of the some symbol specified conditions of component register of application program, directly add at the desktop of launcher the shortcut icon starting this assembly.
Launcher can customize the shortcut icon of oneself in order to application program, have registered a BroadcastReceiver and receives the shortcut icon customized information that other application programs send specially.The information of shortcut icon is stored in the Intent object of broadcasting away with the form of additional information, comprise icon, display title and be used for starting the intent of target element, by the overloaded method of putExtra, specify corresponding key assignments, these information are put in the bundle object of additional information.
Application creates desktop shortcut icon and mainly divides three steps:
1, the Intent object that is added shortcut icon is created
The log-on message of InstallShortcutReceiver:
Wherein this registers Intent object's property value as com.android.launcher.action.INSTALLSHORTCUT.
2, by adding the application program that the title of Extra setup of attribute shortcut, icon and shortcut correspondence starts for this Intent
Intent shortcut=new Intent(“com.android.launcher.action.INSTALL_SHORTCUT”);
Intent shortcutIntent=cx.getPackageManager().gerLaunchIntentForPackage(cx.getPackageName());
shortcut.putExtra(Intent.EXTRA_SHORTCUT_INTENT,shortcutIntent);
Wherein, shortcutIntent is the attribute of the Extra arranged, and is the desktop icons title of application program display herein, is attached to Intent object shortcut by function putExtra.
3, call sendBroadcast () method and send broadcast interpolation shortcut icon
By function sendBroadcast (shortcut), application program sends the broadcast adding shortcut icon to system, sends broadcast allow launcher create shortcut icon to launcher.
The Action attribute of contrast Intent object, if attribute is INSTALL_SHORTCUT, for pre-creating the program of desktop shortcut icon, application program creates desktop icons by performing the broadcast of function sendBroadcast () transmitting system, the parameter encapsulation that application program first will be transmitted in this process enters into the broadcastIntent () function of ActivityManagerService by Binder driver, then tackle the broadcastIntent () function of this application program, just can obtain the PID of this application program, UID, the information such as application bag name.The partial code of broadcastIntent () function is as follows,
Wherein, the Uid of callingPid to be the Pid of application program, callingUid be application program, callerApp.info.packageName is the bag name of application program.
S13, when this application bag name be present in default be prohibited to create in the application data record of desktop icons time, then stop this application to create desktop icons
The monitoring module of injected system scans all set up applications, and record the bag name of all application programs and create the status items of desktop icons, user is presented to the form at interface, by user, the status items of the establishment desktop icons of described application program is operated, select to allow or forbid that corresponding application programs creates desktop icons.The application bag name pre-created in the application package name of desktop shortcut icon and the application list of record intercepted is contrasted one by one, if the application bag name matched the status items of establishment desktop icons for forbidding, then stop this application to create desktop icons.
Wherein, described data record is characterized with the form of database, there are the mapping relations between the status items applying the application program establishment desktop icons whether Bao Mingyu allows this corresponding to application bag name, both the record allowing the application creating desktop icons had been comprised, comprise again the record forbidding the application creating desktop icons, or only comprise the record forbidding the application creating desktop icons; Comprise the information such as application bag name, UID, status items.
In addition, to cloud server acquisition request blacklist, the blacklist that most of user forbids the application creating desktop icons is recorded; When the application pre-creating desktop icons is present in described blacklist, user is then recommended to forbid that this application creates desktop icons, whether specifically recommending user to forbid by described interface display, this application creates desktop icons, user arranges the status items of corresponding application by described interface, forbids if be set to, and forbids that this application creates desktop icons.Detailed process is:
When intercepting the application pre-creating desktop icons, the blacklist creating desktop icons is forbidden to the most of user of cloud server acquisition request record, and the bag name scanned by monitoring module in the Bao Mingyu blacklist in the application data record obtained contrasts one by one, it creates desktop icons to recommend user to forbid the application be present in blacklist, selected whether to forbid by user, and result feedback user selected is to cloud server.User selects the application forbidding creating desktop icons not to be present in blacklist simultaneously, also this application message is fed back to cloud server.
Forbid that the embodiment that user selects the application forbidding creating desktop icons to create shortcut icon is:
The monitoring module that system is injected has two jar bags, comprise the logic module of the function that process hook arrives, by hook to application program import hook function into by the parameter of Intent object transfer, the parameter of the logic module application programs transmission in being wrapped by jar is judged, to go forward side by side row relax, to forbidding that the application program creating desktop icons returns failure, make parameter successfully can not be passed to system, application program cannot successful transmitting system be broadcasted, thus forbids that application program creates desktop shortcut icon.
Accordingly, the present invention also provides a kind of forbidding to apply the device creating desktop icons, comprises monitoring unit 11, interception unit 12, forbids unit 13 and request unit 14, feedback unit 15.Wherein,
Monitoring unit 11 creates the behavior of desktop shortcut icon for monitoring the machine application, by injected system service processes, hook function is to transmitting system broadcast function hook during application establishment shortcut icon.Embodiment is:
First, Break-Up System service processes;
Then, the library file of amended system service process is covered former library file; Wherein, the function in amended library file comprises the function code, jar bag .so file etc. of monitoring module.Thus by the service processes of monitoring module injected system, the service processes of other application in supervisory system.
Interception unit 12, for tackling the execution function of the establishment desktop shortcut icon of application program, obtains its bag name, the Action attribute of contrast Intent object, if attribute is INSTALL_SHORTCUT, for pre-creating the program of desktop shortcut icon, application program creates desktop icons by performing the broadcast of function sendBroadcast () transmitting system, the parameter encapsulation that application program first will be transmitted in this process enters into the broadcastIntent () function of ActivityManagerService by Binder driver, then tackle the broadcastIntent () function of this application program, just can obtain the PID of this application program, UID, the information such as application bag name.When the application program of hook pre-creates desktop icons, the function broadcastIntent () that it calls is tackled, and obtain the information such as PID, UID, application bag name of interception application.
Forbid that unit 13 is for forbidding that user selects the application forbidding creating desktop icons to create the behavior of icon.The monitoring module of injected system scans all set up applications, and record the bag name of all application programs and create the status items of desktop icons, user is presented to the form at interface, by user, the status items of the establishment desktop icons of described application program is operated, select to allow or forbid that corresponding application programs creates desktop icons.The application bag name pre-created in the application package name of desktop shortcut icon and the application list of record intercepted being contrasted one by one, if the status items of the establishment desktop icons of the application bag name matched is for forbidding, then forbidding that this application creates desktop icons.
Wherein, described data record is characterized with the form of database, there are the mapping relations between the status items applying the application program establishment desktop icons whether Bao Mingyu allows this corresponding to application bag name, both the record allowing the application creating desktop icons had been comprised, comprise again the record forbidding the application creating desktop icons, or only comprise the record forbidding the application creating desktop icons; Comprise the information such as application bag name, application function brief introduction, status items.
Meanwhile, to cloud server acquisition request blacklist, record the blacklist that most of user forbids the application creating desktop icons; When the application pre-creating desktop icons is present in described blacklist, then recommend user to forbid that this application creates desktop icons, user arranges the status items of corresponding application by described interface, forbids if be set to, and forbids that this application creates desktop icons.
The monitoring module that system is injected has two jar bags, comprise the logic module of the function that process hook arrives, by hook to application program import hook function into by the parameter of Intent object transfer, the parameter of the logic module application programs transmission in being wrapped by jar is judged, to go forward side by side row relax, to forbidding that the application program creating desktop icons returns failure, make parameter successfully can not be passed to system, application program cannot successful transmitting system be broadcasted, thus stops application program to create desktop shortcut icon.
Request unit 14 is for forbidding the application blacklist creating desktop icons to cloud server acquisition request.Obtain blacklist by request unit 14, recommend the application can forbidding creating desktop icons thus to user.User is selected to the application message forbidding creating desktop icons, send to cloud server by feedback unit 15, the application message of server real-time update record.
The invention provides a kind of method pushing establishment desktop icons application blacklist, concrete steps are as follows:
S11, to receive and the request of customer in response end
The blacklist forbidding the application of establishment desktop icons of S12, propelling movement cloud server record
To user, cloud server forbids that the application creating desktop icons is added up, if the corresponding statistical value of described application is greater than the threshold value of setting, then blacklist is charged in this application, wherein said statistical value can for forbidding that this application creates the number of users of desktop icons, also can for forbidding number of users that this application creates desktop icons and the ratio of all numbers of users using this application; Can certainly be other forms of statistics, anyly can forbid that described application creates the statistics of desktop icons and is all applicable to the present invention by characterizing consumer quantitatively, repeat no more herein.
Cloud server pushes described blacklist to client, and which application is client recommend can forbid creating desktop icons according to this blacklist to user.
S13, the application message renewal blacklist forbidding creating desktop icons returned according to client
The user returned according to client forbids the application message creating desktop icons, again adds up, then upgrade blacklist to the application message in cloud server database.
Correspondingly, the present invention also provides a kind of and pushes the device creating desktop icons application blacklist, comprises and receives request unit 11, push unit 12, updating block 13, wherein
Receive request unit 11 for receiving and the request of customer in response end transmission.
Push unit 12 is for pushing the blacklist forbidding creating desktop icons application of cloud server record.To user, cloud server forbids that the application creating desktop icons is added up, if the corresponding statistical value of described application is greater than the threshold value of setting, then blacklist is charged in this application, wherein said statistical value can for forbidding that this application creates the number of users of desktop icons, also can for forbidding number of users that this application creates desktop icons and the ratio of all numbers of users using this application; Can certainly be other forms of statistics, anyly can forbid that described application creates the statistics of desktop icons and is all applicable to the present invention by characterizing consumer quantitatively, repeat no more herein.
Cloud server pushes described blacklist to client, and which application is client recommend can forbid creating desktop icons according to this blacklist to user.
For what return according to client, updating block 13 forbids that the application message creating desktop icons upgrades blacklist.
Scheme of the present invention can as security guard, a kind of function of the Software tools such as mobile phone assistant uses, when user enables this function, with the form at interface, by application package name, the mapping relations applying information such as the establishment status items of desktop icons, the abbreviated functional description of application program etc. whether are allowed to present to user, user, by arranging the status items of the establishment desktop icons of application program, selects to allow or forbid that certain or some application programs create desktop icons.User selects the application forbidding creating desktop shortcut icon, then forbid that method is forbidden by of the present invention; Otherwise do not forbid.Meanwhile, generate a blacklist by cloud server, record certain proportion customer volume selects the application information forbidding creating desktop icons; According to this blacklist, this application creates desktop icons to recommend user to forbid, and is determined whether to forbid by user, if select to forbid that this application creates desktop icons, adopts and of the present inventionly forbids that method is forbidden; Otherwise do not forbid, and by this information feed back to cloud server to upgrade blacklist.
The above is only some embodiments of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. forbid that application creates a desk-top picture calibration method, it is characterized in that, comprise the following steps:
Monitoring native application creates the behavior of desktop icons;
Interception pre-creates the execution function of the application program establishment desktop icons of desktop icons, obtains the bag name of this application;
When this application bag name be present in default be prohibited to create in the application data record of desktop icons time, then forbid that this application creates desktop icons.
2. one according to claim 1 forbids that application creates desk-top picture calibration method, and it is characterized in that, if the Action attribute of described application program is INSTALL_SHORTCUT, then this is applied as the application program pre-creating desktop icons.
3. one according to claim 1 forbids that application creates desk-top picture calibration method, it is characterized in that, the described default application data record being prohibited to create desktop icons characterizes with database form, and this database has the mapping relations between the status items of the application program establishment desktop icons whether application Bao Mingyu allows this corresponding to application bag name.
4. one according to claim 4 forbids that application creates desk-top picture calibration method, and it is characterized in that, described method also comprises provides a user interface, for showing the application data record being prohibited to create desktop icons.
5. forbid applying the device creating desktop icons, it is characterized in that, comprising:
Monitoring unit: monitoring native application creates the behavior of desktop icons;
Interception unit: interception pre-creates the application program of desktop icons, obtains the bag name of this application;
Forbid unit: forbid that being present in the default application program created in the application data record of desktop icons that is prohibited creates desktop icons.
6. a kind of forbidding according to claim 9 applies the device creating desktop icons, and it is characterized in that, if the Action attribute of described application program is INSTALL_SHORTCUT, then this is applied as the application program pre-creating desktop icons.
7. a kind of forbidding according to claim 9 applies the device creating desktop icons, and it is characterized in that, described device also comprises a request unit, for sending the request obtaining and create desktop icons application blacklist to cloud server.
8. a kind of forbidding according to claim 9 applies the device creating desktop icons, and it is characterized in that, described device also comprises a feedback unit, for forbidding the application message creating desktop icons to cloud server feedback user.
9. push the method creating desktop icons application blacklist, it is characterized in that, comprise the following steps:
Receive and the request of customer in response end;
Push the blacklist forbidding creating desktop icons application of cloud server record;
What return according to client forbids that the application message creating desktop icons upgrades blacklist.
10. push the device creating desktop icons application blacklist, it is characterized in that, comprising:
Receive request unit: receive and the request of customer in response end transmission;
Push unit: the blacklist forbidding creating desktop icons application pushing cloud server record;
Updating block: what return according to client forbids that the application message creating desktop icons upgrades blacklist.
CN201510025525.5A 2015-01-19 2015-01-19 Method and device for forbidding application to establish desktop icon Pending CN104573489A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510025525.5A CN104573489A (en) 2015-01-19 2015-01-19 Method and device for forbidding application to establish desktop icon

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510025525.5A CN104573489A (en) 2015-01-19 2015-01-19 Method and device for forbidding application to establish desktop icon

Publications (1)

Publication Number Publication Date
CN104573489A true CN104573489A (en) 2015-04-29

Family

ID=53089529

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510025525.5A Pending CN104573489A (en) 2015-01-19 2015-01-19 Method and device for forbidding application to establish desktop icon

Country Status (1)

Country Link
CN (1) CN104573489A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application
CN106557317A (en) * 2016-10-28 2017-04-05 北京奇虎科技有限公司 A kind of method and apparatus that shortcut is created in desktop
CN110555600A (en) * 2019-08-16 2019-12-10 苏州浪潮智能科技有限公司 method, device, equipment and storage medium for preventing forbidden components in modular BOM from being misused
CN116048545A (en) * 2022-08-24 2023-05-02 荣耀终端有限公司 Processing method of popup advertisement, electronic equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425926A (en) * 2012-05-14 2013-12-04 腾讯科技(深圳)有限公司 Application program starting method, list configuring method, terminal and server
CN103473049A (en) * 2013-08-30 2013-12-25 广东欧珀移动通信有限公司 Method, device and terminal for intercepting application for automatic generating of desktop shortcut
CN103546641A (en) * 2013-10-29 2014-01-29 广东欧珀移动通信有限公司 Method and device for filtering messages on notification bar of mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425926A (en) * 2012-05-14 2013-12-04 腾讯科技(深圳)有限公司 Application program starting method, list configuring method, terminal and server
CN103473049A (en) * 2013-08-30 2013-12-25 广东欧珀移动通信有限公司 Method, device and terminal for intercepting application for automatic generating of desktop shortcut
CN103546641A (en) * 2013-10-29 2014-01-29 广东欧珀移动通信有限公司 Method and device for filtering messages on notification bar of mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张磊: "《办公自动化高级实例教程》", 28 February 2011, article "8.2 实例2:防火墙的使用(360木马防火墙)", pages: 262-264 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application
CN106557317A (en) * 2016-10-28 2017-04-05 北京奇虎科技有限公司 A kind of method and apparatus that shortcut is created in desktop
CN110555600A (en) * 2019-08-16 2019-12-10 苏州浪潮智能科技有限公司 method, device, equipment and storage medium for preventing forbidden components in modular BOM from being misused
CN110555600B (en) * 2019-08-16 2022-06-14 苏州浪潮智能科技有限公司 Method, device, equipment and storage medium for preventing forbidden components in modular BOM from being misused
CN116048545A (en) * 2022-08-24 2023-05-02 荣耀终端有限公司 Processing method of popup advertisement, electronic equipment and readable storage medium
CN116048545B (en) * 2022-08-24 2023-11-07 荣耀终端有限公司 Processing method of popup advertisement, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110651269B (en) Isolated container event monitoring
CN105183307B (en) Application messages display control method and device
US9313216B2 (en) Method and system for monitoring application program of mobile device
CN105095746A (en) Method and device for application program starting authentication
CN105094922B (en) Application program exempts from installation and operation control method and its device
EP2129148B1 (en) Content distribution system
CN109564527B (en) Security configuration of cloud computing nodes
CN108563958B (en) Role permission updating method and device, computer equipment and storage medium
CN104462952A (en) Method and device for preventing self-starting of application
CN102752369B (en) The supplying method of TV applications service and virtual content service platform
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN103677935A (en) Installation and control method, system and device for application programs
CN104850779A (en) Safe application program installing method and safe application program installing device
CN104484259A (en) Application program traffic monitoring method and device, and mobile terminal
CN102855148A (en) Android-based startup management method
CN104376268B (en) Using method for hidden controlling and device
CN104239786A (en) ROOT-free active defense configuration method and device
CN101968741A (en) Method, server and system for data update
US10404568B2 (en) Agent manager for distributed transaction monitoring system
CN103888619A (en) Message processing method and system thereof
CN102016826A (en) Web browsing environment provider system for multiple users and control method thereof
CN105631312A (en) Method and system for processing rogue programs
CN104573489A (en) Method and device for forbidding application to establish desktop icon
CN105553999A (en) Application program user behavior analysis and security control method and corresponding device
CN102413125B (en) Single-point login method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150429

RJ01 Rejection of invention patent application after publication