CN110377363A - Method, apparatus, terminal and the storage medium of application are installed - Google Patents

Method, apparatus, terminal and the storage medium of application are installed Download PDF

Info

Publication number
CN110377363A
CN110377363A CN201910647502.6A CN201910647502A CN110377363A CN 110377363 A CN110377363 A CN 110377363A CN 201910647502 A CN201910647502 A CN 201910647502A CN 110377363 A CN110377363 A CN 110377363A
Authority
CN
China
Prior art keywords
file
installation
application
target application
support
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910647502.6A
Other languages
Chinese (zh)
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN201910647502.6A priority Critical patent/CN110377363A/en
Publication of CN110377363A publication Critical patent/CN110377363A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the present application discloses method, apparatus, terminal and the storage medium of a kind of installation application, belong to field of computer technology, whether the support file that the application is able to detect target application is abnormal document, when supporting file is abnormal document, the importance attribute for supporting file can be obtained, the importance attribute, which is used to indicate, supports significance level of the file in target application operation to complete the installation of target application according to the importance attribute.It can be seen that, scheme provided by the present application can the support file to target application detect, and the installation of target application is determined according to the significance level for the support file applied for installation targets, so that using that can be judged on the thinner support file of granularity during the installation process, it realizes under the premise of guaranteeing that application is safe, improves the effect of the installation effectiveness of target application.

Description

Method, apparatus, terminal and the storage medium of application are installed
Technical field
The invention relates to field of computer technology, in particular to a kind of method, apparatus of installation application, terminal and Storage medium.
Background technique
With mobile terminal being widely used in life, user realizes different functions by installing application program.So And the information security of mobile terminal is affected comprising virulent installation kit.
In some modes in the cards, mobile terminal can carry out viral diagnosis during the installation process, detect After virus, it can stop that application program is installed and delete the installation kit.
Summary of the invention
The embodiment of the present application provides method, apparatus, terminal and the storage medium of a kind of installation application.The technical solution It is as follows:
According to the one side content of the application, a kind of method of installation application is provided, which comprises
Whether the support file for detecting target application is abnormal document, and the support file is for being discharged into terminal and propping up Hold the operation of the target application;
When the support file is the abnormal document, the importance attribute for supporting file is obtained, it is described important Property attribute be used to indicate the significance level of the support file when the target application is run;
According to the importance attribute, the remainder of the installation procedure is executed.
According to the another aspect content of the application, a kind of device of installation application is provided, described device includes:
File detection module, whether the support file for detecting target application is abnormal document, and the support file is used In the operation for being discharged into terminal and supporting the target application;
Attribute obtains module, for when the support file is the abnormal document, obtaining the weight for supporting file The property wanted attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Program execution module, for executing the remainder of the installation procedure according to the importance attribute.
According to the another aspect content of the application, a kind of terminal is provided, the terminal includes processor and memory, institute It states and is stored at least one instruction in memory, described instruction is loaded by the processor and executed to realize that the application such as is implemented The method of the installation application of offer.
According to the another aspect content of the application, a kind of computer readable storage medium is provided, in the storage medium It is stored at least one instruction, described instruction is loaded by processor and executed to realize that the application such as implements the installation application provided Method.
Technical solution bring beneficial effect provided by the embodiments of the present application may include:
Since whether the support file that the application is able to detect target application is abnormal document, supporting that file is abnormal literary When part, the importance attribute for supporting file can be obtained, which, which is used to indicate, supports file to run in target application When significance level the installation of target application is completed according to the importance attribute.It can be seen that scheme energy provided by the present application It is enough that the support file of target application is detected, and determined according to the significance level for the support file applied for installation targets The installation of target application, so that being realized using that can be judged on the thinner support file of granularity during the installation process Under the premise of guaranteeing that application is safe, the effect of the installation effectiveness of target application is improved.
Detailed description of the invention
It, below will be to institute in the embodiment of the present application description in order to more clearly introduce the technical solution in the embodiment of the present application Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the structural block diagram for the terminal that one exemplary embodiment of the application provides;
Fig. 2 is the flow chart of the method for the installation application that one exemplary embodiment of the application provides;
Fig. 3 is the method flow diagram for the installation application that another exemplary embodiment of the application provides;
Fig. 4 is a kind of schematic diagram of the process of installation targets application provided based on embodiment illustrated in fig. 3;
Fig. 5 is a kind of schematic diagram of the user interface provided based on embodiment illustrated in fig. 3;
Fig. 6 is the schematic diagram of another user interface provided based on embodiment illustrated in fig. 3;
Fig. 7 shows the structural block diagram of the device for the installation application that one exemplary embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
In the following description when referring to the accompanying drawings, unless otherwise indicated, the same numbers in different attached drawings indicate same or similar Element.Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the application Formula.On the contrary, they are only the device and side consistent with some aspects as detailed in the attached claim, the application The example of method.
In the description of the present application, it is to be understood that term " first ", " second " etc. are used for description purposes only, without It can be interpreted as indication or suggestion relative importance.In the description of the present application, it should be noted that unless otherwise specific regulation And restriction, term " connected ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, Or it is integrally connected;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, intermediary can also be passed through It is indirectly connected.For the ordinary skill in the art, the tool of above-mentioned term in this application can be understood with concrete condition Body meaning.In addition, unless otherwise indicated, " multiple " refer to two or more in the description of the present application."and/or" is retouched The incidence relation of affiliated partner is stated, indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, together When there are A and B, these three situations of individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
For scheme shown in the embodiment of the present application it can be readily appreciated that below to several nouns occurred in the embodiment of the present application into Row is introduced.
Target application: it refers to run third-party application in the terminal.In a kind of possible scene, the target application It is application in the terminal by installation process installation, in alternatively possible scene, which faced by load When file into terminal, to realize the normal use of target application in the terminal.
Optionally, when the target application be by installation procedure installation in the terminal in application, the target application can be with It is third-party application, which can be installed in terminal by installation kit.
Optionally, when the target application by loading temporary file into terminal in use, the target application can be At least one of fast application, mini application or small routine.
It supports file: referring in the installation process of target application, be discharged into terminal, and the text for supporting target to use Part.When target application operation, target application supports file by calling, and realizes specified function.In a kind of possible mode In, a target application corresponds to multiple support files, and different support files is for supporting different functions.
Optionally, in the installation process of target application, if target application can discharge n support file, n support The release process of file is completed by a queue sequence.For example, terminal is sequentially completed the 1st support file, the 2nd branch Hold file ..., n-th support file release, to complete the installation of target application.
Abnormal document: refer to the file different from the file in script installation kit.For example, m-th of support text in installation kit Part, which is destroyed, becomes m* file, then it is abnormal document that the m* file is different from m-th of support file of script.It is optional Ground, abnormal document can also be in the file comprising malicious process, the file comprising malicious code or the incomplete file of code At least one.
Importance attribute: it is used to indicate the attribute for supporting significance level of the file in target application operation.One kind can In the implementation of energy, importance attribute can be the decision of the file type according to support file.
In one possible implementation, importance attribute can be a mark, the assignment of the mark can be 0 or 1。
Optionally, when the assignment of mark is 0, which, which is used to indicate, supports that file is to support target application Necessary functions.When the assignment of mark is 1, which, which is used to indicate, supports that file is the non-indispensability for supporting target application Function.
Optionally, when the assignment of mark is 1, which, which is used to indicate, supports that file is to support target application Necessary functions.When the assignment of mark is 0, which, which is used to indicate, supports that file is the non-indispensability for supporting target application Function.
In alternatively possible implementation, importance attribute can be a grade point, which is used to indicate Support the importance of function of the file in target application operational process.For example, importance attribute can be divided into A, B and C tri- Grade, grade A, which is used to indicate, supports that file is the necessary functions for supporting target application, belongs to system-level architecture file;Deng Grade B, which is used to indicate, supports that file is the necessary functions for supporting target application, and including system level data;Grade C is for referring to Show and supports that file is the non-necessary functions for supporting target application.
Optionally, importance attribute can also indicate to support whether file is text indispensable when target application operates normally Part.If lacking the support file, target application is unable to operate normally, for example can not normally be shown content or can not correctly be located The specified operation of reason, then the importance attribute of the support file is file indispensable when target application operates normally.Conversely, supporting text The importance attribute that part is is the file for the non-indispensability that target application operates normally.
Table one is referred to, it illustrates the corresponding relationships of a kind of file type and importance attribute.
Table one
File type xml dex arsc Res/
Importance attribute It is high It is high It is high It is low
Other than the file type shown in the table one, support that file can also include META-INF file type, this document The corresponding importance attribute of type is also low.It should be noted that META-INF file type can serve to indicate that and be stored in File in META-INF file.
Optionally, support that file can also include assets file type, this document type, which is also possible to be used to indicate, deposits The file being placed in assets file.
In Table 1, scheme provided by the present application can be by supporting the file type of file to judge corresponding importance category Property.
It should be noted that the application can also determine the importance attribute for supporting file by other means.For example, logical It crosses and the title of file is supported to determine the importance attribute for supporting file.
Illustratively, the method that application is installed shown in the embodiment of the present application, can be using in the terminal, which has The function of application is installed.Terminal may include mobile phone, tablet computer, laptop computer, desktop computer, computer all-in-one machine, service Device, work station, TV, set-top box, smart glasses, smart watches, digital camera, MP4 playback terminal, MP5 playback terminal, study Machine, point reader, electric paper book, electronic dictionary or car-mounted terminal etc..
Referring to FIG. 1, Fig. 1 is the structural block diagram for the terminal that one exemplary embodiment of the application provides, as shown in Figure 1, The terminal includes processor 120 and memory 140, at least one instruction is stored in the memory 140, described instruction is by institute Processor 120 is stated to load and execute to realize the method for installing application as described in each embodiment of the method for the application.
In this application, terminal 100 is the electronic equipment for having installation application function.Terminal 100 is able to detect target and answers Whether support file is abnormal document, and when supporting file is abnormal document, terminal 100 can obtain the weight for supporting file The property wanted attribute, and according to the installation of importance attribute completion target application.
Processor 120 may include one or more processing core.Processor 120 utilizes various interfaces and connection Various pieces in entire terminal 100, by running or executing the instruction being stored in memory 140, program, code set or refer to Collection is enabled, and calls the data being stored in memory 140, executes the various functions and processing data of terminal 100.Optionally, Processor 120 can use Digital Signal Processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) at least one of example, in hardware realize.Processor 120 can integrating central processor (Central Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc. One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for The rendering and drafting of content to be shown needed for display screen;Modem is for handling wireless communication.On it is understood that Stating modem can not also be integrated into processor 120, be realized separately through chip piece.
Memory 140 may include random access memory (Random Access Memory, RAM), also may include read-only Memory (Read-Only Memory).Optionally, which includes non-transient computer-readable medium (non- transitory computer-readable storage medium).Memory 140 can be used for store instruction, program, generation Code, code set or instruction set.Memory 140 may include storing program area and storage data area, wherein storing program area can store Instruction for realizing operating system, the instruction at least one function (such as touch function, sound-playing function, image Playing function etc.), for realizing instruction of following each embodiments of the method etc.;It is real that storage data area can store following each method Apply the data etc. being related in example.
Referring to FIG. 2, Fig. 2 is the flow chart of the method for the installation application that one exemplary embodiment of the application provides.It should The method of installation application can be applied in above-mentioned terminal shown in FIG. 1.In Fig. 2, the method for installing application includes:
Step 210, whether the support file for detecting target application is abnormal document, supports that file is to be discharged into terminal and prop up Hold the file of target application.
In the embodiment of the present application, whether the support file that terminal is able to detect target application is abnormal document.In one kind In possible mode, terminal can detect in the installation process of target application and support whether file is abnormal document.
In alternatively possible mode, terminal can detect the branch of target application in the downloading process of the first installation kit Hold whether file is abnormal document.
Step 220, when supporting file is abnormal document, the importance attribute for supporting file is obtained, importance attribute is used Significance level of the file when target application is run is supported in instruction.
In the embodiment of the present application, when supporting file is abnormal document, terminal can obtain the importance for supporting file Attribute.In a kind of possible mode, terminal can start system specified service or system application execution is above-mentioned detected Journey, and when file is supported in confirmation when abnormal document, obtain the operation for supporting the importance attribute of file.
Step 230, according to importance attribute, the installation of target application is completed.
In the embodiment of the present application, terminal can complete the installation of target application according to the importance attribute for supporting file.
In one possible implementation, if indispensability when file is target application operation is supported in the instruction of importance attribute When file, terminal then stops the installation of target application, to prevent damaging when target application operation to the information stored in terminal Or leakage.
In alternatively possible implementation, if the instruction of importance attribute supports that file is non-when target application is run When necessary file, then terminal can improve the release of the support file, continue to complete remaining in the installation process of target application Support file release.In this scenario, terminal can enable target application operate normally, and ensure the letter stored in terminal The safety of breath.
In conclusion it is provided in this embodiment installation application method, be able to detect target application support file whether It is abnormal document, when supporting file is abnormal document, obtains the importance attribute of the support file, and according to the importance category Property, complete the installation of target application.Since the embodiment of the present application can be under the scene for supporting file to be abnormal document, to support The importance attribute of file itself is further judged, and the installation of target application is completed according to judging result.Therefore, originally Apply for that the scheme of offer can not directly stop the installation of target application when supporting file to occur abnormal, is answered in guarantee target Under the premise of safety, the availability of target application when the support file for improving target application occurs abnormal.
Based on scheme disclosed in upper one embodiment, terminal can also execute the application in the target application different stage The method of the installation application of offer, please refers to following examples.
Fig. 3 is referred to, Fig. 3 is the method flow diagram for the installation application that another exemplary embodiment of the application provides.It should The method of installation application can be applied in above-mentioned terminal shown in FIG. 1.In Fig. 3, the method for installation application includes:
Step 311, start the installation procedure of target application.
In the embodiment of the present application, terminal can start the installation procedure of target application.Optionally, installation procedure is to be used for File will be supported to be discharged into the program in terminal.When the installation procedure that terminal starting target application is crossed, terminal will be according to installation The sequence given in packet will support file to be successively discharged into terminal.
Step 312, when installation procedure is run, the support file of installation procedure release is obtained.
In the embodiment of the present application, terminal obtains the support file of installation procedure release when installation procedure is run.
In one possible implementation, terminal can first obtain the branch before one support file of every release Hold file.For example, terminal when installation procedure is run, first will support file solution from installation kit to press out, by the support file First it is temporarily stored in the memory headroom of isolation or the hard drive space of isolation.At this point, terminal can obtain the support file.
In the mode of alternatively possible realization, terminal can be detected the first peace during downloading the first installation kit Whether the support file that dress packet summarizes is abnormal document.Optionally, terminal can start the downloading program of the first installation kit, at this During downloading program operation, whether the support file detected in the first installation kit is abnormal document.
Referring to FIG. 4, Fig. 4 is a kind of schematic diagram of the process of installation targets application provided based on embodiment illustrated in fig. 3. In Fig. 4, the installation kit 410 of target application 40 includes to support file 411, support file 412, support file 413, support file 414, it supports file 415, support file 416 and supports file 417.When the file in above-mentioned installation kit 40 is discharged into terminal When, terminal will complete the installation of target application 40.It should be noted that supporting file 411, supporting file 414 and supporting file 415 be the necessary functions for supporting target application, and when lacking above-mentioned support file, target application 40 will be unable to normally transport Row.It supports file 412, support file 413, support file 416 and support that file 417 is non-in target application 40 for supporting Necessary functions, which is alternatively referred to as miscellaneous function.
It is discussed from another angle, in Fig. 4, when support file 411, supports file 414 and support that file 415 is smoothly complete When at release, target application can complete indispensable function by normal open.
In Fig. 4, when terminal will support the solution from installation kit of file 412 to press out and detect, detection determines the branch When to hold file 412 be abnormal document, the importance attribute of the support file 412 is got.Due to supporting the importance of file 412 Attribute is to indicate that the support file 412 is used to support the unnecessary functions of target application, and therefore, terminal will skip support file 412 release process continues to discharge other support files.In the installation process of file destination 40 shown in Fig. 4, terminal is first File 411 is supported in release, then skips the release process for supporting file 412, is continued release and is supported file 413, supports file 414, it supports file 415, support file 416 and supports file 417.Finally, target application by discharge support file 411, branch File 413 is held, file 414 is supported, supports file 415, supporting file 416 and file 417 is supported to form.
Step 313, detection supports whether file is abnormal document.
In the embodiment of the present application, terminal can detect the support file.It should be noted that terminal can open The application provided with system application, system service or third-party application, detects the support file, detects support text Whether part is abnormal document.
In one possible implementation, abnormal document can be the file comprising malicious process, comprising malicious code File or at least one of the incomplete file of code.
Optionally, terminal can determine whether abnormal document is the file comprising malicious process by way of characteristic matching Or the file comprising malicious code.
Optionally, terminal can be determined by the integrity detection of file supports whether file is completed.
Step 320, when supporting file is abnormal document, the importance attribute for supporting file is obtained.
In the embodiment of the present application, the implementation procedure of step 320 and the implementation procedure of step 220 are identical, no longer superfluous herein It states.
In the embodiment of the present application, when terminal, which executes, completes step 320, terminal is able to carry out step 331 and step 332, alternatively, executing step 333.
Step 331, when importance attribute indicates to support that file is the non-necessary functions for supporting target application, in mesh In the installation process for marking application, the release process for supporting file is skipped.
In the embodiment of the present application, when importance attribute indicates to support that file is the inessential function for supporting target application When energy, terminal in the installation process of target application, will skip the release process for supporting file.By the operation, terminal can Support file be abnormal document and support target application cross unnecessary functions when, be not released in terminal, avoid this The potential security risk of file is supported to impact terminal.
Step 332, other support files in the installation kit of target application are discharged, to complete the installation of target application.
In the embodiment of the present application, terminal can be during skipping the release of above-mentioned support file, to next support File repeats step 311, step 312, step 313 and step 320, uses the same processing subsequent support of logical process File.Other support files in installation kit to complete release target application, to complete the installation of target application.
Step 333, when importance attribute indicates to support that file is the necessary functions for supporting target application, peace is terminated Fill program.
In the embodiment of the present application, terminal can indicate to support that file is the indispensability for supporting target application in importance attribute When function, installation procedure, no longer installation targets application are terminated.Optionally, after installation procedure is terminated, terminal can also be removed Have been released into the support file in terminal.
In a kind of possible implementation provided by the present application, terminal can also be the support text of abnormal document to installation Result caused by after part is prejudged, and shows the result and the first interactive controls of the anticipation.User can be by user to The control of one interactive controls, Lai Zizhu decide whether to terminate installation procedure.The process includes step a1, step a2 and step a3, It is as follows in detail:
Step a1 determines branch when importance attribute indicates to support that file is the necessary functions for supporting target application Hold operation result of the file in target application operation.
In the embodiment of the present application, terminal indicates to support that file is the indispensability for supporting target application in importance attribute When function, the operation result for supporting file when target application is run is determined.
In one possible implementation, operation result, which is used to indicate, supports file in target application operation to terminal Extent of injury.Optionally, operation result can be distinguished with grade, for example, high, the low three grades of neutralization.
In alternatively possible implementation, operation result can also directly display the support file and actually will lead to Result.For example, terminal directly displays, " there is exception in the support file a in the installation kit of target application, may cause after installation Target application is by the risk of remote control ".
Optionally, operation result is influence caused by entirety after target application is installed.The operation result may include transplanting At least one of advertisement, spyware, malicious shareware, virus, wooden horse, worm or back door.
Step a2 shows operation result and the first interactive controls.
In the embodiment of the present application, terminal can show operation result and the first interactive controls in display screen.First hands over Mutual control can be virtual push button.In the case where display screen is touch display screen, the first interactive controls can be passed through by user The triggering of the modes of operation such as click.
Step a3 terminates installation procedure when the first interactive controls are triggered.
In the embodiment of the present application, terminal will indicate that installation procedure is out of service, together when the first interactive controls are triggered When can also delete the corresponding support file of the target application discharged.
Referring to FIG. 5, Fig. 5 is a kind of schematic diagram of the user interface provided based on embodiment illustrated in fig. 3.In Fig. 5, when When the instruction of importance attribute supports that file is the necessary functions for supporting target application, determines and file is supported to transport in target application Operation result when row, and operation result 510 and the first interactive controls 520 are shown in user interface 500, when the first interaction control When part 520 is triggered, terminal installation procedure out of service.Optionally, terminal display alarm can also disappear in user interface 500 Cease 530 " installation procedure of target application has stopped ".
Optionally, terminal can also show third interactive controls in user interface 500, when the third interactive controls are touched When hair, terminal will discharge above-mentioned support file, and target application is enabled to complete installation.
Based on embodiment shown in fig. 5, third interactive controls 540 can be shown together with the first interactive controls 520, when this When third interactive controls 540 are triggered, terminal will be that the support file of abnormal document is discharged into terminal, answer to complete target Installation.It can be seen that scheme provided by the present application can support that file is abnormal document, and its importance attribute indicates When the support file is used to support the necessary functions of target application, installation operation is continued to execute.
In alternatively possible mode provided by the present application, since target application is led there are problematic support file Cause the install failure of target application.Therefore, the application also provides one kind and downloads mesh under user's manipulation after terminating installation procedure Mark the mode of the safe installation kit of application.The step includes step b1, step b2 and step b3, is described below:
Step b1 obtains the first installation kit mark.
In the embodiment of the present application, the first installation kit mark is used to indicate the first installation kit, and the first installation kit is to support peace Fill the installation kit of program.That is, the first installation kit mark is used to indicate the installation kit for the installation procedure being terminated.
Step b2 shows the second interactive controls.
In the embodiment of the present application, terminal can show the second interactive controls in display screen.
Step b3 obtains the second installation kit from cloud according to the first installation kit mark when the second interactive controls are triggered.
In the embodiment of the present application, the second installation kit is used for installation targets application, and the second installation kit and the first installation kit are Different installation kits.Terminal can send the first installation kit mark, cloud according to cloud when the second interactive controls are triggered Server can identify according to the first installation kit and exclude the first installation kit, and other second installation kits are pushed to terminal, with Just terminal obtains the second installation kit from cloud.
Fig. 6 is referred to, Fig. 6 is the schematic diagram of another user interface provided based on embodiment illustrated in fig. 3.In Fig. 6, User interface 600 also shows the second interactive controls 610, and optionally, the second interactive controls 610 can be with reminder message 530 1 With display.When the second interactive controls 610 are by user's clicking trigger, terminal can obtain the second installation kit from cloud.Optionally, The download progress and downloading result of the second installation kit can be shown in user interface 600.
In conclusion the present embodiment indicates that support file is for supporting that the non-of target application must according in importance attribute When standby function, the release process of the support file is skipped, so that it is different for not discharging under the premise of ensureing target application safety The support file of normal file still is able to using improving the available of installation kit when so that non-necessary functions being destroyed in installation kit Property.
The method of installation application provided in this embodiment, additionally it is possible to indicate to support that file is for branch in importance attribute When holding the necessary functions of target application, the installation procedure for installation targets application is terminated, guarantees the safety of terminal, avoids terminal In data maliciously stolen or terminal is illegally manipulated, improve the safety of terminal.
The method of installation application provided in this embodiment, additionally it is possible to when the first installation kit can not be installed, automatically from cloud The second installation kit is obtained, the second installation kit is other installation kits in addition to the first installation kit of installation targets application, is improved The efficiency of the target application of terminal installation safety.
The method of installation application provided in this embodiment, additionally it is possible to directly to support in the downloading process of the first installation kit File is detected, if avoiding when the first installation kit needs to stop installation, row deletes the operation of the file discharged again, is improved The efficiency of the target application of installation safety.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Referring to FIG. 7, Fig. 7 shows the structural frames of the device for the installation application that one exemplary embodiment of the application provides Figure.The installation application device can by software, hardware or both be implemented in combination with as terminal all or part of. The device includes:
File detection module 710, whether the support file for detecting target application is abnormal document, the support file For being discharged into terminal and supporting the operation of the target application;
Attribute obtains module 720, for when the support file is the abnormal document, obtaining the support file Importance attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Using installation module 730, for installing the target application according to the importance attribute.
In an alternative embodiment, the file detection module 710, for starting the installation journey of the target application Sequence;In installation procedure operation, the support file of the installation procedure release is obtained;Detecting the support file is No is the abnormal document.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute When supporting that file is the non-necessary functions for supporting the target application, in the installation process of the target application, skip The release process for supporting file.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute When supporting that file is the necessary functions for supporting the target application, the installation procedure is terminated.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute When supporting that file is the necessary functions for supporting the target application, determine that the support file is run in the target application When operation result;Show the operation result and the first interactive controls;When first interactive controls are triggered, institute is terminated State installation procedure.
In an alternative embodiment, described device further includes identifier acquisition module, control display module and execution mould Block, the identifier acquisition module are used to indicate the first installation for obtaining the first installation kit mark, the first installation kit mark Packet, first installation kit is the installation kit for supporting the installation procedure;The control display module, for showing the second interaction Control;The execution module, for being identified from cloud according to first installation kit when second interactive controls are triggered The second installation kit is obtained, second installation kit is for installing the target application, second installation kit and first peace Dress packet is different installation kit.
In an alternative embodiment, described device further includes file release module, and the control display module is used for Show third interactive controls;The file release module, for discharging the support when the third interactive controls are triggered File is to complete the installation of the target application.
In an alternative embodiment, the file detection module 710, for starting the downloading of first installation kit Program;During downloading program operation, detect whether the support file in first installation kit is abnormal File.
In an alternative embodiment, the abnormal document that device is related to includes the file comprising malicious process, packet At least one of incomplete file of file or code containing malicious code.
The embodiment of the present application also provides a kind of computer-readable medium, which has at least one Instruction, at least one instruction are loaded as the processor and are executed to realize installation application described in as above each embodiment Method.
It should be understood that it is provided by the above embodiment installation application device execute installation application method when, only The example of the division of the above functional modules, in practical application, can according to need and by above-mentioned function distribution by Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete Portion or partial function.In addition, the device of installation application provided by the above embodiment and the embodiment of the method for installation application belong to Same design, specific implementation process are detailed in embodiment of the method, and which is not described herein again.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely the exemplary embodiments that can be realized of the application, not to limit the application, it is all Within spirit herein and principle, any modification, equivalent replacement, improvement and so on should be included in the protection of the application Within the scope of.

Claims (12)

1. a kind of method of installation application, which is characterized in that the described method includes:
Whether the support file for detecting target application is abnormal document, and the support file is to be discharged into terminal and support the mesh Mark the file of application;
When the support file is the abnormal document, the importance attribute for supporting file, the importance category are obtained Property be used to indicate the significance level of the support file when the target application is run;
According to the importance attribute, the installation of the target application is completed.
2. the method according to claim 1, wherein whether the support file of the detection target application is abnormal File, comprising:
Start the installation procedure of the target application;
In installation procedure operation, the support file of the installation procedure release is obtained;
Detect whether the support file is the abnormal document.
3. according to the method described in claim 2, completing the target it is characterized in that, described according to the importance attribute The installation of application, comprising:
When the importance attribute indicates that the support file is the non-necessary functions for supporting the target application, in institute It states in the installation process of target application, skips the release process for supporting file.
4. according to the method described in claim 2, completing the target it is characterized in that, described according to the importance attribute The installation of application, comprising:
When the importance attribute indicates that the support file is the necessary functions for supporting the target application, institute is terminated State installation procedure.
5. according to the method described in claim 4, it is characterized in that, when the importance attribute indicates that the support file is to use When supporting the necessary functions of the target application, the installation procedure is terminated, comprising:
When the importance attribute indicates that the support file is the necessary functions for supporting the target application, institute is determined State the operation result for supporting file when the target application is run;
Show the operation result and the first interactive controls;
When first interactive controls are triggered, the installation procedure is terminated.
6. according to the method described in claim 5, it is characterized in that, the method is also wrapped after terminating the installation procedure It includes:
The first installation kit mark is obtained, the first installation kit mark is used to indicate the first installation kit, and first installation kit is Support the installation kit of the installation procedure;
Show the second interactive controls;
When second interactive controls are triggered, the second installation kit, institute are obtained from cloud according to first installation kit mark The second installation kit is stated for installing the target application, second installation kit and first installation kit are different installation Packet.
7. according to the method described in claim 5, it is characterized in that, the method also includes:
Show third interactive controls;
When the third interactive controls are triggered, the support file is discharged to complete the installation of the target application.
8. according to the method described in claim 4, it is characterized in that, whether the support file of the detection target application is abnormal File, comprising:
Start the downloading program of first installation kit;
During downloading program operation, whether the support file detected in first installation kit is abnormal literary Part.
9. method according to any one of claims 1 to 8, which is characterized in that the abnormal document includes comprising malicious process At least one of file, the file comprising malicious code or the incomplete file of code.
10. a kind of device of installation application, which is characterized in that described device includes:
File detection module, whether the support file for detecting target application is abnormal document, and the support file is for releasing It is put into terminal and supports the operation of the target application;
Attribute obtains module, for when the support file is the abnormal document, obtaining the importance for supporting file Attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Using installation module, for installing the target application according to the importance attribute.
11. a kind of terminal, which is characterized in that the terminal includes processor and the memory that is connected with the processor, and The program instruction being stored on the memory, the processor realize such as claim 1 to 9 times when executing described program instruction The method of installation application described in one.
12. a kind of computer readable storage medium, program instruction is stored in the storage medium, which is characterized in that the journey Installation application as described in any one of claim 1 to 9 is realized in sequence instruction method when being executed by processor.
CN201910647502.6A 2019-07-17 2019-07-17 Method, apparatus, terminal and the storage medium of application are installed Pending CN110377363A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910647502.6A CN110377363A (en) 2019-07-17 2019-07-17 Method, apparatus, terminal and the storage medium of application are installed

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910647502.6A CN110377363A (en) 2019-07-17 2019-07-17 Method, apparatus, terminal and the storage medium of application are installed

Publications (1)

Publication Number Publication Date
CN110377363A true CN110377363A (en) 2019-10-25

Family

ID=68253744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910647502.6A Pending CN110377363A (en) 2019-07-17 2019-07-17 Method, apparatus, terminal and the storage medium of application are installed

Country Status (1)

Country Link
CN (1) CN110377363A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104008340A (en) * 2014-06-09 2014-08-27 北京奇虎科技有限公司 Virus scanning and killing method and device
CN104331310A (en) * 2014-10-31 2015-02-04 北京思特奇信息技术股份有限公司 Background application one-click installation method and system
US20150163232A1 (en) * 2013-07-30 2015-06-11 Tencent Technology (Shenzhen) Co., Ltd. Method, device and system for detecting malware in a mobile terminal
CN106446683A (en) * 2016-09-21 2017-02-22 深圳市金立通信设备有限公司 Detection method for malignant program and terminal
CN106445608A (en) * 2010-01-27 2017-02-22 中兴通讯股份有限公司 Software installation pack installing method and installing device
CN107992742A (en) * 2017-10-27 2018-05-04 维沃移动通信有限公司 A kind of method and apparatus of installation kit identification
CN109271779A (en) * 2018-10-24 2019-01-25 维沃移动通信有限公司 A kind of installation packet inspection method, terminal device and server
CN109918340A (en) * 2019-03-18 2019-06-21 维沃移动通信有限公司 A kind of document handling method and terminal device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106445608A (en) * 2010-01-27 2017-02-22 中兴通讯股份有限公司 Software installation pack installing method and installing device
US20150163232A1 (en) * 2013-07-30 2015-06-11 Tencent Technology (Shenzhen) Co., Ltd. Method, device and system for detecting malware in a mobile terminal
CN104008340A (en) * 2014-06-09 2014-08-27 北京奇虎科技有限公司 Virus scanning and killing method and device
CN104331310A (en) * 2014-10-31 2015-02-04 北京思特奇信息技术股份有限公司 Background application one-click installation method and system
CN106446683A (en) * 2016-09-21 2017-02-22 深圳市金立通信设备有限公司 Detection method for malignant program and terminal
CN107992742A (en) * 2017-10-27 2018-05-04 维沃移动通信有限公司 A kind of method and apparatus of installation kit identification
CN109271779A (en) * 2018-10-24 2019-01-25 维沃移动通信有限公司 A kind of installation packet inspection method, terminal device and server
CN109918340A (en) * 2019-03-18 2019-06-21 维沃移动通信有限公司 A kind of document handling method and terminal device

Similar Documents

Publication Publication Date Title
US9852296B2 (en) Rollback feature
CN108829487B (en) Popup window display method and device, storage medium and terminal
WO2019169759A1 (en) Apparatus and method for creating analog interface, and computer-readable storage medium
US20130160126A1 (en) Malware remediation system and method for modern applications
CN107622200A (en) The safety detecting method and device of application program
CN106708734A (en) Software abnormality detection method and apparatus
CN109634479A (en) Notification information processing method, equipment, storage medium and device under full frame state
WO2020019482A1 (en) Function hook detection method, function hook detection device, and computer-readable medium
WO2020057253A1 (en) Method and system for game updating, terminal and computer readable storage medium
CN106201602B (en) Label providing method, label obtaining method, server and electronic equipment
CN106155746A (en) Installation file processing method and device and server
CN110502345A (en) A kind of overload protection method, device, computer equipment and storage medium
CN108170550A (en) The method, apparatus and equipment of abnormality processing
CN104320793A (en) Mobile phone short message automated test method and system
CN107291472A (en) The processing method and processing device of the prompting message of application program
CN107092519A (en) A kind of function displaying method, equipment and terminal device
CN107204206A (en) A kind of electrical fuse programming method, terminal and computer-readable recording medium
CN108762983A (en) Multi-medium data restoration methods and device
CN110377363A (en) Method, apparatus, terminal and the storage medium of application are installed
CN106155723A (en) The upgrade method of business application and device
CN108170605A (en) Submission method, client and the computer readable storage medium of bug information
CN104079632A (en) Third-party service processing method and device
CN111538994A (en) System security detection and repair method, device, storage medium and terminal
CN103383719A (en) Method and equipment for uninstalling program
CN106020616A (en) Updating method and device for desktop quick linking icons

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191025

RJ01 Rejection of invention patent application after publication