CN110377363A - Method, apparatus, terminal and the storage medium of application are installed - Google Patents
Method, apparatus, terminal and the storage medium of application are installed Download PDFInfo
- Publication number
- CN110377363A CN110377363A CN201910647502.6A CN201910647502A CN110377363A CN 110377363 A CN110377363 A CN 110377363A CN 201910647502 A CN201910647502 A CN 201910647502A CN 110377363 A CN110377363 A CN 110377363A
- Authority
- CN
- China
- Prior art keywords
- file
- installation
- application
- target application
- support
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the present application discloses method, apparatus, terminal and the storage medium of a kind of installation application, belong to field of computer technology, whether the support file that the application is able to detect target application is abnormal document, when supporting file is abnormal document, the importance attribute for supporting file can be obtained, the importance attribute, which is used to indicate, supports significance level of the file in target application operation to complete the installation of target application according to the importance attribute.It can be seen that, scheme provided by the present application can the support file to target application detect, and the installation of target application is determined according to the significance level for the support file applied for installation targets, so that using that can be judged on the thinner support file of granularity during the installation process, it realizes under the premise of guaranteeing that application is safe, improves the effect of the installation effectiveness of target application.
Description
Technical field
The invention relates to field of computer technology, in particular to a kind of method, apparatus of installation application, terminal and
Storage medium.
Background technique
With mobile terminal being widely used in life, user realizes different functions by installing application program.So
And the information security of mobile terminal is affected comprising virulent installation kit.
In some modes in the cards, mobile terminal can carry out viral diagnosis during the installation process, detect
After virus, it can stop that application program is installed and delete the installation kit.
Summary of the invention
The embodiment of the present application provides method, apparatus, terminal and the storage medium of a kind of installation application.The technical solution
It is as follows:
According to the one side content of the application, a kind of method of installation application is provided, which comprises
Whether the support file for detecting target application is abnormal document, and the support file is for being discharged into terminal and propping up
Hold the operation of the target application;
When the support file is the abnormal document, the importance attribute for supporting file is obtained, it is described important
Property attribute be used to indicate the significance level of the support file when the target application is run;
According to the importance attribute, the remainder of the installation procedure is executed.
According to the another aspect content of the application, a kind of device of installation application is provided, described device includes:
File detection module, whether the support file for detecting target application is abnormal document, and the support file is used
In the operation for being discharged into terminal and supporting the target application;
Attribute obtains module, for when the support file is the abnormal document, obtaining the weight for supporting file
The property wanted attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Program execution module, for executing the remainder of the installation procedure according to the importance attribute.
According to the another aspect content of the application, a kind of terminal is provided, the terminal includes processor and memory, institute
It states and is stored at least one instruction in memory, described instruction is loaded by the processor and executed to realize that the application such as is implemented
The method of the installation application of offer.
According to the another aspect content of the application, a kind of computer readable storage medium is provided, in the storage medium
It is stored at least one instruction, described instruction is loaded by processor and executed to realize that the application such as implements the installation application provided
Method.
Technical solution bring beneficial effect provided by the embodiments of the present application may include:
Since whether the support file that the application is able to detect target application is abnormal document, supporting that file is abnormal literary
When part, the importance attribute for supporting file can be obtained, which, which is used to indicate, supports file to run in target application
When significance level the installation of target application is completed according to the importance attribute.It can be seen that scheme energy provided by the present application
It is enough that the support file of target application is detected, and determined according to the significance level for the support file applied for installation targets
The installation of target application, so that being realized using that can be judged on the thinner support file of granularity during the installation process
Under the premise of guaranteeing that application is safe, the effect of the installation effectiveness of target application is improved.
Detailed description of the invention
It, below will be to institute in the embodiment of the present application description in order to more clearly introduce the technical solution in the embodiment of the present application
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the application
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is the structural block diagram for the terminal that one exemplary embodiment of the application provides;
Fig. 2 is the flow chart of the method for the installation application that one exemplary embodiment of the application provides;
Fig. 3 is the method flow diagram for the installation application that another exemplary embodiment of the application provides;
Fig. 4 is a kind of schematic diagram of the process of installation targets application provided based on embodiment illustrated in fig. 3;
Fig. 5 is a kind of schematic diagram of the user interface provided based on embodiment illustrated in fig. 3;
Fig. 6 is the schematic diagram of another user interface provided based on embodiment illustrated in fig. 3;
Fig. 7 shows the structural block diagram of the device for the installation application that one exemplary embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party
Formula is described in further detail.
In the following description when referring to the accompanying drawings, unless otherwise indicated, the same numbers in different attached drawings indicate same or similar
Element.Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the application
Formula.On the contrary, they are only the device and side consistent with some aspects as detailed in the attached claim, the application
The example of method.
In the description of the present application, it is to be understood that term " first ", " second " etc. are used for description purposes only, without
It can be interpreted as indication or suggestion relative importance.In the description of the present application, it should be noted that unless otherwise specific regulation
And restriction, term " connected ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection,
Or it is integrally connected;It can be mechanical connection, be also possible to be electrically connected;It can be directly connected, intermediary can also be passed through
It is indirectly connected.For the ordinary skill in the art, the tool of above-mentioned term in this application can be understood with concrete condition
Body meaning.In addition, unless otherwise indicated, " multiple " refer to two or more in the description of the present application."and/or" is retouched
The incidence relation of affiliated partner is stated, indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, together
When there are A and B, these three situations of individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
For scheme shown in the embodiment of the present application it can be readily appreciated that below to several nouns occurred in the embodiment of the present application into
Row is introduced.
Target application: it refers to run third-party application in the terminal.In a kind of possible scene, the target application
It is application in the terminal by installation process installation, in alternatively possible scene, which faced by load
When file into terminal, to realize the normal use of target application in the terminal.
Optionally, when the target application be by installation procedure installation in the terminal in application, the target application can be with
It is third-party application, which can be installed in terminal by installation kit.
Optionally, when the target application by loading temporary file into terminal in use, the target application can be
At least one of fast application, mini application or small routine.
It supports file: referring in the installation process of target application, be discharged into terminal, and the text for supporting target to use
Part.When target application operation, target application supports file by calling, and realizes specified function.In a kind of possible mode
In, a target application corresponds to multiple support files, and different support files is for supporting different functions.
Optionally, in the installation process of target application, if target application can discharge n support file, n support
The release process of file is completed by a queue sequence.For example, terminal is sequentially completed the 1st support file, the 2nd branch
Hold file ..., n-th support file release, to complete the installation of target application.
Abnormal document: refer to the file different from the file in script installation kit.For example, m-th of support text in installation kit
Part, which is destroyed, becomes m* file, then it is abnormal document that the m* file is different from m-th of support file of script.It is optional
Ground, abnormal document can also be in the file comprising malicious process, the file comprising malicious code or the incomplete file of code
At least one.
Importance attribute: it is used to indicate the attribute for supporting significance level of the file in target application operation.One kind can
In the implementation of energy, importance attribute can be the decision of the file type according to support file.
In one possible implementation, importance attribute can be a mark, the assignment of the mark can be 0 or
1。
Optionally, when the assignment of mark is 0, which, which is used to indicate, supports that file is to support target application
Necessary functions.When the assignment of mark is 1, which, which is used to indicate, supports that file is the non-indispensability for supporting target application
Function.
Optionally, when the assignment of mark is 1, which, which is used to indicate, supports that file is to support target application
Necessary functions.When the assignment of mark is 0, which, which is used to indicate, supports that file is the non-indispensability for supporting target application
Function.
In alternatively possible implementation, importance attribute can be a grade point, which is used to indicate
Support the importance of function of the file in target application operational process.For example, importance attribute can be divided into A, B and C tri-
Grade, grade A, which is used to indicate, supports that file is the necessary functions for supporting target application, belongs to system-level architecture file;Deng
Grade B, which is used to indicate, supports that file is the necessary functions for supporting target application, and including system level data;Grade C is for referring to
Show and supports that file is the non-necessary functions for supporting target application.
Optionally, importance attribute can also indicate to support whether file is text indispensable when target application operates normally
Part.If lacking the support file, target application is unable to operate normally, for example can not normally be shown content or can not correctly be located
The specified operation of reason, then the importance attribute of the support file is file indispensable when target application operates normally.Conversely, supporting text
The importance attribute that part is is the file for the non-indispensability that target application operates normally.
Table one is referred to, it illustrates the corresponding relationships of a kind of file type and importance attribute.
Table one
File type | xml | dex | arsc | Res/ |
Importance attribute | It is high | It is high | It is high | It is low |
Other than the file type shown in the table one, support that file can also include META-INF file type, this document
The corresponding importance attribute of type is also low.It should be noted that META-INF file type can serve to indicate that and be stored in
File in META-INF file.
Optionally, support that file can also include assets file type, this document type, which is also possible to be used to indicate, deposits
The file being placed in assets file.
In Table 1, scheme provided by the present application can be by supporting the file type of file to judge corresponding importance category
Property.
It should be noted that the application can also determine the importance attribute for supporting file by other means.For example, logical
It crosses and the title of file is supported to determine the importance attribute for supporting file.
Illustratively, the method that application is installed shown in the embodiment of the present application, can be using in the terminal, which has
The function of application is installed.Terminal may include mobile phone, tablet computer, laptop computer, desktop computer, computer all-in-one machine, service
Device, work station, TV, set-top box, smart glasses, smart watches, digital camera, MP4 playback terminal, MP5 playback terminal, study
Machine, point reader, electric paper book, electronic dictionary or car-mounted terminal etc..
Referring to FIG. 1, Fig. 1 is the structural block diagram for the terminal that one exemplary embodiment of the application provides, as shown in Figure 1,
The terminal includes processor 120 and memory 140, at least one instruction is stored in the memory 140, described instruction is by institute
Processor 120 is stated to load and execute to realize the method for installing application as described in each embodiment of the method for the application.
In this application, terminal 100 is the electronic equipment for having installation application function.Terminal 100 is able to detect target and answers
Whether support file is abnormal document, and when supporting file is abnormal document, terminal 100 can obtain the weight for supporting file
The property wanted attribute, and according to the installation of importance attribute completion target application.
Processor 120 may include one or more processing core.Processor 120 utilizes various interfaces and connection
Various pieces in entire terminal 100, by running or executing the instruction being stored in memory 140, program, code set or refer to
Collection is enabled, and calls the data being stored in memory 140, executes the various functions and processing data of terminal 100.Optionally,
Processor 120 can use Digital Signal Processing (Digital Signal Processing, DSP), field programmable gate array
(Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic
Array, PLA) at least one of example, in hardware realize.Processor 120 can integrating central processor (Central
Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc.
One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for
The rendering and drafting of content to be shown needed for display screen;Modem is for handling wireless communication.On it is understood that
Stating modem can not also be integrated into processor 120, be realized separately through chip piece.
Memory 140 may include random access memory (Random Access Memory, RAM), also may include read-only
Memory (Read-Only Memory).Optionally, which includes non-transient computer-readable medium (non-
transitory computer-readable storage medium).Memory 140 can be used for store instruction, program, generation
Code, code set or instruction set.Memory 140 may include storing program area and storage data area, wherein storing program area can store
Instruction for realizing operating system, the instruction at least one function (such as touch function, sound-playing function, image
Playing function etc.), for realizing instruction of following each embodiments of the method etc.;It is real that storage data area can store following each method
Apply the data etc. being related in example.
Referring to FIG. 2, Fig. 2 is the flow chart of the method for the installation application that one exemplary embodiment of the application provides.It should
The method of installation application can be applied in above-mentioned terminal shown in FIG. 1.In Fig. 2, the method for installing application includes:
Step 210, whether the support file for detecting target application is abnormal document, supports that file is to be discharged into terminal and prop up
Hold the file of target application.
In the embodiment of the present application, whether the support file that terminal is able to detect target application is abnormal document.In one kind
In possible mode, terminal can detect in the installation process of target application and support whether file is abnormal document.
In alternatively possible mode, terminal can detect the branch of target application in the downloading process of the first installation kit
Hold whether file is abnormal document.
Step 220, when supporting file is abnormal document, the importance attribute for supporting file is obtained, importance attribute is used
Significance level of the file when target application is run is supported in instruction.
In the embodiment of the present application, when supporting file is abnormal document, terminal can obtain the importance for supporting file
Attribute.In a kind of possible mode, terminal can start system specified service or system application execution is above-mentioned detected
Journey, and when file is supported in confirmation when abnormal document, obtain the operation for supporting the importance attribute of file.
Step 230, according to importance attribute, the installation of target application is completed.
In the embodiment of the present application, terminal can complete the installation of target application according to the importance attribute for supporting file.
In one possible implementation, if indispensability when file is target application operation is supported in the instruction of importance attribute
When file, terminal then stops the installation of target application, to prevent damaging when target application operation to the information stored in terminal
Or leakage.
In alternatively possible implementation, if the instruction of importance attribute supports that file is non-when target application is run
When necessary file, then terminal can improve the release of the support file, continue to complete remaining in the installation process of target application
Support file release.In this scenario, terminal can enable target application operate normally, and ensure the letter stored in terminal
The safety of breath.
In conclusion it is provided in this embodiment installation application method, be able to detect target application support file whether
It is abnormal document, when supporting file is abnormal document, obtains the importance attribute of the support file, and according to the importance category
Property, complete the installation of target application.Since the embodiment of the present application can be under the scene for supporting file to be abnormal document, to support
The importance attribute of file itself is further judged, and the installation of target application is completed according to judging result.Therefore, originally
Apply for that the scheme of offer can not directly stop the installation of target application when supporting file to occur abnormal, is answered in guarantee target
Under the premise of safety, the availability of target application when the support file for improving target application occurs abnormal.
Based on scheme disclosed in upper one embodiment, terminal can also execute the application in the target application different stage
The method of the installation application of offer, please refers to following examples.
Fig. 3 is referred to, Fig. 3 is the method flow diagram for the installation application that another exemplary embodiment of the application provides.It should
The method of installation application can be applied in above-mentioned terminal shown in FIG. 1.In Fig. 3, the method for installation application includes:
Step 311, start the installation procedure of target application.
In the embodiment of the present application, terminal can start the installation procedure of target application.Optionally, installation procedure is to be used for
File will be supported to be discharged into the program in terminal.When the installation procedure that terminal starting target application is crossed, terminal will be according to installation
The sequence given in packet will support file to be successively discharged into terminal.
Step 312, when installation procedure is run, the support file of installation procedure release is obtained.
In the embodiment of the present application, terminal obtains the support file of installation procedure release when installation procedure is run.
In one possible implementation, terminal can first obtain the branch before one support file of every release
Hold file.For example, terminal when installation procedure is run, first will support file solution from installation kit to press out, by the support file
First it is temporarily stored in the memory headroom of isolation or the hard drive space of isolation.At this point, terminal can obtain the support file.
In the mode of alternatively possible realization, terminal can be detected the first peace during downloading the first installation kit
Whether the support file that dress packet summarizes is abnormal document.Optionally, terminal can start the downloading program of the first installation kit, at this
During downloading program operation, whether the support file detected in the first installation kit is abnormal document.
Referring to FIG. 4, Fig. 4 is a kind of schematic diagram of the process of installation targets application provided based on embodiment illustrated in fig. 3.
In Fig. 4, the installation kit 410 of target application 40 includes to support file 411, support file 412, support file 413, support file
414, it supports file 415, support file 416 and supports file 417.When the file in above-mentioned installation kit 40 is discharged into terminal
When, terminal will complete the installation of target application 40.It should be noted that supporting file 411, supporting file 414 and supporting file
415 be the necessary functions for supporting target application, and when lacking above-mentioned support file, target application 40 will be unable to normally transport
Row.It supports file 412, support file 413, support file 416 and support that file 417 is non-in target application 40 for supporting
Necessary functions, which is alternatively referred to as miscellaneous function.
It is discussed from another angle, in Fig. 4, when support file 411, supports file 414 and support that file 415 is smoothly complete
When at release, target application can complete indispensable function by normal open.
In Fig. 4, when terminal will support the solution from installation kit of file 412 to press out and detect, detection determines the branch
When to hold file 412 be abnormal document, the importance attribute of the support file 412 is got.Due to supporting the importance of file 412
Attribute is to indicate that the support file 412 is used to support the unnecessary functions of target application, and therefore, terminal will skip support file
412 release process continues to discharge other support files.In the installation process of file destination 40 shown in Fig. 4, terminal is first
File 411 is supported in release, then skips the release process for supporting file 412, is continued release and is supported file 413, supports file
414, it supports file 415, support file 416 and supports file 417.Finally, target application by discharge support file 411, branch
File 413 is held, file 414 is supported, supports file 415, supporting file 416 and file 417 is supported to form.
Step 313, detection supports whether file is abnormal document.
In the embodiment of the present application, terminal can detect the support file.It should be noted that terminal can open
The application provided with system application, system service or third-party application, detects the support file, detects support text
Whether part is abnormal document.
In one possible implementation, abnormal document can be the file comprising malicious process, comprising malicious code
File or at least one of the incomplete file of code.
Optionally, terminal can determine whether abnormal document is the file comprising malicious process by way of characteristic matching
Or the file comprising malicious code.
Optionally, terminal can be determined by the integrity detection of file supports whether file is completed.
Step 320, when supporting file is abnormal document, the importance attribute for supporting file is obtained.
In the embodiment of the present application, the implementation procedure of step 320 and the implementation procedure of step 220 are identical, no longer superfluous herein
It states.
In the embodiment of the present application, when terminal, which executes, completes step 320, terminal is able to carry out step 331 and step
332, alternatively, executing step 333.
Step 331, when importance attribute indicates to support that file is the non-necessary functions for supporting target application, in mesh
In the installation process for marking application, the release process for supporting file is skipped.
In the embodiment of the present application, when importance attribute indicates to support that file is the inessential function for supporting target application
When energy, terminal in the installation process of target application, will skip the release process for supporting file.By the operation, terminal can
Support file be abnormal document and support target application cross unnecessary functions when, be not released in terminal, avoid this
The potential security risk of file is supported to impact terminal.
Step 332, other support files in the installation kit of target application are discharged, to complete the installation of target application.
In the embodiment of the present application, terminal can be during skipping the release of above-mentioned support file, to next support
File repeats step 311, step 312, step 313 and step 320, uses the same processing subsequent support of logical process
File.Other support files in installation kit to complete release target application, to complete the installation of target application.
Step 333, when importance attribute indicates to support that file is the necessary functions for supporting target application, peace is terminated
Fill program.
In the embodiment of the present application, terminal can indicate to support that file is the indispensability for supporting target application in importance attribute
When function, installation procedure, no longer installation targets application are terminated.Optionally, after installation procedure is terminated, terminal can also be removed
Have been released into the support file in terminal.
In a kind of possible implementation provided by the present application, terminal can also be the support text of abnormal document to installation
Result caused by after part is prejudged, and shows the result and the first interactive controls of the anticipation.User can be by user to
The control of one interactive controls, Lai Zizhu decide whether to terminate installation procedure.The process includes step a1, step a2 and step a3,
It is as follows in detail:
Step a1 determines branch when importance attribute indicates to support that file is the necessary functions for supporting target application
Hold operation result of the file in target application operation.
In the embodiment of the present application, terminal indicates to support that file is the indispensability for supporting target application in importance attribute
When function, the operation result for supporting file when target application is run is determined.
In one possible implementation, operation result, which is used to indicate, supports file in target application operation to terminal
Extent of injury.Optionally, operation result can be distinguished with grade, for example, high, the low three grades of neutralization.
In alternatively possible implementation, operation result can also directly display the support file and actually will lead to
Result.For example, terminal directly displays, " there is exception in the support file a in the installation kit of target application, may cause after installation
Target application is by the risk of remote control ".
Optionally, operation result is influence caused by entirety after target application is installed.The operation result may include transplanting
At least one of advertisement, spyware, malicious shareware, virus, wooden horse, worm or back door.
Step a2 shows operation result and the first interactive controls.
In the embodiment of the present application, terminal can show operation result and the first interactive controls in display screen.First hands over
Mutual control can be virtual push button.In the case where display screen is touch display screen, the first interactive controls can be passed through by user
The triggering of the modes of operation such as click.
Step a3 terminates installation procedure when the first interactive controls are triggered.
In the embodiment of the present application, terminal will indicate that installation procedure is out of service, together when the first interactive controls are triggered
When can also delete the corresponding support file of the target application discharged.
Referring to FIG. 5, Fig. 5 is a kind of schematic diagram of the user interface provided based on embodiment illustrated in fig. 3.In Fig. 5, when
When the instruction of importance attribute supports that file is the necessary functions for supporting target application, determines and file is supported to transport in target application
Operation result when row, and operation result 510 and the first interactive controls 520 are shown in user interface 500, when the first interaction control
When part 520 is triggered, terminal installation procedure out of service.Optionally, terminal display alarm can also disappear in user interface 500
Cease 530 " installation procedure of target application has stopped ".
Optionally, terminal can also show third interactive controls in user interface 500, when the third interactive controls are touched
When hair, terminal will discharge above-mentioned support file, and target application is enabled to complete installation.
Based on embodiment shown in fig. 5, third interactive controls 540 can be shown together with the first interactive controls 520, when this
When third interactive controls 540 are triggered, terminal will be that the support file of abnormal document is discharged into terminal, answer to complete target
Installation.It can be seen that scheme provided by the present application can support that file is abnormal document, and its importance attribute indicates
When the support file is used to support the necessary functions of target application, installation operation is continued to execute.
In alternatively possible mode provided by the present application, since target application is led there are problematic support file
Cause the install failure of target application.Therefore, the application also provides one kind and downloads mesh under user's manipulation after terminating installation procedure
Mark the mode of the safe installation kit of application.The step includes step b1, step b2 and step b3, is described below:
Step b1 obtains the first installation kit mark.
In the embodiment of the present application, the first installation kit mark is used to indicate the first installation kit, and the first installation kit is to support peace
Fill the installation kit of program.That is, the first installation kit mark is used to indicate the installation kit for the installation procedure being terminated.
Step b2 shows the second interactive controls.
In the embodiment of the present application, terminal can show the second interactive controls in display screen.
Step b3 obtains the second installation kit from cloud according to the first installation kit mark when the second interactive controls are triggered.
In the embodiment of the present application, the second installation kit is used for installation targets application, and the second installation kit and the first installation kit are
Different installation kits.Terminal can send the first installation kit mark, cloud according to cloud when the second interactive controls are triggered
Server can identify according to the first installation kit and exclude the first installation kit, and other second installation kits are pushed to terminal, with
Just terminal obtains the second installation kit from cloud.
Fig. 6 is referred to, Fig. 6 is the schematic diagram of another user interface provided based on embodiment illustrated in fig. 3.In Fig. 6,
User interface 600 also shows the second interactive controls 610, and optionally, the second interactive controls 610 can be with reminder message 530 1
With display.When the second interactive controls 610 are by user's clicking trigger, terminal can obtain the second installation kit from cloud.Optionally,
The download progress and downloading result of the second installation kit can be shown in user interface 600.
In conclusion the present embodiment indicates that support file is for supporting that the non-of target application must according in importance attribute
When standby function, the release process of the support file is skipped, so that it is different for not discharging under the premise of ensureing target application safety
The support file of normal file still is able to using improving the available of installation kit when so that non-necessary functions being destroyed in installation kit
Property.
The method of installation application provided in this embodiment, additionally it is possible to indicate to support that file is for branch in importance attribute
When holding the necessary functions of target application, the installation procedure for installation targets application is terminated, guarantees the safety of terminal, avoids terminal
In data maliciously stolen or terminal is illegally manipulated, improve the safety of terminal.
The method of installation application provided in this embodiment, additionally it is possible to when the first installation kit can not be installed, automatically from cloud
The second installation kit is obtained, the second installation kit is other installation kits in addition to the first installation kit of installation targets application, is improved
The efficiency of the target application of terminal installation safety.
The method of installation application provided in this embodiment, additionally it is possible to directly to support in the downloading process of the first installation kit
File is detected, if avoiding when the first installation kit needs to stop installation, row deletes the operation of the file discharged again, is improved
The efficiency of the target application of installation safety.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device
Undisclosed details in example is applied, the application embodiment of the method is please referred to.
Referring to FIG. 7, Fig. 7 shows the structural frames of the device for the installation application that one exemplary embodiment of the application provides
Figure.The installation application device can by software, hardware or both be implemented in combination with as terminal all or part of.
The device includes:
File detection module 710, whether the support file for detecting target application is abnormal document, the support file
For being discharged into terminal and supporting the operation of the target application;
Attribute obtains module 720, for when the support file is the abnormal document, obtaining the support file
Importance attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Using installation module 730, for installing the target application according to the importance attribute.
In an alternative embodiment, the file detection module 710, for starting the installation journey of the target application
Sequence;In installation procedure operation, the support file of the installation procedure release is obtained;Detecting the support file is
No is the abnormal document.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute
When supporting that file is the non-necessary functions for supporting the target application, in the installation process of the target application, skip
The release process for supporting file.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute
When supporting that file is the necessary functions for supporting the target application, the installation procedure is terminated.
In an alternative embodiment, module 730 is installed in the application, described in indicating when the importance attribute
When supporting that file is the necessary functions for supporting the target application, determine that the support file is run in the target application
When operation result;Show the operation result and the first interactive controls;When first interactive controls are triggered, institute is terminated
State installation procedure.
In an alternative embodiment, described device further includes identifier acquisition module, control display module and execution mould
Block, the identifier acquisition module are used to indicate the first installation for obtaining the first installation kit mark, the first installation kit mark
Packet, first installation kit is the installation kit for supporting the installation procedure;The control display module, for showing the second interaction
Control;The execution module, for being identified from cloud according to first installation kit when second interactive controls are triggered
The second installation kit is obtained, second installation kit is for installing the target application, second installation kit and first peace
Dress packet is different installation kit.
In an alternative embodiment, described device further includes file release module, and the control display module is used for
Show third interactive controls;The file release module, for discharging the support when the third interactive controls are triggered
File is to complete the installation of the target application.
In an alternative embodiment, the file detection module 710, for starting the downloading of first installation kit
Program;During downloading program operation, detect whether the support file in first installation kit is abnormal
File.
In an alternative embodiment, the abnormal document that device is related to includes the file comprising malicious process, packet
At least one of incomplete file of file or code containing malicious code.
The embodiment of the present application also provides a kind of computer-readable medium, which has at least one
Instruction, at least one instruction are loaded as the processor and are executed to realize installation application described in as above each embodiment
Method.
It should be understood that it is provided by the above embodiment installation application device execute installation application method when, only
The example of the division of the above functional modules, in practical application, can according to need and by above-mentioned function distribution by
Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete
Portion or partial function.In addition, the device of installation application provided by the above embodiment and the embodiment of the method for installation application belong to
Same design, specific implementation process are detailed in embodiment of the method, and which is not described herein again.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely the exemplary embodiments that can be realized of the application, not to limit the application, it is all
Within spirit herein and principle, any modification, equivalent replacement, improvement and so on should be included in the protection of the application
Within the scope of.
Claims (12)
1. a kind of method of installation application, which is characterized in that the described method includes:
Whether the support file for detecting target application is abnormal document, and the support file is to be discharged into terminal and support the mesh
Mark the file of application;
When the support file is the abnormal document, the importance attribute for supporting file, the importance category are obtained
Property be used to indicate the significance level of the support file when the target application is run;
According to the importance attribute, the installation of the target application is completed.
2. the method according to claim 1, wherein whether the support file of the detection target application is abnormal
File, comprising:
Start the installation procedure of the target application;
In installation procedure operation, the support file of the installation procedure release is obtained;
Detect whether the support file is the abnormal document.
3. according to the method described in claim 2, completing the target it is characterized in that, described according to the importance attribute
The installation of application, comprising:
When the importance attribute indicates that the support file is the non-necessary functions for supporting the target application, in institute
It states in the installation process of target application, skips the release process for supporting file.
4. according to the method described in claim 2, completing the target it is characterized in that, described according to the importance attribute
The installation of application, comprising:
When the importance attribute indicates that the support file is the necessary functions for supporting the target application, institute is terminated
State installation procedure.
5. according to the method described in claim 4, it is characterized in that, when the importance attribute indicates that the support file is to use
When supporting the necessary functions of the target application, the installation procedure is terminated, comprising:
When the importance attribute indicates that the support file is the necessary functions for supporting the target application, institute is determined
State the operation result for supporting file when the target application is run;
Show the operation result and the first interactive controls;
When first interactive controls are triggered, the installation procedure is terminated.
6. according to the method described in claim 5, it is characterized in that, the method is also wrapped after terminating the installation procedure
It includes:
The first installation kit mark is obtained, the first installation kit mark is used to indicate the first installation kit, and first installation kit is
Support the installation kit of the installation procedure;
Show the second interactive controls;
When second interactive controls are triggered, the second installation kit, institute are obtained from cloud according to first installation kit mark
The second installation kit is stated for installing the target application, second installation kit and first installation kit are different installation
Packet.
7. according to the method described in claim 5, it is characterized in that, the method also includes:
Show third interactive controls;
When the third interactive controls are triggered, the support file is discharged to complete the installation of the target application.
8. according to the method described in claim 4, it is characterized in that, whether the support file of the detection target application is abnormal
File, comprising:
Start the downloading program of first installation kit;
During downloading program operation, whether the support file detected in first installation kit is abnormal literary
Part.
9. method according to any one of claims 1 to 8, which is characterized in that the abnormal document includes comprising malicious process
At least one of file, the file comprising malicious code or the incomplete file of code.
10. a kind of device of installation application, which is characterized in that described device includes:
File detection module, whether the support file for detecting target application is abnormal document, and the support file is for releasing
It is put into terminal and supports the operation of the target application;
Attribute obtains module, for when the support file is the abnormal document, obtaining the importance for supporting file
Attribute, the importance attribute are used to indicate significance level of the support file when the target application is run;
Using installation module, for installing the target application according to the importance attribute.
11. a kind of terminal, which is characterized in that the terminal includes processor and the memory that is connected with the processor, and
The program instruction being stored on the memory, the processor realize such as claim 1 to 9 times when executing described program instruction
The method of installation application described in one.
12. a kind of computer readable storage medium, program instruction is stored in the storage medium, which is characterized in that the journey
Installation application as described in any one of claim 1 to 9 is realized in sequence instruction method when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910647502.6A CN110377363A (en) | 2019-07-17 | 2019-07-17 | Method, apparatus, terminal and the storage medium of application are installed |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910647502.6A CN110377363A (en) | 2019-07-17 | 2019-07-17 | Method, apparatus, terminal and the storage medium of application are installed |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110377363A true CN110377363A (en) | 2019-10-25 |
Family
ID=68253744
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910647502.6A Pending CN110377363A (en) | 2019-07-17 | 2019-07-17 | Method, apparatus, terminal and the storage medium of application are installed |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110377363A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104008340A (en) * | 2014-06-09 | 2014-08-27 | 北京奇虎科技有限公司 | Virus scanning and killing method and device |
CN104331310A (en) * | 2014-10-31 | 2015-02-04 | 北京思特奇信息技术股份有限公司 | Background application one-click installation method and system |
US20150163232A1 (en) * | 2013-07-30 | 2015-06-11 | Tencent Technology (Shenzhen) Co., Ltd. | Method, device and system for detecting malware in a mobile terminal |
CN106446683A (en) * | 2016-09-21 | 2017-02-22 | 深圳市金立通信设备有限公司 | Detection method for malignant program and terminal |
CN106445608A (en) * | 2010-01-27 | 2017-02-22 | 中兴通讯股份有限公司 | Software installation pack installing method and installing device |
CN107992742A (en) * | 2017-10-27 | 2018-05-04 | 维沃移动通信有限公司 | A kind of method and apparatus of installation kit identification |
CN109271779A (en) * | 2018-10-24 | 2019-01-25 | 维沃移动通信有限公司 | A kind of installation packet inspection method, terminal device and server |
CN109918340A (en) * | 2019-03-18 | 2019-06-21 | 维沃移动通信有限公司 | A kind of document handling method and terminal device |
-
2019
- 2019-07-17 CN CN201910647502.6A patent/CN110377363A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106445608A (en) * | 2010-01-27 | 2017-02-22 | 中兴通讯股份有限公司 | Software installation pack installing method and installing device |
US20150163232A1 (en) * | 2013-07-30 | 2015-06-11 | Tencent Technology (Shenzhen) Co., Ltd. | Method, device and system for detecting malware in a mobile terminal |
CN104008340A (en) * | 2014-06-09 | 2014-08-27 | 北京奇虎科技有限公司 | Virus scanning and killing method and device |
CN104331310A (en) * | 2014-10-31 | 2015-02-04 | 北京思特奇信息技术股份有限公司 | Background application one-click installation method and system |
CN106446683A (en) * | 2016-09-21 | 2017-02-22 | 深圳市金立通信设备有限公司 | Detection method for malignant program and terminal |
CN107992742A (en) * | 2017-10-27 | 2018-05-04 | 维沃移动通信有限公司 | A kind of method and apparatus of installation kit identification |
CN109271779A (en) * | 2018-10-24 | 2019-01-25 | 维沃移动通信有限公司 | A kind of installation packet inspection method, terminal device and server |
CN109918340A (en) * | 2019-03-18 | 2019-06-21 | 维沃移动通信有限公司 | A kind of document handling method and terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9852296B2 (en) | Rollback feature | |
CN108829487B (en) | Popup window display method and device, storage medium and terminal | |
WO2019169759A1 (en) | Apparatus and method for creating analog interface, and computer-readable storage medium | |
US20130160126A1 (en) | Malware remediation system and method for modern applications | |
CN107622200A (en) | The safety detecting method and device of application program | |
CN106708734A (en) | Software abnormality detection method and apparatus | |
CN109634479A (en) | Notification information processing method, equipment, storage medium and device under full frame state | |
WO2020019482A1 (en) | Function hook detection method, function hook detection device, and computer-readable medium | |
WO2020057253A1 (en) | Method and system for game updating, terminal and computer readable storage medium | |
CN106201602B (en) | Label providing method, label obtaining method, server and electronic equipment | |
CN106155746A (en) | Installation file processing method and device and server | |
CN110502345A (en) | A kind of overload protection method, device, computer equipment and storage medium | |
CN108170550A (en) | The method, apparatus and equipment of abnormality processing | |
CN104320793A (en) | Mobile phone short message automated test method and system | |
CN107291472A (en) | The processing method and processing device of the prompting message of application program | |
CN107092519A (en) | A kind of function displaying method, equipment and terminal device | |
CN107204206A (en) | A kind of electrical fuse programming method, terminal and computer-readable recording medium | |
CN108762983A (en) | Multi-medium data restoration methods and device | |
CN110377363A (en) | Method, apparatus, terminal and the storage medium of application are installed | |
CN106155723A (en) | The upgrade method of business application and device | |
CN108170605A (en) | Submission method, client and the computer readable storage medium of bug information | |
CN104079632A (en) | Third-party service processing method and device | |
CN111538994A (en) | System security detection and repair method, device, storage medium and terminal | |
CN103383719A (en) | Method and equipment for uninstalling program | |
CN106020616A (en) | Updating method and device for desktop quick linking icons |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191025 |
|
RJ01 | Rejection of invention patent application after publication |