WO2017071207A1 - 一种应用安装方法、相关装置及应用安装*** - Google Patents

一种应用安装方法、相关装置及应用安装*** Download PDF

Info

Publication number
WO2017071207A1
WO2017071207A1 PCT/CN2016/084084 CN2016084084W WO2017071207A1 WO 2017071207 A1 WO2017071207 A1 WO 2017071207A1 CN 2016084084 W CN2016084084 W CN 2016084084W WO 2017071207 A1 WO2017071207 A1 WO 2017071207A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
verification
security
application server
installation
Prior art date
Application number
PCT/CN2016/084084
Other languages
English (en)
French (fr)
Inventor
何小兵
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017071207A1 publication Critical patent/WO2017071207A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present invention relates to the technical field of information security, and in particular, to an application installation method, a related device, and an application installation system.
  • the technical problem to be solved by the embodiments of the present invention is to provide an application installation method, a related device, and an application installation system, so as to improve the security of the user installation application.
  • the first aspect of the embodiments of the present invention provides an application installation method, where the method includes:
  • a second aspect of the embodiments of the present invention provides an application installation method, where the method includes:
  • the security application server receives the verification request that carries the identification information sent by the terminal;
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • a third aspect of the embodiments of the present invention provides a mobile terminal, where the mobile terminal includes:
  • An obtaining unit configured to obtain identification information of an installation package of an application to be installed
  • a sending unit configured to send, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request;
  • an execution unit configured to perform an installation operation for the to-be-installed application if receiving the verification pass message sent by the security application server in response to the verification request.
  • a fourth aspect of the embodiments of the present invention provides a security application server, where the security application server includes:
  • a receiving unit configured to receive a verification request that carries the identifier information sent by the terminal
  • a verification unit configured to perform security verification on the identifier information carried in the verification request
  • a sending unit configured to send a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application, if the verification is passed.
  • the fourth aspect of the embodiments of the present invention further provides an application installation system, including a mobile terminal provided by the third aspect of the embodiment of the present invention, and a security application server provided by the fourth aspect of the embodiment of the present invention. ,among them:
  • the mobile terminal is configured to obtain the identification information of the installation package of the application to be installed, and send the verification request that carries the identification information to the security application server, where the verification request is used to instruct the security application server to verify the verification The identification information carried in the request is verified for security;
  • the security application server is configured to receive an authentication request that carries the identifier information sent by the terminal, and perform security verification on the identifier information carried in the verification request;
  • the terminal sends a verification pass message to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the mobile terminal is further configured to: if receiving the verification pass message sent by the security application server in response to the verification request, perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information acquired by the mobile terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal.
  • the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether the application is malicious after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 1 is a schematic flow chart of an application installation method according to a first embodiment of the present invention
  • FIG. 2 is a schematic flow chart of an application installation method according to a second embodiment of the present invention.
  • FIG. 3 is a schematic flow chart of an application installation method according to a third embodiment of the present invention.
  • FIG. 4 is a schematic flow chart of an application installation method according to a fourth embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of an application installation method according to a fifth embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of an application installation method according to a sixth embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to a seventh embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a mobile terminal according to an eighth embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a security application server provided by a ninth embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a security application server according to a tenth embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of an application installation system according to a tenth embodiment of the present invention.
  • the mobile terminal may be any device having communication and storage functions, such as a tablet computer, a mobile phone, an e-reader, a personal computer (PC), a notebook computer, an in-vehicle device, a network television, a wearable device, etc., having network functions. Smart device.
  • FIG. 1 is a schematic flowchart of an application installation method according to a first embodiment of the present invention.
  • the application installation method described in FIG. 1 is mainly described from the terminal side, as shown in FIG. 1 .
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the Install Pack is a collection of self-extracting files, including all the files installed by the software, running the installation package (executable file), and releasing all the files of the software to the hard disk. On, complete the work of modifying the registry, modifying system settings, creating shortcuts, and so on.
  • the installation package can be implemented only when it is installed on the terminal.
  • An installation package installed on the terminal is called an application.
  • the application Application, referred to as APP
  • APP can include various services used by users on the network, such as applications and web pages. Videos, novels, music, games, news, shopping, and email.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the package name of the installation package of the installation application matches the package name of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server, and the package name of the installation package of the application to be installed and the pre-stored in the security application server
  • the package name of the authorized installation package corresponding to the application to be installed matches
  • the verification information of the installed installation package matches the verification information of the authorized installation package of the above-mentioned application to be installed.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the terminal stops the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the terminal may perform the following steps before sending the verification request carrying the identifier information to the security application server:
  • the execution of the verification request to send the identifier information to the secure application server is triggered.
  • the download source of the installation package of the application to be installed may include an authorized download source and an unauthorized download source, and the authorized download source is downloaded to the security application server for the installation package, and the unauthorized download source is the installation package.
  • third parties The application server, also known as the third-party application store (APPSTORE), refers to an electronic application store that provides free (charged) application search and download services for the terminal, and may include third-party application markets, such as the application market, the Android market, and the like. Browsers can be included, and some browsers currently provide search and download capabilities for applications.
  • the quality of the application installed on the Android system is uneven due to the openness of the Android system. If the installation package of the application to be installed is downloaded to a third-party application server other than the security application server, the installation package exists. Security risks.
  • the installation package of the application on the Android system is generally called an apk installation package.
  • Each apk installation package is packaged by multiple files, including a Manifest file: AndroidManifest.xml file.
  • the manifest file must exist, located in the root directory of the entire apk installation package, providing the necessary information about the application required by the Android system, where the necessary information is before the system runs any code of the application. Information that must be owned.
  • the manifest consists of a root tag ⁇ Manifest> with a Package property that sets the installation package.
  • Package is the unique identifier of the application installation package recorded in the AndroidManifest.xml file. If the package of the application is duplicated, it cannot be The release is successful, therefore, the unique identification package of the application apk installation package can be read from the AndroidManifest.xml file of the APK installation package of the Android system.
  • Activity is a component responsible for interacting with the user.
  • each application is built based on an activity, that is, each application corresponds to an Activity, and in the embodiment of the present invention, the Activity is the current apk.
  • the application corresponding to the installation package can obtain the Activity corresponding to the apk installation package through the package of the current apk installation package, wherein an apk installation package can include multiple activities, and when an application is created, the system interface is first created.
  • An Activity class is a component responsible for interacting with the user.
  • AmS Activity Management Service
  • AmS Activity Management Service
  • mToken that is, which process is used to obtain the current Activity through HistoryRecord.
  • the download source that is created to identify the installation package of the application to be installed.
  • the terminal identifies that the download source of the installation package of the application to be installed is unauthorized. If the user confirms that the installation package of the download source is an unauthorized download source, the user confirms that the installation action triggers execution of the verification to send the identification information to the secure application server. request.
  • the terminal performs an installation operation for the to-be-installed application.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the security application server, the terminal directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 2 is a schematic flowchart of an application installation method according to a second embodiment of the present invention.
  • the application installation method described in FIG. 2 is mainly described from the side of the security application server, such as As shown in FIG. 2, the application installation method may include the following steps:
  • the security application server receives the verification request that carries the identifier information sent by the terminal.
  • the verification request is used to instruct the security application server to verify the identification information carried in the verification request and the identification information of the authorized installation package corresponding to the pre-stored application to be installed.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server enters the identifier information carried in the verification request.
  • row security verification is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the security application server sends a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 3 is a schematic flowchart of an application installation method according to a third embodiment of the present invention.
  • the application installation method described in FIG. 3 is mainly described from the security application server side and the terminal side.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives an authentication request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the verification application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server sends the identifier of the to-be-installed application carried in the verification request sent by the terminal to the identifier of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server.
  • the information is verified. If the identification information of the application to be installed completely matches the identification information of the authorized installation package corresponding to the application to be installed that is pre-existing in the security application server, the security application server sends a verification pass message to the terminal, and the terminal receives the information. The verification passes the message to perform an installation operation for the application to be installed.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application. And receiving, by the terminal, the verification failure message sent by the security application server in response to the verification request, stopping the installation operation of the to-be-installed application.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 4 is a schematic flowchart of an application installation method according to a fourth embodiment of the present invention.
  • the application installation method described in FIG. 4 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the download source of the installation package of the application to be installed may include an authorized download source and an unauthorized download source, and the authorized download source is downloaded to the security application server for the installation package, and the unauthorized download source is the installation package.
  • the third-party application server also known as the third-party application store (APPSTORE) refers to an electronic application store that provides free (charge) application search and download services for the terminal, and may include a third-party application market, for example.
  • APPSTORE refers to an electronic application store that provides free (charge) application search and download services for the terminal, and may include a third-party application market, for example.
  • Such as the application market, the Android market, etc. can also include a browser, and currently some browsers can also provide application search and download functions.
  • the quality of the application installed on the Android system is uneven due to the openness of the Android system. If the installation package of the application to be installed is downloaded to a third-party application server other than the security application server, the installation package exists. Security risks.
  • the triggering terminal performs the sending of the verification request carrying the identifier information to the security application server.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the installation source of the download source is an unauthorized download source, Then, the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives an authentication request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, The security application server matches the verification information of the installation package of the installed application with the pre-stored authorization verification information.
  • the verification application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application pre-existing in the security application server, and the security application server sends a verification pass message to the terminal.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 5 is a schematic flowchart of an application installation method according to a fifth embodiment of the present invention.
  • the application installation method described in FIG. 5 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the triggering terminal performs the sending of the verification request carrying the identifier information to the security application server.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the download source is an unauthorized download.
  • the installation package of the source the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives the verification request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The to be installed Installation operation used.
  • the terminal stops the installation operation of the to-be-installed application if the terminal receives the verification failure message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 6 is a schematic flowchart of an application installation method according to a sixth embodiment of the present invention.
  • the application installation method described in FIG. 6 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the security application server, the terminal directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • the device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention.
  • the device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention.
  • Only parts related to the embodiment of the present invention are shown, and the specific technical details are not disclosed. Please refer to Embodiment 1 to Embodiment 6 of the present invention.
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to a seventh embodiment of the present invention.
  • the mobile terminal may include:
  • the obtaining unit 701 is configured to obtain identification information of an installation package of an application to be installed.
  • the sending unit 702 is configured to send, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the executing unit 703 is configured to perform an installation operation for the to-be-installed application if receiving the verification pass message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server.
  • the security application server sends a verification pass message to the terminal, and the terminal receives the verification pass message, and the execution unit 703 performs An installation operation for the application to be installed.
  • the application installer is Android.
  • An application provided by the system to install software.
  • the mobile terminal further includes:
  • the identifying unit 704 is configured to identify a download source of the installation package of the application to be installed.
  • the triggering unit 705 is configured to: if the identified download source is an unauthorized download source, trigger the execution of the verification request to send the identifier information to the secure application server.
  • the identification unit 704 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms installation of the download source as an unauthorized download source, The packet is triggered by the user, and the triggering unit 705 performs the verification request to send the identifier information to the secure application server.
  • the executing unit 703 is further configured to: if the identified download source is an authorized download source, the executing unit 703 performs an installation operation for the to-be-installed application.
  • the executing unit 703 directly performs the installation operation of the application to be installed.
  • the mobile terminal further includes:
  • a stopping unit configured to stop the installation operation of the to-be-installed application if the mobile terminal receives the verification failure message sent by the security application server.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed.
  • the identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops the unit to stop. Perform an installation operation for the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 8 is a schematic structural diagram of a mobile terminal according to an eighth embodiment of the present invention.
  • the mobile terminal in the embodiment of the present invention includes at least one processor 801, such as a CPU, at least one receiver 803, at least one memory 804, at least one transmitter 805, and at least one communication bus 802.
  • the communication bus 802 is used to implement connection communication between these components.
  • the receiver 803 and the transmitter 805 of the device in the embodiment of the present invention may be a wired sending port, or may be a wireless device, for example, including an antenna device, for performing signaling or data communication with other node devices.
  • the memory 804 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 804 can also optionally be at least one storage device located remotely from the aforementioned processor 801.
  • a set of program codes is stored in the memory 804, and the processor 801 is configured to call program code stored in the memory for performing the following operations:
  • the processor 801 acquires identification information of an installation package of the application to be installed.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the processor 801 sends a verification request that carries the identifier information to the security application server, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the package name of the installation package of the application to be installed is matched with the package name of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server, and the package name of the installation package of the application to be installed is pre-stored in the security application service.
  • the verification information of the installation package of the application to be installed matches the verification information of the authorized installation package of the application to be installed.
  • the processor 801 receives the verification pass message sent by the security application server, the installation operation for the to-be-installed application is performed.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application pre-existing in the security application server, and the security application server sends the identifier to the terminal. Sending a verification pass message, the terminal receiving the verification pass message, and performing an installation operation for the to-be-installed application.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the processor 801 receives the verification failure message sent by the security application server, the installation operation of the to-be-installed application is stopped.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the processor 801 may perform the following steps before sending the verification request carrying the identifier information to the security application server:
  • the processor 801 identifies a download source of the installation package of the application to be installed
  • the download source identified by the processor 801 is an unauthorized download source, the execution of the verification request carrying the identifier information is sent to the secure application server.
  • the processor 801 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the download source is an unauthorized download source installation. And the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the processor 801 performs an installation operation for the to-be-installed application.
  • the processor 801 if the processor 801 identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the secure application server, the processor 801 directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine the application to be installed. Whether it is a malicious application, and then returns a terminal verification message, and the terminal performs an installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improve Application installation security.
  • FIG. 9 is a schematic structural diagram of a security application server according to a ninth embodiment of the present invention.
  • the security application server may include at least:
  • the receiving unit 901 is configured to receive an authentication request that carries the identifier information.
  • the verification unit 902 is configured to perform security verification on the identifier information carried in the verification request.
  • the verification unit 902 is specifically configured to match the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, Then, the verification unit passes the verification; if the identification information carried in the verification request does not match the pre-stored authorization identification information, the verification unit fails to verify.
  • the identifier information includes: a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed;
  • the verification unit specifically matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, the application is to be installed.
  • the verification information of the installation package matches the pre-stored authorization verification information.
  • the sending unit 903 is configured to send, by the security application server, a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the sending unit 903 is further configured to send the terminal to the terminal if the verification fails. Sending a verification failure message to notify the terminal to stop the installation operation of the application to be installed.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 10 is a schematic structural diagram of a security application server provided by an eleventh embodiment of the present invention.
  • the secure application server in the embodiment of the present invention includes at least one processor 1001, such as a CPU, at least one receiver 1003, at least one memory 1004, at least one transmitter 1005, and at least one communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the receiver 1003 and the transmitter 1005 of the device in the embodiment of the present invention may be wired transmission ports, or may be wireless devices, for example, including antenna devices, for performing signaling or data communication with other node devices.
  • the memory 1004 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 1004 can also optionally be at least one storage device located remotely from the aforementioned processor 1001.
  • a set of program codes is stored in the memory 1004, and the processor 1001 is configured to call program codes stored in the memory for performing the following operations:
  • the processor 1001 receives the verification request that carries the identification information sent by the terminal.
  • the processor 1001 performs security verification on the identifier information carried in the verification request.
  • the identifier information carried by the processor 1001 in the verification request and the pre-stored authorization identification letter If the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; if the identifier information carried in the verification request does not match the pre-stored authorization identifier information, The verification failed.
  • the identifier information includes: a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed;
  • the processor 1001 matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; where the package name of the installation package of the application to be installed matches the pre-stored authorization package name, the processor 1001
  • the verification information of the installation package of the application to be installed matches the pre-stored authorization verification information.
  • the processor 1001 sends a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the processor 1001 verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the pre-installed application, if the identification information of the application to be installed and the pre-existence The identifier information of the authorized installation package corresponding to the to-be-installed application of the security application server is completely matched, the processor 1001 sends a verification pass message to the terminal, and the terminal receives the verification pass message, and performs an installation operation for the to-be-installed application. .
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the processor 1001 sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the processor 1001 verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the identifier of the application to be installed is to be installed.
  • the information does not completely match the identification information of the authorized installation package corresponding to the pre-stored application, the processor 1001 sends an authentication failure message to the terminal, and the terminal receives the verification failure message, and stops executing the application for the to-be-installed application. Installation operation.
  • the security application server obtains the identification information acquired by the mobile terminal and pre-stores The identification information of the authorized installation package corresponding to the to-be-installed application is verified to determine whether the application to be installed is a malicious application, and then returns a terminal verification message, and the terminal performs an installation operation or stops the installation according to the verification message, thereby solving the existing
  • the user can identify the technical problem of the malicious application after the installation package is installed, which is beneficial to improve the security of the application installation.
  • FIG. 11 is a schematic structural diagram of an application installation system according to an embodiment of the present invention.
  • the application installation system may include: a mobile terminal 1101 and a security application server 1102.
  • the mobile terminal 1101 may be the mobile terminal as described in FIG. 7 or FIG. 8 above.
  • the security application server 1102 may be the security application server as described in FIG. 9 or FIG. 10, specifically:
  • the mobile terminal 1101 is configured to obtain the identification information of the installation package of the application to be installed, and send the verification request that carries the identification information to the security application server, where the verification request is used to instruct the security application server to request the verification The identification information carried in the security verification.
  • the security application server 1102 is configured to receive an authentication request that carries the identifier information sent by the terminal, perform security verification on the identifier information carried in the verification request, and send a verification pass message to the terminal if the verification succeeds.
  • the terminal is triggered to perform an installation operation for the to-be-installed application.
  • the specific implementation manner in which the security application server 1102 performs security verification on the identifier information carried in the verification request is:
  • the security application server 1102 matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the specific implementation manner for the security application server 1102 to perform security verification on the identifier information carried in the verification request is:
  • the security application server 1102 matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, The security application server 1102 matches the verification information of the installation package of the application to be installed with the pre-stored authorization verification information.
  • the security application server 1102 performs the identification information of the application to be installed carried in the verification request sent by the mobile terminal 1101, and the authorization identification information of the authorized installation package corresponding to the application to be installed stored in the security application server 1102. It is verified that the security application server 1102 sends an authentication pass message to the mobile terminal 1101 if the identification information of the application to be installed completely matches the authorization identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the mobile terminal 1101 is further configured to: if receiving the verification pass message sent by the security application server in response to the verification request, perform an installation operation for the to-be-installed application.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the mobile terminal 1101 is further configured to identify a download source of the installation package of the to-be-installed application; if the identified download source is an unauthorized download source, triggering execution of the sending to the secure application server The verification request of the identification information.
  • the mobile terminal 1101 if the mobile terminal 1101 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms installation of the download source as an unauthorized download source, The packet, the user's confirmation installation action triggers the mobile terminal 1101 to execute the verification request to send the identification information to the security application server.
  • the mobile terminal 1101 is further configured to perform an installation operation for the to-be-installed application if the identified download source is an authorized download source.
  • the security application server 1102 is further configured to send a verification failure message to the mobile terminal 1101 to notify the mobile terminal 1101 to stop the installation operation on the to-be-installed application. ;
  • the mobile terminal 1101 is further configured to stop the installation operation of the to-be-installed application if receiving the verification failure message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the terminal performs installation operation according to the verification message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Stored Programmes (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种应用安装方法、相关装置及应用安装***,包括:获取待安装应用的安装包的标识信息;向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。本发明实施例提供的技术方案有利于提高用户安装应用的安全性。

Description

一种应用安装方法、相关装置及应用安装***
本申请要求于2015年10月26日提交中国专利局,申请号为201510704862.7、发明名称为“一种应用安装方法、相关装置及应用安装***”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及信息安全的技术领域,具体涉及一种应用安装方法、相关装置及应用安装***。
背景技术
随着移动多媒体时代的到来,借助丰富的应用软件,手机从简单的通话工具逐渐向智能化发展。作为智能手机的核心,操作***成为了智能手机最具竞争力的部分。操作***使智能手机越来越趋同于微型计算机,用户在智能手机上可以自行安装软件、游戏等第三方服务商提供的程序,通过此类程序来不断对手机的功能进行扩充。
然而一些操作***特别是开源的操作***(例如,安卓***)允许第三方应用在终端上随意安装应用程序,用户在安装包安装完成后,才能辨别是否为恶意应用,影响***安全。
发明内容
本发明实施例所要解决的技术问题在于,提供一种应用安装方法、相关装置及应用安装***,以期提高用户安装应用的安全性。
为了解决上述技术问题,本发明实施例第一方面提供一种应用安装方法,所述方法包括:
获取待安装应用的安装包的标识信息;
向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
本发明实施例第二方面提供了一种应用安装方法,所述方法包括:
安全应用服务端接收终端发送的携带标识信息的验证请求;
所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证;
在验证通过的情况下,所述安全应用服务端向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
本发明实施例第三方面提供了一种移动终端,所述移动终端包括:
获取单元,用于获取待安装应用的安装包的标识信息;
发送单元,用于向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
执行单元,用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
本发明实施例第四方面提供了一种安全应用服务端,所述安全应用服务端包括:
接收单元,用于接收终端发送的携带标识信息的验证请求;
验证单元,用于对所述验证请求中携带的标识信息进行安全性验证;
发送单元,用于在验证通过的情况下,向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
相应的,本发明实施例第四方面还提供了一种应用安装***,包括如本发明实施例第三方面提供的一种移动终端和本发明实施例第四方面提供的一种安全应用服务端,其中:
所述移动终端,用于获取待安装应用的安装包的标识信息;向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
所述安全应用服务端,用于接收终端发送的携带标识信息的验证请求;对所述验证请求中携带的标识信息进行安全性验证;在验证通过的情况下,向所 述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
所述移动终端,还用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明第一实施例提供的一种应用安装方法的流程示意图;
图2是本发明第二实施例提供的一种应用安装方法的流程示意图;
图3是本发明第三实施例提供的一种应用安装方法的流程示意图;
图4是本发明第四实施例提供的一种应用安装方法的流程示意图;
图5是本发明第五实施例提供的一种应用安装方法的流程示意图;
图6是本发明第六实施例提供的一种应用安装方法的流程示意图;
图7是本发明第七实施例提供的一种移动终端的结构示意图;
图8是本发明第八实施例提供的一种移动终端的结构示意图;
图9是本发明第九实施例提供的一种安全应用服务端的结构示意图;
图10是本发明第十实施例提供的一种安全应用服务端的结构示意图;
图11是本发明第十实施例提供的一种应用安装***的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清 楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
以下分别进行详细说明。
上述移动终端可以是任何具备通信和存储功能的设备,例如:平板电脑、手机、电子阅读器、个人计算机(Personal Computer,PC)、笔记本电脑、车载设备、网络电视、可穿戴设备等具有网络功能的智能设备。
请参阅图1,图1是本发明第一实施例提供的一种应用安装方法的流程示意图,其中,图1所描述的应用安装方法主要是从终端一侧来进行描述的,如图1所示,该应用安装方法可以包括以下步骤:
S101、终端获取待安装应用的安装包的标识信息。
其中,安装包(Install pack),即软件安装包,是可自行解压缩文件的集合,其中包括软件安装的所有文件,运行安装包(可执行文件),可以将此软件的所有文件释放到硬盘上,完成修改注册表、修改***设置、创建快捷方式等工作。安装包只有安装在终端上才能实现其功能,一个安装到终端上的安装包称为应用,应用(Application,简称APP)可以包括用户在网络上所使用的各种服务,如应用程序、网页、视频、小说、音乐、游戏、新闻、购物和邮箱等。
可选的,所述标识信息包括待安装应用的安装包的包名和待安装应用的安装包的验证信息。
S102、终端向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
其中,上述安全应用服务端对该验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安装应用的安装包的包名与预存于安全应用服务端的所述待安装应用对应的授权安装包的包名进行匹配,在待安装应用的安装包的包名与预存于安全应用服务端的所述待安装应用对应的授权安装包的包名匹配的前提下,待安装 应用的安装包的验证信息与上述待安装应用的授权安装包的验证信息进行匹配。
S103、终端若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,终端若接收到所述安全应用服务端响应所述验证请求所发送的验证失败消息,停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应用的安装操作。
可选的,在图1所示的方法中,终端在向安全应用服务端发送携带所述标识信息的验证请求之前,可以先执行以下步骤:
识别所述待安装应用的安装包的下载源;
若识别出的下载源为非授权的下载源,触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,待安装应用的安装包的下载源可以包括授权的下载源和非授权的下载源,授权的下载源为安装包下载于安全应用服务端,非授权的下载源为安装包下载于除安全应用服务端之外的第三方应用服务端。其中,第三方 应用服务端也称为第三方应用商店(APPSTORE),是指专门为终端提供免费(收费)应用搜索和下载服务的电子应用商店,可以包括第三方应用市场,例如应用市场、安卓市场等,还可以包括浏览器,目前一些浏览器也可提供应用的搜索和下载的功能。
具体实现中,由于安卓***的开放性使得安卓***上安装的应用的质量良莠不齐,如果待安装应用的安装包下载于除安全应用服务端之外的第三方应用服务端,则此安装包存在一定的安全隐患。
在具体实现中,以安卓平台为例,由于安卓平台上安装文件的后缀名一般为“.apk”,因此安卓***上的应用的安装包一般称为apk安装包。每个apk安装包由多个文件打包得到,其中包括清单(Manifest)文件:AndroidManifest.xml文件。清单文件是必须存在的,其位于整个apk安装包的根目录中,提供了安卓***所需要的关于所述应用的必要信息,其中,所述必要信息为在该应用的任何代码运行之前***所必须拥有的信息。
清单由一个根标签<Manifest>构成,该标签带有一个设置安装包的Package属性,Package是记录在AndroidManifest.xml文件中的应用程序安装包的唯一标识,如果应用程序的Package发生重复,是不能发布成功的,因此,可以从安卓***的apk安装包的AndroidManifest.xml文件中读取应用apk安装包的唯一标识Package。
Activity(活动)是一个负责与用户交互的组件,在安卓***中,每个应用都基于一个Activity建立起来,即每个应用对应于一个Activity,而在本发明实施例中,Activity为当前的apk安装包对应的应用,可以通过当前apk安装包的Package获取得到该apk安装包对应的Activity,其中,一个apk安装包中可以包括多个Activity,在创建一个应用程序时,首先会调用***接口创建一个Activity类。在Activity中包括一个mToken,Activity管理服务AmS(ActivityManagerService.java文件,简称AmS)中的HistoryRecord通过记录mToken来记录***中的Activit的创建,也即,通过HistoryRecord中可以获得当前的Activity是由哪个进程创建的,进而识别所述待安装应用的安装包的下载源。
在本实施例中,若终端识别出待安装应用的安装包的下载源为非授权的下 载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载源的安装包,则用户的确认安装动作触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
可选的,若终端识别出的下载源为授权的下载源,终端执行针对所述待安装应用的安装操作。
在本实施例中,若终端识别出待安装应用的安装包的下载源为授权的下载源,即下载于安全应用服务端,则终端直接执行所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图2,图2是本发明第二实施例提供的一种应用安装方法的流程示意图,其中,图2所描述的应用安装方法主要是从安全应用服务端一侧来进行描述的,如图2所示,该应用安装方法可以包括以下步骤:
S201、安全应用服务端接收终端发送的携带标识信息的验证请求。
其中,所述验证请求是用于指示所述安全应用服务端将该验证请求中携带的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证。
S202、所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息,所述安全应用服务端对所述验证请求中携带的标识信息进 行安全性验证的具体实施方式是:
所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述安全应用服务端对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
S203、在验证通过的情况下,所述安全应用服务端向终端发送验证通过消息,以触发终端执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,在验证失败的情况下,所述安全应用服务端向所述终端发送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图3,图3是本发明第三实施例提供的一种应用安装方法的流程示意图,其中,图3所描述的应用安装方法主要是从安全应用服务端和终端两侧来进行描述的,如图3所示,该应用安装方法可以包括以下步骤:
S301、终端获取待安装应用的安装包的标识信息。
S302、终端向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
S303、所述安全应用服务端接收所述终端发送的携带标识信息的验证请求。
S304、所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述安全应用服务端对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
S305、在验证通过的情况下,所述安全应用服务端向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识 信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
S306、终端若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,在验证失败的情况下,所述安全应用服务端向所述终端发送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。终端若接收到所述安全应用服务端响应所述验证请求所发送的验证失败消息,停止对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图4,图4是本发明第四实施例提供的一种应用安装方法的流程示意图,其中,图4所描述的应用安装方法主要是从安全应用服务端和终端两侧来进行描述的,如图4所示,该应用安装方法可以包括以下步骤:
S401、终端获取待安装应用的安装包的标识信息。
S402、终端识别所述待安装应用的安装包的下载源。
在本实施例中,待安装应用的安装包的下载源可以包括授权的下载源和非授权的下载源,授权的下载源为安装包下载于安全应用服务端,非授权的下载源为安装包下载于除安全应用服务端之外的第三方应用服务端。其中,第三方应用服务端也称为第三方应用商店(APPSTORE),是指专门为终端提供免费(收费)应用搜索和下载服务的电子应用商店,可以包括第三方应用市场,例 如应用市场、安卓市场等,还可以包括浏览器,目前一些浏览器也可提供应用的搜索和下载的功能。
具体实现中,由于安卓***的开放性使得安卓***上安装的应用的质量良莠不齐,如果待安装应用的安装包下载于除安全应用服务端之外的第三方应用服务端,则此安装包存在一定的安全隐患。
S403、若终端识别出的下载源为非授权的下载源,触发终端执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,若终端识别出待安装应用的安装包的下载源为非授权的下载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载源的安装包,则用户的确认安装动作触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
S404、终端向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
S405、所述安全应用服务端接收所述终端发送的携带标识信息的验证请求。
S406、所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述 安全应用服务端对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
S407、在验证通过的情况下,所述安全应用服务端向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息。
S408、终端若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图5,图5是本发明第五实施例提供的一种应用安装方法的流程示意图,其中,图5所描述的应用安装方法主要是从安全应用服务端和终端两侧来进行描述的,如图5所示,该应用安装方法可以包括以下步骤:
S501、终端获取待安装应用的安装包的标识信息。
S502、终端识别所述待安装应用的安装包的下载源。
S503、若终端识别出的下载源为非授权的下载源,触发终端执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,若终端识别出待安装应用的安装包的下载源为非授权的下载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载 源的安装包,则用户的确认安装动作触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
S504、终端向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
S505、所述安全应用服务端接收所述终端发送的携带标识信息的验证请求。
S506、所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述安全应用服务端对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
S507、在验证失败的情况下,所述安全应用服务端向所述终端发送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应 用的安装操作。
S508、终端若接收到所述安全应用服务端响应所述验证请求所发送的验证失败消息,停止对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图6,图6是本发明第六实施例提供的一种应用安装方法的流程示意图,其中,图6所描述的应用安装方法主要是从安全应用服务端和终端两侧来进行描述的,如图6所示,该应用安装方法可以包括以下步骤:
S601、终端获取待安装应用的安装包的标识信息。
可选的,所述标识信息包括待安装应用的安装包的包名和待安装应用的安装包的验证信息。
S602、终端识别所述待安装应用的安装包的下载源。
S603、若终端识别出的下载源为授权的下载源,执行针对所述待安装应用的安装操作。
在本实施例中,若终端识别出待安装应用的安装包的下载源为授权的下载源,即下载于安全应用服务端,则终端直接执行所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将终端获取的标识信息与与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
下面为本发明装置实施例,本发明装置实施例用于执行本发明方法实施例一至六实现的方法,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例一至实施例六。
请参阅图7,图7是本发明第七实施例提供的一种移动终端的结构示意图,如图7所示,该移动终端可以包括:
获取单元701,用于获取待安装应用的安装包的标识信息。
发送单元702,用于向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述安全应用服务端对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
执行单元703,用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息,终端接收所述验证通过消息,执行单元703执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓 ***提供的用于安装软件的应用程序。
可选的,所述移动终端还包括:
识别单元704,用于识别所述待安装应用的安装包的下载源。
触发单元705,用于若识别出的下载源为非授权的下载源,触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,若识别单元704识别出待安装应用的安装包的下载源为非授权的下载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载源的安装包,则用户的确认安装动作触发所述触发单元705执行所述向安全应用服务端发送携带所述标识信息的验证请求。
可选的,所述执行单元703,还用于若识别出的下载源为授权的下载源,所述执行单元703执行针对所述待安装应用的安装操作。
在本实施例中,若识别单元704识别出待安装应用的安装包的下载源为授权的下载源,即下载于安全应用服务端,则执行单元703直接执行所述待安装应用的安装操作。
可选的,所述移动终端还包括:
停止单元,用于若移动终端接收到所述安全应用服务端发送的验证失败消息,停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止单元停止执行针对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图8,图8是本发明的第八实施例提供的移动终端的结构示意图。如图所示,本发明实施例中的移动终端包括:至少一个处理器801,例如CPU,至少一个接收器803,至少一个存储器804,至少一个发送器805,至少一个通信总线802。其中,通信总线802用于实现这些组件之间的连接通信。其中,本发明实施例中装置的接收器803和发送器805可以是有线发送端口,也可以为无线设备,例如包括天线装置,用于与其他节点设备进行信令或数据的通信。存储器804可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器804可选的还可以是至少一个位于远离前述处理器801的存储装置。存储器804中存储一组程序代码,且处理器801用于调用存储器中存储的程序代码,用于执行以下操作:
处理器801获取待安装应用的安装包的标识信息。
可选的,所述标识信息包括待安装应用的安装包的包名和待安装应用的安装包的验证信息。
处理器801向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
其中,所述安全应用服务端将该验证请求中携带的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证的具体实施方式是:
首先,待安装应用的安装包的包名与预存于安全应用服务端的所述待安装应用对应的授权安装包的包名进行匹配,在待安装应用的安装包的包名与预存于安全应用服务端的所述待安装应用对应的授权安装包的包名匹配的前提下,待安装应用的安装包的验证信息与上述待安装应用的授权安装包的验证信息进行匹配。
若处理器801接收到所述安全应用服务端发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发 送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,若处理器801接收到所述安全应用服务端发送的验证失败消息,则停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应用的安装操作。
可选的,在图8所示的移动终端中,处理器801在向安全应用服务端发送携带所述标识信息的验证请求之前,可以先执行以下步骤:
处理器801识别所述待安装应用的安装包的下载源;
若处理器801识别出的下载源为非授权的下载源,触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,若处理器801识别出待安装应用的安装包的下载源为非授权的下载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载源的安装包,则用户的确认安装动作触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
可选的,若处理器801识别出的下载源为授权的下载源,处理器801执行针对所述待安装应用的安装操作。
在本实施例中,若处理器801识别出待安装应用的安装包的下载源为授权的下载源,即下载于安全应用服务端,则处理器801直接执行所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用 是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图9,图9是本发明第九实施例提供的一种安全应用服务端的结构示意图,如图9所示,该安全应用服务端至少可以包括:
接收单元901,用于接收携带标识信息的验证请求。
验证单元902,用于对所述验证请求中携带的标识信息进行安全性验证。
其中,所述验证单元902具体用于对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证单元验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证单元验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息;
所述验证单元,具体用于对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
发送单元903,用于在验证通过的情况下,安全应用服务端向终端发送验证通过消息,以触发终端执行针对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述安全应用服务端向终端发送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,所述发送单元903,还用于在验证失败的情况下,向所述终端发 送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。
具体的,安全应用服务端将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述安全应用服务端向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图10,图10是本发明第十一实施例提供的安全应用服务端的结构示意图。如图所示,本发明实施例中的安全应用服务端包括:至少一个处理器1001,例如CPU,至少一个接收器1003,至少一个存储器1004,至少一个发送器1005,至少一个通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。其中,本发明实施例中装置的接收器1003和发送器1005可以是有线发送端口,也可以为无线设备,例如包括天线装置,用于与其他节点设备进行信令或数据的通信。存储器1004可以是高速RAM存储器,也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器1004可选的还可以是至少一个位于远离前述处理器1001的存储装置。存储器1004中存储一组程序代码,且处理器1001用于调用存储器中存储的程序代码,用于执行以下操作:
处理器1001接收终端发送的携带标识信息的验证请求。
所述处理器1001对所述验证请求中携带的标识信息进行安全性验证。
其中,所述处理器1001对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述处理器1001对所述验证请求中携带的标识信息与预存的授权标识信 息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息;
所述处理器1001对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述处理器1001对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下,所述所述处理器1001对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
在验证通过的情况下,处理器1001向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
具体的,处理器1001将终端发送的验证请求中携带的待安装应用的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息完全匹配,所述处理器1001向终端发送验证通过消息,终端接收所述验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,在验证失败的情况下,处理器1001向终端发送验证失败消息,以通知终端停止对所述待安装应用的安装操作。
具体的,处理器1001将终端发送的验证请求中携带的待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的标识信息进行验证,若待安装应用的标识信息与预存的所述待安装应用对应的授权安装包的标识信息不完全匹配,所述处理器1001向终端发送验证失败消息,终端接收所述验证失败消息,停止执行针对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与与预存 的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
请参阅图11,图11是本发明实施例提供的一种应用安装***的结构示意图,如图11所示,该应用安装***可以包括:移动终端1101和安全应用服务端1102,其中,所述移动终端1101可以如前文图7或图8所介绍的移动终端,安全应用服务端1102可以如合前文图9或图10所介绍的安全应用服务端,具体的:
移动终端1101,用于获取待安装应用的安装包的标识信息;向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证。
安全应用服务端1102,用于接收终端发送的携带标识信息的验证请求;对所述验证请求中携带的标识信息进行安全性验证;在验证通过的情况下,向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作。
其中,所述安全应用服务端1102对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
安全应用服务端1102对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
可选的,所述标识信息包括待安装应用的安装包的包名和待安装应用的安装包的验证信息。
所述安全应用服务端1102对所述验证请求中携带的标识信息进行安全性验证的具体实施方式是:
所述安全应用服务端1102对待安装应用的安装包的包名与预存的授权包名进行匹配;在待安装应用的安装包的包名与预存的授权包名匹配的情况下, 所述安全应用服务端1102对待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
具体的,安全应用服务端1102将上述移动终端1101发送的验证请求中携带的待安装应用的标识信息与预存于安全应用服务端1102的所述待安装应用对应的授权安装包的授权标识信息进行验证,若待安装应用的标识信息与预存在安全应用服务端的所述待安装应用对应的授权安装包的授权标识信息完全匹配,所述安全应用服务端1102向移动终端1101发送验证通过消息。
所述移动终端1101,还用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
具体的,在安卓***中,除***自带的应用外,其他需要安装的新的应用的安装包都必须通过应用安装器才能够安装到安卓***中,应用安装器为安卓***提供的用于安装软件的应用程序。
可选的,所述移动终端1101,还用于识别所述待安装应用的安装包的下载源;若识别出的下载源为非授权的下载源,触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
在本实施例中,若移动终端1101识别出待安装应用的安装包的下载源为非授权的下载源,由用户确认是否进行安装,若用户确认安装上述下载源为非授权的下载源的安装包,则用户的确认安装动作触发移动终端1101执行所述向安全应用服务端发送携带所述标识信息的验证请求。
可选的,所述移动终端1101,还用于若识别出的下载源为授权的下载源,执行针对所述待安装应用的安装操作。
可选的,所述安全应用服务端1102,还用于在验证失败的情况下,向所述移动终端1101发送验证失败消息,以通知所述移动终端1101停止对所述待安装应用的安装操作;
可选的,所述移动终端1101,还用于若接收到所述安全应用服务端响应所述验证请求所发送的验证失败消息,停止对所述待安装应用的安装操作。
通过本发明实施例,安全应用服务端将移动终端获取的标识信息与预存的所述待安装应用对应的授权安装包的标识信息进行验证以确定该待安装应用是否为恶意应用,进而返回终端验证消息,终端根据所述验证消息进行安装操 作或停止安装,解决了现有技术中用户在安装包安装完成后才能辨别是否为恶意应用的技术问题,有利于提高应用安装的安全性。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。
以上对本发明实施例进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上上述,本说明书内容不应理解为对本发明的限制。

Claims (16)

  1. 一种应用安装方法,其特征在于,所述方法包括:
    获取待安装应用的安装包的标识信息;
    向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
    若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
  2. 根据权利要求1所述的方法,其特征在于,所述向安全应用服务端发送携带所述标识信息的验证请求之前,所述方法还包括:
    识别所述待安装应用的安装包的下载源;
    若识别出的下载源为非授权的下载源,触发执行所述向安全应用服务端发送携带所述标识信息的验证请求。
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    若识别出的下载源为授权的下载源,执行针对所述待安装应用的安装操作。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    若接收到所述安全应用服务端响应所述验证请求所发送的验证失败消息,停止对所述待安装应用的安装操作。
  5. 根据权利要求1~4任一项所述的方法,其特征在于,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息。
  6. 一种应用安装方法,其特征在于,所述方法包括:
    安全应用服务端接收终端发送的携带标识信息的验证请求;
    所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证;
    在验证通过的情况下,所述安全应用服务端向所述终端发送验证通过消息,以触发所述终端执行针对待安装应用的安装操作。
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:
    在验证失败的情况下,所述安全应用服务端向所述终端发送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。
  8. 根据权利要求6或7所述的方法,其特征在于,所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证,包括:
    安全应用服务端对所述验证请求中携带的标识信息与预存的授权标识信息进行匹配;
    若所述验证请求中携带的标识信息与所述预存的授权标识信息完全匹配,则验证通过;
    若所述验证请求中携带的标识信息与所述预存的授权标识信息不匹配,则验证失败。
  9. 根据权利要求6或7所述的方法,其特征在于,所述标识信息包括:待安装应用的安装包的包名和待安装应用的安装包的验证信息;
    所述安全应用服务端对所述验证请求中携带的标识信息进行安全性验证,包括:
    所述安全应用服务端对待安装应用的安装包的包名与预存的授权包名进行匹配;
    在所述待安装应用的安装包的包名与所述预存的授权包名匹配的情况下,所述安全应用服务端对所述待安装应用的安装包的验证信息与预存的授权验证信息进行匹配。
  10. 一种移动终端,其特征在于,所述移动终端包括:
    获取单元,用于获取待安装应用的安装包的标识信息;
    发送单元,用于向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
    执行单元,用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
  11. 根据权利要求10所述的移动终端,其特征在于,所述移动终端还包括:
    识别单元,用于识别所述待安装应用的安装包的下载源;
    触发单元,用于若识别出的下载源为非授权的下载源,触发执行单元执行所述向安全应用服务端发送携带所述标识信息的验证请求。
  12. 一种安全应用服务端,其特征在于,所述安全应用服务端包括:
    接收单元,用于接收终端发送的携带标识信息的验证请求;
    验证单元,用于对所述验证请求中携带的标识信息进行安全性验证;
    发送单元,用于在验证通过的情况下,向所述终端发送验证通过消息,以触发所述终端执行针对待安装应用的安装操作。
  13. 根据权利要求12所述的安全应用服务端,其特征在于,
    所述发送单元,还用于在验证失败的情况下,向所述终端发送验证失败消息,以通知所述终端停止对所述待安装应用的安装操作。
  14. 一种应用安装***,其特征在于,包括移动终端和安全应用服务端,其中:
    所述移动终端,用于获取待安装应用的安装包的标识信息;向安全应用服务端发送携带所述标识信息的验证请求,所述验证请求是用于指示所述安全应用服务端对该验证请求中携带的标识信息进行安全性验证;
    所述安全应用服务端,用于接收终端发送的携带标识信息的验证请求;对所述验证请求中携带的标识信息进行安全性验证;在验证通过的情况下,向所述终端发送验证通过消息,以触发所述终端执行针对所述待安装应用的安装操作;
    所述移动终端,还用于若接收到所述安全应用服务端响应所述验证请求所发送的验证通过消息,执行针对所述待安装应用的安装操作。
  15. 根据权利要求14所述的应用安装***,其特征在于,
    所述移动终端,还用于识别所述待安装应用的安装包的下载源;
    所述安全应用服务端,还用于若所述移动终端识别出的下载源为非授权的下载源,接收所述移动终端发送的携带所述标识信息的验证请求。
  16. 根据权利要求14所述的应用安装***,其特征在于,
    所述安全应用服务端,还用于在验证失败的情况下,向所述移动终端发送验证失败消息;
    所述移动终端,还用于在接收到所述验证失败消息时,停止对所述待安装应用的安装操作。
PCT/CN2016/084084 2015-10-26 2016-05-31 一种应用安装方法、相关装置及应用安装*** WO2017071207A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510704862.7 2015-10-26
CN201510704862.7A CN105354488B (zh) 2015-10-26 2015-10-26 一种应用安装方法、相关装置及应用安装***

Publications (1)

Publication Number Publication Date
WO2017071207A1 true WO2017071207A1 (zh) 2017-05-04

Family

ID=55330459

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084084 WO2017071207A1 (zh) 2015-10-26 2016-05-31 一种应用安装方法、相关装置及应用安装***

Country Status (2)

Country Link
CN (1) CN105354488B (zh)
WO (1) WO2017071207A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815692A (zh) * 2017-11-20 2019-05-28 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354488B (zh) * 2015-10-26 2018-06-15 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装***
CN107465646B (zh) * 2016-06-02 2019-02-26 腾讯科技(深圳)有限公司 一种应用下载方法、***及相关设备
CN106325928B (zh) * 2016-08-22 2020-02-07 北京光年无限科技有限公司 一种应用于智能机器人的应用接入方法及智能机器人
CN106487793A (zh) * 2016-10-19 2017-03-08 广东欧珀移动通信有限公司 应用安装方法及装置
CN107016279A (zh) * 2016-12-13 2017-08-04 蔚来汽车有限公司 应用安装方法和应用安装***
CN106682491B (zh) * 2017-01-23 2020-06-16 百度在线网络技术(北京)有限公司 应用下载方法和装置
CN107330321A (zh) * 2017-07-21 2017-11-07 广东欧珀移动通信有限公司 一种应用安装方法、移动终端和计算机可读存储介质
CN107368735B (zh) * 2017-07-24 2020-03-20 Oppo广东移动通信有限公司 一种应用安装方法、移动终端和计算机可读存储介质
CN108460273B (zh) 2017-12-27 2022-10-14 ***股份有限公司 一种终端的应用管理方法、应用服务器及终端
CN109710280B (zh) * 2018-12-27 2022-04-15 上海掌门科技有限公司 一种用于在用户设备上安装应用的方法与设备
WO2021203336A1 (en) * 2020-04-08 2021-10-14 Qualcomm Incorporated Firmware over-the-air updating for device configured to wirelessly communicate vehicle operation data
CN113873075B (zh) * 2021-09-18 2023-01-10 深圳市爱都科技有限公司 一种通知消息管理方法、***及移动终端、存储介质
CN117369835A (zh) * 2023-06-09 2024-01-09 贵州爱信诺航天信息有限公司 一种基于守护进程的强制补丁安装方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (zh) * 2011-07-11 2011-11-02 华为技术有限公司 验证标识信息的方法及终端
CN104133701A (zh) * 2014-07-31 2014-11-05 广州金山网络科技有限公司 一种应用程序安装方法和装置
CN104219312A (zh) * 2014-09-05 2014-12-17 无锡天脉聚源传媒科技有限公司 一种安装程序的方法及装置
CN105354488A (zh) * 2015-10-26 2016-02-24 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装***

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446106A (zh) * 2010-09-30 2012-05-09 联想(北京)有限公司 应用程序的安装管理方法、服务器和终端
CN103577206A (zh) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 一种应用软件的安装方法和装置
CN103235906B (zh) * 2013-03-27 2016-01-13 广东欧珀移动通信有限公司 一种应用程序加密、解密方法及加密、解密装置
CN103632089A (zh) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 应用安装包的安全检测方法、装置和***
CN104134143B (zh) * 2014-07-15 2017-05-03 北京奇付通科技有限公司 移动支付安全的保护方法、装置及云服务器
CN104021339A (zh) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 移动终端的安全支付方法及装置
CN104796491A (zh) * 2015-05-07 2015-07-22 北京智膜科技有限公司 一种服务器和基于一次扫码的软件下载及注册方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (zh) * 2011-07-11 2011-11-02 华为技术有限公司 验证标识信息的方法及终端
CN104133701A (zh) * 2014-07-31 2014-11-05 广州金山网络科技有限公司 一种应用程序安装方法和装置
CN104219312A (zh) * 2014-09-05 2014-12-17 无锡天脉聚源传媒科技有限公司 一种安装程序的方法及装置
CN105354488A (zh) * 2015-10-26 2016-02-24 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装***

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815692A (zh) * 2017-11-20 2019-05-28 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置
CN109815692B (zh) * 2017-11-20 2023-02-10 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置

Also Published As

Publication number Publication date
CN105354488A (zh) 2016-02-24
CN105354488B (zh) 2018-06-15

Similar Documents

Publication Publication Date Title
WO2017071207A1 (zh) 一种应用安装方法、相关装置及应用安装***
US11093981B2 (en) Smart broadcasting device
EP3716656B1 (en) Profile generation method, profile acquisition method, and related device and storage medium
US10320940B1 (en) Managing generic data
CN107992308B (zh) 一种安卓终端应用程序的插件化管理方法
US8464332B2 (en) Access gateway and method for providing cloud storage service
US20130326502A1 (en) Installing applications remotely
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN109495433B (zh) 数据下载方法和装置、存储介质及电子装置
WO2019184053A1 (zh) 一种浏览应用页面的方法及终端
US20160261693A1 (en) Cloud-based data backup and operation method and system
JP6793667B2 (ja) アプリケーションダウンロード方法及び装置
WO2015058574A1 (zh) 实现扩展应用程序的推送通知的方法及装置
TW200541286A (en) Execution of unverified programs in a wireless device operating environment
CN107862091B (zh) 实现网页访问的控制方法及装置
WO2022257927A1 (zh) 密钥烧录方法、装置、电子设备板卡及存储介质
CN103491080A (zh) 信息安全保护方法及***
JP5610654B2 (ja) 端末管理パッケージを提供する装置及び前記端末管理パッケージを受信する方法
WO2016095796A1 (zh) 用于可信执行环境的安全操作***更新方法
CN113094064A (zh) 网关软件模块升级方法、装置、设备及存储介质
US8880701B2 (en) System and method for supporting of network service
WO2014106391A1 (zh) 一种应用安装的方法、设备及***
WO2013004175A1 (zh) 一种电子设备的软件升级方法及装置
CN115878138A (zh) 应用预下载方法、装置、计算机、存储介质
KR20120124329A (ko) 서비스 제공 장치에서 drm 서비스를 제공하는 방법 그리고 이를 위한 서비스 제공 장치 및 사용자 단말에서 drm 서비스를 제공받는 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858651

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16858651

Country of ref document: EP

Kind code of ref document: A1