CN104158812A - Method and system of safety control of terminal application - Google Patents

Method and system of safety control of terminal application Download PDF

Info

Publication number
CN104158812A
CN104158812A CN201410415019.2A CN201410415019A CN104158812A CN 104158812 A CN104158812 A CN 104158812A CN 201410415019 A CN201410415019 A CN 201410415019A CN 104158812 A CN104158812 A CN 104158812A
Authority
CN
China
Prior art keywords
entrance
network path
secure network
sign
appointment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410415019.2A
Other languages
Chinese (zh)
Other versions
CN104158812B (en
Inventor
于忠民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410415019.2A priority Critical patent/CN104158812B/en
Priority claimed from CN201110082781.XA external-priority patent/CN102148831B/en
Publication of CN104158812A publication Critical patent/CN104158812A/en
Application granted granted Critical
Publication of CN104158812B publication Critical patent/CN104158812B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a method and a system of safety control of a terminal application. The method comprises the following steps that firstly, at least one entry identifier, which is from an appointed security network path and is used for starting a terminal application, is arranged in a user interface of a terminal screen; and the security network path is utilized to carry out safety verification on the entry identifier and/or the terminal application started by the entry identifier. By applying the method and the system, through controlling the source of the entry identifier shown on the terminal screen and/or the corresponding terminal application, safety of the source of the terminal application is guaranteed; moreover, through controlling an acquisition mode of execution parameters or data of the terminal application, safety of execution of the terminal application is guaranteed. Meanwhile, the safety control mode provided by the invention also provides an application foundation for all kinds of safety verifications.

Description

A kind of method of controlling security of terminal applies and system
Technical field
The present invention relates to Internet technical field, relate in particular to a kind of method of controlling security and system of terminal applies.
Background technology
Along with the develop rapidly of net networking technology, people are also more and more extensive to the demand of diverse network application (Application), but people also find, a lot of network applications also become more and more dangerous.
For example, the normal shortcut icon that some rogue program can disguise oneself as the access shortcut of some malicious web pages on the original desktop of user, when user's click is opened, finds that this webpage is not the website of oneself wanting access.Also have some rogue programs can when user carries out application, distort reference address, etc., these tamperings all can cause very large threat to the safety of user terminal.
In general, various terminal applies all can have corresponding entrance sign, the for example sign of various executable files, desktop shortcuts icon, or the displaying sign of application to be downloaded etc., by these entrances, identify to start corresponding application, these application can comprise web access, various document, or game etc.But under prior art, the source of these entrance signs and fail safe are to lack to control, accordingly, identify corresponding terminal applies with entrance and also cannot obtain effective security control, therefore, leave the opportunity of distorting icon or maliciously adding icon will to those rogue programs, to user terminal, cause security threat.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of method of controlling security and system of terminal applies, cannot be to for starting the source of entrance sign of terminal applies and the problem that fail safe control effectively and manages to overcome in prior art.
For solving the problems of the technologies described above, the invention provides a kind of method of controlling security of terminal applies, comprising:
In the user interface of terminal screen, be provided with at least one from the secure network path of appointment and for starting the entrance sign of terminal applies;
Utilize this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup.
The present invention and then a kind of safety control system of terminal applies is also provided, comprising:
Module is set, for the user interface at terminal screen, is provided with at least one from the secure network path of appointment and for starting the entrance sign of terminal applies;
Authentication module, for utilizing this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup.
Application the present invention, the source of the entrance sign by showing on control terminal screen and/or corresponding end application, has guaranteed the fail safe of terminal applies on source; And the obtaining mode of the execution parameter of applying by control terminal or data has guaranteed the fail safe that terminal applies is carried out.Meanwhile, security control pattern of the present invention is also for various safety verifications provide application foundation.
Accompanying drawing explanation
Fig. 1 is the method for controlling security schematic diagram according to a kind of terminal applies described in embodiments of the invention.
Fig. 2 is the applied environment schematic diagram described in the embodiment of the present invention.
Fig. 3 is the method for controlling security schematic diagram according to the terminal applies described in another embodiment of the present invention.
Fig. 4 is the safety control system schematic diagram according to the terminal applies described in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are elaborated.
As shown in Figure 1, for according to the method for controlling security schematic diagram of a kind of terminal applies described in embodiments of the invention, first, in the user interface of terminal screen, be provided with at least one from the secure network path of appointment and for starting the entrance sign (step 101) of terminal applies; In addition, utilize this secure network path to carry out safety verification (step 102) to described entrance sign and/or by the terminal applies of entrance sign startup.
In embodiments of the present invention, described secure network path, refers to the fail safe of communication on the one hand, also comprises on the other hand the fail safe of the data that deposit the network address.The guarantee of communications security can utilize the modes such as authentication or authentication; The guarantee of Information Security can be by various ways such as virus scan and cloud killings.
Wherein, described in the embodiment of the present invention, entrance sign is the startup entrance corresponding with terminal applies, and its form of expression can be sign, the desktop shortcuts of executable file, or the displaying sign of application to be downloaded etc., comprise button, or other discernible forms such as word.Icon take below as example, and the present invention will be described.
The entrance sign of terminal applies, can be that form with icon is showed on desktop, or be arranged in start menu with written form, can as user interface, show by existing terminal desktop, or utilize and on terminal desktop, to generate new user interface (for example program window) and concentrate displaying, the present invention does not limit this, but preferably independently generate a new special interface, and in this special interface, do centralized and unified displaying, very directly perceived for user like this, and easy to use and management, whether inspection that user can be convenient is had by the icon maliciously adding or distort occurs.
As shown in Figure 2, according to embodiments of the invention, these entrance signs 203 in the user interface 202 of end side 201, it is the sign coming from the secure network path of appointment, utilize this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup, thereby prevented rogue program distorting and adding icon.
For example, icon for some web page class, because the above-mentioned icon of showing in user interface is all to there being fixing reference address, and by central server through verify and unify transmission unified management, therefore, fail safe is guaranteed, and, can also by this secure network path, do regular checking by network side central server, fail safe is further provided.
This secure network path can be the memory space pointing in the network side central server 204 of an appointment, and the various entrances signs of storing in this space are all through safety verification, and this has just guaranteed the clean boot of various terminal applies on source.For further ensureing the fail safe of the application program corresponding with icon, described in can controlling, identifying corresponding terminal applies with end side entrance is also the secure network path that comes from appointment, and these terminal applies are also through safety verification.
In addition, can also pass through this secure network path, the entrance of end side having been shown by network side sign and/or the terminal applies being started by entrance sign are carried out safety verification.For example, to being present in the entrance sign in secure network path, carry out MD5 computing, draw unique value, and the corresponding entrance sign that end side has been shown also carries out MD5 computing, relatively whether two operation results are identical, if identical, represent by checking.And to identifying corresponding terminal applies with entrance, can use equally MD5 computing, and draw the MD5 value of the MD5 value of the application program that is present in network side and the corresponding application programs of end side, and compared, draw whether consistent judgement.
Be stored in the entrance signs such as icon in network side central server, can first be sent to end side storage, then in end side, be optionally showed in user interface, at this moment, although the icon of showing in user interface is the icon set that is selected from end side, it finally remains the network path that comes from appointment, therefore, in the present invention, this mode is also considered to come from the category of the network path of appointment.
Icon in user interface can be concentrated and be disposed or push by network side central server, and this has just prevented that rogue program from arbitrarily adding malice icon in interface, well improved fail safe.
According to another embodiment of the present invention, the present invention also can allow user in interface, to add voluntarily entrance sign, for these, come from the entrance sign outside described secure network path, when being added into described user interface, can utilize the secure network path of appointment to carry out safety verification to this entrance sign or related its corresponding terminal applies; Also after can being the entrance sign being come from interpolation by terminal outside the secure network path of described appointment, secure network path described in notice provides the entrance sign through safety verification, and utilization is arranged in user interface through the entrance sign outside the secure network path of the entrance sign replacement appointment of safety verification; Also can be to receive that in terminal the user interface of the entrance sign coming from outside described secure network path adds after request, to the sign of the entrance through safety verification corresponding to network side central server request, via the secure network path of appointment, push to described end side and show.
Equally, to coming from the checking of entrance outside secure network path sign or terminal applies, also can adopt multiple verification mode, such as adopting certificate signature validation, execution parameter checking, MD5 checking etc.
The application program corresponding with icon, can be already installed in local terminal, and at this moment, icon is as entrance, startup be the already installed application program in this local terminal; Also can be that local terminal is uninstalled, at this moment, need to first by the secure network path of appointment, from central server, download and install this application program, and in the application program of network side also through safety verification, therefore, there is equally the effect that improves fail safe.And the judgement of whether having installed in this locality can be known by the means such as relevance scanning of installation procedure being carried out in local terminal according to icon attribute or title, if installed, set up associatedly with the program finding, and start this program; If do not install, send download request to central server.In addition,, for identifying corresponding terminal applies with entrance, can also the secure network path by described appointment described terminal applies be pushed to described end side by end side request network side central server.
For some terminal applies, for example web application, existing executive mode be in local terminal by under its complete application storage, comprise crucial execution parameter or the data such as access to netwoks address, when obtaining execution, according to corresponding application program, appointment network address is conducted interviews etc.If but had rogue program to distort the execution parameter in this application or data, its execution result obtaining after obtaining and carrying out would be not just that user is needed.
The present invention improves existing mode, as shown in Figure 3, for according to the method for controlling security schematic diagram of the terminal applies described in another embodiment of the present invention, first by described terminal, to the secure network path request of appointment and described entrance, identified execution parameter and/or the data (step 301) of corresponding terminal applies; Then, described terminal, according to the execution parameter and/or the data that obtain via described secure network path, identifies corresponding application (step 302) with this entrance described in carrying out.
Wherein, described execution parameter can comprise described application reference address, show specification, or the information such as unfolding mode; Executing data can comprise the data of carrying out performance application particular content in application process, such as the executable file of downloading etc.
In this way, important execution parameter and/or data can be placed on to network side central server by secure network path, according to the request of end side, be sent to end side, and these execution parameter and/or data, also at network side, by safety verification, crossed, so also guaranteed the execution fail safe of end side.
And, network side central server can be by execution parameter and/or the data of the mutual acquisition renewal with third party content server, for example, if the reference address of certain application changes, central server can be by the address information after upgrading with the mutual acquisition of content server, and send over by the transmission of execution parameter, stopped to change because of reference address the opportunity staying to rogue program; And if modification has occurred certain the concrete configuration file in certain application, central server also can be by the configuration file after the mutual acquisition renewal of content server, and be sent to end side by the transmission of executing data, prevented that rogue program is in the modification to some configuration file of terminal applies.
In addition, what execution parameter can also be carried corresponding application presents the information such as specification or unfolding mode, after terminal is received, while carrying out corresponding terminal applies, can automatically according to adaptive specification or mode, open corresponding application, so just reduce time and link that end side needs user to get involved, reduced rogue program at the unsafe factor presenting and open etc. in link.
For further improving fail safe, described terminal can also, according to described execution parameter and/or data, be verified described application content.For example, reference address, unfolding mode are provided in execution parameter, have represented the contents such as rule, and when this terminal applies is carried out, whether the application that terminal can opened this is verified with the consistency of the parameter of receiving, if reference address, unfolding mode, represent rule etc. have in execution parameter one different, do not allow to open, so, further prevented that rogue program from tackling application, and from changing the situation of reference address.In like manner, terminal also can be according to the secure network path validation executing data of appointment, such as the identifying code of the described application that utilizes this secure network path to provide verifies whether executing data is tampered.
Can also, further according to execution parameter and/or the data of the correspondence application in network side central server, the execution parameter of the described correspondence of end side and/or data be verified.For example, can the execution parameter of network side storing or data and end side be downloaded to the execution parameter of preserving by server or MD5 value or other identifying codes of data compared, verify; Or conversely, by end side, initiatively compared with server side, can carry out safety verification.
Can also according to described in come from secure network path entrance sign described entrance sign of showing in end side is carried out to safety verification, specifically can comprise following several mode:
The described entrance that is obtained described end side by network side central server identifies, and utilizes the entrance sign in described secure network path to carry out safety verification to the corresponding entrance sign of described end side.For example, for guaranteeing icon or the execution parameter of correspondence and/or the consistency of data and network side of end side, central server can regularly be verified the icon of end side, to prevent the modification of rogue program.
Or, by described terminal, obtained the authorization information (such as digital certificate, MD5 identifying code etc.) of the entrance sign in described secure network path, the corresponding entrance sign that described user interface is shown is carried out safety verification.
Or the entrance sign of being obtained from described secure network path by described terminal utilization generates authorization information, and the corresponding entrance sign that user interface is shown is carried out safety verification.
The above-mentioned Validation Mode to entrance sign, is equally applicable to the safety verification to the execution parameter of terminal applies or application and data.
This checking, can be to confirm by the consistency between the identity ID of icon and the uniqueness computing (as MD5 algorithm) of icon itself or its corresponding application, if revised by rogue program, this consistency will be broken.
In addition, described terminal, after obtaining the execution parameter and/or data of the application corresponding with described icon, can also be upgraded the display state of this icon, further to point out user.For example, do not obtain before execution parameter, icon can be black and white, or dark-coloured, and after acquisition, can become colour or light tone.
Execution parameter and/or data, after downloading to terminal, can be kept at end side for carrying out next time; Can not preserve in end side, and when carrying out corresponding terminal applies, all by network side central server, download at every turn, can reduce like this probability being tampered in this locality, further improve fail safe yet.
The order that described terminal sends according to network side central server, can also show that icon and/or corresponding execution parameter and/or data upgrade to end side.
As shown in Figure 4, for according to the safety control system schematic diagram of the terminal applies described in the embodiment of the present invention, first comprise module 401 is set, authentication module 402, wherein:
The described module 401 that arranges, is provided with at least one from the secure network path of appointment and for starting the entrance sign of terminal applies for the user interface at terminal screen;
Described authentication module 402, for utilizing this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup.
Equally, the terminal applies of described entrance sign startup is also the secure network path that comes from appointment; The described terminal applies that described authentication module is preserved according to this secure network path is carried out safety verification to described terminal applies.
Described authentication module 402, the entrance sign that can preserve according to this secure network path and/or the execution parameter of entrance sign identify the entrance arranging in described user interface and/or identify by entrance the terminal applies starting carries out safety verification.
Described authentication module 402, can also, in end side to coming from the entrance sign outside described secure network path, when being added into described user interface, utilize the secure network path of appointment to carry out safety verification to this entrance sign.
Described authentication module 402, further utilizes the secure network path pair of appointment to identify corresponding terminal applies with described entrance and carries out safety verification.
Described authentication module 402, can add after the entrance sign outside the secure network path that comes from described appointment in end side, secure network path described in notice provides the entrance sign through safety verification, and utilization is arranged in user interface through the entrance sign outside the secure network path of the entrance sign replacement appointment of safety verification.
Described authentication module 402, can also receive that the user interface of the entrance sign coming from outside described secure network path adds after request in end side, to the sign of the entrance through safety verification corresponding to network side central server 405 requests, via the secure network path of appointment, push to described end side and show.
Described authentication module 402, can also be further used for asking network side central server 405 by identifying corresponding terminal applies with described entrance, to push to described end side by the secure network path of described appointment.
Please continue to refer to Fig. 4, described safety control system can further include: parameter request module 403, and parameter Executive Module 404, wherein:
Described parameter request module 403, identifies execution parameter and/or the data of corresponding terminal applies for controlling described terminal to the secure network path request of appointment and described entrance;
Described parameter Executive Module 404, for controlling described terminal according to the execution parameter and/or the data that obtain via described secure network path, identifies corresponding application with this entrance described in carrying out.
Described authentication module 402, can be further used for, according to the execution parameter and/or the data that come from described secure network path, the execution parameter of the described correspondence of end side and/or data being verified.
Authentication module shown in Fig. 4 402 is positioned at end side, and in fact, described authentication module also can be positioned at network side central server, by central server, initiates the various safety verifications to end side.
Terminal of the present invention, not only comprises PC desktop terminal, also can comprise the mobile terminals such as mobile phone or other portable terminals.Utilize the present invention, the various terminal applies that can be user provide directly perceived, easy and highly efficient, unified security management mechanism.

Claims (22)

1. a method of controlling security for terminal applies, is characterized in that, comprising:
In the user interface of terminal screen, be provided with at least one from the secure network path of appointment and for starting the entrance sign of terminal applies, terminal applies is that local terminal is uninstalled, need to from central server, download and install this application program by the secure network path of appointment;
Utilize this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup.
2. the method for claim 1, is characterized in that, further comprises: the terminal applies that described entrance sign starts comes from the secure network path of appointment; The described terminal applies of preserving according to this secure network path is carried out safety verification to described terminal applies.
3. the method for claim 1, it is characterized in that, the entrance sign of preserving according to this secure network path and/or the execution parameter of entrance sign identify the entrance arranging in described user interface and/or identify by entrance the terminal applies starting carries out safety verification.
4. the method for claim 1, it is characterized in that, further comprise: terminal, to coming from the entrance sign outside described secure network path, when being added into described user interface, utilizes the secure network path of appointment to carry out safety verification to this entrance sign.
5. method as claimed in claim 4, is characterized in that, further comprises: utilize the secure network path pair of appointment to identify corresponding terminal applies with described entrance and carry out safety verification.
6. the method for claim 1, it is characterized in that, further comprise: terminal comes from interpolation after the entrance sign outside the secure network path of described appointment, secure network path described in notice provides the entrance sign through safety verification, and utilization is arranged in user interface through the entrance sign outside the secure network path of the entrance sign replacement appointment of safety verification.
7. the method for claim 1, it is characterized in that, further comprise: terminal is added after request in the user interface of receiving the entrance sign coming from outside described secure network path, to the sign of the entrance through safety verification corresponding to network side central server request, via the secure network path of appointment, push to described end side and show.
8. the method as described in claim 6 or 7, is characterized in that, further comprises: the secure network path by end side request network side central server by described appointment pushes to described end side by identifying corresponding terminal applies with described entrance.
9. the method for claim 1, is characterized in that, further comprises:
By described terminal, to the secure network path request of appointment and described entrance, identified execution parameter and/or the data of corresponding terminal applies;
Described terminal, according to the execution parameter and/or the data that obtain via described secure network path, identifies corresponding application with this entrance described in carrying out.
10. method as claimed in claim 9, is characterized in that, further comprises:
According to the execution parameter and/or the data that come from described secure network path, the execution parameter of the described correspondence of end side and/or data are verified.
11. the method for claim 1, is characterized in that, described entrance sign comprises sign, the desktop shortcuts of executable file, or the displaying of application to be downloaded sign.
The safety control system of 12. 1 kinds of terminal applies, is characterized in that, comprising:
Module is set, for the user interface at terminal screen, is provided with at least one from the secure network path of appointment and for starting the entrance sign of terminal applies;
Authentication module, for utilizing this secure network path to carry out safety verification to described entrance sign and/or by the terminal applies of entrance sign startup.
13. systems as claimed in claim 12, is characterized in that, the terminal applies that described entrance sign starts comes from the secure network path of appointment; The described terminal applies that described authentication module is preserved according to this secure network path is carried out safety verification to described terminal applies.
14. systems as claimed in claim 12, it is characterized in that, described authentication module, the execution parameter of the entrance of preserving according to this secure network path sign and/or entrance sign identifies the entrance arranging in described user interface and/or identifies by entrance the terminal applies starting carries out safety verification.
15. systems as claimed in claim 12, it is characterized in that described authentication module identifies the entrance coming from outside described secure network path in end side, when being added into described user interface, utilize the secure network path of appointment to carry out safety verification to this entrance sign.
16. systems as claimed in claim 15, is characterized in that, described authentication module further utilizes the secure network path pair of appointment to identify corresponding terminal applies with described entrance and carries out safety verification.
17. systems as claimed in claim 12, it is characterized in that, described authentication module, in end side, add after the entrance sign outside the secure network path that comes from described appointment, secure network path described in notice provides the entrance sign through safety verification, and utilization is arranged in user interface through the entrance sign outside the secure network path of the entrance sign replacement appointment of safety verification.
18. systems as claimed in claim 12, it is characterized in that, described authentication module, in end side, receive that the user interface of the entrance sign coming from outside described secure network path adds after request, to the sign of the entrance through safety verification corresponding to network side central server request, via the secure network path of appointment, push to described end side and show.
19. systems as described in claim 17 or 18, it is characterized in that, described authentication module, is further used for asking network side central server by identifying corresponding terminal applies with described entrance, to push to described end side by the secure network path of described appointment.
20. systems as claimed in claim 12, is characterized in that, further comprise:
Parameter request module, identifies execution parameter and/or the data of corresponding terminal applies for controlling described terminal to the secure network path request of appointment and described entrance;
Parameter Executive Module, for controlling described terminal according to the execution parameter and/or the data that obtain via described secure network path, identifies corresponding application with this entrance described in carrying out.
21. systems as claimed in claim 20, is characterized in that, described authentication module is further used for, according to the execution parameter and/or the data that come from described secure network path, the execution parameter of the described correspondence of end side and/or data being verified.
22. systems as claimed in claim 12, is characterized in that, described entrance sign comprises sign, the desktop shortcuts of executable file, or the displaying of application to be downloaded sign.
CN201410415019.2A 2011-04-01 2011-04-01 The method of controlling security and system of a kind of terminal applies Active CN104158812B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410415019.2A CN104158812B (en) 2011-04-01 2011-04-01 The method of controlling security and system of a kind of terminal applies

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410415019.2A CN104158812B (en) 2011-04-01 2011-04-01 The method of controlling security and system of a kind of terminal applies
CN201110082781.XA CN102148831B (en) 2011-04-01 2011-04-01 Method and system for safely controlling terminal application

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201110082781.XA Division CN102148831B (en) 2011-04-01 2011-04-01 Method and system for safely controlling terminal application

Publications (2)

Publication Number Publication Date
CN104158812A true CN104158812A (en) 2014-11-19
CN104158812B CN104158812B (en) 2018-01-26

Family

ID=51884217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410415019.2A Active CN104158812B (en) 2011-04-01 2011-04-01 The method of controlling security and system of a kind of terminal applies

Country Status (1)

Country Link
CN (1) CN104158812B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701403A (en) * 2014-11-25 2016-06-22 卓望数码技术(深圳)有限公司 Password processing path identification method of Android application, and device thereby
CN107301334A (en) * 2017-06-28 2017-10-27 广东欧珀移动通信有限公司 Pay class application program and download means of defence, device and mobile terminal
CN108366696A (en) * 2015-12-16 2018-08-03 Seb公司 Method for controlling cooking preparation device
CN109271173A (en) * 2018-09-18 2019-01-25 广州视源电子科技股份有限公司 Platform application management method, device, storage medium and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079092A (en) * 2001-11-26 2007-11-28 松下电器产业株式会社 Terminal for application program authentication system and starting method for application program of the same
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN101924820A (en) * 2010-02-09 2010-12-22 宇龙计算机通信科技(深圳)有限公司 A kind of method for downloading software, system and portable terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079092A (en) * 2001-11-26 2007-11-28 松下电器产业株式会社 Terminal for application program authentication system and starting method for application program of the same
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN101924820A (en) * 2010-02-09 2010-12-22 宇龙计算机通信科技(深圳)有限公司 A kind of method for downloading software, system and portable terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701403A (en) * 2014-11-25 2016-06-22 卓望数码技术(深圳)有限公司 Password processing path identification method of Android application, and device thereby
CN105701403B (en) * 2014-11-25 2018-07-13 卓望数码技术(深圳)有限公司 The password processing path recognition methods of Android application and the device using this method
CN108366696A (en) * 2015-12-16 2018-08-03 Seb公司 Method for controlling cooking preparation device
US11229316B2 (en) 2015-12-16 2022-01-25 Seb S.A. Method for controlling a culinary preparation apparatus
CN107301334A (en) * 2017-06-28 2017-10-27 广东欧珀移动通信有限公司 Pay class application program and download means of defence, device and mobile terminal
CN109271173A (en) * 2018-09-18 2019-01-25 广州视源电子科技股份有限公司 Platform application management method, device, storage medium and terminal device
CN109271173B (en) * 2018-09-18 2022-05-31 广州视源电子科技股份有限公司 Platform application management method and device, storage medium and terminal equipment

Also Published As

Publication number Publication date
CN104158812B (en) 2018-01-26

Similar Documents

Publication Publication Date Title
CN102136049B (en) Terminal application safety management method and system
CN108845812B (en) Plug-in updating method, device, computer equipment and storage medium
US11237817B2 (en) Operating system update management for enrolled devices
US11272030B2 (en) Dynamic runtime interface for device management
US8990953B2 (en) Software distribution service federation
US9135433B2 (en) Identifying reputation and trust information for software
CN111522595B (en) Transient application
CN103716295B (en) A kind of network system
US20120310980A1 (en) Inferred user identity in content distribution
US20150378714A1 (en) Providing Context-Specific Software Updates to Client Applications
CN103713904A (en) Method, related device and system for installing applications in working area of mobile terminal
US20130074160A1 (en) Method of controlling information processing system, computer-readable recording medium storing program for controlling apparatus
CN102164179B (en) Method and system for arranging terminal application based on network
CN102148831B (en) Method and system for safely controlling terminal application
US9223557B1 (en) Application provided browser plugin
CN106709281B (en) Patch granting and acquisition methods, device
CN110795663B (en) Webpage loading method and equipment
CN114036495B (en) Method and device for updating privatized deployment verification code system
CN104158812A (en) Method and system of safety control of terminal application
US9397995B2 (en) Information processing apparatus and user authentication method
US9354849B2 (en) Modification of compiled applications and application management using retrievable policies
US20190098045A1 (en) Browser injection prevention method, browser client and apparatus
KR20150049457A (en) Method and apparatus for managing authentication information
KR102124330B1 (en) Method for updating of application and apparatus for the same
KR20150030047A (en) Method and system for application authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220726

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right