CN103425926A - Application program starting method, list configuring method, terminal and server - Google Patents

Application program starting method, list configuring method, terminal and server Download PDF

Info

Publication number
CN103425926A
CN103425926A CN201210148911XA CN201210148911A CN103425926A CN 103425926 A CN103425926 A CN 103425926A CN 201210148911X A CN201210148911X A CN 201210148911XA CN 201210148911 A CN201210148911 A CN 201210148911A CN 103425926 A CN103425926 A CN 103425926A
Authority
CN
China
Prior art keywords
application
malicious
list
application program
trusted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210148911XA
Other languages
Chinese (zh)
Other versions
CN103425926B (en
Inventor
王庆
郭浩然
肖权浩
袁宜霞
宋家顺
李朋涛
詹勋昌
林春优
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201210148911.XA priority Critical patent/CN103425926B/en
Publication of CN103425926A publication Critical patent/CN103425926A/en
Application granted granted Critical
Publication of CN103425926B publication Critical patent/CN103425926B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an application program starting method, a list configuring method, a terminal and a server, and belongs to the field of mobile terminals. The application program starting method includes when a first application program of the terminal is started, searching the first application program in a malicious application program list and a trusted application program list both issued by the server; when the first application program is in the malicious application program list, interrupting starting of the first application program; when the first application program is in the trusted application program list, continuing to execute starting of the first application program. The list configuring method includes determining malicious application programs and/or trusted application programs, generating the malicious application program list and/or the trusted application program list according to the determined malicious application programs and/or the trusted application programs, and sending the generated malicious application program list and/or the trusted application program list to the terminal. The process of inquiring by pop-up frames is simplified, and accuracy of determining of the malicious application programs is improved.

Description

The method of application program launching method, configured list, terminal and server
Technical field
The present invention relates to field of mobile terminals, particularly a kind of method of application program launching method, configured list, terminal and server.
Background technology
Development along with mobile terminal, can install and move simultaneously a plurality of application programs on same mobile terminal, and may there is malicious application in the plurality of application program, malicious application can the oneself start, networking, committed memory, the operation such as even illegally deduct fees, destroy the normal use of mobile terminal, in order to prevent that malicious application is to the normal interference of using of mobile terminal, conventional method is to set up blacklist and white list at mobile terminal, malicious application is joined to the mobile terminal blacklist list, and the application program of trust is joined to the list of mobile terminal white list, application program operation in blacklist list can be closed or limit, such as startup, networking and starting up, application program operation in the white list list will be allowed by acquiescence.
In realizing process of the present invention, the inventor finds that at least there is following problem in prior art:
In prior art when starting application program, can play frame and once point out whether allow aforesaid operations, thereafter bullet once allows the user determine whether add black and white lists again, two shortcomings are arranged like this: one, give the user by the decision of whether putting into black and white lists, need user's application programs that certain understanding is arranged, otherwise easily add malicious application to white list, cause the losses such as flow telephone expenses or internal memory, otherwise, if add application program commonly used to blacklist, also can cause the follow-up use of user to bring inconvenience, if add application program commonly used to blacklist, also likely the normal operation of other application programs is impacted, therefore, prior art determines that the accuracy of malicious application is low, the normal operation of the process meeting interfering mobile terminal of two, twice inquiry bullet frames, process is loaded down with trivial details.
Summary of the invention
In order to improve the accuracy of determining malicious application, simplify the process that plays the frame inquiry, the embodiment of the present invention provides method, terminal and the server of a kind of application program launching method, configured list.Described technical scheme is as follows:
A kind of application program launching method, described method comprises:
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
In described malicious application list, interrupt the startup of described the first application program when described the first application program;
In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, comprise before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
Described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, specifically comprise:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
The malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
A kind of method of configured list comprises:
Determine malicious application and/or trusted application;
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
The malicious application list of generation and/or trusted application list are sent to terminal.
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application, comprise before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
A kind of terminal comprises:
Search module, for when the first application program launching, search described the first application program in the malicious application list issued at server and trusted application list;
Processing module, for working as described the first application program in described malicious application list, interrupt the startup of described the first application program; In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
Described terminal also comprises:
Receiver module, the malicious application list and the trusted application list that for receiving described server, issue;
Update module, for by described malicious application list and trusted application list update to described terminal.
Described update module specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
The described module of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
The malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
Monitoring module, for when the second application program is moved, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, trigger the operation that described processing module is interrupted described malicious operation or this second application program.
A kind of server comprises:
The application program determination module, for determining malicious application and/or trusted application;
Generation module, generate malicious application list and/or trusted application list for the malicious application according to definite and/or trusted application;
Sending module, send to terminal for the malicious application list by generation and/or trusted application list.
Described server also comprises:
The malicious operation determination module, for determining malicious operation;
Correspondingly, described generation module is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
The accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, in below describing embodiment, the accompanying drawing of required use is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention;
Fig. 2 is the process flow diagram of the method for a kind of configured list of providing of the embodiment of the present invention;
Fig. 3 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention;
Fig. 4 is the structural representation of a kind of terminal of providing of the embodiment of the present invention;
Fig. 5 is the structural representation of a kind of server of providing of the embodiment of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Fig. 1 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention.The executive agent of this embodiment is terminal, this terminal can be for fixed terminal as PC(Personal Computer, PC) or mobile terminal, this mobile terminal can be smart mobile phone, panel computer, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), PDA(Personal Digital Assistant, personal digital assistant) etc.Referring to Fig. 1, this embodiment comprises:
101, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
102, when described the first application program in described malicious application list, interrupt the startup of described the first application program;
103, when described the first application program in described trusted application list, continue to carry out the startup of described the first application program.
Alternatively, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, comprise before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
Alternatively, described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
Alternatively, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, specifically comprise:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
Alternatively, the malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
The method that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 2 is the process flow diagram of the method for a kind of configured list of providing of the embodiment of the present invention.The executive agent of this embodiment is server, and this server can be ingredient, the individual server of server or the server cluster be comprised of a plurality of servers.Preferably, this server is Cloud Server.Referring to Fig. 2, this embodiment comprises:
201, determine malicious application and/or trusted application;
202, generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
203, the malicious application list of generation and/or trusted application list are sent to terminal.
Alternatively, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprise before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
Fig. 3 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention.The mutual both sides of this embodiment are terminal and server.Referring to Fig. 3, this embodiment specifically comprises:
301, server is determined malicious application and/or trusted application;
In the present embodiment, server determines that malicious application and/or trusted application specifically can comprise following any one or several: (1) receives the report information from the user, the application program provided in report information is provided, the application program provided in determining report information has malicious act, and this application program is defined as to malicious application; The scoring situation of user's application programs and service condition are collected and are gathered, by the higher application program of scoring or in the industry public praise preferably or user's application program commonly used be defined as trusted application.(2) technician is detected the application program spread on internet, when definite this application program spread has malicious act, this application program is defined as to malicious application; The method of determining trusted application can be with consistent in (1).Wherein, report information can be band application program installation kit URL(Uniform Resourse Locator, uniform resource locator) report note, can also be for reporting the report note of application program malicious act, avoided existing user manually to judge whether Malware of software, introduced by server and determined the process of sending out malicious application and trusted application.In addition, for step 301, server can periodically be determined malicious application and/or trusted application, and performs step 302, and the concrete cycle can be arranged or be adjusted by the technician, and the embodiment of the present invention is not specifically limited.
Malicious act described in the embodiment of the present invention includes but not limited to that malice is deducted fees, malice is uploaded the userspersonal information and malice consumes the behaviors such as internal memory, and the embodiment of the present invention is not specifically limited.
It should be noted that, described in the present invention " and/or ", the step 301 of take can be determined separately malicious application as example refers to server, also can determine separately trusted application, can also determine malicious application and trusted application simultaneously, other " and/or " and step 301 in implication similar, do not repeat them here.
302, server generates malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
Wherein, the application information that can comprise this malicious application in this malicious application list, the application information that comprises trusted application in the trusted application list, this application information can include but not limited to application program ID, manufacturer's information and application program description etc.The format sample that following table 1 is the corresponding application information of application A, application name is called A, and application program ID is X, and manufacturer's information is Y, and application program is described as Z.
Table 1
Application name Application program ID Manufacturer's information Application program is described
A X Y Z
It should be noted that, the form that the list of this generation can provide for table 1 of the present invention, certainly, can also have other form, at this, do not repeat one by one.
303, server sends to terminal by the malicious application list of generation and/or trusted application list;
When server generates the malicious application list, the malicious application list of this generation is sent to terminal; When server generates the trusted application list, the trusted application list of this generation is sent to terminal; When both having generated the malicious application list, while having generated again the trusted application list, the malicious application list of generation and trusted application list are sent to terminal.
Server can periodically generate malicious application list and/or trusted application list, and send to terminal, server can also periodically generate malicious application list and/or trusted application list, and sends to terminal when terminal networking, and the present embodiment is not specifically limited.
304, terminal receives malicious application list and/or the trusted application list that described server issues;
It should be noted that, the list of this generation and the blacklist of terminal or white list can be same form, can be also different-format, when the blacklist of the list of this generation and terminal or white list are same form, this list directly can be sent to terminal, when the blacklist of the list of this generation and terminal or white list are different-format, can be changed the form of this list, the list after conversion is sent to terminal, or, list is sent to terminal, by terminal, carry out format conversion.
305, terminal by described malicious application list and trusted application list update to described terminal;
Preferably, terminal by described malicious application list update in the blacklist of described terminal; Terminal by described trusted application list update in the white list of described terminal.The malicious application list that this server issues and trusted application list can be updated in the blacklist and white list of terminal, as, the blacklist of terminal is listA, each application information in the malicious application list is saved to listA, or, the sublist using the malicious application list as blacklist listA; The malicious application list that this server issues and trusted application list can also be as independent list update the respective memory locations to terminal, as, the blacklist of terminal is listA, and this malicious application list is saved as to listB.
306,, when the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
When starting terminal or operation, if the first application program launching, need to determine whether this first application program is the application program in malicious application list and trusted application list, this definite process comprises that application information by the first application program is as index, in malicious application list and trusted application list, searched, and execution corresponding steps, as, the application information of the first application program comprises each information shown in table 1, according to each information shown in table 1, in malicious application list and trusted application list, searched.
During the application information that 307, in described malicious application list, comprises described the first application program, determine that described the first application program, in described malicious application list, performs step 309;
Those skilled in the art can be known, while in described malicious application list, not comprising the application information of described the first application program, can determine that this first application program is no longer in this malicious application list, think and the application program of this first application program for trusting allow it to continue the process started.
During the application information that 308, in described trusted application list, comprises described the first application program, determine that described the first application program, in described trusted application list, performs step 310;
Those skilled in the art can be known, while in described trusted application list, not comprising the application information of described the first application program, can determine that this first application program is not in this trusted application list, also think and the application program of this first application program for trusting allow it to continue the process started.
309, when described the first application program in described malicious application list, terminal is interrupted the startup of described the first application program;
Owing to can determining that the first application program is the malicious application that server configures, can give tacit consent to its start-up course is interrupted processing, avoided the repeatedly bullet frame of user operation is bothered, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low.
310, when described the first application program in described trusted application list, terminal continue to be carried out the startup of described the first application program.
Owing to can determining that the first application program is the trusted application that server configures, can not give tacit consent to and with regard to its start-up course, the user be bothered, and its start-up course is carried out in continuation, avoided the repeatedly bullet frame of user operation is bothered, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low.
Further, in the present embodiment, mentioned malicious application list can also comprise the malicious operation of server configuration, and definite process of definite process of this malicious operation and the malicious application of step 301 in like manner, does not repeat them here.After terminal has been carried out step 305, this embodiment also comprises: when the second application program of terminal is moved, monitor this second application program, during malicious operation in the second application program generation malicious application list, interrupt the operation of this malicious operation or this second application program.The interface function that this monitoring can be called by monitoring application program is realized.Malicious operation described in the embodiment of the present invention includes but not limited to that malice is deducted fees, networked, malice is uploaded the userspersonal information and malice consumes the behaviors such as internal memory, and the embodiment of the present invention is not specifically limited.
The software that cloud server extracts from the malice note with installation kit url report by screening, the software of malicious act report is arranged and automatically detects that the software of finding has malice to deduct fees, malice is uploaded the userspersonal information and software that malice consumes the behavior such as internal memory joins blacklist list, simultaneously by some in the industry public praise better and user's popular software add the white list list to.
The method that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 4 is the structural representation of a kind of terminal of providing of the embodiment of the present invention.This terminal can be for fixed terminal as PC(Personal Computer, PC) or mobile terminal, this mobile terminal can be smart mobile phone, panel computer, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), PDA(Personal DigitalAssistant, personal digital assistant) etc.Referring to Fig. 4, comprising:
Search module 401, for when the first application program launching, search described the first application program in the malicious application list issued at server and trusted application list;
Processing module 402, for working as described the first application program in described malicious application list, interrupt the startup of described the first application program; In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
Alternatively, described terminal also comprises:
Receiver module 403, the malicious application list and the trusted application list that for receiving described server, issue;
Update module 404, for by described malicious application list and trusted application list update to described terminal.
Alternatively, described update module 404 specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
The described module 401 of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
Alternatively, the malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
Monitoring module 405, for when the second application program is moved, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, trigger the operation that described processing module is interrupted described malicious operation or this second application program.
It should be noted that: the terminal that above-described embodiment provides is when application program launching, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and completed by different functional modules as required, the inner structure that is about to terminal is divided into different functional modules, to complete all or part of function described above.In addition, the terminal that above-described embodiment provides and the embodiment of the method for application program launching belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The terminal that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 5 is the structural representation of a kind of server of providing of the embodiment of the present invention.This server can be ingredient, the individual server of server or the server cluster be comprised of a plurality of servers.Preferably, this server is Cloud Server.Referring to Fig. 5, this server comprises:
Application program determination module 501, for determining malicious application and/or trusted application;
Generation module 502, generate malicious application list and/or trusted application list for the malicious application according to definite and/or trusted application;
Sending module 503, send to terminal for the malicious application list by generation and/or trusted application list.
Alternatively, described server also comprises:
Malicious operation determination module 504, for determining malicious operation;
Correspondingly, described generation module 502 is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
It should be noted that: the server that above-described embodiment provides is when the method for configured list, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and completed by different functional modules as required, the inner structure that is about to server is divided into different functional modules, to complete all or part of function described above.In addition, the server that above-described embodiment provides and the embodiment of the method for configured list belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can come the hardware that instruction is relevant to complete by program, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (14)

1. an application program launching method, is characterized in that, described method comprises:
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
In described malicious application list, interrupt the startup of described the first application program when described the first application program;
In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
2. method according to claim 1, is characterized in that, when the first application program launching of terminal, searches described the first application program in the malicious application list issued at server and trusted application list, comprises before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
3. method according to claim 2, is characterized in that, described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
4. method according to claim 1, is characterized in that, when the first application program launching of terminal, searches described the first application program in the malicious application list issued at server and trusted application list, specifically comprises:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
5. method according to claim 2, is characterized in that, the malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
6. the method for a configured list, is characterized in that, comprising:
Determine malicious application and/or trusted application;
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
The malicious application list of generation and/or trusted application list are sent to terminal.
7. method according to claim 6, is characterized in that, according to definite malicious application and/or trusted application, generates malicious application list and/or trusted application list, comprises before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
8. a terminal, is characterized in that, comprising:
Search module, for when the first application program launching, search described the first application program in the malicious application list issued at server and trusted application list;
Processing module, for working as described the first application program in described malicious application list, interrupt the startup of described the first application program; In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
9. terminal according to claim 8, is characterized in that, described terminal also comprises:
Receiver module, the malicious application list and the trusted application list that for receiving described server, issue;
Update module, for by described malicious application list and trusted application list update to described terminal.
10. terminal according to claim 9, is characterized in that, described update module specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
11. terminal according to claim 8, it is characterized in that, the described module of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
12. terminal according to claim 9, is characterized in that, the malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
Monitoring module, for when the second application program is moved, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, trigger the operation that described processing module is interrupted described malicious operation or this second application program.
13. a server, is characterized in that, comprising:
The application program determination module, for determining malicious application and/or trusted application;
Generation module, generate malicious application list and/or trusted application list for the malicious application according to definite and/or trusted application;
Sending module, send to terminal for the malicious application list by generation and/or trusted application list.
14. server according to claim 13, is characterized in that, described server also comprises:
The malicious operation determination module, for determining malicious operation;
Correspondingly, described generation module is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
CN201210148911.XA 2012-05-14 2012-05-14 The method of application program launching method, configured list, terminal and server Active CN103425926B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210148911.XA CN103425926B (en) 2012-05-14 2012-05-14 The method of application program launching method, configured list, terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210148911.XA CN103425926B (en) 2012-05-14 2012-05-14 The method of application program launching method, configured list, terminal and server

Publications (2)

Publication Number Publication Date
CN103425926A true CN103425926A (en) 2013-12-04
CN103425926B CN103425926B (en) 2016-02-24

Family

ID=49650648

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210148911.XA Active CN103425926B (en) 2012-05-14 2012-05-14 The method of application program launching method, configured list, terminal and server

Country Status (1)

Country Link
CN (1) CN103425926B (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202323A (en) * 2014-09-05 2014-12-10 绿网天下(福建)网络科技股份有限公司 Method for controlling application software based on mobile terminal
CN104486510A (en) * 2014-12-16 2015-04-01 上海斐讯数据通信技术有限公司 Method for reducing power consumption of intelligent terminal, and system for reducing power consumption of intelligent terminal
CN104573489A (en) * 2015-01-19 2015-04-29 北京奇虎科技有限公司 Method and device for forbidding application to establish desktop icon
CN104765629A (en) * 2015-03-24 2015-07-08 广东欧珀移动通信有限公司 System application installation method and device
CN105094280A (en) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 Method, apparatus and system for improving standby performance of intelligent terminal
CN105094279A (en) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 Method, apparatus and system for improving standby performance of intelligent terminal
CN105335197A (en) * 2015-11-12 2016-02-17 珠海市君天电子科技有限公司 Starting control method and device for application program in terminal
CN105610922A (en) * 2015-12-23 2016-05-25 深圳Tcl数字技术有限公司 Application list synchronizing method and display terminal
CN105718809A (en) * 2016-01-15 2016-06-29 珠海格力电器股份有限公司 Mobile communication terminal, data security monitoring method and device thereof
CN106126327A (en) * 2016-06-22 2016-11-16 广东欧珀移动通信有限公司 The control method of a kind of application program launching and control device
WO2017024821A1 (en) * 2015-08-07 2017-02-16 中兴通讯股份有限公司 Application processing method, mobile terminal, and computer-readable storage medium
CN106503555A (en) * 2016-10-21 2017-03-15 维沃移动通信有限公司 A kind of method for ensureing safety of payment and mobile terminal
CN106778331A (en) * 2016-11-29 2017-05-31 广东电网有限责任公司信息中心 A kind of monitoring method of application program, apparatus and system
CN107229860A (en) * 2016-03-24 2017-10-03 中国电子科技集团公司电子科学研究院 The method and system of safety management desktop application in environment is concentrated
CN107392012A (en) * 2017-07-25 2017-11-24 广州平云信息科技有限公司 Application method for managing and monitoring, device and the mobile device of mobile device
CN107885588A (en) * 2017-11-21 2018-04-06 广东欧珀移动通信有限公司 Control method, device and the storage medium and mobile terminal of application service
CN108229169A (en) * 2018-01-15 2018-06-29 郑州云海信息技术有限公司 Newly-increased host security defense method and device based on management platform
CN108256312A (en) * 2018-01-19 2018-07-06 广东欧珀移动通信有限公司 Webpage opens the method, device and mobile terminal of local application
WO2018132940A1 (en) * 2017-01-17 2018-07-26 廖建强 Starting method and terminal
CN109657468A (en) * 2018-11-29 2019-04-19 北京奇虎科技有限公司 Virus behavior detection method, device and computer readable storage medium
CN109711144A (en) * 2018-12-24 2019-05-03 广州微算互联信息技术有限公司 Cloud mobile phone applies black, white list management method
CN110443050A (en) * 2019-07-26 2019-11-12 武汉天喻软件股份有限公司 A kind of processing method and system of forgery process in file transparent encrypting and deciphering system
CN110471706A (en) * 2014-06-10 2019-11-19 富士施乐株式会社 Electronic equipment and information processing method
CN110543339A (en) * 2019-08-09 2019-12-06 五八有限公司 Method and device for managing applet skip, electronic equipment and storage medium
CN113360894A (en) * 2021-06-01 2021-09-07 北京天空卫士网络安全技术有限公司 User behavior recording method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924761A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 Method for detecting malicious program according to white list
CN102231745A (en) * 2011-07-08 2011-11-02 盛大计算机(上海)有限公司 Safety system and method for network application
CN102299918A (en) * 2011-07-08 2011-12-28 盛大计算机(上海)有限公司 Network transaction safety system and method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924761A (en) * 2010-08-18 2010-12-22 奇智软件(北京)有限公司 Method for detecting malicious program according to white list
CN102231745A (en) * 2011-07-08 2011-11-02 盛大计算机(上海)有限公司 Safety system and method for network application
CN102299918A (en) * 2011-07-08 2011-12-28 盛大计算机(上海)有限公司 Network transaction safety system and method thereof

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110471706A (en) * 2014-06-10 2019-11-19 富士施乐株式会社 Electronic equipment and information processing method
CN110471706B (en) * 2014-06-10 2023-03-24 富士胶片商业创新有限公司 Electronic device and information processing method
CN104202323A (en) * 2014-09-05 2014-12-10 绿网天下(福建)网络科技股份有限公司 Method for controlling application software based on mobile terminal
CN104486510A (en) * 2014-12-16 2015-04-01 上海斐讯数据通信技术有限公司 Method for reducing power consumption of intelligent terminal, and system for reducing power consumption of intelligent terminal
CN104573489A (en) * 2015-01-19 2015-04-29 北京奇虎科技有限公司 Method and device for forbidding application to establish desktop icon
CN104765629A (en) * 2015-03-24 2015-07-08 广东欧珀移动通信有限公司 System application installation method and device
CN105094280A (en) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 Method, apparatus and system for improving standby performance of intelligent terminal
CN105094279A (en) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 Method, apparatus and system for improving standby performance of intelligent terminal
WO2017024821A1 (en) * 2015-08-07 2017-02-16 中兴通讯股份有限公司 Application processing method, mobile terminal, and computer-readable storage medium
CN105335197B (en) * 2015-11-12 2019-02-12 珠海豹趣科技有限公司 The starting control method and device of application program in terminal
CN105335197A (en) * 2015-11-12 2016-02-17 珠海市君天电子科技有限公司 Starting control method and device for application program in terminal
CN105610922B (en) * 2015-12-23 2018-11-16 深圳Tcl数字技术有限公司 List of application synchronous method and display terminal
WO2017107393A1 (en) * 2015-12-23 2017-06-29 深圳Tcl数字技术有限公司 Application list synchronization method and display terminal
CN105610922A (en) * 2015-12-23 2016-05-25 深圳Tcl数字技术有限公司 Application list synchronizing method and display terminal
CN105718809A (en) * 2016-01-15 2016-06-29 珠海格力电器股份有限公司 Mobile communication terminal, data security monitoring method and device thereof
CN107229860A (en) * 2016-03-24 2017-10-03 中国电子科技集团公司电子科学研究院 The method and system of safety management desktop application in environment is concentrated
CN106126327B (en) * 2016-06-22 2019-05-03 Oppo广东移动通信有限公司 A kind of control method and control device of application program launching
CN106126327A (en) * 2016-06-22 2016-11-16 广东欧珀移动通信有限公司 The control method of a kind of application program launching and control device
CN106503555A (en) * 2016-10-21 2017-03-15 维沃移动通信有限公司 A kind of method for ensureing safety of payment and mobile terminal
CN106778331A (en) * 2016-11-29 2017-05-31 广东电网有限责任公司信息中心 A kind of monitoring method of application program, apparatus and system
WO2018132940A1 (en) * 2017-01-17 2018-07-26 廖建强 Starting method and terminal
CN107392012A (en) * 2017-07-25 2017-11-24 广州平云信息科技有限公司 Application method for managing and monitoring, device and the mobile device of mobile device
CN107885588A (en) * 2017-11-21 2018-04-06 广东欧珀移动通信有限公司 Control method, device and the storage medium and mobile terminal of application service
CN108229169A (en) * 2018-01-15 2018-06-29 郑州云海信息技术有限公司 Newly-increased host security defense method and device based on management platform
CN108256312A (en) * 2018-01-19 2018-07-06 广东欧珀移动通信有限公司 Webpage opens the method, device and mobile terminal of local application
CN108256312B (en) * 2018-01-19 2020-11-27 Oppo广东移动通信有限公司 Method and device for opening local application program on webpage and mobile terminal
CN109657468A (en) * 2018-11-29 2019-04-19 北京奇虎科技有限公司 Virus behavior detection method, device and computer readable storage medium
CN109711144A (en) * 2018-12-24 2019-05-03 广州微算互联信息技术有限公司 Cloud mobile phone applies black, white list management method
CN110443050A (en) * 2019-07-26 2019-11-12 武汉天喻软件股份有限公司 A kind of processing method and system of forgery process in file transparent encrypting and deciphering system
CN110443050B (en) * 2019-07-26 2021-02-09 武汉天喻软件股份有限公司 Method and system for processing counterfeit process in file transparent encryption and decryption system
CN110543339A (en) * 2019-08-09 2019-12-06 五八有限公司 Method and device for managing applet skip, electronic equipment and storage medium
CN113360894A (en) * 2021-06-01 2021-09-07 北京天空卫士网络安全技术有限公司 User behavior recording method and device

Also Published As

Publication number Publication date
CN103425926B (en) 2016-02-24

Similar Documents

Publication Publication Date Title
CN103425926B (en) The method of application program launching method, configured list, terminal and server
CN110493858B (en) Method and device for reducing power consumption and mobile terminal
US20110191764A1 (en) Systems, methods, and apparatuses for facilitating distribution of firmware updates
JP6389319B2 (en) Roaming network access method and apparatus
CN104768123A (en) Bluetooth connection method, device and system
CN105554522A (en) Method for playing audio in group, server and terminal
CN104572819A (en) Clearing method and system for junk data
CN106888495B (en) Network access method and terminal
CN103607431B (en) Mobile terminal resource processing method, device and equipment
CN105530239A (en) Multimedia data obtaining method and device
CN105045596A (en) Plug-in calling method and apparatus
WO2019184009A1 (en) Network access method and terminal device
CN104133693B (en) Installment state detection method, device and terminal
CN108600949A (en) Choosing method, device and the mobile terminal of MIPI frequency points
CN112269842A (en) Information processing method and device, storage medium and computer equipment
CN105550316A (en) Pushing method and device of audio list
CN105025064A (en) Method, device and system for downloading files
CN109275125B (en) Resource sharing method, device, equipment and storage medium
CN105487637A (en) Radio-frequency link control method and apparatus
CN105872775A (en) Silent uninstalling method and device for smart cloud TV application
CN105162670A (en) Routing device connecting method and apparatus
CN113065083B (en) Page processing method and device, electronic equipment and storage medium
CN107852598B (en) Circumventing wireless device spatial tracking based on wireless device identifiers
CN105049476B (en) The startup method and terminal of a kind of audio frequency apparatus
CN108804926B (en) Universal Web application vulnerability detection and repair method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190730

Address after: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right