CN103425926A - Application program starting method, list configuring method, terminal and server - Google Patents
Application program starting method, list configuring method, terminal and server Download PDFInfo
- Publication number
- CN103425926A CN103425926A CN201210148911XA CN201210148911A CN103425926A CN 103425926 A CN103425926 A CN 103425926A CN 201210148911X A CN201210148911X A CN 201210148911XA CN 201210148911 A CN201210148911 A CN 201210148911A CN 103425926 A CN103425926 A CN 103425926A
- Authority
- CN
- China
- Prior art keywords
- application
- malicious
- list
- application program
- trusted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses an application program starting method, a list configuring method, a terminal and a server, and belongs to the field of mobile terminals. The application program starting method includes when a first application program of the terminal is started, searching the first application program in a malicious application program list and a trusted application program list both issued by the server; when the first application program is in the malicious application program list, interrupting starting of the first application program; when the first application program is in the trusted application program list, continuing to execute starting of the first application program. The list configuring method includes determining malicious application programs and/or trusted application programs, generating the malicious application program list and/or the trusted application program list according to the determined malicious application programs and/or the trusted application programs, and sending the generated malicious application program list and/or the trusted application program list to the terminal. The process of inquiring by pop-up frames is simplified, and accuracy of determining of the malicious application programs is improved.
Description
Technical field
The present invention relates to field of mobile terminals, particularly a kind of method of application program launching method, configured list, terminal and server.
Background technology
Development along with mobile terminal, can install and move simultaneously a plurality of application programs on same mobile terminal, and may there is malicious application in the plurality of application program, malicious application can the oneself start, networking, committed memory, the operation such as even illegally deduct fees, destroy the normal use of mobile terminal, in order to prevent that malicious application is to the normal interference of using of mobile terminal, conventional method is to set up blacklist and white list at mobile terminal, malicious application is joined to the mobile terminal blacklist list, and the application program of trust is joined to the list of mobile terminal white list, application program operation in blacklist list can be closed or limit, such as startup, networking and starting up, application program operation in the white list list will be allowed by acquiescence.
In realizing process of the present invention, the inventor finds that at least there is following problem in prior art:
In prior art when starting application program, can play frame and once point out whether allow aforesaid operations, thereafter bullet once allows the user determine whether add black and white lists again, two shortcomings are arranged like this: one, give the user by the decision of whether putting into black and white lists, need user's application programs that certain understanding is arranged, otherwise easily add malicious application to white list, cause the losses such as flow telephone expenses or internal memory, otherwise, if add application program commonly used to blacklist, also can cause the follow-up use of user to bring inconvenience, if add application program commonly used to blacklist, also likely the normal operation of other application programs is impacted, therefore, prior art determines that the accuracy of malicious application is low, the normal operation of the process meeting interfering mobile terminal of two, twice inquiry bullet frames, process is loaded down with trivial details.
Summary of the invention
In order to improve the accuracy of determining malicious application, simplify the process that plays the frame inquiry, the embodiment of the present invention provides method, terminal and the server of a kind of application program launching method, configured list.Described technical scheme is as follows:
A kind of application program launching method, described method comprises:
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
In described malicious application list, interrupt the startup of described the first application program when described the first application program;
In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, comprise before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
Described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, specifically comprise:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
The malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
A kind of method of configured list comprises:
Determine malicious application and/or trusted application;
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
The malicious application list of generation and/or trusted application list are sent to terminal.
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application, comprise before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
A kind of terminal comprises:
Search module, for when the first application program launching, search described the first application program in the malicious application list issued at server and trusted application list;
Processing module, for working as described the first application program in described malicious application list, interrupt the startup of described the first application program; In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
Described terminal also comprises:
Receiver module, the malicious application list and the trusted application list that for receiving described server, issue;
Update module, for by described malicious application list and trusted application list update to described terminal.
Described update module specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
The described module of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
The malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
Monitoring module, for when the second application program is moved, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, trigger the operation that described processing module is interrupted described malicious operation or this second application program.
A kind of server comprises:
The application program determination module, for determining malicious application and/or trusted application;
Generation module, generate malicious application list and/or trusted application list for the malicious application according to definite and/or trusted application;
Sending module, send to terminal for the malicious application list by generation and/or trusted application list.
Described server also comprises:
The malicious operation determination module, for determining malicious operation;
Correspondingly, described generation module is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
The accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, in below describing embodiment, the accompanying drawing of required use is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention;
Fig. 2 is the process flow diagram of the method for a kind of configured list of providing of the embodiment of the present invention;
Fig. 3 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention;
Fig. 4 is the structural representation of a kind of terminal of providing of the embodiment of the present invention;
Fig. 5 is the structural representation of a kind of server of providing of the embodiment of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Fig. 1 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention.The executive agent of this embodiment is terminal, this terminal can be for fixed terminal as PC(Personal Computer, PC) or mobile terminal, this mobile terminal can be smart mobile phone, panel computer, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), PDA(Personal Digital Assistant, personal digital assistant) etc.Referring to Fig. 1, this embodiment comprises:
101, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
102, when described the first application program in described malicious application list, interrupt the startup of described the first application program;
103, when described the first application program in described trusted application list, continue to carry out the startup of described the first application program.
Alternatively, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, comprise before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
Alternatively, described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
Alternatively, when the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list, specifically comprise:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
Alternatively, the malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
The method that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 2 is the process flow diagram of the method for a kind of configured list of providing of the embodiment of the present invention.The executive agent of this embodiment is server, and this server can be ingredient, the individual server of server or the server cluster be comprised of a plurality of servers.Preferably, this server is Cloud Server.Referring to Fig. 2, this embodiment comprises:
201, determine malicious application and/or trusted application;
202, generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
203, the malicious application list of generation and/or trusted application list are sent to terminal.
Alternatively, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprise before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
Fig. 3 is the process flow diagram of a kind of application program launching method of providing of the embodiment of the present invention.The mutual both sides of this embodiment are terminal and server.Referring to Fig. 3, this embodiment specifically comprises:
301, server is determined malicious application and/or trusted application;
In the present embodiment, server determines that malicious application and/or trusted application specifically can comprise following any one or several: (1) receives the report information from the user, the application program provided in report information is provided, the application program provided in determining report information has malicious act, and this application program is defined as to malicious application; The scoring situation of user's application programs and service condition are collected and are gathered, by the higher application program of scoring or in the industry public praise preferably or user's application program commonly used be defined as trusted application.(2) technician is detected the application program spread on internet, when definite this application program spread has malicious act, this application program is defined as to malicious application; The method of determining trusted application can be with consistent in (1).Wherein, report information can be band application program installation kit URL(Uniform Resourse Locator, uniform resource locator) report note, can also be for reporting the report note of application program malicious act, avoided existing user manually to judge whether Malware of software, introduced by server and determined the process of sending out malicious application and trusted application.In addition, for step 301, server can periodically be determined malicious application and/or trusted application, and performs step 302, and the concrete cycle can be arranged or be adjusted by the technician, and the embodiment of the present invention is not specifically limited.
Malicious act described in the embodiment of the present invention includes but not limited to that malice is deducted fees, malice is uploaded the userspersonal information and malice consumes the behaviors such as internal memory, and the embodiment of the present invention is not specifically limited.
It should be noted that, described in the present invention " and/or ", the step 301 of take can be determined separately malicious application as example refers to server, also can determine separately trusted application, can also determine malicious application and trusted application simultaneously, other " and/or " and step 301 in implication similar, do not repeat them here.
302, server generates malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
Wherein, the application information that can comprise this malicious application in this malicious application list, the application information that comprises trusted application in the trusted application list, this application information can include but not limited to application program ID, manufacturer's information and application program description etc.The format sample that following table 1 is the corresponding application information of application A, application name is called A, and application program ID is X, and manufacturer's information is Y, and application program is described as Z.
Table 1
Application name | Application program ID | Manufacturer's information | Application program is described |
A | X | Y | Z |
It should be noted that, the form that the list of this generation can provide for table 1 of the present invention, certainly, can also have other form, at this, do not repeat one by one.
303, server sends to terminal by the malicious application list of generation and/or trusted application list;
When server generates the malicious application list, the malicious application list of this generation is sent to terminal; When server generates the trusted application list, the trusted application list of this generation is sent to terminal; When both having generated the malicious application list, while having generated again the trusted application list, the malicious application list of generation and trusted application list are sent to terminal.
Server can periodically generate malicious application list and/or trusted application list, and send to terminal, server can also periodically generate malicious application list and/or trusted application list, and sends to terminal when terminal networking, and the present embodiment is not specifically limited.
304, terminal receives malicious application list and/or the trusted application list that described server issues;
It should be noted that, the list of this generation and the blacklist of terminal or white list can be same form, can be also different-format, when the blacklist of the list of this generation and terminal or white list are same form, this list directly can be sent to terminal, when the blacklist of the list of this generation and terminal or white list are different-format, can be changed the form of this list, the list after conversion is sent to terminal, or, list is sent to terminal, by terminal, carry out format conversion.
305, terminal by described malicious application list and trusted application list update to described terminal;
Preferably, terminal by described malicious application list update in the blacklist of described terminal; Terminal by described trusted application list update in the white list of described terminal.The malicious application list that this server issues and trusted application list can be updated in the blacklist and white list of terminal, as, the blacklist of terminal is listA, each application information in the malicious application list is saved to listA, or, the sublist using the malicious application list as blacklist listA; The malicious application list that this server issues and trusted application list can also be as independent list update the respective memory locations to terminal, as, the blacklist of terminal is listA, and this malicious application list is saved as to listB.
306,, when the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
When starting terminal or operation, if the first application program launching, need to determine whether this first application program is the application program in malicious application list and trusted application list, this definite process comprises that application information by the first application program is as index, in malicious application list and trusted application list, searched, and execution corresponding steps, as, the application information of the first application program comprises each information shown in table 1, according to each information shown in table 1, in malicious application list and trusted application list, searched.
During the application information that 307, in described malicious application list, comprises described the first application program, determine that described the first application program, in described malicious application list, performs step 309;
Those skilled in the art can be known, while in described malicious application list, not comprising the application information of described the first application program, can determine that this first application program is no longer in this malicious application list, think and the application program of this first application program for trusting allow it to continue the process started.
During the application information that 308, in described trusted application list, comprises described the first application program, determine that described the first application program, in described trusted application list, performs step 310;
Those skilled in the art can be known, while in described trusted application list, not comprising the application information of described the first application program, can determine that this first application program is not in this trusted application list, also think and the application program of this first application program for trusting allow it to continue the process started.
309, when described the first application program in described malicious application list, terminal is interrupted the startup of described the first application program;
Owing to can determining that the first application program is the malicious application that server configures, can give tacit consent to its start-up course is interrupted processing, avoided the repeatedly bullet frame of user operation is bothered, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low.
310, when described the first application program in described trusted application list, terminal continue to be carried out the startup of described the first application program.
Owing to can determining that the first application program is the trusted application that server configures, can not give tacit consent to and with regard to its start-up course, the user be bothered, and its start-up course is carried out in continuation, avoided the repeatedly bullet frame of user operation is bothered, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low.
Further, in the present embodiment, mentioned malicious application list can also comprise the malicious operation of server configuration, and definite process of definite process of this malicious operation and the malicious application of step 301 in like manner, does not repeat them here.After terminal has been carried out step 305, this embodiment also comprises: when the second application program of terminal is moved, monitor this second application program, during malicious operation in the second application program generation malicious application list, interrupt the operation of this malicious operation or this second application program.The interface function that this monitoring can be called by monitoring application program is realized.Malicious operation described in the embodiment of the present invention includes but not limited to that malice is deducted fees, networked, malice is uploaded the userspersonal information and malice consumes the behaviors such as internal memory, and the embodiment of the present invention is not specifically limited.
The software that cloud server extracts from the malice note with installation kit url report by screening, the software of malicious act report is arranged and automatically detects that the software of finding has malice to deduct fees, malice is uploaded the userspersonal information and software that malice consumes the behavior such as internal memory joins blacklist list, simultaneously by some in the industry public praise better and user's popular software add the white list list to.
The method that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 4 is the structural representation of a kind of terminal of providing of the embodiment of the present invention.This terminal can be for fixed terminal as PC(Personal Computer, PC) or mobile terminal, this mobile terminal can be smart mobile phone, panel computer, MP3(Moving Picture Experts Group Audio Layer III, dynamic image expert compression standard audio frequency aspect 3), PDA(Personal DigitalAssistant, personal digital assistant) etc.Referring to Fig. 4, comprising:
Alternatively, described terminal also comprises:
Alternatively, described update module 404 specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
The described module 401 of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
Alternatively, the malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
It should be noted that: the terminal that above-described embodiment provides is when application program launching, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and completed by different functional modules as required, the inner structure that is about to terminal is divided into different functional modules, to complete all or part of function described above.In addition, the terminal that above-described embodiment provides and the embodiment of the method for application program launching belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The terminal that the present embodiment provides, by issued malicious application list and trusted application list by server, make terminal when application program launching is arranged, can search this application program in malicious application list and trusted application list, if application program is in described malicious application list, in the situation that interference user not, the startup of interrupted application program, if application program is in the trusted application list, the user is not carried and stated or play the frame inquiry, not only simplified the process that plays the frame inquiry, and can avoid the user to lack the situations such as the accuracy of maloperation that application program knowledge causes and malicious application is low, improved the accuracy of definite malicious application.
Fig. 5 is the structural representation of a kind of server of providing of the embodiment of the present invention.This server can be ingredient, the individual server of server or the server cluster be comprised of a plurality of servers.Preferably, this server is Cloud Server.Referring to Fig. 5, this server comprises:
Application program determination module 501, for determining malicious application and/or trusted application;
Sending module 503, send to terminal for the malicious application list by generation and/or trusted application list.
Alternatively, described server also comprises:
Malicious operation determination module 504, for determining malicious operation;
Correspondingly, described generation module 502 is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
It should be noted that: the server that above-described embodiment provides is when the method for configured list, only the division with above-mentioned each functional module is illustrated, in practical application, can above-mentioned functions be distributed and completed by different functional modules as required, the inner structure that is about to server is divided into different functional modules, to complete all or part of function described above.In addition, the server that above-described embodiment provides and the embodiment of the method for configured list belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can come the hardware that instruction is relevant to complete by program, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (14)
1. an application program launching method, is characterized in that, described method comprises:
When the first application program launching of terminal, search described the first application program in the malicious application list issued at server and trusted application list;
In described malicious application list, interrupt the startup of described the first application program when described the first application program;
In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
2. method according to claim 1, is characterized in that, when the first application program launching of terminal, searches described the first application program in the malicious application list issued at server and trusted application list, comprises before:
Receive malicious application list and trusted application list that described server issues;
By described malicious application list and trusted application list update to described terminal.
3. method according to claim 2, is characterized in that, described malicious application list and trusted application list update, to described terminal, are specifically comprised:
By described malicious application list update in the blacklist of described terminal;
By described trusted application list update in the white list of described terminal.
4. method according to claim 1, is characterized in that, when the first application program launching of terminal, searches described the first application program in the malicious application list issued at server and trusted application list, specifically comprises:
When the first application program launching of terminal, search the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list;
During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list;
During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
5. method according to claim 2, is characterized in that, the malicious application list that described server issues also comprises malicious operation, by described malicious application list and trusted application list update to described terminal, comprise afterwards:
When the second application program operation, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, interrupt the operation of described malicious operation or this second application program.
6. the method for a configured list, is characterized in that, comprising:
Determine malicious application and/or trusted application;
Generate malicious application list and/or trusted application list according to definite malicious application and/or trusted application;
The malicious application list of generation and/or trusted application list are sent to terminal.
7. method according to claim 6, is characterized in that, according to definite malicious application and/or trusted application, generates malicious application list and/or trusted application list, comprises before:
Determine malicious operation;
Correspondingly, according to definite malicious application and/or trusted application, generate malicious application list and/or trusted application list, comprising:
Follow according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
8. a terminal, is characterized in that, comprising:
Search module, for when the first application program launching, search described the first application program in the malicious application list issued at server and trusted application list;
Processing module, for working as described the first application program in described malicious application list, interrupt the startup of described the first application program; In described trusted application list, continue to carry out the startup of described the first application program when described the first application program.
9. terminal according to claim 8, is characterized in that, described terminal also comprises:
Receiver module, the malicious application list and the trusted application list that for receiving described server, issue;
Update module, for by described malicious application list and trusted application list update to described terminal.
10. terminal according to claim 9, is characterized in that, described update module specifically for by described malicious application list update in the blacklist of described terminal; By described trusted application list update in the white list of described terminal.
11. terminal according to claim 8, it is characterized in that, the described module of searching is specifically for when the first application program launching, searches the application information of described the first application program in the malicious application list issued at server according to the application information of described the first application program and trusted application list; During the application information that comprises described the first application program in described malicious application list, determine that described the first application program is in described malicious application list; During the application information that comprises described the first application program in described trusted application list, determine that described the first application program is in described trusted application list.
12. terminal according to claim 9, is characterized in that, the malicious application list that described server issues also comprises malicious operation, and described terminal also comprises:
Monitoring module, for when the second application program is moved, monitor described the second application program, when the malicious operation in described malicious application list occurs the second application program, trigger the operation that described processing module is interrupted described malicious operation or this second application program.
13. a server, is characterized in that, comprising:
The application program determination module, for determining malicious application and/or trusted application;
Generation module, generate malicious application list and/or trusted application list for the malicious application according to definite and/or trusted application;
Sending module, send to terminal for the malicious application list by generation and/or trusted application list.
14. server according to claim 13, is characterized in that, described server also comprises:
The malicious operation determination module, for determining malicious operation;
Correspondingly, described generation module is specifically for following according to definite malicious application and/or trusted application and/or malicious operation generation malicious application list and/or trusted application list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210148911.XA CN103425926B (en) | 2012-05-14 | 2012-05-14 | The method of application program launching method, configured list, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210148911.XA CN103425926B (en) | 2012-05-14 | 2012-05-14 | The method of application program launching method, configured list, terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103425926A true CN103425926A (en) | 2013-12-04 |
CN103425926B CN103425926B (en) | 2016-02-24 |
Family
ID=49650648
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210148911.XA Active CN103425926B (en) | 2012-05-14 | 2012-05-14 | The method of application program launching method, configured list, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103425926B (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104202323A (en) * | 2014-09-05 | 2014-12-10 | 绿网天下(福建)网络科技股份有限公司 | Method for controlling application software based on mobile terminal |
CN104486510A (en) * | 2014-12-16 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Method for reducing power consumption of intelligent terminal, and system for reducing power consumption of intelligent terminal |
CN104573489A (en) * | 2015-01-19 | 2015-04-29 | 北京奇虎科技有限公司 | Method and device for forbidding application to establish desktop icon |
CN104765629A (en) * | 2015-03-24 | 2015-07-08 | 广东欧珀移动通信有限公司 | System application installation method and device |
CN105094280A (en) * | 2015-07-07 | 2015-11-25 | 北京奇虎科技有限公司 | Method, apparatus and system for improving standby performance of intelligent terminal |
CN105094279A (en) * | 2015-07-07 | 2015-11-25 | 北京奇虎科技有限公司 | Method, apparatus and system for improving standby performance of intelligent terminal |
CN105335197A (en) * | 2015-11-12 | 2016-02-17 | 珠海市君天电子科技有限公司 | Starting control method and device for application program in terminal |
CN105610922A (en) * | 2015-12-23 | 2016-05-25 | 深圳Tcl数字技术有限公司 | Application list synchronizing method and display terminal |
CN105718809A (en) * | 2016-01-15 | 2016-06-29 | 珠海格力电器股份有限公司 | Mobile communication terminal, data security monitoring method and device thereof |
CN106126327A (en) * | 2016-06-22 | 2016-11-16 | 广东欧珀移动通信有限公司 | The control method of a kind of application program launching and control device |
WO2017024821A1 (en) * | 2015-08-07 | 2017-02-16 | 中兴通讯股份有限公司 | Application processing method, mobile terminal, and computer-readable storage medium |
CN106503555A (en) * | 2016-10-21 | 2017-03-15 | 维沃移动通信有限公司 | A kind of method for ensureing safety of payment and mobile terminal |
CN106778331A (en) * | 2016-11-29 | 2017-05-31 | 广东电网有限责任公司信息中心 | A kind of monitoring method of application program, apparatus and system |
CN107229860A (en) * | 2016-03-24 | 2017-10-03 | 中国电子科技集团公司电子科学研究院 | The method and system of safety management desktop application in environment is concentrated |
CN107392012A (en) * | 2017-07-25 | 2017-11-24 | 广州平云信息科技有限公司 | Application method for managing and monitoring, device and the mobile device of mobile device |
CN107885588A (en) * | 2017-11-21 | 2018-04-06 | 广东欧珀移动通信有限公司 | Control method, device and the storage medium and mobile terminal of application service |
CN108229169A (en) * | 2018-01-15 | 2018-06-29 | 郑州云海信息技术有限公司 | Newly-increased host security defense method and device based on management platform |
CN108256312A (en) * | 2018-01-19 | 2018-07-06 | 广东欧珀移动通信有限公司 | Webpage opens the method, device and mobile terminal of local application |
WO2018132940A1 (en) * | 2017-01-17 | 2018-07-26 | 廖建强 | Starting method and terminal |
CN109657468A (en) * | 2018-11-29 | 2019-04-19 | 北京奇虎科技有限公司 | Virus behavior detection method, device and computer readable storage medium |
CN109711144A (en) * | 2018-12-24 | 2019-05-03 | 广州微算互联信息技术有限公司 | Cloud mobile phone applies black, white list management method |
CN110443050A (en) * | 2019-07-26 | 2019-11-12 | 武汉天喻软件股份有限公司 | A kind of processing method and system of forgery process in file transparent encrypting and deciphering system |
CN110471706A (en) * | 2014-06-10 | 2019-11-19 | 富士施乐株式会社 | Electronic equipment and information processing method |
CN110543339A (en) * | 2019-08-09 | 2019-12-06 | 五八有限公司 | Method and device for managing applet skip, electronic equipment and storage medium |
CN113360894A (en) * | 2021-06-01 | 2021-09-07 | 北京天空卫士网络安全技术有限公司 | User behavior recording method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924761A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Method for detecting malicious program according to white list |
CN102231745A (en) * | 2011-07-08 | 2011-11-02 | 盛大计算机(上海)有限公司 | Safety system and method for network application |
CN102299918A (en) * | 2011-07-08 | 2011-12-28 | 盛大计算机(上海)有限公司 | Network transaction safety system and method thereof |
-
2012
- 2012-05-14 CN CN201210148911.XA patent/CN103425926B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101924761A (en) * | 2010-08-18 | 2010-12-22 | 奇智软件(北京)有限公司 | Method for detecting malicious program according to white list |
CN102231745A (en) * | 2011-07-08 | 2011-11-02 | 盛大计算机(上海)有限公司 | Safety system and method for network application |
CN102299918A (en) * | 2011-07-08 | 2011-12-28 | 盛大计算机(上海)有限公司 | Network transaction safety system and method thereof |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110471706A (en) * | 2014-06-10 | 2019-11-19 | 富士施乐株式会社 | Electronic equipment and information processing method |
CN110471706B (en) * | 2014-06-10 | 2023-03-24 | 富士胶片商业创新有限公司 | Electronic device and information processing method |
CN104202323A (en) * | 2014-09-05 | 2014-12-10 | 绿网天下(福建)网络科技股份有限公司 | Method for controlling application software based on mobile terminal |
CN104486510A (en) * | 2014-12-16 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Method for reducing power consumption of intelligent terminal, and system for reducing power consumption of intelligent terminal |
CN104573489A (en) * | 2015-01-19 | 2015-04-29 | 北京奇虎科技有限公司 | Method and device for forbidding application to establish desktop icon |
CN104765629A (en) * | 2015-03-24 | 2015-07-08 | 广东欧珀移动通信有限公司 | System application installation method and device |
CN105094280A (en) * | 2015-07-07 | 2015-11-25 | 北京奇虎科技有限公司 | Method, apparatus and system for improving standby performance of intelligent terminal |
CN105094279A (en) * | 2015-07-07 | 2015-11-25 | 北京奇虎科技有限公司 | Method, apparatus and system for improving standby performance of intelligent terminal |
WO2017024821A1 (en) * | 2015-08-07 | 2017-02-16 | 中兴通讯股份有限公司 | Application processing method, mobile terminal, and computer-readable storage medium |
CN105335197B (en) * | 2015-11-12 | 2019-02-12 | 珠海豹趣科技有限公司 | The starting control method and device of application program in terminal |
CN105335197A (en) * | 2015-11-12 | 2016-02-17 | 珠海市君天电子科技有限公司 | Starting control method and device for application program in terminal |
CN105610922B (en) * | 2015-12-23 | 2018-11-16 | 深圳Tcl数字技术有限公司 | List of application synchronous method and display terminal |
WO2017107393A1 (en) * | 2015-12-23 | 2017-06-29 | 深圳Tcl数字技术有限公司 | Application list synchronization method and display terminal |
CN105610922A (en) * | 2015-12-23 | 2016-05-25 | 深圳Tcl数字技术有限公司 | Application list synchronizing method and display terminal |
CN105718809A (en) * | 2016-01-15 | 2016-06-29 | 珠海格力电器股份有限公司 | Mobile communication terminal, data security monitoring method and device thereof |
CN107229860A (en) * | 2016-03-24 | 2017-10-03 | 中国电子科技集团公司电子科学研究院 | The method and system of safety management desktop application in environment is concentrated |
CN106126327B (en) * | 2016-06-22 | 2019-05-03 | Oppo广东移动通信有限公司 | A kind of control method and control device of application program launching |
CN106126327A (en) * | 2016-06-22 | 2016-11-16 | 广东欧珀移动通信有限公司 | The control method of a kind of application program launching and control device |
CN106503555A (en) * | 2016-10-21 | 2017-03-15 | 维沃移动通信有限公司 | A kind of method for ensureing safety of payment and mobile terminal |
CN106778331A (en) * | 2016-11-29 | 2017-05-31 | 广东电网有限责任公司信息中心 | A kind of monitoring method of application program, apparatus and system |
WO2018132940A1 (en) * | 2017-01-17 | 2018-07-26 | 廖建强 | Starting method and terminal |
CN107392012A (en) * | 2017-07-25 | 2017-11-24 | 广州平云信息科技有限公司 | Application method for managing and monitoring, device and the mobile device of mobile device |
CN107885588A (en) * | 2017-11-21 | 2018-04-06 | 广东欧珀移动通信有限公司 | Control method, device and the storage medium and mobile terminal of application service |
CN108229169A (en) * | 2018-01-15 | 2018-06-29 | 郑州云海信息技术有限公司 | Newly-increased host security defense method and device based on management platform |
CN108256312A (en) * | 2018-01-19 | 2018-07-06 | 广东欧珀移动通信有限公司 | Webpage opens the method, device and mobile terminal of local application |
CN108256312B (en) * | 2018-01-19 | 2020-11-27 | Oppo广东移动通信有限公司 | Method and device for opening local application program on webpage and mobile terminal |
CN109657468A (en) * | 2018-11-29 | 2019-04-19 | 北京奇虎科技有限公司 | Virus behavior detection method, device and computer readable storage medium |
CN109711144A (en) * | 2018-12-24 | 2019-05-03 | 广州微算互联信息技术有限公司 | Cloud mobile phone applies black, white list management method |
CN110443050A (en) * | 2019-07-26 | 2019-11-12 | 武汉天喻软件股份有限公司 | A kind of processing method and system of forgery process in file transparent encrypting and deciphering system |
CN110443050B (en) * | 2019-07-26 | 2021-02-09 | 武汉天喻软件股份有限公司 | Method and system for processing counterfeit process in file transparent encryption and decryption system |
CN110543339A (en) * | 2019-08-09 | 2019-12-06 | 五八有限公司 | Method and device for managing applet skip, electronic equipment and storage medium |
CN113360894A (en) * | 2021-06-01 | 2021-09-07 | 北京天空卫士网络安全技术有限公司 | User behavior recording method and device |
Also Published As
Publication number | Publication date |
---|---|
CN103425926B (en) | 2016-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103425926B (en) | The method of application program launching method, configured list, terminal and server | |
CN110493858B (en) | Method and device for reducing power consumption and mobile terminal | |
US20110191764A1 (en) | Systems, methods, and apparatuses for facilitating distribution of firmware updates | |
JP6389319B2 (en) | Roaming network access method and apparatus | |
CN104768123A (en) | Bluetooth connection method, device and system | |
CN105554522A (en) | Method for playing audio in group, server and terminal | |
CN104572819A (en) | Clearing method and system for junk data | |
CN106888495B (en) | Network access method and terminal | |
CN103607431B (en) | Mobile terminal resource processing method, device and equipment | |
CN105530239A (en) | Multimedia data obtaining method and device | |
CN105045596A (en) | Plug-in calling method and apparatus | |
WO2019184009A1 (en) | Network access method and terminal device | |
CN104133693B (en) | Installment state detection method, device and terminal | |
CN108600949A (en) | Choosing method, device and the mobile terminal of MIPI frequency points | |
CN112269842A (en) | Information processing method and device, storage medium and computer equipment | |
CN105550316A (en) | Pushing method and device of audio list | |
CN105025064A (en) | Method, device and system for downloading files | |
CN109275125B (en) | Resource sharing method, device, equipment and storage medium | |
CN105487637A (en) | Radio-frequency link control method and apparatus | |
CN105872775A (en) | Silent uninstalling method and device for smart cloud TV application | |
CN105162670A (en) | Routing device connecting method and apparatus | |
CN113065083B (en) | Page processing method and device, electronic equipment and storage medium | |
CN107852598B (en) | Circumventing wireless device spatial tracking based on wireless device identifiers | |
CN105049476B (en) | The startup method and terminal of a kind of audio frequency apparatus | |
CN108804926B (en) | Universal Web application vulnerability detection and repair method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190730 Address after: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403 Co-patentee after: Tencent cloud computing (Beijing) limited liability company Patentee after: Tencent Technology (Shenzhen) Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Futian District SEG Science Park 2 East Room 403 Patentee before: Tencent Technology (Shenzhen) Co., Ltd. |
|
TR01 | Transfer of patent right |