CN105487908B - Safe application software ecological service method - Google Patents

Safe application software ecological service method Download PDF

Info

Publication number
CN105487908B
CN105487908B CN201510961142.9A CN201510961142A CN105487908B CN 105487908 B CN105487908 B CN 105487908B CN 201510961142 A CN201510961142 A CN 201510961142A CN 105487908 B CN105487908 B CN 105487908B
Authority
CN
China
Prior art keywords
application
application software
center
software
application service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510961142.9A
Other languages
Chinese (zh)
Other versions
CN105487908A (en
Inventor
符兴斌
王磊
鲁振
韩波
胡坚升
邢芷怡
程志斌
张党伟
袁晓敏
旷华勇
李锁在
韩鹏
贾文娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinasoft Information System Engineering Co ltd
Original Assignee
Chinasoft Information System Engineering Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinasoft Information System Engineering Co ltd filed Critical Chinasoft Information System Engineering Co ltd
Priority to CN201510961142.9A priority Critical patent/CN105487908B/en
Publication of CN105487908A publication Critical patent/CN105487908A/en
Application granted granted Critical
Publication of CN105487908B publication Critical patent/CN105487908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a safe application software ecological service method, which comprises the steps of establishing a perfect application software ecological service system, realizing the unified management and the efficient deployment of software, and establishing a safety mechanism to improve the safety of the whole application software service system; the invention has the advantages that: in the whole ecological system of the domestic information security, the operability, the efficiency and the security of the deployment and the distribution of the application software are improved.

Description

Safe application software ecological service method
Technical Field
The invention relates to a software ecological service, in particular to a safe application software ecological service method, belonging to the field of software ecological services.
Background
The service mode of the current application software on the PC platform mainly comprises the following steps: the method comprises the steps of adopting a mode of purchasing an application program installation package and an authorization code offline; the method adopts the mode of off-line purchase and on-line activation authorization; most application software has shortcomings in service solutions for enterprises and public institutions, and has problems in various aspects such as security of each link, high efficiency of deployment, overall unified management and the like. The service mode of the mobile platform adopts the mode of an application store to carry out authorized purchase, installation and deployment and unified management. However, because of the great difference in software and hardware environments at the bottom of the current mobile platform, the entire application software ecosystem is not sound enough, and problems exist in the safety and the supervision of the links such as development, operation, deployment, unified management and the like. Although the methods meet the service requirements of general users to a certain extent, the methods cannot accurately provide safe, controllable, classified and manageable personalized distribution services for appointed machine types, group users and users in a special range; and strict and standard unified application import and export security authentication and diversified management services of application users cannot be provided for users.
Disclosure of Invention
In order to solve the problems, the invention designs a safe application software ecological service method, and aims at the current situation of the current application software service mode, and improves the operability, efficiency and safety of application software deployment and distribution in the whole ecological system of domestic information safety.
The technical scheme of the invention is as follows:
a safe application software ecological service method comprises the following two parts
(1) A perfect application software ecological service system is established, unified management and efficient deployment of software are realized, a set of overall system structure is provided to manage the application software, and the operability and the efficiency of deployment and distribution of the application software are ensured;
comprises the following steps: the system comprises an application developer, an application service center, an application service subcenter and an application service terminal, wherein: an application developer: the development of the application software is carried out according to a unified development tool, a development library and a development standard; the application service center: the system is responsible for managing application software provided by an application developer and managing service sub-centers; the application service subcenter: the system is responsible for managing application software and application service terminals of the branch center; the application service terminal: and the system is responsible for the installation, uninstallation and upgrade operations of the application software of the terminal PC.
The whole deployment and distribution of the application software comprises 6 steps which are respectively as follows in sequence:
the first step is as follows: the application service center adapts and verifies the application software, and the step further comprises 4 steps which are respectively as follows in sequence:
step 1, authorization and authentication: before entering the application service center, the application software provided by the application developer needs to be authorized and verified. If the authorization code in the application software is legal in the application service center, entering step 2, otherwise, the application software cannot enter the whole ecosystem for deployment and distribution through auditing;
step 2, adaptation check, wherein application software provided by an application developer needs to be developed based on a CCF (core operation framework), and in order to ensure that the application software entering an ecosystem can normally operate, an application service center needs to perform adaptation check on the CCF on which the application software depends. If the adaptation is successful, entering step 3, otherwise, the application software cannot enter the whole ecosystem through auditing for deployment and distribution;
and step 3, safety inspection: application software provided by an application developer may introduce malicious operation behaviors due to various reasons, so that the application service center needs to perform virus and trojan killing on the application software to ensure that the application software does not have malicious attack behaviors. If no malicious attack behavior exists, entering step 4, otherwise, the application software cannot enter the whole ecosystem through auditing for deployment and distribution;
and 4, checking the content: the application software entering the whole ecosystem is required to be the application software meeting the requirements of laws and regulations, so the application service center needs to manually and automatically inspect the functions, pictures and characters of the application software. And if the examination is passed, entering a second step, otherwise, the application software cannot enter the whole ecosystem for deployment and distribution through the examination.
The second step is that: the application service center exports the application software, this step further includes 3 steps, separately as follows in proper order:
step 1, exporting an application: the application service sub-center provides an application export application to the application service center according to the actual requirement of the sub-center, wherein the application export application comprises the free or charged application software which needs to be purchased and the authorized number of the charged application software (the number of terminals allowed to be installed);
step 2, exporting application: the application service center derives all application software packages for the application service subcenter according to the identity code of the application service subcenter (the identity code uniquely identifies one application service subcenter in the whole ecosystem) which is proposed and derived in the step 1;
step 3, delivering application: the application service center delivers the derived application software package to the application service subcenter in a physical storage mode, and then enters a third step.
The third step: the application service sub-center imports application software, and the step further comprises 2 steps which are respectively as follows in sequence:
step 1, checking an identity code: the application software exported from the application service center corresponds to the application service subcenter one to one, so that the application service subcenter needs to perform validity check when importing the application software. If the identity code recorded in the application software package is consistent with the identity code of the current service subcenter, the application software is guided into the current application service subcenter, and then the step 2 is carried out; otherwise, the import fails, and the application software cannot be deployed and distributed in the current application service sub-center;
and 2, the application service sub-center executes the shelving operation on the imported application software (only the application software on the shelf can be deployed and distributed to the application service terminal), and the step four is entered.
The fourth step: the application service sub-center deploys and distributes application software to the application service terminals, and the steps further comprise 2 steps which are respectively as follows in sequence:
step 1, establishing connection: the application service sub-center establishes connection with the application service terminal, if the connection is successful, the step 2 is entered, otherwise the step deployment of the application software cannot be distributed to the application service terminal appointed by the sub-center;
step 2, automatically deploying application software to the application service terminal: according to the actual situation, if the application software needs to be automatically installed to the application service terminal, the application service sub-center needs to execute deployment operation, and then the application service sub-center enters the fifth step; if automatic installation of the application software to the application service terminal is not required, the "fifth step" is directly entered.
The fifth step: the application terminal uses application software: the application software in the whole ecosystem is finally installed, uninstalled and upgraded through the application assistant, and the application assistant runs on each application service terminal PC. The step further comprises 2 steps which are respectively as follows in sequence:
step 1: automatic installation: after the application assistant runs, if the application service sub-center issues an automatic deployment instruction, the application assistant needs to automatically install application software (application software at a public level); otherwise, entering step 2;
step 2: and the user logs in the application assistant and executes the operations of installation, uninstallation, upgrade and starting of the software in the current application assistant according to the actual requirement. And then proceeds to the "sixth step".
And a sixth step: the whole deployment and distribution process of the application software is finished.
(2) Safety of whole application software service system is improved by formulating safety mechanism
In order to ensure the safety of deployment and distribution of application software in the whole domestic information security ecosystem, safety processing needs to be performed in all links from the entry of the application software into the whole ecosystem to the terminal PC. A safe application software ecological service method is characterized in that each link in a deployment and distribution technical scheme is subjected to safe processing, and a specific safety mechanism technical scheme comprises 8 steps which are respectively as follows in sequence:
firstly, developing safe application software: the step ensures that the application software has higher safety in the development process, and further comprises the following 3 steps which are respectively as follows in sequence:
step 1, application software authorization: before developing application software, an application developer needs to apply for authorization codes to an application service center, the application software corresponds to the authorization codes one by one, and the application service center maintains the corresponding relation between the application software and the authorization codes;
step 2, developing application software: an application developer uses a unified platform provided by an ecosystem to develop software, wherein the platform comprises: core elements such as an Integrated Development Environment (IDE), a running framework (CCF) and the like are integrated, and a development platform is used for independent research and development of an ecosystem, so that the possibility of safety invasion in a development link is reduced;
step 3, generating an application installation package: application developers generate application software installation packages (cpk packages) using a unified generator provided by the ecosystem. The internal structure of the installation package and the internal file format standard are independently and uniformly formulated by an ecosystem; the generator is independently developed and produced by an ecosystem, so that the possibility of security intrusion in the process of manufacturing the installation package is reduced.
And secondly, authorization verification and security check: when the application software is imported into the application service center, the application service center needs to check the authorization and security of the application software, and the step further includes the following 2 steps, which are respectively as follows in sequence:
step 1, authorization verification: and the application service center analyzes the application software package and performs authorization verification on the authorization code in the software package. If the authorization code is the authorization code which is successfully applied, entering the step 2; if the authorization code is not authorized, the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution;
step 2, safety inspection: the application service center conducts virus and Trojan killing on the application software and checks whether malicious attacks exist or not. And if no virus Trojan horse exists, the third step is carried out, otherwise, the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution.
Thirdly, setting the application level of the application software: the application service center sets an application level for each type of application software, and ensures that only users with corresponding authorities can operate the software.
Fourthly, generating an identity code of the application service subcenter: in order to avoid the application software authorized for a certain service subcenter from spreading to other application subcenters, and meanwhile, for the economic benefits of application software developers and operators, the application service center generates an identity code which is unique in the whole system for each application subcenter and is used for uniquely identifying one application service subcenter. The identity code is generated by encrypting basic information (user name and password) of the application service sub-center and server hardware information (CPU and OS).
Fifthly, the application service center exports the safety processing of the application software: the application service center exports all the application software purchased by the application service subcenter according to the purchase application of the application service subcenter, encrypts the application grade, the purchased installation number and the identity code information of each application software, embeds the encrypted application software into an application software package, and delivers the encrypted application software package to the application service subcenter in a physical storage mode.
Sixthly, the application service sub-center checks the imported application software: when the application service subcenter imports each application software exported by the application service center, validity verification is required. The step further comprises 2 steps which are respectively as follows in sequence:
step 1, application service subcenter identity code detection: the application service sub-center detects the identity code of the imported application software package, if the identity code in the application software package is consistent with the identity code of the current application service sub-center, the step 2 is entered, otherwise the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution;
step 2, repeatedly importing and detecting: in order to guarantee the economic benefits of application software developers and operators, when the application software is imported by the application service subcontractor, the application software needs to be repeatedly imported, if the application software is not imported, the application software is imported into the application service subcontractor, otherwise, the application software fails to be imported again (the upgrade and the repurchase are not in the inspection range).
Seventhly, the application service sub-center authorizes the application software to the terminal user, and the step further comprises 3 steps which are respectively as follows in sequence:
step 1, setting the application level of application software: in order to improve the safety of application software and ensure that the application software can be safely used, the application service subcenter sets application levels (from low to high, in sequence: open, secret and secret);
step 2, setting the grade of the terminal user: the terminal users can operate the application software only after logging successfully through the application assistant, and the application service sub-center sets the user grade (from low to high, in sequence: common, general, important and core) of each terminal user;
step 3, authorizing the application software to the terminal user: in order to ensure that the application software can be used safely, the application service subcenter needs to authorize the application software to a designated end user, and only the authorized application software can be operated by a registered corresponding end user.
Eighth, the end user uses the application software: if the terminal user successfully logs in the application assistant, the installation, uninstallation and upgrade operations of the application software authorized by the branch center can be executed, and the terminal user cannot view the unauthorized application software on an application assistant interface.
The invention establishes a perfect application software ecological service system in a domestic environment. The invention relates to a set of unified application software auditing, managing, deploying and distributing processes established in a domestic environment. The invention relates to a set of safety mechanism established in a domestic environment: the system comprises an application software security development mechanism, a security auditing mechanism and a security use mechanism.
The invention has the advantages that: a perfect ecological service system is established for application software in a domestic environment; a set of unified safe auditing, unified management, efficient distribution and deployment processes are provided; a set of safety mechanisms of application software in the links of development, operation management and terminal use are provided; the safety and reliability of the application software in the service process are ensured, the high efficiency of deployment and distribution is improved, and the supervision performance of the software is ensured.
The present invention will be further described with reference to the following specific examples.
Detailed Description
The following description of the preferred embodiments of the present invention is provided for the purpose of illustration and description, and is in no way intended to limit the invention.
Example 1
A safe application software ecological service method takes the deployment and distribution of arora software as an example, and the deployment and distribution of the safe application software ecological service method and the technical scheme of a safety mechanism are described by examples, and the specific steps are as follows:
firstly, developing application software: the application developer successfully applies for an authorization code (31abff03d7894add) for the arora1.0 from the application service center, and the application developer generates the arora 1.0.cpk through a development platform and a package generator provided by an ecosystem. And entering the second step.
And secondly, authorization verification and security check: the application service center imports arora.1.0.cpk, and the step further comprises the following 2 steps which are respectively as follows in sequence:
step 1: the application service center analyzes the arora.1.0.cpk to obtain the authorization code 31abff03d7894add, queries the database, checks that the authorization code 31abff03d7894add is consistent with the authorization code corresponding to the application software arora.1.0 in the authorization application record, and enters step 2.
Step 2: and (3) scheduling a virus Trojan horse searching and killing module by using the service center, automatically scanning arora.1.0.cpk, finding no virus or Trojan horse, and entering a third step.
Thirdly, setting the application level of the application software: the application service center sets the application level of arora.1.0 to secret (code: 2), and proceeds to the fourth step.
Fourthly, generating an identity code of the application service subcenter: the application service center manages an application service sub-center (xx city committee), and the user name of xx city committee is: xxshiwei001, password is: 123456, server hardware information: CPU (type: ft1500a, serial No. 123456789), OS (NeoKylin R5); the application service center encrypts xxshiwei001, 123456, ft1500a and 123456789 to obtain the identity code of xx municipality (kwPr6 j). And entering the fifth step.
Fifthly, the application service center exports the safety processing of the application software: the application service center embeds the installation times 100, the application level (2), and the identity code (kwPr6j) of arora.1.0 purchased by xx city committees into arora.1.0. cpk. Then exported to optical disc and delivered to xx municipalities. And entering the sixth step.
And sixthly, the application service sub-center checks the imported application software, and the step further comprises 2 steps which are respectively as follows in sequence:
step 1, application service subcenter identity code detection: when the xx city commits to arora.1.0.cpk, the service center is divided into the following parts according to the basic information of the application service center: the user name is: xxshiwei001, password is: 123456; server hardware information: the CPU (type: ft1500a, serial No. 123456789), OS (NeoKylin R5) calculates the ID code as: kwPr6 j; and (3) the application service branch center analyzes the identity code in the arora.1.0.cpk, compares the identity code with the calculated kwPr6j and enters the step 2.
Step 2, repeatedly importing and detecting: and the application service sub-center inquires the database import record, and if the arora.1.0.cpk is not imported once, importing the arora.1.0 to the application service sub-center of xx city committee. And entering the seventh step.
Seventhly, authorizing the application software to the terminal user by the application service sub-center, wherein the step comprises 3 steps which are respectively as follows in sequence:
step 1, setting the application level of application software: the application service center sets the application level of arora.1.0 to be absolute.
Step 2, setting the grade of the terminal user: adding an end user (user name: admin01, password: 123456) to the application service subcenter; setting the user grade as follows: and (4) a core.
Step 3, authorizing the application software to the terminal user: the application service subcenter sets the authority of operating arorg.1.0 for admin 01. And entering the eighth step.
Eighth, the end user uses the application software: the end user is authenticated by the user name: the admin01 and the password 123456 successfully log in to the application assistant, so that the arora.1.0 can be seen, and the installation, uninstallation and upgrade operations are successfully executed.

Claims (10)

1. A safe application software ecological service method is characterized in that: the method comprises the following two parts:
(1) the method comprises the steps of establishing a perfect application software ecological service system, realizing unified management and deployment of application software, and comprising an application developer, an application service center, an application service sub-center and an application service terminal, wherein the whole deployment and distribution of the application software comprises 6 steps which are respectively as follows in sequence:
the first step is as follows: the application service center adapts and verifies the application software;
the second step is that: the application service center exports application software;
the third step: the application service sub-center imports application software;
the fourth step: the application service sub-center deploys and distributes application software to the application service terminals;
the fifth step: the application terminal uses application software: the application software in the whole ecosystem is finally installed, uninstalled and upgraded by an application assistant, and the application assistant runs on each application service terminal PC;
and a sixth step: finishing the whole deployment and distribution process of the application software;
(2) safety of whole application software service system is improved by formulating safety mechanism
Comprises 8 steps which are respectively as follows in sequence:
firstly, developing safe application software;
and secondly, authorization verification and security check: when the application software is imported into the application service center, the application service center needs to check the authorization and the safety of the application software;
thirdly, setting the application level of the application software: the application service center sets an application grade for each type of application software to ensure that only users with corresponding authorities can operate the software;
fourthly, generating an identity code of the application service subcenter: in order to avoid that the application software authorized to a certain service subcenter is diffused to other application subcenters, and meanwhile, in order to achieve the economic benefits of application software developers and operators, the application service center generates a unique identity code in the whole system for each application subcenter, and the unique identity code is used for uniquely identifying one application service subcenter; the identity code is generated by encrypting basic information of the application service sub-center and server hardware information;
fifthly, the application service center exports the safety processing of the application software: the application service center exports all the application software purchased by the application service subcenter according to the purchase application of the application service subcenter, encrypts the application grade, the purchased installation number and the identity code information of each application software, embeds the encrypted application software into an application software package, and delivers the encrypted application software package to the application service subcenter in a physical storage mode;
sixthly, the application service sub-center checks the imported application software: when the application service subcenter imports each application software exported by the application service center, validity verification is required;
seventhly, authorizing the application software to the terminal user by the application service sub-center;
eighth, the end user uses the application software: if the terminal user successfully logs in the application assistant, the installation, uninstallation and upgrade operations of the application software authorized by the branch center can be executed, and the terminal user cannot view the unauthorized application software on an application assistant interface.
2. The method for secure ecological services of application software according to claim 1, characterized in that: an application developer: the development of the application software is carried out according to a unified development tool, a development library and a development standard; the application service center: the system is responsible for managing application software provided by an application developer and managing service sub-centers; the application service subcenter: the system is responsible for managing application software and application service terminals of the branch center; the application service terminal: and the system is responsible for the installation, uninstallation and upgrade operations of the application software of the terminal PC.
3. The method for secure ecological services of application software according to claim 1, characterized in that: the application service center adapts and verifies the application software, and the steps comprise 4 steps which are respectively as follows in sequence:
step 1, authorization and authentication: before entering an application service center, the application software provided by an application developer needs authorization verification; if the authorization code in the application software is legal in the application service center, entering step 2, otherwise, the application software cannot enter the whole ecosystem for deployment and distribution through auditing;
step 2, adaptation check, wherein application software provided by an application developer needs to be developed based on CCF, and in order to ensure that the application software entering an ecosystem can normally run, an application service center needs to perform adaptation check on CCF on which the application software depends; if the adaptation is successful, entering step 3, otherwise, the application software cannot enter the whole ecosystem through auditing for deployment and distribution;
and step 3, safety inspection: application software provided by an application developer may introduce malicious operation behaviors due to various reasons, so that an application service center needs to perform virus and Trojan killing on the application software to ensure that the application software does not have malicious attack behaviors; if no malicious attack behavior exists, entering step 4, otherwise, the application software cannot enter the whole ecosystem through auditing for deployment and distribution;
and 4, checking the content: the application software entering the whole ecosystem is required to be the application software meeting the requirements of laws and regulations, so the application service center needs to manually and automatically inspect the functions, pictures and characters of the application software; and if the examination is passed, entering a second step, otherwise, the application software cannot enter the whole ecosystem for deployment and distribution through the examination.
4. The method for secure ecological services of application software according to claim 1, characterized in that: the application service center exports the application software, this step includes 3 steps, separately as follows in proper order:
step 1, exporting an application: the application service sub-center provides an application export application to the application service center according to the actual requirement of the sub-center, wherein the application comprises free or charged application software needing to be purchased and the authorized number of the charged application software;
step 2, exporting application: the application service center derives all application software packages applied for the application service subcenter according to the identity codes of the application service subcenter proposed and derived in the step 1;
step 3, delivering application: the application service center delivers the derived application software package to the application service subcenter in a physical storage mode, and then enters a third step.
5. The method for secure ecological services of application software according to claim 1, characterized in that: the application service is divided into centers to import application software, and the steps comprise 2 steps which are respectively as follows in sequence:
step 1, checking an identity code: the application software exported from the application service center corresponds to the application service subcenter one to one, so that the application service subcenter needs to be checked for validity when importing the application software; if the identity code recorded in the application software package is consistent with the identity code of the current service subcenter, the application software is guided into the current application service subcenter, and then the step 2 is carried out; otherwise, the import fails, and the application software cannot be deployed and distributed in the current application service sub-center;
and 2, the application service sub-center executes the imported application software to be put on shelf and enters a fourth step.
6. The method for secure ecological services of application software according to claim 1, characterized in that: the application service sub-center deploys and distributes application software to the application service terminals, and the steps comprise 2 steps which are respectively as follows in sequence:
step 1, establishing connection: the application service sub-center establishes connection with the application service terminal, if the connection is successful, the step 2 is entered, otherwise the step deployment of the application software cannot be distributed to the application service terminal appointed by the sub-center;
step 2, automatically deploying application software to the application service terminal: according to the actual situation, if the application software needs to be automatically installed to the application service terminal, the application service sub-center needs to execute deployment operation, and then the application service sub-center enters the fifth step; if automatic installation of the application software to the application service terminal is not required, the "fifth step" is directly entered.
7. The method for secure ecological services of application software according to claim 1, characterized in that: the application terminal uses application software, and the step comprises 2 steps which are respectively as follows in sequence:
step 1: automatic installation: after the application assistant runs, if the application service sub-center issues an automatic deployment instruction, the application assistant needs to automatically install application software; otherwise, entering step 2;
step 2: a user logs in the application assistant and executes installation, uninstallation, upgrade and starting operations on software in the current application assistant according to actual requirements; and then proceeds to the "sixth step".
8. The method for secure ecological services of application software according to claim 1, characterized in that: developing safe application software, wherein the steps comprise the following 3 steps which are respectively as follows in sequence:
step 1, application software authorization: before developing application software, an application developer needs to apply for authorization codes to an application service center, the application software corresponds to the authorization codes one by one, and the application service center maintains the corresponding relation between the application software and the authorization codes;
step 2, developing application software: an application developer uses a unified platform provided by an ecosystem to develop software, wherein the platform comprises: the development environment and the core elements of the operation framework are integrated, and the development platform is the independent research and development production of an ecosystem, so that the possibility of safety invasion in the development link is reduced;
step 3, generating an application installation package: an application developer generates an application software installation package by using a unified generator provided by an ecosystem; the internal structure of the installation package and the internal file format standard are independently and uniformly formulated by an ecosystem; the generator is independently developed and produced by an ecosystem, so that the possibility of security intrusion in the process of manufacturing the installation package is reduced.
9. The method for secure ecological services of application software according to claim 1, characterized in that: authorization verification and security check, the steps further comprise the following 2 steps, which are respectively as follows:
step 1, authorization verification: the application service center analyzes the application software package and carries out authorization verification on the authorization code in the software package; if the authorization code is the authorization code which is successfully applied, entering the step 2; if the authorization code is not authorized, the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution;
step 2, safety inspection: the application service center checks and kills viruses and trojans on the application software and checks whether malicious attacks exist or not; and if no virus Trojan horse exists, the third step is carried out, otherwise, the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution.
10. The method for secure ecological services of application software according to claim 1, characterized in that: the application service sub-center checks the imported application software, and the steps comprise 2 steps which are respectively as follows in sequence:
step 1, application service subcenter identity code detection: the application service sub-center detects the identity code of the imported application software package, if the identity code in the application software package is consistent with the identity code of the current application service sub-center, the step 2 is entered, otherwise the import fails, and the application software cannot enter the whole ecosystem for deployment and distribution;
step 2, repeatedly importing and detecting: in order to ensure the economic benefits of application software developers and operators, when the application software is imported by the application service sub-center, the repeated import check is needed, if the application software is not imported, the application software is imported to the application service sub-center, otherwise, the application software cannot be imported again if the import fails;
the application service sub-center authorizes the application software to the terminal user, and the steps comprise 3 steps which are respectively as follows in sequence:
step 1, setting the application level of application software: in order to improve the safety of the application software and ensure that the application software can be safely used, the application service sub-center sets an application level for each imported application software;
step 2, setting the grade of the terminal user: the terminal users can operate the application software only after logging successfully through the application assistant, and the application service sub-center sets the user grade of each terminal user;
step 3, authorizing the application software to the terminal user: in order to ensure that the application software can be used safely, the application service subcenter needs to authorize the application software to a designated end user, and only the authorized application software can be operated by a registered corresponding end user.
CN201510961142.9A 2015-12-22 2015-12-22 Safe application software ecological service method Active CN105487908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510961142.9A CN105487908B (en) 2015-12-22 2015-12-22 Safe application software ecological service method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510961142.9A CN105487908B (en) 2015-12-22 2015-12-22 Safe application software ecological service method

Publications (2)

Publication Number Publication Date
CN105487908A CN105487908A (en) 2016-04-13
CN105487908B true CN105487908B (en) 2020-05-19

Family

ID=55674904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510961142.9A Active CN105487908B (en) 2015-12-22 2015-12-22 Safe application software ecological service method

Country Status (1)

Country Link
CN (1) CN105487908B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055138B (en) * 2018-02-01 2020-03-17 国家计算机网络与信息安全管理中心 Block chain-based application distribution recording method and system
CN112925529B (en) * 2021-02-07 2023-10-27 联通(广东)产业互联网有限公司 Application security distribution method, system, device and medium based on distributed cloud platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604099A (en) * 2004-08-06 2005-04-06 中国联合通信有限公司 Method and system for constructing software system structure of telecommunication operation support system
CN101350082A (en) * 2008-09-04 2009-01-21 中科院成都信息技术有限公司 Method for building enterprise application integration platform and architecture thereof
CN101719236A (en) * 2009-11-16 2010-06-02 山东浪潮齐鲁软件产业股份有限公司 IT operation and maintenance system based on informatization construction operation
CN102065077A (en) * 2010-11-11 2011-05-18 中国联合网络通信集团有限公司 Method and system for distributing application software to terminal
EP2530585A1 (en) * 2011-06-01 2012-12-05 HTC Corporation Method of handling periodic update of software component and related communication device
CN103888518A (en) * 2014-03-06 2014-06-25 西安邮电大学 Service design method of informatization public platform
US9075986B1 (en) * 2006-10-19 2015-07-07 United Services Automobile Association Systems and methods for software application security management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604099A (en) * 2004-08-06 2005-04-06 中国联合通信有限公司 Method and system for constructing software system structure of telecommunication operation support system
US9075986B1 (en) * 2006-10-19 2015-07-07 United Services Automobile Association Systems and methods for software application security management
CN101350082A (en) * 2008-09-04 2009-01-21 中科院成都信息技术有限公司 Method for building enterprise application integration platform and architecture thereof
CN101719236A (en) * 2009-11-16 2010-06-02 山东浪潮齐鲁软件产业股份有限公司 IT operation and maintenance system based on informatization construction operation
CN102065077A (en) * 2010-11-11 2011-05-18 中国联合网络通信集团有限公司 Method and system for distributing application software to terminal
EP2530585A1 (en) * 2011-06-01 2012-12-05 HTC Corporation Method of handling periodic update of software component and related communication device
CN103888518A (en) * 2014-03-06 2014-06-25 西安邮电大学 Service design method of informatization public platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于云计算的软件服务模式的研究;杨宝龙;《中国优秀硕士学位论文全文数据库 信息科技辑》;20121115(第11期);全文 *

Also Published As

Publication number Publication date
CN105487908A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
US11856106B2 (en) Secure configuration of a device
CN107204982B (en) Interactive data system universal safety guard system
CN106355081A (en) Android program start verification method and device
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
CN104104672A (en) Method for establishing dynamic authorization code based on identity authentication
CN108259479B (en) Business data processing method, client and computer readable storage medium
CN106295350B (en) identity verification method and device of trusted execution environment and terminal
CN112464212B (en) Data authority control reconstruction method based on mature complex service system
CN111475782B (en) API (application program interface) key protection method and system based on SGX (generalized Standard X) software extension instruction
CN103679005A (en) Method to enable development mode of a secure electronic control unit
CN103065072A (en) Method and device to improve Java software jailbreak difficulty and copyright verification method
US9858061B2 (en) Tamperproof installation of building control software in approved runtime environments
CN112749088B (en) Application program detection method and device, electronic equipment and storage medium
CN105487908B (en) Safe application software ecological service method
CN108614709B (en) Method and system for controlling Android application to safely access network
CN114139114A (en) Development and maintenance system and method based on front-end low code
CN112817608A (en) Program package installation method of trusted computing industrial personal computer
CN109933958A (en) The method and system of software protection
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN110581833B (en) Service security protection method and device
CN106372503A (en) Method and device for enhancing APK (Android Package) application permission configuration flexibility and system
KR101322402B1 (en) System and Method for Security of Application, Communication Terminal Therefor
CN112395021B (en) Power metering equipment application software loading control method and device
CN104991807B (en) A kind of patch pack assembly generates, processing method and processing device
CN105279425A (en) Application processing method and application processing device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant