CN105653945A - Information processing method and device based on blacklist and electronic equipment - Google Patents

Information processing method and device based on blacklist and electronic equipment Download PDF

Info

Publication number
CN105653945A
CN105653945A CN201511026878.3A CN201511026878A CN105653945A CN 105653945 A CN105653945 A CN 105653945A CN 201511026878 A CN201511026878 A CN 201511026878A CN 105653945 A CN105653945 A CN 105653945A
Authority
CN
China
Prior art keywords
application program
application
blacklist
list
program identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201511026878.3A
Other languages
Chinese (zh)
Inventor
白斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201511026878.3A priority Critical patent/CN105653945A/en
Publication of CN105653945A publication Critical patent/CN105653945A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses an information processing method based on a blacklist, which comprises the following steps: acquiring a white list for information processing, wherein the white list comprises an application program identifier for indicating that the terminal does not perform information processing; acquiring an application program list in a terminal, wherein the application program list comprises an installed application program identifier in the terminal; determining a blacklist for information processing according to the white list and the application program identification list; and processing information of the application program in the terminal according to the blacklist. The embodiment of the invention also discloses an information processing device and electronic equipment based on the blacklist. By adopting the embodiment of the invention, the blacklist for the user terminal can be determined through the acquired white list, and the information interception is carried out through the blacklist, so that the efficiency is improved, and the interception loss of the information is effectively reduced.

Description

A kind of based on the information processing method of blacklist, device and electronic equipment
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of based on the information processing method of blacklist, device and electronic equipment.
Background technology
In safety or message block are applied, need the information of some application program or application program is processed, if it find that there is security risk in this application or user is bothered by message, then need the displaying of installation and the information stoping application, and informing message block, and the application program too occupying and consuming system resource is optimized cleaning. There is two ways in which in information intercepting processes: first, white list mechanism, refer in the application of security protection or message block, in order to avoid manslaughtering and miss interception, give tacit consent to and some application or message are not checked or do not intercept; Second, blacklist mechanism, refer in the application of security protection or message block, in order to reduce the risk of user, it is ensured that use safety, give tacit consent to and undertaken processing and intercepting by some application or message.
But, owing to nowadays intelligent terminal is commonplace, intelligent terminal's terminal types of applications emerges in an endless stream, if therefore to contain and to process most application program, no matter it is white list, or blacklist, data volume is all very big, and then causes determining that white list or blacklist workload are huge respectively by operation means. And if need to be let pass in the inquiry of all white lists or carry out inquiry in blacklist to be intercepted, inefficiency, and the application of user installation is also easily caused and intercepts by blacklist every time by mistake.
Summary of the invention
The embodiment of the present invention provides a kind of based on the information processing method of blacklist, device and electronic equipment. The blacklist for user terminal can be determined by the white list got, and then carry out information intercepting by this blacklist, thus the interception loss of raising efficiency and effectively reduction information.
First aspect present invention provides a kind of information processing method based on blacklist, including:
Obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
Obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
According to described white list and described application program identification list, it is determined that for the blacklist of information processing;
According to described blacklist, the application program in terminal is carried out information processing.
Wherein, described according to described white list and described application program identification list, it is determined that the blacklist for information processing includes:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist.
Wherein, described according to described white list and the plurality of Apply Names having installed application, it is determined that the blacklist of information processing includes:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server;
Receive the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist.
Wherein, described according to the described blacklist determined, the application program in terminal is carried out information processing and includes:
Application program newly installed in detection terminal;
Described newly installed application program identification is compared with the application program identification in described blacklist;
If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process, if described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process.
Wherein, described according to the described blacklist determined, the application program in terminal is carried out information processing and includes:
The application program installed in detection terminal;
If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process.
Wherein, described method also includes:
The described blacklist determined is uploaded to cloud server.
Correspondingly, second aspect present invention provides a kind of information processor based on blacklist, including:
Data obtaining module, for obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
List acquisition module, for obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
Information determination module, for according to described white list and described application program identification list, it is determined that for the blacklist of information processing;
Message processing module, for according to described blacklist, carrying out information processing to the application program in terminal.
Wherein, described information determination module specifically for:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist.
Wherein, described information determination module specifically for:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server;
Receive the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist.
Wherein, described message processing module specifically for:
Application program newly installed in detection terminal;
Described newly installed application program identification is compared with the application program identification in described blacklist;
If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process, if described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process.
Wherein, described message processing module specifically for:
The application program installed in detection terminal;
If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process.
Wherein, described device also includes:
Information sending module, for uploading to cloud server by the described blacklist determined.
Correspondingly, third aspect present invention provides a kind of electronic equipment, including processor, memorizer, communication interface and bus;
Described processor, described memorizer and described communication interface are connected by described bus and complete mutual communicating;
Described memorizer storage executable program code;
Described processor runs the program corresponding with described executable program code by reading the executable program code of storage in described memorizer, for:
Obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
Obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
According to described white list and described application program identification list, it is determined that for the blacklist of information processing;
According to described blacklist, the application program in terminal is carried out information processing.
Implementing the embodiment of the present invention, first obtain the white list for information processing, then obtain the application list in terminal, the application list includes comprising the application program identification installed in terminal; Secondly according to white list and application program identification list, it is determined that for the blacklist of information processing; Finally according to blacklist, the application program in terminal is carried out information processing. The blacklist for user terminal can be determined by the white list got, and then carry out information intercepting by this blacklist, thus the interception loss of raising efficiency and effectively reduction information.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below the accompanying drawing used required during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the first embodiment flow chart of a kind of information processing method based on blacklist that the present invention proposes;
Fig. 2 is the second embodiment flow chart of a kind of information processing method based on blacklist that the present invention proposes;
Fig. 3 is the structural representation of a kind of information processor based on blacklist that the embodiment of the present invention proposes;
Fig. 4 is the structural representation of a kind of electronic equipment that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
Refer to the first embodiment flow chart that Fig. 1, Fig. 1 are a kind of information processing methods based on blacklist that the present invention proposes. As it can be seen, the method in the embodiment of the present invention includes:
S101, obtains the white list for information processing, and described white list includes instruction terminal and do not carry out the application program identification of information processing, and wherein, application program identification can be application name.
In implementing, service request can be sent to cloud server, and then obtain the white list for information processing that cloud server returns, or server end can push white list data information according to pushing strategy to terminal, the white list mode for information processing that obtains is various, and the present invention is not specifically limited. Wherein, cloud server can obtain the user of each application in every kind of application type and make consumption; User according to each application in described every kind of application type makes consumption, choose multiple application in described every kind of application type as the application in described white list: choose multiple application that user makes consumption of a relatively high as described in application in white list. It addition, cloud server can also will specify application to recommend to multiple user terminal, so that application described in the plurality of user terminal selecting, is specified to install; Obtain the quantity installing the described user terminal specifying application in the plurality of user terminal; According to the quantity installing the described user terminal specifying application in the plurality of user terminal, it is determined that whether described appointment applies as the application in described white list. Further, if the quantity installing the described user terminal specifying application in the plurality of user terminal exceedes predetermined threshold value, then can described appointment be applied as the application in described white list, if the plurality of user terminal being installed the quantity of the described user terminal specifying application not less than predetermined threshold value, then application can be specified to get rid of described outside described white list. Wherein, predetermined threshold value can be determined according to the quantity of the multiple user terminals recommended to, it is possible to for the half of the quantity of multiple user terminals.
S102, obtains the application list in terminal, and described the application list includes comprising the application program identification installed in terminal.
In implementing, it is possible to terminal is carried out scan full hard disk, to obtain application name in terminal and then to generate the application list.
S103, according to described white list and described application program identification list, it is determined that for the blacklist of information processing.
In implementing, it is possible to the application program identification in described white list is contrasted with the application program identification in described the application list; If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist, if the application identities in described the application list is present in described white list, then described intended application is got rid of outside blacklist.
Such as: white list comprises the title of the title of application 1, the title of application 2, the title of application 3, the title of application 4, application 5, the application list includes the title of the title of application 1, the title of application 2, the title of application 3, the title of application 6, the title of application 7, application 8, due to application 6 title, application 7 title, application 8 title be not present in white list, it is possible to by application 6 title, application 7 title, application 8 title add in blacklist.
Optionally, it is possible to the described blacklist determined is uploaded to cloud server. Server end collects the black list information that multiple terminals send, it is possible to make server information more comprehensively, it is possible to whether make a decision further is genuine blacklist, if not blacklist, white process can being added, being then pushed to client white list again, in order to avoid causing wrong report.
S104, according to described blacklist, carries out information processing to the application program in terminal.
In implementing, it is possible to application program newly installed in detection terminal; Described newly installed application program identification is compared with the application program identification in described blacklist; If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process; If described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process. Wherein, described information intercepting processes and includes not showing mount message, does not allow prompting informing message, does not allow pop-up advertisement, do not allow to use certain System Privileges, do not allow running background etc.
Optionally, it is possible to the application program installed in detection terminal; If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process. Wherein, described Advance data quality processes, and refers to informing message screening, processes self-starting item, and prompting unloading processes, background process termination free system resources etc.
Additionally, before Advance data quality process can being carried out before described newly installed application is carried out information intercepting process or to the described application program installed, can display reminding information, whether newly installed application is carried out information intercepting process for indicating user or the application program installed is optimized process by described information, if user's approval information intercept process or optimization process, then carry out intercept process or to optimization process, process or optimization process if user abandons information intercepting, then do not carry out intercept process or to optimization process.
In embodiments of the present invention, first obtaining the white list for information processing, then obtain the application list in terminal, the application list includes comprising the application program identification installed in terminal; Secondly according to white list and application program identification list, it is determined that for the blacklist of information processing; Finally according to blacklist, the application program in terminal is carried out information processing. The blacklist for user terminal can be determined by the white list got, and then carry out information intercepting by this blacklist, thus the interception loss of raising efficiency and effectively reduction information.
Refer to the second embodiment flow chart that Fig. 2, Fig. 2 are a kind of information processing methods based on blacklist that the present invention proposes. As it can be seen, the method in the embodiment of the present invention includes:
S201, obtains the white list for information processing, and described white list includes instruction terminal and do not carry out the application program identification of information processing.
In implementing, it is possible to send service request to cloud server, and then obtain the white list for information processing that cloud server returns. Wherein, cloud server can obtain the user of each application in every kind of application type and make consumption; User according to each application in described every kind of application type makes consumption, choose multiple application in described every kind of application type as the application in described white list: choose multiple application that user makes consumption of a relatively high as described in application in white list. It addition, cloud server can also will specify application to recommend to multiple user terminal, so that application described in the plurality of user terminal selecting, is specified to install; Obtain the quantity installing the described user terminal specifying application in the plurality of user terminal; According to the quantity installing the described user terminal specifying application in the plurality of user terminal, it is determined that whether described appointment applies as the application in described white list. Further, if the quantity installing the described user terminal specifying application in the plurality of user terminal exceedes predetermined threshold value, then can described appointment be applied as the application in described white list, if the plurality of user terminal being installed the quantity of the described user terminal specifying application not less than predetermined threshold value, then application can be specified to get rid of described outside described white list. Wherein, predetermined threshold value can be determined according to the quantity of the multiple user terminals recommended to, it is possible to for the half of the quantity of multiple user terminals.
S202, obtains the application list in terminal, and described the application list includes comprising the application program identification installed in terminal.
In implementing, it is possible to terminal is carried out scan full hard disk, to obtain application name in terminal and then to generate the application list.
S203, contrasts the application program identification in described white list with the application program identification in described the application list.
S204, if the application identities in described the application list is not present in described white list, then inquires about described application program identification transmission to cloud server.
In implementing, cloud server preserves black list database and white list database, after server receives application program identification beyond the clouds, if described application program identification is present in the black list database of cloud server, or described application program identification is not present in the white list database of cloud server, then return described application program identification successful inquiring to terminal, if described application program identification is not present in the black list database of cloud server, or described application program identification is present in the white list database of cloud server, return described application program identification to terminal to inquire about unsuccessfully. if it addition, the application identities in described the application list is present in described white list, then described application program identification transmission need not be inquired about to cloud server.
S205, receives the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist, if inquiring about unsuccessfully, then described application program identification is got rid of outside described blacklist.
Optionally, it is possible to the described blacklist determined is uploaded to cloud server. Server end collects the black list information that multiple terminals send, it is possible to make server information more comprehensively, it is possible to whether make a decision further is genuine blacklist, if not blacklist, white process can being added, being then pushed to client white list again, in order to avoid causing wrong report.
S206, according to described blacklist, carries out information processing to the application program in terminal.
In implementing, it is possible to application program newly installed in detection terminal; Described newly installed application program identification is compared with the application program identification in described blacklist; If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process; If described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process. Wherein, described information intercepting processes and includes not showing mount message, does not allow prompting informing message, does not allow pop-up advertisement, do not allow to use certain System Privileges, do not allow running background etc.
Optionally, it is possible to the application program installed in detection terminal; If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process. Wherein, described Advance data quality processes, and refers to informing message screening, processes self-starting item, and prompting unloading processes, background process termination free system resources etc.
Additionally, before Advance data quality process can being carried out before described newly installed application is carried out information intercepting process or to the described application program installed, can display reminding information, whether newly installed application is carried out information intercepting process for indicating user or the application program installed is optimized process by described information, if user's approval information intercept process or optimization process, then carry out intercept process or to optimization process, process or optimization process if user abandons information intercepting, then do not carry out intercept process or to optimization process.
In embodiments of the present invention, first obtaining the white list for information processing, then obtain the application list in terminal, the application list includes comprising the application program identification installed in terminal; Secondly according to white list and application program identification list, it is determined that for the blacklist of information processing; Finally according to blacklist, the application program in terminal is carried out information processing. The blacklist for user terminal can be determined by the white list got, and then carry out information intercepting by this blacklist, thus the interception loss of raising efficiency and effectively reduction information.
Refer to the structural representation that Fig. 3, Fig. 3 are a kind of information processors based on blacklist that the embodiment of the present invention proposes. As it can be seen, the device in the embodiment of the present invention includes:
Data obtaining module 301, for obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing.
In implementing, it is possible to send service request to cloud server, and then obtain the white list for information processing that cloud server returns. Wherein, cloud server can obtain the user of each application in every kind of application type and make consumption; User according to each application in described every kind of application type makes consumption, choose multiple application in described every kind of application type as the application in described white list: choose multiple application that user makes consumption of a relatively high as described in application in white list. It addition, cloud server can also will specify application to recommend to multiple user terminal, so that application described in the plurality of user terminal selecting, is specified to install; Obtain the quantity installing the described user terminal specifying application in the plurality of user terminal; According to the quantity installing the described user terminal specifying application in the plurality of user terminal, it is determined that whether described appointment applies as the application in described white list.Further, if the quantity installing the described user terminal specifying application in the plurality of user terminal exceedes predetermined threshold value, then can described appointment be applied as the application in described white list, if the plurality of user terminal being installed the quantity of the described user terminal specifying application not less than predetermined threshold value, then application can be specified to get rid of described outside described white list. Wherein, predetermined threshold value can be determined according to the quantity of the multiple user terminals recommended to, it is possible to for the half of the quantity of multiple user terminals.
List acquisition module 302, for obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal.
In implementing, it is possible to terminal is carried out scan full hard disk, to obtain application name in terminal and then to generate the application list.
Information determination module 303, for according to described white list and described application program identification list, it is determined that for the blacklist of information processing.
In implementing, it is possible to the application program identification in described white list is contrasted with the application program identification in described the application list; If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist, if the application identities in described the application list is present in described white list, then described intended application is got rid of outside blacklist.
Such as: white list comprises the title of the title of application 1, the title of application 2, the title of application 3, the title of application 4, application 5, the application list includes the title of the title of application 1, the title of application 2, the title of application 3, the title of application 6, the title of application 7, application 8, due to application 6 title, application 7 title, application 8 title be not present in white list, it is possible to by application 6 title, application 7 title, application 8 title add in blacklist.
Optionally, first the application program identification in described white list can be contrasted by terminal with the application program identification in described the application list, if then the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server, wherein, cloud server preserves black list database and white list database, after server receives application program identification beyond the clouds, if described application program identification is present in the black list database of cloud server, or described application program identification is not present in the white list database of cloud server, then return described application program identification successful inquiring to terminal, if described application program identification is not present in the black list database of cloud server, or described application program identification is present in the white list database of cloud server, return described application program identification to terminal to inquire about unsuccessfully. if it addition, the application identities in described the application list is present in described white list, then described application program identification transmission need not be inquired about to cloud server. last terminal receives the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist, if inquiring about unsuccessfully, then described application program identification is got rid of outside described blacklist.
Message processing module 304, for according to described blacklist, carrying out information processing to the application program in terminal.
In implementing, it is possible to application program newly installed in detection terminal; Described newly installed application program identification is compared with the application program identification in described blacklist; If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process; If described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process. Wherein, described information intercepting processes and includes not showing mount message, does not allow prompting informing message, does not allow pop-up advertisement, do not allow to use certain System Privileges, do not allow running background etc.
Optionally, it is possible to the application program installed in detection terminal; If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process. Wherein, described Advance data quality processes, and refers to informing message screening, processes self-starting item, and prompting unloading processes, background process termination free system resources etc.
Additionally, before Advance data quality process can being carried out before described newly installed application is carried out information intercepting process or to the described application program installed, can display reminding information, whether newly installed application is carried out information intercepting process for indicating user or the application program installed is optimized process by described information, if user's approval information intercept process or optimization process, then carry out intercept process or to optimization process, process or optimization process if user abandons information intercepting, then do not carry out intercept process or to optimization process.
Optionally, as it is shown on figure 3, the device in the embodiment of the present invention can also include:
Information sending module 305, for uploading to cloud server by the described blacklist determined. Server end collects the black list information that multiple terminals send, it is possible to make server information more comprehensively, it is possible to whether make a decision further is genuine blacklist, if not blacklist, white process can being added, being then pushed to client white list again, in order to avoid causing wrong report.
In embodiments of the present invention, first obtaining the white list for information processing, then obtain the application list in terminal, the application list includes comprising the application program identification installed in terminal; Secondly according to white list and application program identification list, it is determined that for the blacklist of information processing; Finally according to blacklist, the application program in terminal is carried out information processing. The blacklist for user terminal can be determined by the white list got, and then carry out information intercepting by this blacklist, thus the interception loss of raising efficiency and effectively reduction information.
Refer to the structural representation that Fig. 4, Fig. 4 are a kind of electronic equipments that the embodiment of the present invention proposes. As it can be seen, this electronic equipment may include that at least one processor 401, for instance CPU, at least one receptor 403, at least one memorizer 404, at least one transmitter 404, at least one communication bus 402. Wherein, communication bus 402 is for realizing the connection communication between these assemblies. Wherein, in the embodiment of the present invention, the receptor 403 of electronic equipment and transmitter 404 can be wired transmission ports, it is also possible to for wireless device, for instance include antenna assembly, for carrying out the communication of signaling or data with other node devices. Memorizer 404 can be high-speed RAM memorizer, it is also possible to be non-labile memorizer (non-volatilememory), for instance at least one disk memory.Memorizer 404 optionally can also is that at least one is located remotely from the storage device of aforementioned processor 401. Memorizer 404 stores batch processing code, and processor 401 is for calling the program code of storage in memorizer, is used for performing following operation:
Obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
Obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
According to described white list and described application program identification list, it is determined that for the blacklist of information processing;
According to described blacklist, the application program in terminal is carried out information processing.
Wherein, processor 401 is additionally operable to perform following operating procedure:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist.
Wherein, processor 401 is additionally operable to perform following operating procedure:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server;
Receive the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist.
Wherein, processor 401 is additionally operable to perform following operating procedure:
Application program newly installed in detection terminal;
Described newly installed application program identification is compared with the application program identification in described blacklist;
If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process, if described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process.
Wherein, processor 401 is additionally operable to perform following operating procedure:
The application program installed in detection terminal;
If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process.
Wherein, processor 401 is additionally operable to perform following operating procedure:
The described blacklist determined is uploaded to cloud server.
It should be noted that, for each embodiment of the method aforesaid, in order to be briefly described, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the present invention is not by the restriction of described sequence of movement, because according to the present invention, certain some step can adopt other orders or carry out simultaneously. Secondly, those skilled in the art also should know, embodiment described in this description belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, the part being not described in certain embodiment, it is possible to referring to the associated description of other embodiments.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment can be by the hardware that program carrys out instruction relevant and completes, this program can be stored in a computer-readable recording medium, storage medium may include that flash disk, read only memory are (English: Read-OnlyMemory, be called for short: ROM), random access device (English: RandomAccessMemory, RAM), disk or CD etc. be called for short:.
The content download method above embodiment of the present invention provided and relevant device, system are described in detail, principles of the invention and embodiment are set forth by specific case used herein, and the explanation of above example is only intended to help to understand method and the core concept thereof of the present invention; Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, all will change in specific embodiments and applications, in sum, this specification content should not be construed as limitation of the present invention.

Claims (10)

1. the information processing method based on blacklist, it is characterised in that described method includes:
Obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
Obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
According to described white list and described application program identification list, it is determined that for the blacklist of information processing;
According to described blacklist, the application program in terminal is carried out information processing.
2. the method for claim 1, it is characterised in that described according to described white list and described application program identification list, it is determined that the blacklist for information processing includes:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist.
3. the method for claim 1, it is characterised in that described according to described white list and the plurality of Apply Names having installed application, it is determined that the blacklist of information processing includes:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server;
Receive the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist.
4. the method as described in claim 1-3 any one, it is characterised in that described according to the described blacklist determined, carries out information processing to the application program in terminal and includes:
Application program newly installed in detection terminal;
Described newly installed application program identification is compared with the application program identification in described blacklist;
If described newly installed application program identification is not present in described blacklist, described newly installed application is not carried out information intercepting process, if described newly installed application program identification is present in described blacklist, described newly installed application is carried out information intercepting process.
5. the method as described in claim 1-3 any one, it is characterised in that described according to the described blacklist determined, carries out information processing to the application program in terminal and includes:
The application program installed in detection terminal;
If described application program identification is present in described blacklist, then described application program is carried out Advance data quality process.
6. the method for claim 1, it is characterised in that described method also includes:
The described blacklist determined is uploaded to cloud server.
7. the information processor based on blacklist, it is characterised in that described device includes:
Data obtaining module, for obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
List acquisition module, for obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
Information determination module, for according to described white list and described application program identification list, it is determined that for the blacklist of information processing;
Message processing module, for according to described blacklist, carrying out information processing to the application program in terminal.
8. device as claimed in claim 7, it is characterised in that described information determination module specifically for:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification is added in described blacklist.
9. device as claimed in claim 7, it is characterised in that described information determination module specifically for:
Application program identification in described white list is contrasted with the application program identification in described the application list;
If the application identities in described the application list is not present in described white list, then described application program identification transmission is inquired about to cloud server;
Receive the Query Result that described cloud server returns, if successful inquiring, described application program identification is added in described blacklist.
10. an electronic equipment, it is characterised in that including: processor, memorizer, communication interface and bus;
Described processor, described memorizer and described communication interface are connected by described bus and complete mutual communicating;
Described memorizer storage executable program code;
Described processor runs the program corresponding with described executable program code by reading the executable program code of storage in described memorizer, for:
Obtaining the white list for information processing, described white list includes instruction terminal and does not carry out the application program identification of information processing;
Obtaining the application list in terminal, described the application list includes comprising the application program identification installed in terminal;
According to described white list and described application program identification list, it is determined that for the blacklist of information processing;
According to described blacklist, the application program in terminal is carried out information processing.
CN201511026878.3A 2015-12-30 2015-12-30 Information processing method and device based on blacklist and electronic equipment Pending CN105653945A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511026878.3A CN105653945A (en) 2015-12-30 2015-12-30 Information processing method and device based on blacklist and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511026878.3A CN105653945A (en) 2015-12-30 2015-12-30 Information processing method and device based on blacklist and electronic equipment

Publications (1)

Publication Number Publication Date
CN105653945A true CN105653945A (en) 2016-06-08

Family

ID=56490096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511026878.3A Pending CN105653945A (en) 2015-12-30 2015-12-30 Information processing method and device based on blacklist and electronic equipment

Country Status (1)

Country Link
CN (1) CN105653945A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106354571A (en) * 2016-08-29 2017-01-25 北京小米移动软件有限公司 Message reminding method and device thereof
CN106682508A (en) * 2016-06-17 2017-05-17 腾讯科技(深圳)有限公司 Method and device for searching and killing viruses
CN106980661A (en) * 2017-03-20 2017-07-25 北京金山安全软件有限公司 Method and device for cleaning data files in mobile terminal and electronic equipment
CN107426173A (en) * 2017-06-06 2017-12-01 北京奇虎科技有限公司 File means of defence and device
CN108229169A (en) * 2018-01-15 2018-06-29 郑州云海信息技术有限公司 Newly-increased host security defense method and device based on management platform
CN112163221A (en) * 2020-09-22 2021-01-01 珠海市魅族科技有限公司 Virus detection, searching and killing method, device, medium and electronic equipment
CN114173291A (en) * 2021-11-29 2022-03-11 维沃移动通信有限公司 Data processing method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034808A (en) * 2012-11-30 2013-04-10 北京奇虎科技有限公司 Scanning method, equipment and system and cloud management method and equipment
CN103455520A (en) * 2012-06-04 2013-12-18 北京三星通信技术研究有限公司 Method and device for accessing Android database
CN104346457A (en) * 2014-10-31 2015-02-11 北京奇虎科技有限公司 Method for intercepting business object and browser client

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455520A (en) * 2012-06-04 2013-12-18 北京三星通信技术研究有限公司 Method and device for accessing Android database
CN103034808A (en) * 2012-11-30 2013-04-10 北京奇虎科技有限公司 Scanning method, equipment and system and cloud management method and equipment
CN104346457A (en) * 2014-10-31 2015-02-11 北京奇虎科技有限公司 Method for intercepting business object and browser client

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682508A (en) * 2016-06-17 2017-05-17 腾讯科技(深圳)有限公司 Method and device for searching and killing viruses
CN106682508B (en) * 2016-06-17 2019-01-11 腾讯科技(深圳)有限公司 The checking and killing method and device of virus
CN106354571A (en) * 2016-08-29 2017-01-25 北京小米移动软件有限公司 Message reminding method and device thereof
CN106354571B (en) * 2016-08-29 2019-12-27 北京小米移动软件有限公司 Message reminding method and device
CN106980661A (en) * 2017-03-20 2017-07-25 北京金山安全软件有限公司 Method and device for cleaning data files in mobile terminal and electronic equipment
CN107426173A (en) * 2017-06-06 2017-12-01 北京奇虎科技有限公司 File means of defence and device
CN107426173B (en) * 2017-06-06 2021-01-29 北京鸿享技术服务有限公司 File protection method and device
CN108229169A (en) * 2018-01-15 2018-06-29 郑州云海信息技术有限公司 Newly-increased host security defense method and device based on management platform
CN112163221A (en) * 2020-09-22 2021-01-01 珠海市魅族科技有限公司 Virus detection, searching and killing method, device, medium and electronic equipment
CN114173291A (en) * 2021-11-29 2022-03-11 维沃移动通信有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
CN105653945A (en) Information processing method and device based on blacklist and electronic equipment
CN108055264B (en) Scheduling apparatus and method for push streaming server, and computer-readable storage medium
CN103888619B (en) A kind of message treatment method and system thereof
CN108900388B (en) Method, apparatus, and medium for monitoring network quality
CN107302597B (en) Message file pushing method and device
CN103297468A (en) Operation method for group resources and group server
CN106686102B (en) Service node switching method and device
CN111038906B (en) Order sorting method and device
CN105516246A (en) Method for preventing application program downloading hijacking and server
CN103747010A (en) Method, system and device for controlling PC (personal computer) by mobile terminal
CN104168123A (en) Data push method, data server, client and data push system
CN111510466B (en) Data updating method and device for client, electronic equipment and readable medium
CN104021141A (en) Method, device and system for data processing and cloud service
CN108880972B (en) Information processing method, server and terminal
US20180248940A1 (en) Distributed data management
CN103973506A (en) Domain name verifying method, device and system
CN112596920A (en) Message processing method and device, electronic equipment and storage medium
CN107708076B (en) Method and device for pushing access information
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN105159692A (en) Application identifying method, application identifying device and server
CN109214846B (en) Information storage method and device
CN105302617A (en) Method and sever for downloading application program
CN108696557B (en) Information processing system, method and device
CN104754041A (en) Internet of things communication method and related devices
CN112825519B (en) Method and device for identifying abnormal login

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608

RJ01 Rejection of invention patent application after publication