CN106126310B - The method, apparatus and terminal that the installation of application program is optimized - Google Patents
The method, apparatus and terminal that the installation of application program is optimized Download PDFInfo
- Publication number
- CN106126310B CN106126310B CN201610687767.5A CN201610687767A CN106126310B CN 106126310 B CN106126310 B CN 106126310B CN 201610687767 A CN201610687767 A CN 201610687767A CN 106126310 B CN106126310 B CN 106126310B
- Authority
- CN
- China
- Prior art keywords
- application program
- particular category
- default
- installation
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
- G06F8/62—Uninstallation
Abstract
The invention discloses method, apparatus and terminal that the installation of a kind of pair of application program optimizes, wherein includes: the default access for obtaining operating system to the method that the installation of application program optimizes;Detect mounted application program;The application program of particular category is selected from mounted application program;Judge whether the application program of particular category matches with default list;If judgement obtains the application program of particular category and default list mismatches, acquired default access is utilized, the application program of particular category is deleted.Using technical solution provided by the invention, the installation of application program is optimized, helps to ensure the information security in terminal, the application program there are security risk is avoided to cause damages to user.
Description
Technical field
The present invention relates to Internet technical fields, and in particular to method that the installation of a kind of pair of application program optimizes,
Device and terminal.
Background technique
In order to meet the various needs of users, application developer develops a variety of application programs and selects and pacify for user
It is filled in the terminals such as mobile phone or PAD.Under normal circumstances, in addition to during terminal is installed with regard to mounted application program, user
Other application programs can also be easily installed in the terminal, however these application programs are very different, some application programs
Because designing the reasons such as not perfect, there is security risks, can by having if user has used the application program there are security risk
The user information in terminal can be revealed, is caused damages to user.
For example, user is accustomed to accessing network address by browser application mostly, checks webpage, however it is not all
Browser application all has the function of the interception of malice network address, if specific user (such as: minor) using without evil
The browser application that network address of anticipating intercepts function accesses network address, will likely touch malicious websites, and in malicious websites
Malice has been planted the rogue programs such as wooden horse, virus, has been also possible to comprising some harmful contents, once into these websites, it will
The programs such as wooden horse, the virus under planting in website are triggered, cause visitor's terminal infected, is faced and is lost account number or reveal hidden
The danger such as personal letter breath.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the method, apparatus and terminal of problem optimized to the installation of application program.
According to an aspect of the invention, there is provided the method that the installation of a kind of pair of application program optimizes, this method
Include:
Obtain the default access of operating system;
Detect mounted application program;
The application program of particular category is selected from mounted application program;
Judge whether the application program of particular category matches with default list;
If judgement obtains the application program of particular category and default list mismatches, acquired default access is utilized,
Delete the application program of particular category.
According to another aspect of the present invention, the device that the installation of a kind of pair of application program optimizes, the device are provided
Include:
Module is obtained, suitable for obtaining the default access of operating system;
Detection module is adapted to detect for mounted application program;
Selecting module, suitable for selecting the application program of particular category from mounted application program;
Judgment module, suitable for judging whether the application program of particular category matches with default list;
Removing module, if judging to obtain the application program and default list mismatch of particular category suitable for judgment module,
Using acquired default access, the application program of particular category is deleted.
According to another aspect of the invention, a kind of terminal is provided, is carried out including the above-mentioned installation to application program excellent
The device of change.
The technical solution provided according to the present invention obtains the default access of operating system, detects mounted application program,
Then then the application program that particular category is selected from mounted application program judges that the application program of particular category is
It is no to be matched with default list, in the case where judgement obtains the application program and the unmatched situation of default list of particular category, utilize institute
The default access of acquisition deletes the application program of particular category.It, can be acquired in using technical solution provided by the invention
Default access easily delete the application program in terminal with the unmatched particular category of default list, to optimize application
The installation of program helps to ensure the information security in terminal, the application program there are security risk is avoided to cause to damage to user
It loses.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
The process that Fig. 1 shows the method that the installation according to an embodiment of the invention to application program optimizes is shown
It is intended to;
Fig. 2 shows the processes for the method that the installation in accordance with another embodiment of the present invention to application program optimizes
Schematic diagram;
Fig. 3 shows the structural frames for the device that the installation according to an embodiment of the invention to application program optimizes
Figure;
Fig. 4 shows the structure for the device that the installation in accordance with another embodiment of the present invention to application program optimizes
Block diagram.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
The process that Fig. 1 shows the method that the installation according to an embodiment of the invention to application program optimizes is shown
It is intended to, this method can be applied in the terminals such as mobile phone, PAD, as shown in Figure 1, this method comprises the following steps:
Step S100 obtains the default access of operating system.
Specifically, the platform signature that can obtain operating system is then based on the default power that platform signature obtains operating system
Limit.Wherein, platform signature be terminal production firm in the system of offer with the signature of highest permission, generally internal system makes
With consumer can not check.Technical solution of the present invention can pass through some programs of subregion by brushing into recovery subregion
Obtain high permission.
Step S101 detects mounted application program.
Under normal circumstances, in addition to, with regard to mounted application program, user can also easily exist during terminal is installed
Other application programs are installed in terminal.It is optimized in order to the installation to application program, obtains behaviour in step S100
After making the default access of system, in step s101, mounted application program is detected.
Step S102 selects the application program of particular category from mounted application program.
The technical scheme is that the installation for the application program of particular category optimizes, therefore in step S101
After completing to the detection of mounted application program, in step s 102, certain kinds are selected from mounted application program
Other application program.
Those skilled in the art can according to actual needs be configured particular category, herein without limitation.For example, specific
The application program of classification is that the application program of the classification of security risk possible is brought to the terminal of user.Specifically, particular category
Application program can be browser application.Due to user be accustomed to mostly by browser application access network address, look into
See webpage, however not all browser application all has the function of the interception of malice network address, if user is especially not
The specific users such as adult use the browser application for intercepting function without malice network address to access network address, will likely
Touch malicious websites.Therefore, intercepting the browser application of function without malice network address is answering there are security risk
Use program.
Step S103, judges whether the application program of particular category matches with default list;If so, this method terminates;
If it is not, thening follow the steps S104.
In step S102 after selecting the application program of particular category in mounted application program, in step S103
Whether the middle application program for judging particular category matches with default list.Wherein, developed particular category can be answered in advance
It is authenticated with program, security level is arranged according to the application program that authentication result is these particular categories, it is white for presetting list
List, default list include: the application program that security level is greater than pre-set level threshold value, wherein those skilled in the art can root
According to actual requirement, pre-set level threshold value is set.That is, include in default list is by certification, safe and reliable answers
Use program.
Specifically, default list can be supplied to terminal by server, and server is periodically or non-periodically in terminal
Default list is updated.In addition, terminal can also be communicated directly with server, default list is inquired by server, is sentenced
Whether disconnected application to be installed matches with default list, and judging result is then sent to terminal.
If it is determined that the application program for obtaining particular category is matched with default list, illustrate mounted certain kinds in terminal
Other application program is safe and reliable application program, then without deleting application program, this method terminates;If it is determined that
The application program and default list for obtaining particular category mismatch, and illustrate that the application program of mounted particular category in terminal is
There may be the application programs of security risk, then follow the steps S104.
Step S104 deletes the application program of particular category using acquired default access.
In the case where judging to obtain the application program and the unmatched situation of default list of particular category through step S103, illustrate end
The application program of mounted particular category is that there may be the application programs of security risk in end, then is preset using acquired
Permission, deletes the application program of the particular category, to optimize the installation of application program, avoids the application there are security risk
Program causes damages to user.
According to the method that the installation provided in this embodiment to application program optimizes, the default power of operating system is obtained
Limit, detects mounted application program, the application program of particular category is then selected from mounted application program, then
Judge whether the application program of particular category matches with default list, obtains the application program and default name of particular category in judgement
In single unmatched situation, using acquired default access, the application program of particular category is deleted.Using provided by the invention
Technical solution, can using acquired default access easily delete in terminal with the unmatched particular category of default list
Application program helps to ensure the information security in terminal to optimize the installation of application program, avoids that there are security risks
Application program cause damages to user.
Fig. 2 shows the processes for the method that the installation in accordance with another embodiment of the present invention to application program optimizes
Schematic diagram, this method can be applied in the terminals such as mobile phone, PAD, as shown in Fig. 2, this method comprises the following steps:
Step S200 installs specified application, and specified application label is signed at platform.
Due to platform signature be terminal production firm in the system that provides with the signature of highest permission, then installation is specified
Application program, and specified application label are signed at platform, specified application is just provided with the corresponding permission of platform signature.
That is, specified application is provided with the highest permission in operating system.
Step S201 detects mounted application program.
It is optimized in order to the installation to application program, in step s 201, detects mounted application program.Its
In, mounted application program includes the application journey of mounted application program and user oneself installation during terminal installation
Sequence.
Step S202 selects the application program of particular category from mounted application program.
The technical scheme is that the installation for the application program of particular category optimizes, therefore in step S201
After completing to the detection of mounted application program, in step S202, certain kinds are selected from mounted application program
Other application program.Those skilled in the art can according to actual needs be configured particular category, herein without limitation.Example
Such as, the application program of particular category is browser application.
Step S203, judges whether the application program of particular category matches with default list;If so, this method terminates;
If it is not, thening follow the steps S204.
In step S202 after selecting the application program of particular category in mounted application program, in step S203
Whether the middle application program for judging particular category matches with default list.Wherein, presetting list is white list, presets list packet
Include: security level is greater than the application program of pre-set level threshold value, that is to say, that include in default list be by certification,
Safe and reliable application program.If it is determined that the application program for obtaining particular category is matched with default list, illustrate in terminal
The application program of the particular category of installation is safe and reliable application program, then without deleting application program, this method
Terminate;If it is determined that obtaining the application program and default list mismatch of particular category, illustrate mounted certain kinds in terminal
Other application program is to then follow the steps S204 there may be the application program of security risk.
For example, the application program of particular category is browser application, presetting includes browser application in list
1, browser application 2 and browser application 3, wherein browser application 1, browser application 2 and clear
Device application program 3 of looking at is by certification, safe and reliable browser application.If from mounted in step S202
Browser application is selected in application program, it is chosen to obtain mounted browser application as browser application journey
Sequence 4 thens follow the steps S204 then judging to obtain browser application 4 and default list mismatch through step S203.
Step S204, to user's sending application program safety prompt information.
In the case where judging to obtain the application program and the unmatched situation of default list of particular category through step S203, illustrate end
The application program of mounted particular category is that there may be the application programs of security risk in end, then to user's sending application journey
Sequence safety instruction information, to prompt the user application program, there may be security risks.Wherein, those skilled in the art can root
The particular content of application security prompt information is configured with presentation mode according to actual needs, herein without limitation.With
Family operates the application program in combination with actual demand, such as selection deletes the application program or retains this using journey
Sequence.If user selects to retain the application program, which can be temporarily added to default list.
Step S205 deletes the application journey of particular category based on the corresponding permission of platform signature according to user's operation information
Sequence.
If according to user's operation information it is found that user selects to delete the application program of the particular category, in step
In S205, the application program of the particular category is deleted based on the corresponding permission of platform signature according to user's operation information, thus
The installation for optimizing application program avoids the application program there are security risk from causing damages to user.
According to the method that the installation provided in this embodiment to application program optimizes, the platform label of operating system are obtained
Name is signed based on platform and obtains the default access of operating system, mounted application program detected, then from mounted application
The application program of particular category is selected in program, then judges whether the application program of particular category matches with default list,
In the case where judgement obtains the application program and the unmatched situation of default list of particular category, mentioned to user's sending application program safety
Show information, the application program of particular category is deleted based on the corresponding permission of platform signature according to user's operation information.Utilize this
The technical solution provided is provided, the application program of mounted particular category and default list can not only be mismatched in the terminal
In the case where, to user's sending application program safety prompt information, it is hidden that there may be safety to prompt the user application program
Suffer from, additionally it is possible to according to user's operation information, easily be deleted based on the corresponding permission of platform signature unmatched with default list
The application program of particular category helps to ensure the information security in terminal, avoids depositing to optimize the installation of application program
It causes damages in the application program of security risk to user.
Fig. 3 shows the structural frames for the device that the installation according to an embodiment of the invention to application program optimizes
Figure, the device may be provided in the terminals such as mobile phone, PAD, as shown in figure 3, the device includes: to obtain module 310, detection module
320, selecting module 330, judgment module 340 and removing module 350.
It obtains module 310 to be suitable for: obtaining the default access of operating system.
Specifically, the platform signature that module 310 obtains operating system is obtained, platform signature is then based on and obtains operating system
Default access.
Detection module 320 is suitable for: detecting mounted application program.
It is optimized in order to the installation to application program, detection module 320 detects mounted application program.
Selecting module 330 is suitable for: the application program of particular category is selected from mounted application program.
Specifically, the application program of particular category can be browser application, then selecting module 330 is from having pacified
Browser application is selected in the application program of dress.
Judgment module 340 is suitable for: judging whether the application program of particular category matches with default list.
Wherein, default list can be supplied to terminal by server, and specifically, presetting list is white list, preset list
It include: the application program that security level is greater than pre-set level threshold value, that is to say, that include is by certification in default list
, safe and reliable application program.If it is determined that module 340 judges to obtain the application program of particular category and default list
Match, then illustrates that the application program of mounted particular category in terminal is safe and reliable application program;If it is determined that module 340
Judgement obtains the application program of particular category and default list mismatches, and illustrates the application journey of mounted particular category in terminal
Sequence is that there may be the application programs of security risk.
Removing module 350 is suitable for: if judgment module 340 does not judge the application program for obtaining particular category and default list not
Match, then utilizes acquired default access, delete the application program of particular category.
If it is determined that module 340 judges that obtaining the application program of particular category and default list mismatches, and illustrates in terminal
The application program of mounted particular category is that there may be the application programs of security risk, then triggers removing module 350, is utilized
Acquired default access, deletes the application program of particular category, to optimize the installation of application program, avoids the presence of safety
The application program of hidden danger causes damages to user.
According to the device that the installation provided in this embodiment to application program optimizes, obtains module and obtain operating system
Default access, detection module detects mounted application program, and selecting module selects spy from mounted application program
Determine the application program of classification, judgment module judges whether the application program of particular category matches with default list, if it is determined that mould
Block judges to obtain the application program of particular category and default list mismatches, and removing module utilizes acquired default access, deletes
Except the application program of particular category.It, can be using acquired default access easily using technical solution provided by the invention
It deletes in terminal and is helped with the application program of the unmatched particular category of default list to optimize the installation of application program
In ensureing the information security in terminal, the application program there are security risk is avoided to cause damages to user.
Fig. 4 shows the structure for the device that the installation in accordance with another embodiment of the present invention to application program optimizes
Block diagram, the device may be provided in the terminals such as mobile phone, PAD, as shown in figure 4, the device includes: to obtain module 410, detection module
420, selecting module 430, judgment module 440, cue module 450 and removing module 460.
Module 410 is obtained to be suitable for: installation specified application, and specified application label are signed at platform.
It obtains module 410 and specified application is installed, and specified application label are signed at platform, then specified application
Program is just provided with the corresponding permission of platform signature.That is, specified application is provided with the highest weight in operating system
Limit.
Detection module 420 is suitable for: detecting mounted application program.
Selecting module 430 is suitable for: the application program of particular category is selected from mounted application program.
Wherein, the application program of particular category is browser application.
Judgment module 440 is suitable for: judging whether the application program of particular category matches with default list.
Wherein, presetting list is white list, and default list includes: the application journey that security level is greater than pre-set level threshold value
Sequence, i.e., include in default list is by certification, safe and reliable application program.If it is determined that the judgement of module 440 obtains
The application program of particular category is matched with default list, then illustrates the application program of mounted particular category in terminal for safety
Reliable application program;If it is determined that module 440 judges that obtaining the application program of particular category and default list mismatches, and says
The application program of mounted particular category is that there may be the application programs of security risk in bright terminal.
Cue module 450 is suitable for: if judgment module 440 does not judge the application program for obtaining particular category and default list not
Match, to user's sending application program safety prompt information.
If it is determined that module 440 judges that obtaining the application program of particular category and default list mismatches, and illustrates in terminal
The application program of mounted particular category is cue module 450 to be triggered, to user there may be the application program of security risk
Sending application program safety prompt information, to prompt the user application program, there may be security risks.User is in combination with real
Border demand operates the application program, and selection deletes the application program or retains the application program.If user selects
Retain the application program, then the application program can be temporarily added to default list.
Removing module 460 is suitable for: deleting particular category based on the corresponding permission of platform signature according to user's operation information
Application program.
If according to user's operation information it is found that user select delete application program, removing module 460 according to
Family operation information deletes the application program of particular category, to optimize application program based on the corresponding permission of platform signature
Installation, avoids the application program there are security risk from causing damages to user.That is, removing module 460 is grasped according to user
Make information, using acquired default access, deletes the application program of particular category.
According to the device that the installation provided in this embodiment to application program optimizes, obtains module and obtain operating system
Platform signature, signed based on platform and obtain the default access of operating system, detection module detects mounted application program, choosing
The application program that module selects particular category from mounted application program is selected, judgment module judges the application of particular category
Whether program matches with default list, if it is determined that application program that module judges to obtain particular category and default list are not
Match, then cue module is based on platform according to user's operation information to user's sending application program safety prompt information, removing module
It signs corresponding permission, deletes the application program of particular category.It, can not only be in terminal using technical solution provided by the invention
In mounted particular category application program and the unmatched situation of default list under, mentioned to user's sending application program safety
Show information, there may be security risks to prompt the user application program, additionally it is possible to according to user's operation information, be based on platform
Corresponding permission of signing easily is deleted and the application program of the unmatched particular category of default list, to optimize using journey
The installation of sequence helps to ensure the information security in terminal, the application program there are security risk is avoided to cause damages to user.
The present invention also provides a kind of terminal, which includes the dress that the above-mentioned installation to application program optimizes
It sets.Technical solution provided by the invention can be deleted easily in terminal and default by the default access of acquisition operating system
The application program of the unmatched particular category of list helps to ensure the letter in terminal to optimize the installation of application program
Breath safety, avoids the application program there are security risk from causing damages to user.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) realize one of some or all components according to embodiments of the present invention
A little or repertoire.The present invention is also implemented as setting for executing some or all of method as described herein
Standby or program of device (for example, computer program and computer program product).It is such to realize that program of the invention deposit
Storage on a computer-readable medium, or may be in the form of one or more signals.Such signal can be from because of spy
It downloads and obtains on net website, be perhaps provided on the carrier signal or be provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (11)
1. the method that the installation of a kind of pair of application program optimizes, installation of the method for the application program of particular category
It optimizes, comprising:
Obtain the default access of operating system;
Detect mounted application program;
The application program of particular category is selected from the mounted application program;Wherein, the application of the particular category
Program is the application program for the classification that the doubtful terminal to user brings security risk;
Judge whether the application program of the particular category matches with default list;
If judgement obtains the application program of the particular category and the default list mismatches, acquired default power is utilized
Limit, deletes the application program of the particular category.
2. according to the method described in claim 1, the default access for obtaining operating system further comprises:
Obtain the platform signature of operating system;
The default access of the operating system is obtained based on platform signature.
3. method according to claim 1 or 2, the default access for obtaining operating system further comprises: installation refers to
Determine application program, and the specified application label are signed at platform;
It is described using acquired default access, delete the application program of the particular category specifically:
Based on the corresponding permission of platform signature, the application program of the particular category is deleted.
4. method according to claim 1 or 2 obtains the application program and the default name of the particular category in judgement
After single mismatch, the method also includes:
To user's sending application program safety prompt information;
It is described using acquired default access, delete the application program of the particular category specifically: believe according to user's operation
Breath, using acquired default access, deletes the application program of the particular category.
5. method according to claim 1 or 2, the default list includes: that security level is greater than pre-set level threshold value
Application program.
6. the device that the installation of a kind of pair of application program optimizes, described device is used to be directed to the application program of particular category
Installation optimizes, comprising:
Module is obtained, suitable for obtaining the default access of operating system;
Detection module is adapted to detect for mounted application program;
Selecting module, suitable for selecting the application program of particular category from the mounted application program;Wherein, the spy
The application program for determining classification is the application program for the classification that the doubtful terminal to user brings security risk;
Judgment module, suitable for judging whether the application program of the particular category matches with default list;
Removing module, if judging the application program for obtaining the particular category and the default list not suitable for the judgment module
Matching then utilizes acquired default access, deletes the application program of the particular category.
7. device according to claim 6, the acquisition module is further adapted for:
Obtain the platform signature of operating system;
The default access of the operating system is obtained based on platform signature.
8. device according to claim 6 or 7, the acquisition module is further adapted for: installation specified application, and will
The specified application label are signed at platform;
The removing module is further adapted for: based on the corresponding permission of platform signature, deleting the application program of the particular category.
9. device according to claim 6 or 7, described device further include: cue module, if sentencing suitable for the judgment module
The disconnected application program for obtaining particular category and default list mismatch, to user's sending application program safety prompt information;
The removing module is further adapted for: being deleted described specific according to user's operation information using acquired default access
The application program of classification.
10. device according to claim 6 or 7, the default list includes: that security level is greater than pre-set level threshold value
Application program.
11. a kind of terminal, the device that the installation including such as described in any item pairs of application programs of claim 6-10 optimizes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610687767.5A CN106126310B (en) | 2016-08-18 | 2016-08-18 | The method, apparatus and terminal that the installation of application program is optimized |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610687767.5A CN106126310B (en) | 2016-08-18 | 2016-08-18 | The method, apparatus and terminal that the installation of application program is optimized |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106126310A CN106126310A (en) | 2016-11-16 |
CN106126310B true CN106126310B (en) | 2019-08-20 |
Family
ID=57279179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610687767.5A Active CN106126310B (en) | 2016-08-18 | 2016-08-18 | The method, apparatus and terminal that the installation of application program is optimized |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106126310B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101950336A (en) * | 2010-08-18 | 2011-01-19 | 奇智软件(北京)有限公司 | Method and device for removing malicious programs |
CN103646215A (en) * | 2013-12-23 | 2014-03-19 | 北京奇虎科技有限公司 | Application installation control method, related system and related device |
CN103679029A (en) * | 2013-12-11 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for repairing cheap-copy application programs |
CN105653964A (en) * | 2015-12-24 | 2016-06-08 | 北京奇虎科技有限公司 | Terminal device operation controlling method and apparatus |
CN105791250A (en) * | 2014-12-26 | 2016-07-20 | 北京奇虎科技有限公司 | Application detection method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4419977B2 (en) * | 2006-03-31 | 2010-02-24 | ブラザー工業株式会社 | Program creation device and program |
-
2016
- 2016-08-18 CN CN201610687767.5A patent/CN106126310B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101950336A (en) * | 2010-08-18 | 2011-01-19 | 奇智软件(北京)有限公司 | Method and device for removing malicious programs |
CN103679029A (en) * | 2013-12-11 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for repairing cheap-copy application programs |
CN103646215A (en) * | 2013-12-23 | 2014-03-19 | 北京奇虎科技有限公司 | Application installation control method, related system and related device |
CN105791250A (en) * | 2014-12-26 | 2016-07-20 | 北京奇虎科技有限公司 | Application detection method and device |
CN105653964A (en) * | 2015-12-24 | 2016-06-08 | 北京奇虎科技有限公司 | Terminal device operation controlling method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106126310A (en) | 2016-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104009977B (en) | A kind of method and system of information protection | |
EP3085050B1 (en) | Privileged static hosted web applications | |
CN104091125B (en) | Handle the method and suspended window processing unit of suspended window | |
CN104685510B (en) | Recognition application whether be rogue program method, system and storage medium | |
CN104301302B (en) | Go beyond one's commission attack detection method and device | |
CN103632100B (en) | A kind of website vulnerability detection method and device | |
CN104517054B (en) | Method, device, client and server for detecting malicious APK | |
CN102957694B (en) | A kind of method and device judging fishing website | |
CN104050417B (en) | A kind of method and device detected in mobile terminal to application state | |
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN103117893B (en) | A kind of monitoring method of network access behavior, device and a kind of client device | |
CN104243214B (en) | A kind of method, apparatus and system of data processing | |
CN106550031A (en) | The method and device of data backup | |
CN105303100A (en) | Verification method and device of application program startup | |
CN109194615A (en) | A kind of method, apparatus and computer equipment of detection device vulnerability information | |
CN108769070A (en) | One kind is gone beyond one's commission leak detection method and device | |
CN103986731A (en) | Method and device for detecting phishing web pages through picture matching | |
CN104462985A (en) | Detecting method and device of bat loopholes | |
CN109885037A (en) | A kind of method and relevant device of vehicle diagnostics | |
CN106157109A (en) | price comparing method, device and terminal | |
CN102946391B (en) | The method of prompting malice network address and a kind of browser in a kind of browser | |
CN103491189B (en) | Method and wireless terminal based on the linkage detection client software installment state of high in the clouds and wireless terminal | |
CN105162804A (en) | Communication information protection method and apparatus | |
CN106357684A (en) | Login method and device of game application | |
CN106126310B (en) | The method, apparatus and terminal that the installation of application program is optimized |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220715 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |