CN106325898B - Software upgrading method and system - Google Patents
Software upgrading method and system Download PDFInfo
- Publication number
- CN106325898B CN106325898B CN201510349528.4A CN201510349528A CN106325898B CN 106325898 B CN106325898 B CN 106325898B CN 201510349528 A CN201510349528 A CN 201510349528A CN 106325898 B CN106325898 B CN 106325898B
- Authority
- CN
- China
- Prior art keywords
- upgrading
- data file
- proportion
- upgrade
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a software upgrading method, which comprises the following steps: acquiring an upgrading inquiry command sent by a terminal; judging whether software upgrading is needed or not according to the upgrading inquiry command, if so, acquiring a latest updated data file, and sending the data file to the terminal so that the terminal realizes software upgrading according to the data file; wherein the data file is a data file used by a logic file for realizing software functions. By adopting the method, network resources can be saved. In addition, a software upgrading system is also provided.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a software upgrading method and system.
Background
At present, the software upgrading mode is mostly realized by downloading an update package and installing the update package, wherein the update package comprises logic for realizing the functions of the software and used data. For example, for antivirus software, the logic for antivirus is usually implemented by a script language, and when the antivirus software needs to be upgraded, the whole script file needs to be updated in the conventional manner. Even if the update change of the software is small each time, the update mode needs to transmit a complete update packet containing logic and data, which causes waste of network resources.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a software upgrading method and system that can save network resources.
A method of software upgrade, the method comprising:
acquiring an upgrading inquiry command sent by a terminal;
judging whether software upgrading is needed according to the upgrading inquiry command, if so, judging whether the software upgrading is needed
Acquiring a latest updated data file, and sending the data file to the terminal to enable the terminal to realize software upgrading according to the data file;
wherein the data file is a data file used by a logic file for realizing software functions.
A software upgrade system, the system comprising:
the command receiving module is used for acquiring an upgrading inquiry command sent by the terminal;
the upgrading judging module is used for judging whether software upgrading is needed or not according to the upgrading inquiry command;
the upgrading module is used for acquiring a latest updated data file, and sending the data file to the terminal so that the terminal can realize software upgrading according to the data file;
wherein the data file is a data file used by a logic file for realizing software functions.
According to the software upgrading method and system, when the software is judged to need to be upgraded, only the data files used by the logic files for realizing the software functions are provided for the terminal so as to realize software upgrading.
Drawings
FIG. 1A is a system architecture diagram illustrating a method for upgrading application software, according to one embodiment;
FIG. 1B is a diagram of a system architecture for a method for upgrading application software in another embodiment;
FIG. 2 is an internal schematic diagram of a server in one embodiment;
FIG. 3 is a flow diagram of a method for software upgrade in one embodiment;
FIG. 4 is a flow diagram of a method for software upgrade in another embodiment;
FIG. 5 is a block diagram that illustrates the architecture of the software upgrade system in one embodiment;
fig. 6 is a schematic structural diagram of a software upgrading system in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The software upgrading method provided by the embodiment of the present invention may be applied to the system shown in fig. 1A, as shown in fig. 1A, the terminal 110 communicates with the server 120 through a network, the terminal 110 installs and runs software, and the server 120 stores a preconfigured latest updated data file, which is used by a logic file for the software in the terminal 110 to implement its function. For example, for virus checking software, the data file may be a data file used by a virus detection script, which includes data such as virus characteristics. Further, the terminal 110 sends an upgrade query command to the server 120, after receiving the upgrade query command, the server 120 determines whether software upgrade is required according to the upgrade query command, and if the software upgrade is required, acquires a newly updated data file configured in advance, and sends the data file to the terminal 110, so that the terminal 110 realizes software upgrade according to the data file.
Further, the software upgrading method provided by the embodiment of the present invention may also be applied to the system shown in fig. 1B. As shown in fig. 1B, the server 120 includes an upgrade server 120a and a configuration server 120B, the upgrade server 120a communicates with the terminal 110 through a network to provide a latest updated data file for software upgrade on the terminal 110, the configuration server 120B communicates with the management terminal 130 through the network, a developer can configure the data file through the management terminal 130, and the configured data file can be stored in the configuration server 1206B in an encrypted manner and pushed to the upgrade server 120 a.
In one embodiment, the internal architecture of the server 120 or upgrade server 120a of FIG. 1A is shown in FIG. 2, which includes a processor, storage media, memory, and network interfaces connected by a system bus. The storage medium of the server stores an operating system, a database and a software upgrading system, wherein the database is used for storing data, such as latest updated data files and the like, and the system is used for realizing a software upgrading method. The processor of the server is used for providing calculation and control capacity and supporting the operation of the whole access server. The memory of the server provides an environment for the operation of the software upgrade system in the storage medium. The network interface of the server is used for communicating with an external terminal or server through a network connection, such as receiving an upgrade inquiry command sent by the terminal 110 or a data file pushed by a management terminal or a configuration server.
As shown in fig. 3, in an embodiment, a software upgrading method is provided, which can be applied to the server shown in fig. 1A or the upgrading server shown in fig. 1B, and specifically includes the following steps:
In this embodiment, the terminal may initiate an upgrade request through the software application interface, where the upgrade request may be an upgrade request dynamically initiated to the server at each preset time in the software running process, or may be an upgrade request initiated through an upgrade button provided by the software application interface or a specific function button, and the terminal sends an upgrade inquiry command to the server according to the upgrade request to determine whether the upgrade can be implemented.
And step 304, judging whether software upgrading is needed or not according to the upgrading inquiry command, if so, entering step 306, and otherwise, not upgrading.
Specifically, the upgrade inquiry command includes multiple types, such as a general upgrade command, a specific upgrade command, and the like, and the processing modes corresponding to different types of upgrade inquiry commands will be different.
And step 306, acquiring the latest updated data file, and sending the data file to the terminal, so that the terminal realizes software upgrading according to the data file.
In this embodiment, the data file is a data file used for a logic file for implementing a software function, the data file is pre-stored in the server, when the server receives an upgrade inquiry command sent by the terminal and determines that software running in the terminal needs to be upgraded, the latest updated data file is obtained and sent to the terminal, and the terminal receives the data file and upgrades the software according to the data file.
In this embodiment, when it is determined that software needs to be upgraded, only the data file used by the logic file for implementing the software function is provided to the terminal to implement software upgrade.
In one embodiment, the step of determining whether software upgrade is required according to the upgrade inquiry command includes: detecting the type of an upgrading inquiry command, if the type of the upgrading inquiry command is a common upgrading command, acquiring an upgrading proportion after upgrading, and comparing the acquired upgrading proportion with a preset upgrading proportion; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
In this embodiment, the common upgrade command is different from the specific special upgrade command, and may be an upgrade command that is periodically initiated by the terminal to the server in the process of running the software, for example, an upgrade inquiry command is initiated to the server at preset intervals, and the server determines whether the software running at the terminal needs to be upgraded, for example, whether the software is the latest version according to the version number. When the server determines that the received common upgrading command is a common upgrading command, the upgrading proportion after the upgrading is calculated, whether the upgrading proportion after the upgrading exceeds the preset upgrading proportion or not is judged, if not, the upgrading is needed, and otherwise, the upgrading is not needed.
Further, the upgrade proportion after the upgrade may be calculated according to the terminal IP address and the version number of the software client, for example, according to a preset function y-hash (IP address, client version number), and y is guaranteed to be within a range of (1, 100), so that y calculated according to the function is the upgrade proportion after the upgrade. And comparing the upgrading proportion with a preset upgrading proportion, if the upgrading proportion exceeds the preset upgrading proportion, indicating that the current upgrading user is saturated, judging that the upgrading is not carried out, and if the upgrading proportion does not exceed the preset upgrading proportion, indicating that the network resources can also meet the upgrading of the user, and judging that the upgrading is required.
In the embodiment, when the server receives a common upgrading command, whether the upgrading is carried out is determined according to the preset upgrading proportion, and the upgrading is carried out only under the condition that the calculated upgrading proportion does not exceed the preset upgrading proportion, so that a large number of users are prevented from upgrading at the same time, network resources are saved, and the upgrading speed of software is ensured.
In one embodiment, the step of determining whether software upgrade is required according to the upgrade inquiry command includes: detecting the type of an upgrade inquiry command; if the type of the upgrading inquiry command is the appointed upgrading command, further judging whether the preset upgrading proportion exceeds a preset threshold value, and if so, judging that the upgrading is needed.
In this embodiment, the specific upgrade command refers to a predetermined specific upgrade command, and such a command is different from a general upgrade command, for example, the specific upgrade command may be an upgrade command triggered when a specific function of software is specified, or an upgrade command generated when a specific button in the software is triggered. And if the preset upgrading ratio exceeds the preset threshold value, the preset upgrading ratio is indicated to be large enough to meet the current upgrading requirement, and the upgrading is directly judged to be needed. If the preset upgrading proportion does not exceed the preset threshold, the preset upgrading proportion is indicated to be incapable of meeting the current upgrading requirement, and upgrading is not conducted or other data processing is conducted.
Further, in an embodiment, the step of determining whether software upgrade is required according to the upgrade inquiry command further includes: if the preset upgrading proportion does not exceed the preset threshold value, further acquiring the upgraded upgrading proportion, and comparing the size of the acquired upgrading proportion with the size of the preset upgrading proportion; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
In this embodiment, if the preset upgrade proportion does not exceed the preset threshold, it is indicated that the preset upgrade proportion cannot meet the current upgrade requirement, the upgrade proportion after the upgrade is further calculated, as described above, the upgrade proportion after the upgrade may be calculated according to the terminal IP address and the version number of the software client, and the calculated upgrade proportion is compared with the preset upgrade proportion to determine whether the user currently upgraded is saturated, if the calculated upgrade proportion does not exceed the preset upgrade proportion, it is indicated that the preset upgrade proportion covers the user currently upgraded, it is determined that the upgrade needs to be performed, otherwise, it is indicated that the preset upgrade proportion cannot cover the user currently upgraded, and it is determined that the upgrade is not performed.
In the embodiment, as for the specified upgrading command, as long as the preset upgrading proportion exceeds the preset threshold, the user can directly upgrade whether in the covered preset upgrading proportion, and the rapid upgrading of the specified upgrading command is ensured. When the preset upgrading proportion does not exceed the preset threshold value, only the users covered with the preset upgrading proportion can upgrade, so that the upgrading speed is guaranteed, the relatively stable upgrading flow is guaranteed, and a large number of users are prevented from upgrading at the same time.
In one embodiment, the software upgrade method further comprises: configuring data required by software upgrading; packing the configured data to generate a latest updated data file; and encrypting and storing the generated data file.
In this embodiment, a developer may configure a data file through the management terminal, for example, configure the data file through a Web page, where the data file includes data used by a logic file for implementing a function of the data file through software. And packaging the configured data to generate a data file, and then encrypting the generated data file. Specifically, the generated data file may be encrypted by using an asymmetric encryption algorithm. For example, the hash value calculation is performed on the generated data file, and then the calculated hash value is encrypted by the private key of the asymmetric key algorithm and stored.
Further, the encrypted data file can be pushed to an upgrade server, the difference between the newly generated data file and the historical data file is calculated, and the difference and the complete data file are stored in the upgrade server. And the terminal receives the latest updated data file sent by the upgrade server, calculates the hash value of the data file, decrypts the received data file by using the public key of the asymmetric encryption algorithm, and if the two are consistent, the data file is indicated to be not tampered. By encrypting the data file, the terminal receives the data file and verifies the data file first, so that the safety is improved.
In an embodiment, as shown in fig. 4, a software upgrading method is provided, where the method may be applied to a server shown in fig. 1A or an upgrading server shown in fig. 1B, and specifically includes:
In this embodiment, the upgrade inquiry command sent by the terminal includes a normal upgrade command and a specified upgrade command, where the normal upgrade command may be a normal upgrade request initiated to the server at each preset time. The specified upgrade command may be an upgrade command that is triggered when a particular function of the software is specified, or an upgrade command that is generated when a particular button in the software is triggered. Taking virus checking software as an example for explanation, the common upgrade command may be an upgrade request initiated by the terminal to the server according to a preset time interval when the virus checking software is running, and the server receives the common upgrade command sent by the terminal. When the user starts specific antivirus through the application interface of the antivirus software, the terminal sends a specified upgrading command to the server.
In this embodiment, the preset upgrade proportion and the preset threshold are both preset and can be dynamically adjusted, if the preset upgrade proportion exceeds the preset threshold, it indicates that the preset upgrade proportion is large enough to meet the current upgrade requirement, otherwise, the current upgrade requirement cannot be met.
And step 408, judging whether the upgraded upgrading ratio exceeds a preset upgrading ratio, if so, ending, otherwise, entering step 410.
In this embodiment, if a common upgrade command is received or the preset upgrade proportion does not exceed the preset threshold, it is further determined whether the upgraded upgrade proportion exceeds the preset upgrade proportion. And if the upgraded upgrading ratio exceeds the preset upgrading ratio, the preset upgrading ratio cannot cover the current user, the upgrading is not carried out, and the process is ended.
And step 410, upgrading.
In this embodiment, if the preset upgrade ratio exceeds the preset threshold, or the upgraded upgrade ratio does not exceed the preset upgrade ratio, it indicates that the current user may upgrade. Specifically, the server acquires the latest and more specific data file, and sends the data file to the terminal, and the terminal realizes software upgrading according to the received data file.
Taking virus searching software as an example for explanation, searching and killing malicious software (virus) is usually realized through a script language, so that the virus searching and killing realized by the virus searching and killing software is realized through a script file. The data file used by the script file includes virus characteristic data. Conventionally, virus signature data is written directly into code in a script file, so that the data and code are coupled together. In the embodiment of the invention, the data file is separated from the script file, and the characteristics are separated from the codes.
Specifically, data used for searching and killing viruses, that is, virus characteristic data, including paths, file names, registry keys and the like of malicious software, may be configured in advance. And the configuration server packages the configured data to generate a data file, performs hash value calculation on the generated data file, encrypts the hash value of the data file by using a private key, and pushes the data file to the upgrading server.
And when the upgrade server determines to upgrade the current user, the upgrade server issues the current updated data file to the terminal, the software program of the terminal calculates the hash value of the received data file, decrypts the data file by using the public key to obtain the hash value in the data file, compares the hash value with the calculated hash value, and if the hash value is always in the same time, the verification is passed, so that the correctness of the data file is ensured. And after the verification is passed, analyzing the data in the data file, transmitting the analyzed data to the script file, running a script code by the script file according to the analyzed data to check the malicious software, and displaying a detection result to a user through an application interface of the software.
Because the data and the logic codes are separated, the software can be upgraded only by updating a small amount of feature data, the development efficiency is high, and the variety of the malicious software can be quickly corresponded. And the data file is updated every time, the whole script file is not required to be updated, so that the network resource is saved, and the risk brought by updating the whole script file can be reduced. In addition, two updating modes are adopted, for a common updating command, the updating is carried out only by covering the current user with a preset updating proportion, and for a specified updating command, when the preset updating proportion exceeds a preset threshold value, the updating is directly carried out, so that the condition that all users are concentrated and updated at the same time is effectively avoided, the updating speed is ensured, and the relatively stable updating flow is also ensured.
As shown in FIG. 5, in one embodiment, a software upgrade system is provided, the system comprising a command receiving module 502, an upgrade determining module 504, and an upgrade module 506, wherein:
the command receiving module 502 is configured to obtain an upgrade query command sent by a terminal.
The upgrade determining module 504 is configured to determine whether software upgrade is needed according to the upgrade inquiry command.
The upgrade module 506 is configured to obtain a latest updated data file, and send the data file to the terminal, so that the terminal realizes software upgrade according to the data file.
In this embodiment, the data file is a data file used by a logic file for implementing a software function.
In one embodiment, the determining module 502 is configured to detect a type of the upgrade query command; if the type of the upgrading inquiry command is a common upgrading command, acquiring an upgraded upgrading proportion, and comparing the acquired upgrading proportion with a preset upgrading proportion; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
In one embodiment, the determining module 502 is configured to detect a type of the upgrade query command; if the type of the upgrade inquiry command is the specified upgrade command, further judging whether the preset upgrade proportion exceeds a preset threshold value, and if so, judging that the upgrade is needed.
Further, in an embodiment, the determining module 502 is further configured to further obtain an upgraded upgrading ratio if the preset upgrading ratio does not exceed a preset threshold, and compare the obtained upgrading ratio with a preset upgrading ratio; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
In one embodiment, as shown in fig. 6, the software upgrade system further includes:
a data configuration module 508, configured to configure data required for software upgrade; and packaging the configured data to generate a data file updated recently.
And the encryption storage module 510 is configured to encrypt and store the generated data file.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (8)
1. A method of software upgrade, the method comprising:
acquiring an upgrading inquiry command sent by a terminal;
judging whether software upgrading is needed according to the upgrading inquiry command, wherein the judging step comprises the following steps: detecting the type of the upgrade inquiry command; if the type of the upgrading inquiry command is the specified upgrading command, further judging whether a preset upgrading proportion exceeds a preset threshold value, and if so, judging that upgrading is needed;
configuring data required by software upgrading; packing the configured data to generate a latest updated data file; encrypting and storing the generated data file; the encrypting the generated data file comprises: performing hash value calculation on the generated data file, and then encrypting the hash value obtained by calculation through a private key of an asymmetric key algorithm;
acquiring a latest updated data file, and sending the data file to the terminal to enable the terminal to realize software upgrading according to the data file; after receiving the data file, the terminal calculates the hash value of the data file and decrypts the received data file by using a public key of an asymmetric encryption algorithm;
wherein the data file is a data file used by a logic file for realizing software functions.
2. The method of claim 1, wherein the step of determining whether a software upgrade is required according to the upgrade inquiry command further comprises:
detecting the type of the upgrade inquiry command;
if the type of the upgrading inquiry command is a common upgrading command, acquiring an upgraded upgrading proportion, and comparing the acquired upgrading proportion with a preset upgrading proportion;
and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
3. The method of claim 1, wherein the step of determining whether a software upgrade is required according to the upgrade inquiry command further comprises:
if the preset upgrading proportion does not exceed the preset threshold value, further acquiring the upgraded upgrading proportion, and comparing the acquired upgrading proportion with the preset upgrading proportion;
and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
4. A software upgrade system, characterized in that the system comprises:
the command receiving module is used for acquiring an upgrading inquiry command sent by the terminal;
the upgrade judging module is used for judging whether software upgrade is needed according to the upgrade inquiry command, and comprises: if the type of the upgrading inquiry command is the specified upgrading command, further judging whether a preset upgrading proportion exceeds a preset threshold value, and if so, judging that upgrading is needed;
the data configuration module is used for configuring data required by software upgrading; packing the configured data to generate a data file which is updated recently;
the encryption storage module is used for encrypting and storing the generated data file; the encrypting the generated data file comprises: performing hash value calculation on the generated data file, and then encrypting the hash value obtained by calculation through a private key of an asymmetric key algorithm;
the upgrading module is used for acquiring a latest updated data file, and sending the data file to the terminal so that the terminal can realize software upgrading according to the data file; after receiving the data file, the terminal calculates the hash value of the data file and decrypts the received data file by using a public key of an asymmetric encryption algorithm;
wherein the data file is a data file used by a logic file for realizing software functions.
5. The system of claim 4, wherein the determining module is configured to detect a type of the upgrade query command; if the type of the upgrading inquiry command is a common upgrading command, acquiring an upgraded upgrading proportion, and comparing the acquired upgrading proportion with a preset upgrading proportion; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
6. The system according to claim 4, wherein the determining module is further configured to further obtain an upgraded upgrade proportion if the preset upgrade proportion does not exceed a preset threshold, and compare the obtained upgrade proportion with a preset upgrade proportion; and if the obtained upgrading proportion does not exceed the preset upgrading proportion, judging that the upgrading is needed, otherwise, not needing to be carried out.
7. A storage medium on which a computer program is stored, which program, when executed by a processor, is adapted to carry out a software upgrade method as claimed in any one of claims 1 to 3.
8. A terminal device comprising a storage medium, a processor and a computer program stored on the storage medium and executable on the processor, the processor implementing the software upgrade method as claimed in any one of claims 1 to 3 when executing the program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510349528.4A CN106325898B (en) | 2015-06-23 | 2015-06-23 | Software upgrading method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510349528.4A CN106325898B (en) | 2015-06-23 | 2015-06-23 | Software upgrading method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106325898A CN106325898A (en) | 2017-01-11 |
CN106325898B true CN106325898B (en) | 2020-04-24 |
Family
ID=57727918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510349528.4A Active CN106325898B (en) | 2015-06-23 | 2015-06-23 | Software upgrading method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106325898B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109324814B (en) * | 2018-08-27 | 2022-02-01 | 中至数据集团股份有限公司 | Game updating method and device, mobile terminal and storage medium |
CN112434273B (en) * | 2020-11-23 | 2021-09-03 | 广州技象科技有限公司 | Database management method and device based on user verification |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581077A (en) * | 2003-08-05 | 2005-02-16 | 华为技术有限公司 | Method for device for improving computer furction for accessing internet |
CN101179425A (en) * | 2006-12-11 | 2008-05-14 | 腾讯科技(深圳)有限公司 | Client terminal software updating control method and system |
CN101820447A (en) * | 2010-03-31 | 2010-09-01 | 青岛海信宽带多媒体技术有限公司 | Software upgrading method and upgrading device |
CN104156244A (en) * | 2014-08-06 | 2014-11-19 | 北京奇虎科技有限公司 | Method and device for software upgrading |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7552430B2 (en) * | 2004-08-31 | 2009-06-23 | Microsoft Corporation | Patch sequencing |
US20120278114A1 (en) * | 2011-04-26 | 2012-11-01 | Sap Ag | Method for dynamically reversing business functions |
US9489193B2 (en) * | 2012-05-01 | 2016-11-08 | Sophos Limited | Method and system for providing software updates to local machines |
-
2015
- 2015-06-23 CN CN201510349528.4A patent/CN106325898B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581077A (en) * | 2003-08-05 | 2005-02-16 | 华为技术有限公司 | Method for device for improving computer furction for accessing internet |
CN101179425A (en) * | 2006-12-11 | 2008-05-14 | 腾讯科技(深圳)有限公司 | Client terminal software updating control method and system |
CN101820447A (en) * | 2010-03-31 | 2010-09-01 | 青岛海信宽带多媒体技术有限公司 | Software upgrading method and upgrading device |
CN104156244A (en) * | 2014-08-06 | 2014-11-19 | 北京奇虎科技有限公司 | Method and device for software upgrading |
Also Published As
Publication number | Publication date |
---|---|
CN106325898A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10871953B2 (en) | Application update method and apparatus | |
US10445502B1 (en) | Susceptible environment detection system | |
US10055576B2 (en) | Detection of malicious software packages | |
US20190318089A1 (en) | System security method and apparatus | |
US9973531B1 (en) | Shellcode detection | |
US9152784B2 (en) | Detection and prevention of installation of malicious mobile applications | |
CN107797817B (en) | Application updating method and device | |
US9953164B2 (en) | Confirming a malware infection on a client device using a remote access connection tool, to identify a malicious file based on fuzz hashes | |
JP6513716B2 (en) | Dynamic patching for diversity based software security | |
US8739287B1 (en) | Determining a security status of potentially malicious files | |
WO2018017872A1 (en) | Dynamic sensors | |
KR102134491B1 (en) | Network based management of protected data sets | |
US8925066B2 (en) | Provisioning proxy for provisioning data on hardware resources | |
KR102147026B1 (en) | Application download method and device | |
US10122739B2 (en) | Rootkit detection system and method | |
CN106325898B (en) | Software upgrading method and system | |
US10216941B2 (en) | Method of distributing application with security features and method of operating the application | |
CN105069357A (en) | Vulnerability scanning method, cloud server and system | |
EP2793160A1 (en) | Method and device for verification of an application | |
US11489725B1 (en) | Optimized updating of a client application | |
CN106648770B (en) | Generation method, loading method and device of application program installation package | |
CN107295078A (en) | A kind of patch distribution tracking and control system and method | |
CN109933990B (en) | Multi-mode matching-based security vulnerability discovery method and device and electronic equipment | |
KR101782145B1 (en) | Method for deploying applications with security features and method for operation of the applications | |
US20230031434A1 (en) | Exclusion registry |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |