CN106557379B - Method and device for generating silent installation package - Google Patents

Method and device for generating silent installation package Download PDF

Info

Publication number
CN106557379B
CN106557379B CN201510642673.1A CN201510642673A CN106557379B CN 106557379 B CN106557379 B CN 106557379B CN 201510642673 A CN201510642673 A CN 201510642673A CN 106557379 B CN106557379 B CN 106557379B
Authority
CN
China
Prior art keywords
file
information
registry
reading
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510642673.1A
Other languages
Chinese (zh)
Other versions
CN106557379A (en
Inventor
路尧
杨兴亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510642673.1A priority Critical patent/CN106557379B/en
Publication of CN106557379A publication Critical patent/CN106557379A/en
Application granted granted Critical
Publication of CN106557379B publication Critical patent/CN106557379B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a method and a device for generating a silent installation package, wherein the method comprises the following steps: detecting file difference information and registry difference information of the application before installation and after installation; reading a file corresponding to the file difference information; reading registry information corresponding to the registry difference information; judging whether reading of the file fails and/or whether the registry information is abnormal; if so, reading the backup of the file and/or correcting the abnormity of the registry information; and generating a silent installation package according to the read file and the read registry information. The embodiment of the invention reduces the problem that the application can not normally run or the system has errors after installation, improves the success rate of silent installation and reduces the waste of system resources.

Description

Method and device for generating silent installation package
Technical Field
The present invention relates to the field of computer processing technologies, and in particular, to a method and an apparatus for generating a silent installation package.
Background
At present, the application management systems of third parties are endless, and one of the commonalities is to make up for the deficiency that the installation of an operating system is complicated and needs a user interface to operate.
The application management system is distributed by a client side through an administrator packaging application, or a user captures an application package for storing and backing up the application, and the application management system generates a silent installation package in a capture environment for portable installation on a target machine when needed.
When the silent installation package is installed, the installation is directly carried out according to default settings without any user intervention, and the installation is convenient and quick.
In the traditional capture technology of the silent installation package, the information of the file and the registry in the system is respectively scanned before and after the application is installed, and the silent installation package is generated by capturing the different parts of the file and the registry before and after the application software is installed
However, because the file or the registry is abnormal, the silent installation package also carries the abnormal file or the registry, normal operation cannot be applied after installation or the system is in error, and the silent installation has low power and wastes system resources.
Disclosure of Invention
In view of the above problems, the present invention is proposed to provide a generation method of a silent installation package and a corresponding generation apparatus of a silent installation package that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a method for generating a silent installation package, including:
detecting file difference information and registry difference information of the application before installation and after installation;
reading a file corresponding to the file difference information;
reading registry information corresponding to the registry difference information;
judging whether reading of the file fails and/or whether the registry information is abnormal; if so, reading the backup of the file and/or correcting the abnormity of the registry information;
and generating a silent installation package according to the read file and the read registry information.
Optionally, the step of reading the backup of the file and/or correcting the existing abnormality of the registry information includes:
generating a volume shadow file for the disk space where the file is located;
a backup of the file is read from the shadow file.
Optionally, the step of determining whether reading the file fails and/or whether the registry information is abnormal includes:
checking whether a short file name exists in the registry information; and if so, determining that the registry information is abnormal.
Optionally, the step of reading the backup of the file and/or correcting the existing abnormality of the registry information includes:
acquiring a standard file name corresponding to the short file name;
and replacing the short file name with the standard file name.
Optionally, the step of determining whether reading the file fails and/or whether the registry information is abnormal includes:
checking whether the registry information is newly added with input method information; and if so, determining that the registry information is abnormal.
Optionally, the step of reading the backup of the file and/or correcting the existing abnormality of the registry information includes:
and replacing the newly added input method information with the user-defined input method information.
Optionally, the step of determining whether reading the file fails and/or whether the registry information is abnormal includes:
checking whether font information is added in the registry information; and if so, determining that the registry information is abnormal.
Optionally, the step of reading the backup of the file and/or correcting the existing abnormality of the registry information includes:
and extracting font installation information corresponding to the newly added font information.
According to another aspect of the present invention, there is provided a silent installation package generation apparatus, including:
the difference detection module is suitable for detecting file difference information and registry difference information of the application before installation and after installation;
the file reading module is suitable for reading a file corresponding to the file difference information;
the registry reading module is suitable for reading registry information corresponding to the registry difference information;
the reading monitoring module is suitable for judging whether reading of the file fails and/or whether the registry information is abnormal; if yes, calling a reading adjustment module;
the reading adjustment module is suitable for reading the backup of the file and/or correcting the abnormity of the registry information;
and the packaging module is suitable for generating the silent installation package according to the read file and the read registry information.
Optionally, the reading adjustment module is further adapted to:
generating a volume shadow file for the disk space where the file is located;
a backup of the file is read from the shadow file.
Optionally, the reading monitoring module is further adapted to:
checking whether a short file name exists in the registry information; and if so, determining that the registry information is abnormal.
Optionally, the reading adjustment module is further adapted to:
acquiring a standard file name corresponding to the short file name;
and replacing the short file name with the standard file name.
Optionally, the reading monitoring module is further adapted to:
checking whether the registry information is newly added with input method information; and if so, determining that the registry information is abnormal.
Optionally, the reading adjustment module is further adapted to:
and replacing the newly added input method information with the user-defined input method information.
Optionally, the reading monitoring module is further adapted to:
checking whether font information is added in the registry information; and if so, determining that the registry information is abnormal.
Optionally, the reading adjustment module is further adapted to:
and extracting font installation information corresponding to the newly added font information.
According to the embodiment of the invention, when the file reading fails, the backup of the file is read, when the registry information is abnormal, the registry is corrected, and the silent installation package is generated by using the correct file and the registry information, so that the problem that the application cannot normally run or the system is wrong after installation is solved, the success rate of silent installation is improved, and the waste of system resources is reduced.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart illustrating steps of an embodiment of a method for generating a quiesce installation package according to an embodiment of the present invention; and
fig. 2 is a block diagram illustrating an embodiment of a silent installation package generation apparatus according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a method for generating a silent installation package according to an embodiment of the present invention is shown, and specifically may include the following steps:
step 101, detecting file difference information and registry difference information of an application before installation and after installation;
the embodiment of the present invention may be applied to a Windows operating system, and may also be applied to other operating systems, such as IOS, Android (Android), and the like, which is not limited in this respect.
An application may refer to a computer program developed to run on an operating system to perform one or more functions, such as an instant messenger for instant messaging, an email box for sending and receiving email, a browser for browsing web pages, and so forth.
In the application installation process, generally, operations such as adding, modifying, deleting and the like are performed on files and registries in the system.
The file difference information may refer to information of files added, modified, and deleted in the system during the installation process.
The registry difference information may refer to information of the added, modified, or deleted registry in the system during the installation process.
Step 102, reading a file corresponding to the file difference information;
in general, a file may have path information, and a file corresponding to file difference information may be read through the path information.
Step 103, reading registry information corresponding to the registry difference information;
usually, the registry has information such as a key name and a key value, and registry information corresponding to registry difference information can be read by the information such as the key name and the key value.
104, judging whether reading the file fails and/or whether the registry information is abnormal; if yes, go to step 105;
when the application is installed, files such as a dynamic operation library and the like are installed in the system directory, and because the security strictness degree of the operating systems such as Windows Vista, Windows 7 and the like is high, the dynamic operation library such as DotNetFramework and the like cannot normally open the files for copying, and the reading of the files in the system directory fails.
In this case, the generated silent installation package lacks files, so that components are lost and the application fails to run.
In addition, when an application is installed, the registry is modified, possibly causing an exception, and typically includes one or more of the following:
1. a short filename;
some of the long-history applications have a long time to become popular because of their rapidity, and there is a possibility among them that there is a habit of inheriting the old system habit to mark the components themselves in the registry with short file names.
If the silent installation package is generated by applying the short file name, when the silent installation package is installed and restored by the target machine, unpredictable other files can be pointed to, and the application operation fails.
In this case, it may be checked whether a short file name exists in the registry information; if yes, determining that the registry information is abnormal.
Specifically, it is possible to determine whether or not there is a short filename identifier, such as "-", in the character string values captured by the registry, and if there is a short filename identifier, it is possible to determine that there is a short filename in the registry information, and if there is no short filename identifier, it is possible to determine that there is no short filename in the registry information.
2. Inputting a method;
such as Office applications, independent input method applications, mostly new input methods are installed,
because the input method installation of operating systems such as Windows and the like is sequentially recorded in the registry, the input method installed in the target machine can occupy the positions of other original input method options on the target machine for the application with the new input method to be installed, and the application is captured and packaged into a silent installation package.
The direct registry content restoration can cover the existing input method registry information of the target machine, and the original input method registry configuration on the target machine can be damaged, so that the input method is operated wrongly.
In this case, it may be checked whether input method information is newly added to the registry information; if yes, determining that the registry information is abnormal.
Specifically, the path through the registry:
HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Keyb oard Layouts
and adding a new key to determine whether a new input method is installed.
3. A font;
and capturing and packaging the application with the new font into a silent installation package, wherein the corresponding font installed in the target machine cannot be immediately viewed and used in the application or other applications, and the application needs to be restarted and used.
In this case, it may be checked whether font information is newly added in the registry information; if yes, determining that the registry information is abnormal.
Specifically, whether to add the corresponding font file may be determined in a font folder of the system, and the registry path may be further used:
HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Fonts
and acquiring a new value, namely representing the added font.
Of course, the above-mentioned abnormality determination manner of the registry is only an example, and when the embodiment of the present invention is implemented, the abnormality determination manner of another registry may be set according to an actual situation, which is not limited in the embodiment of the present invention. In addition, besides the above-mentioned exception determining method for the registry, a person skilled in the art may also use other exception determining methods for the registry according to actual needs, which is not limited in this embodiment of the present invention.
Step 105, reading the backup of the file and/or correcting the abnormity of the registry information;
because some paths related to installation setting, users and environment variables of the operating system such as Windows and the like exist in files and registries of the operating system, the related paths need to be detected and processed during capturing, the installation can be ensured to be transferred to other target machines for installation and use according to the adaptive path of the operating environment on the original machine, and the changes of the registries and the files can be accurately and reasonably counted and restored.
For the case of a file reading failure, a Volume Shadow file may be generated for a disk space where the file is located by a Volume Shadow Copy Service (Volume Shadow Copy Service), and a backup of the file may be read from the Volume Shadow file.
Since the backup file using the volume shadow copy service is not in use, most of the file can be copied, and the file reading is ensured to be successful.
By applying the method, the dynamic library file enters the system directory and other applications, the components are not lost during packet capturing, and the successful operation of the applications is ensured.
In addition, in case of abnormal registry, one or more of the following methods are generally applied to correct the abnormal registry:
1. a short filename;
in this modification, a standard filename corresponding to the short filename may be obtained, and the short filename may be replaced with the standard filename.
In practice, the file name may be split, e.g., the character @ may lead to a path name, the character "" may cause a path name, the space character may cause a path name, the character! A segment pathname may be elicited, and so on.
For the character string which is cut and possibly has a path name, whether the path name exists can be judged through a Windows API GetFileAttribute, if yes, the standard path name can be obtained through the Windows API GetLongPathName for replacement, and finally the standard file name is obtained.
In this way, an application that uses short filenames to save component information in a registry will not report lost components when installed.
2. Inputting a method;
in the correction mode, the input method information added in the original registry is filtered, the newly added input method information is replaced by the user-defined input method information, and the parameter is used for calling the operating system input method installation method when the silent packet is installed.
In a particular implementation, the method may be selected from:
HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Keyb oard Layouts
contents of character string key values such as Ime File, Layout Text, Layout File, Layout Name, Layout Id, System IME File and System are extracted from the newly added keys, and names of the newly added keys are calculated according to actual conditions of the target installation machine.
In the embodiment of the invention, the implementation method of the Windows component ImmInstallIME function installation input method can be reversely analyzed, and the input method is correctly installed and the set content of the character string key value is accurately restored by the user-defined version of the ImmInstallIME function installation input method.
By applying the method, the application of the input method is installed, the original input method list on the target machine cannot be damaged during installation, and the newly added input method can be immediately used without additionally restarting the machine.
3. A font;
by applying the method, the font installation information corresponding to the newly added font information is extracted, and the system function installation font is called by using the parameter when the silent packet is installed.
If the registry:
HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Fonts
the name of the value is the display name of the font, and is assumed to be saved as FontName, and the content of the value is the font file name of the font, and is assumed to be saved as FontFile.
A windows api addfontsource (FontFile) is called at install time,
and then through PostMessage (HWND _ BROADCAST, WM _ FONTCHANGE,0, 0); and the message informs other windows that the new font can be used immediately.
By applying the method, the application with the installation font can immediately take effect when the silent packet is installed, and the machine does not need to be additionally restarted.
Of course, the above-mentioned abnormality correction manner of the registry is only an example, and when implementing the embodiment of the present invention, the abnormality correction manner of another registry may be set according to an actual situation, which is not limited in the embodiment of the present invention. In addition, besides the above mentioned exception correcting method for the registry, those skilled in the art may also adopt other exception correcting methods for the registry according to actual needs, and the embodiment of the present invention is not limited to this.
And 106, generating a silent installation package according to the read file and the read registry information.
In the embodiment of the invention, the read file may be a normally read file or a backup of a file read in an abnormal state; the registry information of the channel may be normally read registry information or modified registry information in case of abnormality.
According to the embodiment of the invention, when the file reading fails, the backup of the file is read, when the registry information is abnormal, the registry is corrected, and the silent installation package is generated by using the correct file and the registry information, so that the problem that the application cannot normally run or the system is wrong after installation is solved, the success rate of silent installation is improved, and the waste of system resources is reduced.
For simplicity of explanation, the method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the embodiments of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 2, a block diagram of a structure of an embodiment of an apparatus for generating a silent installation package according to an embodiment of the present invention is shown, and specifically, the apparatus may include the following modules:
a difference detection module 201 adapted to detect file difference information and registry difference information of an application before installation and after installation;
the file reading module 202 is adapted to read a file corresponding to the file difference information;
the registry reading module 203 is adapted to read registry information corresponding to the registry difference information;
the reading monitoring module 204 is adapted to determine whether reading of the file fails and/or whether the registry information is abnormal; if yes, the reading adjustment module 205 is called;
a reading adjustment module 205, adapted to read a backup of the file and/or correct an exception of the registry information;
a packaging module 206 adapted to generate a silent installation package according to the read file and the read registry information.
In an optional embodiment of the present invention, the read adjustment module 205 may be further adapted to:
generating a volume shadow file for the disk space where the file is located;
a backup of the file is read from the shadow file.
In an optional embodiment of the present invention, the read monitoring module 204 may be further adapted to:
checking whether a short file name exists in the registry information; and if so, determining that the registry information is abnormal.
In an optional embodiment of the present invention, the read adjustment module 205 may be further adapted to:
acquiring a standard file name corresponding to the short file name;
and replacing the short file name with the standard file name.
In an optional embodiment of the present invention, the read monitoring module 204 may be further adapted to:
checking whether the registry information is newly added with input method information; and if so, determining that the registry information is abnormal.
In an optional embodiment of the present invention, the read adjustment module 205 may be further adapted to:
and replacing the newly added input method information with the user-defined input method information.
In an optional embodiment of the present invention, the read monitoring module 204 may be further adapted to:
checking whether font information is added in the registry information; and if so, determining that the registry information is abnormal.
In an optional embodiment of the present invention, the read adjustment module 205 may be further adapted to:
and extracting font installation information corresponding to the newly added font information.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in a silent installation package generation apparatus according to an embodiment of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (16)

1. A method for generating a silent installation package comprises the following steps:
detecting file difference information and registry difference information of the application before installation and after installation;
reading a file corresponding to the file difference information;
reading registry information corresponding to the registry difference information;
judging whether reading of the file fails and/or whether the registry information is abnormal; if yes, reading the backup of the file and/or correcting the abnormity of the registry information, and generating a silent installation package according to the read backup of the file and the read corrected registry information;
and if not, generating a silent installation package according to the read file and the read registry information.
2. The method of claim 1, wherein the step of reading the backup of the file and/or correcting the existing anomalies of the registry information comprises:
generating a volume shadow file for the disk space where the file is located;
a backup of the file is read from the shadow file.
3. The method according to claim 1 or 2, wherein the step of determining whether reading the file fails and/or whether there is an anomaly in the registry information comprises:
checking whether a short file name exists in the registry information; and if so, determining that the registry information is abnormal.
4. The method of claim 3, wherein the step of reading the backup of the file and/or correcting the existing anomalies of the registry information comprises:
acquiring a standard file name corresponding to the short file name;
and replacing the short file name with the standard file name.
5. The method of claim 1, 2 or 4, wherein the step of determining whether reading the file fails and/or whether the registry information is abnormal comprises:
checking whether the registry information is newly added with input method information; and if so, determining that the registry information is abnormal.
6. The method of claim 5, wherein the step of reading the backup of the file and/or correcting the existing anomalies of the registry information comprises:
and replacing the newly added input method information with the user-defined input method information.
7. The method of claim 1, 2, 4 or 6, wherein the step of determining whether reading the file fails and/or whether the registry information is abnormal comprises:
checking whether font information is added in the registry information; and if so, determining that the registry information is abnormal.
8. The method of claim 7, wherein the step of reading the backup of the file and/or correcting the existing anomalies of the registry information comprises:
and extracting font installation information corresponding to the newly added font information.
9. An apparatus for generating a silent installation package, comprising:
the difference detection module is suitable for detecting file difference information and registry difference information of the application before installation and after installation;
the file reading module is suitable for reading a file corresponding to the file difference information;
the registry reading module is suitable for reading registry information corresponding to the registry difference information;
the reading monitoring module is suitable for judging whether reading of the file fails and/or whether the registry information is abnormal; if yes, calling a reading adjustment module, and if not, calling a packaging module;
the reading adjustment module is suitable for reading the backup of the file and/or correcting the abnormity of the registry information, and generating a silent installation package according to the read backup of the file and the read corrected registry information;
and the packaging module is suitable for generating the silent installation package according to the read file and the read registry information.
10. The apparatus of claim 9, wherein the read adjustment module is further adapted to:
generating a volume shadow file for the disk space where the file is located;
a backup of the file is read from the shadow file.
11. The apparatus of claim 9 or 10, wherein the read monitoring module is further adapted to:
checking whether a short file name exists in the registry information; and if so, determining that the registry information is abnormal.
12. The apparatus of claim 11, wherein the read adjustment module is further adapted to:
acquiring a standard file name corresponding to the short file name;
and replacing the short file name with the standard file name.
13. The apparatus of claim 9, 10 or 12, wherein the read monitoring module is further adapted to:
checking whether the registry information is newly added with input method information; and if so, determining that the registry information is abnormal.
14. The apparatus of claim 13, wherein the read adjustment module is further adapted to:
and replacing the newly added input method information with the user-defined input method information.
15. The apparatus of claim 9 or 10 or 12 or 14, wherein the reading monitoring module is further adapted to:
checking whether font information is added in the registry information; and if so, determining that the registry information is abnormal.
16. The apparatus of claim 15, wherein the read adjustment module is further adapted to:
and extracting font installation information corresponding to the newly added font information.
CN201510642673.1A 2015-09-30 2015-09-30 Method and device for generating silent installation package Active CN106557379B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510642673.1A CN106557379B (en) 2015-09-30 2015-09-30 Method and device for generating silent installation package

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510642673.1A CN106557379B (en) 2015-09-30 2015-09-30 Method and device for generating silent installation package

Publications (2)

Publication Number Publication Date
CN106557379A CN106557379A (en) 2017-04-05
CN106557379B true CN106557379B (en) 2021-05-18

Family

ID=58417627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510642673.1A Active CN106557379B (en) 2015-09-30 2015-09-30 Method and device for generating silent installation package

Country Status (1)

Country Link
CN (1) CN106557379B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108958826B (en) * 2017-05-22 2022-06-07 北京京东尚科信息技术有限公司 Method and device for dynamically configuring application installation package
CN111008025A (en) * 2019-12-06 2020-04-14 北大方正集团有限公司 Font silent installation method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866296A (en) * 2010-06-30 2010-10-20 福建升腾资讯有限公司 Windows file system based installation package silencing method and tool
CN102402446A (en) * 2011-11-22 2012-04-04 成都市华为赛门铁克科技有限公司 Method and device for installing application software
CN103229144A (en) * 2010-12-01 2013-07-31 苹果公司 Pre-heated software installation
CN104346195A (en) * 2014-06-05 2015-02-11 腾讯科技(深圳)有限公司 Software installing method and system
CN104731626A (en) * 2015-03-31 2015-06-24 百度在线网络技术(北京)有限公司 Application installation method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7334226B2 (en) * 2003-10-30 2008-02-19 International Business Machines Corporation Autonomic auto-configuration using prior installation configuration relationships

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866296A (en) * 2010-06-30 2010-10-20 福建升腾资讯有限公司 Windows file system based installation package silencing method and tool
CN103229144A (en) * 2010-12-01 2013-07-31 苹果公司 Pre-heated software installation
CN102402446A (en) * 2011-11-22 2012-04-04 成都市华为赛门铁克科技有限公司 Method and device for installing application software
CN104346195A (en) * 2014-06-05 2015-02-11 腾讯科技(深圳)有限公司 Software installing method and system
CN104731626A (en) * 2015-03-31 2015-06-24 百度在线网络技术(北京)有限公司 Application installation method and device

Also Published As

Publication number Publication date
CN106557379A (en) 2017-04-05

Similar Documents

Publication Publication Date Title
CN102736978B (en) A kind of method and device detecting the installment state of application program
CN107171825B (en) Repeated log filtering method for terminal
US9594549B2 (en) Automated patch generation
WO2019169761A1 (en) Automated testing method and apparatus, and storage medium
CN109947637B (en) Automatic testing method, device, equipment and medium for webpage compatibility
CN111104315A (en) Test script generation method and device and computer readable storage medium
US20150067671A1 (en) Information processing apparatus, control method, and storage medium
US20140310560A1 (en) Method and apparatus for module repair in software
CN103677898A (en) Method for checking loaded extension and/or plug-in on server side and server
CN109634641B (en) Application program updating method and device, electronic equipment and medium
WO2015131643A1 (en) Software detection method and device
JP6163707B2 (en) Embedded device, program creation device, program
JP2009140155A (en) Test program for application program
CN112860645A (en) Processing method and device for offline compressed file, computer equipment and medium
CN111078637A (en) Script file online method and device, computer equipment and storage medium
CN106557379B (en) Method and device for generating silent installation package
CN113934617A (en) Data processing method, device, equipment and storage medium
EP3588353B1 (en) Systems and methods of analyzing a software component
CN108959915B (en) Rootkit detection method, rootkit detection device and server
CN104317645A (en) Method and device of monitoring port by virtue of application program embodiment
CN109408133B (en) Method and equipment for starting assembly
CN104572943A (en) Installation-free program cleaning method and device
JP5716400B2 (en) Information processing apparatus and information processing program
KR101369254B1 (en) Apparatus and method for detecting malicious application
WO2020119138A1 (en) Method for verifying credibility of bios restored file and relevant device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240102

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right