CN106909401B - Application program control method and device - Google Patents

Application program control method and device Download PDF

Info

Publication number
CN106909401B
CN106909401B CN201510969661.XA CN201510969661A CN106909401B CN 106909401 B CN106909401 B CN 106909401B CN 201510969661 A CN201510969661 A CN 201510969661A CN 106909401 B CN106909401 B CN 106909401B
Authority
CN
China
Prior art keywords
application program
terminal
identifier
downloading
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510969661.XA
Other languages
Chinese (zh)
Other versions
CN106909401A (en
Inventor
王鹏程
苏云琳
窦文科
王力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3600 Technology Group Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510969661.XA priority Critical patent/CN106909401B/en
Publication of CN106909401A publication Critical patent/CN106909401A/en
Application granted granted Critical
Publication of CN106909401B publication Critical patent/CN106909401B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a control method and device of an application program, in the application, a server receives an application program identifier and download path information corresponding to the application program uploaded before a terminal downloads the application program, and a terminal identifier of the terminal, judges whether the application program is safe through a pre-stored safety information list, judges whether the terminal can download and install the application program through a pre-stored control rule corresponding to the terminal identifier, if not, the terminal does not download the application program, and only if so, the terminal downloads and installs the application program. By the method, the effective enterprise network operation pressure can be reduced, and enterprise network resources are saved.

Description

Application program control method and device
Technical Field
The present application relates to the field of information technologies, and in particular, to a method and an apparatus for controlling an application.
Background
With the development of the information-oriented society and the development of the information-oriented society, terminals such as mobile phones and tablet computers are used as tools for people to perform social activities, and the utilization rate of the terminals in the life of people is higher and higher. In the enterprise field, employees in the enterprise are also increasingly working with special terminals.
When the staff uses the terminal, the terminal can be installed and downloaded with the application and data used by the person, and can be installed and downloaded with the application and data of the enterprise at the same time, so that the personal application and data and the application and data of the enterprise exist on the same device, further, the enterprise can not control the security of the application and data installed or downloaded by the staff in the terminal, so that the security of the application and data of the enterprise on the same terminal can not be guaranteed, and further, the terminal of the staff can be connected to the network of the enterprise, so that the security risk of the enterprise is increased.
Therefore, the problem of security of an enterprise network, confidentiality of enterprise data and the like when the staff use the terminal is solved. In the prior art, grouping information and corresponding control rules are stored in an enterprise internal server, and corresponding control rules are sent to each terminal according to the grouping information where each terminal is located, each terminal can download applications only after receiving the control rules sent by the enterprise internal server, each terminal can only download applications through the enterprise intranet server, and finally each terminal judges whether the applications can be installed according to the control rules received in advance.
However, in the prior art, the terminal needs to download the corresponding control rule in advance, and only the application can be downloaded from the server of the enterprise, and finally, whether the application can be installed can be judged only after the application is downloaded. Therefore, in the prior art, the method for protecting the security of the enterprise network and the enterprise data is quite complicated, and data transmission needs to be carried out for many times, so that the operation pressure of the enterprise network is increased, and the waste of enterprise network resources is caused.
Disclosure of Invention
The embodiment of the application provides a control method and a control device for an application program, and is used for solving the problems that in the prior art, a terminal needs to receive a control rule provided according to grouping information in advance, and after the application is downloaded from an enterprise internal server, whether the application can be installed or not can be judged according to the control rule, so that data transmission needs to be carried out for many times between the terminal and the server, the operation pressure of an enterprise network is increased, and the waste of enterprise network resources is caused.
The control method for the application program provided by the embodiment of the application program comprises the following steps:
receiving an application program identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier and a terminal identifier of the terminal;
judging whether the application program identification and the download path information exist in a pre-stored safety information list or not;
if so, judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to a control rule corresponding to the terminal identifier and stored in advance, if so, returning a confirmation message to enable the terminal to download and install the application program, and if not, returning a denial message to prohibit the terminal from downloading the application program;
if not, returning a denial message to prohibit the terminal from downloading the application program.
The control method for the application program provided by the embodiment of the application program comprises the following steps:
monitoring application program downloading request information of a terminal;
determining an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information according to the application program downloading request information;
uploading the application program identifier, the download path information and the terminal identifier of the terminal to a server;
receiving a confirmation message or a denial message returned by the server according to the application program identifier, the download path information and the terminal identifier;
when receiving the confirmation message, downloading and installing the application program corresponding to the application program identifier;
and when the denial message is received, not downloading the application program corresponding to the application program identification.
An application control apparatus provided in an embodiment of the present application includes:
the terminal comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving an application program identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier and a terminal identifier of the terminal;
the judging module is used for judging whether the application program identifier and the download path information exist in a pre-stored safety information list or not;
the control module is used for judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to a control rule corresponding to the terminal identifier and stored in advance when the judgment result of the judgment module is yes, if so, returning a confirmation message to enable the terminal to download and install the application program, and if not, returning a denial message to prohibit the terminal from downloading the application program; and when the judgment result of the judgment module is negative, returning a denial message to prohibit the terminal from downloading the application program.
An application control apparatus provided in an embodiment of the present application includes:
the monitoring module is used for monitoring application program downloading request information of the terminal;
the determining module is used for determining an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information according to the application program downloading request information;
the uploading module is used for uploading the application program identifier, the downloading path information and the terminal identifier of the terminal to a server;
and the receiving execution module is used for receiving a confirmation message or a denial message returned by the server according to the application program identifier, the download path information and the terminal identifier, downloading and installing the application program corresponding to the application program identifier when the confirmation message is received, and not downloading the application program corresponding to the application program identifier when the denial message is received.
The embodiment of the application program control method and device is characterized in that before downloading an application program, a terminal determines an application program identifier and download path information corresponding to the application program according to download request information, uploads the application program identifier, the download path information and a terminal identifier of the terminal to a server, the server judges whether the terminal can install the application program according to the received information, a pre-stored safety information list and a pre-stored control rule corresponding to the terminal identifier, and finally the server returns an acknowledgement message or a negative acknowledgement message to the terminal to control whether the terminal downloads and installs the application program information. In the control method of the application program, the judgment of whether the terminal can download and install the application program can be made before the terminal downloads the application program, so that the application program cannot be downloaded when the terminal does not have the authority of installing the application program.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a control process of an application provided in an embodiment of the present application;
FIG. 2 is a control process corresponding to the application program of FIG. 1 provided by an embodiment of the present application;
fig. 3 is a schematic structural diagram of a control device of an application program according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a control device of an application program according to an embodiment of the present application.
Detailed Description
In the application, a server receives an application program identifier and download path information corresponding to an application program uploaded by a terminal before the application program is downloaded, and a terminal identifier of the terminal, judges whether the application program is safe through a pre-stored safety information list, judges whether the terminal can download and install the application through a pre-stored control rule corresponding to the terminal identifier, does not download the application program when any judgment is negative, and downloads and installs the application program only when the judgment is positive. By the method, the effective enterprise network operation pressure can be reduced, and enterprise network resources are saved.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a control process of an application program provided in an embodiment of the present application, which specifically includes the following steps:
s101: receiving an application program identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier and a terminal identifier of the terminal;
s102: judging whether the application program identifier and the download path information exist in a pre-stored safety information list, if so, executing a step S103, otherwise, executing a step S105;
s103: judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to a control rule corresponding to the terminal identifier, if so, executing the step S104, and if not, executing the step S105;
s104: returning a confirmation message to enable the terminal to download and install the application program;
s105: and returning a denial message to prohibit the terminal from downloading the application program.
Through the control method of the application program as shown in fig. 1, before downloading the application program, the terminal sends the application program identifier corresponding to the application program, the download path information corresponding to the application program, and the terminal identifier of the terminal to the server, so that the server can determine whether the application program is safe according to the pre-stored safety information list, and if so, the server can continue to determine whether the terminal can download and install the application program according to the pre-stored control rule corresponding to the terminal identifier. That is, the security of the application program needs to be determined first through two steps of determination processes, and whether the application can be installed in the authority of the terminal is determined. And when the application program is not matched with the application program, the terminal does not download the application program. The method achieves the purpose of controlling the application program before the terminal downloads the application, reduces the operation pressure of an internal network of an enterprise on one hand, and can liberate the storage space of an enterprise server on the other hand, so that the downloading mode of the application program of the terminal is more flexible.
In step S101, an application identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier, and a terminal identifier of the terminal are received by the server. Moreover, the application identifier, the download path information, and the terminal identifier of the terminal may be uploaded by an enterprise management client installed in the terminal, where the terminal identifier may be a hardware identifier of the terminal, or an identifier of the client or a user identifier of logging in the client.
In addition, the server may be a single server, or may be a server cluster composed of a plurality of servers, and the server may be a server dedicated to control of the application program, or may be a server having a function of controlling the application program, which is not limited in this application.
Further, the application identifier corresponding to the application may be a name, a version number, and the like of the application. The download path information corresponding to the application program identifier may be a download link selected when the terminal wants to download the application program, a web page link address where the download link of the application program is located, a server address where the application program is located, and the like.
In step S102, after receiving the application identifier, the download path information, and the terminal identifier uploaded by the terminal, the server may first determine the validity (i.e., security) of the application.
Specifically, whether the application identifier and the download path information are in the security information list may be determined according to a security information list pre-stored in the server. Wherein, the security information list may include: the official website of the application program, the official download path information of the application program, the download path information provided by the trusted third party website, the official application program identification provided by the application program, the official application program identification provided by the trusted third party website, and the like.
Therefore, in the present application, the server may determine, through the security information list, whether the application identifier and the download path information uploaded by the terminal exist, and if the application identifier and the download path information exist, it is determined that the application is legal (i.e., secure), and when the application is installed in the terminal, the security of the terminal and the enterprise is not threatened, and then step S103 may be executed.
If the application program does not exist, it is determined that the application program is illegal (i.e., unsafe), and if a greater security risk occurs after the application program is installed in the terminal, step S105 is executed.
Further, when the application identifier and the download path information are both in the security information list, that is, each application identifier and each download path information respectively correspond to each security information, and the application identifier and the download path information should have a corresponding relationship, the server further needs to determine whether the application identifier and the download path information correspond to each other, if not, step S105 is executed, and if so, step S103 is executed.
For example, the correspondence between the application id and the download path information is shown in table 1.
Application identification Download path information
Procedure A Route 1
Procedure B Route 2
TABLE 1
If the application identifier uploaded by the terminal is program a and the download path information uploaded by the terminal is path 2, it is determined that the application identifier and the download path information do not correspond to each other, and step S105 is executed. Only when the application identification and the download path information correspond, step S103 is performed.
In step S103, after the server determines that the application identifier and the download path information exist in the pre-saved security information list, it needs to further determine whether the terminal has the authority to install the application.
Specifically, the server first determines a group information list where the terminal identifier is located according to each group information list stored in advance. In the enterprise server, each terminal identifier exists in a corresponding grouping information list for the convenience of controlling each terminal in the enterprise, so that the server can adopt different control rules for each terminal in different grouping information lists according to each grouping information list. Then, the grouping information list where the terminal identifier is located is determined first, so as to control the determination of the rule subsequently.
Then, after the group information list is determined, the control rule of the group information list can be determined according to each group information list stored in advance and the control rule corresponding to the group information list. That is, the control rule corresponding to the terminal is determined.
And finally, judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to the determined control rule. If yes, step S104 is executed, and if not, step S105 is executed.
In step S104, after the two determination segments of step S102 and step S103 are passed, that is, it is determined that the pair of the application identifier and the download path information is in the pre-stored security information list, the application identifier and the download path information are corresponding, and the terminal has the authority to download the application, a confirmation message is returned to the terminal, so that the terminal downloads the application corresponding to the application identifier through the download path corresponding to the download path information after receiving the confirmation message.
In step S105, if it is determined in step S102 or step S103 that the terminal is not available, a negative message is directly returned to the terminal to prohibit the terminal from downloading the application program, and network resources occupied by the terminal for downloading the application are saved.
Based on the control process of the application program shown in fig. 1, an embodiment of the present application further provides a control process of an application program executed by a terminal, as shown in fig. 2.
Fig. 2 is a control process corresponding to the application program in fig. 1 provided in an embodiment of the present application, which specifically includes the following steps:
s201: monitoring application program downloading request information of a terminal;
s202: determining an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information according to the application program downloading request information;
s203: uploading the application program identifier, the download path information and the terminal identifier of the terminal to a server;
s204: receiving a confirmation message or a denial message returned by the server according to the application program identifier, the download path information and the terminal identifier, executing step S205 when receiving the confirmation message, and executing step S206 when receiving the denial message;
s205: downloading and installing the application program corresponding to the application program identifier;
s206: and not downloading the application program corresponding to the application program identification.
Through the control method of the application program as shown in fig. 2, the application program download request information of the terminal is monitored, that is, the download request information before the terminal downloads the application program, and the corresponding application program identifier, download path information and terminal identifier are uploaded to the server according to the download request information, so that the server determines whether the application program can be installed, and the terminal only needs to receive the confirmation message or the denial message returned by the server and execute the corresponding operation according to the confirmation message or the denial message. The terminal does not need to carry out any judgment operation and download any control rule, data exchange between the terminal and the enterprise server is effectively reduced, and if the application program is not downloadable, the terminal omits the step of downloading the application program, and the two steps can effectively reduce the network operation pressure of the enterprise.
In step S201, the application download request information of the terminal may be monitored by the enterprise management client installed on the terminal. Further, in order to obtain the application download request information of the terminal and better control the terminal in the following, the enterprise management client may further have a super user (Root) authority of the terminal.
Therefore, in the present application, when the enterprise client sends the application program download request information before the terminal downloads the application program, the enterprise client may intercept the application program download request information, so as to determine whether the application program download request information is executable through subsequent steps.
In step S202, after monitoring the application download request information, the application identifier corresponding to the application download request information and the download path information corresponding to the application download request information may be determined according to the application download request information, and may be specifically determined by the enterprise client.
In step S203, it is already possible to determine from where (i.e., download path information) the terminal wants to download what kind (i.e., application identification) of application from step S202, and then it is necessary to further determine whether the terminal can download and install the application, and since it is not necessary for the terminal to determine whether the terminal can download and install in the present application, and a server is required to make such a determination, it is also necessary to upload the application identification, the download path information, and the terminal identification of the terminal to the server.
In step S204, after the application identifier, the download path information, and the terminal identifier are uploaded, a message returned by the server according to the application identifier, the download path information, and the terminal identifier may be waited, when a confirmation message is received, step S205 is executed, that is, an application corresponding to the application identifier is downloaded and installed, and when a denial message is received, step S206 is executed, that is, an application corresponding to the application identifier is not downloaded.
In addition, in order to make the user of the terminal know whether the application program can be downloaded and installed, when the terminal receives a confirmation message, the terminal displays a prompt message for allowing the downloading and installation, and when the terminal receives a denial message, the terminal displays a prompt message for forbidding the downloading and installation.
Based on the control process of the application program shown in fig. 1, an embodiment of the present application further provides an application program control apparatus, as shown in fig. 3.
Fig. 3 is a schematic structural diagram of a control device of an application program according to an embodiment of the present application, which specifically includes:
a receiving module 301, configured to receive an application identifier corresponding to an application program uploaded before a terminal downloads the application program, download path information corresponding to the application program identifier, and a terminal identifier of the terminal;
a determining module 302, configured to determine whether the application identifier and the download path information exist in a pre-stored security information list;
a control module 303, configured to, if the determination result of the determining module 302 is yes, determine, according to a control rule corresponding to the terminal identifier and stored in advance, whether the terminal has an authority to install the application corresponding to the application identifier, if yes, return a confirmation message to enable the terminal to download and install the application, and if not, return a denial message to prohibit the terminal from downloading the application; and when the judgment result of the judgment module 302 is negative, returning a negative confirmation message to prohibit the terminal from downloading the application program.
The determining module 302 is specifically configured to determine whether the application identifier exists in a pre-stored security information list, determine whether the download path information exists in the pre-stored security information list, determine whether the application identifier and the download path information have a corresponding relationship in the security information list, if both the determination results are yes, determine that the application identifier and the download path information exist in the pre-stored security information list, and if at least one of the determination results is no, determine that the application identifier and the download path information do not exist in the pre-stored security information list.
The control module 303 is specifically configured to determine, according to each pre-stored grouping information list, a grouping information list where the terminal identifier is located, determine, according to the grouping information list where the terminal identifier is located, a control rule corresponding to the grouping information list where the terminal identifier is located, and determine, according to the determined control rule, whether the terminal has an authority to install an application program corresponding to the application program identifier.
Specifically, the control device of the application program shown in fig. 3 may be located in a server, and the device may be located in a single server, or may be located in a server cluster formed by a plurality of servers.
Based on the control process of the application program shown in fig. 2, an embodiment of the present application further provides an application program control apparatus, as shown in fig. 4.
Fig. 4 is a schematic structural diagram of a control device of an application program according to an embodiment of the present application, which specifically includes:
the monitoring module 401 is configured to monitor application download request information of the terminal;
a determining module 402, configured to determine, according to the application program downloading request information, an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information;
an upload module 403, configured to upload the application identifier, the download path information, and the terminal identifier of the terminal to a server;
a receiving and executing module 404, configured to receive a confirmation message or a denial message returned by the server according to the application identifier, the download path information, and the terminal identifier, when the confirmation message is received, download and install the application corresponding to the application identifier, and when the denial message is received, not download the application corresponding to the application identifier.
The apparatus further includes a display module 405 configured to display a prompt message for allowing downloading of the installation when the receiving and executing module 404 receives the confirmation message, and display a prompt message for prohibiting downloading when the receiving and executing module 404 receives the denial message.
Specifically, the control device of the application shown in fig. 4 may be located in various terminals, specifically, in a terminal such as a mobile phone, a personal computer (pc), or a tablet computer.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (8)

1. A method for controlling an application program, comprising:
receiving an application program identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier and a terminal identifier of the terminal;
judging whether the application program identification exists in a pre-stored safety information list or not, judging whether the download path information exists in the pre-stored safety information list or not, and judging whether the application program identification and the download path information have a corresponding relation in the safety information list or not;
if yes, judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to a control rule corresponding to the terminal identifier and stored in advance, if yes, returning a confirmation message to enable the terminal to download and install the application program, and if not, returning a denial message to prohibit the terminal from downloading the application program;
and if at least one judgment result is negative, returning a negative confirmation message to prohibit the terminal from downloading the application program.
2. The method of claim 1, wherein determining whether the terminal has the authority to install the application corresponding to the application identifier according to a pre-stored control rule corresponding to the terminal identifier specifically includes:
determining a grouping information list where the terminal identification is located according to each pre-stored grouping information list;
determining a control rule corresponding to the grouping information list where the terminal identification is located according to the grouping information list where the terminal identification is located;
and judging whether the terminal has the authority of installing the application program corresponding to the application program identifier or not according to the determined control rule.
3. A method for controlling an application program, comprising:
monitoring application program downloading request information of a terminal;
determining an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information according to the application program downloading request information;
uploading the application program identifier, the download path information and the terminal identifier of the terminal to a server;
receiving a confirmation message or a denial message returned by the server according to the application program identifier, the download path information and the terminal identifier; the confirmation message or the denial message is obtained by judging whether the application program identifier exists in a pre-stored safety information list or not, judging whether the download path information exists in the pre-stored safety information list or not, judging whether the application program identifier and the download path information have a corresponding relation in the safety information list or not by the server, and judging whether the terminal has a judgment result of the permission to install the application program corresponding to the application program identifier or not according to a pre-stored control rule corresponding to the terminal identifier;
when receiving the confirmation message, downloading and installing the application program corresponding to the application program identifier;
and when the denial message is received, not downloading the application program corresponding to the application program identification.
4. The method of claim 3, wherein the method further comprises:
when receiving the confirmation message, displaying prompt information allowing downloading and installation;
and when the denial message is received, displaying prompt information for prohibiting downloading.
5. An apparatus for controlling an application program, comprising:
the terminal comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving an application program identifier corresponding to an application program uploaded before the terminal downloads the application program, download path information corresponding to the application program identifier and a terminal identifier of the terminal;
the judging module is used for judging whether the application program identifier exists in a pre-stored safety information list, judging whether the download path information exists in the pre-stored safety information list, and judging whether the application program identifier and the download path information have a corresponding relation in the safety information list;
the control module is used for judging whether the terminal has the authority of installing the application program corresponding to the application program identifier according to a control rule corresponding to the terminal identifier and stored in advance if the judgment result is yes, if so, returning a confirmation message to enable the terminal to download and install the application program, and if not, returning a denial message to prohibit the terminal from downloading the application program; and if at least one judgment result is negative, returning a negative confirmation message to prohibit the terminal from downloading the application program.
6. The apparatus according to claim 5, wherein the control module is specifically configured to determine a group information list where the terminal identifier is located according to each group information list stored in advance, determine a control rule corresponding to the group information list where the terminal identifier is located according to the group information list where the terminal identifier is located, and determine whether the terminal has the authority to install the application corresponding to the application identifier according to the determined control rule.
7. An apparatus for controlling an application program, comprising:
the monitoring module is used for monitoring application program downloading request information of the terminal;
the determining module is used for determining an application program identifier corresponding to the application program downloading request information and downloading path information corresponding to the application program downloading request information according to the application program downloading request information;
the uploading module is used for uploading the application program identifier, the downloading path information and the terminal identifier of the terminal to a server;
the receiving execution module is used for receiving a confirmation message or a denial message returned by the server according to the application program identifier, the download path information and the terminal identifier, downloading and installing the application program corresponding to the application program identifier when the confirmation message is received, and not downloading the application program corresponding to the application program identifier when the denial message is received;
the confirmation message or the denial message is obtained by the server judging whether the application program identifier exists in a pre-stored safety information list, judging whether the download path information exists in the pre-stored safety information list, judging whether the application program identifier and the download path information have a corresponding relation in the safety information list, and judging whether the terminal has a judgment result of the permission of installing the application program corresponding to the application program identifier according to a pre-stored control rule corresponding to the terminal identifier.
8. The apparatus of claim 7, wherein the apparatus further comprises: and the display module is used for displaying prompt information for allowing downloading and installation when receiving the confirmation message, and displaying prompt information for forbidding downloading when receiving the denial message.
CN201510969661.XA 2015-12-22 2015-12-22 Application program control method and device Active CN106909401B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510969661.XA CN106909401B (en) 2015-12-22 2015-12-22 Application program control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510969661.XA CN106909401B (en) 2015-12-22 2015-12-22 Application program control method and device

Publications (2)

Publication Number Publication Date
CN106909401A CN106909401A (en) 2017-06-30
CN106909401B true CN106909401B (en) 2021-05-25

Family

ID=59199572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510969661.XA Active CN106909401B (en) 2015-12-22 2015-12-22 Application program control method and device

Country Status (1)

Country Link
CN (1) CN106909401B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109901858A (en) * 2019-01-17 2019-06-18 平安普惠企业管理有限公司 Application software updates detection method, device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020032758A1 (en) * 2000-09-14 2002-03-14 Yen Hsiang Tsun Method and system for dynamically loading program logic into an application
CN103560997A (en) * 2013-10-09 2014-02-05 北京奇虎科技有限公司 Application program download management method and device and download server
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN103677935A (en) * 2013-12-23 2014-03-26 北京奇虎科技有限公司 Installation and control method, system and device for application programs
CN103902339A (en) * 2014-03-27 2014-07-02 海视云(北京)科技有限公司 Application installation method, terminal and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020032758A1 (en) * 2000-09-14 2002-03-14 Yen Hsiang Tsun Method and system for dynamically loading program logic into an application
CN103560997A (en) * 2013-10-09 2014-02-05 北京奇虎科技有限公司 Application program download management method and device and download server
CN103646215A (en) * 2013-12-23 2014-03-19 北京奇虎科技有限公司 Application installation control method, related system and related device
CN103677935A (en) * 2013-12-23 2014-03-26 北京奇虎科技有限公司 Installation and control method, system and device for application programs
CN103902339A (en) * 2014-03-27 2014-07-02 海视云(北京)科技有限公司 Application installation method, terminal and server

Also Published As

Publication number Publication date
CN106909401A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
CN111614656B (en) Credible management method and device for cross-link data and electronic equipment
US10257207B2 (en) Managed clone applications
Vignesh et al. Modifying security policies towards BYOD
US20150242629A1 (en) Smart containerization of mobile computing device resources
WO2015180690A1 (en) Method and device for reading verification information
CN103607385A (en) Method and apparatus for security detection based on browser
CN106897586B (en) Application Programming Interface (API) authority management method and device
AU2014235214A1 (en) Incremental compliance remediation
US10778648B2 (en) Systems and methods for regional data storage and data anonymization
EP3270318B1 (en) Dynamic security module terminal device and method for operating same
US11962601B1 (en) Automatically prioritizing computing resource configurations for remediation
US8612754B2 (en) Digital fingerprinting via SQL filestream with common text exclusion
CN104036194A (en) Vulnerability detection method and device for revealing private data in application program
US9734307B2 (en) User terminal interworking with peripheral device and method for preventing leakage of information using the same
US11251976B2 (en) Data security processing method and terminal thereof, and server
CN113704211A (en) Data query method and device, electronic equipment and storage medium
CN114244808A (en) Method and device for passively checking offline illegal external connection based on non-client mode
US9665732B2 (en) Secure Download from internet marketplace
CN106909401B (en) Application program control method and device
CN110941825B (en) Application monitoring method and device
Kang et al. A strengthening plan for enterprise information security based on cloud computing
CN112866265B (en) CSRF attack protection method and device
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN106485104B (en) Automatic restoration method, device and system for terminal security policy
JPWO2014155498A1 (en) Electronics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220825

Address after: No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science and Technology Park, High-tech Zone, Binhai New District, Tianjin 300000

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right