CN107229861A - Application memory, display methods and application memory, display device and terminal device - Google Patents

Application memory, display methods and application memory, display device and terminal device Download PDF

Info

Publication number
CN107229861A
CN107229861A CN201710500631.3A CN201710500631A CN107229861A CN 107229861 A CN107229861 A CN 107229861A CN 201710500631 A CN201710500631 A CN 201710500631A CN 107229861 A CN107229861 A CN 107229861A
Authority
CN
China
Prior art keywords
application
protection
protection label
label
designated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710500631.3A
Other languages
Chinese (zh)
Inventor
梅小虎
帅朝春
张俊
林志泳
李东蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710500631.3A priority Critical patent/CN107229861A/en
Publication of CN107229861A publication Critical patent/CN107229861A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention is applied to application message processing technology field there is provided application memory, display methods and application memory, display device and terminal device, including:Judge application to be stored whether by testing in advance;When application by testing in advance, the protection label specified in the configuration file increase of the application;By the application memory to given server, so as to when receiving the application searches instruction for the application, the protection label that the mark and the application for feeding back the application are specified.By the above method, it is easy to user's identification to apply and whether there is risk.

Description

Application storage and display method, application storage and display device and terminal equipment
Technical Field
The invention belongs to the technical field of application information processing, and particularly relates to an application storage method, an application display method, an application storage device, an application display device and terminal equipment.
Background
With the development of the intelligent terminal, the functions that can be realized by the intelligent terminal are more and more, but most of the functions of the intelligent terminal are realized by installing different applications.
At present, a user searches for a required application through a browser or an application store, and then downloads and installs the searched application into an intelligent terminal. However, when the downloaded application cannot be installed or there are other reasons, the user needs to uninstall the application and then search, download, and install the application again, which results in an excessively cumbersome operation. When the application downloaded by the user is related to the sensitive property information of the user, if the installed application is a disguised application, the operation is too complicated, and serious potential safety hazards are generated on the property information of the user.
Therefore, a new method is needed to solve the above technical problems.
Disclosure of Invention
In view of this, embodiments of the present invention provide an application storage method, an application display method, an application storage device, an application display device, and a terminal device, so as to solve the problem that it is difficult for a user to effectively identify whether an application to be downloaded has a risk in the prior art.
A first aspect of an embodiment of the present invention provides an application storage method, including:
judging whether the application to be stored passes the pre-test;
when the application passes the pre-test, adding a specified protection tag in a configuration file of the application;
storing the application to a designated server so as to feed back the identification of the application and the protection label designated by the application when receiving an application search instruction for the application.
A second aspect of an embodiment of the present invention provides an application display method, including:
receiving an application search instruction;
searching the corresponding application from the designated server according to the application searching instruction;
and when the corresponding application is searched, displaying the identification of the application and the protection label appointed by the application.
A third aspect of an embodiment of the present invention provides an application storage apparatus, including:
the application acquisition unit is used for acquiring the application and judging whether the application passes the preliminary test or not;
the device comprises a protection tag adding unit, a configuration file generating unit and a protection tag adding unit, wherein the protection tag adding unit is used for adding a specified protection tag in the configuration file of an application when the application passes a pre-test;
and the application storage unit is used for storing the application to a specified server.
A fourth aspect of an embodiment of the present invention provides an application display apparatus, including:
an application search instruction receiving unit for receiving an application search instruction;
the application searching unit is used for searching the corresponding application from the specified server according to the application searching instruction;
and the protection label display unit is used for displaying the identifier of the application and the protection label appointed by the application when the corresponding application is searched.
A fifth aspect of the embodiments of the present invention provides a terminal device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements, for example, a step of applying a storage method when executing the computer program, or implements, for example, a step of applying a display method when executing the computer program.
A sixth aspect of the embodiments of the present invention provides a computer-readable storage medium storing a computer program, where the processor implements, for example, a step of applying a storage method when executing the computer program, or implements, for example, a step of applying a display method when executing the computer program.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
because the application including the specified protection label is stored in the specified server, and only the application passing the pre-test includes the specified protection label, when the user downloads the application from the specified server, the specified protection label of the application can be acquired at the same time, so that the user can conveniently identify that the application has certain safety.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of an application storage method according to an embodiment of the present invention;
FIG. 2 is a flowchart of an application display method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an application storage device according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of an application display device according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows a flowchart of an application storage method according to an embodiment of the present invention, which is detailed as follows:
step S11, it is determined whether the application to be stored passes the preliminary test.
The type of the pre-test mainly comprises tests for safety, compatibility and the like of the application.
Optionally, the step S11 includes:
a1, acquiring basic information of an application and description information of the application, wherein the basic information of the application comprises an installation package of the application, and the description information of the application comprises a reliability description of a source of the application;
and A2, testing the acquired application according to the acquired basic information of the application and the description information of the application.
The basic information of the application includes an installation package of the application, the installation package of the application includes information such as a name and a type of the installation package, and the basic information of the application may further include information such as an application name and an application icon. The reliability description of the source of the application includes a reliability description of a download path of the application, for example, when the download path of the application is a download path of a specified official browser (or a partner browser), or a download path of a specified official store, the reliability description of the download path of the application is reliable, and when the download path of the application is a download path on a black list, the reliability description of the download path of the application is unreliable or reliability is to be verified. And/or the reliability description of the source of the application comprises user evaluation of the source of the application and the like. For example, when a user has used a certain application and has not found any problem, the user may rate the source of the certain application as reliable, or when the user has used a certain application and has found a problem, the user may rate the source of the certain application as unreliable or that reliability is to be verified.
The types of testing the obtained application are generally various, for example, the testing the obtained application includes testing in at least one of the following processes: the method comprises the steps of downloading (for example, screening whether an application meets the requirement of safety requirements or not for a download path of the downloaded application), installing (installing the screened application in various specified intelligent terminals, and judging whether the application is successfully installed in the specified intelligent terminals or not, for example, whether library files which cannot be opened exist in an installation package of the application or not), and running (recording whether a pause phenomenon occurs in running of the application, wherein the running condition comprises the running condition in the process of carrying out pressure test on the application, for example, after the application is started, carrying out pressure test on the application by setting the click frequency of an automatic test tool, and recording the running condition in the process of carrying out pressure test on the application).
And step S12, when the application passes the pre-test, adding a specified protection label to the configuration file of the application.
Specifically, when the application passes the pre-test, it is indicated that the application meets the requirements for security and compatibility, and at this time, a specified protection tag is added to the configuration file of the application, and the presentation form of the specified protection tag may be a graphic form (of course, when the protection tag is a graphic form (such as an icon), it is different from the graphic form of the application icon), or may be a text form. It should be noted that when the representation form of the designated protection tag is a graphic form, the graphic of the protection tag may be configured to include a static graphic, or both a static graphic and a dynamic graphic.
Optionally, different protection labels are added according to different application types, in this case, the step S12 includes:
and B1, when the application passes the preliminary test, judging whether the application is the first type application. The first type of application is mainly an application related to money information of a user, such as an application related to a bank and a payment application related to payment. Specifically, the basic information of the first type application preset by the basic information of the application is compared, if the basic information of the application is the same as the basic information of the first type application, the application is judged to be the first type application, and otherwise, the application is judged not to be the first type application.
And B2, when the application is the first type of application, adding a first protection label corresponding to the first type of application in the configuration file of the application.
And B3, when the application is a non-first-class application, adding a second protection label corresponding to the non-first-class application in a configuration file of the application.
It is noted that the first protective label and the second protective label differ in color and/or shape, for example, the color of the first protective label is more vivid in hue and color than the color of the second protective label, and/or the shape of the first protective label is larger than the shape of the second protective label.
Step S13, storing the application to a designated server, so as to feed back the identifier of the application and the protection tag designated by the application when receiving an application search instruction for the application.
Specifically, an application including a specified guard tag is stored to a specified server. Wherein the designated server is typically a server accessed by an application store or an official browser or a partner browser.
In the embodiment of the invention, the application is acquired, whether the application passes the pre-test or not is judged, and when the application passes the pre-test, the appointed protection tag is added to the configuration file of the application, and the application is stored to the appointed server. Because the application including the specified protection label is stored in the specified server, and only the application passing the pre-test includes the specified protection label, when the user downloads the application from the specified server, the specified protection label of the application can be acquired at the same time, so that the user can conveniently identify that the application has certain safety.
Fig. 2 shows a flowchart of an application display method according to an embodiment of the present invention, which is detailed as follows:
in step S21, an application search instruction is received.
Specifically, when a user searches for a certain application in an application store, an official browser or a partner browser through a terminal (the terminal may be a mobile terminal or a fixed terminal), an application search instruction is issued after a keyword of the certain application is input, and the terminal parses the keyword of the application included in the received application search instruction. Fig. 3, among other things, shows a schematic diagram of a mobile terminal including a memory 301, a processor 302, an input device 303, an output device 304, a bus 305.
And step S22, searching the corresponding application from the designated server according to the application searching instruction.
Wherein, the applications stored by the designated server are all the applications which are tested in advance.
And the terminal searches the application containing the keyword in the designated server according to the keyword of the application.
And step S23, when the corresponding application is searched, displaying the identification of the application and the protection label appointed by the application.
The identifier of the application is typically an application icon and/or an application name.
Optionally, the step S23 includes:
and C1, when the corresponding application is searched, acquiring the application icon and the designated protection label of the application from the configuration file.
And C2, displaying the application icon and the designated protection label, wherein the screen area occupied by the designated protection label is smaller than that occupied by the application icon. Specifically, when displaying an application icon and a designated protection label, the display positions of the application icon and the designated protection label are adjacent to each other, and in order to save the area of the terminal screen occupied by the display of the application icon and the designated protection label, the screen distance for displaying the application icon and the designated protection label is set to be less than or equal to 0, for example, when the designated protection label is an icon, the designated protection label and the application icon are partially overlapped and displayed, that is, the screen distance for displaying the application icon and the designated protection label is less than 0, of course, the partial overlap refers to that the application icon is on top, and the icon corresponding to a part of the designated protection label is under the application icon, so that a user can see all the application icons, but only a part of the designated protection label. For example, when the designated protection tab is a character, the designated protection tab is displayed adjacent to the application icon, such as displaying the designated protection tab above or below the application icon or to the left or right of the application icon, i.e., the screen distance between the application icon and the designated protection tab is equal to 0.
Further, the display mode of the application icon is set to be continuous display, and the display mode of the designated protection label is set to be flashing display. The appointed protection label is displayed in a flashing mode, so that the aim of highlighting the appointed protection label can be achieved, and the user can conveniently recognize the appointed protection label.
Optionally, in order to facilitate the user to identify the application installed by the user as an application passing the test, after the C2, the method includes:
and D1, receiving an application installation instruction.
D2, installing the downloaded application according to the application installation instruction, and displaying the protection label appointed by the application when the application is installed.
In the installation process, reading a protection tag specified by an application from a configuration file of the application, identifying whether the specified protection tag is in a graph form, if so, judging whether the graph form comprises a dynamic graph, and if so, displaying the dynamic graph when the application is installed, for example, displaying the specified protection tag of the dynamic graph on an installation progress bar, or displaying the specified protection tag of the dynamic graph at a specified position of an installation page (for example, above the installation page). Of course, if the protection tag is in a text form or a static graphic, the protection tag is displayed when the application is installed.
Optionally, in order to facilitate the user to identify the application used by the user as the application passing the test, after the C2, the method includes:
e1, receiving an application starting instruction.
E2, opening the corresponding application according to the application starting instruction, and displaying the protection label appointed by the application when opening and running the application.
Specifically, when the user runs the application, the protection tag specified by the application is displayed in a suspended manner on the page of the application, and of course, if the protection tag includes the dynamic graph, the protection tag corresponding to the dynamic graph is preferentially displayed so as to increase the visualization of the display.
Preferably, when the protection label corresponding to the dynamic graphic is displayed, if the protection label further includes the corresponding text, the text is displayed at the same time, so as to further prompt the user that the application used by the user is the tested application, and the user can use the application safely.
In the embodiment of the invention, an application searching instruction is received, a corresponding application is searched from a specified server according to the application searching instruction, and when the corresponding application is searched, the application identifier and the protection label specified by the application are displayed. Because the application identifier and the protection label specified by the application are displayed when the user searches the application, the user can identify that the application is tested and safe according to the protection label specified by the application, and the probability that the user downloads the disguised application is reduced.
Fig. 4 is a schematic structural diagram of an application storage device, and only a part related to an embodiment of the present invention is shown for convenience of explanation.
The application storage device includes: an application acquisition unit 41, a guard tag adding unit 42, and an application storage unit 43. Wherein:
an application acquisition unit 41, configured to acquire an application and determine whether the application passes a preliminary test.
The type of the pre-test mainly comprises tests for safety, compatibility and the like of the application.
Optionally, the application obtaining unit 41 includes:
the system comprises an application basic information acquisition module and an application description information acquisition module, wherein the application basic information acquisition module is used for acquiring basic information of an application and description information of the application, the basic information of the application comprises an installation package of the application, and the description information of the application comprises reliability description of a source of the application.
And the application testing module is used for testing the acquired application according to the acquired basic information of the application and the description information of the application.
The basic information of the application includes an installation package of the application, the installation package of the application includes information such as a name and a type of the installation package, and the basic information of the application may further include information such as an application name and an application icon. Wherein the reliability description of the source of the application comprises a reliability description of a download path of the application.
The types of testing the obtained application are generally various, for example, the testing the obtained application includes testing in at least one of the following processes: the method comprises the steps of downloading (for example, screening whether an application meets the requirement of safety requirements or not for a download path of the downloaded application), installing (installing the screened application in various specified intelligent terminals, and judging whether the application is successfully installed in the specified intelligent terminals or not, for example, whether library files which cannot be opened exist in an installation package of the application or not), and running (recording whether a pause phenomenon occurs in running of the application, wherein the running condition comprises the running condition in the process of carrying out pressure test on the application, for example, after the application is started, carrying out pressure test on the application by setting the click frequency of an automatic test tool, and recording the running condition in the process of carrying out pressure test on the application).
And the protection tag adding unit 42 is used for adding the specified protection tag in the configuration file of the application when the application passes the pre-test.
The expression form of the designated protection label can be a graphic form or a text form. It should be noted that when the representation form of the designated protection tag is a graphic form, the graphic of the protection tag may be configured to include a static graphic, or both a static graphic and a dynamic graphic.
Optionally, different protection labels are added according to different application types, and the protection label adding unit 42 includes:
and the application type judging module is used for judging whether the application is the first type application or not when the application passes the pre-test. The first type of application is mainly an application related to money information of a user, such as an application related to a bank and a payment application related to payment.
The first protection tag adding module is used for adding a first protection tag corresponding to the first type of application in a configuration file of the application when the application is the first type of application.
And the second protection label adding module is used for adding a second protection label corresponding to the non-first-class application in the configuration file of the application when the application is the non-first-class application.
It is noted that the first protective label and the second protective label differ in color and/or shape, for example, the color of the first protective label is more vivid in hue and color than the color of the second protective label, and/or the shape of the first protective label is larger than the shape of the second protective label.
An application storage unit 43, configured to store the application to a specified server.
Wherein the designated server is typically a server accessed by an application store or an official browser or a partner browser.
In the embodiment of the invention, because the application comprising the specified protection label is stored to the specified server, and only the application passing the pre-test comprises the specified protection label, when the user downloads the application from the specified server, the user can simultaneously obtain the specified protection label of the application, thereby being convenient for the user to identify that the application has certain safety.
Fig. 5 is a schematic structural diagram of an application display device according to an embodiment of the present invention, and for convenience of description, only the portions related to the embodiment of the present invention are shown.
The application display device includes: an application search instruction receiving unit 51, an application search unit 52, and an armband display unit 53. Wherein:
an application search instruction receiving unit 51 for receiving an application search instruction.
And an application searching unit 52, configured to search for a corresponding application from a specified server according to the application search instruction.
Wherein, the applications stored by the designated server are all the applications which are tested in advance.
And the terminal searches the application containing the keyword in the designated server according to the keyword of the application.
And a protection tag display unit 53, configured to display the identifier of the application and the protection tag specified by the application when the corresponding application is searched.
The identifier of the application is typically an application icon and/or an application name.
Optionally, the protection tag display unit 53 includes:
and the protective label obtaining module is used for obtaining the application icon and the appointed protective label of the application from the configuration file when the corresponding application is searched.
And the application icon and protection label display module is used for displaying the application icon and the appointed protection label, and the screen area occupied by the appointed protection label is smaller than the screen area occupied by the application icon. Specifically, when displaying an application icon and a designated protection label, the display positions of the application icon and the designated protection label are adjacent to each other, and in order to save the area of the terminal screen occupied by the display of the application icon and the designated protection label, the screen distance for displaying the application icon and the designated protection label is set to be less than or equal to 0, for example, when the designated protection label is an icon, the designated protection label and the application icon are partially overlapped and displayed, that is, the screen distance for displaying the application icon and the designated protection label is less than 0, of course, the partial overlap refers to that the application icon is on top, and the icon corresponding to a part of the designated protection label is under the application icon, so that a user can see all the application icons, but only a part of the designated protection label. For example, when the designated protection tab is a character, the designated protection tab is displayed adjacent to the application icon, such as displaying the designated protection tab above or below the application icon or to the left or right of the application icon, i.e., the screen distance between the application icon and the designated protection tab is equal to 0. Further, the display mode of the application icon is set to be continuous display, and the display mode of the designated protection label is set to be flashing display. The appointed protection label is displayed in a flashing mode, so that the aim of highlighting the appointed protection label can be achieved, and the user can conveniently recognize the appointed protection label.
Optionally, in order to facilitate the user to identify the application installed therein as the application passing the test, the application display apparatus includes:
and the application installation instruction receiving unit is used for receiving the application installation instruction.
And the application installation unit is used for installing the downloaded application according to the application installation instruction and displaying the protection label appointed by the application when the application is installed.
In the installation process, reading a protection tag specified by an application from a configuration file of the application, identifying whether the specified protection tag is in a graph form, if so, judging whether the graph form comprises a dynamic graph, and if so, displaying the dynamic graph when the application is installed, for example, displaying the specified protection tag of the dynamic graph on an installation progress bar, or displaying the specified protection tag of the dynamic graph at a specified position of an installation page (for example, above the installation page). Of course, if the protection tag is in a text form or a static graphic, the protection tag is displayed when the application is installed.
Optionally, in order to facilitate the user to identify the application used by the user as the application passing the test, the application display device includes:
and the application starting instruction receiving unit is used for receiving the application starting instruction.
And the application opening unit is used for opening the corresponding application according to the application starting instruction and displaying the protection label appointed by the application when the application is opened and operated.
Specifically, when the user runs the application, the protection tag specified by the application is displayed in a suspended manner on the page of the application, and of course, if the protection tag includes the dynamic graph, the protection tag corresponding to the dynamic graph is preferentially displayed so as to increase the visualization of the display.
Preferably, when the protection label corresponding to the dynamic graphic is displayed, if the protection label further includes the corresponding text, the text is displayed at the same time, so as to further prompt the user that the application used by the user is the tested application, and the user can use the application safely.
In the embodiment of the invention, the application identifier and the protection label appointed by the application are displayed when the user searches the application, so that the user can identify that the application is tested and safe according to the protection label appointed by the application, and the probability of downloading the disguised application by the user is reduced.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Fig. 6 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 6, the terminal device 6 of this embodiment includes: a processor 60, a memory 61 and a computer program 62 stored in said memory 61 and executable on said processor 60. The processor 60 implements the steps in the various application storage method embodiments described above, such as steps S11 through S13 shown in fig. 1, when executing the computer program 62, and the processor 60 implements the steps in the various application display method embodiments described above, such as steps S21 through S23 shown in fig. 2, when executing the computer program 62. Alternatively, the processor 60, when executing the computer program 62, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the modules 41 to 43 shown in fig. 4, and the functions of the modules 51 to 53 shown in fig. 5.
Illustratively, the computer program 62 may be partitioned into one or more modules/units that are stored in the memory 61 and executed by the processor 60 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 62 in the terminal device 6. For example, the computer program 62 may be divided into an application acquisition unit, a security label adding unit, and an application storage unit, or divided into an application search instruction receiving unit, an application search unit, and a security label display unit, where the specific functions of the units are as follows:
the application acquisition unit is used for acquiring the application and judging whether the application passes the preliminary test or not;
the device comprises a protection tag adding unit, a configuration file generating unit and a protection tag adding unit, wherein the protection tag adding unit is used for adding a specified protection tag in the configuration file of an application when the application passes a pre-test;
and the application storage unit is used for storing the application to a specified server.
Or,
an application search instruction receiving unit for receiving an application search instruction;
the application searching unit is used for searching the corresponding application from the specified server according to the application searching instruction;
and the protection label display unit is used for displaying the identifier of the application and the protection label appointed by the application when the corresponding application is searched.
The terminal device 6 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 6 is merely an example of a terminal device 6 and does not constitute a limitation of terminal device 6 and may include more or less components than those shown, or some components in combination, or different components, for example, the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 6. Further, the memory 61 may also include both an internal storage unit and an external storage device of the terminal device 6. The memory 61 is used for storing the computer program and other programs and data required by the terminal device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. An application storage method, comprising:
judging whether the application to be stored passes the pre-test;
when the application passes the pre-test, adding a specified protection tag in a configuration file of the application;
storing the application to a designated server so as to feed back the identification of the application and the protection label designated by the application when receiving an application search instruction for the application.
2. An application display method, comprising:
receiving an application search instruction;
searching the corresponding application from the designated server according to the application searching instruction;
and when the corresponding application is searched, displaying the identification of the application and the protection label appointed by the application.
3. The application display method of claim 2, wherein displaying the application identifier and the application-specific protection label when the corresponding application is searched comprises:
when a corresponding application is searched, acquiring an application icon and a designated protection label of the application from a configuration file;
and displaying the application icon and the designated protection label, wherein the screen area occupied by the designated protection label is smaller than that occupied by the application icon.
4. The application display method of claim 3, after said displaying the application icon and the designated guard tag, comprising:
receiving an application installation instruction;
and installing the downloaded application according to the application installation instruction, and displaying the protection label appointed by the application when the application is installed.
5. The application display method of claim 3, after said displaying the application icon and the designated guard tag, comprising:
receiving an application starting instruction;
and opening the corresponding application according to the application starting instruction, and displaying the protection label appointed by the application when the application is opened and operated.
6. An application storage device, comprising:
the application acquisition unit is used for judging whether the application to be stored passes the pre-test;
the device comprises a protection tag adding unit, a configuration file generating unit and a protection tag adding unit, wherein the protection tag adding unit is used for adding a specified protection tag in the configuration file of an application when the application passes a pre-test;
and the application storage unit is used for storing the application to a specified server so as to feed back the identification of the application and the protection label specified by the application when an application search instruction aiming at the application is received.
7. An application display device, comprising:
an application search instruction receiving unit for receiving an application search instruction;
the application searching unit is used for searching the corresponding application from the specified server according to the application searching instruction;
and the protection label display unit is used for displaying the identifier of the application and the protection label appointed by the application when the corresponding application is searched.
8. The application display device of claim 7, wherein the protection label display unit comprises:
the device comprises a protection tag acquisition module, a protection tag selection module and a protection tag selection module, wherein the protection tag acquisition module is used for acquiring an application icon and a specified protection tag of an application from a configuration file when the corresponding application is searched;
and the application icon and protection label display module is used for displaying the application icon and the appointed protection label, and the screen area occupied by the appointed protection label is smaller than the screen area occupied by the application icon.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to claim 1 when executing the computer program or implements the steps of the method according to any of claims 2 to 5 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, wherein the steps of the method according to claim 1 are implemented when the computer program is executed by a processor, or wherein the steps of the method according to any one of claims 2 to 5 are implemented when the computer program is executed by the processor.
CN201710500631.3A 2017-06-27 2017-06-27 Application memory, display methods and application memory, display device and terminal device Pending CN107229861A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710500631.3A CN107229861A (en) 2017-06-27 2017-06-27 Application memory, display methods and application memory, display device and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710500631.3A CN107229861A (en) 2017-06-27 2017-06-27 Application memory, display methods and application memory, display device and terminal device

Publications (1)

Publication Number Publication Date
CN107229861A true CN107229861A (en) 2017-10-03

Family

ID=59935636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710500631.3A Pending CN107229861A (en) 2017-06-27 2017-06-27 Application memory, display methods and application memory, display device and terminal device

Country Status (1)

Country Link
CN (1) CN107229861A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120216122A1 (en) * 2011-02-23 2012-08-23 Microsoft Corporation Application store topics
CN102693495A (en) * 2011-03-21 2012-09-26 微软公司 Filtering and promoting application store applications
CN103020528A (en) * 2012-12-24 2013-04-03 珠海市君天电子科技有限公司 Display method and display device for malicious acts of applications
CN103092653A (en) * 2013-01-16 2013-05-08 珠海市君天电子科技有限公司 Method and device capable of providing official application program in application market
CN104253791A (en) * 2013-06-27 2014-12-31 华为终端有限公司 Webpage application security access method, server and client
CN105095427A (en) * 2015-07-17 2015-11-25 小米科技有限责任公司 Search recommendation method and device
CN105512233A (en) * 2015-11-30 2016-04-20 北京奇虎科技有限公司 Application shop application search method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120216122A1 (en) * 2011-02-23 2012-08-23 Microsoft Corporation Application store topics
CN102693495A (en) * 2011-03-21 2012-09-26 微软公司 Filtering and promoting application store applications
CN103020528A (en) * 2012-12-24 2013-04-03 珠海市君天电子科技有限公司 Display method and display device for malicious acts of applications
CN103092653A (en) * 2013-01-16 2013-05-08 珠海市君天电子科技有限公司 Method and device capable of providing official application program in application market
CN104253791A (en) * 2013-06-27 2014-12-31 华为终端有限公司 Webpage application security access method, server and client
CN105095427A (en) * 2015-07-17 2015-11-25 小米科技有限责任公司 Search recommendation method and device
CN105512233A (en) * 2015-11-30 2016-04-20 北京奇虎科技有限公司 Application shop application search method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PCHOME: "安全最重要豌豆荚新版应用搜索评测", 《HTTP://ARTICLE.PCHOME.NET/CONTENT-1569175-ALL.HTML#P2》 *

Similar Documents

Publication Publication Date Title
US9177136B2 (en) Information device, program, method, and computer readable recording medium for preventing execution of malicious program code
CN108427731B (en) Page code processing method and device, terminal equipment and medium
CN104954353B (en) The method of calibration and device of APK file bag
US11137909B2 (en) Secure data entry via a virtual keyboard
CN104375856A (en) Application updating method and device
CN107133165B (en) Browser compatibility detection method and device
CN110866258B (en) Rapid vulnerability positioning method, electronic device and storage medium
CN112231702B (en) Application protection method, device, equipment and medium
CN109388946A (en) Malicious process detection method, device, electronic equipment and storage medium
CN103092653A (en) Method and device capable of providing official application program in application market
CN106708704A (en) Method and device for classifying crash logs
CN107480068A (en) Code integrity detection method, device, electric terminal and readable storage medium storing program for executing
CN110889116A (en) Advertisement blocking method and device and electronic equipment
CN110704303B (en) Method and device for acquiring test coverage information
CN112671609A (en) Asset census and safety detection method and device and terminal equipment
CN110287700B (en) iOS application security analysis method and device
US11868465B2 (en) Binary image stack cookie protection
CN105354490B (en) Method and equipment for processing hijacked browser
CN110704311A (en) Application program testing method and device, electronic equipment and readable storage medium
CN107229861A (en) Application memory, display methods and application memory, display device and terminal device
CN111008058A (en) Page display method and device
CN107368337B (en) Application downloading method and device and terminal equipment
CN110245308B (en) Image extraction method and device and terminal equipment
CN115587359A (en) Permission detection method and device of application package, electronic equipment and storage medium
CN115712917A (en) Desensitization method and device for sensitive data, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003