CN107295085B - Application message processing and method for down loading, server, client and terminal device - Google Patents

Application message processing and method for down loading, server, client and terminal device Download PDF

Info

Publication number
CN107295085B
CN107295085B CN201710505582.2A CN201710505582A CN107295085B CN 107295085 B CN107295085 B CN 107295085B CN 201710505582 A CN201710505582 A CN 201710505582A CN 107295085 B CN107295085 B CN 107295085B
Authority
CN
China
Prior art keywords
application
information
client
server
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710505582.2A
Other languages
Chinese (zh)
Other versions
CN107295085A (en
Inventor
梅小虎
帅朝春
张俊
林志泳
李东蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710505582.2A priority Critical patent/CN107295085B/en
Publication of CN107295085A publication Critical patent/CN107295085A/en
Priority to PCT/CN2018/093330 priority patent/WO2019001510A1/en
Application granted granted Critical
Publication of CN107295085B publication Critical patent/CN107295085B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention is suitable for application message processing technology field, provides application message processing and method for down loading, server, client and terminal device, comprising: receives the application query instruction that client is sent, the application query instruction carries the unique identification of application;Judge whether the corresponding application of the unique identification of the application is specified application, and the specified application is to be related to the application of user's proprietary information;When the corresponding application of the unique identification of the application is specified application, client is sent to after encrypting the information of the application, so that after the information of the application received is decrypted in the client, corresponding application is downloaded according to the information of the application after decryption, the information of the application includes the download address of application.By the above method, the safety of user's proprietary information can be improved.

Description

Application message processing and method for down loading, server, client and terminal device
Technical field
The invention belongs to application message processing technology field more particularly to application message processing and method for down loading, server, Client and terminal device.
Background technique
Currently, by mobile terminal (such as mobile phone) install application related with property realize fund transfer accounts, pay it is more next It is more popular.
Since application related with property is related to the proprietary information safety of user's sensitivity, if some illegal answers With market and camouflage applications once being mounted, serious security risk will be generated to the proprietary information of user.
Therefore, it is desirable to provide the new method of one kind is to solve the above problems.
Summary of the invention
In view of this, the embodiment of the invention provides application message processing and method for down loading, server, client and terminals Equipment, with solve the prior art be difficult to ensure downloading application be non-camouflage applications, thus make user proprietary information exist peace The problem of full hidden danger.
The first aspect of the embodiment of the present invention provides a kind of application message processing method, comprising:
The application query instruction that client is sent is received, the application query instruction carries the unique identification of application;
Judge whether the corresponding application of the unique identification of the application is specified application, and the specified application is to be related to user The application of proprietary information;
The application the corresponding application of unique identification be it is specified in application, encrypting the information of the application after be sent to Client, so that after the information of the application received is decrypted in the client, according to the application after decryption Information download corresponding application, the information of the application includes the download address of application.
The second aspect of the embodiment of the present invention provides a kind of using method for down loading, comprising:
Sending application inquiry instruction to server, the application query instruction carries the unique identification of application;
Receive the information of the application for the encryption that the server is sent, the information of the application includes the downloading of application Location;
Decipherment algorithm according to the pre-stored data decrypts the information of the application of the encryption, under the application obtained according to decryption Set address downloads corresponding application.
The third aspect of the embodiment of the present invention provides a kind of server, comprising:
Application query instruction receiving unit, for receiving the application query instruction of client transmission, the application query refers to Enable the unique identification for carrying application;
Specified to apply judging unit, whether the corresponding application of unique identification for judging the application is specified application, The specified application is to be related to the application of user's proprietary information;
Information encryption unit is specified in application, described in encryption for the corresponding application of unique identification in the application It is sent to client after the information of application, so that after the information of the application received is decrypted in the client, root Corresponding application is downloaded according to the information of the application after decryption, the information of the application includes the download address of application.
The fourth aspect of the embodiment of the present invention provides a kind of client, comprising:
Application query instruction sending unit, for sending application inquiry instruction to server, the application query instruction is taken Unique identification with application;
The information receiving unit of encryption, the information of the application for receiving the encryption that the server is sent, the application Information include application download address;
Information decrypting unit decrypts the information of the application of the encryption for decipherment algorithm according to the pre-stored data, according to The download address for decrypting obtained application downloads corresponding application.
5th aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program It realizes such as the step of any one of application message processing method the method.
6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, realizes when the computer program is executed by processor such as any one of application message processing method The step of the method.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
Due to the corresponding application of unique identification in the application be it is specified in application, encrypting the information of the application after send out It send to client, and the specified application is to be related to the application of user's proprietary information, therefore, so that be sent to client includes The information of the application of download address is safer, and then guarantees that the application of client downloads is non-camouflage applications, to improve use The safety of family proprietary information.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow chart of application message processing method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart using method for down loading provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of client provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Fig. 1 shows a kind of flow chart of application message processing method provided in an embodiment of the present invention, the embodiment of the present invention It is mainly described from service end side, details are as follows:
Step S11, receives the application query instruction that client is sent, and the application query instruction carries unique mark of application Know.
Specifically, user can be clicked after the input information such as key application word be shown on mobile terminal screen " inquiry is pressed Button " issues application query instruction, which is forwarded to server again by mobile terminal, so that the server receives application and looks into Ask instruction.Wherein, Fig. 2 shows a kind of schematic diagram of mobile terminal, the mobile terminal include memory 201, processor 202, Input equipment 203, output equipment 204, bus 205.
Wherein, which, which refers to, provides the server of valid application download information, such as official's server, application shop Server or legal partner server.
Wherein, the mark of application is used for unique identification application, including Apply Names, application icon, any using packet name etc. Kind.
Step S12 judges whether the corresponding application of the unique identification of the application is specified application, and the specified application is It is related to the application of user's proprietary information.
Wherein, which is predominantly related to the application of user's proprietary information, such as application related with bank, with stock Ticket and the related application of fund, related payment class applies (such as Taobao, wechat) with payment.
Specifically, by compared with the unique identification of pre-stored specified application, if they are the same, sentencing the unique identification applied Surely the application inquired is specified application, otherwise, it is determined that the application of inquiry is not specified application.
Step S13 is specified in application, encrypting the information of the application in the corresponding application of the unique identification of the application After be sent to client so that the information of the client application based on the received downloads corresponding application, the application Information include application download address.
Specifically, in conjunction with server and/or hardware configuration, the encrypted information content of client (such as mobile terminal) itself Size, network transfer speeds select corresponding Encryption Algorithm, for example, setting server and/or client (such as mobile terminal) are originally The corresponding relationship of the hardware configuration of body, encrypted information content size and network transfer speeds and different Encryption Algorithm, works as clothes Hardware configuration, encrypted information content size and the network transfer speeds for device and/or the client (such as mobile terminal) itself of being engaged in Eligible a period of time, algorithm of the corresponding Encryption Algorithm of alternative condition one as the information of encryption application, as server and/or visitor Hardware configuration, encrypted information content size and the network transfer speeds eligible two at family end (such as mobile terminal) itself When, algorithm of the corresponding Encryption Algorithm of alternative condition two as the information of encryption application, other and so on do not limit herein It is fixed.Certainly, the hardware configuration of server and/or client (such as mobile terminal) itself is higher, the Encryption Algorithm being able to achieve More complicated, bring safety is also higher.
Wherein, server-side can determine the hardware configuration of client itself in the following manner: send receiving client Application query instruction when, hardware configuration acquisition request is sent to client, to obtain its own hardware from the client Configuration.
Alternatively,
The size of the application of the frequency and/or downloading for the application that server statistics client is downloaded from the server, according to The hardware configuration of statistical result estimation client itself.Specifically, when the frequency of the application of downloading is higher and/or the application of downloading Size it is bigger when, estimate that the hardware configuration of the client itself is higher, conversely, estimating that the hardware configuration of the client itself is got over It is low.
Optionally, the information of the application further includes the instruction information of download channel, at this point, the step S13 includes:
The instruction information of A1, the download address of the encryption application and download channel.Wherein, the instruction information of download channel Such as " XX high-speed downloads " corresponding downloading mark.Specifically, for the ease of improving enciphering rate, same encryption can be used and calculate Method encrypts the download address of the application and the instruction information of download channel.
A2, the instruction information of the download address of the encrypted application and download channel is sent to client, so that The client downloads corresponding application from the download address of the application by the instruction information of the download channel.Specifically It ground can be by ftps cryptographic protocol, by the download address of the encrypted application and download channel in order to increase safety Instruction information is sent to client.
Optionally, in order to increase encrypted application information anti-interference, then be up in the use of Encryption Algorithm To after duration threshold value, alternatively, the use duration in Encryption Algorithm does not reach duration threshold value, but the information of encrypted application It is cracked, then needs to change the Encryption Algorithm, at this point, the application message processing method further include:
B1, the modification application information Encryption Algorithm.Here modification is primarily referred to as using new anti-interference more Strong Encryption Algorithm replaces the original Encryption Algorithm of server.
B2, client upgrade package is generated according to decipherment algorithm corresponding with modified Encryption Algorithm.
B3, upgrade tip is sent to the client, so that the client obtains the client upgrade package and executes Updating operation.Specifically, server can directly transmit upgrade tip to client after generating client upgrade package, can also be in visitor Family end just sends upgrade tip to client after accessing again.It should be pointed out that in the 2nd kind of situation, if client is again The interval time for accessing server is longer, within the period that client does not access server, server update repeatedly plus Close algorithm generates multiple client upgrade package, then no matter whether client obtained client upgrade package, all will be newest Client upgrade package is sent to client.
In the embodiment of the present invention, the application query instruction that client is sent is received, the application query instruction carries application Unique identification, judge whether the corresponding application of the unique identification of the application is specified application, and the specified application is to be related to The application of user's proprietary information is specified in application, encrypting the application in the corresponding application of the unique identification of the application Client is sent to after information, so that after the information of the application received is decrypted in the client, according to decryption The information of the application afterwards downloads corresponding application, and the information of the application includes the download address of application.Due to described The corresponding application of the unique identification of application be it is specified in application, encrypting the information of the application after be sent to client, and it is described Specified application is is related to the application of user's proprietary information, therefore, so that be sent to the application including download address of client Information is safer, and then guarantees that the application of client downloads is non-camouflage applications, to improve the safety of user's proprietary information Property.
Fig. 3 shows a kind of flow chart using method for down loading provided in an embodiment of the present invention, and the embodiment of the present invention is main It is described from client-side, details are as follows:
Step S31, sending application inquiry instruction to server, the application query instruction carry the unique identification of application.
Specifically, user can click on client (such as mobile terminal) screen after the information such as input key application word and show " inquiry button " issue application query instruction, which is forwarded to server for the instruction of received application query again.
Step S32, receives the information of the application for the encryption that the server is sent, and the information of the application includes application Download address.
Step S33, decipherment algorithm according to the pre-stored data decrypt the information of the application of the encryption, are obtained according to decryption The download address of application downloads corresponding application.
Specifically, client obtains the decipherment algorithm of the information of application from server, and stores the decipherment algorithm, works as client After termination receives the information of the application of the encryption of server transmission, the application of the encryption is decrypted according to its decipherment algorithm stored Information after the download address for the application that the information being applied includes, downloads corresponding application from the download address.
Optionally, in order to increase encrypted application information anti-interference, then be up in the use of Encryption Algorithm To after duration threshold value, alternatively, the use duration in Encryption Algorithm does not reach duration threshold value, but the information of encrypted application It is cracked, then server needs to change the Encryption Algorithm, at this point, described apply method for down loading further include:
C1, the upgrade tip that the server is sent is received.Specifically, if server is straight after generating client upgrade package Upgrade tip is received and sent to client, then client can working condition (as being in energized state), no matter the client is place It is in black state in screen starting state, can all receive the upgrade tip of server transmission;If server be Upgrade tip is retransmited after receiving the application query instruction of client transmission again, then the client will access the service Device receives the upgrade tip of the server transmission when such as opening application shop.
C2, client upgrade package is obtained from the server according to the upgrade tip, the client upgrade package includes Decipherment algorithm corresponding with the modified Encryption Algorithm of the server.It should be pointed out that in the 2nd kind of situation, if client The interval time that end accesses server again is longer, within the period that client does not access server, server update Multiple Encryption Algorithm generates multiple client upgrade package, then no matter whether client obtained client upgrade package, from clothes Be engaged in device acquisition will be newest client upgrade package.
C3, execute corresponding updating operation according to the client upgrade package, and with the modified encryption of the server The corresponding decipherment algorithm of algorithm replaces original decipherment algorithm.Specifically, after obtaining new decipherment algorithm, original solution is deleted Close algorithm, and store the new decipherment algorithm.
In the embodiment of the present invention, sending application inquiry instruction to server, the application query instruction carries application only One mark receives the information of the application for the encryption that the server is sent, and the information of the application includes the download address of application, Decipherment algorithm according to the pre-stored data decrypts the information of the application of the encryption, according under the download address for decrypting obtained application Carry corresponding application.Due to client obtain download address be by encryption, and encrypt download address anti-interference Higher than the download address of unencryption, therefore, the download address that client is obtained from decryption is downloaded in application, can guarantee its downloading Application be non-camouflage applications, to improve the safety of user's proprietary information.
Corresponding with above-mentioned application message processing method, Fig. 4 shows the structure of server provided in an embodiment of the present invention Schematic diagram, for ease of description, only parts related to embodiments of the present invention are shown.
The server includes: application query instruction receiving unit 41, specifies using judging unit 42, information encryption unit 43.Wherein:
Application query instruction receiving unit 41, for receiving the application query instruction of client transmission, the application query Instruction carries the unique identification of application.
Wherein, the mark of application is used for unique identification application, including Apply Names, application icon, any using packet name etc. Kind.
Specified to apply judging unit 42, whether the corresponding application of unique identification for judging the application is specified answer With the specified application is to be related to the application of user's proprietary information.
Wherein, which is predominantly related to the application of user's proprietary information, such as application related with bank, with stock Ticket and the related application of fund, related payment class applies (such as Taobao, wechat) with payment.
Information encryption unit 43 is specified for the corresponding application of unique identification in the application in application, encrypting institute It is sent to client after stating the information of application, so that after the information of the application received is decrypted in the client, Corresponding application is downloaded according to the information of the application after decryption, the information of the application includes the download address of application.
Specifically, in conjunction with server and/or hardware configuration, the encrypted information content of client (such as mobile terminal) itself Size, network transfer speeds select corresponding Encryption Algorithm,
Wherein, server-side can determine the hardware configuration of client itself in the following manner: send receiving client Application query instruction when, hardware configuration acquisition request is sent to client, to obtain its own hardware from the client Configuration.
Alternatively,
The size of the application of the frequency and/or downloading for the application that server statistics client is downloaded from the server, according to The hardware configuration of statistical result estimation client itself.Specifically, when the frequency of the application of downloading is higher and/or the application of downloading Size it is bigger when, estimate that the hardware configuration of the client itself is higher, conversely, estimating that the hardware configuration of the client itself is got over It is low.
Optionally, the information of the application further includes the instruction information of download channel, at this point, the information encryption unit 43 Include:
Download address encrypting module, for encrypting the download address of the application and the instruction information of download channel.
Download address sending module, for by the instruction information of the download address of the encrypted application and download channel It is sent to client, so that the client is downloaded by the instruction information of the download channel from the download address of the application Corresponding application.It specifically, can be by ftps cryptographic protocol, by the downloading of the encrypted application in order to increase safety The instruction information of address and download channel is sent to client.
In order to increase encrypted application information anti-interference, then reach duration threshold in the use duration of Encryption Algorithm After value, alternatively, the use duration in Encryption Algorithm does not reach duration threshold value, but the information of encrypted application is cracked, It then needs to change the Encryption Algorithm, at this point, the server further include:
Encryption Algorithm modifies unit, for modifying the Encryption Algorithm of the information of the application and determining that corresponding decryption is calculated Method.
Client upgrade package generation unit, for generating the client upgrade package including the decipherment algorithm.
Upgrade tip transmission unit, for sending upgrade tip to the client, so that described in client acquisition Client upgrade package simultaneously executes updating operation.Specifically, server can directly transmit upgrading after generating client upgrade package and mention Show to client, upgrade tip can also be just sent after client accesses again to client.
In the embodiment of the present invention, specified by the corresponding application of unique identification in the application in application, encrypting institute It is sent to client after stating the information of application, and the specified application is to be related to the application of user's proprietary information, therefore, so that hair It send the information to the application including download address of client safer, and then guarantees that the application of client downloads is that non-camouflage is answered With to improve the safety of user's proprietary information.
Corresponding with above-mentioned application method for down loading, Fig. 5 shows a kind of structure of client provided in an embodiment of the present invention Schematic diagram, for ease of description, only parts related to embodiments of the present invention are shown.
The client includes: application query instruction sending unit 51, the information receiving unit 52 of encryption, information decrypting unit 53.Wherein:
Application query instruction sending unit 51, for sending application inquiry instruction to server, the application query instruction Carry the unique identification of application.
The information receiving unit 52 of encryption, the information of the application for receiving the encryption that the server is sent are described to answer Information includes the download address of application.
Information decrypting unit 53 decrypts the information of the application of the encryption, root for decipherment algorithm according to the pre-stored data The download address of the application obtained according to decryption downloads corresponding application.
Optionally, in order to increase encrypted application information anti-interference, then be up in the use of Encryption Algorithm To after duration threshold value, alternatively, the use duration in Encryption Algorithm does not reach duration threshold value, but the information of encrypted application It is cracked, then server needs to change the Encryption Algorithm, at this point, the client further include:
Upgrade tip receiving unit, the upgrade tip sent for receiving the server.Specifically, if server is in life At upgrade tip is directly transmitted after client upgrade package to client, then client can working condition (as being in energization shape State), no matter the client is to be in black state in screen starting state, it can all receive the liter of server transmission Grade prompt;If server is to retransmit upgrade tip after the application query instruction for receiving client transmission again, the visitor Family end will access the server, when such as opening application shop, receive the upgrade tip of server transmission.
Client upgrade package is obtained from the server according to the upgrade tip, the client upgrade package includes and institute State the corresponding decipherment algorithm of the modified Encryption Algorithm of server.
Upgrade unit for executing corresponding updating operation according to the client upgrade package, and is repaired with the server The corresponding decipherment algorithm of Encryption Algorithm after changing replaces original decipherment algorithm.
In the embodiment of the present invention, due to client obtain download address be by encryption, and encrypt download address Anti-interference be higher than the download address of unencryption, therefore, client is downloaded from the obtained download address of decryption in application, can The application for guaranteeing its downloading is non-camouflage applications, to improve the safety of user's proprietary information.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Fig. 6 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in fig. 6, the terminal of the embodiment is set Standby 6 include: processor 60, memory 61 and are stored in the meter that can be run in the memory 61 and on the processor 60 Calculation machine program 62.The processor 60 realizes that above-mentioned each application message processing method is implemented when executing the computer program 62 Step in example, such as step S11 to S13 shown in FIG. 1.Alternatively, when the processor 60 executes the computer program 62 Realize the function of each module/unit in above-mentioned each Installation practice, such as the function of unit 41 to 44 shown in Fig. 4.
Illustratively, the computer program 62 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 61, and are executed by the processor 60, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 62 in the terminal device 6 is described.For example, the computer program 62 can be divided It is cut into application query instruction receiving unit, is specified using judging unit, information encryption unit, each unit concrete function is as follows:
Application query instruction receiving unit, for receiving the application query instruction of client transmission, the application query refers to Enable the unique identification for carrying application;
Specified to apply judging unit, whether the corresponding application of unique identification for judging the application is specified application, The specified application is to be related to the application of user's proprietary information;
Information encryption unit is specified in application, described in encryption for the corresponding application of unique identification in the application It is sent to client after the information of application, so that after the information of the application received is decrypted in the client, root Corresponding application is downloaded according to the information of the application after decryption, the information of the application includes the download address of application.
The terminal device 6 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The terminal device may include, but be not limited only to, processor 60, memory 61.It will be understood by those skilled in the art that Fig. 6 The only example of terminal device 6 does not constitute the restriction to terminal device 6, may include than illustrating more or fewer portions Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 60 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 61 can be the internal storage unit of the terminal device 6, such as the hard disk or interior of terminal device 6 It deposits.The memory 61 is also possible to the External memory equipment of the terminal device 6, such as be equipped on the terminal device 6 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 61 can also both include the storage inside list of the terminal device 6 Member also includes External memory equipment.The memory 61 is for storing needed for the computer program and the terminal device Other programs and data.The memory 61 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of application message processing method characterized by comprising
The application query instruction that client is sent is received, the application query instruction carries the unique identification of application, the application Unique identification include following any: Apply Names, application icon, using packet name;
Judge whether the corresponding application of the unique identification of the application is specified application, and the specified application is to be related to user's property The application of information, specifically: by by the unique identification of the application compared with the unique identification of pre-stored specified application, if It is identical, the application of inquiry is determined for specified application, otherwise, it is determined that the application of inquiry is not specified application;
It is specified in application, according to the hard of server and/or client itself in the corresponding application of the unique identification of the application Part configuration, encrypted information content size, network transfer speeds select corresponding Encryption Algorithm, specifically: setting server and/ The hardware configuration of client itself, encrypted information content size and network transfer speeds are closed from the corresponding of different Encryption Algorithm System, when the hardware configuration of server and/client itself, encrypted information content size and network transfer speeds are eligible For the moment, the algorithm of alternative condition one corresponding Encryption Algorithm as the information of encryption application, when server and/client itself Hardware configuration, encrypted information content size and network transfer speeds it is eligible two when, the corresponding encryption of alternative condition two Algorithm of the algorithm as the information of encryption application, and so on;
It is sent to client after encrypting the information of the application using the Encryption Algorithm that selection obtains, so that the client is docked After the information of the application received is decrypted, corresponding application is downloaded according to the information of the application after decryption, it is described The information of application includes the download address of application.
2. application message processing method as described in claim 1, which is characterized in that the information of the application further includes that downloading is logical The instruction information in road, at this point, be sent to client after the information of the encryption application, so that the client is to receiving The application information be decrypted after, corresponding application is downloaded according to the information of the application after decryption, comprising:
Encrypt the download address of the application and the instruction information of download channel;
The instruction information of the download address of the encrypted application and download channel is sent to client, so that the client End corresponding application is downloaded from the download address of the application by the instruction information of the download channel.
3. application message processing method as claimed in claim 1 or 2, which is characterized in that the application message processing method is also Include:
It modifies the Encryption Algorithm of the information of the application and determines corresponding decipherment algorithm;
Generate the client upgrade package including the decipherment algorithm;
Upgrade tip is sent to the client, so that the client obtains the client upgrade package and executes upgrading behaviour Make.
4. a kind of apply method for down loading characterized by comprising
Sending application inquiry instruction to server, the application query instruction carries the unique identification of application, and the application is only One mark includes following any: Apply Names, application icon, using packet name;Server judges the unique identification of the application Whether corresponding application is specified application, and the specified application is to be related to the application of user's proprietary information, specifically: by by institute The unique identification of application is stated compared with the unique identification of pre-stored specified application, if they are the same, determines that the application of inquiry is specified Using otherwise, it is determined that the application of inquiry is not specified application;
The information of the application for the encryption that the server is sent is received, the information of the application includes the download address of application;Its In, the Encryption Algorithm that the encryption uses is hardware configuration according to the server and/or client itself, encrypted letter Breath amount size, network transfer speeds are selected, specifically: the hardware configuration of setting server and/client itself, The corresponding relationship of encrypted information content size and network transfer speeds and different Encryption Algorithm, when server and/client The hardware configuration of itself, encrypted information content size and network transfer speeds eligible a period of time, alternative condition one are corresponding Encryption Algorithm as encryption application information algorithm, when server and/hardware configuration of client itself, encrypted letter Breath amount size and network transfer speeds it is eligible two when, the corresponding Encryption Algorithm of alternative condition two as encryption application letter The algorithm of breath, and so on;
Decipherment algorithm according to the pre-stored data decrypts the information of the application of the encryption, according to the downloading for decrypting obtained application Download corresponding application in location.
5. applying method for down loading as claimed in claim 4, which is characterized in that described to apply method for down loading further include:
Receive the upgrade tip that the server is sent;
Client upgrade package is obtained from the server according to the upgrade tip, the client upgrade package includes and the clothes The corresponding decipherment algorithm of the modified Encryption Algorithm of device of being engaged in;
Corresponding updating operation is executed according to the client upgrade package, and corresponding with the modified Encryption Algorithm of the server Decipherment algorithm replace original decipherment algorithm.
6. a kind of server characterized by comprising
Application query instruction receiving unit, for receiving the application query instruction of client transmission, the application query instruction is taken Unique identification with application, the unique identification of the application includes following any: Apply Names, application icon, using packet name;
Specified to apply judging unit, whether the corresponding application of unique identification for judging the application is specified application, described Specified application to be related to the application of user's proprietary information, specifically: by by the unique identification of the application and pre-stored finger Surely the unique identification applied compares, and if they are the same, determines the application of inquiry for specified application, otherwise, it is determined that the application of inquiry is not Specified application;
Information encryption unit, for the corresponding application of unique identification in the application be it is specified in application, according to server and/ Or the hardware configuration, encrypted information content size, network transfer speeds of client itself select corresponding Encryption Algorithm, utilize It is sent to client after selecting obtained Encryption Algorithm to encrypt the information of the application, so that the client is to the institute received State application information be decrypted after, corresponding application, the letter of the application are downloaded according to the information of the application after decryption Breath includes the download address of application;The hardware configuration according to server and/or client itself encrypted contains much information Small, network transfer speeds select corresponding Encryption Algorithm, specifically: the hardware configuration of setting server and/client itself adds The corresponding relationship of information content size and network transfer speeds and different Encryption Algorithm after close, when server and/client sheet The hardware configuration of body, encrypted information content size and network transfer speeds eligible a period of time, alternative condition one are corresponding Algorithm of the Encryption Algorithm as the information of encryption application, when hardware configuration, the encrypted information of server and/client itself Measure size and network transfer speeds it is eligible two when, the corresponding Encryption Algorithm of alternative condition two as encryption apply information Algorithm, and so on.
7. server as claimed in claim 6, which is characterized in that the information of the application further includes the instruction letter of download channel Breath, at this point, the information encryption unit includes:
Download address encrypting module, for encrypting the download address of the application and the instruction information of download channel;
Download address sending module, for sending the instruction information of the download address of the encrypted application and download channel To client, corresponded to so that the client is downloaded by the instruction information of the download channel from the download address of the application Application.
8. a kind of client characterized by comprising
Application query instruction sending unit, for sending application inquiry instruction to server, the application query instruction, which carries, is answered Unique identification, the unique identification of the application include following any: Apply Names, application icon, using packet name;Service Device judges whether the corresponding application of the unique identification of the application is specified application, and the specified application is to be related to user's property letter The application of breath, specifically: by by the unique identification of the application compared with the unique identification of pre-stored specified application, if phase Together, the application of inquiry is determined for specified application, otherwise, it is determined that the application of inquiry is not specified application;
The information receiving unit of encryption, the information of the application for receiving the encryption that the server is sent, the letter of the application Breath includes the download address of application;Wherein, the Encryption Algorithm that the encryption uses is according to the server and/or client sheet The hardware configuration of body, encrypted information content size, network transfer speeds are selected, specifically: setting server With pair of the hardware configuration of/client itself, encrypted information content size and network transfer speeds and different Encryption Algorithm It should be related to, when hardware configuration, encrypted information content size and the network transfer speeds of server and/client itself meet For the moment, the corresponding Encryption Algorithm of alternative condition one is as the algorithm for encrypting the information applied, when server and/client sheet for condition The hardware configuration of body, encrypted information content size and network transfer speeds it is eligible two when, alternative condition two is corresponding Algorithm of the Encryption Algorithm as the information of encryption application, and so on;
Information decrypting unit decrypts the information of the application of the encryption for decipherment algorithm according to the pre-stored data, according to decryption The download address of obtained application downloads corresponding application.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claims 1 to 3 when executing the computer program The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claims 1 to 3 of realization the method.
CN201710505582.2A 2017-06-28 2017-06-28 Application message processing and method for down loading, server, client and terminal device Active CN107295085B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710505582.2A CN107295085B (en) 2017-06-28 2017-06-28 Application message processing and method for down loading, server, client and terminal device
PCT/CN2018/093330 WO2019001510A1 (en) 2017-06-28 2018-06-28 Application information processing and downloading method, server, client and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710505582.2A CN107295085B (en) 2017-06-28 2017-06-28 Application message processing and method for down loading, server, client and terminal device

Publications (2)

Publication Number Publication Date
CN107295085A CN107295085A (en) 2017-10-24
CN107295085B true CN107295085B (en) 2019-07-12

Family

ID=60098895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710505582.2A Active CN107295085B (en) 2017-06-28 2017-06-28 Application message processing and method for down loading, server, client and terminal device

Country Status (2)

Country Link
CN (1) CN107295085B (en)
WO (1) WO2019001510A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295085B (en) * 2017-06-28 2019-07-12 Oppo广东移动通信有限公司 Application message processing and method for down loading, server, client and terminal device
CN108241517B (en) * 2018-02-23 2021-02-02 武汉斗鱼网络科技有限公司 Software upgrading method, client and electronic equipment
CN108959904A (en) * 2018-06-14 2018-12-07 平安科技(深圳)有限公司 Terminal device applies login method and terminal device
CN110059273B (en) * 2019-03-14 2022-04-12 深圳市物联天下技术有限公司 Method for displaying rich media on mobile terminal and mobile terminal
CN112291268B (en) * 2020-11-26 2023-05-26 度小满科技(北京)有限公司 Information transmission method, device, equipment and storage medium
CN112733092B (en) * 2020-12-30 2022-12-23 五八有限公司 Information processing method and device
CN113641527A (en) * 2021-09-02 2021-11-12 中国银行股份有限公司 Method and device for repairing production problems of mobile banking client

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302617A (en) * 2015-11-25 2016-02-03 魅族科技(中国)有限公司 Method and sever for downloading application program
CN105656957A (en) * 2014-11-12 2016-06-08 腾讯科技(武汉)有限公司 Method, device and system for downloading third party application in application
CN106020858A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Method, terminal and system for downloading and installation of application program
CN106682491A (en) * 2017-01-23 2017-05-17 百度在线网络技术(北京)有限公司 Application downloading method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8359657B2 (en) * 2010-03-30 2013-01-22 Sandcastles Technology Inc. Method and apparatus for enabling secure distribution of digital content
CN103685515A (en) * 2013-12-13 2014-03-26 北京奇虎科技有限公司 Method and system for downloading application
CN105516246B (en) * 2015-11-25 2019-03-26 魅族科技(中国)有限公司 A kind of method and server of anti-application program downloading abduction
CN106815518B (en) * 2015-11-30 2020-08-25 华为技术有限公司 Application installation method and electronic equipment
CN107295085B (en) * 2017-06-28 2019-07-12 Oppo广东移动通信有限公司 Application message processing and method for down loading, server, client and terminal device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656957A (en) * 2014-11-12 2016-06-08 腾讯科技(武汉)有限公司 Method, device and system for downloading third party application in application
CN105302617A (en) * 2015-11-25 2016-02-03 魅族科技(中国)有限公司 Method and sever for downloading application program
CN106020858A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Method, terminal and system for downloading and installation of application program
CN106682491A (en) * 2017-01-23 2017-05-17 百度在线网络技术(北京)有限公司 Application downloading method and device

Also Published As

Publication number Publication date
CN107295085A (en) 2017-10-24
WO2019001510A1 (en) 2019-01-03

Similar Documents

Publication Publication Date Title
CN107295085B (en) Application message processing and method for down loading, server, client and terminal device
CN105450406B (en) The method and apparatus of data processing
CN109104279A (en) A kind of encryption method of electric power data, system and terminal device
CN108880806A (en) Encryption and decryption method, chip and readable storage medium storing program for executing
CN104182876B (en) Secure payment transactions method and system
US20170099144A1 (en) Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system
CN108718313A (en) Application of software data uses method, terminal device and server safely
CN107994995A (en) A kind of method of commerce, system and the terminal device of lower security medium
CN107342966B (en) Authority credentials distribution method and device
CN105847000A (en) Token generation method and communication system based on same
CN108270739A (en) A kind of method and device of managing encrypted information
CN109787769A (en) Offline authentication method, user terminal and the device end of internet of things equipment
CN106817346A (en) Data transmission method and device and electronic equipment
CN108011719A (en) A kind of endorsement method, device and digital signature system
Recabarren et al. Tithonus: A bitcoin based censorship resilient system
CN112039922B (en) Encryption communication method and device
CN110493251A (en) A kind of data processing method, device, electronic equipment and storage medium
Islam et al. Remote device management via smart contracts
CN107360021A (en) A kind of LAN distribution method and device
CN113922956A (en) Quantum key based Internet of things data interaction method, system, device and medium
CN110515640A (en) A kind of firmware upgrade method of safety chip, device, equipment and storage medium
CN109087093A (en) A kind of cash kind sub-interface method of commerce and system
Moghaddam et al. Applying a single sign-on algorithm based on cloud computing concepts for SaaS applications
Rossudowski et al. A security privacy aware architecture and protocol for a single smart card used for multiple services
CN107566126A (en) A kind of auth method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant