CN108668002B - Application downloading method of cloud mobile phone - Google Patents
Application downloading method of cloud mobile phone Download PDFInfo
- Publication number
- CN108668002B CN108668002B CN201710944555.5A CN201710944555A CN108668002B CN 108668002 B CN108668002 B CN 108668002B CN 201710944555 A CN201710944555 A CN 201710944555A CN 108668002 B CN108668002 B CN 108668002B
- Authority
- CN
- China
- Prior art keywords
- application
- downloaded
- server
- historical
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the technical field of networks, in particular to an application downloading method of a cloud mobile phone. An application blacklist is preset in a server where the cloud mobile phone is located; wherein, the applications in the application blacklist can not be downloaded; the method comprises the following steps: receiving an application downloading request which is sent by a client side where a cloud mobile phone is located and contains an installation package name of an application to be downloaded; judging whether the installation package name is not contained in the application blacklist or not; if so, establishing communication connection with the client so that the client can download the application to be downloaded. According to the application downloading method of the cloud mobile phone, the application which is disliked by some users is set to be not downloadable through the blacklist, and the problem of disordered application downloading is solved.
Description
Technical Field
The invention relates to the technical field of networks, in particular to an application downloading method of a cloud mobile phone.
Background
The cloud mobile phone is a smart phone application cloud platform based on cloud computing powerful virtual application and the mobile internet. Based on the outstanding advantages of cloud computing in large-scale computing, strong storage capacity, virtualization application and the like, the cloud platform provides diversified and omnibearing virtual mobile phone application and service for a smart mobile phone user, comprehensively supports display, downloading, application and management service of various mobile phone application programs, excellently realizes all-weather cloud intelligent hosting application, enables the user to be capable of hosting various application programs to a cloud under the state of being separated from a mobile terminal, keeps all-weather online state and comprehensively realizes smart mobile phone application virtualization.
With the rapid development of the internet, many mobile phone program stores provide functions of downloading applications, but there is no distinction between what applications can be downloaded and what applications cannot be downloaded, so that many users can download applications which are not wanted by themselves or are used with low frequency, and users cannot tolerate downloading many applications which are not available at all and occupy memory.
Disclosure of Invention
Embodiments of the present invention are directed to solving at least one of the technical problems occurring in the prior art. Therefore, the embodiment of the invention needs to provide an application downloading method for a cloud mobile phone.
According to the application downloading method of the cloud mobile phone provided by the embodiment of the invention, an application blacklist is preset in a server where the cloud mobile phone is located; wherein the applications in the application blacklist cannot be downloaded; the method comprises the following steps:
step 11, receiving an application downloading request which is sent by a client where a cloud mobile phone is located and contains an installation package name of an application to be downloaded;
step 12, judging whether the installation package name is not included in the application blacklist;
and step 13, if so, establishing communication connection with the client so that the client can download the application to be downloaded.
On one hand, an application white list is preset in a server where the cloud mobile phone is located; wherein, the applications in the application white list can be downloaded after being checked;
the method further comprises:
step 14, if the determination result in the step 12 is that the installation package name is included in the application blacklist, continuing to determine whether the installation package name is included in the application whitelist;
step 15, if the installation package name is included in an application white list, judging whether the application to be downloaded meets a preset auditing requirement;
and step 16, if the application to be downloaded meets the preset auditing requirement, establishing communication connection with the client so that the client can download the application to be downloaded.
Still further, the method further comprises:
acquiring historical downloading times of the application to be downloaded;
the step 15 of determining whether the application to be downloaded meets a preset auditing requirement includes:
judging whether the historical download times are larger than a preset download time threshold value or not;
and if the historical download times are larger than the download time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
Still further, the method further comprises:
acquiring the historical opening times of the application to be downloaded;
the step 15 of determining whether the application to be downloaded meets a preset auditing requirement includes:
judging whether the historical opening times are larger than a preset opening time threshold value or not;
and if the historical opening times are larger than the opening time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
Still further, the method further comprises:
acquiring historical download times and historical opening times of the application to be downloaded;
calculating to obtain the average of historical download times and historical opening times;
the step 15 of judging that the application to be downloaded meets the preset auditing requirement includes:
judging whether the average is larger than a preset average threshold value or not;
and if the average is larger than the average threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
The embodiment of the invention also provides another application downloading method of the cloud mobile phone, wherein an application blacklist is preset in a server where the cloud mobile phone is located; wherein the applications in the application blacklist cannot be downloaded;
the method comprises the following steps:
step 21, sending an application downloading request containing the installation package name of the application to be downloaded to a server where the cloud mobile phone is located;
and step 22, after the server confirms that the installation package name is not included in the application blacklist, establishing communication connection with the server, and downloading the application to be downloaded.
On one hand, an application white list is preset in a server where the cloud mobile phone is located; wherein, the applications in the application white list can be downloaded after being checked;
the method further comprises:
and step 23, if the server confirms that the installation package name is contained in the application blacklist and the application white list and confirms that the application to be downloaded meets the preset auditing requirement, establishing communication connection with the server and downloading the application to be downloaded.
Still further, the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires the historical download times of the application to be downloaded and judges whether the historical download times are larger than a preset download time threshold value or not;
if the historical download times are larger than the download time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
Still further, the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server obtains the historical opening times of the application to be downloaded and judges whether the historical opening times is larger than a preset opening time threshold value or not;
if the historical opening times are larger than the opening time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
Still further, the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires historical download times and historical opening times of the application to be downloaded, calculates the average of the historical download times and the historical opening times, and judges whether the average is larger than a preset average threshold value or not;
if the average is larger than the average threshold value, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
According to the application downloading method of the cloud mobile phone, the application which is disliked by some users is set to be not downloadable through the blacklist, and the problem of disordered application downloading in the prior art is solved. And the invention also sets a white list on the basis of the black list, even if the application is in the black list, if the application is in the white list and passes the examination, the application is allowed to be downloaded by the user, thereby meeting the individual requirements of the user.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of embodiments of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an application downloading method for a cloud phone according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an application downloading method of a cloud phone according to another embodiment of the present invention;
fig. 3 is a schematic flowchart of an application downloading method for a cloud phone according to another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are exemplary only and should not be construed as limiting the embodiments of the present invention.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an application downloading method for a cloud phone according to an embodiment of the present invention.
The embodiment of the invention provides a downloading method of a cloud mobile phone. In this embodiment, a server is taken as an example of an execution target of a step. In this embodiment, an apk file of an android application is described as an installation package of the application, and the installation package of the application related to the present invention may be an apk or an installation package of another form, which is not limited herein.
An application blacklist is preset in a server where the cloud mobile phone is located; wherein the applications in the application blacklist cannot be downloaded. The cloud mobile phone downloading method provided by the embodiment of the invention comprises the following steps:
step 11, receiving an application downloading request which is sent by a client where a cloud mobile phone is located and contains an installation package name of an application to be downloaded;
step 12, judging whether the installation package name is not contained in the application blacklist;
and step 13, if so, establishing communication connection with the client so that the client can download the application to be downloaded.
Specifically, package names of applications which a user does not want to download can be recorded in a local file of a server, then when the cloud mobile phone downloads an apk, a blacklist interface of the server is called, the package names are transmitted, then the server judges whether the apk to be downloaded exists in the local file of the server or not by comparing the package names with the package name records in the blacklist of the file of the server, if so, the apk cannot be downloaded, namely, if the installation package name is not contained in the application blacklist, the apk can be normally downloaded.
However, the setting of the black list is sometimes not reasonable for other users, that is, the applications existing in the black list are sometimes normal applications for some users, and the users have normal downloading requirements. Based on the situation, a white list is set on the basis of the black list, namely, an application white list is preset in a server where the cloud mobile phone is located; wherein, the applications in the application white list can be downloaded after being checked.
As shown in fig. 2, fig. 2 is a schematic flow chart of another method for downloading an application of a cloud mobile phone according to an embodiment of the present invention, and the method for downloading a cloud mobile phone according to an embodiment of the present invention further includes:
step 14, if the judgment result in the step 12 is that the installation package name is contained in the application blacklist, continuing to judge whether the installation package name is contained in the application whitelist;
step 15, if the installation package name is included in the application white list, judging whether the application to be downloaded meets the preset auditing requirement;
and step 16, if the application to be downloaded meets the preset auditing requirement, establishing communication connection with the client so that the client can download the application to be downloaded.
Specifically, when an application to be downloaded by a user is in a blacklist, the cloud mobile phone can call a whitelist interface by judging whether the application is in the whitelist and whether the application meets a preset auditing requirement, the name of an installation package is transmitted, then the server compares the name of the installation package with a record of the name of the installation package in the server side, and if the application is determined to be included in the whitelist through comparison, the application is further audited by combining some data of the application. This audit includes several cases: and checking the downloading times, checking the opening times and checking the average number of the downloading times and the opening times. Described separately below.
In one aspect, the method provided by the present invention further includes: and acquiring the historical download times of the application to be downloaded. Judging whether the application to be downloaded meets the preset auditing requirement in step 15 includes: judging whether the historical download times are larger than a preset download time threshold value or not; and if the historical download times are larger than the download time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement. That is, by presetting a download time threshold, if the historical download time of the application reaches a number, and the number exceeds the download time threshold, the application can be considered as a hot application, and the server can allow the client to download through auditing.
In one aspect, the method provided by the present invention further includes: and acquiring the historical opening times of the application to be downloaded. Judging whether the application to be downloaded meets the preset auditing requirement in step 15 includes: judging whether the historical opening times are larger than a preset opening time threshold value or not; and if the historical opening times are larger than the opening time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement. That is, by presetting a threshold of the opening times, if the historical opening times of the application reaches a number, and the number exceeds the threshold of the opening times, the application with higher activity can be considered, and the server can download the application through auditing and by the client.
In one aspect, the method provided by the present invention further includes: acquiring historical download times and historical opening times of an application to be downloaded; and then calculating and obtaining the average of the historical download times and the historical opening times. The step 15 of judging that the application to be downloaded meets the preset auditing requirement includes: judging whether the average is larger than a preset average threshold value or not; if the average is larger than the average threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement. That is, by presetting an average threshold, if the historical download times and the historical open times of the application reach a number, and the average of the historical download times and the historical open times exceeds the average threshold, the application is considered to be a hot application with high activity, and the server can allow the client to download through auditing.
Example 2
As shown in fig. 3, fig. 3 is a schematic flowchart of an application downloading method for a cloud phone according to another embodiment of the present invention. In this embodiment, a client is taken as an example of an execution object of a step. In this embodiment, an apk file of an android application is described as an installation package of the application, and the installation package of the application related to the present invention may be an apk or an installation package of another form, which is not limited herein.
According to the application downloading method of the cloud mobile phone provided by the embodiment of the invention, the server where the cloud mobile phone is located is preset with the application blacklist; wherein the applications in the application blacklist cannot be downloaded. The method comprises the following steps:
step 21, sending an application downloading request containing the installation package name of the application to be downloaded to a server where the cloud mobile phone is located;
and step 22, after the server confirms that the installation package name is not included in the application blacklist, establishing communication connection with the server, and downloading the application to be downloaded.
The method comprises the steps that a client side of the cloud mobile phone sends an application downloading request to a server, a blacklist interface of the server side is called, a packet name is introduced, then the server judges whether an apk to be downloaded exists in a local file of the server side or not through comparison of the packet name and a packet name record in a blacklist in a file of the server side, if the apk exists, the apk cannot be downloaded, namely if the installation packet name is not contained in the application blacklist, the client side can establish communication connection with the server, and the apk is normally downloaded.
However, the setting of the black list is sometimes not reasonable for other users, that is, the applications existing in the black list are sometimes normal applications for some users, and the users have normal downloading requirements. Based on the situation, a white list is set on the basis of the black list, namely, an application white list is preset in a server where the cloud mobile phone is located; wherein, the applications in the application white list can be downloaded after being checked.
As shown in fig. 3, the method for downloading an application of a cloud mobile phone according to the embodiment of the present invention further includes: and if the server confirms that the installation package name is contained in the application blacklist and the application white list and confirms that the application to be downloaded meets the preset verification requirement, the client establishes communication connection with the server and downloads the application to be downloaded.
Specifically, when an application to be downloaded by a user is in a blacklist, the cloud mobile phone can call a whitelist interface and transmit a name of an installation package by further judging whether the application is in the whitelist and whether the application meets a preset auditing requirement, then the server compares the name of the installation package with a record of the name of the installation package in the server side, and if the name of the installation package is determined to be included in the whitelist through comparison, the application is further audited by further combining some data of the application. This audit includes several cases: and checking the downloading times, checking the opening times and checking the average number of the downloading times and the opening times. Described separately below.
In one aspect, step 23 comprises: if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires the historical download times of the application to be downloaded and judges whether the historical download times are larger than a preset download time threshold value or not; if the historical download times are larger than the download time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement; and the client establishes communication connection with the server and downloads the application to be downloaded. That is, by presetting a download time threshold, if the historical download time of the application reaches a number, and the number exceeds the download time threshold, the application can be considered as a hot application, and the server can allow the client to download through auditing.
In another aspect, step 23 comprises: if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires the historical opening times of the application to be downloaded and judges whether the historical opening times is larger than a preset opening time threshold value or not; if the historical opening times are larger than the opening time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement; and the client establishes communication connection with the server and downloads the application to be downloaded. That is, by presetting a threshold of the opening times, if the historical opening times of the application reaches a number, and the number exceeds the threshold of the opening times, the application with higher activity can be considered, and the server can download the application through auditing and by the client.
In yet another aspect, step 23 comprises: if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires historical download times and historical opening times of the application to be downloaded, calculates and obtains the average of the historical download times and the historical opening times, and judges whether the average is larger than a preset average threshold value or not; if the average is larger than the average threshold value, the server confirms that the application to be downloaded meets the preset auditing requirement; and the client establishes communication connection with the server and downloads the application to be downloaded. That is, by presetting an average threshold, if the historical download times and the historical open times of the application reach a number, and the average of the historical download times and the historical open times exceeds the average threshold, the application is considered to be a hot application with high activity, and the server can allow the client to download through auditing.
In the description of the embodiments of the present invention, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", "clockwise", "counterclockwise", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of describing the embodiments of the present invention and simplifying the description, but do not indicate or imply that the device or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the embodiments of the present invention. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the embodiments of the present invention, "a plurality" means two or more unless specifically limited otherwise.
In the description of the embodiments of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as being fixedly connected, detachably connected, or integrally connected; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly through intervening media, either internally or in any other relationship. Specific meanings of the above terms in the embodiments of the present invention can be understood by those of ordinary skill in the art according to specific situations.
In embodiments of the invention, unless expressly stated or limited otherwise, the first feature "on" or "under" the second feature may comprise the first and second features being in direct contact, or the first and second features being in contact, not directly, but via another feature therebetween. Also, the first feature being "on," "above" and "over" the second feature includes the first feature being directly on and obliquely above the second feature, or merely indicating that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature includes the first feature being directly under and obliquely below the second feature, or simply meaning that the first feature is at a lesser elevation than the second feature.
The following disclosure provides many different embodiments or examples for implementing different configurations of embodiments of the invention. In order to simplify the disclosure of embodiments of the invention, the components and arrangements of specific examples are described below. Of course, they are merely examples and are not intended to limit the present invention. Furthermore, embodiments of the invention may repeat reference numerals and/or reference letters in the various examples, which have been repeated for purposes of simplicity and clarity and do not in themselves dictate a relationship between the various embodiments and/or arrangements discussed. In addition, embodiments of the present invention provide examples of various specific processes and materials, but one of ordinary skill in the art may recognize applications of other processes and/or use of other materials.
In the description herein, references to the description of the terms "one embodiment," "some embodiments," "an illustrative embodiment," "an example," "a specific example" or "some examples" or the like mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processing module-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of embodiments of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (8)
1. An application downloading method of a cloud mobile phone is characterized in that an application blacklist and an application white list are preset in a server where the cloud mobile phone is located; the application in the application blacklist cannot be downloaded, and the application in the application whitelist can be downloaded after being checked;
the method comprises the following steps:
step 11, receiving an application downloading request which is sent by a client where a cloud mobile phone is located and contains an installation package name of an application to be downloaded;
step 12, judging whether the installation package name is not included in the application blacklist;
step 13, if yes, establishing communication connection with the client so that the client can download the application to be downloaded;
step 14, if the determination result in the step 12 is that the installation package name is included in the application blacklist, continuing to determine whether the installation package name is included in the application whitelist;
step 15, if the installation package name is included in an application white list, judging whether the application to be downloaded meets a preset auditing requirement;
and step 16, if the application to be downloaded meets the preset auditing requirement, establishing communication connection with the client so that the client can download the application to be downloaded.
2. The application download method of the cloud handset of claim 1, wherein the method further comprises:
acquiring historical downloading times of the application to be downloaded;
the step 15 of determining whether the application to be downloaded meets a preset auditing requirement includes:
judging whether the historical download times are larger than a preset download time threshold value or not;
and if the historical download times are larger than the download time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
3. The application download method of the cloud handset of claim 1, wherein the method further comprises:
acquiring the historical opening times of the application to be downloaded;
the step 15 of determining whether the application to be downloaded meets a preset auditing requirement includes:
judging whether the historical opening times are larger than a preset opening time threshold value or not;
and if the historical opening times are larger than the opening time threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
4. The application download method of the cloud handset of claim 1, wherein the method further comprises:
acquiring historical download times and historical opening times of the application to be downloaded;
calculating to obtain the average of historical download times and historical opening times;
the step 15 of judging that the application to be downloaded meets the preset auditing requirement includes:
judging whether the average is larger than a preset average threshold value or not;
and if the average is larger than the average threshold, outputting a judgment result that the application to be downloaded meets the preset auditing requirement.
5. An application downloading method of a cloud mobile phone is characterized in that an application blacklist and an application white list are preset in a server where the cloud mobile phone is located; the application in the application blacklist cannot be downloaded, and the application in the application whitelist can be downloaded after being checked;
the method comprises the following steps:
step 21, sending an application downloading request containing the installation package name of the application to be downloaded to a server where the cloud mobile phone is located;
step 22, after the server confirms that the installation package name is not included in the application blacklist, establishing communication connection with the server, and downloading the application to be downloaded;
and step 23, if the server confirms that the installation package name is contained in the application blacklist and the application white list and confirms that the application to be downloaded meets the preset auditing requirement, establishing communication connection with the server and downloading the application to be downloaded.
6. The application downloading method of the cloud handset according to claim 5, wherein the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires the historical download times of the application to be downloaded and judges whether the historical download times are larger than a preset download time threshold value or not;
if the historical download times are larger than the download time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
7. The application downloading method of the cloud handset according to claim 5, wherein the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server obtains the historical opening times of the application to be downloaded and judges whether the historical opening times is larger than a preset opening time threshold value or not;
if the historical opening times are larger than the opening time threshold, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
8. The application downloading method of the cloud handset according to claim 5, wherein the step 23 includes:
if the server confirms that the installation package name is contained in the application blacklist and the application whitelist, the server acquires historical download times and historical opening times of the application to be downloaded, calculates the average of the historical download times and the historical opening times, and judges whether the average is larger than a preset average threshold value or not;
if the average is larger than the average threshold value, the server confirms that the application to be downloaded meets the preset auditing requirement;
and establishing communication connection with a server, and downloading the application to be downloaded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710944555.5A CN108668002B (en) | 2017-10-12 | 2017-10-12 | Application downloading method of cloud mobile phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710944555.5A CN108668002B (en) | 2017-10-12 | 2017-10-12 | Application downloading method of cloud mobile phone |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108668002A CN108668002A (en) | 2018-10-16 |
CN108668002B true CN108668002B (en) | 2020-04-24 |
Family
ID=63784973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710944555.5A Active CN108668002B (en) | 2017-10-12 | 2017-10-12 | Application downloading method of cloud mobile phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108668002B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112925531B (en) * | 2019-12-05 | 2023-10-20 | 成都鼎桥通信技术有限公司 | Control method for installing and uninstalling application software |
CN110913015B (en) * | 2019-12-12 | 2022-11-11 | 湖南多行云计算机科技有限公司 | Distributed quick installation method, system and medium for cloud mobile phone APP |
CN111061506A (en) * | 2019-12-17 | 2020-04-24 | 努比亚技术有限公司 | Application management and control method, wearable device and computer-readable storage medium |
CN113536292A (en) * | 2021-07-23 | 2021-10-22 | 北京百度网讯科技有限公司 | Cloud mobile phone application starting control method, related device and computer program product |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114907A (en) * | 2006-07-28 | 2008-01-30 | 腾讯科技(深圳)有限公司 | Method and system for managing and filtering black list |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
US8972591B2 (en) * | 2010-01-12 | 2015-03-03 | Nidec Sankyo Corporation | Method for downloading software |
KR20150059874A (en) * | 2013-11-25 | 2015-06-03 | 주식회사 시큐아이 | Mobile terminal and security device each connecting wireless network |
CN105634745A (en) * | 2016-02-26 | 2016-06-01 | 深圳市金百锐通信科技有限公司 | Security authentication method and device for application installation |
CN105791250A (en) * | 2014-12-26 | 2016-07-20 | 北京奇虎科技有限公司 | Application detection method and device |
CN106227585A (en) * | 2016-05-31 | 2016-12-14 | 北京金山安全软件有限公司 | Application program starting method, device and equipment |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6553375B1 (en) * | 1998-11-25 | 2003-04-22 | International Business Machines Corporation | Method and apparatus for server based handheld application and database management |
US8316446B1 (en) * | 2005-04-22 | 2012-11-20 | Blue Coat Systems, Inc. | Methods and apparatus for blocking unwanted software downloads |
US20130333039A1 (en) * | 2012-06-07 | 2013-12-12 | Mcafee, Inc. | Evaluating Whether to Block or Allow Installation of a Software Application |
US9767280B2 (en) * | 2012-10-09 | 2017-09-19 | Canon Denshi Kabushiki Kaisha | Information processing apparatus, method of controlling the same, information processing system, and information processing method |
CN103152722B (en) * | 2013-01-28 | 2016-04-06 | 东莞宇龙通信科技有限公司 | The control method of application operating and system |
US8914883B2 (en) * | 2013-05-03 | 2014-12-16 | Fortinet, Inc. | Securing email communications |
CN103646215A (en) * | 2013-12-23 | 2014-03-19 | 北京奇虎科技有限公司 | Application installation control method, related system and related device |
CN105005735B (en) * | 2015-08-25 | 2018-01-16 | 广东欧珀移动通信有限公司 | Downloading management method and download management device |
CN106487793A (en) * | 2016-10-19 | 2017-03-08 | 广东欧珀移动通信有限公司 | application installation method and device |
-
2017
- 2017-10-12 CN CN201710944555.5A patent/CN108668002B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114907A (en) * | 2006-07-28 | 2008-01-30 | 腾讯科技(深圳)有限公司 | Method and system for managing and filtering black list |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
US8972591B2 (en) * | 2010-01-12 | 2015-03-03 | Nidec Sankyo Corporation | Method for downloading software |
KR20150059874A (en) * | 2013-11-25 | 2015-06-03 | 주식회사 시큐아이 | Mobile terminal and security device each connecting wireless network |
CN105791250A (en) * | 2014-12-26 | 2016-07-20 | 北京奇虎科技有限公司 | Application detection method and device |
CN105634745A (en) * | 2016-02-26 | 2016-06-01 | 深圳市金百锐通信科技有限公司 | Security authentication method and device for application installation |
CN106227585A (en) * | 2016-05-31 | 2016-12-14 | 北京金山安全软件有限公司 | Application program starting method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN108668002A (en) | 2018-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108668002B (en) | Application downloading method of cloud mobile phone | |
US20200187087A1 (en) | Systems and methods for distributing content in a vehicle-based wireless network | |
CN107645561B (en) | Picture preview method of cloud mobile phone | |
CN109640116B (en) | Cloud mobile phone network video coding method and server | |
EP2861003A1 (en) | Method and apparatus for controlling application right | |
CN107911352B (en) | Authorization method of cloud mobile phone | |
US20100261464A1 (en) | Mobile terminal, associated storage devices and methods of using the same | |
US9276936B2 (en) | Tethering enforcement device controller and methods thereof | |
CN108874439B (en) | Method and device for acquiring customized difference packet, and upgrading method and device | |
CN107360254A (en) | A kind of document down loading method, device, server and terminal | |
CN111901639A (en) | Multimedia video uploading method, device and system, storage medium and platform | |
US9973635B1 (en) | System and method for processing of a service subscription using a telecommunications operator | |
CN107637110A (en) | Method for loading configuration file | |
CN107148035B (en) | Frequency band selection method and device and wireless equipment | |
KR101473658B1 (en) | Apparatus and system for detecting malicious code using filter and method thereof | |
US20100161710A1 (en) | Application services at a terminal | |
CN102377793A (en) | Flash interaction method and device based on mobile communication equipment terminal | |
CN110290201B (en) | Picture acquisition method, mobile terminal, server and storage medium | |
CN111400630A (en) | Resource preloading method and related equipment | |
CN115225627B (en) | File transmission method, device, computer equipment and storage medium | |
CN115695333A (en) | Method and system for eliminating pcdn node resources and related equipment | |
CN111179021B (en) | Product recommendation method, system and readable storage medium based on home device data | |
CN109412873B (en) | Configuration updating method and device, terminal equipment and computer storage medium | |
CN110912953A (en) | File storage system and method | |
CN109495571B (en) | File management method and file management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 410000 floor 20, building B, Zhongji international, No. 18, Shaoshan Middle Road, Yuhua District, Changsha City, Hunan Province Applicant after: Hunan micro computing Internet Information Technology Co., Ltd Address before: 410000 Shaoshan South Road, No. 123, Shaoshan South Road, Changsha City, Hunan, Hunan 2521 Applicant before: Hunan red finger Information Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |