CN109901850A - Software installation method, device, terminal and computer readable storage medium - Google Patents

Software installation method, device, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109901850A
CN109901850A CN201910128627.8A CN201910128627A CN109901850A CN 109901850 A CN109901850 A CN 109901850A CN 201910128627 A CN201910128627 A CN 201910128627A CN 109901850 A CN109901850 A CN 109901850A
Authority
CN
China
Prior art keywords
software
capability identification
default access
installation
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910128627.8A
Other languages
Chinese (zh)
Inventor
何成名
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201910128627.8A priority Critical patent/CN109901850A/en
Publication of CN109901850A publication Critical patent/CN109901850A/en
Pending legal-status Critical Current

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of software installation method, device, terminal and computer readable storage mediums.Software installation method includes parsing software package to be installed when getting the installation instruction of software to be installed to obtain software capability identification to be installed;From preset data library inquiry default access mark corresponding with software capability identification;When presetting database has default access corresponding with software capability identification mark, software to be installed is installed according to installation instruction.So, by being identified from preset data library inquiry default access corresponding with the software capability identification, judge whether have default access mark corresponding with software capability identification to judge whether software to be installed passes through the audit of software harnesses platform in presetting database, when there is default access corresponding with software capability identification mark, then software to be installed can be installed.It can avoid user in this way and personation software or other illegal softwares be installed in terminal, guarantee the safety of terminal operating.

Description

Software installation method, device, terminal and computer readable storage medium
Technical field
The present invention relates to software technology fields, more particularly to a kind of software installation method, device, terminal and computer can Read storage medium.
Background technique
Mobile phone application software is various, and various mobile phone application markets and download path are also very much, regular application software and personation The good and bad jumbled together for software.Non-normal personation application software or regular application software are put again after malice insertion harmful information It is downloaded to application market for user, when user downloads and installs and uses, there are biggish safety problems.
Summary of the invention
The embodiment of the present invention provides a kind of software installation method, device, terminal and computer readable storage medium.
In a first aspect, the embodiment of the invention provides a kind of software installation methods characterized by comprising
When getting the installation instruction of software to be installed, it is described to be installed soft to obtain to parse the software package to be installed Part capability identification;
From preset data library inquiry default access mark corresponding with the software capability identification;
When the presetting database has default access corresponding with software capability identification mark, according to the installation The software to be installed is installed in instruction.
Preferably, described to include: from preset data library inquiry default access mark corresponding with the software capability identification
The software capability identification and each default access mark in the presetting database are compared, judged whether there is The default access for meeting preset rules with the relationship of software capability identification identifies;
When there is the default access mark for meeting preset rules with the relationship of software capability identification, the present count is determined There is default access corresponding with the software capability identification to identify according to library.
It is preferably, described to compare the software capability identification and each default access mark in the presetting database, Judging whether there is the default access mark for meeting preset rules with the relationship of software capability identification includes:
Obtain the soft ware authorization date of the software capability identification;
By the software capability identification and the presetting database Plays authorization date and the soft ware authorization date phase Same each default access, which identifies, to be compared, and the default access for meeting preset rules with the relationship of software capability identification is judged whether there is Mark.
Preferably, the software installation method further include:
When default access corresponding with the software capability identification does not identify the presetting database, by the software Capability identification is compared with the illegal capability identification in illegal software library, is judged whether there is identical with the software capability identification Illegal capability identification;
When there is illegal capability identification identical with the software capability identification, prevent the execution installation instruction concurrent Illegal software warning information out;
When be not present illegal capability identification identical with the software capability identification when, issue installation inquiry message with to Family is confirmed whether to install the software to be installed according to the installation instruction.
Preferably, described when getting the installation instruction of software to be installed, the software package to be installed is parsed to obtain The software capability identification to be installed includes:
When getting the installation instruction of software to be installed, it is described to be installed soft to obtain to parse the software package to be installed The Permission Levels of part capability identification and the software to be installed;
When the Permission Levels within a preset range when, execute described from preset data library inquiry and the software permission mark The step of knowing corresponding default access mark.
Preferably, the parsing software package to be installed is to obtain the software capability identification to be installed and described wait pacify Dress software Permission Levels include:
The software package to be installed is parsed to obtain the software capability identification to be installed and the software type to be installed;
The Permission Levels of the software to be installed are determined according to the software type.
Preferably, the default access mark is auditing and passing through through software harnesses platform in the presetting database The capability identification that legal software generates when encapsulating carries out the cryptographic Hash obtained after Hash processing through the first preset algorithm, described soft The capability identification that part capability identification generates when being the software encapsulation to be installed is carried out through the second preset algorithm after Hash processing Obtained cryptographic Hash.
Second aspect, the embodiment of the present invention also provide a kind of software installation device, comprising:
Parsing module, for when getting the installation instruction of software to be installed, parsing the software package to be installed to obtain Take the software capability identification to be installed;
Enquiry module, for being identified from preset data library inquiry default access corresponding with the software capability identification;
Execution module, for thering is default access corresponding with the software capability identification to identify when the presetting database When, the software to be installed is installed according to the installation instruction.
It should be noted that the function realization of modules and technical effect and above-mentioned software in above-mentioned software installation device Installation method is corresponding, to avoid redundancy, no longer repeats one by one herein.
The third aspect, the embodiment of the present invention also provide a kind of terminal, including processor, memory, communication interface, Yi Jiyi A or multiple programs, one or more of programs are stored in the memory, and are configured to be held by the processor Row, described program are included the steps that for executing the instruction in software installation method described in any of the above embodiments.
Fourth aspect, the present invention also provides a kind of computer readable storage medium, storage is used for the computer program of installation, Wherein, the computer program makes computer execute software installation method described in any of the above embodiments.
In the technical solution of the embodiment of the present invention, when getting the installation instruction of software to be installed, parse to be installed soft Part packet is to obtain software capability identification to be installed;From preset data library inquiry default access mark corresponding with software capability identification Know;When presetting database has default access corresponding with software capability identification mark, installed according to installation instruction to be installed soft Part.By judging in presetting database from preset data library inquiry default access mark corresponding with the software capability identification Whether there is default access mark corresponding with software capability identification to judge whether software to be installed passes through software harnesses platform Audit, then when presetting database has default access corresponding with software capability identification mark, it is believed that be installed to be Legal software then can install software to be installed according to installation instruction.In this way can to avoid user terminal install personation software, It is inserted into the software or other illegal softwares of harmful information by malice, guarantees the safety of terminal operating.
Detailed description of the invention
Below by the present embodiments relate to some attached drawings be illustrated.
Fig. 1 is the hardware structural diagram of the terminal of the embodiment of the present invention;
Fig. 2 is the flow diagram of the software installation method of the embodiment of the present invention;
Fig. 3 is another flow diagram of the software installation method of the embodiment of the present invention;
Fig. 4 is the another flow diagram of the software installation method of the embodiment of the present invention;
Fig. 5 is another flow diagram of the software installation method of the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described with reference to the attached drawing in the embodiment of the present invention.
Referring to Fig. 1, Fig. 1 is the hardware structural diagram of terminal 100 provided in an embodiment of the present invention.Terminal 100 includes Processor 101, memory 102, network interface 103, and one or more programs, one or more programs are stored in storage In device 102, and it is configured to be executed by processor 101, program includes the step with the software installation method of following any embodiment Rapid instruction.Memory 102 can be high speed RAM memory, be also possible to stable memory (non-volatile Memory), such as magnetic disk storage, memory 102 optionally can also be the storage device independently of aforementioned processor 101. Network interface 103 optionally may include standard wireline interface and wireless interface (such as WI-FI interface).
Referring to Fig. 2, Fig. 2 is a kind of flow diagram of software installation method provided in an embodiment of the present invention, this side Method may include but be not limited to following steps:
01, when getting the installation instruction of software to be installed, software package to be installed is parsed to obtain software power to be installed Limit mark;
The software installation method of the embodiment of the present invention is for installing software.The software installation method of the embodiment of the present invention can be with Realize that software installation procedure can integrate by the software installation procedure of the terminal operating embodiment of the present invention of the embodiment of the present invention It, can also be using software installation procedure as individual application software in the operating system of terminal itself.
After the installation kit of software to be installed is downloaded from website, application shop or other software download platform, deposit Storage gets software to be installed when user issues the installation instruction for installing software to be installed by operating terminal in terminal After installation instruction, terminal parses the software package of software to be installed, obtains the software capability identification of software to be installed.Software permission It is generated when mark is software encapsulation to be installed.Software capability identification can be but be not limited to authorization code.
02, from preset data library inquiry default access mark corresponding with software capability identification;
After software encapsulation, before software download platform is online, need to audit by software harnesses platform, software development Installation kit and software information are sent to the audit of software harnesses platform to person and audit can be online after, wraps in software information It is the software capability identification and software version information to be installed that are generated when containing software encapsulation to be installed, dbase, software function, soft Part type, software publication company etc..After audit passes through, software harnesses platform is identified software capability identification as default access It stores to presetting database.Auditing by software harnesses platform and auditing the software passed through is legal software.
Presetting database can be the database in cloud, and software installation procedure passes through terminal 100 when terminal 100 is run 103 access preset database of network interface.Presetting database is also possible to local database, and software harnesses platform is by software Capability identification is stored as default access mark to preset address, will be in preset address by the network interface 103 of terminal 100 Data download and store to terminal 103 memory 102 formed presetting database, and timing according to the data in preset address more Data in new presetting database then can be searched more quickly and software in this way since presetting database is located at terminal local The corresponding default access mark of capability identification.Software harnesses platform can be flat for the software download for providing software download resource Platform, or with the mutually independent control platform of software download platform.
03, it when presetting database has default access corresponding with software capability identification mark, is installed according to installation instruction Software to be installed.
If software is maliciously tampered, need to re-start encapsulation, can regenerate with priginal soft capability identification not Same part capability identification.The software distorted of malice is can not be by the audit of software harnesses platform, therefore in presetting database Default access mark not corresponding with the capability identification of the software or other illegal softwares maliciously distorted.So can by from Whether preset data library inquiry default access mark corresponding with software capability identification, judge to have in presetting database and weigh with software Limit identifies corresponding default access mark further to judge whether software to be installed passes through the audit of software harnesses platform.When pre- If database has default access corresponding with software capability identification mark, illustrate that software to be installed has passed through software harnesses platform Audit, be legal software, then the software to be installed can be installed according to installation instruction.
In the software installation method of the embodiment of the present invention, by corresponding with software capability identification from preset data library inquiry Default access mark judges whether have default access mark corresponding with software capability identification to judge wait pacify in presetting database Whether dress software passes through the audit of software harnesses platform, then when presetting database has default power corresponding with software capability identification When limit mark, it is believed that be installed is legal software, then can install software to be installed according to installation instruction.It in this way can be to avoid User installs personation software, by the software or other illegal softwares of malice insertion harmful information in terminal, guarantees terminal operating Safety.
Further, default access mark be in presetting database audit and pass through through software harnesses platform it is legal soft The capability identification that part generates when encapsulating carries out the cryptographic Hash obtained after Hash processing, software capability identification through the first preset algorithm The capability identification generated when being software encapsulation to be installed carries out the cryptographic Hash obtained after Hash processing through the second preset algorithm.It is soft When part encapsulates, a capability identification can be generated, which is subjected to the Hash that Hash is handled through the first preset algorithm Value is used as the software capability identification.After software encapsulation, before software download platform is online, it is sent to software harnesses platform and examines The capability identification without Hash processing generated when including software encapsulation in the software information of core, software harnesses platform is to the software After being audited and being passed through, the capability identification of the software is subjected to Hash processing, the Kazakhstan that will be obtained using the second preset algorithm Uncommon value conduct prestores software identification and stores to presetting database.In this way, default access mark and software capability identification are number, It can be more quickly from preset data library inquiry default access mark corresponding with software capability identification.First preset algorithm and second Preset algorithm may be the same or different.It can be according to the relationship of the first preset algorithm and the second preset algorithm from preset data Library inquiry default access mark corresponding with software capability identification.
Referring to Fig. 3, based on the above embodiment, in another embodiment of the present invention, step 02 includes:
021, by software capability identification and in presetting database each default access mark compare, judge whether there is with it is soft The relationship of part capability identification meets the default access mark of preset rules;
Default access mark corresponding with software capability identification, which refers to, meets preset rules with the relationship of software capability identification Default access mark.Preset rules can be that software capability identification is identical as default access mark, and being also possible to other can limit Determine software capability identification and the one-to-one rule of default access mark.
When default access mark is the legal software encapsulation audited and passed through through software harnesses platform in presetting database The capability identification of Shi Shengcheng carries out the cryptographic Hash obtained after Hash processing through the first preset algorithm, and software capability identification is wait pacify When the capability identification generated when filling software encapsulation carries out the cryptographic Hash obtained after Hash processing through the second preset algorithm, rule are preset It can then be determined according to the first preset algorithm and the second preset algorithm.When the first preset algorithm is identical as the second preset algorithm, Preset rules are that software capability identification is identical as default access mark.When the first preset algorithm and the second preset algorithm difference, It is according to the relationship between the first preset algorithm and the second preset algorithm, software capability identification and default access mark is corresponding same When a capability identification, the rule met needed for software capability identification and default access mark is as preset rules.
When each default access mark in software capability identification and presetting database is compared, software permission mark can be first obtained The soft ware authorization date of knowledge;Then by software capability identification and presetting database Plays authorization date and soft ware authorization date phase Same each default access, which identifies, to be compared, and the default access for meeting preset rules with the relationship of software capability identification is judged whether there is Mark.It is appreciated that software harnesses platform audit software and date for passing through are the standard authorization date of the software.Software is weighed When limit mark is compared with each default access mark in presetting database, first from presetting database, standard authorization day is filtered out Phase default access mark identical with the soft ware authorization date, the default power for then again screening software capability identification with these Limit mark compares, and can be reduced during each default access mark in software capability identification and presetting database compares in this way Data processing amount, can quickly judge to meet default rule with the presence or absence of with the relationship of software capability identification in presetting database Default access mark then.
022, when there is the default access mark for meeting preset rules with the relationship of software capability identification, determine present count There is default access corresponding with software capability identification to identify according to library.
There are multiple default access to identify in presetting database, respectively by software capability identification with it is each pre- in presetting database If capability identification compares, judge whether each default access mark and the relationship of software capability identification meet preset rules, works as presence When default access mark and the relationship of software capability identification meet preset rules, determine have and software permission mark in presetting database Know corresponding default access mark.In this way due to preset rules be not necessarily default access mark it is identical as software capability identification, Even when being that the default access that hacker or other spiteful people have stolen in presetting database identifies, due to not knowing Road preset rules, it is also difficult to by manual modification software capability identification come so that illegal software palms off legal software.In this way, more It is effectively prevented from user and personation software is installed, by the software or other illegal softwares of malice insertion harmful information in terminal, guarantee The safety of terminal operating.
Referring to Fig. 4, based on the above embodiment, in still another embodiment of the process, software installation method further comprises the steps of:
04, when default access corresponding with software capability identification does not identify presetting database, by software capability identification It is compared with the illegal capability identification in illegal software library, judges whether there is illegal permission mark identical with software capability identification Know;
The illegal capability identification of multiple illegal softwares is stored in illegal software library.In this way can by judge whether there is with Software capability identification identical illegal capability identification judges whether software to be installed is illegal software.
In one example, when user has found illegal software, illegal software can be marked by operating terminal, when this hair When the software installation procedure of bright embodiment gets the information of user's mark illegal software, the illegal software capability identification is obtained simultaneously As illegal capability identification, the illegal capability identification is then sent to illegal software library;Or to get user's mark illegal When the information of software, above-mentioned steps 01 and 02 are executed, when confirmation presetting database is not corresponding with software capability identification default Capability identification and then by the illegal software capability identification and invalid data library is sent to as illegal capability identification.In this way may be used To avoid user's malice label illegal software, lead to that legal software capability identification is accidentally stored in illegal software library.
05, it when there is illegal capability identification identical with software capability identification, preventing to execute installation instruction and issue non- Method software alarm information;
Illegal capability identification identical with software capability identification if it exists can confirm that software to be installed is illegal software, then It prevents to execute installation instruction and issues illegal software warning information to prompt user's software to be installed as illegal software.
06, when be not present illegal capability identification identical with software capability identification when, issue installation inquiry message with to Family is confirmed whether to install software to be installed according to installation instruction.
Illegal capability identification identical with software capability identification if it does not exist can not confirm whether the software to be installed is non- Method software issues installation inquiry message then to be confirmed whether to install software to be installed according to installation instruction to user.It is controllable whole The display screen display installation inquiry session frame at end, allows user to choose whether to install instruction to be installed according to installation instruction.In this way, working as It when can not confirm whether software to be installed is illegal, can voluntarily be chosen whether that the software is installed by user.If user can be confirmed The safety of the software to be installed, such as when the soft software write for user oneself to be installed, then can choose according to installation Instruction installs software to be installed and can choose if software to be installed is of unknown origin and do not execute installation instruction to prevent to install Software to be installed.
Referring to Fig. 5, based on the above embodiment, in yet another embodiment of the invention, step 01 includes:
011, when getting the installation instruction of software to be installed, software package to be installed is parsed to obtain software power to be installed The Permission Levels of limit mark and software to be installed;
It include software information to be installed in the installation kit of software to be installed, when including software encapsulation to be installed in software information The software capability identification and software version information to be installed of generation, dbase, software function, software type, software publication are public Department etc..Software package to be installed can be parsed to obtain software capability identification to be installed and software type to be installed, then according to software Type determines the Permission Levels of software to be installed.It is soft that software type may include but be not limited to social software, shooting software, news Part, shopping software etc..The corresponding Permission Levels of each software type can be preset by developer, can also be set by the user.Example Such as, Permission Levels are divided into level-one, second level and three-level according to the sequence of permission from high to low, and the Permission Levels of social software can be one The Permission Levels of grade, shooting software and shopping software can be set as second level, and news software can be set as three-level.It should be noted that soft The setting of part type and Permission Levels be not limited to the above embodiments in setting means in other embodiments can be according to reality Demand setting, it is not limited here.
When Permission Levels within a preset range when, execute step 02.
Preset range can be set by the developer of software installation procedure, can also be set by the user.For example, working as permission Grade is divided into level-one, second level and three-level according to the sequence of permission from high to low, preset range can be set as firsts and seconds.Work as peace Fill soft software needed for Permission Levels within a preset range when, execute step 02, in this way can install it is some needed for permissions compared with It is smaller to the security implication of terminal because required permission is lower when low software, it saves from preset data library inquiry and software The step of corresponding default access of capability identification identifies, can be improved the installation effectiveness with installation software in this way.
The embodiment of the present invention also provides a kind of software installation device, comprising:
Parsing module, for when getting the installation instruction of software to be installed, parsing software package to be installed with obtain to Software capability identification is installed;
Enquiry module, for being identified from preset data library inquiry default access corresponding with software capability identification;
Execution module, for when presetting database have default access corresponding with software capability identification mark when, according to peace Software to be installed is installed in dress instruction.
Further, enquiry module includes:
Comparing unit, for comparing software capability identification and each default access mark in presetting database, judgement is It is no to there is the default access mark for meeting preset rules with the relationship of software capability identification;
Judging unit, when the default access for meeting preset rules when the relationship of presence and software capability identification identifies, Determine that presetting database has default access corresponding with software capability identification to identify.
Further, comparing unit includes:
Subelement is obtained, for obtaining the soft ware authorization date of software capability identification;
Comparison subunit was used for software capability identification and presetting database Plays authorization date and soft ware authorization date Identical each default access mark compares, and judges whether there is the default power for meeting preset rules with the relationship of software capability identification Limit mark.
Further, software installation device further include:
Judgment module is used for when default access corresponding with software capability identification does not identify presetting database, will be soft Part capability identification is compared with the illegal capability identification in illegal software library, is judged whether there is identical with software capability identification non- Method capability identification;
Alarm module refers to for when there is illegal capability identification identical with software capability identification, preventing to execute to install It enables and issues illegal software warning information;
Confirmation module, for when illegal capability identification identical with software capability identification is not present, issuing installation inquiry Information to user to be confirmed whether to install software to be installed according to installation instruction.
Further, parsing module, which is known, includes:
Resolution unit, for when getting the installation instruction of software to be installed, parsing software package to be installed with obtain to The Permission Levels of software capability identification and software to be installed are installed;
Enquiry module be also used to when Permission Levels within a preset range when, from preset data library inquiry and software capability identification Corresponding default access mark.
Further, resolution unit includes:
Parsing subunit obtains software capability identification to be installed and software class to be installed for parsing software package to be installed Type;
Permission determines subelement, for determining the Permission Levels of software to be installed according to software type.
Further, default access mark be in presetting database audit and pass through through software harnesses platform it is legal soft The capability identification that part generates when encapsulating carries out the cryptographic Hash obtained after Hash processing, software capability identification through the first preset algorithm The capability identification generated when being software encapsulation to be installed carries out the cryptographic Hash obtained after Hash processing through the second preset algorithm.
Wherein, each in the function realization and above-mentioned software installation method embodiment of modules in above-mentioned software installation device Step is corresponding, and function and realization process no longer repeat one by one here.
The present invention also provides a kind of computer readable storage medium, it is stored with the computer program for software installation, In, the step of computer program makes computer execute the software installation method of any of the above-described embodiment.
Wherein, software installation procedure, which is performed realized method, can refer to each reality of invention software installation method Example is applied, details are not described herein again.
In the above-described embodiments, can wholly or partly by software, hardware, firmware, or any combination thereof realize.When When using software realization, can entirely or partly it realize in the form of a computer program product.The computer program product Including one or more computer instructions.It is all or part of when loading on computers and executing the computer program instructions Ground is generated according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, Computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or Person is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction Wired (such as coaxial cable, optical fiber, digital subscriber can be passed through from a web-site, computer, server or data center Line) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data center into Row transmission.The computer readable storage medium can be any usable medium or include one that computer can access Or the data storage devices such as integrated server, data center of multiple usable mediums.The usable medium can be magnetic medium (such as floppy disk, hard disk, tape), optical medium (such as CD) or semiconductor medium (such as solid state hard disk) etc..In above-mentioned reality It applies in example, all emphasizes particularly on different fields to the description of each embodiment, there is no the part being described in detail in some embodiment, may refer to other realities Apply the associated description of example.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided by the present invention, it should be understood that disclosed device can also pass through others Mode is realized.Such as the apparatus embodiments described above are merely exemplary, such as the division of the unit, only one Kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components are combinable or can To be integrated into another device, or some features can be ignored or does not execute.Another point, it is shown or discussed mutual INDIRECT COUPLING or direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, alternatively, may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the scheme of the present embodiment Purpose.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit, it is also possible to each Unit physically exists alone, can also two or more units be integrated in one unit.Above-mentioned integrated unit both can be with Using formal implementation of hardware, or can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a storage medium, including some instructions are with so that a computer is set Standby (can be personal computer, server or network equipment etc.) executes the whole or portion of each embodiment the method for the present invention Step by step.And storage medium above-mentioned is for example can include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), the various program storage generations such as random access memory (RAM, Random Access Memory), magnetic disk or CD The medium of code.

Claims (10)

1. a kind of software installation method characterized by comprising
When getting the installation instruction of software to be installed, the software package to be installed is parsed to obtain the software power to be installed Limit mark;
From preset data library inquiry default access mark corresponding with the software capability identification;
When the presetting database has default access corresponding with software capability identification mark, according to the installation instruction The software to be installed is installed.
2. software installation method according to claim 1, which is characterized in that it is described from preset data library inquiry with it is described soft The corresponding default access of part capability identification, which identifies, includes:
By the software capability identification and in the presetting database each default access mark compare, judge whether there is with it is soft The relationship of part capability identification meets the default access mark of preset rules;
When there is the default access mark for meeting preset rules with the relationship of software capability identification, the presetting database is determined There is default access corresponding with the software capability identification to identify.
3. software installation method according to claim 2, which is characterized in that it is described by the software capability identification with it is described Each default access in presetting database, which identifies, to be compared, and is judged whether there is and is met preset rules with the relationship of software capability identification Default access mark include:
Obtain the soft ware authorization date of the software capability identification;
The software capability identification is identical with the soft ware authorization date with the presetting database Plays authorization date Each default access mark compares, and judges whether there is the default access mark for meeting preset rules with the relationship of software capability identification Know.
4. software installation method according to claim 1, which is characterized in that the software installation method further include:
When default access corresponding with the software capability identification does not identify the presetting database, by the software permission Mark is compared with the illegal capability identification in illegal software library, is judged whether there is identical with the software capability identification illegal Capability identification;
When there is illegal capability identification identical with the software capability identification, preventing to execute the installation instruction and issue non- Method software alarm information;
When illegal capability identification identical with the software capability identification is not present, installation inquiry message is issued with true to user Whether recognize according to the installation instruction installation software to be installed.
5. software installation method according to claim 1, which is characterized in that described in the installation for getting software to be installed When instruction, parsing the software package to be installed to obtain the software capability identification to be installed includes:
When getting the installation instruction of software to be installed, the software package to be installed is parsed to obtain the software power to be installed The Permission Levels of limit mark and the software to be installed;
When the Permission Levels within a preset range when, execute described from preset data library inquiry and the software capability identification pair The step of default access mark answered.
6. software installation method according to claim 5, which is characterized in that the parsing software package to be installed is to obtain The Permission Levels for taking the software capability identification to be installed and the software to be installed include:
The software package to be installed is parsed to obtain the software capability identification to be installed and the software type to be installed;
The Permission Levels of the software to be installed are determined according to the software type.
7. software installation method according to claim 1-6, which is characterized in that the default access mark is institute The capability identification generated when the legal software encapsulation audited and passed through through software harnesses platform in presetting database is stated through first Preset algorithm carries out the cryptographic Hash obtained after Hash processing, raw when the software capability identification is the software encapsulation to be installed At capability identification carry out obtained cryptographic Hash after Hash processing through the second preset algorithm.
8. a kind of software installation device characterized by comprising
Parsing module, for when getting the installation instruction of software to be installed, parsing the software package to be installed to obtain State software capability identification to be installed;
Enquiry module, for being identified from preset data library inquiry default access corresponding with the software capability identification;
Execution module, for when the presetting database have default access corresponding with the software capability identification mark when, root The software to be installed is installed according to the installation instruction.
9. a kind of terminal, which is characterized in that described including processor, memory, communication interface, and one or more programs One or more programs are stored in the memory, and are configured to be executed by the processor, and described program includes using The instruction of the step in the described in any item software installation methods of 1-7 is required in perform claim.
10. a kind of computer readable storage medium, which is characterized in that be stored with the computer program for software installation, wherein The computer program makes computer perform claim require the described in any item software installation methods of 1-7.
CN201910128627.8A 2019-02-21 2019-02-21 Software installation method, device, terminal and computer readable storage medium Pending CN109901850A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910128627.8A CN109901850A (en) 2019-02-21 2019-02-21 Software installation method, device, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910128627.8A CN109901850A (en) 2019-02-21 2019-02-21 Software installation method, device, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109901850A true CN109901850A (en) 2019-06-18

Family

ID=66945080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910128627.8A Pending CN109901850A (en) 2019-02-21 2019-02-21 Software installation method, device, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109901850A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695113A (en) * 2020-06-01 2020-09-22 南方电网数字电网研究院有限公司 Method and device for detecting installation compliance of terminal software and computer equipment
CN115208933A (en) * 2022-07-07 2022-10-18 成都域卫科技有限公司 Software application control method, device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2231978A1 (en) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software
CN101593250A (en) * 2008-05-28 2009-12-02 奇智软件(北京)有限公司 Protecting information safety method, device and server unit
CN102222183A (en) * 2011-04-28 2011-10-19 奇智软件(北京)有限公司 Mobile terminal software package safety detection method and system thereof
CN103500114A (en) * 2013-10-12 2014-01-08 北京奇虎科技有限公司 Method and device for installing application program
CN108984184A (en) * 2018-06-22 2018-12-11 珠海市君天电子科技有限公司 A kind of software installation method, device and electronic equipment, storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2231978A1 (en) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software
CN101593250A (en) * 2008-05-28 2009-12-02 奇智软件(北京)有限公司 Protecting information safety method, device and server unit
CN102222183A (en) * 2011-04-28 2011-10-19 奇智软件(北京)有限公司 Mobile terminal software package safety detection method and system thereof
CN103500114A (en) * 2013-10-12 2014-01-08 北京奇虎科技有限公司 Method and device for installing application program
CN108984184A (en) * 2018-06-22 2018-12-11 珠海市君天电子科技有限公司 A kind of software installation method, device and electronic equipment, storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111695113A (en) * 2020-06-01 2020-09-22 南方电网数字电网研究院有限公司 Method and device for detecting installation compliance of terminal software and computer equipment
CN111695113B (en) * 2020-06-01 2023-12-05 南方电网数字平台科技(广东)有限公司 Terminal software installation compliance detection method and device and computer equipment
CN115208933A (en) * 2022-07-07 2022-10-18 成都域卫科技有限公司 Software application control method, device and storage medium

Similar Documents

Publication Publication Date Title
US10225145B2 (en) Method and device for updating client
KR100932807B1 (en) Run test enabled applications
CN105339923B (en) The context aware control of authority of mixed act application program
CN103491056B (en) The control method and device of application permission
US20140196150A1 (en) Quantifying the risks of applications for mobile devices
CN107026832A (en) Account logon method, equipment and server
CN107196951A (en) The implementation method and firewall system of a kind of HDFS systems fire wall
CA2538500A1 (en) Methods and apparatus for content protection in a wireless network
US20170068531A1 (en) Method of deploying a set of software application(s)
CN106330958A (en) Secure accessing method and device
CN111163095B (en) Network attack analysis method, network attack analysis device, computing device, and medium
JP2019524016A (en) Methods for managing the status of connected devices
CN105844150A (en) Application program data protection method and device
CN109901850A (en) Software installation method, device, terminal and computer readable storage medium
CN107209837A (en) The block-based integrity protection technique of selectivity
CN107798236B (en) Method and device for realizing safe installation of application program installation package
CN111163094A (en) Network attack detection method, network attack detection device, electronic device, and medium
CN103577180A (en) Data processing method and data processing device
CN110135149A (en) A kind of method and relevant apparatus of application installation
CN114429267B (en) Air control method, system and device for copyright of digital work and storage medium
CN108282451A (en) Hijacking data judgment method, device and user terminal
EP3381166A1 (en) Systems and methods for cross-channel device binding
CN112346758B (en) Digital infrastructure service updating platform, updating method and electronic equipment
CN108574658B (en) Application login method and device
CN101257518B (en) Method and system for preventing lawless ordering without through charging gateway in WAP platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190618