CN110442357B - Application installation management method, intelligent device and system - Google Patents
Application installation management method, intelligent device and system Download PDFInfo
- Publication number
- CN110442357B CN110442357B CN201910735538.XA CN201910735538A CN110442357B CN 110442357 B CN110442357 B CN 110442357B CN 201910735538 A CN201910735538 A CN 201910735538A CN 110442357 B CN110442357 B CN 110442357B
- Authority
- CN
- China
- Prior art keywords
- application
- value
- signature
- installation
- parsed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an application installation management method, intelligent equipment and a system, wherein the application installation management method comprises the following steps: obtaining an installation permission condition; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets an application installation permission condition, and if so, executing installation operation aiming at the application installation package; otherwise, the application installation package is prohibited from being installed. The scheme provided by the invention realizes the limitation of application installation, thereby ensuring that the operation of the intelligent equipment for installing the application is not influenced by the application.
Description
Technical Field
The invention relates to the technical field of application management, in particular to an application installation management method, intelligent equipment and an application installation management system.
Background
At present, many intelligent devices such as intelligent air conditioners, intelligent refrigerators, intelligent smoke exhaust ventilators and the like are developed secondarily by adopting android systems. Since the android system is a general system, it can install many applications such as an application related to voice communication, an application related to short messages, and the like on the smart device. Once the installed application is incompatible with the hardware configuration of the smart device, the smart device is often operated incorrectly.
Disclosure of Invention
The embodiment of the invention provides an application installation management method, intelligent equipment and a system, which realize the limitation of application installation, thereby ensuring that the operation of the intelligent equipment for installing application is not influenced by application.
In a first aspect, an embodiment of the present invention provides an application installation management method, where the application installation management method includes:
obtaining an installation permission condition;
when a trigger signal aiming at one application installation package is received, analyzing the application installation package;
judging whether the analyzed result meets the application installation permission condition, if so, executing installation operation aiming at the application installation package; and if not, forbidding the application installation package to be installed.
Preferably, the installation permission condition includes:
the application is allowed to be installed, and the application is not allowed to be installed.
Preferably, the determining whether the result of the parsing satisfies the application installation permission condition includes:
matching the parsed compressed package name, the parsed signature and the parsed use permission in the parsing result with the compressed package name, the signature and the use permission which allow the application to be installed and the compressed package name, the signature and the use permission which do not allow the application to be installed respectively;
and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application not allowed to be installed, determining that the parsed result meets the application installation permission condition.
Preferably, the determining whether the result of the parsing satisfies the application installation permission condition includes:
calculating a matching value between the result of the parsing and the application installation permitting condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein P represents a matching value between the result of the analysis and the application installation permission condition; myRepresenting the first matching assignment of the compressed package name, and when the compressed package name allowing to install the application contains the parsed compressed package name, the M isyThe value is 1, when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, when the signature allowing the installation of the application does not include the parsed signature, QyThe value is assigned to 0; syThe first matching assignment of the use permission is represented, and when the use permission allowing the application to be installed comprises the analyzed use permission, the S isyThe value is assigned to 1, and when the use permission of the application which is allowed to be installed does not contain the analyzed use permission, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed packet name, and when the compressed packet name which does not allow the application installation contains the analyzed compressed packet name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbCharacterizing the signature second matching assignment, if the signature not allowing to install the application contains the analyzed signature, QbThe value is set to be any value not less than 1, and when the signature not allowing the application to be installed does not include the parsed signature, the value is QbThe value is assigned to 0; sbCharacterizing the second matching assignment of the usage right, and when the usage right not allowing to install the application contains the analyzed usage right, S isbAssigning the value to be any value not less than 1, and when the use permission not allowing the application to be installed does not contain the analyzed use permission, assigning SbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
Preferably, the first and second electrodes are formed of a metal,
the installation permission condition further includes: at least one special library file contained by the application is not allowed to be installed, and the API value of the application is not allowed to be installed.
Preferably, the application installation management method may further include:
receiving a modification of the installation permission condition by the server.
In a second aspect, a smart device includes: a memory, and a controller, wherein,
the memory is used for storing installation permission conditions;
the controller is used for obtaining the installation permission conditions stored by the memory; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets the application installation permission condition, if so, executing installation operation aiming at the application installation package; and if not, forbidding the application installation package to be installed.
Preferably, the first and second liquid crystal display panels are,
the memory stores installation permission conditions including: the application is allowed to be installed, and the application is not allowed to be installed.
Preferably, the first and second liquid crystal display panels are,
the controller is used for respectively matching the parsed compressed package name, the parsed signature and the parsed use authority in the parsed result with the compressed package name, the signature and the use authority of the application which is allowed to be installed and the compressed package name, the signature and the use authority of the application which is not allowed to be installed; and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application which is allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application which is not allowed to be installed, determining that the parsed result meets the application installation permission condition.
Preferably, the first and second liquid crystal display panels are,
the controller is configured to calculate a matching value between the result of the analysis and the application installation permission condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein, P represents a matching value between the result of the analysis and the application installation permission condition; m is a group ofyRepresenting the first matching assignment of the compressed package name, and when the compressed package name allowing to install the application contains the parsed compressed package name, the M isyThe value is 1, when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, and Q is given when the signature allowing the installation of the application does not include the resolved signatureyThe value is assigned to 0; syCharacterizing the first matching assignment of usage right, and when the usage right allowing to install the application contains the analyzed usage right, it is SyThe value is assigned to 1, and when the use permission of the application which is allowed to be installed does not contain the analyzed use permission, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed packet name, and when the compressed packet name which does not allow the application installation contains the analyzed compressed packet name, the M is the MbAssigning an arbitrary value not less than 1, if not allowedThe compression package name of the application which is allowed to be installed does not contain the parsed compression package name and is MbThe value is assigned to 0; qbCharacterizing the signature second matching assignment, if the signature not allowing to install the application contains the analyzed signature, QbThe value is assigned to be any value not less than 1, and when the signature which does not allow the application to be installed does not contain the analyzed signature, the value is QbThe value is assigned to 0; sbCharacterizing the second matching assignment of the usage right, and when the usage right not allowing to install the application contains the analyzed usage right, S isbAssigning the value to be any value not less than 1, and when the use permission not allowing the application to be installed does not contain the analyzed use permission, assigning SbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
In a third aspect, an application installation management system includes: at least one smart device and server as recited in any of the above, wherein,
the at least one smart device is connected to the server,
the intelligent equipment is used for receiving the installation permission conditions sent by the server;
the server is used for modifying the installation permission conditions.
The embodiment of the invention provides an application installation management method, intelligent equipment and a system, wherein installation permission conditions are obtained; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets an application installation permission condition, if so, executing installation operation aiming at the application installation package; otherwise, the application installation package is prohibited from being installed. The scheme provided by the invention realizes the limitation of application installation, thereby ensuring that the operation of the intelligent equipment for installing the application is not influenced by the application.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of an application installation management method according to an embodiment of the present invention;
fig. 2 is a flowchart of another application installation management method according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of an intelligent device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an application installation management system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides an application installation management method, where the application installation management method may include the following steps:
step 101: obtaining an installation allowance condition;
step 102: when a trigger signal aiming at one application installation package is received, analyzing the application installation package;
step 103: judging whether the analyzed result meets the application installation permission condition, if so, executing step 104; otherwise, go to step 105;
step 104: executing installation operation aiming at the application installation package, and finishing the current flow;
step 105: and forbidding the installation of the application installation package.
In the embodiment shown in fig. 1, the installation permission condition is obtained; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets an application installation permission condition, if so, executing installation operation aiming at the application installation package; otherwise, the application installation package is prohibited from being installed. The scheme provided by the invention realizes the limitation of application installation, thereby ensuring that the operation of the intelligent equipment for installing the application is not influenced by the application.
In another embodiment of the present invention, in order to ensure the integrity of application installation management, the installation permission conditions may include: the application is allowed to be installed, and the application is not allowed to be installed.
In another embodiment of the present invention, the specific real-time manner for determining whether the analyzed result satisfies the application installation permission condition may include: matching the parsed compressed package name, the parsed signature and the parsed use permission in the parsing result with the compressed package name, the signature and the use permission which allow the application to be installed and the compressed package name, the signature and the use permission which do not allow the application to be installed respectively; and when the analyzed compressed package name, the analyzed signature and the analyzed use authority are completely matched with the compressed package name, the signature and the use authority of the application which is allowed to be installed and are not matched with the compressed package name, the signature and the use authority of the application which is not allowed to be installed, determining that the analyzed result meets the application installation permission condition.
In another embodiment of the present invention, another specific real-time manner for determining whether the analyzed result satisfies the application installation permission condition may include: calculating a matching value between the result of the analysis and the application installation permitting condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein P represents a matching value between the result of the analysis and the application installation permission condition; myCharacterizing compressed packet name first matching assignment, allowingThe compressed packet name of the application allowed to be installed contains the parsed compressed packet name MyThe value is 1, when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, and Q is given when the signature allowing the installation of the application does not include the resolved signatureyThe value is assigned to 0; syCharacterizing the first matching assignment of usage right, and when the usage right allowing to install the application contains the analyzed usage right, it is SyThe value is 1, when the use authority allowing the application to be installed does not contain the analyzed use authority, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed package name, and when the compressed package name which does not allow the application installation contains the analyzed compressed package name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbCharacterizing the signature second matching assignment, if the signature not allowing to install the application contains the analyzed signature, QbThe value is set to be any value not less than 1, and when the signature not allowing the application to be installed does not include the parsed signature, the value is QbThe value is assigned to 0; s. thebCharacterizing the second matching assignment of the usage right, and when the usage right not allowing to install the application contains the analyzed usage right, S isbThe value is assigned to be any value not less than 1, and S is the analyzed use permission when the use permission not allowing the application to be installed does not contain the analyzed use permissionbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
In another embodiment of the present invention, the method may further include: modification of the installation permission condition by the server is received.
As shown in fig. 2, an embodiment of the present invention provides an application installation management method, which may specifically include the following steps:
step 200: receiving the setting and modification of the installation permission conditions by the server;
the specific signed application installable, the specific package name application installable, the specific permission application non-installable, the specific special library file containing application non-installable and the application non-installable lower than a certain android API can be remotely and dynamically configured on the server. This prevents applications that are not compatible, have a security risk, or are not authorized from being installed in the system.
Step 201: obtaining an installation allowance condition;
the compressed package name, signature, usage rights of the application are allowed to be installed, and the compressed package name, signature, usage rights of the application are not allowed to be installed.
Step 202: when a trigger signal aiming at one application installation package is received, analyzing the application installation package;
step 203: judging whether the analyzed result meets the application installation permission condition, if so, executing step 204; otherwise, go to step 205;
the specific implementation manner of the step can be any one of the following two.
The first method comprises the following steps:
matching the parsed compressed package name, the parsed signature and the parsed use permission in the parsing result with the compressed package name, the signature and the use permission which allow the application to be installed and the compressed package name, the signature and the use permission which do not allow the application to be installed respectively;
and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application which is allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application which is not allowed to be installed, determining that the parsed result meets the application installation permission condition.
And the second method comprises the following steps:
calculating a matching value between the result of the parsing and the application installation permitting condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein P represents a matching value between the result of the analysis and the application installation permission condition; m is a group ofyRepresenting the first matching assignment of the compressed package name, and when the compressed package name allowing to install the application contains the parsed compressed package name, the M isyThe value is 1, when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyThe first matching value of the characteristic signature is assigned, when the signature allowing the installation of the application comprises the analyzed signature, which is QyThe value is 1, and Q is given when the signature allowing the installation of the application does not include the resolved signatureyThe value is assigned to 0; syCharacterizing the first matching assignment of usage right, and when the usage right allowing to install the application contains the analyzed usage right, it is SyThe value is 1, when the use authority allowing the application to be installed does not contain the analyzed use authority, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed packet name, and when the compressed packet name which does not allow the application installation contains the analyzed compressed packet name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbThe second matching value of the characteristic signature is set as Q when the signature which does not allow the application to be installed contains the analyzed signaturebThe value is assigned to be any value not less than 1, and when the signature which does not allow the application to be installed does not contain the analyzed signature, the value is QbThe value is assigned to 0; s. thebThe second matching assignment of the characteristic use authority is S when the use authority which does not allow the installation of the application contains the analyzed use authoritybThe value is assigned to be any value not less than 1, and S is the analyzed use permission when the use permission not allowing the application to be installed does not contain the analyzed use permissionbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
Step 204: executing installation operation aiming at the application installation package, and finishing the current flow;
step 205: and forbidding the installation of the application installation package.
As shown in fig. 3, an embodiment of the present invention provides an intelligent device, where the intelligent device includes: a memory 301, and a controller 302, wherein,
a memory 301 for storing installation permission conditions;
a controller 302 for obtaining the installation permission conditions stored in the memory 301; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets an application installation permission condition, if so, executing installation operation aiming at the application installation package; otherwise, the application installation package is prohibited from being installed.
In another embodiment of the present invention, the installation permission conditions stored in the memory include: the compressed package name, signature, usage rights of the application are allowed to be installed, and the compressed package name, signature, usage rights of the application are not allowed to be installed.
In another embodiment of the present invention, the controller 302 is configured to match the parsed compressed package name, the parsed signature, and the parsed usage right in the parsing result with the compressed package name, the signature, and the usage right of the application allowed to be installed, and the compressed package name, the signature, and the usage right of the application not allowed to be installed, respectively; and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application which is allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application which is not allowed to be installed, determining that the parsed result meets the application installation permission condition.
In another embodiment of the present invention, the controller 302 is configured to calculate a matching value between the result of the parsing and the application installation permission condition using the following calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein, P represents a matching value between the result of the analysis and the application installation permission condition; m is a group ofyThe first matching assignment of the representation compressed package name is M when the compressed package name allowing the installation of the application comprises the analyzed compressed package nameyThe value is assigned to 1, and when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, and Q is given when the signature allowing the installation of the application does not include the resolved signatureyThe value is assigned to 0; syCharacterizing the first matching assignment of usage right, and when the usage right allowing to install the application contains the analyzed usage right, it is SyThe value is 1, when the use authority allowing the application to be installed does not contain the analyzed use authority, the value is SyThe value is assigned to 0; m is a group ofbRepresenting the second matching assignment of the compressed packet name, and when the compressed packet name which does not allow the application installation contains the analyzed compressed packet name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbCharacterizing the signature second matching assignment, if the signature not allowing to install the application contains the analyzed signature, QbThe value is assigned to be any value not less than 1, and when the signature which does not allow the application to be installed does not contain the analyzed signature, the value is QbThe value is assigned to 0; sbCharacterizing the second matching assignment of the usage right, and when the usage right not allowing to install the application contains the analyzed usage right, S isbThe value is assigned to be any value not less than 1, and S is the analyzed use permission when the use permission not allowing the application to be installed does not contain the analyzed use permissionbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
As shown in fig. 4, an embodiment of the present invention provides an application installation management system, where the application installation management system includes: at least one smart device 401 as any of the above, and a server 402, wherein,
at least one smart device 401 is connected to a server 402,
the intelligent device 401 is used for receiving the installation permission conditions sent by the server 402;
a server 402 for modification of the installation permission condition.
The information interaction, execution process and other contents between the units in the device are based on the same concept as the system embodiment of the present invention, and specific contents can be referred to the description in the method embodiment of the present invention, and are not described herein again.
The embodiments of the invention have at least the following beneficial effects:
1. in the embodiment of the present invention, by obtaining the installation permission condition; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets an application installation permission condition, and if so, executing installation operation aiming at the application installation package; otherwise, the application installation package is prohibited from being installed. The scheme provided by the invention realizes the limitation of application installation, thereby ensuring that the operation of the intelligent equipment for installing the application is not influenced by the application.
2. In the embodiment of the invention, the installation permission conditions comprise the compressed package name, the signature and the use permission which allow the application to be installed and the compressed package name, the signature and the use permission which do not allow the application to be installed, so that the application installation management is ensured to be more perfect and accurate.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: ROM, RAM, magnetic or optical disks, etc. that can store program codes.
Finally, it is to be noted that: the above description is only a preferred embodiment of the present invention, and is only used to illustrate the technical solutions of the present invention, and not to limit the protection scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (7)
1. An application installation management method, comprising:
obtaining an installation allowance condition;
when a trigger signal aiming at one application installation package is received, analyzing the application installation package;
judging whether the analyzed result meets the application installation permission condition, if so, executing installation operation aiming at the application installation package; otherwise, forbidding the application installation package to be installed;
the installation permission conditions include:
allowing the compressed package name, signature and use permission of the application to be installed, and not allowing the compressed package name, signature and use permission of the application to be installed;
judging whether the analyzed result meets the application installation permission condition or not comprises the following steps:
calculating a matching value between the result of the analysis and the application installation permitting condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein, P represents a matching value between the result of the analysis and the application installation permission condition; myRepresenting the first matching assignment of the compressed package name, and when the compressed package name allowing to install the application contains the parsed compressed package name, the M isyThe value is assigned to 1, and when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, when the signature allowing the installation of the application does not include the parsed signature, QyThe value is assigned to 0; s. theyThe first matching assignment of the use permission is represented, and when the use permission allowing the application to be installed comprises the analyzed use permission, the S isyThe value is 1, when the use authority allowing the application to be installed does not contain the analyzed use authority, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed package name, and when the compressed package name which does not allow the application installation contains the analyzed compressed package name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbThe second matching value of the characteristic signature is set as Q when the signature which does not allow the application to be installed contains the analyzed signaturebThe value is assigned to be any value not less than 1, and when the signature which does not allow the application to be installed does not contain the analyzed signature, the value is QbThe value is assigned to 0; s. thebCharacterizing the second matching assignment of the usage right, and when the usage right not allowing to install the application contains the analyzed usage right, S isbThe value is assigned to be any value not less than 1, and S is the analyzed use permission when the use permission not allowing the application to be installed does not contain the analyzed use permissionbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
2. The application installation management method according to claim 1, wherein determining whether the result of the parsing satisfies the application installation permission condition includes:
matching the parsed compressed package name, the parsed signature and the parsed use authority in the parsing result with the compressed package name, the signature and the use authority of the application which is allowed to be installed and the compressed package name, the signature and the use authority of the application which is not allowed to be installed respectively;
and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application which is allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application which is not allowed to be installed, determining that the parsed result meets the application installation permission condition.
3. The application installation management method according to any one of claims 1 to 2,
the installation permission condition further includes: at least one special library file contained by the application is not allowed to be installed, and the API value of the application is not allowed to be installed.
4. The application installation management method according to any one of claims 1 to 2, characterized by further comprising:
receiving a modification of the installation permission condition by the server.
5. A smart device, comprising: a memory, and a controller, wherein,
the memory is used for storing installation permission conditions;
the controller is used for obtaining the installation permission conditions stored by the memory; when a trigger signal aiming at one application installation package is received, analyzing the application installation package; judging whether the analyzed result meets the application installation permission condition, if so, executing installation operation aiming at the application installation package; otherwise, forbidding the application installation package to be installed;
the memory stores installation permission conditions including: allowing the compressed package name, signature and use permission of the application to be installed, and not allowing the compressed package name, signature and use permission of the application to be installed;
the controller for calculating a matching value between the result of the parsing and the application installation permitting condition using a calculation formula,
P=My×Qy×Sy+Mb+Qb+Sb
wherein P represents a matching value between the result of the analysis and the application installation permission condition; m is a group ofyRepresenting the first matching assignment of the compressed package name, and when the compressed package name allowing to install the application contains the parsed compressed package name, the M isyThe value is assigned to 1, and when the compressed packet name allowing the installation of the application does not contain the parsed compressed packet name, the value is MyThe value is assigned to 0; qyCharacterizing the signature first matching assignment, when the signature allowing installation of the application comprises the parsed signature, QyThe value is 1, when the signature allowing the installation of the application does not include the parsed signature, QyThe value is assigned to 0; syCharacterizing the first matching assignment of usage right, and when the usage right allowing to install the application contains the analyzed usage right, it is SyThe value is assigned to 1, and when the use permission of the application which is allowed to be installed does not contain the analyzed use permission, the value is SyThe value is assigned to 0; mbRepresenting the second matching assignment of the compressed packet name, and when the compressed packet name which does not allow the application installation contains the analyzed compressed packet name, the M is the MbAssigning the value to be any value not less than 1, and when the compressed package name which does not allow the application to be installed does not contain the analyzed compressed package name, the value is MbThe value is assigned to 0; qbCharacterizing the signature second matching assignment, if the signature not allowing to install the application contains the analyzed signature, QbThe value is set to be any value not less than 1, and when the signature not allowing the application to be installed does not include the parsed signature, the value is QbThe value is assigned to 0; sbThe second matching assignment of the characteristic use authority is S when the use authority which does not allow the installation of the application contains the analyzed use authoritybAssigning the value to be any value not less than 1, and when the use permission not allowing the application to be installed does not contain the analyzed use permission, assigning SbThe value is assigned to 0;
when the calculated matching value P =1, it is determined that the result of the analysis satisfies the application installation permission condition, and when the calculated matching value P ≠ 1, it is determined that the result of the analysis does not satisfy the application installation permission condition.
6. The smart device of claim 5,
the controller is used for respectively matching the parsed compressed package name, the parsed signature and the parsed use authority in the parsed result with the compressed package name, the signature and the use authority of the application which is allowed to be installed and the compressed package name, the signature and the use authority of the application which is not allowed to be installed; and when the parsed compressed package name, the parsed signature and the parsed use permission are completely matched with the compressed package name, the signature and the use permission of the application allowed to be installed and are not matched with the compressed package name, the signature and the use permission of the application not allowed to be installed, determining that the parsed result meets the application installation permission condition.
7. An application installation management system, comprising: the smart device and the server of at least one of claims 5 to 6,
the at least one smart device is connected to the server,
the intelligent equipment is used for receiving the installation permission conditions sent by the server;
the server is used for modifying the installation permission conditions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910735538.XA CN110442357B (en) | 2019-08-09 | 2019-08-09 | Application installation management method, intelligent device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910735538.XA CN110442357B (en) | 2019-08-09 | 2019-08-09 | Application installation management method, intelligent device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110442357A CN110442357A (en) | 2019-11-12 |
CN110442357B true CN110442357B (en) | 2022-11-01 |
Family
ID=68434312
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910735538.XA Active CN110442357B (en) | 2019-08-09 | 2019-08-09 | Application installation management method, intelligent device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110442357B (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553961A (en) * | 2015-12-11 | 2016-05-04 | 北京元心科技有限公司 | Mandatory access control method and system for application program and management server |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104346566A (en) * | 2013-07-31 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Method, device, terminal, server and system for detecting privacy authority risks |
CN103617387B (en) * | 2013-11-25 | 2016-12-14 | 北京奇虎科技有限公司 | A kind of method and device preventing automatic set up applications |
CN103761472B (en) * | 2014-02-21 | 2017-05-24 | 北京奇虎科技有限公司 | Application program accessing method and device based on intelligent terminal |
CN104951675B (en) * | 2014-03-31 | 2018-05-08 | 北京金山网络科技有限公司 | A kind of method and system for identifying pirate application |
SG10201509221YA (en) * | 2015-11-06 | 2017-06-29 | Huawei Int Pte Ltd | System and method for managing installation of an application package requiring high-risk permission access |
CN106503541B (en) * | 2016-10-11 | 2019-07-26 | 天脉聚源(北京)传媒科技有限公司 | A kind of installation method and system of installation kit |
CN107608697A (en) * | 2017-09-29 | 2018-01-19 | 武汉斗鱼网络科技有限公司 | Application program discharging method, device and readable storage medium storing program for executing |
CN107943490A (en) * | 2017-11-16 | 2018-04-20 | 珠海市魅族科技有限公司 | Using installation method, equipment, computer-readable recording medium and computer installation |
CN109660353A (en) * | 2018-12-12 | 2019-04-19 | 新华三技术有限公司 | A kind of application program installation method and device |
-
2019
- 2019-08-09 CN CN201910735538.XA patent/CN110442357B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105553961A (en) * | 2015-12-11 | 2016-05-04 | 北京元心科技有限公司 | Mandatory access control method and system for application program and management server |
Also Published As
Publication number | Publication date |
---|---|
CN110442357A (en) | 2019-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108494771B (en) | Electronic device, firewall opening verification method and storage medium | |
CN109299135A (en) | Abnormal inquiry recognition methods, identification equipment and medium based on identification model | |
CN108989468B (en) | Trust network construction method and device | |
CN104346566A (en) | Method, device, terminal, server and system for detecting privacy authority risks | |
CN109918285B (en) | Security identification method and device for open source software | |
CN104765629A (en) | System application installation method and device | |
CN109063481B (en) | Risk detection method and device | |
CN106339629A (en) | Application management method and device | |
Siebert et al. | Incorporating time delays into the logical analysis of gene regulatory networks | |
CN114329469A (en) | API abnormal calling behavior detection method, device, equipment and storage medium | |
CN113438225A (en) | Vehicle-mounted terminal vulnerability detection method, system, equipment and storage medium | |
CN110442357B (en) | Application installation management method, intelligent device and system | |
KR101586048B1 (en) | System, Server, Method and Recording Medium for Blocking Illegal Applications, and Communication Terminal Therefor | |
CN106850601A (en) | The safety protecting method of industrial control protocols in a kind of industrial control system | |
CN111030974A (en) | APT attack event detection method, device and storage medium | |
KR20200115730A (en) | System and method for generating software whistlist using machine run | |
CN112637046A (en) | Message pushing method and routing device | |
US9998495B2 (en) | Apparatus and method for verifying detection rule | |
CN104301343A (en) | Database updating method and relevant equipment and system | |
CN107046546A (en) | A kind of network safety control method and device | |
CN115174223B (en) | Industrial control host safety protection method, system, intelligent terminal and storage medium | |
CN116541269A (en) | Application multi-opening identification method and device, electronic equipment and computer readable medium | |
CN112464103A (en) | Service processing method, device, server and storage medium | |
CN109388951B (en) | Illegal information processing method, device and equipment and readable storage medium | |
Braband | Towards an IT security risk assessment framework for railway automation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |