CN110515630A - A kind of application installation method and terminal - Google Patents

A kind of application installation method and terminal Download PDF

Info

Publication number
CN110515630A
CN110515630A CN201910757127.0A CN201910757127A CN110515630A CN 110515630 A CN110515630 A CN 110515630A CN 201910757127 A CN201910757127 A CN 201910757127A CN 110515630 A CN110515630 A CN 110515630A
Authority
CN
China
Prior art keywords
application
under
installation
terminal
user mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910757127.0A
Other languages
Chinese (zh)
Other versions
CN110515630B (en
Inventor
胡啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910757127.0A priority Critical patent/CN110515630B/en
Publication of CN110515630A publication Critical patent/CN110515630A/en
Application granted granted Critical
Publication of CN110515630B publication Critical patent/CN110515630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Abstract

The present invention provides a kind of application installation method and terminal, this method comprises: creating the second installation path in the case where being equipped with the first application under the first installation path of the terminal;It obtains the installation kit of first application and its initially wraps name;It modifies to the initial packet name, obtains target packet name;Based on the target packet name, the installation kit is mounted under second installation path.The use applied under different user mode in this way is interference-free between each other, substantially increases the safety of user data.

Description

A kind of application installation method and terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of application installation method and terminals.
Background technique
It improves with the development of technology, the terminals such as mobile phone can switch login user, so that different login users can be with See different contents.However, different users is logging in use in application, being only by the storage location of user data point From thus all there is biggish hidden danger in the operation of application and the safety of user data.For example, user A and user B be all using The application of legacy version, after the application of legacy version is updated to the application of new version by user A;User B logs in this in application, meeting again It was found that the application has also upgraded into new version.As it can be seen that in the multi-user mode using there is biggish safety in the process Hidden danger.
Summary of the invention
The embodiment of the present invention provides a kind of application installation method and terminal, with solve in the multi-user mode using There is biggish security risk in the process.
In order to solve the above technical problems, the present invention is implemented as follows:
In a first aspect, applying installation method the embodiment of the invention provides a kind of, the method is applied to terminal, the side Method includes:
In the case where the first application is installed under the first installation path of the terminal, the second installation path is created;
It obtains the installation kit of first application and its initially wraps name;
It modifies to the initial packet name, obtains target packet name;
Based on the target packet name, the installation kit is mounted under second installation path.
Second aspect, the embodiment of the present invention also provide a kind of terminal, and the terminal includes:
Creation module, in the case where for being equipped with the first application under the first installation path of the terminal, creation the Two installation paths;
Module is obtained, for obtaining the installation kit of first application and its initially wrapping name;
First modified module obtains target packet name for modifying to the initial packet name;
Module is installed, for being based on the target packet name, the installation kit is mounted under second installation path.
The third aspect, the embodiment of the present invention also provide a kind of terminal, including processor, memory and are stored in the storage On device and the computer program that can run on the processor, realized when the computer program is executed by the processor The step of stating using installation method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program realizes the above-mentioned step using installation method when being executed by processor Suddenly.
In embodiments of the present invention, by being equipped with the first application under the first installation path of the terminal the case where Under, create the second installation path;It obtains the installation kit of first application and its initially wraps name;The initial packet name is repaired Change, obtains target packet name;Based on the target packet name, the installation kit is mounted under second installation path.In this way will The installation kit of first application is mounted under the second installation path, thus realize that first applies the installation under second user mode, And effectively prevent first and apply the first application covered under the first user mode when installing under second user mode, thus real Show first to apply in the isolation under the first user mode and under second user mode;And then it realizes in different user mode The use of lower application is interference-free between each other, substantially increases the safety of user data.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the flow chart using installation method that one embodiment of the invention provides;
Fig. 2 is the structure chart for the terminal that one embodiment of the invention provides;
Fig. 3 be another embodiment of the present invention provides terminal structure chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is the flow chart using installation method that one embodiment of the invention provides referring to Fig. 1, Fig. 1, the embodiment of the present invention mentions The application installation method of confession is applied to terminal, and the terminal includes the first user mode and second user mode, the method packet It includes:
Step 101, in the case where the first application is installed under the first installation path of the terminal, the second installation of creation Path.
It, can be by being different from the primary logic of the operating system of terminal, by under different user mode in the step Application be mounted under different paths, to guarantee isolation of the installation file under different user mode of application, to avoid Interfering with each other under different user mode in the use process of application.
For example, being equipped with first under the first installation path under the first user mode in application, needing in second user First application is also installed under mode, then the second installation path being located under second user mode can be being created, so as to first The installation kit of application is mounted under the second installation path, so that realization first is applied under the first user mode and second user mould The isolation of installation path under formula.
For example, first applies the installer package under the first user mode to may be mounted at/data/app/ (i.e. first Installation path) under, first applies the installer package under second user mode to may be mounted at/data/app_sspace/ Under (i.e. the second installation path), to realize that first applies the installation path under the first user mode and under second user mode Isolation.
Step 102 obtains installation kit and its initially wrap name that first applies.
Step 103 modifies to the initial packet name, obtains target packet name.
In the step, the installation kit of the first application includes initial packet name and signature, and in the operating system of terminal, each First application only has a unique name, i.e. initial packet name of first application, and initial packet name is that this first is applied and operating Unique identification in system.Wherein, signature is similar to that one " finger print information " is written in first application, and write-in of signing After confirmation, there is any modification in the installation file of the first application, to causing this signature invalid, such operating system is in installation the One application would not pass through when signature check, to ensure that the safety of the information of the first application.
Wherein, in the installation process of application, can first judge whether packet name is identical, if packet name is identical, then judge It whether identical signs, if signature is same, confirmation is the same application, and then carries out covering installation, is grasped Just because of this The identical application of 2 packet names can not be installed simultaneously by making system.
In the present embodiment, by the way that the initial packet name of the first application is modified, and target packet name is obtained, grasped in this way Make system just to will be considered that the first application of the entitled initial packet name of packet and wrap the first application of entitled target packet name to be two different Using in this way when being installed the installation kit of the first application, would not cover the entitled initial packet name of packet first is answered With so as to realize the first any installation applied of different editions.
Wherein, to the modification of initial packet name, target packet can be obtained in initial packet name plus by way of suffix character Name, the i.e. difference of target packet name and initial packet name can be convenient subsequent to the inquiry of packet name in this way in suffix character.
Step 104 is based on the target packet name, and the installation kit is mounted under second installation path.
In the step, the installation kit of the first application can be mounted on by the second peace based on the target packet name obtained after modification It fills under path, to realize that first applies the installation under second user mode, and effectively prevents first and apply in the second use The first application under the first user mode is covered when installing under the mode of family, is applied to realize first in the first user mode Isolation under lower and second user mode;And then the use applied under different user mode is realized between each other not by dry It disturbs, substantially increases the safety of user data.
Wherein, according to the primary logic of operating system, although being had modified in the installation process of the installation kit of the first application The packet name of installation kit, but occur installation exception in the installation process of the installation kit in the first application, cause the first application can not The normal mounting under second user mode;In this case, can be arranged by especially treating the installation process of the first application It still can normally be installed down in the duplicate situation of permission that first application can be stated under the first user mode.For example, The abnormal position of the multiple just pop-up installation of script right of discovery freight weight limit, if it is determined that the application installation under second user mode, then not Pop-up installation exception ignores installation exception, and normal mounting down, to realize that first applies under second user mode Normal mounting.First is thereby realized to apply in the isolation under the first user mode and under second user mode.
Optionally, described to be based on the target packet name, after the installation kit is mounted under second installation path, The method also includes: in the case where running under the second user mode the described first application, call first application The first data information being mounted under second installation path;Target packet name described in first data information is modified as The initial packet name;Based on modified first data information, first application is run.
Wherein, since during the first application is mounted on the second installation path, the packet name of the first application being modified At target packet name, then other codes in the installation file of the first application may still have many local default writes it is initial Packet name, in this way during calling first is applied, it is possible to occur abnormal.
In present embodiment, in the case where the first application is run under second user mode, the first application installation can be called The first data information under the second installation path, to create the process of the first application;By by the mesh in the first data information Mark packet name is modified as original packet name, and such first application is just not felt by its packet name and is modified, and code can be transported normally Row, so that the first application can operate normally under second user mode.
Moreover, can not be called directly using between application, therefore by the packet name of modification application, will not cause other Any problem is had by the application of packet name using calling.And different process when application under different user mode (process every From), to also ensure that the process started under different user mode will not influence each other completely.
The installation under second user mode is applied to be isolated and run isolation in this manner it is possible to be truly realized first, with And save the isolation of data.
Optionally, described to be based on the target packet name, after the installation kit is mounted under second installation path, The method also includes: in the case where running under first user mode the described first application, call first application The second data information being mounted under first installation path;Based on second data information, first application is run.
In present embodiment, if the first application of operation under the first user mode, due to the under the first user mode The Bao Mingwei of one application is modified, then can call directly first and apply the second data information under the first installation path, and Process is created based on the second data information, to realize the operation of the first application under the first user mode.
It should be noted that first applies, the installation different with the packet name under second user mode under the first user mode Path is different, the store path of user data is also different, and signature can be the same or different, and version can be identical, Can be different, as shown in table 1:
Table 1
First, which can be thus truly realized, applies the installation under second user mode to be isolated and run isolation, and Save the isolation of data.
Wherein, the desktop of terminal can show user mode switching icon, receive the click behaviour for switching icon The similar prompt information such as " just in switching system, please later " when making, can be prompted, is then switched under the first user mode. And after being switched under the first user mode, starting any application all will not be by the application installation file institute under the first user mode It influences, and the application interface started under second user mode is as the application interface started under the first user mode;So It and has actually been to realize the real isolation of application in entirely different space.
In the specific embodiment of the embodiment of the present invention, the intrinsic call and the relevant interface of packet name especially applied are looked into When asking mistake, following processing can be done to the calling process of application:
First it is known that in operating system, want mutually to call between different applications, it is necessary to pass through operating system To connect.In other words, it cannot directly be contacted between, this has just given us chance processing to be fixed by initial packet name After cause system to behave after, it is internal because of problem abnormal caused by the more a suffix of packet name.When system is called in application System the inside have packet name interface when, may determine that caller first, if caller be modified using itself (for example, It is related to packet name inside certain interface that the first application under second user mode is called), forehead is just now with the packet of suffix Name is reduced into its original packet name and returns to this application.If caller is the first application under the first user mode, no It processes, and operates normally the first application.In this case, the application modified does not know the packet name of oneself inside system It has been be modified that, what it was obtained is all the original packet name without suffix.In this case, the operation of application is with regard to normal.
It should be noted that the application installation file under second user mode is eternal in the data structure of operating system It is the state for having modified packet name, when only starting the application under second user mode, and is that the application creates at us When process, the data structure for finding regime in system to the packet name of suffix can be first used, is then created for the application When building process, the suffix of packet name is removed, its imperceptible its packet name in system is allowed to be modified.
That is, installation and operation needs to be treated differently, and after installation, in the data structure of internal system, second user The packet name of application under mode all band suffix (being modified), when operation, application under second user mode It is necessary to create the data structure when process that original packet name constructs is run to it when process is created, it is allowed to experience completely After being modified less than its packet name, there will be no any problems for the operation of its code in this way.Moreover, using can not between application It calls directly, therefore by the packet name of modification application, other application will not be caused, which to call, has any problem by the application of packet name. And different process (process isolation) when application under different user mode, it is opened under different user mode to also ensure Dynamic process will not influence each other completely.
The embodiment of the present invention applies installation method, is answered by being equipped with first under the first installation path of the terminal In the case where, the second installation path is created;It obtains the installation kit of first application and its initially wraps name;To the initial packet Name is modified, and target packet name is obtained;Based on the target packet name, the installation kit is mounted on second installation path Under.The use applied under different user mode in this way is interference-free between each other, substantially increases the safety of user data.
Referring to fig. 2, Fig. 2 is the structure chart for the terminal that one embodiment of the invention provides, as shown in Fig. 2, terminal 200 has the One user mode and second user mode, the terminal 200 include:
Creation module 201, in the case where for being equipped with the first application under the first installation path of the terminal, creation Second installation path;
Module 202 is obtained, for obtaining the installation kit of first application and its initially wrapping name;
First modified module 203 obtains target packet name for modifying to the initial packet name;
Module 204 is installed, for being based on the target packet name, the installation kit is mounted on second installation path Under.
Optionally, the terminal includes the first user mode and second user mode, and the creation module 201 is specific to use First application is installed under the first installation path in first user mode and is needed under the second user mode In the case where installing first application, creation is located at the second installation path under the second user mode.
Optionally, the terminal 200 further include:
First calling module in the case where for running the described first application under the second user mode, calls institute State the first data information that the first application is mounted under second installation path;
Second modified module, for target packet name described in first data information to be modified as the initial packet name;
First operation module runs first application for being based on modified first data information.
Optionally, the terminal 200 further include:
Second calling module in the case where for running the described first application under first user mode, calls institute State the second data information that the first application is mounted under first installation path;
Second operation module runs first application for being based on second data information.
Optionally, the combination of the target the packet entitled initial packet name and default suffix character.
Terminal 200 can be realized each process that terminal is realized in the embodiment of the method for Fig. 1, to avoid repeating, here not It repeats again.
The terminal 200 of the embodiment of the present invention, by being equipped with the first application under the first installation path of the terminal In the case of, create the second installation path;It obtains the installation kit of first application and its initially wraps name;To the initial Bao Mingjin Row modification, obtains target packet name;Based on the target packet name, the installation kit is mounted under second installation path.This The use that sample is applied under different user mode is interference-free between each other, substantially increases the safety of user data.
The hardware structural diagram of Fig. 3 a kind of terminal of each embodiment to realize the present invention, as shown in figure 3, the terminal 300 include but is not limited to: radio frequency unit 301, network module 302, audio output unit 303, input unit 304, sensor 305, display unit 306, user input unit 307, interface unit 308, memory 309, processor 310 and power supply 311 etc. Component.It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 3, terminal can be with Including perhaps combining certain components or different component layouts than illustrating more or fewer components.In the embodiment of the present invention In, terminal include but is not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, wearable device and Pedometer etc..
Wherein, processor 310, in the case where for being equipped with the first application under the first installation path of the terminal, Create the second installation path;It obtains the installation kit of first application and its initially wraps name;It modifies to the initial packet name, Obtain target packet name;Based on the target packet name, the installation kit is mounted under second installation path.
Optionally, the terminal includes the first user mode and second user mode, and the processor 310 is also used to: In First application is installed under the first installation path of first user mode and needs to install under the second user mode In the case where first application, creation is located at the second installation path under the second user mode.
Optionally, the processor 310 is also used to: the case where the described first application is run under the second user mode Under, calling described first is using the first data information being mounted under second installation path;By first data information Described in target packet name be modified as the initial packet name;Based on modified first data information, operation described first is answered With.
Optionally, the processor 310 is also used to: the case where the described first application is run under first user mode Under, calling described first is using the second data information being mounted under first installation path;Believed based on second data Breath runs first application.
Optionally, the processor 310 is also used to: the entitled initial packet name of target packet and default suffix character Combination.
Terminal 300 can be realized each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating It states.
The terminal 300 of the embodiment of the present invention, by being equipped with the first application under the first installation path of the terminal In the case of, create the second installation path;It obtains the installation kit of first application and its initially wraps name;To the initial Bao Mingjin Row modification, obtains target packet name;Based on the target packet name, the installation kit is mounted under second installation path.This The use that sample is applied under different user mode is interference-free between each other, substantially increases the safety of user data.
It should be understood that the embodiment of the present invention in, radio frequency unit 301 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 310 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 301 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 301 can also by wireless communication system and network and other set Standby communication.
Terminal provides wireless broadband internet by network module 302 for user and accesses, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
Audio output unit 303 can be received by radio frequency unit 301 or network module 302 or in memory 309 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 303 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 300 executes.Sound Frequency output unit 303 includes loudspeaker, buzzer and receiver etc..
Input unit 304 is for receiving audio or video signal.Input unit 304 may include graphics processor (Graphics Processing Unit, GPU) 3041 and microphone 3042, graphics processor 3041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 306.Through graphics processor 3041, treated that picture frame can be deposited Storage is sent in memory 309 (or other storage mediums) or via radio frequency unit 301 or network module 302.Mike Wind 3042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 301 is converted in the case where telephone calling model.
Terminal 300 further includes at least one sensor 305, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 3061, and proximity sensor can close display panel when terminal 300 is moved in one's ear 3061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 305 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared sensor etc., details are not described herein.
Display unit 306 is for showing information input by user or being supplied to the information of user.Display unit 306 can wrap Display panel 3061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 3061.
User input unit 307 can be used for receiving the number or character information of input, and generates and set with the user of terminal It sets and the related key signals of function control inputs.Specifically, user input unit 307 include touch panel 3071 and other Input equipment 3072.Touch panel 3071, also referred to as touch screen, collect user on it or nearby touch operation (such as User is using any suitable objects or attachment such as finger, stylus on touch panel 3071 or near touch panel 3071 Operation).Touch panel 3071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects touch operation bring signal, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 310, receives processor 310 The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 3071.In addition to touch panel 3071, user input unit 307 can also include other input equipments 3072. Specifically, other input equipments 3072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 3071 can be covered on display panel 3061, when touch panel 3071 is detected at it On or near touch operation after, send processor 310 to determine the type of touch event, be followed by subsequent processing device 310 according to touching The type for touching event provides corresponding visual output on display panel 3061.Although in Fig. 3, touch panel 3071 and display Panel 3061 is the function that outputs and inputs of realizing terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of terminal is realized so that touch panel 3071 and display panel 3061 is integrated, is not limited herein specifically It is fixed.
Interface unit 308 is the interface that external device (ED) is connect with terminal 300.For example, external device (ED) may include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting port, the port audio input/output (I/O), video i/o port, ear port of the device with identification module Etc..Interface unit 308 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 300 or can be used for terminal 300 and external device (ED) it Between transmit data.
Memory 309 can be used for storing software program and various data.Memory 309 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 309 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 310 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the software program and/or module being stored in memory 309, and call and be stored in memory 309 Data execute the various functions and processing data of terminal, to carry out integral monitoring to terminal.Processor 310 may include one Or multiple processing units;Preferably, processor 310 can integrate application processor and modem processor, wherein application processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 310.
Terminal 300 can also include the power supply 311 (such as battery) powered to all parts, it is preferred that power supply 311 can be with It is logically contiguous by power-supply management system and processor 310, thus by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 300 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, including processor 310, and memory 309 is stored in storage It is real when which is executed by processor 310 on device 309 and the computer program that can be run on the processor 310 Existing above-mentioned each process using installation method embodiment, and identical technical effect can be reached, to avoid repeating, here no longer It repeats.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize above-mentioned each process using installation method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (12)

1. a kind of apply installation method, it is applied to terminal, which is characterized in that the described method includes:
In the case where the first application is installed under the first installation path of the terminal, the second installation path is created;
It obtains the installation kit of first application and its initially wraps name;
It modifies to the initial packet name, obtains target packet name;
Based on the target packet name, the installation kit is mounted under second installation path.
2. the method according to claim 1, wherein the terminal includes the first user mode and second user mould Formula, it is described in the case where the first application is installed under the first installation path of the terminal, create the second installation path, packet It includes:
First application is installed under the first installation path of first user mode and is needed in the second user mode In the case where lower installation first application, creation is located at the second installation path under the second user mode.
3. according to the method described in claim 2, it is characterized in that, it is described be based on the target packet name, the installation kit is pacified After under second installation path, the method also includes:
In the case where running the described first application under the second user mode, first application is called to be mounted on described the The first data information under two installation paths;
Target packet name described in first data information is modified as the initial packet name;
Based on modified first data information, first application is run.
4. according to the method described in claim 2, it is characterized in that, it is described be based on the target packet name, the installation kit is pacified After under second installation path, the method also includes:
In the case where running the described first application under first user mode, first application is called to be mounted on described the The second data information under one installation path;
Based on second data information, first application is run.
5. method according to claim 1 to 4, which is characterized in that the entitled initial packet of target packet The combination of name and default suffix character.
6. a kind of terminal characterized by comprising
Creation module, in the case where for being equipped with the first application under the first installation path of the terminal, the second peace of creation Fill path;
Module is obtained, for obtaining the installation kit of first application and its initially wrapping name;
First modified module obtains target packet name for modifying to the initial packet name;
Module is installed, for being based on the target packet name, the installation kit is mounted under second installation path.
7. terminal according to claim 6, which is characterized in that the terminal includes the first user mode and second user mould Formula, the creation module, specifically for being equipped with the first application under the first installation path of first user mode and needing In the case where installing the described first application under the second user mode, creation is located at the under the second user mode Two installation paths.
8. terminal according to claim 7, which is characterized in that the terminal further include:
First calling module in the case where for running the described first application under the second user mode, calls described the The first data information that one application is mounted under second installation path;
Second modified module, for target packet name described in first data information to be modified as the initial packet name;
First operation module runs first application for being based on modified first data information.
9. terminal according to claim 7, which is characterized in that the terminal further include:
Second calling module in the case where for running the described first application under first user mode, calls described the The second data information that one application is mounted under first installation path;
Second operation module runs first application for being based on second data information.
10. terminal according to any one of claims 6 to 9, which is characterized in that the entitled initial packet of target packet The combination of name and default suffix character.
11. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place The computer program run on reason device is realized when the computer program is executed by the processor as appointed in claim 1 to 5 Described in one the step of application installation method.
12. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized when the computer program is executed by processor and applies installation method as described in any one of claims 1 to 5 The step of.
CN201910757127.0A 2019-08-16 2019-08-16 Application installation method and terminal Active CN110515630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910757127.0A CN110515630B (en) 2019-08-16 2019-08-16 Application installation method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910757127.0A CN110515630B (en) 2019-08-16 2019-08-16 Application installation method and terminal

Publications (2)

Publication Number Publication Date
CN110515630A true CN110515630A (en) 2019-11-29
CN110515630B CN110515630B (en) 2023-03-24

Family

ID=68626264

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910757127.0A Active CN110515630B (en) 2019-08-16 2019-08-16 Application installation method and terminal

Country Status (1)

Country Link
CN (1) CN110515630B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8539488B1 (en) * 2009-04-10 2013-09-17 Open Invention Network, Llc System and method for application isolation with live migration
CN103605537A (en) * 2013-11-08 2014-02-26 北京奇虎科技有限公司 Software installation method and device
US20160062595A1 (en) * 2014-08-28 2016-03-03 Kabushiki Kaisha Toshiba Electronic device and control method thereof
CN106155753A (en) * 2016-08-22 2016-11-23 广东欧珀移动通信有限公司 A kind of application program installation method, device and terminal
CN106874037A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 application program installation method, device and mobile terminal
CN107066294A (en) * 2017-03-17 2017-08-18 深圳市邦华电子有限公司 One kind application installation method, device and a kind of intelligent terminal
CN107577472A (en) * 2017-07-28 2018-01-12 深圳市海邻科信息技术有限公司 Software installation method, device and computer-readable recording medium
CN109472157A (en) * 2018-10-29 2019-03-15 努比亚技术有限公司 Storage method, mobile terminal and the computer storage medium of application data
CN109885317A (en) * 2019-02-22 2019-06-14 维沃移动通信有限公司 A kind of information processing method, server and terminal
CN110045966A (en) * 2019-04-01 2019-07-23 龙芯中科(合肥)技术有限公司 Processing method, device and the equipment of erector

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8539488B1 (en) * 2009-04-10 2013-09-17 Open Invention Network, Llc System and method for application isolation with live migration
CN103605537A (en) * 2013-11-08 2014-02-26 北京奇虎科技有限公司 Software installation method and device
US20160062595A1 (en) * 2014-08-28 2016-03-03 Kabushiki Kaisha Toshiba Electronic device and control method thereof
CN106155753A (en) * 2016-08-22 2016-11-23 广东欧珀移动通信有限公司 A kind of application program installation method, device and terminal
CN106874037A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 application program installation method, device and mobile terminal
CN107066294A (en) * 2017-03-17 2017-08-18 深圳市邦华电子有限公司 One kind application installation method, device and a kind of intelligent terminal
CN107577472A (en) * 2017-07-28 2018-01-12 深圳市海邻科信息技术有限公司 Software installation method, device and computer-readable recording medium
CN109472157A (en) * 2018-10-29 2019-03-15 努比亚技术有限公司 Storage method, mobile terminal and the computer storage medium of application data
CN109885317A (en) * 2019-02-22 2019-06-14 维沃移动通信有限公司 A kind of information processing method, server and terminal
CN110045966A (en) * 2019-04-01 2019-07-23 龙芯中科(合肥)技术有限公司 Processing method, device and the equipment of erector

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
THOMAS BLÄSING 等: "An Android Application Sandbox System for Suspicious Software Detection", 《2010 5TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE》 *
张勇敢: "一种基于Android平台的手机恶意软检测方案研究", 《福建电脑》 *

Also Published As

Publication number Publication date
CN110515630B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN110752980B (en) Message sending method and electronic equipment
CN109271121A (en) A kind of application display method and mobile terminal
CN108459797A (en) A kind of control method and mobile terminal of Folding screen
CN109831586A (en) A kind of user interface switching display methods, mobile terminal and storage medium
CN107911445A (en) A kind of information push method, mobile terminal and storage medium
CN108628565A (en) A kind of mobile terminal operating method and mobile terminal
CN107273139A (en) A kind of method for updating system, equipment and computer-readable recording medium
CN108762869A (en) A kind of information processing method and mobile terminal
CN110442437A (en) A kind of application switching method and mobile terminal
CN110046015A (en) Using sharing method and terminal
CN110012143A (en) A kind of receiver control method and terminal
CN108282759A (en) A kind of method for processing business and mobile communication terminal
CN108304516A (en) A kind of Web content pre-add support method and mobile terminal
CN108494639A (en) Network access method and mobile terminal
CN108320148A (en) A kind of resource transfers method and relevant device
CN110035181A (en) It is a kind of to apply card theme setting method and terminal fastly
CN109271779A (en) A kind of installation packet inspection method, terminal device and server
CN108762829A (en) A kind of method, client and terminal for image beautification
CN109803429A (en) RRM measurement control method, mobile communication terminal and the network side equipment of adjacent cell
CN110531908A (en) A kind of shortcut operation method and mobile terminal
CN110138963A (en) A kind of message treatment method and mobile terminal
CN109284146A (en) A kind of light application open method and mobile terminal
CN108319432A (en) A kind of application operation method and terminal
CN108762799A (en) A kind of method and terminal of update application
CN108762639A (en) A kind of control method of physical button, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant