CN112114824A - Linux-based software deployment method and equipment - Google Patents

Linux-based software deployment method and equipment Download PDF

Info

Publication number
CN112114824A
CN112114824A CN202010930461.4A CN202010930461A CN112114824A CN 112114824 A CN112114824 A CN 112114824A CN 202010930461 A CN202010930461 A CN 202010930461A CN 112114824 A CN112114824 A CN 112114824A
Authority
CN
China
Prior art keywords
installation
new
program
installation program
installation package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010930461.4A
Other languages
Chinese (zh)
Other versions
CN112114824B (en
Inventor
刘炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202010930461.4A priority Critical patent/CN112114824B/en
Publication of CN112114824A publication Critical patent/CN112114824A/en
Application granted granted Critical
Publication of CN112114824B publication Critical patent/CN112114824B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application aims to provide a Linux-based software deployment method and equipment, a new installation program is obtained by splicing an installation program, an installation package and verification information together, the new installation program can firstly acquire the content of the verification information through the installation program to verify when being started, after the verification is passed, the installation program decompresses the installation package and executes corresponding installation operation, the installation program, the installation package and the verification information are spliced together, namely three-in-one, and the situation that any one of the installation program, the installation package and the verification information is falsified by an illegal molecule such as a hacker is prevented, the safety problem existing from the source is solved, the installation process is simpler, and meanwhile, the data security of the installation process can be ensured.

Description

Linux-based software deployment method and equipment
Technical Field
The present application relates to the field of computers, and in particular, to a Linux-based software deployment method and apparatus.
Background
In the prior art, software installation modes under Linux mainly include active code compiling and installing, rpm package installing and yum installing, and commonly used installation package formats mainly include a tar package, an rpm package, a dpkg package and the like. Different installation packages provide a check file when installed, and the size of the installation package and the MD5 value are recorded in the check file. Before software installation, the size and the MD5 value of the installation package are generally checked, and only if the size and the MD5 value of the installation package are completely matched with those in the check file, the installation of the software corresponding to the installation package is allowed. Although the reliability of the installation file can be ensured by using the mode of the installation package and the check file, the installation package and the check file are separated and independent, so that the installation package and the check file are easily tampered to cause security loopholes.
Disclosure of Invention
An object of the present application is to provide a Linux-based software deployment method and apparatus, so as to ensure security of installation process data while implementing automatic software installation under Linux.
According to one aspect of the application, a Linux-based software deployment method is provided, wherein the method comprises the following steps:
splicing the installation program, the installation package and the verification information together under Linux to obtain a new installation program; wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size;
starting the new installation program, acquiring the file content of the installation package from the new installation program based on the initial position and the file size, and calculating a new MD5 value of the installation package corresponding to the file content;
and if the new MD5 value is consistent with the initial MD5 value, decompressing the installation package corresponding to the file content and executing corresponding installation operation in the new installation program through the installation program.
Further, in the Linux-based software deployment method, the installation program, the installation package and the verification information are spliced together under Linux to obtain a new installation program; wherein the verification information includes an initial MD5 value of the installation package, a start position of the installation package in the new installation program, and a file size, and includes:
under Linux, splicing the installation package and the verification information in sequence after the installation program to form a new installation program, and determining the initial position and the file size of the installation package in the new installation program;
determining the verification information, wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size.
Further, in the Linux-based software deployment method, the check information further includes an initial hash value of the installation program and an initial check value corresponding to a preset check item, where before the file content of the installation package is acquired from the new installation program based on the start position and the file size, the method further includes:
starting the new installation program, and calculating a new hash value of the installation program in the new installation program and a new check value corresponding to the preset check item in the new installation program;
when the consistency check is carried out on the initial hash value and the new hash value, the consistency check is carried out on the initial check value and the new check value corresponding to the preset check item,
if the installation package is consistent with the installation package, acquiring the file content of the installation package from the new installation program based on the initial position and the file size;
and if the inconsistency exists, the verification is failed, and the installation operation is finished.
Further, in the Linux-based software deployment method, the method further includes:
presetting a preset memory for placing the verification information;
wherein, under Linux, splicing the installation package and the check information in sequence after the installation program to form the new installation program, includes:
splicing the installation package and the verification information in sequence after the installation program to form the new installation program, wherein the verification information is spliced at the preset memory corresponding to the tail of the new installation program.
Further, in the Linux-based software deployment method, the installation package is used to indicate an original installation package corresponding to an initial installation process or an upgrade installation package corresponding to an upgrade process for upgrading the original installation package.
According to another aspect of the present application, there is also provided a non-volatile storage medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the Linux-based software deployment method as described above.
According to another aspect of the present application, there is also provided a Linux-based software deploying apparatus, wherein the apparatus includes:
one or more processors;
a non-volatile storage medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the Linux-based software deployment method described above.
Compared with the prior art, the installation program, the installation package and the verification information are spliced together under Linux to obtain a new installation program; wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size; in the actual installation process, the new installation program is started firstly, the file content of the installation package is obtained from the new installation program based on the initial position and the file size, and the new MD5 value of the installation package corresponding to the file content is calculated; if the new MD5 value is consistent with the initial MD5 value, in the new installation program, the installation package corresponding to the file content is decompressed through the installation program and corresponding installation operation is executed, the installation program, the installation package and the verification information are spliced together, namely three-in-one, so that any one of the installation program, the installation package and the verification information is prevented from being tampered by illegal molecules such as hackers, the existing safety problem is eliminated from the source, the installation process is simpler, and the data safety in the installation process can be ensured.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a Linux-based software deployment method in accordance with an aspect of the subject application;
FIG. 2 illustrates a schematic diagram of the concatenation of an installer, an installation package, and verification information in a Linux-based software deployment method, according to an aspect of the subject application;
the same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As shown in fig. 1, a schematic flow diagram of a Linux-based software deployment method according to an aspect of the present application is shown, where the method is applied to an installation process of an original installation package corresponding to an initial installation process or an upgrade installation package corresponding to an upgrade process for upgrading the original installation package in a Linux system, and the method includes: step S11, step S12, and step S13 specifically include the steps of:
step S11, splicing the installation program, the installation package and the verification information together under Linux to obtain a new installation program; wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size;
it should be noted that the installation package may be an original installation package corresponding to the initial installation process, and the corresponding installation program is the original installation program; the installation package may also be an upgrade installation package corresponding to an upgrade process for instructing to upgrade the original installation package, and the corresponding installation program is an upgrade installation program.
Step S12, starting the new installation program, obtaining the file content of the installation package from the new installation program based on the start position and the file size, and calculating a new MD5 value of the installation package corresponding to the file content.
Step S13, if the new MD5 value matches the initial MD5 value, in the new installation program, decompressing the installation package corresponding to the file content and executing the corresponding installation operation by the installation program. If the new MD5 value is not consistent with the initial MD5 value, the installation operation is finished.
In order to ensure that the contents of the installed installation package are not tampered, the new MD5 value of the installation package in the new installation program after splicing and the initial MD5 value of the installation package before splicing need to be compared, and if the new MD5 value is consistent with the initial MD5 value, it is indicated that the installation package in the new installation program is consistent with the contents in the original installation package and is not changed, that is, the contents are not tampered, and in the new installation program, the installation package in the new installation program is decompressed by the installation program and corresponding installation operation is executed. If the new MD5 value is not consistent with the initial MD5 value, it indicates that the installation package in the new installation program is not consistent with the content in the original installation package, indicating that the content of the installation package in the new installation program has a security hole, and requiring to end the installation operation.
Through the steps S11 to S13, the installation program, the installation package and the verification information are spliced together, namely the three are combined, the phenomenon that any one of the installation program, the installation package and the verification information is tampered by illegal molecules such as hackers is prevented, the safety problem existing from the source is solved, the installation process is simpler, and meanwhile, the beneficial effect of data safety in the installation process can be ensured. Next, in the above embodiment of the present application, in step S11, the installation program, the installation package, and the verification information are spliced together under Linux to obtain a new installation program; wherein the verification information includes an initial MD5 value of the installation package, a start position of the installation package in the new installation program, and a file size, and includes:
under Linux, splicing the installation package and the verification information in sequence after the installation program to form a new installation program, and determining the initial position and the file size of the installation package in the new installation program;
determining the verification information, wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size.
For example, under Linux, if the file size of an installer is 3M, the file size of the installation package is 10M, and the file size reserved for the verification information is 2M, the installer package is installed after the installer, so that an installer + the installation package is obtained, the file size is 13M, wherein the contents corresponding to 4M to 13M in the 13M are installation packages, and after the installation package is installed after the installer, 2M verification information is installed again, so that a new installer is obtained: the file size is 15M, wherein the initial position of the installation package in the new installation program is as follows: 4M, the file size is: 10M; after the new installation program is obtained, the verification information of the new installation program can be determined, wherein the verification information comprises the initial MD5 value of the installation package, the initial position of the installation package in the new installation program and the file size, so as to obtain the file size of the real verification information, and the content of the real verification information is placed in the memories corresponding to 14M to 15M in the new installation program, so that the installation program, the installation package and the verification information are spliced in sequence to obtain the new installation program.
Next, in the above embodiment of the present application, the check information further includes an initial hash value of the installation program and an initial check value corresponding to a preset check item, where before the file content of the installation package is acquired from the new installation program based on the start position and the file size, the method further includes:
starting the new installation program, and calculating a new hash value of the installation program in the new installation program and a new check value corresponding to the preset check item in the new installation program; here, the preset check item includes, but is not limited to, the size of the whole installation program, a manual entry item or other options that can be checked, where the manual entry item may be a randomly input numeric string, such as "123456", or may also be a randomly input letter, such as "xiaoli", or may also be any combination of numbers, letters and characters.
When the consistency check is carried out on the initial hash value and the new hash value, the consistency check is carried out on the initial check value and the new check value corresponding to the preset check item,
if the installation package is consistent with the installation package, acquiring the file content of the installation package from the new installation program based on the initial position and the file size;
and if the inconsistency exists, the verification is failed, and the installation operation is finished.
For example, in order to verify an installation program to achieve double verification of a new installation program, consistency verification is performed on an initial hash value of the installation program and a new hash value of the installation program in the new installation program to verify whether the installation program is changed, and meanwhile consistency verification is performed on an initial verification value corresponding to a preset verification item in the installation program and a new verification value corresponding to the preset verification item in the new installation program to achieve double verification of the installation program; if the initial hash value is consistent with the new hash value, and the initial check value corresponding to the preset check item is consistent with the new check value, the verification is used for indicating that the content of the installation program is not changed and the verification can pass, and the file content of the installation package can be obtained from the new installation program based on the initial position and the file size so as to verify whether the file content of the installation package is tampered or not; and if the two are not consistent or one of the two is inconsistent, finishing the installation operation. The installation program is verified by the hash value and the preset verification item, so that the installation program is verified doubly, and the safety of the installation program is ensured.
Following the above embodiments of the present application, wherein the method further comprises:
presetting a preset memory for placing the verification information;
wherein, under Linux, splicing the installation package and the check information in sequence after the installation program to form the new installation program, includes:
splicing the installation package and the verification information in sequence after the installation program to form the new installation program, wherein the verification information is spliced at the preset memory corresponding to the tail of the new installation program.
For example, under Linux, if the file size of an installation program is 3M, the file size of the installation package is 10M, and the file size reserved for the verification information is 2M, the installation package is installed after the installation program to obtain an installation program + installation package, the file size is 13M, and after the installation program is installed after the installation program, 2M verification information is installed to obtain a new installation program: the file size is 15M, wherein the contents corresponding to 14M to 15M in the 15M are preset memories corresponding to the tail of the new installation program, the size of the preset memories is 2M, and the verification information starts to be spliced at the 14M of the new installation program. In this embodiment, the verification information is spliced at the end of the new installation program, which not only facilitates a program developer to add information in the verification information, but also ensures that the installation program and the installation package do not change their positions in the new installation program due to the newly added information.
According to another aspect of the present application, there is also provided a non-volatile storage medium having stored thereon computer readable instructions, which, when executed by a processor, cause the processor to implement the Linux-based software deployment method as described above.
According to another aspect of the present application, there is also provided a Linux-based software deploying apparatus, wherein the apparatus includes:
one or more processors;
a non-volatile storage medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the Linux-based software deployment method described above.
Here, the detailed contents of each embodiment in the Linux-based software deployment device may specifically refer to the corresponding parts in the Linux-based software deployment method embodiment, and are not described herein again.
In summary, in the present application, under Linux, an installation program, an installation package, and verification information are spliced together to obtain a new installation program; wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size; in the actual installation process, the new installation program is started firstly, the file content of the installation package is obtained from the new installation program based on the initial position and the file size, and the new MD5 value of the installation package corresponding to the file content is calculated; if the new MD5 value is consistent with the initial MD5 value, in the new installation program, the installation package corresponding to the file content is decompressed through the installation program and corresponding installation operation is executed, the installation program, the installation package and the verification information are spliced together, namely three-in-one, so that any one of the installation program, the installation package and the verification information is prevented from being tampered by illegal molecules such as hackers, the existing safety problem is eliminated from the source, the installation process is simpler, and the data safety in the installation process can be ensured.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (7)

1. A Linux-based software deployment method, wherein the method comprises:
splicing the installation program, the installation package and the verification information together under Linux to obtain a new installation program; wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size;
starting the new installation program, acquiring the file content of the installation package from the new installation program based on the initial position and the file size, and calculating a new MD5 value of the installation package corresponding to the file content;
and if the new MD5 value is consistent with the initial MD5 value, decompressing the installation package corresponding to the file content and executing corresponding installation operation in the new installation program through the installation program.
2. The method according to claim 1, wherein under Linux, the installation program, the installation package and the verification information are spliced together to obtain a new installation program; wherein the verification information includes an initial MD5 value of the installation package, a start position of the installation package in the new installation program, and a file size, and includes:
under Linux, splicing the installation package and the verification information in sequence after the installation program to form a new installation program, and determining the initial position and the file size of the installation package in the new installation program;
determining the verification information, wherein the verification information comprises an initial MD5 value of the installation package, a starting position of the installation package in the new installation program and a file size.
3. The method according to claim 2, wherein the verification information further includes an initial hash value of the installer and an initial verification value corresponding to a preset verification item, and wherein before the obtaining of the file content of the installation package from the new installer based on the start position and the file size, the method further includes:
starting the new installation program, and calculating a new hash value of the installation program in the new installation program and a new check value corresponding to the preset check item in the new installation program;
when the consistency check is carried out on the initial hash value and the new hash value, the consistency check is carried out on the initial check value and the new check value corresponding to the preset check item,
if the installation package is consistent with the installation package, acquiring the file content of the installation package from the new installation program based on the initial position and the file size;
and if the inconsistency exists, the verification is failed, and the installation operation is finished.
4. The method of claim 2, wherein the method further comprises:
presetting a preset memory for placing the verification information;
wherein, under Linux, splicing the installation package and the check information in sequence after the installation program to form the new installation program, includes:
splicing the installation package and the verification information in sequence after the installation program to form the new installation program, wherein the verification information is spliced at the preset memory corresponding to the tail of the new installation program.
5. The method of any one of claims 1 to 4, wherein the installation package is used to indicate an original installation package corresponding to an initial installation process or an upgrade installation package corresponding to an upgrade process for upgrading the original installation package.
6. A non-transitory storage medium having stored thereon computer readable instructions which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 5.
7. A Linux-based software deployment device, wherein the device comprises:
one or more processors;
a non-volatile storage medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-5.
CN202010930461.4A 2020-09-07 2020-09-07 Linux-based software deployment method and device Active CN112114824B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010930461.4A CN112114824B (en) 2020-09-07 2020-09-07 Linux-based software deployment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010930461.4A CN112114824B (en) 2020-09-07 2020-09-07 Linux-based software deployment method and device

Publications (2)

Publication Number Publication Date
CN112114824A true CN112114824A (en) 2020-12-22
CN112114824B CN112114824B (en) 2023-05-02

Family

ID=73802313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010930461.4A Active CN112114824B (en) 2020-09-07 2020-09-07 Linux-based software deployment method and device

Country Status (1)

Country Link
CN (1) CN112114824B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116483396A (en) * 2023-06-21 2023-07-25 麒麟软件有限公司 Implementation method for multi-kckstart combined automatic installation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150227354A1 (en) * 2012-09-12 2015-08-13 Zte Corporation Software Installation Package Generation and Software Installation Method, Device, and System
CN105117650A (en) * 2015-09-08 2015-12-02 北京元心科技有限公司 Method and apparatus for protecting system security of mobile terminal
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
CN105843916A (en) * 2016-03-24 2016-08-10 上海上讯信息技术股份有限公司 Sensitive data detection method and equipment based on file merging
CN106055341A (en) * 2016-06-14 2016-10-26 北京奇虎科技有限公司 Application installation package checking method and device
CN107391178A (en) * 2017-06-29 2017-11-24 北京北信源软件股份有限公司 A kind of terminal installation kit deployment and implementation method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150227354A1 (en) * 2012-09-12 2015-08-13 Zte Corporation Software Installation Package Generation and Software Installation Method, Device, and System
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
CN105117650A (en) * 2015-09-08 2015-12-02 北京元心科技有限公司 Method and apparatus for protecting system security of mobile terminal
CN105843916A (en) * 2016-03-24 2016-08-10 上海上讯信息技术股份有限公司 Sensitive data detection method and equipment based on file merging
CN106055341A (en) * 2016-06-14 2016-10-26 北京奇虎科技有限公司 Application installation package checking method and device
CN107391178A (en) * 2017-06-29 2017-11-24 北京北信源软件股份有限公司 A kind of terminal installation kit deployment and implementation method and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MUHAMMAD ASIM 等: "AndroKit: A toolkit for forensics analysis of web browsers on android platform" *
徐燕等: ".NET下客户端应用程序的部署方式", 《华南金融电脑》 *
李铭: "Android平台下基于行为的恶意代码检测技术研究" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116483396A (en) * 2023-06-21 2023-07-25 麒麟软件有限公司 Implementation method for multi-kckstart combined automatic installation
CN116483396B (en) * 2023-06-21 2023-09-26 麒麟软件有限公司 Implementation method for multi-kckstart combined automatic installation

Also Published As

Publication number Publication date
CN112114824B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN110058873B (en) Application page updating method, device, equipment and storage medium
US10372914B2 (en) Validating firmware on a computing device
CN101751273B (en) Safety guide device and method for embedded system
CN107122296B (en) Method and apparatus for data assertion for test interface
CN107729198B (en) Android system firmware verification method and device
US8190902B2 (en) Techniques for digital signature formation and verification
US20110030062A1 (en) Version-based software product activation
KR20190061075A (en) Method and apparatus for preventing software repackaging
CN111767226B (en) Cloud computing platform resource testing method, system and equipment
CN108170465B (en) Version information management method, electronic equipment and readable storage medium
CN104036194A (en) Vulnerability detection method and device for revealing private data in application program
CN112835628A (en) Server operating system booting method, device, equipment and medium
CN112114824B (en) Linux-based software deployment method and device
WO2022156379A1 (en) Hotfix method and apparatus
CN110021291B (en) Method and device for calling voice synthesis file
CN113849210A (en) Firmware upgrading method and device based on TEE
CN113220314B (en) APP resource loading and APK generation method, device, equipment and medium
CN113342660B (en) File testing method, device, system, electronic equipment and readable storage medium
CN109165512A (en) A kind of the intention agreement URL leak detection method and device of application program
CN110968888B (en) Data processing method and device
CN112069519A (en) Method and equipment for outputting encrypted record of information file
CN112148597A (en) Method for eliminating iOS device authorization dialog box, test method and storage medium
CN106897588B (en) Processing method and device of label function
CN111708691B (en) Figerprint automatic adaptation method and device based on android platform
CN110727945A (en) Virus scanning method, device and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant