CN115185544A - Application processing method and related device - Google Patents

Application processing method and related device Download PDF

Info

Publication number
CN115185544A
CN115185544A CN202110372878.8A CN202110372878A CN115185544A CN 115185544 A CN115185544 A CN 115185544A CN 202110372878 A CN202110372878 A CN 202110372878A CN 115185544 A CN115185544 A CN 115185544A
Authority
CN
China
Prior art keywords
application
information
feature
feature information
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110372878.8A
Other languages
Chinese (zh)
Inventor
夏斌
汪芳山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Petal Cloud Technology Co Ltd
Original Assignee
Petal Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Petal Cloud Technology Co Ltd filed Critical Petal Cloud Technology Co Ltd
Priority to CN202110372878.8A priority Critical patent/CN115185544A/en
Priority to PCT/CN2022/083524 priority patent/WO2022213840A1/en
Publication of CN115185544A publication Critical patent/CN115185544A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an application processing method and a related device, the first application from an unknown credibility installation source is judged by widely applying the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring an application distribution client, and the time and the cost required for constructing a credible application distribution ecology can be reduced. The method comprises the following steps: acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility; and determining a first result according to the target characteristic information of the second application and the characteristic information of the first application, wherein the target characteristic information of the second application is used for representing the credibility of the second application, and the first result is used for indicating the installation of the first application or preventing the installation of the first application, and the first application is the same as or different from the second application.

Description

Application processing method and related device
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to an application processing method and a related device.
Background
With the increasing popularity of the mobile internet, more and more users rely on application distribution clients such as mobile phone assistants and application stores which are pre-installed on the terminal device, and rely on the authentication of developers to complete the process of installing applications on the terminal device. Fig. 1 shows a flow diagram of a related art installation application. As shown in fig. 1, an application distribution vendor usually pre-installs an application distribution client on a terminal device, and uploads an application (application) to an application distribution server by a developer. Therefore, the user can download the related application from the application distribution server through the application distribution client, and further trigger the installation of the application on the terminal equipment.
The above-described scheme for installing applications is mainly that an application distributor authenticates a developer to acquire a trusted application from the developer; and an application distribution manufacturer needs to configure an application distribution client on the terminal device in advance to ensure the reliability and credibility of a distribution channel when the application is installed subsequently. However, a great deal of manpower is required to be invested for authentication of developers and pre-installation of application distribution clients by application distribution manufacturers, and a great amount of application installation sources are required to be provided in the application distribution clients for application downloading, so that the cost is high, the period is long, and the method is not beneficial to quickly constructing a credible application distribution ecological architecture.
Disclosure of Invention
The embodiment of the application processing method and the related device do not need to rely on authentication of a developer and pre-configuration of an application distribution client, but widely use the characteristic information and application source information of the existing application to judge the first application from an installation source with unknown credibility, and can reduce time and cost required for building a credible application distribution ecology.
In a first aspect, an embodiment of the present application provides an application processing method, where the method may be applied to an application feature server, and may also be applied to a second terminal device, and the method may include: acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility; and determining a first result according to the target characteristic information of the second application and the characteristic information of the first application, wherein the target characteristic information of the second application is used for representing the credibility of the second application, the first result is used for indicating the installation of the first application or preventing the installation of the first application, and the first application is the same as or different from the second application.
By the method, the target characteristic information of the second application can represent the credibility of the second application, so that under the condition that the first application is from an installation source with unknown credibility, a first result can be determined according to the characteristic information of the first application and the target characteristic information of the second application after the characteristic information of the first application is acquired, and the first result can indicate that the first application is installed or the first application is prevented from being installed. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, whether the first application is authentic or not may be determined by using the target feature information of the installed second application and the feature information of the first application, so as to complete the installation and processing of the application that is authentic; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
Optionally, in some examples, the target feature information of the second application is obtained by the application feature server according to the feature information of the second application.
Optionally, in some examples, the target feature information of the second application includes first feature information of the second application and/or second feature information of the second application, where the first feature information is used to characterize an application attribute of the second application, and the second feature information is used to characterize an external feature attribute of the second application.
The described application installation source of the second application may be an installation source with a known credibility or an installation source with an unknown credibility, and therefore the application feature server needs to determine the target feature information of the second application from the first feature information and/or the second feature information of the second application, so that the target feature information represents the credibility of the second application.
Furthermore, the first characteristic information may be used to characterize an application attribute of the second application, for example, the first characteristic information may include one or more of an application identifier of the second application, installation source information of the second application, and running behavior characteristic information of the second application. In practical applications, other characteristic information may also be available, and is not limited to the description herein. The application identification of the second application described may include, but is not limited to: the application name, application IP address, package size of the application, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the second application. The installation source information of the second application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional characteristic information such as a popularity, an authority, and the like of a website where the installation source is located. The running behavior feature information of the second application may include, but is not limited to, a length of time that the second application is resident in the background, an applied right, an actual usage right, and the like.
In addition, the second feature information may characterize an external feature attribute of the second application, such as: the second characteristic information may include one or more of public information of the second application, and manual maintenance information of the second application. The public information of the second application described may include, but is not limited to: scoring on an application installation source, number scored, application reviews, number reviewed, number downloaded, number shared, and so forth. The manual maintenance information of the second application described may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the trusted weight of the application installation source, the application authority information, and the like, which are not limited herein.
Optionally, in some examples, when the second application originates from an installation source with a known trustworthiness, the target feature information of the second application is determined according to the first feature information of the second application.
Through the method, because the second application installed by the first terminal device is from an installation source with known credibility, the application characteristic server can directly take the first characteristic information of the second application as the target characteristic information after receiving the first characteristic information of the second application sent by the first terminal device, so that the operation flow and the operation complexity are simplified, and the period and the cost for identifying whether the first application is authentic and credible can be further shortened.
Optionally, in some examples, the first feature information is information obtained by the first terminal device for the second application.
Optionally, in some examples, determining the first result according to the target feature information of the second application and the feature information of the first application may include: determining feature credibility between target feature information of the second application and feature information of the first application; the feature confidence is taken as a first result.
Optionally, in some examples, the feature information of the first application includes one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application.
The application identification of the described first application may include, but is not limited to: the application name, application IP address, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the first application. The installation source information of the first application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional characteristic information such as a popularity, an authority, and the like of a website where the installation source is located, which is not specifically limited herein.
Optionally, in some examples, the first characteristic information of the second application includes one or more of an application identification of the second application, installation source information of the second application, and running behavior characteristic information of the second application.
The application identification of the second application described may include, but is not limited to: the application name, application IP address, package size of the application, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the second application. The installation source information of the second application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional feature information such as a popularity, an authority, and the like of a website where the installation source is located. The running behavior feature information of the second application may include, but is not limited to, a duration of the second application being resident in the background, an application permission, an actual usage permission, and the like, which are not specifically limited herein.
Optionally, in some examples, the second characteristic information of the second application includes one or more of public information of the second application and manual maintenance information of the second application. The public information of the second application described may include, but is not limited to: scoring on the application installation source, the number of scored, application reviews, the number of reviewed, the number downloaded, the number shared, and the like, which are not limited to the description herein. The manual maintenance information for the second application described may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the trusted weight of the application installation source, the application authority information, and the like, which are not limited herein.
In a second aspect, an embodiment of the present application provides another method for applying processing, where the method may include: the application characteristic server acquires characteristic information of a first application sent by second terminal equipment, wherein the first application is originated from an installation source with unknown credibility; the application feature server determines a first result according to target feature information of a second application and feature information of a first application, wherein the target feature information of the second application is used for representing the credibility of the second application, the first result is used for representing the credibility of the first application, and the first application and the second application are the same or different; the application feature server sends the first result to the second terminal device to instruct the second terminal device to install the first application or to prevent installation of the first application.
By the method, the target characteristic information of the second application can represent the credibility of the second application, so that the second terminal device can extract the characteristics of the first application to obtain the characteristic information of the first application under the condition that the first application is from an installation source with unknown credibility; and then, the second terminal equipment sends the characteristic information of the first application to an application characteristic server, and the application characteristic server determines a first result according to the characteristic information of the first application and the target characteristic information of the second application. The application feature server may feed back the first result to the second terminal device so that the second terminal device may install the first application or refrain from installing the first application based on the first result. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, whether the first application is authentic or not may be determined by using the target feature information of the installed second application and the feature information of the first application, so as to complete the installation and processing of the application that is authentic; in addition, in the embodiment of the application, the first application from an installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring an application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
Optionally, in some examples, the method may further include: and the application characteristic server obtains the target characteristic information of the second application according to the characteristic information of the second application.
Optionally, in some examples, the feature information of the second application includes first feature information of the second application and/or second feature information of the second application, where the first feature information is used to characterize an application attribute of the second application, and the second feature information is used to characterize an external feature attribute of the second application.
Optionally, in some examples, when the second application is sourced from an installation source with a known trustworthiness, the target feature information of the second application is determined according to the first feature information of the second application.
Optionally, in some examples, the method may further include: the application feature server receives first feature information sent by the first terminal device, wherein the first feature information is obtained by the first terminal device aiming at the second application.
Optionally, in some examples, the determining, by the application feature server, the first result according to the target feature information of the second application and the feature information of the first application may include: the application feature server determines feature credibility between target feature information of the second application and feature information of the first application; the application feature server takes the feature confidence as a first result.
In a third aspect, an embodiment of the present application provides another method for applying processing, where the method may include: the second terminal equipment acquires the characteristic information of the first application, wherein the first application is sourced from an installation source with unknown credibility; the second terminal equipment sends the characteristic information of the first application to the application characteristic server; the second terminal equipment receives a first result sent by the application feature server, the first result is obtained by the application feature server according to target feature information of the second application and feature information of the first application, the target feature information of the second application is used for representing the credibility condition of the second application, and the first application and the second application are the same or different; and the second terminal equipment installs the first application according to the first result or prevents the first application from being installed.
In a fourth aspect, an application processing system is provided in an embodiment of the present application, where the application processing system may include a second terminal device and an application feature server; the second terminal device may specifically be configured to: acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility; sending feature information of the first application to the application feature server; the application feature server is specifically configured to determine a first result according to target feature information of a second application and feature information of the first application, where the target feature information of the second application is used to characterize a trusted status of the second application, and the first result is used to indicate to install the first application or to prevent installation of the first application, and the first application is the same as or different from the second application.
By the method, the target characteristic information of the second application can represent the credibility of the second application, so that the second terminal device in the application processing system can extract the characteristics of the first application to obtain the characteristic information of the first application under the condition that the first application is from an installation source with unknown credibility; and then, the second terminal equipment sends the characteristic information of the first application to an application characteristic server, and the application characteristic server determines a first result according to the characteristic information of the first application and the target characteristic information of the second application. The application feature server may feed back the first result to the second terminal device so that the second terminal device may install the first application or refrain from installing the first application based on the first result. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, it may be determined whether the first application is authentic through the target feature information of the installed second application and the feature information of the first application, so as to complete the credible installation and processing of the application; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
Optionally, in some examples, the application feature server is further configured to: acquiring feature information of the second application; and determining target characteristic information of the second application according to the characteristic information of the second application.
Optionally, in some examples, the feature information of the second application includes first feature information of the second application and/or second feature information of the second application, where the first feature information is used to characterize an application attribute of the second application, and the second feature information is used to characterize an external feature attribute of the second application.
Optionally, in some examples, when the second application originates from a mounting source of known trustworthiness, the characteristic information of the second application is determined according to the first characteristic information of the second application.
Optionally, in some examples, the application processing system further includes a first terminal device; the first terminal device is configured to: acquiring first characteristic information of the second application; sending the first feature information to the application feature server.
Optionally, in some examples, the application feature server is configured to: determining feature credibility between target feature information of the second application and feature information of the first application; and taking the feature credibility as a first result.
Optionally, in some examples, the application feature server is further configured to send the first result to the second terminal device; the second terminal device is further configured to install the first application or prevent installation of the first application according to the first result.
Optionally, in some examples, the feature information of the first application includes one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application.
Optionally, in some examples, the first characteristic information of the second application includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior characteristic information of the second application.
Optionally, in some examples, the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
In a fifth aspect, an embodiment of the present application provides an application processing apparatus, which may include: the device comprises an acquisition unit, a judging unit and a judging unit, wherein the acquisition unit is used for acquiring characteristic information of a first application, and the first application is sourced from an installation source with unknown credibility; the processing unit is used for determining a first result according to target characteristic information of a second application and characteristic information of the first application, the target characteristic information of the second application is used for representing the credibility condition of the second application, the first result is used for indicating that the first application is installed or preventing the first application from being installed, and the first application and the second application are the same or different.
Optionally, in some examples, the target feature information of the second application is obtained by the application feature server according to the feature information of the second application.
Optionally, in some examples, the target feature information of the second application includes first feature information of the second application and/or second feature information of the second application, where the first feature information is used to characterize an application attribute of the second application, and the second feature information is used to characterize an external feature attribute of the second application.
Optionally, in some examples, when the second application originates from an installation source with a known trustworthiness, the target feature information of the second application includes first feature information of the second application, where the first feature information is used to characterize an application attribute of the second application.
Optionally, in some examples, the first feature information is information obtained by the first terminal device for the second application.
Optionally, in some examples, the processing unit is configured to: determining feature credibility between target feature information of the second application and feature information of the first application; the feature confidence is taken as a first result.
Optionally, in some examples, the feature information of the first application includes one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application.
Optionally, in some examples, the first characteristic information of the second application includes one or more of an application identification of the second application, installation source information of the second application, and running behavior characteristic information of the second application.
Optionally, in some examples, the second characteristic information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
In a sixth aspect, an embodiment of the present application provides an application processing apparatus, which may include: a memory for storing computer readable instructions. A processor may also be included that is coupled to the memory for executing the computer readable instructions in the memory to perform a method as described in the first, second, or third aspect, or any one of the possible implementations of the first, second, or third aspect.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform a method according to the first, second, or third aspect, or any one of the possible implementations of the first, second, or third aspect.
In an eighth aspect, embodiments of the present application provide a computer program product containing instructions, which when run on a computer, cause the computer to perform a method as in the first, second, or third aspect, or any one of the possible implementations of the first, second, or third aspect.
A ninth aspect of the present application provides a chip system, which may include a processor, configured to support an application processing apparatus to implement the functions involved in the method described in the first aspect, the second aspect, or the third aspect, or any one of the possible implementations of the first aspect, the second aspect, or the third aspect.
Optionally, in combination with the ninth aspect described above, in a first possible implementation, the chip system may further include a memory, and the memory is used for storing program instructions and data necessary for the application processing device. The chip system may be constituted by a chip, or may include a chip and other discrete devices. The system on chip may include an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA), or other programmable logic devices. Further, the chip system may further include an interface circuit and the like.
The technical effects obtained by the second aspect to the ninth aspect are similar to the technical effects obtained by the corresponding technical means in the first aspect, and are not described herein again.
According to the technical scheme, the embodiment of the application has the following advantages:
in this embodiment of the application, since the target feature information of the second application may represent a trusted status of the second application, in a situation that the first application originates from an installation source with unknown credibility, a first result may be determined according to the feature information of the first application and the target feature information of the second application after the feature information of the first application is acquired, so that the first result may indicate to install the first application or to prevent installation of the first application. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, whether the first application is authentic or not may be determined by using the target feature information of the installed second application and the feature information of the first application, so as to complete the installation and processing of the application that is authentic; in addition, in the embodiment of the application, the first application from an installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring an application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application.
FIG. 1 is a flow diagram of an installation application in the related art;
FIG. 2 is a block diagram of an application processing system provided in an embodiment of the present application;
FIG. 3 is a flow chart illustrating a method for application processing provided in an embodiment of the present application;
FIG. 4 is a flow diagram of another method of application processing provided in an embodiment of the present application;
FIG. 5 is a schematic flow chart of another method for application processing provided in embodiments of the present application;
FIG. 6 is a schematic flow chart of another method for application processing provided in embodiments of the present application;
FIG. 7 is a schematic structural diagram of an application processing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a first terminal device according to an embodiment of the present application;
FIG. 9 is a schematic structural diagram of an application feature server according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a second terminal device according to an embodiment of the present application;
FIG. 11 is a schematic diagram of an application processing system provided in an embodiment of the present application;
FIG. 12 is a schematic diagram of another application processing system provided in an embodiment of the present application;
fig. 13 is a schematic hardware structure diagram of a communication device according to an embodiment of the present application.
Detailed Description
The embodiment of the application processing method and the related device do not need to rely on authentication of a developer and pre-configuration of an application distribution client, but widely use the characteristic information and application source information of the existing application to judge the first application from an installation source with unknown credibility, and can reduce the time and cost for constructing a credible application distribution ecology.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be implemented in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. In the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, a and/or B, which may indicate: a alone, A and B together, and B alone, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a and b, a and c, b and c or a and b and c, wherein a, b and c can be single or multiple. It is to be noted that "at least one item" may also be interpreted as "one or more item(s)".
In the related technology, the scheme for installing the application is mainly that an application distributor authenticates a developer and obtains a credible application from the developer; and an application distribution manufacturer needs to configure an application distribution client on a terminal device in advance to ensure the reliability and credibility of a distribution channel when the application is installed subsequently. However, a great deal of manpower is required to be invested for the authentication of developers and the pre-installation of application distribution clients by application distribution manufacturers, and a great amount of application installation sources are required to be provided in the application distribution clients for downloading applications, so that the cost is high, the period is long, and the method is not beneficial for terminal manufacturers to quickly construct a credible application distribution ecological architecture.
Therefore, in order to solve the above technical problems, embodiments of the present application provide an application processing method, which aims to solve the problems of high cost, long period, and the like caused by the dependence of developer authentication and the provisioning of an application distribution client in a terminal device in the conventional application distribution technology. Please refer to fig. 2, which is a block diagram illustrating an architecture of an application processing system according to an embodiment of the present application. As can be seen from fig. 2, the application processing system may include a first terminal device, an application feature server, and a second terminal device. The second terminal equipment acquires the installation package of the first application from the installation source with unknown credibility and can acquire the characteristic information of the first application from the installation package; and after acquiring the first characteristic information of the second application, the first terminal equipment sends the first characteristic information to the application characteristic server. And then, after acquiring second characteristic information of the second application, the application characteristic server determines target characteristic information of the second application by combining the first characteristic information, and the target characteristic information of the second application can indicate the credibility of the second application. In this way, the application feature server may determine a first result according to the target feature information of the second application and the feature information of the first application after acquiring the feature information of the first application sent by the second terminal device; or, after acquiring the target feature information of the second application from the application feature server, the second terminal device may determine the first result by combining the feature information of the first application. In this way, the second terminal device can install or prevent the installation of the second application according to the first result.
It will be appreciated that the first application described above stems from an installation source of unknown trustworthiness, for example: may originate from a third party application marketplace, a personal website, etc., and is not limited thereto. In addition, the first application may be the same as or different from the second application, and is not limited to be described herein.
In addition, the first terminal device and the second terminal device may be various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), mobile Station (MS), mobile terminal, and the like, which are not limited herein. The described application feature server may be a cloud server having functions of storing, analyzing, calculating, and the like, or other servers, and is not limited herein.
For easy understanding, please refer to fig. 3, which is a flowchart illustrating a method for processing an application according to an embodiment of the present application. The method of application processing described in fig. 3 may be applied to the application feature server, and may also be applied to the second terminal device shown in fig. 2, which is not limited herein. As can be seen from fig. 3, the method for applying the processing may include the following steps:
301. feature information of a first application is obtained, the first application originating from an installation source of unknown trustworthiness.
In this example, the second terminal device may further trigger installation of the application installation package of the first application after acquiring the application installation package of the first application from the installation source with unknown credibility. In this way, the second terminal device may acquire the feature information of the first application.
Or after the second terminal device acquires the feature information of the first application, the feature information of the first application is sent to the application feature server. In this way, the application feature server may obtain the feature information of the first application.
The described feature information of the first application may be used for characterizing application attributes of the first application, and/or for characterizing external feature attributes of the first application, which is not limited herein.
In addition, when the feature information of the first application is used to characterize the application attribute of the first application, the feature information of the first application may include one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application. In practical applications, the first feature information of the first application may also be other information capable of characterizing the first application, such as: the application name, IP address, etc. of the first application are not limited to be described here.
When the feature information of the first application is used for characterizing the external feature attribute of the first application, the feature information of the first application may include one or more of public information of the first application and manual maintenance information of the first application, and in an actual application, the feature information of the first application may also be other features that can be used for characterizing the external feature attribute of the first application. The public information of the described first application may include, but is not limited to: scoring on the application installation source, the number of scored, application reviews, the number of reviewed, the number downloaded, the number shared, and the like, which are not limited to the description herein. The manual maintenance information for the first described application may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the credibility weight of the application installation source, the application authority information and the like.
302. And determining a first result according to the target characteristic information of the second application and the characteristic information of the first application, wherein the target characteristic information of the second application is used for representing the credibility of the second application, and the first result is used for indicating the installation of the first application or preventing the installation of the first application, and the first application is the same as or different from the second application.
In this example, since the target feature information of the second application may be used to characterize the trusted status of the second application, or the target feature information of the second application is feature information that can be used to reflect that the second application is authentic. Therefore, after the feature information of the first application is obtained, a first result can be determined according to the target feature information of the second application and the feature information of the first application, so that the first result can reflect the credibility of the first application. Thus, the first result can be used to indicate the installation of the first application or to prevent the installation of the first application based on the first result.
Specifically, the application feature server may determine the first result according to the target feature information of the second application and the feature information of the first application; the second terminal device may also determine the first result by combining the characteristic information of the first application after receiving the target characteristic information of the second application sent by the application characteristic server, which is not limited herein.
The described second application may be an application that has been installed on the first terminal device after the first terminal device acquires the application installation package from the application installation source. The application installation source at this time may be an installation source of known credibility or an installation source of unknown credibility. The target feature information for the second application may be obtained by the application feature server according to the feature information of the second application.
In some examples, the described feature information of the second application may include first feature information of the second application and/or second feature information of the second application, wherein the first feature information is used for characterizing application attributes of the second application, and the second feature information is used for characterizing external feature attributes of the second application.
In other examples, when the second application is an installation source that originates from a known level of trustworthiness, the second application's characteristic information described at this time may include first characteristic information of the second application. Namely, the first characteristic information of the second application can be used as the target characteristic information of the second application, so that the operation flow and the operation process are simplified, and the period and the cost for constructing the credible application distribution system are further shortened. The target feature information of the second application at this time may be obtained by the application feature server acquiring the first feature information from the first terminal device.
In addition, the first feature information described above may be information acquired by the first terminal device for the second application.
Optionally, when the second application is from an installation source with a known credibility, the first feature information of the second application may be used as the target feature information of the second application, so that the operation flow and the operation process are simplified, and the period and the cost for constructing the trusted application distribution system are further shortened. The target feature information of the second application at this time may be obtained by the application feature server acquiring the first feature information from the first terminal device.
Optionally, in another example, the first result is determined according to the target feature information of the second application and the feature information of the first application, and specifically, the feature reliability between the feature information of the first application and the target feature information may be calculated in a manner of, for example, using a preset feature model, and the feature reliability is used as the first result, that is, the first result is used to indicate the credibility of the second application. In practical applications, the first result may be determined by other means besides a means of calculating the feature reliability between the feature information of the first application and the target feature information, and the determination is not limited herein.
In this embodiment of the application, since the target feature information of the second application may characterize a trusted status of the second application, in a situation that the first application originates from an installation source with unknown credibility, the feature information of the first application and the target feature information of the second application may be compared or matched to determine a first result after obtaining the feature information of the first application, so that the first result may indicate to install the first application or prevent to install the first application. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, whether the first application is authentic or not may be determined by using the target feature information of the installed second application and the feature information of the first application, so as to complete the installation and processing of the application that is authentic; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
Fig. 3 above describes the method for processing the application, which is provided in the embodiment of the present application, mainly from the perspective of a single side, and the method may be executed by the user terminal or the application feature server. The method for processing an application provided in the embodiment of the present application will be described in detail below from the perspective of device interaction, and specifically, reference may be made to subsequent fig. 4 to fig. 6. Wherein, fig. 4 mainly describes the method of application processing from the perspective when the application feature server performs the above step 302; fig. 5 describes the method of application processing mainly from the perspective when the second terminal device performs step 302 described above; FIG. 6 describes the method of application processing primarily from the perspective that the second application originates from an installation source of known trustworthiness. This will be described separately below:
please refer to fig. 4, which is a flowchart illustrating a method for application processing according to an embodiment of the present disclosure. As can be seen from fig. 4, the method for applying the processing may include the following steps:
401. the first terminal device acquires first feature information of the second application.
In this example, the first terminal device obtains an application installation package of the second application from the application installation source, and installs the second application on the first terminal device. After the first terminal device installs the second application, feature extraction can be performed on the second application to obtain first feature information of the second application. Specifically, the first terminal device may obtain the first feature information of the second application through its own application feature obtaining module.
The application installation source of the second application at this time may be an installation source with a known credibility or an installation source with an unknown credibility, and is not limited herein.
The first characteristic information may be used to characterize an application property of the second application. For example, the first characteristic information may include one or more of an application identification of the second application, installation source information of the second application, and running behavior characteristic information of the second application. In practical applications, other characteristic information may also be available, and is not limited to the description herein.
The application identification of the second application described may include, but is not limited to: the application name, application IP address, packet size of the application, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the second application. The installation source information of the second application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional characteristic information such as a popularity, an authority, and the like of a website where the installation source is located. The running behavior feature information of the second application may include, but is not limited to, a duration of the second application being resident in the background, an application permission, an actual usage permission, and the like, which are not limited to the description herein.
402. The first terminal device sends first feature information of the second application to the application feature server.
In this example, after the first terminal device obtains the first feature information of the second application, the first feature information is sent to the application feature server.
403. The application feature server obtains second feature information of a second application.
In this example, the application feature server obtains second feature information of the second application in addition to receiving the first feature information sent by the first terminal device, where the second feature information may characterize external feature attributes of the second application. For example: the second characteristic information may include one or more of public information of the second application, and manual maintenance information of the second application. In practical applications, the second feature information may also be other features that can be used to characterize external feature attributes of the second application, and is not specifically described here in a limiting manner.
The public information of the second application described may include, but is not limited to: scoring on the application installation source, the number of scored, application reviews, the number of reviewed, the number downloaded, the number shared, and the like, which are not limited to the description herein. The manual maintenance information for the second application described may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the trusted weight of the application installation source, the application authority information, and the like, which are not limited herein.
In the present application, the execution sequence of the above steps 401 to 402 and 403 is not limited. In practical applications, step 403 may be performed first, and then steps 401-402 may be performed, and so on.
In other cases, the application feature server performs feature extraction on the second application, and after second feature information of the second application is obtained, a corresponding feature weight may be given to the second feature information. For example: the second feature information such as the public information of the second application and the manual maintenance information of the second application may be given feature weights, respectively. The feature weights respectively assigned to the second feature information, such as the public information of the second application and the manual maintenance information of the second application, may be the same or different, and are not limited to be described here.
In other cases, after receiving the first feature information of the second application sent by the first terminal device, the application feature server may also assign a corresponding feature weight to the first feature information. For example: the first characteristic information such as the application identifier of the second application, the installation source information of the second application, and the running behavior characteristic information of the second application may be respectively given characteristic weights. The feature weights respectively assigned to the first feature information, such as the application identifier of the second application, the installation source information of the second application, and the running behavior feature information of the second application, may be the same or different, and are not limited to be described herein.
404. The application feature server determines target feature information based on the first feature information of the second application and second feature information of the second application, and the target feature information is used for representing the credibility of the second application.
In this example, after receiving the first feature information from the first terminal device and acquiring itself or acquiring the second feature information from another third-party platform, the application feature server determines the out-of-target feature information of the second application according to the first feature information and the second feature information. It should be noted that the target feature information of the second application may reflect the credibility of the second application, or the target feature information of the second application is the feature information that can be used to reflect that the second application is truly credible.
Specifically, the application feature server may determine target feature information based on the first feature information and the second feature information according to a preset rule; or, the application feature server may also use the first feature information and the second feature information as input of a preset feature model, so as to obtain the target feature information. The specific description is not limited herein.
405. The second terminal device obtains characteristic information of the first application, and the first application is originated from an installation source with unknown credibility.
In this example, the feature information of the first application may be used to characterize an application attribute of the first application, and/or used to characterize an external feature attribute of the first application, which is not limited herein. When the feature information of the first application is used to characterize the application attribute of the first application, the feature information of the first application may include one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application. In practical applications, the first feature information of the first application may also be other information capable of characterizing the first application, such as: the application name, IP address, etc. of the first application are not limited to be described here.
When the feature information of the first application is used for characterizing the external feature attribute of the first application, the feature information of the first application may include one or more of public information of the first application and manual maintenance information of the first application, and in an actual application, the feature information of the first application may also be other features that can be used for characterizing the external feature attribute of the first application. The public information of the described first application may include, but is not limited to: scoring on the application installation source, the number of scored, application reviews, the number of reviewed, the number downloaded, the number shared, and the like, which are not limited to the description herein. The manual maintenance information for the first described application may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the credibility weight of the application installation source, the application authority information and the like.
The first application is described as originating from an installation source of unknown trustworthiness, indicating that the source of the installation package of the first application is of unknown trustworthiness, i.e. the installation package of the first application may or may not be a truthful installation package, which is not limited herein. The described installation sources of unknown trustworthiness may include, but are not limited to, third party application marketplaces, personal websites, and the like, and are not limited thereto.
The second application described above may be the same as the first application or may be different from the first application. Such as: if the first application is application a, the second application may be application a or application B, and the description is not limited herein.
406. The second terminal device sends the feature information of the first application to the application feature server.
In this example, after obtaining the feature information of the first application, the second terminal device may send the feature information of the first application to the application feature server.
The execution sequence of the steps 401 to 404 and the steps 405 to 406 is not particularly limited, and in practical applications, the steps 405 to 406 may be executed first, and then the steps 401 to 404 may be executed.
407. The application feature server determines a first result based on the target feature information and the feature information of the first application, the first result indicating a trustworthiness of the first application.
In this example, after the application feature server receives feature information of the first application sent by the second terminal device, the first result may be determined by combining the target feature information. Specifically, the application feature server may calculate a feature reliability between the feature information of the first application and the target feature information, and use this feature reliability as the first result, that is, use the first result to indicate a reliability condition of the first application.
In practical applications, the application feature server may determine the first result by other means besides the means for calculating the feature reliability between the feature information of the first application and the target feature information, and the description herein is not limited.
408. The application feature server sends the first result to the second terminal device.
In this example, the application feature server may send the first result to the second terminal device after determining the first result.
409. The second terminal device installs the first application according to the first result, or prohibits installation of the first application according to the first result.
In this example, since the first result reflects the trusted status of the first application, the second terminal device can know whether the source of the first application is actually trusted after receiving the first result sent by the application feature server. In this way, the second terminal device installs the first application in the case that the first result reflects that the first application is authentic; alternatively, the second terminal device may prevent the first application from being installed in case the first result reflects that the first application is not authentic.
For example: when the feature reliability is greater than or equal to a preset threshold value, the first application is true and authentic, and the second terminal device can install the first application; if the feature reliability is smaller than the preset threshold, it indicates that the first application is not authentic, and at this time, the second terminal device may prevent the first application from being installed. The specific description is not limited herein.
In this embodiment of the application, in a case that the first application is originated from an installation source with unknown credibility, the application feature server may determine the target feature information of the second application by using the first feature information of the second application received from the first terminal device and the acquired second feature information of the second application, and further characterize the credibility of the second application from the target feature information of the second application. In this way, when the second terminal device needs to install the first application from the installation source with unknown credibility, the application feature server also receives feature information of the first application sent by the second terminal device, so as to determine a first result by combining target feature information of the second application, and further enable the second terminal device to execute the operation of whether to install the first application or not based on the first result.
That is to say, in this embodiment, when the second terminal device needs to install the first application from the installation source with unknown credibility, the feature information of the second application installed on the first terminal device may be acquired based on the application feature server of the cloud measurement and the first terminal device on the end side, and feature extraction and corresponding feature weight are given according to an artificial intelligence algorithm and the like, and then credible identification of the first application on the open internet is completed in a way of end cloud cooperation, so as to complete credible installation and processing of the first application. In the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing the credible application distribution ecology can be reduced, and the application ecology required by the terminal can be quickly constructed.
The method of application processing is described above mainly in terms of the application feature server determining the first result, and fig. 5 below will describe the method of application processing in terms of the second terminal device determining the first result. Specifically, fig. 5 shows a schematic flowchart of another method for processing an application provided in this embodiment. As can be seen from fig. 5, the method for applying the processing includes the following steps:
501. the first terminal device acquires first feature information of the second application.
502. The first terminal device sends first feature information of the second application to the application feature server.
503. The application feature server obtains second feature information of a second application.
504. The application feature server determines target feature information based on the first feature information of the second application and second feature information of the second application, the target feature information indicating a trustworthiness of the second application.
It should be noted that, in this embodiment, the steps 501 to 504 may be understood by specifically referring to the contents described in the foregoing steps 401 to 404 in fig. 4, which are not described herein again.
505. And the application characteristic server sends the target characteristic information to the second terminal equipment.
In this example, since the target feature information may indicate a trusted status of the second application, the application feature server may determine the target feature information of the second application according to the first feature information and the second feature information, and send the target feature information to the second terminal device. Thus, after receiving the target characteristic information, the second terminal device compares or matches the target characteristic information with the characteristic information of the first application, and judges whether the first application is true and credible according to the comparison result or the matching result.
506. The second terminal device obtains characteristic information of the first application, and the first application is originated from an installation source with unknown credibility.
In this example, step 506 may be understood by referring specifically to what is described above in step 405 of fig. 4, where the steps are defined and described herein.
The execution sequence of the steps 501 to 505 and the step 506 is not particularly limited, and in practical applications, the step 506 may be executed first, and then the steps 501 to 505 may be executed.
507. The second terminal device determines a first result based on the target feature information and the feature information of the first application, the first result indicating a trustworthiness of the first application.
In this example, after the second terminal device receives the target feature information sent by the application feature server, the first result may be determined by combining the feature information of the first application. Specifically, the second terminal device may calculate a feature reliability between the first feature information and the target feature information, and use the feature reliability as the first result, that is, use the first result to indicate a reliability condition of the first application. In practical applications, the second terminal device may determine the first result by using a manner other than the manner of calculating the feature reliability between the first feature information and the target feature information, which is not limited herein.
508. The second terminal device installs the first application according to the first result, or prohibits installation of the first application according to the first result.
It should be noted that, step 508 in this embodiment may be understood by specifically referring to the content described in step 409 in fig. 4, which is not described herein again.
In this embodiment of the application, in a case that the first application is originated from an installation source with unknown credibility, the application feature server may determine the target feature information of the second application by using the first feature information of the second application received from the first terminal device and the acquired second feature information of the second application, and further characterize the credibility of the second application from the target feature information of the second application. Therefore, when the second terminal device needs to install the first application from the installation source with unknown credibility, the application feature server sends the target feature information to the second terminal device, and the second terminal device judges whether the first application is real and credible by combining the feature information of the first application.
That is to say, in this embodiment, when the second terminal device needs to install the first application from the installation source with unknown credibility, the feature information of the second application installed on the first terminal device can be acquired based on the application feature server of the cloud measurement and the first terminal device on the end side, and feature extraction and feature weighting are performed according to an artificial intelligence algorithm and the like, and then, whether the first application on the open internet is authentic and credible can be identified in a way of end cloud cooperation, so that the credible installation and processing of the first application are completed. The first application from an installation source of unknown credibility is judged by widely applying the characteristic information and the application source information of the existing application without relying on the authentication of a developer and pre-configuring an application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced. Moreover, the end side of the second terminal device can also judge whether the first application is real and credible, and application scenes in the application installation process are greatly enriched.
In other embodiments, if the second application installed by the first terminal device is from an installation source with a known credibility, the first characteristic information of the second application may be used as the target characteristic information to determine the first result. Specifically, fig. 6 may be referred to as a schematic flow chart of another method for processing an application provided in the embodiment of the present application. As can be seen from fig. 6, the method for applying the processing includes the following steps:
601. the first terminal device obtains first characteristic information of a second application, wherein the second application is sourced from an installation source with known credibility.
In this example, the second application originates from an installation source of known trustworthiness, i.e. the source of the second application installed by the first terminal device is said to be authentic, trusted and secure. At this time, the first terminal device may acquire the application installation package of the second application from the authentic installation source and install the second application on the first terminal device. In this way, the first terminal device may perform feature extraction on the second application to acquire the first feature information of the second application.
The first characteristic information may be used to characterize an application property of the second application. For example, the first characteristic information may include one or more of an application identification of the second application, installation source information of the second application, and/or running behavior characteristic information of the second application. In practical applications, other characteristic information may also be available, and is not limited to the description herein.
The application identification of the described second application may include, but is not limited to: the application name, application IP address, package size of the application, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the second application. The installation source information of the second application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional feature information such as a popularity, an authority, and the like of a website where the installation source is located. The running behavior feature information of the second application may include, but is not limited to, a duration of the second application being resident in the background, an application permission, an actual usage permission, and the like, which are not specifically limited herein.
602. The first terminal device sends first feature information of the second application to the application feature server.
In this example, step 602 may be specifically understood with reference to what is described in step 402 in fig. 4, and is not limited herein.
603. The application feature server obtains target feature information based on the first feature information of the second application, and the target feature information indicates a trusted condition of the second application.
In this example, since the second application installed by the first terminal device is from an installation source with a known trustworthiness, after receiving the first feature information of the second application sent by the first terminal device, the application feature server may directly use all or part of the content in the first feature information of the second application as the target feature information, which is convenient to simplify the operation flow and the operation complexity, and can further shorten the period and cost for identifying whether the first application is authentic and trustworthy.
604. The second terminal device obtains characteristic information of the first application, and the first application is originated from an installation source with unknown credibility.
605. The second terminal device sends the feature information of the first application to the application feature server.
In this example, steps 604-605 may be understood with particular reference to what is described above with respect to steps 405-406 of FIG. 4, where the steps are defined for illustration.
The execution sequence of the steps 601-603 and the steps 604-605 is not particularly limited, and in practical applications, the steps 604-605 may be executed first, and then the steps 601-603 may be executed.
606. The application feature server determines a first result based on the target feature information and the first feature information, the first result indicating a trustworthiness of the first application.
607. The application feature server sends the first result to the second terminal device.
608. The second terminal device installs the first application according to the first result, or prohibits installation of the first application according to the first result.
Steps 606 to 608 in this embodiment may be understood by specifically referring to the contents described in steps 407 to 409 in fig. 4, which are not described herein again.
In other examples, in a scenario where the second application installed by the first terminal device is from an installation source with a known credibility, in addition to determining the first result according to the target feature information and the feature information of the first application by the application feature server in fig. 6, in an actual application, the application feature server may further send the target feature information to the second terminal device, and the second terminal device determines the first result according to the target feature information and the feature information of the first application, and a specific flow may be understood with reference to the process described in fig. 5, which is not described herein again.
In the embodiment of the application, in the case that the first application originates from an installation source with unknown credibility and the second application installed by the first terminal device originates from an installation source with known credibility, the first feature information of the second application acquired by the first terminal device may be directly used as the target feature information of the second application. Therefore, when the second terminal device needs to install the first application from the installation source with unknown credibility, whether the first application is real and credible can be judged based on the characteristic information of the application in a terminal cloud cooperation mode, and thus the credible installation and processing of the first application are completed; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced. In addition, in this embodiment, the first feature information obtained when the second application with a trusted source is installed is directly used as the target feature information, so that the operation flow and the operation complexity are simplified, and the period and the cost for identifying whether the first application is authentic or not can be further shortened.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. It is understood that the application processing device includes hardware structures and/or software modules for executing the functions in order to realize the functions. Those skilled in the art will readily appreciate that the functions described in connection with the embodiments disclosed herein may be implemented as hardware or a combination of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
From the perspective of functional units, the application may perform functional unit division on the application processing apparatus according to the above method embodiments, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one functional unit. The integrated functional unit can be realized in a form of hardware or a form of software functional unit.
For example, in a case where each functional unit is divided in an integrated manner, referring to fig. 7, an embodiment of the present application provides a schematic structural diagram of an application processing apparatus, where the application processing apparatus may be the application feature server described in fig. 2, or may be a second terminal device. The described application processing apparatus may include:
an obtaining unit 701, configured to obtain feature information of a first application, where the first application is derived from an installation source with unknown credibility;
a processing unit 702, configured to determine a first result according to target feature information of a second application and feature information of a first application, where the target feature information of the second application is used to characterize a trusted status of the second application, and the first result is used to indicate to install the first application or to prevent installation of the first application, and the first application is the same as or different from the second application.
Optionally, in some examples, the target feature information of the second application is obtained by an application feature server according to the feature information of the second application.
Optionally, in some examples, the feature information of the second application includes a first feature information of the second application and a second feature information of the second application, where the first feature information is used to characterize an application attribute of the second application, and the second feature information is used to characterize an external feature attribute of the second application. The described application installation source of the second application may be an installation source with a known credibility or an installation source with an unknown credibility, and therefore the application feature server is required to determine the target feature information of the second application from the first feature information and the second feature information of the second application, and the target feature information represents the credibility of the second application
Optionally, in some examples, when the second application is sourced from a mounting source of known trustworthiness, the feature information of the second application is obtained including first feature information of the second application, wherein the first feature information is used to characterize application attributes of the second application. Because the second application installed by the first terminal device is from an installation source with a known credibility, the application feature server can directly take the first feature information of the second application as the target feature information after receiving the first feature information of the second application sent by the first terminal device, so that the operation flow and the operation complexity are simplified, and the period and the cost for identifying whether the first application is authentic and credible can be further shortened.
Optionally, in some examples, the first characteristic information is information obtained by the first terminal device for the second application.
Optionally, in some examples, the processing unit 702 is configured to: determining feature credibility between target feature information of the second application and feature information of the first application; the feature confidence is taken as a first result.
Optionally, in some examples, the feature information of the first application comprises one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application. The application identification of the described first application may include, but is not limited to: the application name, application IP address, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the first application. The installation source information of the first application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional characteristic information such as a popularity, an authority, and the like of a website where the installation source is located, which is not specifically limited herein.
Optionally, in some examples, the first characteristic information of the second application includes one or more of an application identification of the second application, installation source information of the second application, and running behavior characteristic information of the second application. The application identification of the second application described may include, but is not limited to: the application name, application IP address, package size of the application, signature fingerprint of the application, hash value of the application file size, etc. may identify characteristics of the integrity and uniqueness of the second application. The installation source information of the second application may include, but is not limited to, a name of the installation source, an IP address of the installation source, a domain name of the installation source, and the like, and may further include additional characteristic information such as a popularity, an authority, and the like of a website where the installation source is located. The running behavior feature information of the second application may include, but is not limited to, a duration of the second application being resident in the background, an application permission, an actual usage permission, and the like, which are not specifically limited herein.
Optionally, in some examples, the second characteristic information of the second application includes one or more of public information of the second application, and manual maintenance information of the second application. The public information of the described second application may include, but is not limited to: scoring on the application installation source, the number of scored, application reviews, the number of reviewed, the number downloaded, the number shared, and the like, which are not limited to the description herein. The manual maintenance information for the second application described may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the trusted weight of the application installation source, the application authority information, and the like, which are not limited herein.
In this embodiment of the application, since the target feature information of the second application may represent a trusted status of the second application, in a case that the first application originates from an installation source with unknown credibility, after the feature information of the first application is acquired by the acquisition unit 701, the processing unit 702 determines a first result according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate that the first application is installed or the first application is prevented from being installed. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, it may be determined whether the first application is authentic through the target feature information of the installed second application and the feature information of the first application, so as to complete the credible installation and processing of the application; in addition, in the embodiment of the application, the first application from an installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring an application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
The above describes the structure of the application processing apparatus mainly from the perspective of one side, and the application processing apparatus may include the application feature server in fig. 2, and may also be the second terminal device. Therefore, the first terminal device, the application feature server and the second terminal device in fig. 2 will be described below from the perspective of the functional units, respectively. The method comprises the following specific steps:
for example, in a case that each functional unit is divided in an integrated manner, referring to fig. 8, an embodiment of the present application provides a schematic structural diagram of a first terminal device, where the first terminal device may include:
an application characteristic obtaining module 801, configured to obtain first characteristic information of a second application, where the first characteristic information may be used to characterize an application attribute of the second application;
an application feature sending module 802, configured to send first feature information of the second application to the application feature server.
Optionally, in some embodiments, the first feature information includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior feature information of the second application.
The first terminal device is described above primarily from the perspective of the functional unit, and the application feature server will be described below from the perspective of the functional unit. For example, in a case that each functional unit is divided in an integrated manner, referring to fig. 9, an embodiment of the present application provides a schematic structural diagram of an application feature server, where the application feature server may include:
an obtaining module 901, configured to obtain feature information of a second application;
a processing module 902, configured to obtain target feature information of the second application according to the feature information of the second application, where the target feature information of the second application is used to characterize a trusted status of the second application;
an obtaining module 901, configured to obtain feature information of a first application sent by a second terminal device, where the first application is originated from an installation source with unknown credibility;
a processing module 902, further configured to determine a first result according to the target feature information of the second application and the feature information of the first application, where the first result indicates a trusted status of the first application;
a sending module 903, configured to send the first result to the second terminal device, and instruct the second terminal device to install the first application, or prevent installation of the first application.
Optionally, in some examples, the feature information of the second application includes first feature information of the second application and second feature information of the second application, the first feature information being used for characterizing application attributes of the second application, the second feature information being used for characterizing external feature attributes of the second application; an obtaining module 901, configured to specifically obtain first feature information of a second application sent by a first terminal device, and obtain second feature information of the second application;
a processing module 902, configured to determine target feature information of the second application according to the second feature information of the second application and third feature information of the second application;
optionally, in some examples, the feature information of the second application includes first feature information of the second application, where the first feature information is used to characterize an application attribute of the second application; an obtaining module 901, configured to obtain first feature information of a second application sent by a first terminal device when the second application is from an installation source with a known credibility;
a processing module 902, configured to determine target feature information of the second application according to the first feature information of the second application.
Optionally, in some examples, the sending module 903 is further configured to send the target feature information of the second application to the second terminal device after the processing module 902 determines the target feature information of the second application according to the feature information of the second application.
Optionally, in other embodiments, the processing module 902 is specifically configured to determine feature reliability between the target feature information of the second application and the feature information of the first application; the feature confidence is taken as a first result.
The first terminal device, the application feature server, has been described above mainly from the perspective of the functional unit, and the second terminal device will be described below from the perspective of the functional unit. For example, in a case that each functional unit is divided in an integrated manner, referring to fig. 10, an embodiment of the present application provides a schematic structural diagram of a second terminal device, where the second terminal device may include:
a feature obtaining module 1001, configured to obtain feature information of a first application, where the first application is derived from an installation source with unknown credibility;
a feature sending module 1002, configured to send feature information of a first application to an application feature server;
the feature obtaining module 1001 is further configured to receive a first result sent by the application feature server, where the first result is a result determined based on feature information of the first application and target feature information of the second application, and the target feature information of the second application is used to represent a trusted condition of the second application;
a feature detection module 1003 configured to install the first application according to the first result, or prevent the first application from being installed according to the first result.
Optionally, in some examples, the feature obtaining module 1001 is further specifically configured to: acquiring target characteristic information of a second application sent by an application characteristic server;
the feature detection module 1003 is configured to determine a first result according to the feature information of the first application and the target feature information of the second application.
It should be noted that, because the contents of information interaction, execution process, and the like between the modules/units of the apparatus are based on the same concept as the method embodiment of the present application, the technical effect brought by the contents is the same as the method embodiment of the present application, and specific contents may refer to the description in the foregoing method embodiment of the present application, and are not described herein again.
The above description has mainly introduced the first terminal device, the application feature server and the second terminal device from the perspective of the functional units. The application processing system may also be described from the interaction perspective of the system. For example, fig. 11 shows a schematic structure of an application processing system. As shown in fig. 11, an embodiment of the application processing system of the present application may include: an application feature server and a second terminal device; wherein the second terminal device is configured to:
acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility;
sending feature information of a first application to an application feature server;
the application feature server is to: and determining a first result according to the target characteristic information of the second application and the characteristic information of the first application, wherein the target characteristic information of the second application is used for representing the credibility of the second application, and the first result is used for indicating the installation of the first application or preventing the installation of the first application, and the first application is the same as or different from the second application.
In this embodiment of the present application, since the target feature information of the second application may represent a trusted status of the second application, in a situation that the first application originates from an installation source with unknown trustworthiness, the second terminal device may send the feature information of the first application to the application feature server after obtaining the feature information of the first application. The application feature server can determine a first result according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate that the first application is installed or prevent the first application from being installed.
Compared with the existing scheme that the installation of the first application with unknown credibility is completed by relying on the authentication of a developer and pre-configuration of an application distribution client, in the embodiment of the application, when the first application from an installation source with unknown credibility needs to be installed, the authenticity and credibility of the first application can be judged through the target characteristic information of the installed second application and the characteristic information of the first application, so that the credible installation and processing of the application are completed; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
In some embodiments of the present application, the application feature server is further configured to: acquiring characteristic information of a second application; and determining target characteristic information of the second application according to the characteristic information of the second application.
In some embodiments of the present application, the feature information of the second application includes first feature information of the second application and second feature information of the second application, the first feature information being used for characterizing application attributes of the second application, and the second feature information being used for characterizing external feature attributes of the second application.
In some embodiments of the present application, when the second application originates from an installation source of known trustworthiness, the characteristic information of the second application includes first characteristic information of the second application, the first characteristic information being used to characterize application attributes of the second application.
On the basis of the application processing system shown in fig. 11, fig. 12 shows a schematic structural diagram of another application processing system. As shown in fig. 12, an embodiment of the application processing system of the present application may further include: a first terminal device; the first terminal device is configured to: acquiring first characteristic information of a second application; the first feature information is sent to an application feature server.
In the application processing system shown in fig. 11 and/or fig. 12, the application feature server is further configured to: determining feature credibility between target feature information of the second application and feature information of the first application; the feature confidence is taken as a first result.
In the application processing system shown in fig. 11 and/or fig. 12, the application feature server is further configured to send the first result to the second terminal device; and the second terminal equipment is also used for installing the first application or preventing the first application from being installed according to the first result.
In the application processing system shown in fig. 11 and/or fig. 12, the feature information of the first application includes one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application.
In the application processing system shown in fig. 11 and/or fig. 12, the first feature information of the second application includes one or more of an application identification of the second application, installation source information of the second application, and running behavior feature information of the second application.
In the application processing system shown in fig. 11 and/or fig. 12, the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
In this way, since the target feature information of the second application may characterize the trusted status of the second application, in the case that the first application originates from an installation source with unknown trustworthiness, the second terminal device in the application processing system described in fig. 11 and/or fig. 12 may perform feature extraction on the first application to obtain the feature information of the first application; and then, the second terminal equipment sends the characteristic information of the first application to an application characteristic server, and the application characteristic server determines a first result according to the characteristic information of the first application and the target characteristic information of the second application. The application feature server may feed back the first result to the second terminal device so that the second terminal device may install the first application or block installation of the first application based on the first result. That is to say, in this embodiment, when a first application from an installation source with unknown credibility needs to be installed, whether the first application is authentic or not may be determined by using the target feature information of the installed second application and the feature information of the first application, so as to complete the installation and processing of the application that is authentic; in addition, in the embodiment of the application, the first application from the installation source with unknown credibility is judged by widely using the characteristic information and the application source information of the existing application without depending on the authentication of a developer and pre-configuring the application distribution client, so that the time and the cost for constructing a credible application distribution ecology can be reduced.
It should be noted that, because the contents of information interaction, execution process, and the like between the modules/units of the apparatus are based on the same concept as the method embodiment of the present application, the technical effect brought by the contents is the same as the method embodiment of the present application, and specific contents may refer to the description in the foregoing method embodiment of the present application, and are not described herein again.
The application processing apparatus in the embodiment of the present application is described above from the perspective of the modular functional entity, and the first terminal device, the application feature server, and the second terminal device are described, and the application processing system is described from the perspective of the system. From the perspective of an entity device, the application processing apparatus, the first terminal device, the application feature server, and the second terminal device may be implemented by one entity device, may also be implemented by multiple entity devices together, and may also be a logic function unit in one entity device, which is not specifically limited in this embodiment of the present application.
For example, the application processing apparatus, the first terminal device, the application feature server, and the second terminal device described above may be implemented by the communication device in fig. 13. Fig. 13 is a schematic hardware structure diagram of a communication device according to an embodiment of the present application. The communication device includes at least one processor 1301, communication lines 1307, memory 1303, and at least one communication interface 1304.
The processor 1301 may be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (server IC), or one or more ICs for controlling the execution of programs in accordance with the present disclosure.
The communication link 1307 may include a path that conveys information between the aforementioned components.
The communication interface 1304, using any transceiver or the like, is used for communicating with other devices or communication networks, such as ethernet, etc.
The memory 1303 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disk read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be separate and coupled to the processor via communication line 1307. Memory 1303 may also be integrated with processor 1301.
The memory 1303 is used for storing computer-executable instructions for executing the scheme of the present application, and is controlled by the processor 1301 to execute the instructions. The processor 1301 is configured to execute the computer execution instruction stored in the memory 1303, so as to implement the method of application processing provided in the foregoing embodiment of the present application.
Optionally, the computer-executable instructions in the embodiments of the present application may also be referred to as application program codes, which are not specifically limited in the embodiments of the present application.
In particular implementations, processor 1301 may include one or more CPUs, such as CPU0 and CPU1 in fig. 13, as one embodiment.
In particular implementations, for one embodiment, a communication device may include multiple processors, such as processor 1301 and processor 1302 of fig. 13. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
In one implementation, the communication device may further include an output device 1305 and an input device 1306, as an example. The output device 1305, in communication with the processor 1301, may display information in a variety of ways. The input device 1306 is in communication with the processor 1301 and may receive user input in a variety of ways. For example, the input device 1306 may be a mouse, a touch screen device, or a sensing device, among others.
The communication device may be a general-purpose device or a dedicated device. In a specific implementation, the communication device may be a laptop, a mobile terminal, or the like, or a device having a similar structure as in fig. 13. The embodiment of the present application does not limit the type of the communication device.
It should be noted that the processor 1301 in fig. 13 may execute the instructions by calling a computer stored in the memory 1303, so that the application processing apparatus executes the method in the method embodiment corresponding to fig. 3. Processor 1301 in fig. 13 may cause the first terminal device to execute the method performed by the first terminal device in the method embodiments corresponding to fig. 4-6 by calling a computer stored in memory 1303 to execute the instructions. Processor 1301 in fig. 13 may cause the application feature server to perform a method as performed by the application feature server in the corresponding method embodiments in fig. 4-6 by invoking computer-executable instructions stored in memory 1303. Processor 1301 in fig. 13 may cause the second terminal device to execute the method performed by the second terminal device in the corresponding method embodiments in fig. 4-6 by calling the computer execution instruction stored in memory 1303.
Specifically, the functions/implementation procedures of the processing unit 702 in fig. 7, the processing module 902 in fig. 9, and the feature detection module 1003 in fig. 10 may be implemented by the processor 1301 in fig. 13 calling a computer executing instruction stored in the memory 1303; the functions/implementation processes of the acquiring unit 701 in fig. 7, the application feature acquiring module 801 and the application feature transmitting module 802 in fig. 8, the acquiring module 901 and the transmitting module 903 in fig. 9, and the feature acquiring module 1001 and the feature transmitting module 1002 in fig. 10 may be implemented by the communication interface 1304 in fig. 13.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the unit is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-described embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof, and when implemented using software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. The processes or functions according to the embodiments of the present application are generated in whole or in part when the computer-executable instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, e.g., the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. A computer-readable storage medium may be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., SSD)), among others.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present application.

Claims (21)

1. A method of application processing, the method comprising:
acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility;
determining a first result according to target characteristic information of a second application and characteristic information of the first application, wherein the target characteristic information of the second application is used for representing the credibility condition of the second application, the first result is used for indicating to install the first application or preventing to install the first application, and the first application is the same as or different from the second application.
2. The method of claim 1, wherein the target feature information of the second application is obtained by an application feature server according to the feature information of the second application.
3. The method according to claim 2, wherein the feature information of the second application comprises first feature information of the second application and/or second feature information of the second application, wherein the first feature information is used for characterizing application attributes of the second application, and the second feature information is used for characterizing external feature attributes of the second application.
4. The method of claim 3, wherein the target characteristic information of the second application is determined from the first characteristic information of the second application when the second application originates from an installation source of known trustworthiness.
5. The method according to claim 3 or 4, wherein the first feature information is information obtained by the first terminal device for the second application.
6. The method according to any one of claims 1-5, wherein determining the first result according to the target feature information of the second application and the feature information of the first application comprises:
determining feature credibility between target feature information of the second application and feature information of the first application;
and taking the feature credibility as a first result.
7. The method of any one of claims 1-6, wherein the feature information of the first application comprises one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application.
8. The method according to any one of claims 3 to 6, wherein the first feature information of the second application comprises one or more of an application identification of the second application, installation source information of the second application, and running behavior feature information of the second application.
9. The method of any of claims 3, 5-6, wherein the second characteristic information of the second application comprises one or more of public information of the second application, and manual maintenance information of the second application.
10. An application processing system, characterized in that the application processing system comprises a second terminal device and an application feature server; wherein,
the second terminal device is configured to:
acquiring characteristic information of a first application, wherein the first application is originated from an installation source with unknown credibility;
sending feature information of the first application to the application feature server;
the application feature server is configured to determine a first result according to target feature information of a second application and feature information of the first application, where the target feature information of the second application is used to characterize a trusted status of the second application, and the first result is used to indicate to install the first application or to prevent installation of the first application, and the first application is the same as or different from the second application.
11. The application processing system of claim 10, wherein the application feature server is further configured to:
acquiring characteristic information of the second application;
and determining target characteristic information of the second application according to the characteristic information of the second application.
12. The application processing system according to claim 11, wherein the feature information of the second application includes first feature information of the second application and/or second feature information of the second application, the first feature information being used for characterizing application attributes of the second application, and the second feature information being used for characterizing external feature attributes of the second application.
13. The application processing system of claim 12, wherein the characteristic information of the second application is determined from the first characteristic information of the second application when the second application originates from a mounting source of known trustworthiness.
14. The application processing system of claim 12 or 13, further comprising a first terminal device;
the first terminal device is configured to:
acquiring first characteristic information of the second application;
sending the first feature information to the application feature server.
15. The application processing system of any of claims 10-14, wherein the application feature server is to:
determining feature credibility between target feature information of the second application and feature information of the first application;
and taking the feature credibility as a first result.
16. The application processing system of any of claims 10-15,
the application feature server is further configured to send the first result to the second terminal device;
the second terminal device is further configured to install the first application or prevent installation of the first application according to the first result.
17. The application processing system of any of claims 10-16, wherein the feature information of the first application comprises one or more of an application identification of the first application, an application package size of the first application, and installation source information of the first application.
18. The application processing system according to any one of claims 12 to 16, wherein the first characteristic information of the second application includes one or more of an application identification of the second application, installation source information of the second application, and running behavior characteristic information of the second application.
19. The application processing system of any of claims 12, 15-16, wherein the second characteristic information of the second application comprises one or more of public information of the second application, and manual maintenance information of the second application.
20. An application processing apparatus, comprising:
a memory for storing computer readable instructions;
further comprising a processor coupled with the memory for executing the computer readable instructions in the memory to perform the method of any of claims 1 to 9.
21. A computer-readable storage medium, which when executed on a computer, causes the computer to perform the method of any one of claims 1 to 9.
CN202110372878.8A 2021-04-07 2021-04-07 Application processing method and related device Pending CN115185544A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110372878.8A CN115185544A (en) 2021-04-07 2021-04-07 Application processing method and related device
PCT/CN2022/083524 WO2022213840A1 (en) 2021-04-07 2022-03-29 Method for processing application, and related apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110372878.8A CN115185544A (en) 2021-04-07 2021-04-07 Application processing method and related device

Publications (1)

Publication Number Publication Date
CN115185544A true CN115185544A (en) 2022-10-14

Family

ID=83512142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110372878.8A Pending CN115185544A (en) 2021-04-07 2021-04-07 Application processing method and related device

Country Status (2)

Country Link
CN (1) CN115185544A (en)
WO (1) WO2022213840A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8615801B2 (en) * 2006-08-31 2013-12-24 Microsoft Corporation Software authorization utilizing software reputation
US20130097659A1 (en) * 2011-10-17 2013-04-18 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
US20130254880A1 (en) * 2012-03-21 2013-09-26 Mcafee, Inc. System and method for crowdsourcing of mobile application reputations
CN107239695A (en) * 2017-04-10 2017-10-10 青岛海信移动通信技术股份有限公司 The method and mobile terminal of application program are installed in a kind of mobile terminal
CN112506531A (en) * 2020-12-11 2021-03-16 中国科学院信息工程研究所 Software installation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2022213840A1 (en) 2022-10-13

Similar Documents

Publication Publication Date Title
US10073916B2 (en) Method and system for facilitating terminal identifiers
CN109977086B (en) Method for sharing application between terminals and terminal
US20180205604A1 (en) Deploying and monitoring multiplatform cloud-based infrastructures
CN112995166B (en) Authentication method and device for resource access, storage medium and electronic equipment
CN110377440B (en) Information processing method and device
CN105357204B (en) Method and device for generating terminal identification information
US20140019957A1 (en) Method, apparatus, and system for sharing software among terminals
CN110708335A (en) Access authentication method and device and terminal equipment
CN106709336A (en) Method and apparatus for identifying malware
CN112073374B (en) Information interception method, device and equipment
KR101657667B1 (en) Malicious app categorization apparatus and malicious app categorization method
CN109032693B (en) Method and device for loading display information, electronic equipment and readable storage medium
CN112995164B (en) Resource access authentication method and device, storage medium and electronic equipment
CN109818972A (en) A kind of industrial control system information security management method, device and electronic equipment
CN115185544A (en) Application processing method and related device
CN114912097A (en) Certificate verification method and device, electronic equipment and storage medium
CN109714371B (en) Industrial control network safety detection system
CN114585055A (en) Vehicle-mounted WiFi access method, vehicle controller, cloud server and mobile terminal
CN109933990B (en) Multi-mode matching-based security vulnerability discovery method and device and electronic equipment
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing
CN109302381B (en) Radius attribute extension method, device, electronic equipment and computer readable medium
CN111064675A (en) Access flow control method, device, network equipment and storage medium
CN112379967A (en) Simulator detection method, device, equipment and medium
US20210406362A1 (en) Request control device, request control method, and request control program
CN111756678A (en) Information verification method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination