CN116150711A - Software processing method and device, electronic equipment and storage medium - Google Patents

Software processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116150711A
CN116150711A CN202211626384.9A CN202211626384A CN116150711A CN 116150711 A CN116150711 A CN 116150711A CN 202211626384 A CN202211626384 A CN 202211626384A CN 116150711 A CN116150711 A CN 116150711A
Authority
CN
China
Prior art keywords
software
information
target
processing
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211626384.9A
Other languages
Chinese (zh)
Inventor
黄扬洋
童将
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lianlian Hangzhou Information Technology Co ltd
Original Assignee
Lianlian Hangzhou Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lianlian Hangzhou Information Technology Co ltd filed Critical Lianlian Hangzhou Information Technology Co ltd
Priority to CN202211626384.9A priority Critical patent/CN116150711A/en
Publication of CN116150711A publication Critical patent/CN116150711A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Stored Programmes (AREA)

Abstract

The disclosure relates to a software processing method, a software processing device, an electronic device and a storage medium. The method may include: under the condition that the preset operation is carried out on the target software in the target terminal is detected, acquiring preset blacklist information; if the target software is not matched with the first software list information, acquiring the software operable configuration information of the preset object user definition; the software operable configuration information comprises second software list information, and software in the second software list information meets the user-defined operable condition of the preset object; based on the second software list information, carrying out matching detection on the target software to obtain a detection result; if the detection result is not matched, acquiring processing configuration information associated with the target software; and carrying out corresponding processing on the preset operation according to the processing configuration information. According to the technical scheme provided by the disclosure, the flexibility of the preset object in effectively processing the software outside the blacklist can be improved.

Description

Software processing method and device, electronic equipment and storage medium
Technical Field
The disclosure relates to the field of computer technology, and in particular, to a software processing method, a device, an electronic device and a storage medium.
Background
Currently, with the need of business offices, many software assisting business offices are presented. Some software enterprises allow use, some software enterprises do not allow use or use needs to have corresponding conditions, and in the prior art, the enterprises can only control software in a general blacklist and cannot control other software which does not belong to the blacklist.
Disclosure of Invention
The disclosure provides a software processing method, a device, an electronic device and a storage medium, so as to at least solve the problem of how to flexibly process software outside a blacklist in the related art. The technical scheme of the present disclosure is as follows:
according to a first aspect of an embodiment of the present disclosure, there is provided a software processing method, including:
under the condition that the preset operation is carried out on the target software in the target terminal is detected, acquiring preset blacklist information; the target terminal belongs to a preset object; the preset blacklist information is used for indicating first software list information which does not meet the safety condition;
if the target software is not matched with the first software list information, acquiring the software operable configuration information of the preset object user definition; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the self-defined operable condition of the preset object;
based on the second software list information, carrying out matching detection on the target software to obtain a detection result;
if the detection result is not matched, acquiring processing configuration information associated with the target software;
and carrying out corresponding processing on the preset operation according to the processing configuration information.
According to a second aspect of embodiments of the present disclosure, there is provided a software processing apparatus, comprising:
the blacklist acquisition module is used for acquiring preset blacklist information under the condition that the preset operation is performed on target software in the target terminal; the target terminal belongs to a preset object; the preset blacklist information is used for indicating first software list information which does not meet the safety condition;
the configuration information acquisition module is used for acquiring the software operable configuration information of the preset object user definition if the target software is not matched with the first software list information; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the self-defined operable condition of the preset object;
the matching detection module is used for carrying out matching detection on the target software based on the second software list information to obtain a detection result;
the processing configuration information acquisition module is used for acquiring processing configuration information associated with the target software if the detection result is not matched;
and the processing module is used for carrying out corresponding processing on the preset operation according to the processing configuration information.
According to a third aspect of embodiments of the present disclosure, there is provided an electronic device, comprising: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to execute the instructions to implement the method of any of the first aspects above.
According to a fourth aspect of the disclosed embodiments, there is provided a computer readable storage medium, which when executed by a processor of an electronic device, causes the electronic device to perform the method of any of the first aspects of the disclosed embodiments.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects: under the condition that the preset operation is carried out on the target software in the target terminal is detected, acquiring preset blacklist information; if the target software is not matched with the first software list information, acquiring the software operable configuration information of the preset object user definition; the software operable configuration information comprises second software list information, and software in the second software list information meets the user-defined operable condition of the preset object; based on the second software list information, carrying out matching detection on the target software to obtain a detection result; if the detection result is not matched, acquiring processing configuration information associated with the target software; and carrying out corresponding processing on the preset operation according to the processing configuration information. According to the technical scheme, software processing can be performed based on the blacklist, matching detection processing can be performed on the target software by utilizing the software operable configuration information defined by the preset object under the condition that the target software does not belong to the blacklist, corresponding processing can be performed, detection accuracy of the target software is improved, and flexibility of the preset object in effectively processing software outside the blacklist can be improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
FIG. 1 is a schematic diagram of an application scenario shown in accordance with an exemplary embodiment;
FIG. 2 is a flowchart illustrating a method of software processing according to an exemplary embodiment;
FIG. 3 is a flowchart illustrating a process for determining process configuration information associated with target software according to an exemplary embodiment;
FIG. 4 is a flowchart illustrating another process configuration information for determining a target software association, according to an example embodiment;
FIG. 5 is a flowchart illustrating an update of the software operational configuration information according to an exemplary embodiment;
FIG. 6 is a flowchart illustrating a method for determining target software feature information according to an example embodiment;
FIG. 7 is a flowchart illustrating a corresponding process for preset operations based on blacklist handling information according to an exemplary embodiment;
FIG. 8 is a block diagram of a software processing apparatus according to an exemplary embodiment;
fig. 9 is a schematic diagram of an electronic device for current control, according to an example embodiment.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an application environment according to an exemplary embodiment, and as shown in fig. 1, the application environment may include a server 01 and a terminal 02.
In an alternative embodiment, the server 01 may be configured to receive information uploaded by the terminal, issue processing configuration information, search blacklist software or operational configuration information, and information notification. Specifically, the server 01 may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs (Content Delivery Network, content delivery networks), basic cloud computing services such as big data and artificial intelligence platforms, and the like.
In an alternative embodiment, the terminal 02 may be software processed in conjunction with the server 01. Specifically, the terminal 02 may include, but is not limited to, a smart phone, a desktop computer, a tablet computer, a notebook computer, a smart speaker, a digital assistant, an augmented reality (augmented reality, AR)/Virtual Reality (VR) device, a smart wearable device, and other types of electronic devices. Alternatively, the operating system running on the electronic device may include, but is not limited to, an android system, an IOS system, linux, windows, and the like.
In addition, it should be noted that fig. 1 is only one application environment of the software processing method provided in the present disclosure. Alternatively, the software process may be executed by the terminal 02 or by the server 01.
In the embodiment of the present disclosure, the server 01 and the terminal 02 may be directly or indirectly connected through a wired or wireless communication method, which is not limited herein.
It should be noted that, a possible sequence of steps is shown in the following figures, and is not limited to the strict order of the sequence. Some steps may be performed in parallel without mutual dependency.
Before describing the method embodiments provided in the present application, application scenarios, related terms or nouns that may be involved in the method embodiments of the present application are briefly described, so as to be understood by those skilled in the art of the present application.
FIG. 2 is a flowchart illustrating a method of software processing according to an exemplary embodiment. As shown in fig. 2, the following steps may be included:
s201, acquiring preset blacklist information under the condition that preset operation is performed on target software in a target terminal is detected; the target terminal belongs to a preset object; the preset blacklist information is used for indicating first software list information which does not meet the safety condition.
In the embodiment of the present disclosure, the target terminal belongs to a preset object, which may refer to any terminal in the preset object. The target software may be software in the target terminal that performs a preset operation, which may be any of downloading, installing, or starting operation, which is not limited in this application. The preset object may be an object to which the target terminal belongs, and the preset object may refer to an object that needs to be processed by software, for example, an enterprise, a local area network, etc. that needs to be processed by software, which is not limited in the disclosure. In this way, the terminals belonging to the enterprise or the terminals belonging to the local area network can be processed by software.
In the embodiment of the present disclosure, failing to satisfy the security condition may mean that security risks may be caused to the target terminal, for example, technical support cannot be obtained, data is lost, and viruses are infected.
The preset blacklist information can be preset, for example, the preset blacklist information can be input through a blacklist configuration page, and the preset blacklist information can be stored, so that the subsequent use is facilitated. Optionally, the preset blacklist information may be dynamically updated, which is not limited in this disclosure. In one possible embodiment, the preset blacklist information may be described in the form of a software list, for example, the preset blacklist information may be first software list information, based on which the preset blacklist information may be set or updated by setting or updating each software in the first software list information.
In one example, the first software list information may include list information of a plurality of software components that do not satisfy the security condition, for example, may include software 1 to software n. The software 1 to software n may refer to identification information of the software, for example, a name of the software, a code identification of the software, and the like, which is not limited in this application.
In another example, consider that there may be cases where the software cannot be recognized by its name or its coded identification. The first software list information may include a plurality of software that do not satisfy the security condition, and output values of files of the plurality of software under the hash algorithm, where the files of the software may include executable programs (EXE files, executable program), dynamic link libraries (DLLs, dynamic Link Library), which are not limited herein, and the output values are used to distinguish between different software, that is, software having the same output value may be regarded as the same software, and software having different output values may be regarded as different software.
As an example, in the case where the same hash algorithm is applied, as shown in table 1, the first software list information may be represented by the following correspondence relationship:
software 1, outputting a value 1;
software 2, outputting a value 2;
software 3, outputting a value 3;
......
software n.
Hash algorithm
Software 1 Output value 1
Software 2 Output value 2
Software 3 Output value 3
Software n ...
TABLE 1
As another example, in the case where there are a plurality of hash algorithms, as shown in table 2, the first software list information may be represented by the following correspondence relationship:
software 1, hash algorithm 1, output value 11;
software 2, hash algorithm 2, output value 12;
……
software n, hash algorithm 1, ….
Software 1 Hash algorithm 1 Output value 11
Software 2 Hash algorithm 2 Output value 12
... ... ...
Software n Hash algorithm 1 ...
TABLE 2
The hash algorithm may be any one of the existing hash algorithms, which is not limited in this application.
In the embodiment of the present specification, the output value may be a hash value obtained through a hash algorithm. For example, the hash value may be calculated by a message digest algorithm (MD 5, message Digest Algorithm MD 5).
In one possible implementation manner, the software in the target terminal may be monitored, and when a preset operation is detected to be performed on the target software in the target terminal, for example, the target software is installed, preset blacklist information may be obtained.
When the target terminal executes the preset operation on the target software, whether the preset operation on the target software meets the safety condition or not is detected, and the safety of the running environment of the target terminal is ensured.
S203, if the target software is not matched with the first software list information, acquiring the software operable configuration information of the preset object user definition; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the user-defined operable condition of the preset object.
In the embodiment of the present specification, the operable condition may refer to a condition that the software agrees to perform a preset operation for a preset object, and for example, the software may be free software, paid purchased software, or the like.
In this embodiment of the present disclosure, the software operable configuration information may be software list information of a preset object customized to perform a preset operation, and in a possible implementation, the software operable configuration information may be described in the form of a software list, for example, the software operable configuration information may include second software list information.
In one example, the second software list information may include list information of a plurality of software components meeting the security condition, and the number of the software is not limited in the application, for example, the software may include software a to software z, where the software a to software z may refer to identification information of the software, such as a name of the software, an encoded identification of the software, and the application is not limited in this application.
In another example, the second software list information may further include a plurality of software that satisfies the security condition and a use right of the plurality of software under different use types and purchase protocols based on consideration of facilitating viewing of a specific use type and purchase protocol by the preset object. The usage rights are based on the type of usage and whether the purchase agreement is owned.
In a specific embodiment, in the case that the usage type is free, the usage right is allowed, and no purchase agreement is needed; in the case of pay-per-use type, the usage rights are allowed when possessing a purchase agreement; in the case where the usage type is free for a specific user, the usage right is allowed while possessing the purchase agreement.
As an example, as shown in table 3, the second software list information may be represented by the following correspondence relationship:
software a, free, allow;
the software b pays for the purchase agreement, and allows;
software c, the specific user is free, has purchase agreement, allow;
......
software z, free, allowed.
Software name Usage type Purchase agreement Usage rights
Software a Free of charge Allow for
Software b Payment method With purchase agreements Allow for
Software c Free for specific users With purchaseProtocol(s) Allow for
... ... ... ...
Software z Free of charge Allow for
TABLE 3 Table 3
The operable configuration information may be preset, for example, the operable configuration information may be entered through a configuration page, and the preset operable configuration information may be saved, which is also convenient for subsequent use. Optionally, the operational configuration information may also be dynamically updated, which is not limited by the present disclosure. In one possible embodiment, the operational configuration information may be described in the form of a software list, for example, the operational configuration information may be second software list information, based on which the operational configuration information may be set or updated by setting or updating each software in the second software list information. If the target software is not matched with the first software list information, the target software can be determined to be the software with safety, and further, the self-defined software operable configuration information is obtained, so that whether the software with safety has the conditions of allowing the use of the preset object at the same time or not can be further checked.
And S205, carrying out matching detection on the target software based on the second software list information to obtain a detection result.
In a possible implementation manner, the second software list information includes a name corresponding to each piece of software, and matching detection is achieved by searching a software name corresponding to a software name of the target piece of software in the second software list information, so that a detection result is obtained, and the detection result can reflect the existence of the target piece of software in the second software list information, so that whether the target piece of software is software which is allowed to be used by the employee terminal by a preset object can be determined.
For example, the second software list information includes software names of software 1, software 2, software 3 and software 4, the target software a includes software name of software 3, the target software a is detected for matching based on the second software list information, and the target software a exists in the second software list information, that is, the software 3 is found in the second software list information and corresponds to the software name of the target software a, and the software name of the target software a is confirmed to be included in the second software list information.
In another possible implementation manner, if the software name corresponding to the software name of the target software does not exist in the second software list information, the detection result is not matched.
For example, the second software list information includes software names of software 1, software 2, software 3 and software 4, the software name of the target software B is software 5, the target software B is detected based on the second software list information, and the target software B is not present in the second software list information, that is, in the second software list information, the software 5 cannot be found to correspond to the software name of the target software B, and it is confirmed that the software name of the target software B is not included in the second software list information.
And carrying out matching detection on the target software through the second software list information defined by the preset object, determining whether the target software is the software which is allowed to be used by the employee terminal by the preset object, and further controlling the employee use software to meet the regulations.
S207, if the detection result is not matched, acquiring processing configuration information associated with the target software.
In practical application, different preset objects have different control intensities on the software, so when the second software list information does not include the target software, the control intensity corresponding to the target software needs to be obtained, thereby determining the processing configuration information associated with the target software.
In a specific embodiment, the processing of the configuration information may include means for controlling the target software, such as sending alert information to a preset object, performing blocking process, disconnecting network, or deleting the target software.
In a possible implementation manner, when the detection result obtained by the matching detection shows that the second software list information does not include the software name of the target software, that is, does not match, the control intensity of the preset object on the target software is obtained, and the processing configuration information associated with the target software is further obtained based on the control intensity, so that convenience in operation is improved.
In a specific embodiment, third software list information may be set, and a software name in the third software list information may include a software name that is not present in the first software list information and is not present in the second software list information, and further, the preset object may update the software name in the third software list information in real time. Based on the acceptance degree of the preset object to each piece of software in the third software list, determining the control intensity of the corresponding piece of software, wherein the control intensity of the piece of software can include: the method comprises the steps of low-level, medium-level, high-level and highest-level, wherein software deleting operation corresponds to the highest-level control intensity, network breaking operation corresponds to the high-level control intensity, blocking process operation corresponds to the medium-level control intensity, and warning information is sent to a preset object to correspond to the low-level control intensity.
Further, according to the control intensity of the software, the server acquires a control means corresponding to the control intensity of the target software, and the server acquires stored processing configuration information associated with the target software, specifically, the server may acquire the associated processing configuration information locally and may also acquire the associated processing configuration information from a database.
In a specific embodiment, the processing mode corresponding to the target software is determined according to the control intensity of the software, so that the processing flexibility can be improved, and the condition that the normal work is influenced by adopting a uniform processing mode for all the software is avoided.
S209, according to the processing configuration information, carrying out corresponding processing on the preset operation.
In one possible implementation manner, when detecting that the target software in the target terminal is executed with the preset operation, the server sends a corresponding instruction to the target terminal according to the processing configuration information, and the target terminal carries out corresponding processing on the preset operation according to the corresponding instruction.
In the embodiment of the present disclosure, if the processing configuration information is the deletion target software, the server sends a deletion target software instruction to the target terminal, and the target terminal deletes the target software that is being downloaded, installed, and started to run according to the received deletion target software instruction.
In the embodiment of the present disclosure, if the processing configuration information is a disconnection, the server sends a disconnection instruction to the target terminal, and the target terminal disconnects the network connection of the terminal that is downloading, installing and starting to run the target software according to the received disconnection instruction.
In the embodiment of the present disclosure, if the processing configuration information is a blocking process, the server sends a blocking process instruction to the target terminal, and the target terminal blocks the process of downloading, installing and starting the running software in progress by the terminal according to the received blocking process instruction.
The safety environment of the terminal operation is ensured by carrying out corresponding processing on the preset operation.
As shown in fig. 3, fig. 3 is a flowchart illustrating a process configuration information for determining a target software association according to an exemplary embodiment, and in another possible implementation, the step S207 may include the following steps:
s301, if the detection result is not matched, acquiring a software use configuration type corresponding to the target software.
In one example, the software usage configuration type may be expressed as a condition under which the software is available, for example, the software usage configuration type may be a non-purchase agreement to prohibit commercial, commercial payment and a non-purchase agreement for a particular user.
In one possible implementation manner, if the detection result is not matched, the software usage configuration type corresponding to the target software may be obtained locally.
S303, acquiring processing configuration information associated with the target software based on the software use configuration type.
In the embodiment of the present disclosure, based on consideration that different preset objects have different associated processing configuration information according to different software usage configuration types, different software usage configuration types may be associated with different processing configuration information, for example, if the software usage configuration type of the target software is a business prohibition, and in the case that the preset operation is downloading, the processing configuration information associated with the target software is obtained, where the processing configuration information may include disconnection and blocking of the process. And under the condition that the preset operation is the installation, acquiring processing configuration information associated with the target software, wherein the processing configuration information can comprise deleting software, breaking network and blocking process, and under the condition that the preset operation is the starting operation, acquiring processing configuration information associated with the target software, wherein the processing configuration information can comprise deleting software, breaking network and blocking process.
The method comprises the steps that if processing configuration information related to software of which commercial is forbidden is deleting software, a software deleting instruction is sent to a target terminal by a preset object 1, so that the target terminal deletes the software of which commercial is forbidden; if the software use configuration type of the target software is commercial prohibition, and the associated processing configuration information of the preset object 2 for the commercial prohibition software is a blocking process, a blocking process instruction is sent to the target terminal, so that the target terminal blocks the commercial prohibition software process.
The related processing configuration information is obtained based on the configuration type of the software, so that the requirement that the preset object has individuation on the processing of different software can be met.
As shown in fig. 4, fig. 4 is a flowchart illustrating a process configuration information for determining a target software association according to an exemplary embodiment, and in another possible implementation, the step S207 may include the following steps:
s401, if the detection result is not matched, acquiring software grade information corresponding to the target software; the software level information characterizes a degree to which the target software does not meet the operable condition.
In this embodiment of the present disclosure, based on consideration of different effects of different software on the terminal, the protection degree of the preset object on the different software is also different, where the software level information may include a first level and a second level, where the first level may be indicated as possibly having a risk, and the second level may be indicated as having a risk, where the risk may include a legal risk and/or a vulnerability risk.
S403, acquiring processing configuration information associated with the target software based on the software grade information.
In this embodiment of the present disclosure, based on consideration that different preset objects have different associated processing configuration information on different software level information, different software level information may be associated with different processing configuration information, for example, if the software level information of the target software is first-level, in the case that the preset operation is downloading, the processing configuration information associated with the target software is obtained, where the processing configuration information may include network disconnection and blocking. And under the condition that the preset operation is the installation, acquiring processing configuration information associated with the target software, wherein the processing configuration information can comprise deleting software, breaking network and blocking process, and under the condition that the preset operation is the starting operation, acquiring processing configuration information associated with the target software, wherein the processing configuration information can comprise deleting software, breaking network and blocking process.
The method comprises the steps that if the associated processing configuration information of the software with the primary software grade information of a preset object A is a network disconnection, a target terminal correspondingly obtains a network disconnection instruction; if the software grade information of the target software is the first grade, and the associated processing configuration information of the preset object B for the software with the first grade is a blocking process, the target terminal correspondingly acquires a blocking process instruction.
Corresponding processing configuration information is obtained according to the software grade information, so that the software is more convenient to process, and different software is more targeted in processing.
As shown in fig. 5, fig. 5 is a flowchart illustrating an update of the software operational configuration information, the method further comprising:
s501, acquiring update configuration information in response to the update request of the software operable configuration information.
In one example, the update configuration information may include a software identification of added software and a software identification of deleted software.
In one possible implementation, the updated configuration information may be periodically obtained in response to an update request for the software-operable configuration information.
In another possible implementation, the updated configuration information may be obtained in real-time in response to an update request for the software-operable configuration information.
S503, updating the software operable configuration information according to the updating configuration information.
In the embodiment of the specification, the operable configuration information is updated in real time according to the updated configuration information, the software identifier added in the updated configuration information is added into the operable configuration information, and the software identifier deleted in the updated configuration information is deleted from the operable configuration information.
The operational configuration information can be updated in real time by updating the configuration information, so that the use of the software by the target terminal meets the requirement of a preset object.
As shown in fig. 6, fig. 6 is a flowchart illustrating a method of determining target software feature information according to an exemplary embodiment, the method further comprising:
s601, scanning a disk associated with the target software, and acquiring characteristic information of the target software.
In one example, the magnetic disk may be a memory for storing data by using a magnetic recording technology, and the magnetic disk may be a fixed magnetic disk or a mobile hard disk, and specifically, the association relationship between the target software and the magnetic disk may be determined based on the storage position of the software data corresponding to the target software, so as to determine the magnetic disk that needs to be scanned.
In the embodiment of the present specification, the feature information may be information that makes the target software uniquely determined, and may be a hash feature value calculated by SHA256 algorithm, MD5 algorithm, and SHA1 algorithm.
And S603, if the characteristic information is not matched with the first software list information, determining that the target software is not matched with the first software list information.
In this embodiment of the present disclosure, the feature information and the first software list information are subjected to matching detection, for example, if the feature information is that a hash feature value obtained by MD5 algorithm of the target software is abcdefg and a hash feature value obtained by MD5 algorithm of the target software in the first software list information is abcdefa, the result of matching detection between the feature information and the first software list information is mismatch, that is, it is determined that the target software and the first software list information are not matched.
The method comprises the steps of scanning a disk associated with target software, obtaining a file of the target software, obtaining a hash characteristic value according to a hash algorithm, and matching by the hash characteristic value based on the characteristic that the hash characteristic value has uniqueness, so that accuracy of software identification can be improved.
As shown in fig. 7, fig. 7 is a flowchart illustrating a corresponding process for performing a preset operation according to blacklist processing information according to an exemplary embodiment, and the method further includes:
and S701, if the target software is matched with the first software list information, obtaining blacklist processing information corresponding to the target software.
In one example, the blacklist processing information may be a processing means for software in the blacklist, and the blacklist processing information may be deletion target software, off-line, and blocking process.
In one possible implementation manner, if the target software matches the first software list information, the server may obtain blacklist processing information corresponding to the locally stored target software.
S703, according to the blacklist processing information, performing corresponding processing on the preset operation.
In the embodiment of the present disclosure, if the blacklist processing information is the deletion target software, the server sends a deletion target software instruction to the target terminal, and the target terminal deletes the target software that is being downloaded, installed and started to run according to the received deletion target software instruction.
In the embodiment of the present disclosure, if the blacklist processing information is a disconnection, the server sends a disconnection instruction to the target terminal, and the target terminal disconnects the network connection of the terminal that is downloading, installing and starting to run the target software according to the received disconnection instruction.
In the embodiment of the present disclosure, if the blacklist processing information is a blocking process, the server sends a blocking process instruction to the target terminal, and the target terminal blocks the process of downloading, installing and starting the running software in progress by the terminal according to the received blocking process instruction.
If the target software is overlapped with the preset blacklist information, namely the first software list information, the representative target software is software without safety, and the software without safety is processed according to the preset blacklist processing information, so that the safety of the target terminal is ensured.
Fig. 8 is a block diagram of a software processing apparatus according to an exemplary embodiment. Referring to fig. 8, the apparatus may include:
the blacklist obtaining module 801 is configured to obtain preset blacklist information when detecting that a preset operation is performed on target software in a target terminal; the target terminal belongs to a preset object; the method comprises the steps that black list information is preset and used for indicating first software list information which does not meet safety conditions;
a configuration information obtaining module 803, configured to obtain software operable configuration information defined by a preset object if the target software is not matched with the first software list information; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the user-defined operable condition of the preset object;
the matching detection module 805 is configured to perform matching detection on the target software based on the second software list information, to obtain a detection result;
a processing configuration information obtaining module 807, configured to obtain processing configuration information associated with the target software if the detection result is not matched;
and the processing module 809 is configured to perform corresponding processing on the preset operation according to the processing configuration information.
In one possible implementation manner, the acquiring process configuration information module 807 may further include:
and if the detection result is not matched, acquiring a software use configuration type unit corresponding to the target software, wherein the software use configuration type unit is used for acquiring the software use configuration type corresponding to the target software.
And acquiring a processing configuration information unit associated with the target software based on the software use configuration type, wherein the processing configuration information unit is used for acquiring the processing configuration information unit associated with the target software based on the software use configuration type.
In one possible implementation manner, the acquiring process configuration information module 807 may further include:
and if the detection result is not matched, acquiring a software grade information unit corresponding to the target software, wherein the software grade information unit is used for acquiring the software grade information corresponding to the target software if the detection result is not matched.
And a processing configuration information unit for acquiring the processing configuration information associated with the target software based on the software grade information.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 9 is a block diagram of an electronic device for software processing, which may be a server, whose internal structure may be as shown in fig. 9, according to an exemplary embodiment. The electronic device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic device includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the electronic device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of software processing.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the disclosed aspects and is not limiting of the electronic device to which the disclosed aspects apply, and that a particular electronic device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an exemplary embodiment, there is also provided an electronic device including: a processor; a memory for storing the processor-executable instructions; wherein the processor is configured to execute the instructions to implement a software processing method as in the embodiments of the present disclosure.
In an exemplary embodiment, a computer readable storage medium is also provided, which when executed by a processor of an electronic device, causes the electronic device to perform the software processing method in the embodiments of the present disclosure. The computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In an exemplary embodiment, a computer program product containing instructions is also provided which, when run on a computer, cause the computer to perform the method of software processing in the embodiments of the present disclosure.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method of software processing, comprising:
under the condition that the preset operation is carried out on the target software in the target terminal is detected, acquiring preset blacklist information; the target terminal belongs to a preset object; the preset blacklist information is used for indicating first software list information which does not meet the safety condition;
if the target software is not matched with the first software list information, acquiring the software operable configuration information of the preset object user definition; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the self-defined operable condition of the preset object;
based on the second software list information, carrying out matching detection on the target software to obtain a detection result;
if the detection result is not matched, acquiring processing configuration information associated with the target software;
and carrying out corresponding processing on the preset operation according to the processing configuration information.
2. The software processing method according to claim 1, wherein if the detection result is not matched, obtaining processing configuration information associated with the target software includes:
if the detection result is not matched, acquiring a software use configuration type corresponding to the target software;
and acquiring processing configuration information associated with the target software based on the software use configuration type.
3. The software processing method according to claim 1, wherein if the detection result is not matched, obtaining processing configuration information associated with the target software includes:
if the detection result is not matched, acquiring software grade information corresponding to the target software; the software grade information characterizes the extent to which the target software does not meet the operational condition;
and acquiring processing configuration information associated with the target software based on the software grade information.
4. A software processing method according to any one of claims 1-3, characterized in that the method further comprises:
responding to the update request of the software operable configuration information to acquire update configuration information;
and updating the software operable configuration information according to the updating configuration information.
5. The software processing method according to claim 1, characterized in that the method further comprises:
scanning a disk associated with the target software to acquire characteristic information of the target software;
and if the characteristic information is not matched with the first software list information, determining that the target software is not matched with the first software list information.
6. The software processing method according to claim 1, characterized in that the method further comprises:
if the target software is matched with the first software list information, obtaining blacklist processing information corresponding to the target software;
and carrying out corresponding processing on the preset operation according to the blacklist processing information.
7. A software processing method according to any one of claims 1-3, characterized in that said corresponding processing comprises at least one of the following: blocking the process of the target software, disconnecting the network, and deleting the target software.
8. A software processing apparatus, comprising:
the blacklist acquisition module is used for acquiring preset blacklist information under the condition that the preset operation is performed on target software in the target terminal; the target terminal belongs to a preset object; the preset blacklist information is used for indicating first software list information which does not meet the safety condition;
the configuration information acquisition module is used for acquiring the software operable configuration information of the preset object user definition if the target software is not matched with the first software list information; the software operable configuration information includes second software listing information, the second software listing information being different from the first software listing information; the software in the second software list information meets the self-defined operable condition of the preset object;
the matching detection module is used for carrying out matching detection on the target software based on the second software list information to obtain a detection result;
the processing configuration information acquisition module is used for acquiring processing configuration information associated with the target software if the detection result is not matched;
and the processing module is used for carrying out corresponding processing on the preset operation according to the processing configuration information.
9. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the software processing method of any one of claims 1 to 7.
10. A computer readable storage medium, characterized in that instructions in the computer readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the software processing method of any one of claims 1 to 7.
CN202211626384.9A 2022-12-16 2022-12-16 Software processing method and device, electronic equipment and storage medium Pending CN116150711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211626384.9A CN116150711A (en) 2022-12-16 2022-12-16 Software processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211626384.9A CN116150711A (en) 2022-12-16 2022-12-16 Software processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116150711A true CN116150711A (en) 2023-05-23

Family

ID=86353466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211626384.9A Pending CN116150711A (en) 2022-12-16 2022-12-16 Software processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116150711A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116820417A (en) * 2023-08-28 2023-09-29 湖南于一科技有限公司 Software function control method and device, storage medium and electronic device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116820417A (en) * 2023-08-28 2023-09-29 湖南于一科技有限公司 Software function control method and device, storage medium and electronic device
CN116820417B (en) * 2023-08-28 2023-11-14 湖南于一科技有限公司 Software function control method and device, storage medium and electronic device

Similar Documents

Publication Publication Date Title
US9596257B2 (en) Detection and prevention of installation of malicious mobile applications
CN109391673B (en) Method, system and terminal equipment for managing update file
CN106462430B (en) Application upgrade package obtaining method and device
US8959624B2 (en) Executable download tracking system
CN111008034B (en) Patch generation method and device
CN113489713A (en) Network attack detection method, device, equipment and storage medium
CN116150711A (en) Software processing method and device, electronic equipment and storage medium
CN114328029B (en) Backup method and device of application resources, electronic equipment and storage medium
CN113961936A (en) Trusted white list construction method, system and device and computer equipment
CN111224826B (en) Configuration updating method, device, system and medium based on distributed system
CN112529759A (en) Document processing method, device, equipment, storage medium and computer program product
CN111538566A (en) Mirror image file processing method, device and system, electronic equipment and storage medium
WO2020000753A1 (en) Device security monitoring method and apparatus
CN111949363A (en) Service access management method, computer equipment, storage medium and system
US20210234686A1 (en) Information processing device, information processing method, and storage medium
CN114491661A (en) Log tamper-proofing method and system based on block chain
CN106485104B (en) Automatic restoration method, device and system for terminal security policy
CN116415240A (en) Lexovirus detection method and related system
CN108133154B (en) Method and device for storing file
CN116149940A (en) Software processing method and device, electronic equipment and storage medium
CN104484198A (en) Method and device for setting up application
JP7268742B2 (en) Policy evaluation device, control method, and program
CN111970225B (en) Monitoring method and system of terminal equipment, computer equipment and storage medium
CN109996228B (en) Information processing method and electronic equipment
KR20190056664A (en) System and method for protecting font copyrights

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination