CN117077125A - Secure installation starting method, device, equipment and medium for mobile application program - Google Patents

Secure installation starting method, device, equipment and medium for mobile application program Download PDF

Info

Publication number
CN117077125A
CN117077125A CN202311114890.4A CN202311114890A CN117077125A CN 117077125 A CN117077125 A CN 117077125A CN 202311114890 A CN202311114890 A CN 202311114890A CN 117077125 A CN117077125 A CN 117077125A
Authority
CN
China
Prior art keywords
target
resource
installation
application program
static resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311114890.4A
Other languages
Chinese (zh)
Inventor
赵铭
熊文杰
马鸿超
谢昆
何海
刘珏廷
韩宇林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Original Assignee
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Digital Platform Technology Guangdong Co ltd filed Critical China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority to CN202311114890.4A priority Critical patent/CN117077125A/en
Publication of CN117077125A publication Critical patent/CN117077125A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a method, a device, equipment and a medium for starting secure installation of a mobile application program. The method is characterized by comprising the following steps: receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code; installing a target application program according to the source code; responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, and loading the target static resource according to the static resource installation information; wherein the static resource installation information comprises static resource decryption information and first resource verification information; and running the target application program based on the target static resource. The method and the device realize the installation and the starting of the mobile application program, prevent the static resource of the mobile application program from being leaked, and reduce the risk of resource leakage.

Description

Secure installation starting method, device, equipment and medium for mobile application program
Technical Field
The present invention relates to the field of programming, and in particular, to a method, an apparatus, a device, and a medium for starting secure installation of a mobile application.
Background
The mobile application acts as software running in the mobile terminal. The static resources supporting the running of the mobile application program are also packaged and stored in the installation package, which means that the static resources in the installation package can be directly read by an installation package reading tool in the installation process of the mobile application program, so that the content of the mobile application program is leaked, and the existing method for installing the mobile application program has potential safety hazards. In the prior art, though the static resources can be prevented from being obtained through the installation package in a staged installation mode, the static resources can still be obtained in the process of receiving the resources in stages, risks can not be completely avoided, and the use experience of a user is influenced due to too slow staged installation speed.
Disclosure of Invention
The invention provides a method, a device, equipment and a medium for starting the safe installation of a mobile application program so as to realize the safe installation and the safe starting of the mobile application program.
According to an aspect of the present invention, there is provided a secure installation initiation method of a mobile application, including:
receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code;
installing a target application program according to the source code;
responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, and loading the target static resource according to the static resource installation information;
and running the target application program based on the target static resource.
According to another aspect of the present invention, there is provided a secure installation starting apparatus of a mobile application, including:
the resource acquisition module is used for receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code;
the application program installation module is used for installing the target application program according to the source code;
the application program loading module is used for responding to the starting triggering operation aiming at the target application program, requesting static resource installation information and loading the target static resource according to the static resource installation information;
and the application program running module is used for running the target application program based on the target static resource.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the secure installation initiation method of the mobile application of any of the embodiments of the present invention.
According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to implement the secure installation initiation method of a mobile application according to any of the embodiments of the present invention when executed.
The technical scheme of the embodiment of the invention is that the target installation package of the target application program is received; installing the target application program according to the source code, the installation safety is improved by using the source code installation, and the installation speed and the installation stability can be improved; responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, loading the target static resource according to the static resource installation information, and loading the target static resource through the static resource installation information to realize safe loading of the static resource, thereby further improving installation safety; the target application program is operated based on the target static resource, and after the application program resource is loaded, the target application program is directly operated without waiting for downloading the static resource, so that the installation speed and the starting speed of the application program are improved, the technical problem of data leakage in the installation and starting processes of the application program in the prior art is solved, the installation and starting of the mobile application program are realized, the static resource leakage of the mobile application program is prevented, and the risk of resource leakage is reduced.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for starting secure installation of a mobile application according to a first embodiment of the present invention;
FIG. 2 is a flowchart of another method for starting secure installation of a mobile application according to a second embodiment of the present invention;
FIG. 3 is a flowchart of another method for starting secure installation of a mobile application according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security installation starting device for a mobile application according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device implementing a secure installation starting method of a mobile application according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Example 1
Fig. 1 is a flowchart of a method for starting secure installation of a mobile application, which is applicable to mobile applications installed in a mobile terminal, according to an embodiment of the present invention, and the method may be performed by a secure installation starting apparatus of a mobile application, which may be implemented in hardware and/or software, and the secure installation starting apparatus of a mobile application may be configured in an electronic device. As shown in fig. 1, the method includes:
s110, receiving a target installation package of the target application program.
The target installation package comprises a target static resource and source code; the target application program can be an application program which is selectively installed by the mobile terminal; the target installation package may be a set of executable files that are capable of self-decompression.
The target static resource may be a resource file required in the running process of the target application program. The source code may be executable computer language instructions of the target application.
Specifically, the target application program to be installed is selected in the mobile terminal, and the target installation package of the target application program issued is received through the mobile terminal.
And S120, installing the target application program according to the source code.
Specifically, after the mobile terminal finishes downloading the target application program, the target application program is automatically installed according to the source code in the target installation package, and the target static resource is stored in a file corresponding to the target application program.
S130, responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, and loading the target static resource according to the static resource installation information.
The static resource installation information may be decompression information for decompressing and installing the target static resource. The start trigger operation may be an operation that the mobile terminal starts the target application program.
Optionally, the static resource installation information includes static resource decryption information and first resource verification information. Wherein, the static resource decryption information can be the password information for decrypting the target static resource; the first resource verification information may be pairing information that verifies the integrity of the target static resource.
Optionally, after the installation of the target application program is completed, adding an application program icon corresponding to the target application program in an operation interface of the mobile terminal, and sending a message whether to start the target application program, and when the user selects to trigger the starting of the target application program, responding to a starting triggering operation; waiting for the user to click on the target application program when the user does not select to trigger the target application program to be started, and generating a starting trigger operation aiming at the target application program when the user clicks on the target application program.
Specifically, under the condition that a starting triggering operation of starting a target application program is triggered in a mobile terminal, responding to the starting triggering operation aiming at the target application program, requesting static resource installation information corresponding to a target static resource, decompressing and loading the target static resource according to the static resource installation information.
Optionally, in another optional embodiment of the present invention, the requesting static resource installation information includes:
sending a resource decoding request through the target application program; and acquiring the static resource installation information according to the resource decoding request.
Wherein the resource decoding request may be a message request requesting the target static resource decryption information.
Specifically, when a target application program of the mobile terminal is started, a resource decryption request aiming at a target static resource is sent through the target application program, and static resource installation information is obtained according to the resource decryption request.
And S140, running the target application program based on the target static resource.
Specifically, after loading the target static resource by the mobile terminal is completed, the target application program is operated according to the target static resource, and the target static resource is displayed in the target application program.
The technical scheme of the embodiment of the invention is that the target installation package of the target application program is received; installing the target application program according to the source code, the installation safety is improved by using the source code installation, and the installation speed and the installation stability can be improved; responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, loading the target static resource according to the static resource installation information, and loading the target static resource through the static resource installation information to realize safe loading of the static resource, thereby further improving installation safety; the target application program is operated based on the target static resource, and after the application program resource is loaded, the target application program is directly operated without waiting for downloading the static resource, so that the installation speed and the starting speed of the application program are improved, the technical problem of data leakage in the installation and starting processes of the application program in the prior art is solved, the installation and starting of the mobile application program are realized, the static resource leakage of the mobile application program is prevented, and the risk of resource leakage is reduced.
Example two
Fig. 2 is a flowchart of another method for starting secure installation of a mobile application according to the second embodiment of the present invention, where the relationship between the present embodiment and the above embodiment is a specific method for loading a target static resource. As shown in fig. 2, the method for starting secure installation of the mobile application program includes:
s210, receiving a target installation package of the target application program.
S220, installing the target application program according to the source code.
S230, responding to a starting triggering operation aiming at a target application program, and requesting static resource installation information; reading the target static resources through the target application program and the static resource installation information, and determining target static installation information; and loading the target static installation information through a target application program.
The target static installation information may be executable static resource information obtained by decrypting the target static resource.
Specifically, a target application program is selected in a mobile terminal, static resource installation information is requested in response to a starting triggering operation of the mobile terminal for the target application program, target static resources are read in the mobile terminal through the target application program and the static resource installation information, target static installation information corresponding to the target static resources is determined, and the target static installation information is loaded through the target application program.
Optionally, in another optional embodiment of the present invention, the reading the target static resource through the target application program and the static resource installation information, and determining target static installation information includes:
invoking a resource decryption interface of the target application program to analyze the static resource decryption information to obtain a static resource decompression password; and decompressing the target static resources through the static resource decompression codes to determine target static installation information.
Wherein the resource decryption interface may be an interface integrated in the source code of the target application for decrypting the resource.
The static resource decompression secret may be password information of the decompression target static resource.
Specifically, a resource decryption interface of a target application program is called in a mobile terminal to decrypt the acquired analysis static resource information, a static resource decompression password corresponding to the target static resource is determined, and the target static resource is decrypted and decompressed through the static resource decompression password, so that the target static installation information is obtained.
Optionally, in another optional embodiment of the present invention, before the loading of the target static installation information by the target application program, the method further includes:
acquiring second resource verification information of the target static installation information; and if the second resource verification information is the same as the first resource verification information, determining that the target static installation information passes the resource validity verification, and executing the operation of loading the target static installation information through the target application program.
The second resource verification information may be a verification code generated according to the target static installation information. The second resource verification information may be MD5 (MD 5 Message-Digest Algorithm) file information.
Specifically, file verification is performed on the target static installation information in the mobile terminal, second resource verification information corresponding to the target static installation information is determined, whether the second resource verification information is identical to the second resource verification information is judged, if the second resource verification information is identical to the first resource verification information, the target static installation information is determined to pass through resource validity verification, and the operation of loading the target static installation information through a target application program is executed; if the second resource verification information is different from the first resource verification information, determining that the target static installation information does not pass the resource validity verification, and stopping loading the target static installation information.
S240, running the target application program based on the target static resource.
The technical scheme of the embodiment of the invention is that the target installation package of the target application program is received; installing the target application program according to the source code, the installation safety is improved by using the source code installation, and the installation speed and the installation stability can be improved; responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, loading the target static resource according to the static resource installation information, and loading the target static resource through the static resource installation information to realize safe loading of the static resource, thereby further improving installation safety; the target application program is operated based on the target static resource, and after the application program resource is loaded, the target application program is directly operated without waiting for downloading the static resource, so that the installation speed and the starting speed of the application program are improved, the technical problem of data leakage in the installation and starting processes of the application program in the prior art is solved, the installation and starting of the mobile application program are realized, the static resource leakage of the mobile application program is prevented, and the risk of resource leakage is reduced.
Example III
Fig. 3 is a flowchart of another method for starting secure installation of a mobile application according to the second embodiment of the present invention, where the relationship between the present embodiment and the above embodiment is a specific method for generating a target installation package. As shown in fig. 3, the method for starting secure installation of the mobile application program includes:
s310, acquiring a target static resource and source code of a target application program.
Specifically, before installing the target application program, the target static resource and the source code need to be packaged into a target installation package, so as to obtain the target static resource and the source code of the target application program. The method comprises the steps of acquiring a target static resource and a source code in a server, and packaging the target static resource and the source code in the server.
S320, encrypting the target static resource according to a preset encryption method, and determining the static resource decryption information and the first resource verification information.
The encryption method may be a method set in advance for encrypting the target static resource.
Specifically, the target static resource is encrypted and compressed through a preset encryption method, and static resource decryption information and first resource verification information corresponding to the target static resource are determined.
S330, determining static resource installation information according to the static resource decryption information and the first resource verification information.
Specifically, the static resource decryption information and the first resource verification information are combined to determine static resource installation information.
S340, issuing the target installation package.
Specifically, the installation package of the target application program is requested at the mobile terminal, and the target installation package is issued.
In the embodiment of the invention, the target static resource and the source code of the target application program are acquired; encrypting the target static resources according to a preset encryption method, determining static resource decryption information and first resource verification information, and encrypting the target static resources before generating a target installation package so as to prevent resource leakage in the installation process; determining static resource installation information according to the static resource decryption information and the first resource verification information; determining a target installation package of the target application program according to the target static resource and the source code; and issuing the target installation package. The method and the device solve the technical problem that data leakage exists in the installation and starting processes of the application programs in the prior art, realize the installation and starting of the mobile application programs, prevent static resource leakage of the mobile application programs, and reduce the risk of resource leakage.
Example IV
Fig. 4 is a schematic structural diagram of a secure installation starting device for a mobile application according to a third embodiment of the present invention. As shown in fig. 4, the apparatus includes: a resource acquisition module 410, an application installation module 420, an application loading module 430, and an application execution module 440, wherein,
a resource acquisition module 410, configured to receive a target installation package of a target application program; the target installation package comprises a target static resource and source code;
an application program installation module 420, configured to install a target application program according to the source code;
an application loading module 430, configured to request static resource installation information in response to a start trigger operation for a target application, and load the target static resource according to the static resource installation information;
an application running module 440 for running the target application based on the target static resource.
The technical scheme of the embodiment of the invention is that the target installation package of the target application program is received; installing the target application program according to the source code, the installation safety is improved by using the source code installation, and the installation speed and the installation stability can be improved; responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, loading the target static resource according to the static resource installation information, and loading the target static resource through the static resource installation information to realize safe loading of the static resource, thereby further improving installation safety; the target application program is operated based on the target static resource, and after the application program resource is loaded, the target application program is directly operated without waiting for downloading the static resource, so that the installation speed and the starting speed of the application program are improved, the technical problem of data leakage in the installation and starting processes of the application program in the prior art is solved, the installation and starting of the mobile application program are realized, the static resource leakage of the mobile application program is prevented, and the risk of resource leakage is reduced.
Optionally, the application loading module is specifically configured to:
sending a resource decoding request through the target application program;
and acquiring the static resource installation information according to the resource decoding request.
Optionally, the application loading module is specifically further configured to:
the static resource installation information includes static resource decryption information and first resource verification information.
Optionally, the application loading module is specifically further configured to:
reading the target static resources through the target application program and the static resource installation information, and determining target static installation information;
and loading the target static installation information through a target application program.
Optionally, the application loading module is specifically further configured to:
invoking a resource decryption interface of the target application program to analyze the static resource decryption information to obtain a static resource decompression password;
and decompressing the target static resources through the static resource decompression codes to determine target static installation information.
Optionally, the system further comprises a file verification module and a resource verification module; wherein:
the file verification module is used for acquiring second resource verification information of the target static installation information;
the resource verification module is configured to determine that the target static installation information passes the resource validity verification if the second resource verification information is the same as the first resource verification information, and perform an operation of loading the target static installation information through the target application program.
Optionally, the system further comprises a resource preparation module, a resource encryption module, an information integration module, an installation package generation module and an installation package issuing module; wherein:
the resource preparation module is used for acquiring a target static resource and a source code of a target application program;
the resource encryption module is used for encrypting the target static resource according to a preset encryption method and determining static resource decryption information and first resource verification information;
the information integration module is used for determining static resource installation information according to the static resource decryption information and the first resource verification information;
the installation package generation module is used for determining a target installation package of a target application program according to the target static resource and the source code;
the installation package issuing module is used for issuing the target installation package.
The device for starting the safe installation of the mobile application program provided by the embodiment of the invention can execute the method for starting the safe installation of the mobile application program provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
Example five
Fig. 5 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 5, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as a secure installation initiation method for mobile applications.
In some embodiments, the secure installation initiation method of the mobile application may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the secure installation initiation method of the mobile application described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the secure installation initiation method of the mobile application in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
Example six
The present embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a secure installation initiation method of a mobile application as provided by any embodiment of the present invention, the method comprising:
receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code;
installing a target application program according to the source code;
responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, and loading the target static resource according to the static resource installation information;
and running the target application program based on the target static resource.
The computer storage media of embodiments of the invention may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium may be, for example, but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present invention may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
It will be appreciated by those of ordinary skill in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, they may be centralized on a single computing device, or distributed over a network of computing devices, or they may alternatively be implemented in program code executable by a computer device, such that they are stored in a memory device and executed by the computing device, or they may be separately fabricated as individual integrated circuit modules, or multiple modules or steps within them may be fabricated as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. A secure installation initiation method for a mobile application, comprising:
receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code;
installing a target application program according to the source code;
responding to a starting triggering operation aiming at a target application program, requesting static resource installation information, and loading the target static resource according to the static resource installation information;
and running the target application program based on the target static resource.
2. The method of claim 1, wherein the requesting static resource installation information comprises:
sending a resource decoding request through the target application program;
and acquiring the static resource installation information according to the resource decoding request.
3. The method of claim 1, wherein the static resource installation information includes static resource decryption information and first resource verification information.
4. The method of claim 1, wherein loading the target static resource according to the static resource installation information comprises:
reading the target static resources through the target application program and the static resource installation information, and determining target static installation information;
and loading the target static installation information through a target application program.
5. The method of claim 4, wherein the reading the target static resource via the target application and the static resource installation information, determining target static installation information, comprises:
invoking a resource decryption interface of the target application program to analyze the static resource decryption information to obtain a static resource decompression password;
and decompressing the target static resources through the static resource decompression codes to determine target static installation information.
6. The method of claim 4, further comprising, prior to said loading said target static installation information by a target application:
acquiring second resource verification information of the target static installation information;
and if the second resource verification information is the same as the first resource verification information, determining that the target static installation information passes the resource validity verification, and executing the operation of loading the target static installation information through the target application program.
7. The method of claim 1, further comprising, prior to said receiving the target installation package for the target application:
acquiring a target static resource and a source code of a target application program;
encrypting the target static resource according to a preset encryption method, and determining static resource decryption information and first resource verification information;
determining static resource installation information according to the static resource decryption information and the first resource verification information;
determining a target installation package of the target application program according to the target static resource and the source code;
and issuing the target installation package.
8. A secure installation device for a mobile application, the secure installation device being applied to a mobile terminal and comprising:
the resource acquisition module is used for receiving a target installation package of a target application program; the target installation package comprises a target static resource and source code;
the application program installation module is used for installing the target application program according to the source code;
the application program loading module is used for responding to the starting triggering operation aiming at the target application program, requesting static resource installation information and loading the target static resource according to the static resource installation information;
and the application program running module is used for running the target application program based on the target static resource.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the secure installation method of the mobile application of any one of claims 1-6.
10. A computer readable storage medium storing computer instructions for causing a processor to perform the method of secure installation of a mobile application of any one of claims 1-6.
CN202311114890.4A 2023-08-30 2023-08-30 Secure installation starting method, device, equipment and medium for mobile application program Pending CN117077125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311114890.4A CN117077125A (en) 2023-08-30 2023-08-30 Secure installation starting method, device, equipment and medium for mobile application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311114890.4A CN117077125A (en) 2023-08-30 2023-08-30 Secure installation starting method, device, equipment and medium for mobile application program

Publications (1)

Publication Number Publication Date
CN117077125A true CN117077125A (en) 2023-11-17

Family

ID=88702202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311114890.4A Pending CN117077125A (en) 2023-08-30 2023-08-30 Secure installation starting method, device, equipment and medium for mobile application program

Country Status (1)

Country Link
CN (1) CN117077125A (en)

Similar Documents

Publication Publication Date Title
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN109711178B (en) Key value pair storage method, device, equipment and storage medium
US20230315692A1 (en) File sharing method, apparatus, and system
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN111400743A (en) Transaction processing method and device based on block chain network, electronic equipment and medium
CN112948138A (en) Method and device for processing message
CN113992345B (en) Webpage sensitive data encryption and decryption method and device, electronic equipment and storage medium
CN116244682A (en) Database access method, device, equipment and storage medium
CN116126380A (en) Firmware upgrading method and device, electronic equipment and storage medium
CN117077125A (en) Secure installation starting method, device, equipment and medium for mobile application program
CN115291973A (en) Method and device for connecting database by application on cloud, electronic equipment and storage medium
CN115529186A (en) SSL certificate unloading method, device and system based on soft load balancing
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN110262756B (en) Method and device for caching data
CN114024780B (en) Node information processing method and device based on Internet of things equipment
CN114996169B (en) Device diagnosis method, device, electronic device, and storage medium
CN115622794B (en) Encryption and decryption method, device, equipment and storage medium
CN111885006B (en) Page access and authorized access method and device
CN110430256B (en) Method, device and computer system for pushing transaction message
CN114428967A (en) Data transmission method, device, equipment and storage medium
CN115238310A (en) Data encryption and decryption method, device, equipment and storage medium
CN117061502A (en) File transmission method, device, equipment and storage medium
CN115794165A (en) Application upgrading method and device, EPS and medium
CN115801237A (en) Information encryption/decryption device, information encryption method, and information decryption method
CN116094835A (en) Service data encryption method, service data decryption method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination