WO2017071207A1 - Procédé d'installation d'application, appareil correspondant, et système d'installation d'application - Google Patents

Procédé d'installation d'application, appareil correspondant, et système d'installation d'application Download PDF

Info

Publication number
WO2017071207A1
WO2017071207A1 PCT/CN2016/084084 CN2016084084W WO2017071207A1 WO 2017071207 A1 WO2017071207 A1 WO 2017071207A1 CN 2016084084 W CN2016084084 W CN 2016084084W WO 2017071207 A1 WO2017071207 A1 WO 2017071207A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
verification
security
application server
installation
Prior art date
Application number
PCT/CN2016/084084
Other languages
English (en)
Chinese (zh)
Inventor
何小兵
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017071207A1 publication Critical patent/WO2017071207A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Definitions

  • the present invention relates to the technical field of information security, and in particular, to an application installation method, a related device, and an application installation system.
  • the technical problem to be solved by the embodiments of the present invention is to provide an application installation method, a related device, and an application installation system, so as to improve the security of the user installation application.
  • the first aspect of the embodiments of the present invention provides an application installation method, where the method includes:
  • a second aspect of the embodiments of the present invention provides an application installation method, where the method includes:
  • the security application server receives the verification request that carries the identification information sent by the terminal;
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • a third aspect of the embodiments of the present invention provides a mobile terminal, where the mobile terminal includes:
  • An obtaining unit configured to obtain identification information of an installation package of an application to be installed
  • a sending unit configured to send, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request;
  • an execution unit configured to perform an installation operation for the to-be-installed application if receiving the verification pass message sent by the security application server in response to the verification request.
  • a fourth aspect of the embodiments of the present invention provides a security application server, where the security application server includes:
  • a receiving unit configured to receive a verification request that carries the identifier information sent by the terminal
  • a verification unit configured to perform security verification on the identifier information carried in the verification request
  • a sending unit configured to send a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application, if the verification is passed.
  • the fourth aspect of the embodiments of the present invention further provides an application installation system, including a mobile terminal provided by the third aspect of the embodiment of the present invention, and a security application server provided by the fourth aspect of the embodiment of the present invention. ,among them:
  • the mobile terminal is configured to obtain the identification information of the installation package of the application to be installed, and send the verification request that carries the identification information to the security application server, where the verification request is used to instruct the security application server to verify the verification The identification information carried in the request is verified for security;
  • the security application server is configured to receive an authentication request that carries the identifier information sent by the terminal, and perform security verification on the identifier information carried in the verification request;
  • the terminal sends a verification pass message to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the mobile terminal is further configured to: if receiving the verification pass message sent by the security application server in response to the verification request, perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information acquired by the mobile terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal.
  • the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether the application is malicious after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 1 is a schematic flow chart of an application installation method according to a first embodiment of the present invention
  • FIG. 2 is a schematic flow chart of an application installation method according to a second embodiment of the present invention.
  • FIG. 3 is a schematic flow chart of an application installation method according to a third embodiment of the present invention.
  • FIG. 4 is a schematic flow chart of an application installation method according to a fourth embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of an application installation method according to a fifth embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of an application installation method according to a sixth embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to a seventh embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a mobile terminal according to an eighth embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a security application server provided by a ninth embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of a security application server according to a tenth embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of an application installation system according to a tenth embodiment of the present invention.
  • the mobile terminal may be any device having communication and storage functions, such as a tablet computer, a mobile phone, an e-reader, a personal computer (PC), a notebook computer, an in-vehicle device, a network television, a wearable device, etc., having network functions. Smart device.
  • FIG. 1 is a schematic flowchart of an application installation method according to a first embodiment of the present invention.
  • the application installation method described in FIG. 1 is mainly described from the terminal side, as shown in FIG. 1 .
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the Install Pack is a collection of self-extracting files, including all the files installed by the software, running the installation package (executable file), and releasing all the files of the software to the hard disk. On, complete the work of modifying the registry, modifying system settings, creating shortcuts, and so on.
  • the installation package can be implemented only when it is installed on the terminal.
  • An installation package installed on the terminal is called an application.
  • the application Application, referred to as APP
  • APP can include various services used by users on the network, such as applications and web pages. Videos, novels, music, games, news, shopping, and email.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the package name of the installation package of the installation application matches the package name of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server, and the package name of the installation package of the application to be installed and the pre-stored in the security application server
  • the package name of the authorized installation package corresponding to the application to be installed matches
  • the verification information of the installed installation package matches the verification information of the authorized installation package of the above-mentioned application to be installed.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the terminal stops the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the terminal may perform the following steps before sending the verification request carrying the identifier information to the security application server:
  • the execution of the verification request to send the identifier information to the secure application server is triggered.
  • the download source of the installation package of the application to be installed may include an authorized download source and an unauthorized download source, and the authorized download source is downloaded to the security application server for the installation package, and the unauthorized download source is the installation package.
  • third parties The application server, also known as the third-party application store (APPSTORE), refers to an electronic application store that provides free (charged) application search and download services for the terminal, and may include third-party application markets, such as the application market, the Android market, and the like. Browsers can be included, and some browsers currently provide search and download capabilities for applications.
  • the quality of the application installed on the Android system is uneven due to the openness of the Android system. If the installation package of the application to be installed is downloaded to a third-party application server other than the security application server, the installation package exists. Security risks.
  • the installation package of the application on the Android system is generally called an apk installation package.
  • Each apk installation package is packaged by multiple files, including a Manifest file: AndroidManifest.xml file.
  • the manifest file must exist, located in the root directory of the entire apk installation package, providing the necessary information about the application required by the Android system, where the necessary information is before the system runs any code of the application. Information that must be owned.
  • the manifest consists of a root tag ⁇ Manifest> with a Package property that sets the installation package.
  • Package is the unique identifier of the application installation package recorded in the AndroidManifest.xml file. If the package of the application is duplicated, it cannot be The release is successful, therefore, the unique identification package of the application apk installation package can be read from the AndroidManifest.xml file of the APK installation package of the Android system.
  • Activity is a component responsible for interacting with the user.
  • each application is built based on an activity, that is, each application corresponds to an Activity, and in the embodiment of the present invention, the Activity is the current apk.
  • the application corresponding to the installation package can obtain the Activity corresponding to the apk installation package through the package of the current apk installation package, wherein an apk installation package can include multiple activities, and when an application is created, the system interface is first created.
  • An Activity class is a component responsible for interacting with the user.
  • AmS Activity Management Service
  • AmS Activity Management Service
  • mToken that is, which process is used to obtain the current Activity through HistoryRecord.
  • the download source that is created to identify the installation package of the application to be installed.
  • the terminal identifies that the download source of the installation package of the application to be installed is unauthorized. If the user confirms that the installation package of the download source is an unauthorized download source, the user confirms that the installation action triggers execution of the verification to send the identification information to the secure application server. request.
  • the terminal performs an installation operation for the to-be-installed application.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the security application server, the terminal directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 2 is a schematic flowchart of an application installation method according to a second embodiment of the present invention.
  • the application installation method described in FIG. 2 is mainly described from the side of the security application server, such as As shown in FIG. 2, the application installation method may include the following steps:
  • the security application server receives the verification request that carries the identifier information sent by the terminal.
  • the verification request is used to instruct the security application server to verify the identification information carried in the verification request and the identification information of the authorized installation package corresponding to the pre-stored application to be installed.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server enters the identifier information carried in the verification request.
  • row security verification is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the security application server sends a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 3 is a schematic flowchart of an application installation method according to a third embodiment of the present invention.
  • the application installation method described in FIG. 3 is mainly described from the security application server side and the terminal side.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives an authentication request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the verification application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server sends the identifier of the to-be-installed application carried in the verification request sent by the terminal to the identifier of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server.
  • the information is verified. If the identification information of the application to be installed completely matches the identification information of the authorized installation package corresponding to the application to be installed that is pre-existing in the security application server, the security application server sends a verification pass message to the terminal, and the terminal receives the information. The verification passes the message to perform an installation operation for the application to be installed.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application. And receiving, by the terminal, the verification failure message sent by the security application server in response to the verification request, stopping the installation operation of the to-be-installed application.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 4 is a schematic flowchart of an application installation method according to a fourth embodiment of the present invention.
  • the application installation method described in FIG. 4 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the download source of the installation package of the application to be installed may include an authorized download source and an unauthorized download source, and the authorized download source is downloaded to the security application server for the installation package, and the unauthorized download source is the installation package.
  • the third-party application server also known as the third-party application store (APPSTORE) refers to an electronic application store that provides free (charge) application search and download services for the terminal, and may include a third-party application market, for example.
  • APPSTORE refers to an electronic application store that provides free (charge) application search and download services for the terminal, and may include a third-party application market, for example.
  • Such as the application market, the Android market, etc. can also include a browser, and currently some browsers can also provide application search and download functions.
  • the quality of the application installed on the Android system is uneven due to the openness of the Android system. If the installation package of the application to be installed is downloaded to a third-party application server other than the security application server, the installation package exists. Security risks.
  • the triggering terminal performs the sending of the verification request carrying the identifier information to the security application server.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the installation source of the download source is an unauthorized download source, Then, the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives an authentication request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, The security application server matches the verification information of the installation package of the installed application with the pre-stored authorization verification information.
  • the verification application server sends an authentication pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application pre-existing in the security application server, and the security application server sends a verification pass message to the terminal.
  • the terminal performs an installation operation for the to-be-installed application if the terminal receives the verification pass message sent by the security application server in response to the verification request.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 5 is a schematic flowchart of an application installation method according to a fifth embodiment of the present invention.
  • the application installation method described in FIG. 5 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the triggering terminal performs the sending of the verification request carrying the identifier information to the security application server.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the download source is an unauthorized download.
  • the installation package of the source the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the terminal sends, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server receives the verification request that carries the identifier information sent by the terminal.
  • the security application server performs security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the security application server sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The to be installed Installation operation used.
  • the terminal stops the installation operation of the to-be-installed application if the terminal receives the verification failure message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 6 is a schematic flowchart of an application installation method according to a sixth embodiment of the present invention.
  • the application installation method described in FIG. 6 is mainly described from the security application server and the terminals.
  • the application installation method may include the following steps:
  • the terminal acquires identifier information of an installation package of the application to be installed.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the terminal identifies a download source of the installation package of the application to be installed.
  • the terminal if the terminal identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the security application server, the terminal directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the terminal and the identification information of the authorized installation package corresponding to the pre-stored application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • the device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention.
  • the device embodiment of the present invention is used to perform the method for implementing the first to sixth embodiments of the present invention.
  • Only parts related to the embodiment of the present invention are shown, and the specific technical details are not disclosed. Please refer to Embodiment 1 to Embodiment 6 of the present invention.
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to a seventh embodiment of the present invention.
  • the mobile terminal may include:
  • the obtaining unit 701 is configured to obtain identification information of an installation package of an application to be installed.
  • the sending unit 702 is configured to send, to the security application server, an authentication request that carries the identifier information, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the security application server matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes: a package name of an installation package of the application to be installed, and verification information of the installation package of the application to be installed, where the security application server performs security verification on the identifier information carried in the verification request.
  • the specific implementation is:
  • the security application server matches the package name of the installation package of the installation application with the pre-stored authorization package name; and the security application service is matched when the package name of the installation package of the application to be installed matches the pre-stored authorization package name.
  • the authentication information of the installation package of the installation application is matched with the pre-stored authorization verification information.
  • the executing unit 703 is configured to perform an installation operation for the to-be-installed application if receiving the verification pass message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server.
  • the security application server sends a verification pass message to the terminal, and the terminal receives the verification pass message, and the execution unit 703 performs An installation operation for the application to be installed.
  • the application installer is Android.
  • An application provided by the system to install software.
  • the mobile terminal further includes:
  • the identifying unit 704 is configured to identify a download source of the installation package of the application to be installed.
  • the triggering unit 705 is configured to: if the identified download source is an unauthorized download source, trigger the execution of the verification request to send the identifier information to the secure application server.
  • the identification unit 704 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms installation of the download source as an unauthorized download source, The packet is triggered by the user, and the triggering unit 705 performs the verification request to send the identifier information to the secure application server.
  • the executing unit 703 is further configured to: if the identified download source is an authorized download source, the executing unit 703 performs an installation operation for the to-be-installed application.
  • the executing unit 703 directly performs the installation operation of the application to be installed.
  • the mobile terminal further includes:
  • a stopping unit configured to stop the installation operation of the to-be-installed application if the mobile terminal receives the verification failure message sent by the security application server.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed.
  • the identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops the unit to stop. Perform an installation operation for the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 8 is a schematic structural diagram of a mobile terminal according to an eighth embodiment of the present invention.
  • the mobile terminal in the embodiment of the present invention includes at least one processor 801, such as a CPU, at least one receiver 803, at least one memory 804, at least one transmitter 805, and at least one communication bus 802.
  • the communication bus 802 is used to implement connection communication between these components.
  • the receiver 803 and the transmitter 805 of the device in the embodiment of the present invention may be a wired sending port, or may be a wireless device, for example, including an antenna device, for performing signaling or data communication with other node devices.
  • the memory 804 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 804 can also optionally be at least one storage device located remotely from the aforementioned processor 801.
  • a set of program codes is stored in the memory 804, and the processor 801 is configured to call program code stored in the memory for performing the following operations:
  • the processor 801 acquires identification information of an installation package of the application to be installed.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the processor 801 sends a verification request that carries the identifier information to the security application server, where the verification request is used to instruct the security application server to perform security verification on the identifier information carried in the verification request.
  • the package name of the installation package of the application to be installed is matched with the package name of the authorized installation package corresponding to the to-be-installed application pre-stored on the security application server, and the package name of the installation package of the application to be installed is pre-stored in the security application service.
  • the verification information of the installation package of the application to be installed matches the verification information of the authorized installation package of the application to be installed.
  • the processor 801 receives the verification pass message sent by the security application server, the installation operation for the to-be-installed application is performed.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application pre-existing in the security application server, and the security application server sends the identifier to the terminal. Sending a verification pass message, the terminal receiving the verification pass message, and performing an installation operation for the to-be-installed application.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the processor 801 receives the verification failure message sent by the security application server, the installation operation of the to-be-installed application is stopped.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the processor 801 may perform the following steps before sending the verification request carrying the identifier information to the security application server:
  • the processor 801 identifies a download source of the installation package of the application to be installed
  • the download source identified by the processor 801 is an unauthorized download source, the execution of the verification request carrying the identifier information is sent to the secure application server.
  • the processor 801 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms that the download source is an unauthorized download source installation. And the user confirms that the installation action triggers execution of the verification request to send the identification information to the security application server.
  • the processor 801 performs an installation operation for the to-be-installed application.
  • the processor 801 if the processor 801 identifies that the download source of the installation package of the application to be installed is an authorized download source, that is, downloads to the secure application server, the processor 801 directly performs the installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine the application to be installed. Whether it is a malicious application, and then returns a terminal verification message, and the terminal performs an installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improve Application installation security.
  • FIG. 9 is a schematic structural diagram of a security application server according to a ninth embodiment of the present invention.
  • the security application server may include at least:
  • the receiving unit 901 is configured to receive an authentication request that carries the identifier information.
  • the verification unit 902 is configured to perform security verification on the identifier information carried in the verification request.
  • the verification unit 902 is specifically configured to match the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, Then, the verification unit passes the verification; if the identification information carried in the verification request does not match the pre-stored authorization identification information, the verification unit fails to verify.
  • the identifier information includes: a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed;
  • the verification unit specifically matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, the application is to be installed.
  • the verification information of the installation package matches the pre-stored authorization verification information.
  • the sending unit 903 is configured to send, by the security application server, a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the security application server verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-stored in the security application server, if the application to be installed is The identification information completely matches the identification information of the authorized installation package corresponding to the to-be-installed application that is pre-existing in the security application server, and the security application server sends an authentication pass message to the terminal, and the terminal receives the verification pass message, and performs the The installation operation of the application to be installed.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the sending unit 903 is further configured to send the terminal to the terminal if the verification fails. Sending a verification failure message to notify the terminal to stop the installation operation of the application to be installed.
  • the security application server verifies the identification information of the to-be-installed application carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the application to be installed is to be installed The identification information does not completely match the identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the security application server sends a verification failure message to the terminal, and the terminal receives the verification failure message, and stops executing the The installation operation of the application to be installed.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the message is that the terminal performs the installation operation or stops the installation according to the verification message, which solves the technical problem that the user can identify whether it is a malicious application after the installation package is installed in the prior art, and is beneficial to improving the security of the application installation.
  • FIG. 10 is a schematic structural diagram of a security application server provided by an eleventh embodiment of the present invention.
  • the secure application server in the embodiment of the present invention includes at least one processor 1001, such as a CPU, at least one receiver 1003, at least one memory 1004, at least one transmitter 1005, and at least one communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the receiver 1003 and the transmitter 1005 of the device in the embodiment of the present invention may be wired transmission ports, or may be wireless devices, for example, including antenna devices, for performing signaling or data communication with other node devices.
  • the memory 1004 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • the memory 1004 can also optionally be at least one storage device located remotely from the aforementioned processor 1001.
  • a set of program codes is stored in the memory 1004, and the processor 1001 is configured to call program codes stored in the memory for performing the following operations:
  • the processor 1001 receives the verification request that carries the identification information sent by the terminal.
  • the processor 1001 performs security verification on the identifier information carried in the verification request.
  • the identifier information carried by the processor 1001 in the verification request and the pre-stored authorization identification letter If the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; if the identifier information carried in the verification request does not match the pre-stored authorization identifier information, The verification failed.
  • the identifier information includes: a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed;
  • the processor 1001 matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; where the package name of the installation package of the application to be installed matches the pre-stored authorization package name, the processor 1001
  • the verification information of the installation package of the application to be installed matches the pre-stored authorization verification information.
  • the processor 1001 sends a verification pass message to the terminal to trigger the terminal to perform an installation operation for the to-be-installed application.
  • the processor 1001 verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the pre-installed application, if the identification information of the application to be installed and the pre-existence The identifier information of the authorized installation package corresponding to the to-be-installed application of the security application server is completely matched, the processor 1001 sends a verification pass message to the terminal, and the terminal receives the verification pass message, and performs an installation operation for the to-be-installed application. .
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the processor 1001 sends a verification failure message to the terminal to notify the terminal to stop the installation operation on the to-be-installed application.
  • the processor 1001 verifies the identification information of the application to be installed carried in the verification request sent by the terminal, and the identification information of the authorized installation package corresponding to the to-be-installed application pre-installed by the security application server, if the identifier of the application to be installed is to be installed.
  • the information does not completely match the identification information of the authorized installation package corresponding to the pre-stored application, the processor 1001 sends an authentication failure message to the terminal, and the terminal receives the verification failure message, and stops executing the application for the to-be-installed application. Installation operation.
  • the security application server obtains the identification information acquired by the mobile terminal and pre-stores The identification information of the authorized installation package corresponding to the to-be-installed application is verified to determine whether the application to be installed is a malicious application, and then returns a terminal verification message, and the terminal performs an installation operation or stops the installation according to the verification message, thereby solving the existing
  • the user can identify the technical problem of the malicious application after the installation package is installed, which is beneficial to improve the security of the application installation.
  • FIG. 11 is a schematic structural diagram of an application installation system according to an embodiment of the present invention.
  • the application installation system may include: a mobile terminal 1101 and a security application server 1102.
  • the mobile terminal 1101 may be the mobile terminal as described in FIG. 7 or FIG. 8 above.
  • the security application server 1102 may be the security application server as described in FIG. 9 or FIG. 10, specifically:
  • the mobile terminal 1101 is configured to obtain the identification information of the installation package of the application to be installed, and send the verification request that carries the identification information to the security application server, where the verification request is used to instruct the security application server to request the verification The identification information carried in the security verification.
  • the security application server 1102 is configured to receive an authentication request that carries the identifier information sent by the terminal, perform security verification on the identifier information carried in the verification request, and send a verification pass message to the terminal if the verification succeeds.
  • the terminal is triggered to perform an installation operation for the to-be-installed application.
  • the specific implementation manner in which the security application server 1102 performs security verification on the identifier information carried in the verification request is:
  • the security application server 1102 matches the identifier information carried in the verification request with the pre-stored authorization identifier information; if the identifier information carried in the verification request completely matches the pre-stored authorization identifier information, the verification succeeds; If the identifier information carried in the verification request does not match the pre-stored authorization identifier information, the verification fails.
  • the identifier information includes a package name of an installation package of the application to be installed and verification information of the installation package of the application to be installed.
  • the specific implementation manner for the security application server 1102 to perform security verification on the identifier information carried in the verification request is:
  • the security application server 1102 matches the package name of the installation package of the application to be installed with the pre-stored authorization package name; if the package name of the installation package of the application to be installed matches the pre-stored authorization package name, The security application server 1102 matches the verification information of the installation package of the application to be installed with the pre-stored authorization verification information.
  • the security application server 1102 performs the identification information of the application to be installed carried in the verification request sent by the mobile terminal 1101, and the authorization identification information of the authorized installation package corresponding to the application to be installed stored in the security application server 1102. It is verified that the security application server 1102 sends an authentication pass message to the mobile terminal 1101 if the identification information of the application to be installed completely matches the authorization identification information of the authorized installation package corresponding to the to-be-installed application of the security application server.
  • the mobile terminal 1101 is further configured to: if receiving the verification pass message sent by the security application server in response to the verification request, perform an installation operation for the to-be-installed application.
  • the Android system in addition to the application that comes with the system, other installation packages of new applications that need to be installed must be installed into the Android system through the application installer, and the application installer is provided for the Android system. Install the software application.
  • the mobile terminal 1101 is further configured to identify a download source of the installation package of the to-be-installed application; if the identified download source is an unauthorized download source, triggering execution of the sending to the secure application server The verification request of the identification information.
  • the mobile terminal 1101 if the mobile terminal 1101 recognizes that the download source of the installation package of the application to be installed is an unauthorized download source, the user confirms whether to install, and if the user confirms installation of the download source as an unauthorized download source, The packet, the user's confirmation installation action triggers the mobile terminal 1101 to execute the verification request to send the identification information to the security application server.
  • the mobile terminal 1101 is further configured to perform an installation operation for the to-be-installed application if the identified download source is an authorized download source.
  • the security application server 1102 is further configured to send a verification failure message to the mobile terminal 1101 to notify the mobile terminal 1101 to stop the installation operation on the to-be-installed application. ;
  • the mobile terminal 1101 is further configured to stop the installation operation of the to-be-installed application if receiving the verification failure message sent by the security application server in response to the verification request.
  • the security application server verifies the identification information acquired by the mobile terminal and the pre-stored identification information of the authorized installation package corresponding to the to-be-installed application to determine whether the application to be installed is a malicious application, and then returns to the terminal verification.
  • the terminal performs installation operation according to the verification message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Les modes de réalisation de la présente invention concernent un procédé d'installation d'application, un appareil correspondant et un système d'installation d'application, comprenant les étapes suivantes : acquérir des informations d'identification d'un paquet d'installation d'une application à installer; envoyer une demande de vérification contenant lesdites informations d'identification à un côté serveur d'application sécurisé, la demande de vérification étant utilisée pour ordonner au côté serveur d'application sécurisé de mettre en œuvre une vérification de sécurité des informations d'identification dans la demande de vérification; en cas de réception d'un message de réussite de vérification envoyé par le côté serveur d'application sécurisé en réponse à la demande de vérification, exécuter les opérations d'installation pour l'application à installer. La solution technique selon les modes de réalisation de la présente invention est avantageuse pour améliorer la sécurité d'une application installée par un utilisateur.
PCT/CN2016/084084 2015-10-26 2016-05-31 Procédé d'installation d'application, appareil correspondant, et système d'installation d'application WO2017071207A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510704862.7 2015-10-26
CN201510704862.7A CN105354488B (zh) 2015-10-26 2015-10-26 一种应用安装方法、相关装置及应用安装系统

Publications (1)

Publication Number Publication Date
WO2017071207A1 true WO2017071207A1 (fr) 2017-05-04

Family

ID=55330459

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084084 WO2017071207A1 (fr) 2015-10-26 2016-05-31 Procédé d'installation d'application, appareil correspondant, et système d'installation d'application

Country Status (2)

Country Link
CN (1) CN105354488B (fr)
WO (1) WO2017071207A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815692A (zh) * 2017-11-20 2019-05-28 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354488B (zh) * 2015-10-26 2018-06-15 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装系统
CN107465646B (zh) * 2016-06-02 2019-02-26 腾讯科技(深圳)有限公司 一种应用下载方法、系统及相关设备
CN106325928B (zh) * 2016-08-22 2020-02-07 北京光年无限科技有限公司 一种应用于智能机器人的应用接入方法及智能机器人
CN106487793A (zh) * 2016-10-19 2017-03-08 广东欧珀移动通信有限公司 应用安装方法及装置
CN107016279A (zh) * 2016-12-13 2017-08-04 蔚来汽车有限公司 应用安装方法和应用安装系统
CN106682491B (zh) * 2017-01-23 2020-06-16 百度在线网络技术(北京)有限公司 应用下载方法和装置
CN107330321A (zh) * 2017-07-21 2017-11-07 广东欧珀移动通信有限公司 一种应用安装方法、移动终端和计算机可读存储介质
CN107368735B (zh) * 2017-07-24 2020-03-20 Oppo广东移动通信有限公司 一种应用安装方法、移动终端和计算机可读存储介质
CN108460273B (zh) * 2017-12-27 2022-10-14 中国银联股份有限公司 一种终端的应用管理方法、应用服务器及终端
CN109710280B (zh) * 2018-12-27 2022-04-15 上海掌门科技有限公司 一种用于在用户设备上安装应用的方法与设备
WO2021203336A1 (fr) * 2020-04-08 2021-10-14 Qualcomm Incorporated Mise à jour de micrologiciel sur l'air pour dispositif configuré pour communiquer sans fil des données de fonctionnement de véhicule
CN113873075B (zh) * 2021-09-18 2023-01-10 深圳市爱都科技有限公司 一种通知消息管理方法、系统及移动终端、存储介质
CN116400935B (zh) * 2023-06-09 2023-08-18 贵州爱信诺航天信息有限公司 一种应用安装系统及方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (zh) * 2011-07-11 2011-11-02 华为技术有限公司 验证标识信息的方法及终端
CN104133701A (zh) * 2014-07-31 2014-11-05 广州金山网络科技有限公司 一种应用程序安装方法和装置
CN104219312A (zh) * 2014-09-05 2014-12-17 无锡天脉聚源传媒科技有限公司 一种安装程序的方法及装置
CN105354488A (zh) * 2015-10-26 2016-02-24 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446106A (zh) * 2010-09-30 2012-05-09 联想(北京)有限公司 应用程序的安装管理方法、服务器和终端
CN103577206A (zh) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 一种应用软件的安装方法和装置
CN103235906B (zh) * 2013-03-27 2016-01-13 广东欧珀移动通信有限公司 一种应用程序加密、解密方法及加密、解密装置
CN103632089A (zh) * 2013-12-16 2014-03-12 北京网秦天下科技有限公司 应用安装包的安全检测方法、装置和系统
CN104021339A (zh) * 2014-06-10 2014-09-03 北京奇虎科技有限公司 移动终端的安全支付方法及装置
CN104134143B (zh) * 2014-07-15 2017-05-03 北京奇付通科技有限公司 移动支付安全的保护方法、装置及云服务器
CN104796491A (zh) * 2015-05-07 2015-07-22 北京智膜科技有限公司 一种服务器和基于一次扫码的软件下载及注册方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231746A (zh) * 2011-07-11 2011-11-02 华为技术有限公司 验证标识信息的方法及终端
CN104133701A (zh) * 2014-07-31 2014-11-05 广州金山网络科技有限公司 一种应用程序安装方法和装置
CN104219312A (zh) * 2014-09-05 2014-12-17 无锡天脉聚源传媒科技有限公司 一种安装程序的方法及装置
CN105354488A (zh) * 2015-10-26 2016-02-24 宇龙计算机通信科技(深圳)有限公司 一种应用安装方法、相关装置及应用安装系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815692A (zh) * 2017-11-20 2019-05-28 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置
CN109815692B (zh) * 2017-11-20 2023-02-10 腾讯科技(深圳)有限公司 识别安装应用的方法和装置、存储介质及电子装置

Also Published As

Publication number Publication date
CN105354488B (zh) 2018-06-15
CN105354488A (zh) 2016-02-24

Similar Documents

Publication Publication Date Title
WO2017071207A1 (fr) Procédé d'installation d'application, appareil correspondant, et système d'installation d'application
US11093981B2 (en) Smart broadcasting device
EP3716656B1 (fr) Procédé de génération de profil, procédé d'acquisition de profil, et dispositif associé et support de stockage
US10127057B2 (en) Method and apparatus for dynamically implementing application function
US10320940B1 (en) Managing generic data
CN107992308B (zh) 一种安卓终端应用程序的插件化管理方法
US8464332B2 (en) Access gateway and method for providing cloud storage service
US20130326502A1 (en) Installing applications remotely
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
US20130060890A1 (en) Apparatus and method for providing application execution using a cloud system
JP6793667B2 (ja) アプリケーションダウンロード方法及び装置
WO2015058574A1 (fr) Procédé et appareil de notification push de programme d'application étendu
TW200541286A (en) Execution of unverified programs in a wireless device operating environment
CN103491080A (zh) 信息安全保护方法及系统
JP5610654B2 (ja) 端末管理パッケージを提供する装置及び前記端末管理パッケージを受信する方法
WO2016095796A1 (fr) Procédé de mise à jour de système d'exploitation sécurisé utilisé dans un environnement d'exécution fiable
WO2024087767A1 (fr) Procédé et appareil d'installation de mise à niveau, système, dispositif électronique, et support de stockage
CN113094064A (zh) 网关软件模块升级方法、装置、设备及存储介质
US8880701B2 (en) System and method for supporting of network service
WO2022257927A1 (fr) Procédé et appareil de gravure de clé, carte de dispositif électronique et support de stockage
WO2014106391A1 (fr) Procédé, dispositif et système pour installer une application
WO2013004175A1 (fr) Procédé et appareil de mise à niveau logicielle pour dispositifs électroniques
CN115878138A (zh) 应用预下载方法、装置、计算机、存储介质
KR20120124329A (ko) 서비스 제공 장치에서 drm 서비스를 제공하는 방법 그리고 이를 위한 서비스 제공 장치 및 사용자 단말에서 drm 서비스를 제공받는 방법
WO2017107762A1 (fr) Procédé et dispositif de traçage d'application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16858651

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16858651

Country of ref document: EP

Kind code of ref document: A1