WO2020134719A1 - 移动终端及其预置应用程序的卸载方法、存储器 - Google Patents

移动终端及其预置应用程序的卸载方法、存储器 Download PDF

Info

Publication number
WO2020134719A1
WO2020134719A1 PCT/CN2019/119461 CN2019119461W WO2020134719A1 WO 2020134719 A1 WO2020134719 A1 WO 2020134719A1 CN 2019119461 W CN2019119461 W CN 2019119461W WO 2020134719 A1 WO2020134719 A1 WO 2020134719A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
user
mobile terminal
preset application
configuration file
Prior art date
Application number
PCT/CN2019/119461
Other languages
English (en)
French (fr)
Inventor
郑金国
张燕香
Original Assignee
惠州Tcl移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 惠州Tcl移动通信有限公司 filed Critical 惠州Tcl移动通信有限公司
Priority to EP19902405.0A priority Critical patent/EP3905032A4/en
Priority to US17/417,930 priority patent/US11928450B2/en
Publication of WO2020134719A1 publication Critical patent/WO2020134719A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/62Uninstallation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Definitions

  • the present application relates to the technical field of mobile terminals, and in particular, to a mobile terminal and a method and memory for uninstalling preset application programs.
  • the present application provides a mobile terminal and a method and memory for uninstalling its preset application program, which can improve the performance of the mobile terminal.
  • the present application provides a method for uninstalling a preset application program of a mobile terminal.
  • the method for uninstalling includes the following steps:
  • the preset application is a user-level application, uninstall the preset application.
  • the present application also provides a memory that stores a computer program that can be executed to implement the uninstall method described above.
  • the present application also provides a mobile terminal, the mobile terminal includes: a processor, a memory communicatively connected to the processor, the memory stores a computer program, and the computer program is implemented as above when executed The uninstall method; the processor is used to call the computer program in the memory to implement the uninstall method as described above.
  • 1 is a flowchart of a method for uninstalling a preset application program of a mobile terminal
  • FIG. 2 is another flowchart of a method for uninstalling a preset application program of a mobile terminal
  • FIG. 3 is a schematic structural diagram of a mobile terminal.
  • the method for uninstalling the preset application program of the mobile terminal in this embodiment may be applied to the Android system or the IOS system, where the mobile terminal may be a mobile electronic device such as a mobile phone, a tablet computer, a smart watch, or the like.
  • the method for uninstalling a preset application program of a mobile terminal includes the following steps:
  • step S2 Determine whether the authorization file is legal. If the authorization file is legal, proceed to step S3;
  • step S3. Determine whether the preset application is a user-level application. If the preset application is a user-level application, go to step S4;
  • the preset applications in this embodiment include a system-level application and a user-level application.
  • the system-level application is an indispensable application for the mobile terminal. If deleted, the mobile terminal cannot be used normally.
  • the user-level application is The applications that can be deleted will not affect the normal use of the mobile terminal after being deleted. Among them, user-level applications include applications developed by mobile terminal manufacturers and third-party applications.
  • the preset application Obtain the permission to uninstall the preset application through the legal authorization file, which can avoid malicious theft of the authorization file.
  • the preset application is a user-level application, it can prevent the user from deleting the system-level application by mistake and causing the mobile terminal Unavailable, so that users can customize preset applications according to their own needs, improve the performance and user experience of mobile terminals, and avoid the risks of directly rooting mobile phones.
  • step S1 the authorization file is generated by the server, the mobile terminal sends the configuration parameters to the server, and the server generates the authorization file according to the configuration parameters of the mobile terminal.
  • the authorization file includes a configuration file and a signature file.
  • step S1 includes:
  • the configuration parameters of the mobile terminal include at least the international mobile equipment identification code (International Mobile Equipment Identity (IMEI), serial number (Serial Number, SN) and model.
  • IMEI International Mobile Equipment Identity
  • serial number Serial Number
  • model the configuration parameters of the mobile terminal may also include other parameters that can identify the mobile terminal, which is not limited to IMEI, SN, and model.
  • step S12 a configuration file is generated according to the configuration parameters, and the format of the configuration file is an xml format, so that the Android mobile phone can parse it.
  • the configuration file is used to record the configuration parameters of the mobile terminal.
  • step S13 the message-digest algorithm 5 (Message-Digest Algorithm 5, MD5) to obtain summary information of the configuration file.
  • MD5 algorithm is a hash function widely used in the field of computer security to provide message integrity protection, which will not be repeated here.
  • step S14 the server in step S13 encrypts the summary information of the configuration file with the private key to obtain a signature file. Since the private key is stored in the server, it is not easy to leak, so the signature file cannot be imitated.
  • the summary information of the configuration file is encrypted by the private key of the RSA asymmetric encryption algorithm.
  • the digest information can also be encrypted by the private key of another encryption algorithm, which is not limited here.
  • the following uses an Android phone as an example to describe the process of the server generating an authorization file.
  • the Android phone sends its own configuration parameters (IMEI, SN, and model) to the server.
  • the server generates the configuration file removeable_cfg.xml according to the configuration parameters, obtains the summary information of the configuration file removeable_cfg.xml through the MD5 algorithm, and then uses RSA asymmetric encryption
  • the private key of the algorithm encrypts the summary information of the configuration file removeable_cfg.xml to obtain the signature file removeable_cert, thereby obtaining the authorization file including the configuration file removeable_cfg.xml and the signature file removeable_cert
  • the server sends the authorization file to the Android phone, and the Android phone automatically downloads the authorization file.
  • step S2 since the permission to uninstall the preset application can only be processed during the startup phase, after the mobile terminal obtains the authorization file, it needs to be restarted to uninstall the preset application.
  • step S2 includes:
  • step S22 Determine whether the configuration file and the signature file exist. If the configuration file and the signature file exist, go to step S23;
  • step S24 Determine whether the summary information of the configuration file is the same as the summary information of the signature file. If the summary information of the configuration file is the same as the summary information of the signature file, go to step S25;
  • step S26 Determine whether the identification information in the configuration file is the same as the identification information of the mobile terminal. If the identification information in the configuration file is the same as the identification information of the mobile terminal, the authorization file is legal and go to step S3.
  • step S22 it is determined whether the configuration file and the signature file exist to determine whether the mobile terminal successfully receives the authorization file. Only when the mobile terminal successfully receives the authorization file can the preset application be uninstalled.
  • step S22 if the configuration file or the signature file does not exist, the authorization file is invalid, and then step S1 is entered to re-acquire the authorization file for uninstalling the preset application.
  • the absence of the configuration file or the signature file includes the presence of the configuration file and the absence of the signature file, the absence of the configuration file and the existence of the signature file, and the absence of the configuration file and the signature file.
  • step S24 it can be known whether the configuration file has been maliciously tampered with by determining whether the summary information of the configuration file and the signature file are the same.
  • the configuration file has not been tampered with maliciously; when the summary information of the configuration file and the summary information of the signature file are not the same, the configuration file has been maliciously tampered with, the authorization file is illegal, enter Step S1, reacquire the authorization file for uninstalling the preset application.
  • the mobile terminal corresponding to the authorization file can be known by acquiring the identification information in the configuration file, where the identification information includes IMEI or model, and the mobile terminal corresponding to the IMEI or model can be obtained.
  • step S26 it can be known whether the authorization file is the authorization file of the mobile terminal by determining whether the identification information in the configuration file is the same as the identification information of the mobile terminal.
  • the authorization file is legal, and step S3 is entered, that is, the authorization file is the authorization file of the mobile terminal.
  • step S1 is entered to obtain the authorization file for uninstalling the preset application again. The difference between the identification information in the configuration file and the identification information of the mobile terminal indicates that the authorization file is not the authorization file of the mobile terminal, thereby preventing the application of the authorization file to other mobile terminals.
  • the Android phone determines whether the configuration file removeable_cfg.xml and the signature file removeable_cert exist. If the configuration file removeable_cfg.xml and the signature file removeable_cert exist, the summary information h1 of the configuration file removeable_cfg.xml is obtained through the MD5 algorithm, and then through the Android phone's public The key decrypts the signature file removeable_cert to obtain the summary information h2 of the signature file removeable_cert, determine whether h1 and h2 are the same, if h1 and h2 are the same, then obtain the identification information (IMEI or model) of the configuration file removeable_cfg.xml, and determine the configuration file removeable_cfg. Whether the identification information of xml is the same as the identification information (IMEI or model number) of the mobile terminal. If they are the same, proceed to step S3. If they are not the
  • the uninstall method in this embodiment further includes displaying authorization information, that is, if the authorization file is legal, it displays authorized; if the authorization file is illegal, Then it shows unauthorized.
  • step S1 before obtaining the authorization file for uninstalling the preset application, that is, step S1, a user-level application directory is added to the storage space of the mobile terminal, and the installation package of the user-level application program of the mobile terminal is stored in the user-level application directory under.
  • step S3 when the authorization file is legal, it is also necessary to determine whether the preset application is a user-level application. Since all user-level applications are stored in the user-level application directory, by determining whether the preset application is in the user-level application Under the directory, you can know whether the preset application is a user-level application.
  • step S3 if the installation package of the preset application program is not in the user-level application directory, the uninstall method in this embodiment further includes:
  • the uninstall operation is not performed, that is, if the installation package of the preset application is not in the user-level application directory, the preset application is a system-level application, and if the uninstall operation is not performed, the preset application cannot be uninstalled.
  • step S4 is entered. If the installation package of the preset application is not in the /system/custpack/app/custRemoveable directory, the preset application is a system-level application, and step S5 is entered.
  • step S4 after uninstalling the preset application program, that is, step S4, the installation package of the uninstalled preset application program is cached in the uninstalled user-level application file.
  • the installation package of the uninstalled preset application program is cached in the uninstalled user-level application file.
  • an uninstalled user-level application file uninstallList is added to the Android phone, and the installation package of the uninstalled preset application is cached in the uninstalled user-level application file uninstallList.
  • the uninstall method further includes:
  • step S40 Determine whether the installation package of the preset application is in the uninstalled user-level application file. If the installation package of the preset application is not in the uninstalled user-level application file, go to step S4. If the installation package of the preset application is in the uninstalled user-level application file, then return to step S3 to perform the uninstall operation on the next preset application.
  • the method for uninstalling a preset application program of a mobile terminal obtains an authorization file for uninstalling a preset application program, and then determines whether the authorization file is legal.
  • the preset application is uninstalled when the user-level application is a user-level application, so that users can customize the preset application according to their own needs, improving the performance and user experience of the mobile terminal, while avoiding the risk of directly rooting the mobile phone.
  • this embodiment also provides a mobile terminal, and the mobile terminal includes a memory 10 and a processor 20.
  • the memory 10 is connected to the processor 20 in communication.
  • the memory 10 stores a computer program, and the computer program is used to be executed to implement the steps of the following methods:
  • the authorization file includes a configuration file and a signature file.
  • the computer program is executed to specifically implement the following steps:
  • the summary information of the configuration file is encrypted to obtain the signature file.
  • the computer program when determining whether the authorization file is legal, the computer program is executed to specifically implement the following steps:
  • the authorization file is legal.
  • the computer program before obtaining the authorization file for uninstalling the preset application program, the computer program is executed and further implements the following steps:
  • a user-level application directory is added to the storage space of the mobile terminal, and the installation package of the user-level application program of the mobile terminal is stored under the user-level application directory.
  • the computer program when determining whether the preset application is a user-level application, the computer program is executed to specifically implement the following steps:
  • the preset application program is a user-level application program.
  • the computer program is executed and further implements the following steps:
  • the computer program before the preset application is uninstalled, the computer program is executed and the following steps are implemented:
  • the processor 20 in the mobile terminal is used to call the computer program in the memory 10 to implement the steps of the following methods:
  • an authorization file for uninstalling a preset application where the authorization file includes a configuration file and a signature file;
  • the preset application is a user-level application, uninstall the preset application.
  • the processor 20 when obtaining an authorization file for uninstalling a preset application program, the processor 20 calls the computer program to specifically implement the following steps:
  • the configuration parameters include at least the IMEI, SN, and model of the mobile terminal.
  • the processor 20 when determining whether the authorization file is legal, calls the computer program to specifically implement the following steps:
  • the authorization file is legal.
  • the processor 20 calls the computer program to specifically implement the following steps:
  • the preset application program is a user-level application program.
  • the processor 20 calls the computer program to further implement the following steps:
  • the processor 20 calling the computer program before uninstalling the preset application program, the processor 20 calling the computer program further implements the following steps:
  • the mobile terminal in this embodiment may include, but is not limited to, the memory 10 and the processor 20.
  • FIG. 3 is only an example of a mobile terminal and does not constitute a limitation on the mobile terminal, and may include more or fewer components than those illustrated, or combine certain components, or different components.
  • the memory 10 may be an internal storage unit of the mobile terminal, such as a hard disk or a memory of the mobile terminal.
  • the memory 10 may also be an external storage device of the mobile terminal, such as a plug-in hard disk and a smart memory card (Smart Media) provided on the mobile terminal Card, SMC), Secure Digital (Secure Digital, SD) card, flash memory card (Flash Card) etc.
  • Smart Media Smart Media
  • SMC Secure Digital
  • SD Secure Digital
  • flash memory card Flash Card
  • the processor 20 may be a central processing unit (Central Processing Unit (CPU), can also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (Application Specific Integrated Circuit (ASIC), ready-made programmable gate array (FieldProgrammableGate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

本申请提供一种移动终端及其预置应用程序的卸载方法、存储器,所述卸载方法包括以下步骤:获取用于卸载预置应用程序的授权文件;判断所述授权文件是否合法;若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。

Description

移动终端及其预置应用程序的卸载方法、存储器
本申请要求于2018年12月26日提交中国专利局、申请号为201811600320.5、发明名称为“移动终端及其预置应用程序的卸载方法、存储器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及移动终端技术领域,尤其涉及一种移动终端及其预置应用程序的卸载方法、存储器。
背景技术
目前市面上手机出厂都会预置很多的应用,包括厂商自研和第三方的应用,通过这种方式达到应用推广并获取收益,这种预置的应用一般不允许用户卸载。但对用户来说,预置越多应用,则可能启动更多进程,消耗更多内存,对于手机有限的资源来说,更容易造成性能问题以及卡顿,且后台运行更多的服务,也会导致手机功耗增大;另外还会使得手机桌面越杂乱,因此,预置太多应用,将会对手机的用户体验产生很大影响。由于所有预置应用不可卸载,若用户想要获取这种权限就要root手机,但是,root手机的操作存在很大的风险,root不成功可能会导致手机无法使用,root成功又会降低手机的安全性,使之更容易入侵受到破坏。
技术问题
本申请提供一种移动终端及其预置应用程序的卸载方法、存储器,能够提升移动终端的性能。
技术解决方案
第一方面,本申请提供一种移动终端预置应用程序的卸载方法,所述卸载方法包括以下步骤:
获取用于卸载预置应用程序的授权文件;
判断所述授权文件是否合法;
若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
第二方面,本申请还提供了一种存储器,所述存储器存储有计算机程序,所述计算机程序能够被执行以实现如上所述的卸载方法。
第三方面,本申请还提供了一种移动终端,所述移动终端包括:处理器、与处理器通信连接的存储器,所述存储器存储有计算机程序,所述计算机程序用于被执行时实现如上所述的卸载方法;所述处理器用于调用所述存储器中的计算机程序,以实现如上所述的卸载方法。
有益效果
提升了移动终端的性能和用户体验,同时避免直接root手机所带来的风险。
附图说明
下面结合附图,通过对本申请的具体实施方式详细描述,将使本申请的技术方案及其它有益效果显而易见。
图1为移动终端预置应用程序的卸载方法的流程图;
图2为移动终端预置应用程序的卸载方法的另一流程图;
图3为移动终端的结构示意图。
本发明的实施方式
以下,将参照附图来详细描述本申请的实施例。然而,可以以许多不同的形式来实施本申请,并且本申请不应该被解释为限制于这里阐述的具体实施例。相反,提供这些实施例是为了解释本申请的原理及其实际应用,从而使本领域的其他技术人员能够理解本申请的各种实施例和适合于特定预期应用的各种修改。在附图中,相同的标号将始终被用于表示相同的元件。
本实施例中的移动终端预置应用程序的卸载方法可以应用到Android系统,也可以应用到IOS系统,其中,移动终端可以是手机、平板电脑、智能手表等移动电子设备。
参照图1,本实施例提供的移动终端预置应用程序的卸载方法包括以下步骤:
S1、获取用于卸载预置应用程序的授权文件;
S2、判断授权文件是否合法,若授权文件合法,则进入步骤S3;
S3、判断预置应用程序是否是用户级应用程序,若预置应用程序是用户级应用程序,则进入步骤S4;
S4、卸载预置应用程序。
本实施例中的预置应用程序包括系统级应用程序和用户级应用程序,系统级应用程序是移动终端必不可少的应用程序,如果删除将会导致移动终端不能正常使用,用户级应用程序为可以删除的应用程序且删除后不会对移动终端的正常使用造成影响。其中,用户级应用程序包括移动终端厂商自己研发的应用程序和第三方应用程序。
通过合法的授权文件来获得卸载预置应用程序的权限,可以避免授权文件的恶意盗用,通过判断预置的应用程序是否是用户级应用程序,可以避免用户误删系统级应用程序而导致移动终端无法使用,从而使得用户能够根据自身需求定制预置应用,提升了移动终端的性能和用户体验,同时避免直接root手机所带来的风险。
在步骤S1中,授权文件是由服务器生成的,移动终端将配置参数发送给服务器,服务器根据移动终端的配置参数生成授权文件。其中,授权文件包括配置文件和签名文件。具体地,步骤S1包括:
S11、获取移动终端的配置参数;
S12、根据配置参数生成配置文件;
S13、获取配置文件的摘要信息;
S14、对配置文件的摘要信息进行加密获得签名文件。
在步骤S11中,移动终端的配置参数至少包括移动终端的国际移动设备识别码(International Mobile Equipment Identity,IMEI),序列号(Serial Number ,SN)以及型号。当然,移动终端的配置参数还可以包括其他可以对移动终端进行识别的参数,这里不限于IMEI 、SN以及型号。
在步骤S12中,根据配置参数生成配置文件,配置文件的格式为xml格式,以便于Android手机对其进行解析。配置文件用于记录移动终端的配置参数。
在步骤S13中,采用信息-摘要算法5(Message-Digest Algorithm 5,MD5)来获取配置文件的摘要信息。其中,MD5算法为计算机安全领域广泛使用的一种散列函数,用以提供消息的完整性保护,这里不再赘述。
在步骤S14中,对步骤S13中服务器通过私钥对配置文件的摘要信息进行加密获得签名文件,由于私钥保存在服务器中,不容易泄露,使得签名文件无法仿照。其中,本实施例中通过RSA非对称加密算法的私钥对配置文件的摘要信息进行加密。当然,本实施例中也可以通过其他加密算法的私钥对摘要信息进行加密,这里不做限定。
下面以Android手机为例来对服务器生成授权文件的过程进行描述。首先,Android手机将自身的配置参数(IMEI 、SN以及型号)发送给服务器,服务器根据配置参数生成配置文件removeable_cfg.xml,通过MD5算法获取配置文件removeable_cfg.xml的摘要信息,再通过RSA非对称加密算法的私钥对配置文件removeable_cfg.xml的摘要信息进行加密获得签名文件removeable_cert,从而获得包括配置文件removeable_cfg.xml和签名文件removeable_cert的授权文件,服务器将授权文件发送给Android手机,Android手机自动下载授权文件。
参照图2,在步骤S2中,由于卸载预置应用程序的权限只能在开机启动阶段处理,因此,在移动终端获取到授权文件之后需要重启才能卸载预置应用程序。具体地,步骤S2包括:
S21、重启移动终端;
S22、判断配置文件和签名文件是否存在,若配置文件和签名文件存在,则进入步骤S23;
S23、获取配置文件的摘要信息并对签名文件进行解密获得签名文件的摘要信息;
S24、判断配置文件的摘要信息与签名文件的摘要信息是否相同,若配置文件的摘要信息与签名文件的摘要信息相同,则进入步骤S25;
S25、获取配置文件中的标识信息;
S26、判断配置文件中的标识信息与移动终端的标识信息是否相同,若配置文件中的标识信息与移动终端的标识信息相同,则授权文件合法,进入步骤S3。
在步骤S22中,判断配置文件和签名文件是否存在是为了判断移动终端是否成功接收到授权文件,只有在移动终端成功接收到授权文件才能对预置应用程序进行卸载。
在步骤S22中,若配置文件或签名文件不存在,则授权文件不合法,则进入步骤S1,重新获取用于卸载预置应用程序的授权文件。配置文件或签名文件不存在包括配置文件存在和签名文件不存在的情况、配置文件不存在和签名文件存在的情况、配置文件和签名文件均不存在的情况。
在步骤S23中,移动终端采用MD5算法来获取配置文件的摘要信息并通过公钥对签名文件的摘要信息进行解密获得签名文件的摘要信息。其中,移动终端的公钥与服务器中的私钥对应。
在步骤S24中,通过判断配置文件的摘要信息与签名文件的摘要信息是否相同便可以得知配置文件是否被恶意篡改。当配置文件的摘要信息与签名文件的摘要信息相同,则配置文件未被恶意篡改;当配置文件的摘要信息与签名文件的摘要信息不相同,则配置文件被恶意篡改,授权文件不合法,进入步骤S1,重新获取用于卸载预置应用程序的授权文件。
在步骤S25中,通过获取配置文件中的标识信息可以得知与该授权文件对应的移动终端,其中,标识信息包括IMEI或型号,通过IMEI或型号便可以获得与之对应的移动终端。
在步骤S26中,通过判断配置文件中的标识信息与移动终端的标识信息是否相同便可以得知该授权文件是否是该移动终端的授权文件。当配置文件中的标识信息与移动终端的标识信息相同,则授权文件合法,进入步骤S3,即授权文件是该移动终端的授权文件。当配置文件中的标识信息与移动终端的标识信息不相同,则授权文件不合法,进入步骤S1,重新获取用于卸载预置应用程序的授权文件。配置文件中的标识信息与移动终端的标识信息不相同表示授权文件不是该移动终端的授权文件,从而防止授权文件应用到其他移动终端的现象。
以Android手机为例来对判断授权文件是否合法的过程进行描述。首先,Android手机判断配置文件removeable_cfg.xml和签名文件removeable_cert是否存在,若配置文件removeable_cfg.xml和签名文件removeable_cert存在,则通过MD5算法获取配置文件removeable_cfg.xml的摘要信息h1,再通过Android手机的公钥对签名文件removeable_cert进行解密获得签名文件removeable_cert的摘要信息h2,判断h1与h2是否相同,若h1与h2相同,则获取配置文件removeable_cfg.xml的标识信息(IMEI或型号),判断配置文件removeable_cfg.xml的标识信息与移动终端的标识信息(IMEI或型号)是否相同,若相同,则进入步骤S3,若不相同,则进入步骤S1。
为了能够让用户直观的获得移动终端的授权情况,在步骤S26之后,本实施例中的卸载方法还包括对授权信息进行显示,即若授权文件合法,则显示已授权;若授权文件不合法,则显示未授权。
本实施例在获取用于卸载预置应用程序的授权文件即步骤S1之前,在移动终端的存储空间增加用户级应用目录,将移动终端的用户级应用程序的安装包存储至该用户级应用目录下。
以Android手机为例,在Android手机的存储空间增加用户级应用目录/system/custpack/app/custRemoveable目录,将Android手机的用户级应用程序的安装包存储至/system/custpack/app/custRemoveable目录下。
在步骤S3中,当授权文件合法时,还需要判断预置应用程序是否是用户级应用程序,由于用户级应用程序全部存储在用户级应用目录下,通过判断预置应用程序是否在用户级应用目录下便可以得知预置应用程序是否是用户级应用程序。
具体地,步骤S3包括:
扫描用户级应用目录并判断预置应用程序的安装包是否在用户级应用目录下,若预置应用程序的安装包在用户级应用目录下,则预置应用程序为用户级应用程序,进入步骤S4。
在步骤S3中,若预置应用程序的安装包不在用户级应用目录下,则本实施例中的卸载方法还包括:
S5、不执行卸载操作,即若预置应用程序的安装包不在用户级应用目录下则预置应用程序为系统级应用程序,不执行卸载操作,即预置应用程序不能卸载。
以Android手机为例,扫描/system/custpack/app/custRemoveable目录并判断预置应用程序的安装包是否在/system/custpack/app/custRemoveable目录下,若预置应用程序的安装包在/system/custpack/app/custRemoveable目录下,则预置应用程序为用户级应用程序,进入步骤S4。若预置应用程序的安装包不在/system/custpack/app/custRemoveable目录下,则预置应用程序为系统级应用程序,进入步骤S5。
由于移动终端的安装包都存储在移动终端的系统分区中,而系统分区中的安装包是不可删除的,即用户级应用目录位于系统分区中,用户级应用目录中的应用程序的安装包不可删除。本实施例中卸载预置应用程序仅仅是删除用户空间的应用数据,而用户级应用目录下的安装包未被删除,因此,移动终端每次重启后,即使预置应用程序已卸载,在扫描用户级应用目录时仍然能够扫描到已卸载的预置应用程序的安装包。
本实施例在卸载预置应用程序即步骤S4之后,将已卸载的预置应用程序的安装包缓存至已卸载用户级应用文件中。以Android手机为例,在Android手机增加已卸载用户级应用文件uninstallList,将已卸载的预置应用程序的安装包缓存至已卸载用户级应用文件uninstallList中。
为了过滤掉用户级应用目录下已卸载的预置应用程序,在卸载预置应用程序即步骤S4之前,所述卸载方法还包括:
S40、判断预置应用程序的安装包是否在已卸载用户级应用文件中,若预置应用程序的安装包不在已卸载用户级应用文件中,则进入步骤S4。若预置应用程序的安装包在已卸载用户级应用文件中,则返回步骤S3,对下一个预置应用程序执行卸载操作。
由上可知,本发明提出的移动终端预置应用程序的卸载方法,通过获取用于卸载预置应用程序的授权文件,再判断所述授权文件是否合法,在所述授权文件合法且所述预置应用程序是用户级应用程序时卸载所述预置应用程序,从而使得用户能够根据自身需求定制预置应用,提升了移动终端的性能和用户体验,同时避免直接root手机所带来的风险。
参照图3,本实施例还提供了一种移动终端,所述移动终端包括存储器10和处理器20。存储器10与处理器20通信连接。在本申请实施例中,存储器10存储有计算机程序,计算机程序用于被执行以实现如下方法的步骤:
获取用于卸载预置应用程序的授权文件;
判断所述授权文件是否合法;
若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
在一些实施方式中,所述授权文件包括配置文件和签名文件,在获取用于卸载预置应用程序的授权文件时,所述计算机程序被执行具体实现如下步骤:
获取所述移动终端的配置参数;
根据所述配置参数生成所述配置文件;
获取所述配置文件的摘要信息;
对所述配置文件的摘要信息进行加密获得所述签名文件。
在一些实施方式中,配置参数至少包括移动终端的IMEI、SN、型号。
在一些实施方式中,在判断所述授权文件是否合法时,所述计算机程序被执行具体实现如下步骤:
重启移动终端;
判断所述配置文件和所述签名文件是否存在;
若所述配置文件和所述签名文件存在,则获取所述配置文件的摘要信息并对所述签名文件进行解密获得所述签名文件的摘要信息;
判断所述配置文件的摘要信息与所述签名文件的摘要信息是否相同;
若所述配置文件的摘要信息与所述签名文件的摘要信息相同,则获取所述配置文件中的标识信息;
判断所述配置文件中的标识信息与所述移动终端的标识信息是否相同;
若所述配置文件中的标识信息与所述移动终端的标识信息相同,则所述授权文件合法。
在一些实施方式中,在获取用于卸载预置应用程序的授权文件之前,所述计算机程序被执行还实现如下步骤:
在所述移动终端的存储空间增加用户级应用目录,将所述移动终端的用户级应用程序的安装包存储至所述用户级应用目录下。
在一些实施方式中,若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序时,所述计算机程序被执行具体实现如下步骤:
若所述授权文件合法,则扫描所述用户级应用目录并判断所述预置应用程序的安装包是否在所述用户级应用目录下;
若所述预置应用程序的安装包在所述用户级应用目录下,则所述预置应用程序为用户级应用程序。
在一些实施方式中,在卸载所述预置应用程序之后,所述计算机程序被执行还实现如下步骤:
将所述预置应用程序的安装包缓存至已卸载用户级应用文件中。
在一些实施方式中,在卸载所述预置应用程序之前,所述计算机程序被执行还实现如下步骤:
判断所述预置应用程序的安装包是否在所述已卸载用户级应用文件中;
若所述预置应用程序的安装包不在所述已卸载用户级应用文件中,则卸载所述预置应用程序。
在本申请实施例中,该移动终端中的处理器20用于调用存储器10中的计算机程序,以实现如下方法的步骤:
在所述移动终端的存储空间增加用户级应用目录,将所述移动终端的用户级应用程序的安装包存储至所述用户级应用目录下;
获取用于卸载预置应用程序的授权文件,其中,所述授权文件包括配置文件和签名文件;
判断所述授权文件是否合法;
若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
在一些实施方式中,在获取用于卸载预置应用程序的授权文件时,所述处理器20调用所述计算机程序具体实现如下步骤:
获取所述移动终端的配置参数;
根据所述配置参数生成所述配置文件;
获取所述配置文件的摘要信息;
对所述配置文件的摘要信息进行加密获得所述签名文件。
在一些实施方式中,所述配置参数至少包括移动终端的IMEI、SN、型号。
在一些实施方式中,在判断所述授权文件是否合法时,所述处理器20调用所述计算机程序具体实现如下步骤:
重启移动终端;
判断所述配置文件和所述签名文件是否存在;
若所述配置文件和所述签名文件存在,则获取所述配置文件的摘要信息并对所述签名文件进行解密获得所述签名文件的摘要信息;
判断所述配置文件的摘要信息与所述签名文件的摘要信息是否相同;
若所述配置文件的摘要信息与所述签名文件的摘要信息相同,则获取所述配置文件中的标识信息;
判断所述配置文件中的标识信息与所述移动终端的标识信息是否相同;
若所述配置文件中的标识信息与所述移动终端的标识信息相同,则所述授权文件合法。
在一些实施方式中,若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序时,所述处理器20调用所述计算机程序具体实现如下步骤:
若所述授权文件合法,则扫描所述用户级应用目录并判断所述预置应用程序的安装包是否在所述用户级应用目录下;
若所述预置应用程序的安装包在所述用户级应用目录下,则所述预置应用程序为用户级应用程序。
在一些实施方式中,在卸载所述预置应用程序之后,所述处理器20调用所述计算机程序还实现如下步骤:
将所述预置应用程序的安装包缓存至已卸载用户级应用文件中。
在一些实施方式中,在卸载所述预置应用程序之前,所述处理器20调用所述计算机程序还实现如下步骤:
判断所述预置应用程序的安装包是否在所述已卸载用户级应用文件中;
若所述预置应用程序的安装包不在所述已卸载用户级应用文件中,则卸载所述预置应用程序。
本实施例中的移动终端可包括,但不仅限于,存储器10、处理器20。本领域技术人员可以理解,图3仅仅是移动终端的示例,并不构成对移动终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件。
存储器10可以是移动终端的内部存储单元,例如移动终端的硬盘或内存。存储器10也可以是移动终端的外部存储设备,例如移动终端上配备的插接式硬盘、智能存储卡(Smart Media Card,SMC)、安全数字(Secure Digital,SD)卡、闪存卡(Flash Card)等。
存储器10还可以既包括移动终端的内部存储单元也包括外部存储设备。存储器10用于存储所述计算机程序以及所述移动终端所需的其他程序和数据。存储器10还可以用于暂时地存储已经输出或者将要输出的数据。
处理器20可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(FieldProgrammableGate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
以上所述仅是本申请的具体实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本申请的保护范围。

Claims (20)

  1. 一种移动终端预置应用程序的卸载方法,其中,所述卸载方法包括以下步骤:
    获取用于卸载预置应用程序的授权文件;
    判断所述授权文件是否合法;
    若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
    若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
  2. 根据权利要求1所述的卸载方法,其中,所述授权文件包括配置文件和签名文件,所述获取用于卸载预置应用程序的授权文件的步骤具体包括:
    获取所述移动终端的配置参数;
    根据所述配置参数生成所述配置文件;
    获取所述配置文件的摘要信息;
    对所述配置文件的摘要信息进行加密获得所述签名文件。
  3. 根据权利要求2所述的卸载方法,其中,所述配置参数至少包括移动终端的IMEI、SN、型号。
  4. 根据权利要求2所述的卸载方法,其中,所述判断所述授权文件是否合法的步骤具体包括:
    重启移动终端;
    判断所述配置文件和所述签名文件是否存在;
    若所述配置文件和所述签名文件存在,则获取所述配置文件的摘要信息并对所述签名文件进行解密获得所述签名文件的摘要信息;
    判断所述配置文件的摘要信息与所述签名文件的摘要信息是否相同;
    若所述配置文件的摘要信息与所述签名文件的摘要信息相同,则获取所述配置文件中的标识信息;
    判断所述配置文件中的标识信息与所述移动终端的标识信息是否相同;
    若所述配置文件中的标识信息与所述移动终端的标识信息相同,则所述授权文件合法。
  5. 根据权利要求1所述的卸载方法,其中,所述卸载方法还包括:
    在获取用于卸载预置应用程序的授权文件之前,在所述移动终端的存储空间增加用户级应用目录,将所述移动终端的用户级应用程序的安装包存储至所述用户级应用目录下。
  6. 根据权利要求5所述的卸载方法,其中,所述若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序的步骤具体包括:
    若所述授权文件合法,则扫描所述用户级应用目录并判断所述预置应用程序的安装包是否在所述用户级应用目录下;
    若所述预置应用程序的安装包在所述用户级应用目录下,则所述预置应用程序为用户级应用程序。
  7. 根据权利要求6所述的卸载方法,其中,所述卸载方法还包括:
    在卸载所述预置应用程序之后,将所述预置应用程序的安装包缓存至已卸载用户级应用文件中。
  8. 根据权利要求7所述的卸载方法,其中,所述卸载方法还包括:
    在卸载所述预置应用程序之前,判断所述预置应用程序的安装包是否在所述已卸载用户级应用文件中;
    若所述预置应用程序的安装包不在所述已卸载用户级应用文件中,则卸载所述预置应用程序。
  9. 一种存储器,其中,所述存储器存储有计算机程序,所述计算机程序能够被执行以实现如下方法的步骤:
    获取用于卸载预置应用程序的授权文件;
    判断所述授权文件是否合法;
    若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
    若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
  10. 根据权利要求9所述存储器,其中,所述授权文件包括配置文件和签名文件,在获取用于卸载预置应用程序的授权文件时,所述计算机程序被执行具体实现如下步骤:
    获取所述移动终端的配置参数;
    根据所述配置参数生成所述配置文件;
    获取所述配置文件的摘要信息;
    对所述配置文件的摘要信息进行加密获得所述签名文件。
  11. 根据权利要求10所述存储器,其中,所述配置参数至少包括移动终端的IMEI、SN、型号。
  12. 根据权利要求10所述存储器,其中,在判断所述授权文件是否合法时,所述计算机程序被执行具体实现如下步骤:
    重启移动终端;
    判断所述配置文件和所述签名文件是否存在;
    若所述配置文件和所述签名文件存在,则获取所述配置文件的摘要信息并对所述签名文件进行解密获得所述签名文件的摘要信息;
    判断所述配置文件的摘要信息与所述签名文件的摘要信息是否相同;
    若所述配置文件的摘要信息与所述签名文件的摘要信息相同,则获取所述配置文件中的标识信息;
    判断所述配置文件中的标识信息与所述移动终端的标识信息是否相同;
    若所述配置文件中的标识信息与所述移动终端的标识信息相同,则所述授权文件合法。
  13. 根据权利要求9所述存储器,其中,在获取用于卸载预置应用程序的授权文件之前,所述计算机程序被执行还实现如下步骤:
    在所述移动终端的存储空间增加用户级应用目录,将所述移动终端的用户级应用程序的安装包存储至所述用户级应用目录下。
  14. 根据权利要求13所述存储器,其中,若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序时,所述计算机程序被执行具体实现如下步骤:
    若所述授权文件合法,则扫描所述用户级应用目录并判断所述预置应用程序的安装包是否在所述用户级应用目录下;
    若所述预置应用程序的安装包在所述用户级应用目录下,则所述预置应用程序为用户级应用程序。
  15. 根据权利要求9所述存储器,在卸载所述预置应用程序之后,所述计算机程序被执行还实现如下步骤:
    将所述预置应用程序的安装包缓存至已卸载用户级应用文件中。
  16. 根据权利要求15所述存储器,其中,在卸载所述预置应用程序之前,所述计算机程序被执行还实现如下步骤:
    判断所述预置应用程序的安装包是否在所述已卸载用户级应用文件中;
    若所述预置应用程序的安装包不在所述已卸载用户级应用文件中,则卸载所述预置应用程序。
  17. 一种移动终端,其中,所述移动终端包括:处理器、与处理器通信连接的存储器,所述存储器存储有计算机程序,所述处理器用于调用所述存储器中的计算机程序,以实现如下方法的步骤:
    在所述移动终端的存储空间增加用户级应用目录,将所述移动终端的用户级应用程序的安装包存储至所述用户级应用目录下;
    获取用于卸载预置应用程序的授权文件,其中,所述授权文件包括配置文件和签名文件;
    判断所述授权文件是否合法;
    若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序;
    若所述预置应用程序是用户级应用程序,则卸载所述预置应用程序。
  18. 根据权利要求17所述移动终端,其中,在获取用于卸载预置应用程序的授权文件时,所述处理器调用所述计算机程序具体实现如下步骤:
    获取所述移动终端的配置参数;
    根据所述配置参数生成所述配置文件;
    获取所述配置文件的摘要信息;
    对所述配置文件的摘要信息进行加密获得所述签名文件。
  19. 根据权利要求17所述移动终端,其中,在判断所述授权文件是否合法时,所述处理器调用所述计算机程序具体实现如下步骤:
    重启移动终端;
    判断所述配置文件和所述签名文件是否存在;
    若所述配置文件和所述签名文件存在,则获取所述配置文件的摘要信息并对所述签名文件进行解密获得所述签名文件的摘要信息;
    判断所述配置文件的摘要信息与所述签名文件的摘要信息是否相同;
    若所述配置文件的摘要信息与所述签名文件的摘要信息相同,则获取所述配置文件中的标识信息;
    判断所述配置文件中的标识信息与所述移动终端的标识信息是否相同;
    若所述配置文件中的标识信息与所述移动终端的标识信息相同,则所述授权文件合法。
  20. 根据权利要求17所述移动终端,其中,在若所述授权文件合法,则判断所述预置应用程序是否是用户级应用程序时,所述处理器调用所述计算机程序具体实现如下步骤:
    若所述授权文件合法,则扫描所述用户级应用目录并判断所述预置应用程序的安装包是否在所述用户级应用目录下;
    若所述预置应用程序的安装包在所述用户级应用目录下,则所述预置应用程序为用户级应用程序。
PCT/CN2019/119461 2018-12-26 2019-11-19 移动终端及其预置应用程序的卸载方法、存储器 WO2020134719A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP19902405.0A EP3905032A4 (en) 2018-12-26 2019-11-19 MOBILE DEVICE, METHOD OF UNINSTALLING A PRE-INSTALLED APPLICATION AND STORAGE
US17/417,930 US11928450B2 (en) 2018-12-26 2019-11-19 Mobile terminal, method for uninstalling pre-installed application therein, and memory

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811600320.5 2018-12-26
CN201811600320.5A CN109739519A (zh) 2018-12-26 2018-12-26 移动终端及其预置应用程序的卸载方法、存储器

Publications (1)

Publication Number Publication Date
WO2020134719A1 true WO2020134719A1 (zh) 2020-07-02

Family

ID=66360035

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/119461 WO2020134719A1 (zh) 2018-12-26 2019-11-19 移动终端及其预置应用程序的卸载方法、存储器

Country Status (4)

Country Link
US (1) US11928450B2 (zh)
EP (1) EP3905032A4 (zh)
CN (1) CN109739519A (zh)
WO (1) WO2020134719A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112578961A (zh) * 2020-12-25 2021-03-30 维沃移动通信有限公司 应用标识显示方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109739519A (zh) 2018-12-26 2019-05-10 惠州Tcl移动通信有限公司 移动终端及其预置应用程序的卸载方法、存储器
CN111062033A (zh) * 2019-12-19 2020-04-24 福建新大陆支付技术有限公司 一种应用程序的防卸载方法和装置以及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521031A (zh) * 2011-12-13 2012-06-27 华为终端有限公司 移动终端预置应用程序的管理方法和移动终端
US20140245286A1 (en) * 2013-02-28 2014-08-28 Hon Hai Precision Industry Co., Ltd. Application managing system and method using same
CN104199697A (zh) * 2014-08-27 2014-12-10 北京金山安全软件有限公司 一种预装软件管理方法、装置及终端
CN104239041A (zh) * 2014-09-03 2014-12-24 北京数字天域科技股份有限公司 一种生成处理方案和配置、删除预装应用的方法、装置和系统
CN105094279A (zh) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 一种改善智能终端待机性能的方法、装置和系统
CN109739519A (zh) * 2018-12-26 2019-05-10 惠州Tcl移动通信有限公司 移动终端及其预置应用程序的卸载方法、存储器

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003266A1 (en) * 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US8418168B2 (en) * 2008-05-29 2013-04-09 Research In Motion Limited Method and system for performing a software upgrade on an electronic device connected to a computer
US10459711B2 (en) 2008-08-12 2019-10-29 Adobe Inc. Updating applications using migration signatures
US8874703B1 (en) * 2011-09-20 2014-10-28 Amazon Technologies, Inc. System and method of selectively implementing network configurations
CN104023032B (zh) * 2014-06-23 2017-11-24 北京握奇智能科技有限公司 基于可信执行环境技术的应用受限卸载方法、服务器和终端
US9471297B2 (en) * 2014-09-10 2016-10-18 Kcura Llc Methods and apparatus for uninstalling a software application
CN105138226B (zh) 2015-08-27 2018-09-04 北京奇虎科技有限公司 一种智能终端的桌面管理方法和装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521031A (zh) * 2011-12-13 2012-06-27 华为终端有限公司 移动终端预置应用程序的管理方法和移动终端
US20140245286A1 (en) * 2013-02-28 2014-08-28 Hon Hai Precision Industry Co., Ltd. Application managing system and method using same
CN104199697A (zh) * 2014-08-27 2014-12-10 北京金山安全软件有限公司 一种预装软件管理方法、装置及终端
CN104239041A (zh) * 2014-09-03 2014-12-24 北京数字天域科技股份有限公司 一种生成处理方案和配置、删除预装应用的方法、装置和系统
CN105094279A (zh) * 2015-07-07 2015-11-25 北京奇虎科技有限公司 一种改善智能终端待机性能的方法、装置和系统
CN109739519A (zh) * 2018-12-26 2019-05-10 惠州Tcl移动通信有限公司 移动终端及其预置应用程序的卸载方法、存储器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3905032A4

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112578961A (zh) * 2020-12-25 2021-03-30 维沃移动通信有限公司 应用标识显示方法及装置
CN112578961B (zh) * 2020-12-25 2022-06-10 维沃移动通信有限公司 应用标识显示方法及装置

Also Published As

Publication number Publication date
US11928450B2 (en) 2024-03-12
CN109739519A (zh) 2019-05-10
US20220091833A1 (en) 2022-03-24
EP3905032A4 (en) 2022-10-05
EP3905032A1 (en) 2021-11-03

Similar Documents

Publication Publication Date Title
TWI709056B (zh) 韌體升級方法及裝置
US10931451B2 (en) Securely recovering a computing device
US20230195900A1 (en) Rollback Resistant Security
US8683213B2 (en) Progressive boot for a wireless device
WO2020093214A1 (zh) 一种应用程序登录方法、应用程序登录装置及移动终端
US8291480B2 (en) Trusting an unverified code image in a computing device
US8254568B2 (en) Secure booting a computing device
US8001385B2 (en) Method and apparatus for flash updates with secure flash
CN106330984B (zh) 访问控制策略的动态更新方法及装置
US20170201378A1 (en) Electronic device and method for authenticating identification information thereof
WO2020134719A1 (zh) 移动终端及其预置应用程序的卸载方法、存储器
US10687216B2 (en) Antitheft method for mobile terminal and apparatus
WO2020088323A1 (zh) 一种能力开放方法及装置
US10764038B2 (en) Method and apparatus for generating terminal key
CN108259609B (zh) 一种家庭云端数据的管理方法及云服务器
US7698739B2 (en) Updating code with validation
WO2018092289A1 (ja) 情報処理装置
US11947954B2 (en) Electronic apparatus adapted for container and software updating method for running container system
CN113177199A (zh) 数据处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19902405

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019902405

Country of ref document: EP

Effective date: 20210726