WO2022213840A1 - 一种应用处理的方法以及相关装置 - Google Patents

一种应用处理的方法以及相关装置 Download PDF

Info

Publication number
WO2022213840A1
WO2022213840A1 PCT/CN2022/083524 CN2022083524W WO2022213840A1 WO 2022213840 A1 WO2022213840 A1 WO 2022213840A1 CN 2022083524 W CN2022083524 W CN 2022083524W WO 2022213840 A1 WO2022213840 A1 WO 2022213840A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
feature information
information
feature
installation
Prior art date
Application number
PCT/CN2022/083524
Other languages
English (en)
French (fr)
Inventor
夏斌
汪芳山
Original Assignee
花瓣云科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 花瓣云科技有限公司 filed Critical 花瓣云科技有限公司
Publication of WO2022213840A1 publication Critical patent/WO2022213840A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Definitions

  • the embodiments of the present application relate to the field of computer technologies, and in particular, to an application processing method and related apparatus.
  • FIG. 1 shows a schematic flowchart of installing an application in the related art.
  • an application distribution manufacturer usually pre-installs an application distribution client on a terminal device, and a developer uploads an application to an application distribution server.
  • the user can download the relevant application from the application distribution server through the application distribution client, thereby triggering the installation of the application on the terminal device.
  • the application installation solution described above is mainly that the application distribution manufacturer obtains a trusted application from the developer by authenticating the developer; and the application distribution manufacturer needs to pre-configure the application distribution client on the terminal device to ensure the follow-up Reliability and trustworthiness of the distribution channel when installing the app.
  • a lot of manpower needs to be invested in the authentication of the developer and the pre-installation of the application distribution client by the application distribution manufacturer, and a large number of application installation sources need to be provided in the application distribution client for application download, which is costly and has a long cycle. It is not conducive to rapidly building a credible application distribution ecosystem.
  • the embodiments of the present application provide an application processing method and related apparatus, which do not need to rely on the authentication of the developer and the pre-configured application distribution client, but widely use the feature information and application source information of existing applications to determine the source of unknown origin.
  • the first application of a trusted installation source can reduce the time and cost required to build a trusted application distribution ecosystem.
  • an embodiment of the present application provides an application processing method.
  • the method may be applied to an application feature server or a second terminal device.
  • the method may include: acquiring feature information of the first application,
  • the first application comes from an installation source with an unknown degree of credibility;
  • the first result is determined according to the target feature information of the second application and the feature information of the first application, and the target feature information of the second application is used to represent the credibility of the second application.
  • the first result is used to indicate the installation of the first application, or to prevent the installation of the first application, where the first application is the same as or different from the second application.
  • the target feature information of the second application can represent the credibility of the second application
  • the characteristics of the first application can be obtained by After the information is obtained, the first result is determined according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate the installation of the first application or prevent the installation of the first application. That is to say, in this embodiment, when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application.
  • the target feature information of the second application is obtained by the application feature server according to the feature information of the second application.
  • the target feature information of the second application includes the first feature information of the second application and/or the second feature information of the second application obtained, wherein the first feature information is used to characterize the second application.
  • the second feature information is used to represent the external feature attributes of the second application.
  • the described application installation source of the second application may be an installation source with a known degree of credibility or an installation source with an unknown degree of credibility, so the application feature server needs to convert the first feature information and/or the first feature information of the second application and/or the first feature information of the second application.
  • the second feature information determines the target feature information of the second application, and the target feature information represents the credibility of the second application.
  • the first feature information may be used to represent application attributes of the second application.
  • the first feature information may include the application identifier of the second application, the installation source information of the second application, and the running behavior feature information of the second application. one or more of. In practical applications, it may also be other feature information, which is not limited here.
  • the described application identifier of the second application may include, but is not limited to: the application name, the application IP address, the application package size, the application signature fingerprint, the hash value of the application file size, etc., which may identify the integrity and the integrity of the second application. unique feature.
  • the installation source information of the second application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located.
  • the running behavior feature information of the second application may include, but is not limited to, the duration that the second application is resident in the background, the requested permission, the actual usage permission, and the like.
  • the second feature information may represent external feature attributes of the second application, for example, the second feature information may include one or more of public information of the second application and manual maintenance information of the second application.
  • the described public information of the second application may include, but is not limited to, ratings on the application installation source, number of ratings, application comments, number of comments, number of downloads, number of shares, and the like.
  • the described manual maintenance information of the second application may include but is not limited to: domain name information of the application installation source corresponding to the second application, trusted weight of the application installation source, application application permission information, etc., which are not limited here.
  • the target feature information of the second application is determined according to the first feature information of the second application.
  • the application feature server after receiving the first feature information of the second application sent by the first terminal device, will The first feature information of the second application can be directly used as the target feature information, which is convenient for simplifying the operation process and computational complexity, and can further shorten the cycle and cost of identifying whether the first application is authentic or not.
  • the first feature information is information obtained by the first terminal device for the second application.
  • determining the first result according to the target feature information of the second application and the feature information of the first application may include: determining a relationship between the target feature information of the second application and the feature information of the first application. Feature credibility; take the feature credibility as the first result.
  • the feature information of the first application includes one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application.
  • the described application identifier of the first application may include, but is not limited to: application name, application IP address, signature fingerprint of the application, hash value of the application file size, etc., which can identify the integrity and uniqueness of the first application.
  • the installation source information of the first application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located, all of which are here. No specific limitation is made.
  • the first feature information of the second application includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior feature information of the second application.
  • the described application identifier of the second application may include, but is not limited to: the application name, the application IP address, the application package size, the application signature fingerprint, the hash value of the application file size, etc., which may identify the integrity and the integrity of the second application. unique feature.
  • the installation source information of the second application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located.
  • the running behavior feature information of the second application may include, but is not limited to, the duration that the second application resides in the background, the applied permission and the actual usage permission, etc., which are not specifically limited here.
  • the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
  • the described public information of the second application may include, but is not limited to: ratings on the application installation source, number of ratings, application comments, number of comments, number of downloads, number of shares, etc., which is not done here. Qualified description.
  • the described manual maintenance information of the second application may include but is not limited to: domain name information of the application installation source corresponding to the second application, trusted weight of the application installation source, application application permission information, etc., which are not limited here.
  • an embodiment of the present application provides another method for processing an application, and the method may include: an application feature server obtains feature information of a first application sent by a second terminal device, where the first application originates from an unknown reliability degree. The installation source; the application feature server determines the first result according to the target feature information of the second application and the feature information of the first application, the target feature information of the second application is used to characterize the credibility of the second application, and the first result is used to characterize The credibility of the first application, the first application is the same or different from the second application; the application feature server sends the first result to the second terminal device to instruct the second terminal device to install the first application or prevent the installation of the first application .
  • the second terminal device can The application performs feature extraction to obtain feature information of the first application; then, the second terminal device sends the feature information of the first application to the application feature server, and the application feature server is based on the feature information of the first application and the target of the second application.
  • the characteristic information determines the first result.
  • the application feature server can then feed back the first result to the second terminal device, so that the second terminal device can install the first application or prevent the installation of the first application according to the first result.
  • the first application when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application. Whether it is true and credible is judged, so as to complete the credible installation and processing of the application; and, in the embodiment of the present application, it is not necessary to rely on the authentication of the developer and the pre-configured application distribution client, but the feature information of the existing application is widely used.
  • Using the application source information to determine the first application originating from an installation source of unknown trustworthiness can reduce the time and cost required for building a trusted application distribution ecosystem.
  • the method may further include: the application feature server obtains target feature information of the second application according to the feature information of the second application.
  • the feature information of the second application includes first feature information of the second application and/or second feature information of the second application, wherein the first feature information is used to characterize the application of the second application attribute, and the second feature information is used to characterize the external feature attribute of the second application.
  • the target feature information of the second application is determined according to the first feature information of the second application.
  • the method may further include: the application feature server receives first feature information sent by the first terminal device, where the first feature information is acquired by the first terminal device for the second application.
  • the application feature server determining the first result according to the target feature information of the second application and the feature information of the first application may include: the application feature server determining the target feature information of the second application and the first application.
  • the embodiments of the present application provide another method for processing applications, and the method may include: acquiring feature information of a first application by a second terminal device, where the first application comes from an installation source with an unknown degree of credibility;
  • the second terminal device sends the feature information of the first application to the application feature server;
  • the second terminal device receives the first result sent by the application feature server, and the first result is sent by the application feature server according to the target feature information of the second application and the features of the first application.
  • the information is obtained, the target feature information of the second application is used to represent the credibility of the second application, and the first application is the same or different from the second application;
  • the second terminal device installs the first application according to the first result, or prevents the installation of the first application. an application.
  • an embodiment of the present application provides an application processing system, where the application processing system may include a second terminal device and an application feature server; the second terminal device may be specifically used for: acquiring the features of the first application information, the first application comes from an installation source with an unknown degree of credibility; send the feature information of the first application to the application feature server; the application feature server is specifically used for target feature information according to the second application and the feature information of the first application to determine a first result, the target feature information of the second application is used to represent the credibility of the second application, and the first result is used to indicate the installation of the first application , or prevent the installation of the first application, which is the same or different from the second application.
  • the target feature information of the second application can represent the credibility of the second application
  • the first application in the system can be processed by the application.
  • the second terminal device performs feature extraction on the first application to obtain the feature information of the first application; then, the second terminal device sends the feature information of the first application to the application feature server, and the application feature server uses the feature information of the first application according to the feature information of the first application. and the target feature information of the second application to determine the first result.
  • the application feature server can then feed back the first result to the second terminal device, so that the second terminal device can install the first application or prevent the installation of the first application according to the first result.
  • the first application when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application. Whether it is true and credible is judged, so as to complete the credible installation and processing of the application; and, in the embodiment of the present application, it is not necessary to rely on the authentication of the developer and the pre-configured application distribution client, but the feature information of the existing application is widely used.
  • Using the application source information to determine the first application originating from an installation source of unknown trustworthiness can reduce the time and cost required for building a trusted application distribution ecosystem.
  • the application feature server is further configured to: acquire feature information of the second application; and determine target feature information of the second application according to the feature information of the second application.
  • the feature information of the second application includes first feature information of the second application and/or second feature information of the second application, where the first feature information is used to represent the application attributes of the second application, and the second feature information is used to represent external feature attributes of the second application.
  • the feature information of the second application is determined according to the first feature information of the second application.
  • the application processing system further includes a first terminal device; the first terminal device is configured to: acquire first feature information of the second application; send to the application feature server the first feature information.
  • the application feature server is configured to: determine the feature reliability between the target feature information of the second application and the feature information of the first application; degree as the first result.
  • the application feature server is further configured to send the first result to the second terminal device; the second terminal device is further configured to install the first result according to the first result. an application, or prevent installation of the first application.
  • the feature information of the first application includes one of an application identifier of the first application, an application package size of the first application, and installation source information of the first application or multiple.
  • the first feature information of the second application includes the application identifier of the second application, the installation source information of the second application, and the running behavior feature information of the second application. one or more of.
  • the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
  • an embodiment of the present application provides an application processing apparatus, and the application processing apparatus may include: an obtaining unit, configured to obtain feature information of a first application, where the first application comes from an installation source with an unknown degree of credibility; a processing unit, configured to determine a first result according to the target feature information of the second application and the feature information of the first application, the target feature information of the second application is used to represent the credibility of the second application, and the first result is used to indicate installation The first application, or preventing the installation of the first application, the first application and the second application are the same or different.
  • the target feature information of the second application is obtained by the application feature server according to the feature information of the second application.
  • the target feature information of the second application includes the first feature information of the second application and/or the second feature information of the second application, wherein the first feature information is used to characterize the characteristics of the second application.
  • the second feature information is used to represent external feature attributes of the second application.
  • the target feature information of the second application includes the first feature information of the second application, where the first feature information is used for An application attribute characterizing the second application.
  • the first feature information is information obtained by the first terminal device for the second application.
  • the processing unit is configured to: determine the feature reliability between the target feature information of the second application and the feature information of the first application; and use the feature reliability as the first result.
  • the feature information of the first application includes one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application.
  • the first feature information of the second application includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior feature information of the second application.
  • the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
  • an embodiment of the present application provides an application processing apparatus, which may include: a memory for storing computer-readable instructions. It may also include a processor coupled to the memory for executing computer readable instructions in the memory to perform aspects such as the first aspect, the second aspect, or the third aspect, or any of the first, second or third aspects. The method described in a possible implementation.
  • embodiments of the present application provide a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute the first aspect, the second aspect, or the third aspect, or the first aspect , the method of any possible implementation manner of the second aspect or the third aspect.
  • the embodiments of the present application provide a computer program product containing instructions, which, when run on a computer, causes the computer to execute the first aspect, the second aspect, or the third aspect, or the first aspect, the first aspect, the A method for any possible implementation of the second aspect or the third aspect.
  • a ninth aspect of the present application provides a chip system, where the chip system may include a processor for supporting an application processing apparatus to implement the first aspect, the second aspect, or the third aspect, or the first aspect, the second aspect, or the first aspect, the second aspect, or the third aspect.
  • the chip system may further include a memory, which is used for storing necessary program instructions and data of the application processing apparatus.
  • the chip system may be composed of chips, or may include chips and other discrete devices.
  • the chip system may include an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (field programmable gate array, FPGA), or other programmable logic devices.
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • the chip system may also include interface circuits and the like.
  • the embodiments of the present application have the following advantages:
  • the target feature information of the second application can represent the credibility of the second application
  • the first application can be obtained by obtaining the first application.
  • the first result is determined according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate the installation of the first application or prevent the installation of the first application. That is to say, in this embodiment, when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application.
  • FIG. 2 is a schematic diagram of the architecture of an application processing system provided in an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method for application processing provided in an embodiment of the present application.
  • FIG. 4 is a schematic flowchart of another method for application processing provided in an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of another method for application processing provided in an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of another application processing method provided in the embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an application processing apparatus provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of a first terminal device provided by an embodiment of the present application.
  • FIG. 9 is a schematic structural diagram of an application feature server provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of a second terminal device provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of an application processing system provided in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another application processing system provided in an embodiment of the present application.
  • FIG. 13 is a schematic diagram of a hardware structure of a communication device provided by an embodiment of the present application.
  • the embodiments of the present application provide an application processing method and related apparatus, which do not need to rely on the authentication of the developer and the pre-configured application distribution client, but widely use the feature information and application source information of existing applications to determine the source of unknown origin.
  • the first application of a trusted installation source can reduce the time and cost required to build a trusted application distribution ecosystem.
  • At least one (a) of a, b or c can represent: a, b, c, a and b, a and c, b and c or a and b and c, where a, b and c can be It can be single or multiple. It is worth noting that "at least one item(s)" can also be interpreted as "one item(s) or more(s)”.
  • the solution for installing applications is mainly that the application distribution manufacturer obtains a trusted application from the developer by certifying the developer; and the application distribution manufacturer needs to pre-configure the application distribution client on the terminal device before it can be used. Ensure the reliability and trustworthiness of the distribution channel for subsequent app installations.
  • a lot of manpower needs to be invested in the authentication of the developer and the pre-installation of the application distribution client by the application distribution manufacturer, and a large number of application installation sources need to be provided in the application distribution client for application download, which is costly and has a long cycle. It is not conducive to terminal manufacturers to quickly build a credible application distribution ecosystem.
  • FIG. 2 is a schematic structural diagram of an application processing system provided in an embodiment of the present application. It can be seen from FIG. 2 that the application processing system may include a first terminal device, an application feature server and a second terminal device.
  • the second terminal device obtains the installation package of the first application from an installation source of unknown trustworthiness, and can obtain feature information of the first application therefrom; after obtaining the first feature information of the second application, the first terminal device, Send the first feature information to the application feature server. Then, after acquiring the second feature information of the second application, the application feature server determines the target feature information of the second application in combination with the first feature information, and the target feature information of the second application can indicate the credible situation.
  • the application feature server can determine the first result according to the target feature information of the second application and the feature information of the first application after acquiring the feature information of the first application sent by the second terminal device; After acquiring the target feature information of the second application from the application feature server, the second terminal device determines the first result in combination with the feature information of the first application. In this way, the second terminal device can install or prevent the installation of the second application according to the first result.
  • the first application described above is derived from an installation source of unknown reliability, for example, it may be derived from a third-party application market, a personal website, etc., which is not limited here.
  • the described first application may be the same as the second application, and may also be different from the second application, which will not be described herein as a limitation.
  • the described first terminal device and second terminal device may include various handheld devices with wireless communication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of User equipment (user equipment, UE), mobile station (mobile station, MS), mobile terminal, etc., are not limited here.
  • the described application feature server may be a cloud server with functions such as storing, analyzing, and computing features, or other servers, etc., which is not limited here.
  • FIG. 3 is a schematic flowchart of an application processing method provided in an embodiment of the present application.
  • the application processing method described in FIG. 3 can be applied to the application feature server, and can also be applied to the second terminal device shown in FIG. 2 , which is not limited here.
  • the application processing method may include the following steps:
  • the second terminal device may trigger the installation of the application installation package of the first application after acquiring the application installation package of the first application from an installation source of unknown reliability. In this way, the second terminal device can acquire the feature information of the first application.
  • the feature information of the first application is sent to the application feature server.
  • the application feature server can acquire the feature information of the first application.
  • the described feature information of the first application may be used to characterize the application attribute of the first application, and/or used to characterize the external feature attribute of the first application, which is not limited here.
  • the feature information of the first application when used to represent the application attributes of the first application, the feature information of the first application may include the application identifier of the first application, the application package size of the first application, and the installation source of the first application one or more of the information.
  • the first feature information of the first application may also be other information that can characterize the features of the first application, such as the application name and IP address of the first application, which are not limited here.
  • the feature information of the first application may include one or more of the public information of the first application and the manual maintenance information of the first application.
  • the feature information of the first application may also be other features that can be used to characterize the external feature attributes of the first application.
  • the described public information of the first application may include, but is not limited to: ratings on the application installation source, number of ratings, application comments, number of comments, number of downloads, number of shares, etc., which is not done here. Qualified description.
  • the described manual maintenance information of the first application may include, but is not limited to: domain name information of the application installation source corresponding to the second application, trusted weight of the application installation source, application application permission information, and the like.
  • the target feature information of the second application can be used to represent the credibility of the second application, in other words, the target feature information of the second application is feature information that can be used to reflect that the second application is authentic and reliable. Therefore, after the characteristic information of the first application is acquired, the first result can be determined according to the target characteristic information of the second application and the characteristic information of the first application, so that the first result can reflect the availability of the first application. degree of confidence. In this way, the installation of the first application can be instructed by the first result, or the installation of the first application can be prevented according to the first result.
  • the first result may be determined by the application feature server according to the target feature information of the second application and the feature information of the first application; or the second terminal device may receive the target feature information of the second application sent by the application feature server after receiving the target feature information of the second application.
  • the first result is determined in combination with the feature information of the first application, which is not limited here.
  • the described second application may be an application already installed on the first terminal device after the first terminal device acquires the application installation package from the application installation source.
  • the application installation source at this time may be an installation source with a known trustworthiness level, or may be an installation source with an unknown trustworthiness level.
  • the target feature information for the above-mentioned second application may be obtained by the application feature server according to the feature information of the second application.
  • the described feature information of the second application may include first feature information of the second application and/or second feature information of the second application, wherein the first feature information is used to characterize the application of the second application attribute, and the second feature information is used to characterize the external feature attribute of the second application.
  • the feature information of the second application described at this time may include the first feature information of the second application. That is, the first feature information of the second application can be used as the target feature information of the second application, the operation process and the calculation process can be simplified, and the cycle and cost of constructing a trusted application distribution system can be further shortened.
  • the target feature information of the second application at this time may be obtained by the application feature server after acquiring the first feature information from the first terminal device.
  • the first feature information described above may be information obtained by the first terminal device for the second application.
  • the first feature information of the second application can be used as the target feature information of the second application to simplify the operation process and the calculation process, and further. Shorten the cycle and cost of building a trusted application distribution system.
  • the target feature information of the second application at this time may be obtained by the application feature server after acquiring the first feature information from the first terminal device.
  • the first result is determined according to the target feature information of the second application and the feature information of the first application.
  • the feature information of the first application and the target feature information can be calculated by means of a preset feature model or the like.
  • the feature reliability between the two, and the feature reliability is used as the first result, that is, the first result is used to indicate the reliability of the second application. It should be noted that, in practical applications, in addition to calculating the feature reliability between the feature information of the first application and the target feature information to determine the first result, other methods can also be used to determine, which is not done here. Qualified description.
  • the target feature information of the second application can represent the credibility of the second application
  • the first application can be obtained by obtaining the first application. After applying the feature information, compare or match the feature information of the first application and the target feature information of the second application to determine the first result, so that the first result can indicate the installation of the first application or prevent the installation of the first application. application. That is to say, in this embodiment, when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application.
  • FIG. 3 mainly describes the application processing method provided by the embodiment of the present application from a one-sided perspective, and the method may be executed by a user terminal or an application feature server.
  • the following describes the application processing method provided by the embodiment of the present application in detail from the perspective of device interaction.
  • FIGS. 4 to 6 4 mainly describes the application processing method from the perspective when the application feature server executes the above step 302;
  • FIG. 5 mainly describes the application processing method from the perspective when the second terminal device executes the above step 302;
  • the second application is from the perspective of an installation source with a known degree of trustworthiness, to describe the application processing method.
  • FIG. 4 is a schematic flowchart of an application processing method provided in an embodiment of the present application. It can be seen from FIG. 4 that the application processing method may include the following steps:
  • a first terminal device acquires first feature information of a second application.
  • the first terminal device obtains the application installation package of the second application from the application installation source, and installs the second application on the first terminal device. After installing the second application, the first terminal device may perform feature extraction on the second application to obtain first feature information of the second application. Specifically, the first terminal device may obtain the first feature information of the second application through its own application feature obtaining module.
  • the application installation source of the second application may be an installation source with a known degree of credibility, or may be an installation source with an unknown degree of credibility, which is not limited here.
  • the first feature information may be used to characterize application attributes of the second application.
  • the first feature information may include one or more of the application identifier of the second application, the installation source information of the second application, and the running behavior feature information of the second application. In practical applications, it may also be other feature information, which is not limited here.
  • the described application identifier of the second application may include, but is not limited to: the application name, the application IP address, the application package size, the application signature fingerprint, the hash value of the application file size, etc., which may identify the integrity and the integrity of the second application. unique feature.
  • the installation source information of the second application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located.
  • the running behavior feature information of the second application may include, but is not limited to, the duration that the second application is resident in the background, the requested authority and the actual use authority, etc., which are not limited here.
  • the first terminal device sends the first feature information of the second application to the application feature server.
  • the first terminal device after acquiring the first feature information of the second application, the first terminal device sends the first feature information to the application feature server.
  • the application feature server acquires second feature information of the second application.
  • the application feature server in addition to receiving the first feature information sent by the first terminal device, the application feature server also acquires second feature information of the second application, where the second feature information may represent external feature attributes of the second application.
  • the second feature information may include one or more of public information of the second application and manual maintenance information of the second application.
  • the second feature information may also be other features that can be used to represent the external feature attributes of the second application, which are not specifically described herein.
  • the described public information of the second application may include, but is not limited to: ratings on the application installation source, number of ratings, application comments, number of comments, number of downloads, number of shares, etc., which is not done here. Qualified description.
  • the described manual maintenance information of the second application may include but is not limited to: domain name information of the application installation source corresponding to the second application, trusted weight of the application installation source, application application permission information, etc., which are not limited here.
  • step 403 may also be performed first, followed by steps 401-402, and so on.
  • the application feature server performs feature extraction on the second application, and after obtaining the second feature information of the second application, the second feature information may also be assigned a corresponding feature weight.
  • feature weights may be assigned to the second feature information such as the public information of the second application and the manual maintenance information of the second application, respectively.
  • the feature weights respectively assigned to the second feature information such as the public information of the second application and the manual maintenance information of the second application may be the same or different, which are not limited descriptions herein.
  • the application feature server may also assign corresponding feature weights to the first feature information.
  • feature weights may be assigned to the first feature information such as the application identifier of the second application, the installation source information of the second application, and the running behavior feature information of the second application, respectively.
  • the feature weights assigned to the first feature information, such as the application identifier of the second application, the installation source information of the second application, and the feature information of the running behavior of the second application, may be the same or different, which is not limited here. illustrate.
  • the application feature server determines target feature information based on the first feature information of the second application and the second feature information of the second application, where the target feature information is used to represent the credibility of the second application.
  • the application feature server determines the first feature information according to the first feature information and the second feature information. 2.
  • Outgoing target feature information of the application It should be noted that the target feature information of the second application may reflect the credibility of the second application, or the target feature information of the second application is feature information that can be used to reflect that the second application is authentic and credible.
  • the application feature server may determine the target feature information based on the first feature information and the second feature information according to a preset rule; or, the application feature server may also use the first feature information and the second feature information as the default feature model input, and then obtain the target feature information. There is no specific description here.
  • the second terminal device acquires feature information of the first application, where the first application comes from an installation source of unknown reliability.
  • the feature information of the first application may be used to characterize the application attribute of the first application, and/or used to characterize the external feature attribute of the first application, which is not limited here.
  • the feature information of the first application may include the application identifier of the first application, the application package size of the first application, and the installation source information of the first application. one or more of.
  • the first feature information of the first application may also be other information that can characterize the features of the first application, for example, the application name and IP address of the first application, which are not limited here.
  • the feature information of the first application may include one or more of the public information of the first application and the manual maintenance information of the first application.
  • the feature information of the first application may also be other features that can be used to characterize the external feature attributes of the first application.
  • the described public information of the first application may include, but is not limited to, the rating on the application installation source, the number of ratings, the application comments, the number of comments, the number of downloads, the number of shares, etc., which is not done here. Qualified description.
  • the described manual maintenance information of the first application may include, but is not limited to: domain name information of the application installation source corresponding to the second application, trusted weight of the application installation source, application application permission information, and the like.
  • the described first application comes from an installation source of unknown credibility, indicating that the source of the installation package of the first application belongs to an unknown credibility, that is, the installation package of the first application may be an authentic and credible installation package , or it may not be a real installation package, and no limitation is given here.
  • the described installation sources of unknown trustworthiness may include, but are not limited to, third-party application markets, personal websites, etc., which are not limited here.
  • the second application described above may be the same as the first application, or may be different from the first application.
  • the first application is application A
  • the second application may be application A or application B, which is not limited here.
  • the second terminal device sends the feature information of the first application to the application feature server.
  • the second terminal device may send the feature information of the first application to the application feature server.
  • steps 401-404 and 405-406 are not specifically limited. In practical applications, steps 405-406 may be executed first, followed by steps 401-404, and so on.
  • the application feature server determines a first result based on the target feature information and the feature information of the first application, where the first result indicates the credibility of the first application.
  • the application feature server can determine the first result in combination with the target feature information. Specifically, the application feature server may calculate the feature reliability between the feature information of the first application and the target feature information, and use the feature reliability as the first result, that is, use the first result to indicate the availability of the first application. letter situation.
  • the application feature server can also determine the first result in other ways, which is not done here. Qualified description.
  • the application feature server sends the first result to the second terminal device.
  • the application feature server may send the first result to the second terminal device.
  • the second terminal device installs the first application according to the first result, or prevents the installation of the first application according to the first result.
  • the second terminal device can know whether the source of the first application is actually authentic or not. . In this way, the second terminal device installs the first application when the first result reflects that the first application is authentic and credible; or, the second terminal device may install the first application when the first result reflects that the first application is not authentic and credible In the case of , the first application is prevented from being installed.
  • the feature reliability when the feature reliability is greater than or equal to the preset threshold, it means that the first application is authentic, and the second terminal device can install the first application; if the feature reliability is less than the preset threshold, It means that the first application is not authentic and credible, and at this time, the second terminal device can prevent the installation of the first application.
  • the application feature server may obtain the first feature information of the second application received from the first terminal device and the The second feature information of the second application is obtained, thereby determining the target feature information of the second application, and then characterizing the credibility of the second application from the target feature information of the second application.
  • the application feature server also receives the feature information of the first application sent by the second terminal device, so as to combine the target of the second application The feature information determines the first result, so that the second terminal device performs an operation of whether to install the first application based on the first result.
  • the first terminal device on the terminal side can obtain information that has been feature information of the second application installed on the first terminal device, and extract features according to artificial intelligence algorithms, etc. and assign corresponding feature weights, and then complete the trusted identification of the first application on the open Internet by means of end-cloud collaboration , so as to complete the trusted installation and processing of the first application.
  • FIG. 5 shows a schematic flowchart of another application processing method provided in an embodiment of the present application. As can be seen from Figure 5, the application processing method includes the following steps:
  • a first terminal device acquires first feature information of a second application.
  • the first terminal device sends the first feature information of the second application to the application feature server.
  • the application feature server acquires second feature information of the second application.
  • the application feature server determines target feature information based on the first feature information of the second application and the second feature information of the second application, where the target feature information indicates the trustworthiness of the second application.
  • steps 501 to 504 in this embodiment can be specifically understood with reference to the content described in the foregoing steps 401 to 404 in FIG. 4 , and details are not repeated here.
  • the application feature server sends the target feature information to the second terminal device.
  • the application feature server can determine the target feature information of the second application according to the first feature information and the second feature information, and use the target feature information sent to the second terminal device. In this way, after receiving the target feature information, the second terminal device compares or matches the target feature information with the feature information of the first application, and uses the comparison result or matching result to determine whether the first application is authentic or not. .
  • the second terminal device acquires feature information of the first application, where the first application comes from an installation source of unknown reliability.
  • step 506 can be specifically understood with reference to the content described in step 405 in FIG. 4 , and the steps are limited and described here.
  • step 506 may also be executed first, followed by steps 501-505 and so on.
  • the second terminal device determines a first result based on the target feature information and the feature information of the first application, where the first result indicates the credibility of the first application.
  • the second terminal device after receiving the target feature information sent by the application feature server, the second terminal device can determine the first result in combination with the feature information of the first application. Specifically, the second terminal device may calculate the feature credibility between the first feature information and the target feature information, and use the feature credibility as the first result, that is, use the first result to indicate the credibility of the first application happening. In practical applications, in addition to determining the first result by calculating the feature reliability between the first feature information and the target feature information, the second terminal device may also determine the first result by other methods, which are not limited here. illustrate.
  • the second terminal device installs the first application according to the first result, or prevents the installation of the first application according to the first result.
  • step 508 in this embodiment can be specifically understood with reference to the content described in step 409 in FIG. 4 , which is not repeated here.
  • the application feature server may obtain the first feature information of the second application received from the first terminal device and the The second feature information of the second application is obtained, thereby determining the target feature information of the second application, and then characterizing the credibility of the second application from the target feature information of the second application.
  • the application feature server sends the target feature information to the second terminal device, and the second terminal device combines the features of the first application with the second terminal device. information to determine whether the first application is authentic.
  • the first terminal device on the terminal side can obtain information that has been The feature information of the second application installed on the first terminal device, and the feature extraction and feature weight are performed according to artificial intelligence algorithms, etc., and then the identification of whether the first application on the open Internet is authentic or not can be completed by means of device-cloud collaboration , so as to complete the trusted installation and processing of the first application.
  • the feature information and application source information of existing applications are widely used to determine the first application originating from an installation source of unknown credibility, which can reduce the need for building trusted applications.
  • the end side of the second terminal device can also judge whether the first application is authentic or not, which greatly enriches the applicable scenarios in the application installation process.
  • the first feature information of the second application may be used as the target feature at this time. information to determine the first result.
  • FIG. 6 is a schematic flowchart of another application processing method provided in this embodiment of the present application. As can be seen from Figure 6, the application processing method includes the following steps:
  • the first terminal device acquires first feature information of a second application, where the second application originates from an installation source with a known reliability.
  • the second application comes from an installation source with a known degree of credibility, which means that the source of the second application installed by the first terminal device is authentic, reliable and safe.
  • the first terminal device may obtain the application installation package of the second application from a real and trusted installation source, and install the second application on the first terminal device. In this way, the first terminal device can perform feature extraction on the second application to obtain the first feature information of the second application.
  • the first feature information may be used to characterize application attributes of the second application.
  • the first feature information may include one or more of the application identifier of the second application, the installation source information of the second application, and/or the running behavior feature information of the second application. In practical applications, it may also be other feature information, which is not limited here.
  • the described application identifier of the second application may include, but is not limited to: the application name, the application IP address, the application package size, the application signature fingerprint, the hash value of the application file size, etc., which may identify the integrity and the integrity of the second application. unique feature.
  • the installation source information of the second application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located.
  • the running behavior feature information of the second application may include, but is not limited to, the duration that the second application resides in the background, the applied permission and the actual usage permission, etc., which are not specifically limited here.
  • the first terminal device sends the first feature information of the second application to the application feature server.
  • step 602 can be specifically understood with reference to the content described in step 402 in FIG. 4 , which is not limited here.
  • the application feature server obtains target feature information based on the first feature information of the second application, where the target feature information indicates the credibility of the second application.
  • the application feature server since the second application installed by the first terminal device is from an installation source with a known credibility, the application feature server, after receiving the first feature information of the second application sent by the first terminal device, will All or part of the first feature information of the second application can be directly used as the target feature information, which is convenient for simplifying the operation process and computational complexity, and can further shorten the cycle and cost of identifying whether the first application is authentic.
  • the second terminal device acquires feature information of the first application, where the first application comes from an installation source of unknown reliability.
  • the second terminal device sends the feature information of the first application to the application feature server.
  • steps 604-605 can be specifically understood with reference to the content described in steps 405-406 in FIG. 4, and the steps are limited and described herein.
  • steps 601-603 and 604-605 are not specifically limited. In practical applications, steps 604-605 may be executed first, followed by steps 601-603, and so on.
  • the application feature server determines a first result based on the target feature information and the first feature information, where the first result indicates the credibility of the first application.
  • the application feature server sends the first result to the second terminal device.
  • the second terminal device installs the first application according to the first result, or prevents the installation of the first application according to the first result.
  • Steps 606 to 608 in this embodiment can be understood with reference to the content described in steps 407 to 409 in FIG. 4 , which will not be repeated here.
  • the application feature server may also send the target feature information to the second terminal device, and the second terminal device determines the first result according to the target feature information and the feature information of the first application, The specific process can be understood with reference to the process described in FIG. 5 , which is not repeated here.
  • the first application in a situation where the first application comes from an installation source with an unknown degree of trustworthiness, and the second application installed by the first terminal device is from an installation source with a known degree of trustworthiness, the first application may be The first feature information of the second application obtained by a terminal device is directly used as the target feature information of the second application. In this way, when the second terminal device needs to install the first application from an installation source with an unknown degree of credibility, it can judge whether the first application is authentic and credible based on the feature information of the application by means of end-cloud collaboration.
  • the first application of an installation source with unknown credibility can reduce the time and cost required for building a trusted application distribution ecosystem.
  • the first feature information when the second application with a credible source is installed is directly used as the target feature information, which is convenient for simplifying the operation process and computational complexity, and can further shorten the process of identifying whether the first application is authentic or not. cycle and cost.
  • the above-mentioned application processing apparatus includes corresponding hardware structures and/or software modules for executing each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
  • the present application may divide the application processing device into functional units according to the above method embodiments.
  • each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one function. in the unit.
  • the above-mentioned integrated functional units may be implemented in the form of hardware, and may also be implemented in the form of software functional units.
  • an embodiment of the present application provides a schematic structural diagram of an application processing apparatus, and the application processing apparatus may be the application feature server described in the foregoing FIG. 2 . , or the second terminal device.
  • the described application processing apparatus may include:
  • Obtaining unit 701 used for feature information of a first application, where the first application comes from an installation source with an unknown degree of credibility;
  • the processing unit 702 is configured to determine a first result according to the target feature information of the second application and the feature information of the first application, the target feature information of the second application is used to represent the credibility of the second application, and the first result is used to indicate The first application is installed, or the first application is prevented from being installed, where the first application is the same as or different from the second application.
  • the target feature information of the second application is obtained by an application feature server according to the feature information of the second application.
  • the feature information of the second application includes obtaining according to the first feature information of the second application and the second feature information of the second application, wherein the first feature information is used to characterize the application of the second application. attribute, and the second feature information is used to characterize the external feature attribute of the second application.
  • the described application installation source of the second application may be an installation source with a known degree of credibility, or an installation source with an unknown degree of credibility, so the application feature server needs to combine the first feature information of the second application with the second feature.
  • the information determines the target feature information of the second application, and the target feature information represents the credibility of the second application.
  • the feature information of the second application is obtained by including the first feature information of the second application, wherein the first feature information is used for An application attribute characterizing the second application. Since the second application installed by the first terminal device comes from an installation source with a known degree of trustworthiness, the application feature server, after receiving the first feature information of the second application sent by the first terminal device, can directly The first feature information of the second application is used as the target feature information, which is convenient for simplifying the operation process and computational complexity, and can further shorten the cycle and cost of identifying whether the first application is authentic or not.
  • the first feature information is information obtained by the first terminal device for the second application.
  • the processing unit 702 is configured to: determine the feature reliability between the target feature information of the second application and the feature information of the first application; and use the feature reliability as the first result.
  • the feature information of the first application includes one or more of an application identifier of the first application, an application package size of the first application, and installation source information of the first application.
  • the described application identifier of the first application may include, but is not limited to, an application name, an application IP address, an application signature fingerprint, a hash value of an application file size, and other features that can identify the integrity and uniqueness of the first application.
  • the installation source information of the first application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located, all of which are here. No specific limitation is made.
  • the first feature information of the second application includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior feature information of the second application.
  • the described application identifier of the second application may include, but is not limited to: the application name, the application IP address, the application package size, the application signature fingerprint, the hash value of the application file size, etc., which may identify the integrity and the integrity of the second application. unique feature.
  • the installation source information of the second application may include, but is not limited to, the name of the installation source, the IP address of the installation source, the domain name of the installation source, etc., and may also include additional feature information such as the popularity and authority of the website where the installation source is located.
  • the running behavior feature information of the second application may include, but is not limited to, the duration that the second application resides in the background, the applied permission and the actual usage permission, etc., which are not specifically limited here.
  • the second feature information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
  • the described public information of the second application may include, but is not limited to: ratings on the application installation source, number of ratings, application comments, number of comments, number of downloads, number of shares, etc., which is not done here. Qualified description.
  • the described manual maintenance information of the second application may include, but is not limited to: the domain name information of the application installation source corresponding to the second application, the trusted weight of the application installation source, the application application permission information, etc., which are not limited here.
  • the target feature information of the second application can represent the credibility of the second application
  • the processing unit 702 will determine the first result according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate the installation of the first application or prevent the installation.
  • the first application when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application.
  • the application processing apparatus may include the application feature server shown in FIG. 2 , or may be a second terminal device. Therefore, the first terminal device, the application feature server, and the second terminal device in FIG. 2 will be described below from the perspective of functional units, respectively. details as follows:
  • an embodiment of the present application provides a schematic structural diagram of a first terminal device, where the first terminal device may include:
  • An application feature acquisition module 801 configured to acquire first feature information of a second application, where the first feature information can be used to characterize application attributes of the second application;
  • the application feature sending module 802 is configured to send the first feature information of the second application to the application feature server.
  • the first feature information includes one or more of an application identifier of the second application, installation source information of the second application, and running behavior feature information of the second application.
  • the first terminal device is mainly described above from the perspective of functional units, and the application feature server will be described below from the perspective of functional units.
  • the application feature server may include:
  • a processing module 902 configured to obtain target feature information of the second application according to the feature information of the second application, and the target feature information of the second application is used to represent the credibility of the second application;
  • the obtaining module 901 is further configured to obtain feature information of a first application sent by the second terminal device, where the first application comes from an installation source with an unknown degree of credibility;
  • the processing module 902 is further configured to determine a first result according to the target feature information of the second application and the feature information of the first application, where the first result indicates the credibility of the first application;
  • the sending module 903 is configured to send the first result to the second terminal device, instructing the second terminal device to install the first application, or to prevent the installation of the first application.
  • the feature information of the second application includes first feature information of the second application and second feature information of the second application, the first feature information is used to characterize the application attribute of the second application, the second The feature information is used to characterize the external feature attributes of the second application;
  • the obtaining module 901 is specifically configured to obtain the first feature information of the second application sent by the first terminal device, and obtain the second feature information of the second application;
  • a processing module 902 configured to determine target feature information of the second application according to the second feature information of the second application and the third feature information of the second application;
  • the feature information of the second application includes first feature information of the second application, and the first feature information is used to represent the application attributes of the second application;
  • the acquiring module 901 is specifically used for Obtaining the first feature information of the second application sent by the first terminal device when it comes from an installation source with a known credibility;
  • the processing module 902 is configured to determine target feature information of the second application according to the first feature information of the second application.
  • the sending module 903 is further configured to send the target feature information of the second application to the second terminal device after the processing module 902 determines the target feature information of the second application according to the feature information of the second application. .
  • the processing module 902 is specifically configured to determine the feature reliability between the target feature information of the second application and the feature information of the first application; take the feature reliability as the first result .
  • the first terminal device and the application feature server are mainly described above from the perspective of functional units, and the second terminal device will be described below from the perspective of functional units.
  • the second terminal device may include:
  • a feature acquisition module 1001 configured to acquire feature information of a first application, where the first application comes from an installation source with unknown credibility
  • the feature acquisition module 1001 is further configured to receive a first result sent by the application feature server, where the first result is a result determined based on the feature information of the first application and the target feature information of the second application, the target feature of the second application The information is used to characterize the trustworthiness of the second application;
  • the feature detection module 1003 is configured to install the first application according to the first result, or prevent the installation of the first application according to the first result.
  • the feature acquisition module 1001 is further specifically configured to: acquire target feature information of the second application sent by the application feature server;
  • the feature detection module 1003 is configured to determine the first result according to the feature information of the first application and the target feature information of the second application.
  • FIG. 11 shows a schematic structural diagram of an application processing system.
  • an embodiment of the application processing system of the present application may include: an application feature server and a second terminal device; wherein, the second terminal device is used for:
  • the application feature server is used to: determine the first result according to the target feature information of the second application and the feature information of the first application, the target feature information of the second application is used to represent the credibility of the second application, and the first result is used to indicate The first application is installed, or the first application is prevented from being installed, where the first application is the same as or different from the second application.
  • the second terminal device can pass After acquiring the characteristic information of the first application, the characteristic information of the first application is sent to the application characteristic server.
  • the application feature server can determine the first result according to the feature information of the first application and the target feature information of the second application, so that the first result can indicate the installation of the first application or prevent the installation of the first application.
  • the embodiment of the present application when the need to install comes from an unknown degree of trustworthiness.
  • the target feature information of the installed second application and the feature information of the first application can be used to judge whether the first application is authentic and credible, thereby completing the application credible installation and processing;
  • the application feature server is further configured to: acquire feature information of the second application; and determine target feature information of the second application according to the feature information of the second application.
  • the feature information of the second application includes first feature information of the second application and second feature information of the second application, where the first feature information is used to represent application attributes of the second application, and the second feature information The feature information is used to characterize external feature attributes of the second application.
  • the feature information of the second application when the second application comes from an installation source with a known reliability, includes first feature information of the second application, and the first feature information is used to represent the second application.
  • Application properties for the application when the second application comes from an installation source with a known reliability, includes first feature information of the second application, and the first feature information is used to represent the second application.
  • FIG. 12 shows a schematic structural diagram of another application processing system.
  • an embodiment of the application processing system of the present application may further include: a first terminal device; the first terminal device is configured to: acquire the first feature information of the second application; send the first feature information to the application feature server a feature information.
  • the application feature server is further configured to: determine the feature reliability between the target feature information of the second application and the feature information of the first application; reliability as the first result.
  • the application feature server is further configured to send the first result to the second terminal device; the second terminal device is further configured to install the first application according to the first result , or prevent the first application from being installed.
  • the characteristic information of the first application includes one or more of the application identifier of the first application, the application package size of the first application, and the installation source information of the first application indivual.
  • the first characteristic information of the second application includes the application identifier of the second application, the installation source information of the second application, and the running behavior characteristic information of the second application. one or more.
  • the second characteristic information of the second application includes one or more of public information of the second application and manual maintenance information of the second application.
  • the target feature information of the second application can represent the credibility of the second application, in the case that the first application is derived from an installation source with an unknown degree of credibility, it can be shown in FIG. 11 and/or FIG. 12 .
  • the second terminal device in the application processing system described in performs feature extraction on the first application to obtain feature information of the first application; then, the second terminal device sends the feature information of the first application to the application feature server, and the The application feature server determines the first result according to the feature information of the first application and the target feature information of the second application.
  • the application feature server can then feed back the first result to the second terminal device, so that the second terminal device can install the first application or prevent the installation of the first application according to the first result.
  • the first application when it is necessary to install the first application from an installation source with an unknown degree of trustworthiness, the first application can be executed by using the target feature information of the installed second application and the feature information of the first application. Whether it is true and credible is judged, so as to complete the credible installation and processing of the application; and, in the embodiment of the present application, it is not necessary to rely on the authentication of the developer and the pre-configured application distribution client, but the feature information of the existing application is widely used.
  • Using the application source information to determine the first application originating from an installation source of unknown trustworthiness can reduce the time and cost required for building a trusted application distribution ecosystem.
  • the above describes the application processing apparatus in the embodiments of the present application from the perspective of modular functional entities, the first terminal device, the application feature server, and the second terminal device, and the application processing system from the system perspective. Described from the perspective of entity devices, the above-mentioned application processing apparatus, first terminal device, application feature server, and second terminal device may be implemented by one entity device, or jointly implemented by multiple entity devices, or may be implemented within one entity device.
  • a logical functional unit which is not specifically limited in this embodiment of the present application.
  • FIG. 13 is a schematic diagram of a hardware structure of a communication device provided by an embodiment of the present application.
  • the communication device includes at least one processor 1301 , communication lines 1307 , memory 1303 and at least one communication interface 1304 .
  • the processor 1301 can be a general-purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (application-specific integrated circuit, server IC), or one or more programs used to control the program execution of the present application of integrated circuits.
  • CPU central processing unit
  • microprocessor microprocessor
  • application-specific integrated circuit application-specific integrated circuit, server IC
  • programs used to control the program execution of the present application of integrated circuits.
  • Communication line 1307 may include a path to communicate information between the components described above.
  • the memory 1303 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types of storage devices that can store information and instructions It can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being executed by a computer Access any other medium without limitation.
  • the memory may exist independently and be connected to the processor through communication line 1307 .
  • the memory 1303 may also be integrated with the processor 1301.
  • the memory 1303 is used for storing computer-executed instructions for executing the solution of the present application, and the execution is controlled by the processor 1301 .
  • the processor 1301 is configured to execute the computer-executed instructions stored in the memory 1303, thereby implementing the application processing method provided by the above embodiments of the present application.
  • the computer-executed instructions in the embodiment of the present application may also be referred to as application code, which is not specifically limited in the embodiment of the present application.
  • the processor 1301 may include one or more CPUs, such as CPU0 and CPU1 in FIG. 13 .
  • the communication apparatus may include multiple processors, for example, the processor 1301 and the processor 1302 in FIG. 13 .
  • processors can be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (eg, computer program instructions).
  • the communication device may further include an output device 1305 and an input device 1306 .
  • the output device 1305 is in communication with the processor 1301 and can display information in a variety of ways.
  • the input device 1306 is in communication with the processor 1301 and can receive user input in a variety of ways.
  • the input device 1306 may be a mouse, a touch screen device, a sensing device, or the like.
  • the above-mentioned communication device may be a general-purpose device or a dedicated device.
  • the communication device may be a portable computer, a mobile terminal, etc. or a device with a similar structure in FIG. 13 .
  • the embodiment of the present application does not limit the type of the communication device.
  • the processor 1301 in FIG. 13 may call the computer execution instructions stored in the memory 1303 to cause the application processing apparatus to execute the method in the method embodiment corresponding to FIG. 3 .
  • the processor 1301 in FIG. 13 can cause the first terminal device to execute the method performed by the first terminal device in the method embodiments corresponding to FIG. 4 to FIG. 6 by invoking the computer execution instructions stored in the memory 1303 .
  • the processor 1301 in FIG. 13 can cause the application feature server to execute the method performed by the application feature server in the method embodiments corresponding to FIG. 4 to FIG. 6 by invoking the computer execution instructions stored in the memory 1303 .
  • the processor 1301 in FIG. 13 may call the computer execution instructions stored in the memory 1303 to cause the second terminal device to execute the method performed by the second terminal device in the method embodiments corresponding to FIGS. 4-6 .
  • the processing unit 702 in FIG. 7 , the processing module 902 in FIG. 9 , and the function/implementation process of the feature detection module 1003 in FIG. 10 can call the computer execution instructions stored in the memory 1303 through the processor 1301 in FIG. 13 .
  • the function/implementation process of the module 1002 can be realized through the communication interface 1304 in FIG. 13 .
  • the disclosed system, apparatus and method may be implemented in other manners.
  • the apparatus embodiments described above are only illustrative.
  • the division of the unit is only a logical function division.
  • there may be other division methods for example, multiple units or components may be combined or Integration into another system, or some features can be ignored, or not implemented.
  • the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
  • the unit described as a separate component may or may not be physically separated, and the component displayed as a unit may or may not be a physical unit, that is, it may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , which includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method in each embodiment of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .
  • a computer program product includes one or more computer instructions.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • Computer instructions may be stored on or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website site, computer, server, or data center over a wire (e.g. coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.) to another website site, computer, server, or data center.
  • a wire e.g. coaxial cable, fiber optic, digital subscriber line (DSL)
  • wireless e.g, infrared, wireless, microwave, etc.
  • the computer-readable storage medium can be any available medium that a computer can store, or a data storage device such as a server, a data center, etc., that includes one or more available media integrated.
  • Useful media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media (eg, SSDs), and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请公开了一种应用处理的方法以及相关装置,无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。前述的方法包括:获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。

Description

一种应用处理的方法以及相关装置
本申请要求于2021年04月07日提交的申请号为CN202110372878.8、发明名称为“一种应用处理的方法以及相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及计算机技术领域,具体涉及一种应用处理的方法以及相关装置。
背景技术
随着移动互联网的普及程度越来越高,越来越多的用户都依赖于预装在终端设备上的诸如手机助手、应用商店等应用分发客户端、以及依赖于开发者的认证,来完成终端设备安装应用的过程。图1示出了相关技术中的一个安装应用的流程示意图。如图1所示,应用分发厂商通常先将应用分发客户端预装在终端设备上,并由开发者将应用(application)上传至应用分发服务器。这样,用户便可以通过应用分发客户端从应用分发服务器上下载相关应用,进而触发在终端设备上安装应用。
上述所描述的安装应用的方案主要是应用分发厂商通过对开发者进行认证,从开发者处获取可信的应用;并且应用分发厂商需要将应用分发客户端预先配置在终端设备上,才能确保后续安装应用时的分发渠道的可靠和可信。但是,需要投入大量的人力进行开发者的认证、以及应用分发厂商对应用分发客户端的预安装,而且需要在应用分发客户端中提供大量的应用安装源提供应用下载,成本较高,周期长,不利于快速构建可信的应用分发生态架构。
发明内容
本申请实施例提供了一种应用处理的方法以及相关装置,无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
第一方面,本申请实施例提供了一种应用处理的方法,该方法可以应用于应用特征服务器中,也可以应用在第二终端设备中,该方法可以包括:获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。
通过上述方式,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以通过获取到第一应用的特征信息后,将根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果,使得该第一结果能够指示出安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应 用,能够减少构建可信应用分发生态所需的时间和成本。
可选的,在一些示例中,第二应用的目标特征信息是由应用特征服务器根据第二应用的特征信息得到。
可选的,在一些示例中,第二应用的目标特征信息包括第二应用的第一特征信息和/或第二应用的第二特征信息得到,其中,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。
所描述的第二应用的应用安装源可以是已知可信程度的安装源,也可以是未知可信程度的安装源,因此需要应用特征服务器将第二应用的第一特征信息和/或第二特征信息确定出该第二应用的目标特征信息,以此目标特征信息表征出第二应用的可信情况。
此外,该第一特征信息可以用于表征第二应用的应用属性,譬如,第一特征信息可以包括第二应用的应用标识、第二应用的安装源信息和第二应用的运行行为特征信息中的一个或多个。在实际应用中,还可以是其他的特征信息,此处不做限定说明。所描述的第二应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的包大小、应用的签名指纹、应用文件大小的哈希值等可以标识该第二应用的完整性和唯一性的特征。第二应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息。第二应用的运行行为特征信息可以包括但不限于第二应用在后台常驻的时长、申请的权限与实际使用权限等等。
另外,该第二特征信息可以表征该第二应用的外部特征属性,例如:该第二特征信息可以包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。所描述的第二应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等。所描述的第二应用的人工维护信息可以包括但不限于:第二应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等,此处不做限定说明。
可选的,在一些示例中,在第二应用来源于已知可信程度的安装源时,第二应用的目标特征信息根据所述第二应用的第一特征信息确定。
通过上述方式,由于第一终端设备安装的第二应用是来源于已知可信程度的安装源,那么应用特征服务器在接收到第一终端设备发送的第二应用的第一特征信息后,便可以直接将该第二应用的第一特征信息作为目标特征信息,便于简化操作流程和运算复杂度,能够进一步地缩短识别第一应用是否真实可信的周期和成本。
可选的,在一些示例中,第一特征信息是由第一终端设备针对第二应用获取得到的信息。
可选的,在一些示例中,根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,可以包括:确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;将特征可信度作为第一结果。
可选的,在一些示例中,第一应用的特征信息包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。
所描述的第一应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的签 名指纹、应用文件大小的哈希值等可以标识该第一应用的完整性和唯一性的特征。第一应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息,此处均不做具体限定说明。
可选的,在一些示例中,第二应用的第一特征信息包括第二应用的应用标识、二应用的安装源信息、以及第二应用的运行行为特征信息中的一个或多个。
所描述的第二应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的包大小、应用的签名指纹、应用文件大小的哈希值等可以标识该第二应用的完整性和唯一性的特征。第二应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息。第二应用的运行行为特征信息可以包括但不限于第二应用在后台常驻的时长、申请的权限与实际使用权限等等,此处均不做具体限定说明。
可选的,在一些示例中,第二应用的第二特征信息包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。所描述的第二应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等,此处不做限定说明。所描述的第二应用的人工维护信息可以包括但不限于:第二应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等,此处不做限定说明。
第二方面,本申请实施例提供了另一种应用处理的方法,该方法可以包括:应用特征服务器获取第二终端设备发送的第一应用的特征信息,第一应用来源于未知可信程度的安装源;应用特征服务器根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于表征第一应用的可信程度,第一应用与第二应用相同或者不相同;应用特征服务器向第二终端设备发送第一结果,以指示第二终端设备安装第一应用、或阻止安装第一应用。
通过上述方式,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以由第二终端设备对第一应用进行特征提取,得到第一应用的特征信息;然后,第二终端设备将该第一应用的特征信息发送至应用特征服务器,由应用特征服务器根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果。应用特征服务器便可以将第一结果反馈至第二终端设备,使得第二终端设备可以根据该第一结果安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
可选的,在一些示例中,该方法还可以包括:应用特征服务器根据第二应用的特征信息得到第二应用的目标特征信息。
可选的,在一些示例中,第二应用的特征信息包括第二应用的第一特征信息和/或第二 应用的第二特征信息,其中,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。
可选的,在一些示例中,在第二应用来源于已知可信程度的安装源时,第二应用的目标特征信息根据所述第二应用的第一特征信息确定。
可选的,在一些示例中,该方法还可以包括:应用特征服务器接收第一终端设备发送的第一特征信息,该第一特征信息由第一终端设备针对第二应用获取得到的。
可选的,在一些示例中,应用特征服务器根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,可以包括:应用特征服务器确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;应用特征服务器将特征可信度作为第一结果。
第三方面,本申请实施例中提供了另一种应用处理的方法,该方法可以包括:第二终端设备获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;第二终端设备向应用特征服务器发送第一应用的特征信息;第二终端设备接收应用特征服务器发送的第一结果,第一结果由应用特征服务器根据第二应用的目标特征信息和第一应用的特征信息得到,第二应用的目标特征信息用于表征第二应用的可信情况,第一应用与第二应用相同或者不相同;第二终端设备根据第一结果安装第一应用,或阻止安装第一应用。
第四方面,本申请实施例中提供了一种应用处理系统,该应用处理系统可以包括第二终端设备和应用特征服务器;所述第二终端设备,具体可以用于:获取第一应用的特征信息,所述第一应用来源于未知可信程度的安装源;向所述应用特征服务器发送所述第一应用的特征信息;所述应用特征服务器,具体用于根据第二应用的目标特征信息和所述第一应用的特征信息确定第一结果,所述第二应用的目标特征信息用于表征所述第二应用的可信情况,所述第一结果用于指示安装所述第一应用、或阻止安装所述第一应用,所述第一应用与所述第二应用相同或者不相同。
通过上述方式,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以由该应用处理系统中的第二终端设备对第一应用进行特征提取,得到第一应用的特征信息;然后,第二终端设备将该第一应用的特征信息发送至应用特征服务器,由应用特征服务器根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果。应用特征服务器便可以将第一结果反馈至第二终端设备,使得第二终端设备可以根据该第一结果安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
可选的,在一些示例中,所述应用特征服务器还用于:获取所述第二应用的特征信息;根据所述第二应用的特征信息确定所述第二应用的目标特征信息。
可选的,在一些示例中,所述第二应用的特征信息包括第二应用的第一特征信息和/或所述第二应用的第二特征信息,所述第一特征信息用于表征所述第二应用的应用属性, 所述第二特征信息用于表征所述第二应用的外部特征属性。
可选的,在一些示例中,在所述第二应用来源于已知可信程度的安装源时,所述第二应用的特征信息根据所述第二应用的第一特征信息确定。
可选的,在一些示例中,所述应用处理系统还包括第一终端设备;所述第一终端设备,用于:获取所述第二应用的第一特征信息;向所述应用特征服务器发送所述第一特征信息。
可选的,在一些示例中,所述应用特征服务器用于:确定所述第二应用的目标特征信息与所述第一应用的特征信息之间的特征可信度;将所述特征可信度作为第一结果。
可选的,在一些示例中,所述应用特征服务器,还用于向所述第二终端设备发送所述第一结果;所述第二终端设备,还用于根据第一结果安装所述第一应用、或阻止安装所述第一应用。
可选的,在一些示例中,所述第一应用的特征信息包括所述第一应用的应用标识、所述第一应用的应用包大小和所述第一应用的安装源信息中的一个或多个。
可选的,在一些示例中,所述第二应用的第一特征信息包括所述第二应用的应用标识、所述二应用的安装源信息、以及所述第二应用的运行行为特征信息中的一个或多个。
可选的,在一些示例中,所述第二应用的第二特征信息包括所述第二应用的公开信息、所述第二应用的人工维护信息中的一个或多个。
第五方面,本申请实施例中提供了一种应用处理装置,该应用处理装置可以包括:获取单元,用于获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;处理单元,用于根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。
可选的,在一些示例中,第二应用的目标特征信息是由应用特征服务器根据第二应用的特征信息得到。
可选的,在一些示例中,第二应用的目标特征信息包括第二应用的第一特征信息和/或第二应用的第二特征信息,其中,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。
可选的,在一些示例中,在第二应用来源于已知可信程度的安装源时,第二应用的目标特征信息包括第二应用的第一特征信息,其中,第一特征信息用于表征第二应用的应用属性。
可选的,在一些示例中,第一特征信息是由第一终端设备针对第二应用获取得到的信息。
可选的,在一些示例中,处理单元,用于:确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;将特征可信度作为第一结果。
可选的,在一些示例中,第一应用的特征信息包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。
可选的,在一些示例中,第二应用的第一特征信息包括第二应用的应用标识、二应用的安装源信息、以及第二应用的运行行为特征信息中的一个或多个。
可选的,在一些示例中,第二应用的第二特征信息包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。
第六方面,本申请实施例提供了一种应用处理装置,可以包括:存储器,用于存储计算机可读指令。还可以包括,与存储器耦合的处理器,用于执行存储器中的计算机可读指令从而执行如第一方面、第二方面、或第三方面,或者第一方面、第二方面或第三方面任意一种可能的实施方式中所描述的方法。
第七方面,本申请实施例提供了一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行如第一方面、第二方面、或第三方面,或者第一方面、第二方面或第三方面任意一种可能实现方式的方法。
第八方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如第一方面、第二方面、或第三方面,或者第一方面、第二方面或第三方面任意一种可能实现方式的方法。
本申请第九方面提供一种芯片系统,该芯片系统可以包括处理器,用于支持应用处理装置实现上述第一方面、第二方面、或第三方面,或者第一方面、第二方面或第三方面任意一种可能的实施方式中所描述的方法中所涉及的功能。
可选地,结合上述第九方面,在第一种可能的实施方式中,芯片系统还可以包括存储器,存储器,用于保存应用处理装置必要的程序指令和数据。该芯片系统,可以由芯片构成,也可以包含芯片和其他分立器件。其中,芯片系统可以包括专用集成电路(application specific integrated circuit,ASIC)、现成可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件等。进一步,芯片系统还可以可以包括接口电路等。
上述第二方面至第九方面所获得的技术效果与第一方面中对应的技术手段获得的技术效果近似,在这里不再赘述。
从以上技术方案可以看出,本申请实施例具有以下优点:
在本申请实施例中,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以通过获取到第一应用的特征信息后,将根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果,使得该第一结果能够指示出安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例。
图1是相关技术中的一个安装应用的流程示意图;
图2是本申请实施例中提供的一种应用处理系统的架构示意图;
图3是本申请实施例中提供的一种应用处理的方法流程示意图;
图4是本申请实施例中提供的另一种应用处理的方法流程示意图;
图5是本申请实施例中提供的另一种应用处理的方法流程示意图;
图6是本申请实施例中提供的另一种应用处理的方法流程示意图;
图7是本申请实施例提供了一种应用处理装置的结构示意图;
图8是本申请实施例提供了一种第一终端设备的结构示意图;
图9是本申请实施例提供了一种应用特征服务器的结构示意图;
图10是本申请实施例提供了一种第二终端设备的结构示意图;
图11是本申请实施例中提供的一种应用处理系统的示意图;
图12是本申请实施例中提供的另一种应用处理系统的示意图;
图13是本申请实施例提供的通信设备的硬件结构示意图。
具体实施方式
本申请实施例提供了一种应用处理的方法以及相关装置,无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本申请的实施例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含。在本申请中,“至少一个”是指一个或者多个,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指的这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,a和b,a和c,b和c或a和b和c,其中a、b和c可以是单个,也可以是多个。值得注意的是,“至少一项(个)”还可以解释成“一项(个)或多项(个)”。
由于在相关技术中,安装应用的方案主要是应用分发厂商通过对开发者进行认证,从开发者处获取可信的应用;并且应用分发厂商需要将应用分发客户端预先配置在终端设备上,才能确保后续安装应用时的分发渠道的可靠和可信。但是,需要投入大量的人力进行开发者的认证、以及应用分发厂商对应用分发客户端的预安装,而且需要在应用分发客户端中提供大量的应用安装源提供应用下载,成本较高,周期长,不利于终端厂商快速构建可信的应用分发生态架构。
因此,为了解决上述的技术问题,本申请实施例中提供了一种应用处理的方法,旨在解决传统应用分发技术依赖于开发者认证、以及在终端设备预配置应用分发客户端所带来的成本高、周期长等问题。请参阅图2,为本申请实施例中提供的一种应用处理系统的架构示意图。从图2可知,该应用处理系统中可以包括第一终端设备、应用特征服务器以及第二终端设备。其中,第二终端设备从未知可信程度的安装源中获取第一应用的安装包,并从中可以获取第一应用的特征信息;第一终端设备在获取第二应用的第一特征信息后,将该第一特征信息发送至应用特征服务器。然后由应用特征服务器在获取该第二应用的第二特征信息后,结合第一特征信息确定出该第二应用的目标特征信息,该第二应用的目标特征信息可以指示出该第二应用的可信情况。这样,应用特征服务器可以在获取到第二终端设备发送的第一应用的特征信息后,根据该第二应用的目标特征信息和第一应用的特征信息确定出第一结果;或者,也可以由第二终端设备从应用特征服务器中获取该第二应用的目标特征信息后,结合第一应用的特征信息确定出该第一结果。这样,第二终端设备便可以根据该第一结果安装或阻止安装该第二应用。
需理解的是,上述所描述的第一应用来源于未知可信程度的安装源,例如:可以是来源于第三方应用市场、个人网站等,此处不做限定说明。另外,所描述的第一应用可以与第二应用相同,也可以与第二应用不相同,此处不做限定说明。
此外,所描述的第一终端设备、第二终端设备可以包括各种具有无线通信功能的手持设备、车载设备、可穿戴设备、计算设备或连接到无线调制解调器的其他处理设备,以及各种形式的用户设备(user equipment,UE),移动台(mobile station,MS),移动终端等等,此处不做限定说明。所描述的应用特征服务器可以是具备对特征进行存储、分析、计算等功能的云端服务器、或者是其他的服务器等,此处不做限定说明。
为了便于理解,请参阅图3,为本申请实施例中提供的一种应用处理的方法流程示意图。图3所描述的应用处理的方法可以应用于应用特征服务器中,也可以应用在图2所示的第二终端设备中,此处不做限定说明。从图3可知,该应用处理的方法可以包括如下步骤:
301、获取第一应用的特征信息,第一应用来源于未知可信程度的安装源。
该示例中,可以是第二终端设备从未知可信程度的安装源中获取该第一应用的应用安装包后,进而触发安装该第一应用的应用安装包。这样,第二终端设备便可以获取到该第一应用的特征信息。
或者,在由第二终端设备获取到第一应用的特征信息后,将该第一应用的特征信息发送至该应用特征服务器。这样,应用特征服务器便可以获取到该第一应用的特征信息。
所描述的第一应用的特征信息可以用于表征第一应用的应用属性,和/或用于表征该第一应用的外部特征属性,此处不做限定说明。
此外,该第一应用的特征信息用于表征第一应用的应用属性时,该第一应用的特征信息可以包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。在实际应用中,该第一应用的第一特征信息还可以是其他的能够表征该第一应用的特征的信息,例如:第一应用的应用名称、IP地址等,此处不做限定说明。
该第一应用的特征信息用于表征第一应用的外部特征属性时,该第一应用的特征信息可以包括第一应用的公开信息、第一应用的人工维护信息中的一个或多个,在实际应用,第一应用的特征信息还可以是其他的能够用于表征该第一应用的外部特征属性的特征。所描述的第一应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等,此处不做限定说明。所描述的第一应用的人工维护信息可以包括但不限于:第二应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等。
302、根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。
该示例中,由于第二应用的目标特征信息可以用于表征第二应用的可信情况,或者说第二应用的目标特征信息是能够用于反映该第二应用是真实可信的特征信息。因此,在获取到第一应用的特征信息后,便可以根据该第二应用的目标特征信息和该第一应用的特征信息确定第一结果,使得该第一结果能够反映出第一应用的可信程度。这样,便能够通过该第一结果来指示安装该第一应用,或者是根据该第一结果来阻止安装第一应用。
具体地,既可以由应用特征服务器根据第二应用的目标特征信息和第一应用的特征信息确定第一结果;也可以由第二终端设备接收应用特征服务器发送的第二应用的目标特征信息后,结合第一应用的特征信息来确定第一结果,此处不做限定说明。
所描述的第二应用可以是由第一终端设备从应用安装源中获取应用安装包后,在该第一终端设备上已经安装的应用。此时的应用安装源可以是已知可信程度的安装源,也可以是未知可信程度的安装源。针对上述的第二应用的目标特征信息,可以是由应用特征服务器根据第二应用的特征信息得到。
在一些示例中,所描述的第二应用的特征信息可以包括第二应用的第一特征信息和/或第二应用的第二特征信息,其中,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。
在另一些示例中,在第二应用是来源于已知可信程度的安装源时,此时所描述的第二应用的特征信息可以包括第二应用的第一特征信息。即,可以把第二应用的第一特征信息作为第二应用的目标特征信息,简化操作流程以及运算过程,进一步缩短构建可信应用分发系统的周期和成本。此时的第二应用的目标特征信息可以由应用特征服务器从第一终端设备中获取第一特征信息后得到。
另外,上述所描述的第一特征信息可以是由第一终端设备针对该第二应用获取得到的信息。
可选的,在第二应用是来源于已知可信程度的安装源时,此时可以把第二应用的第一特征信息作为第二应用的目标特征信息,简化操作流程以及运算过程,进一步缩短构建可信应用分发系统的周期和成本。此时的第二应用的目标特征信息可以由应用特征服务器从第一终端设备中获取第一特征信息后得到。
可选的,在另一些示例中,根据第二应用的目标特征信息和第一应用的特征信息确定 第一结果,具体可以通过预设特征模型等方式计算第一应用的特征信息与目标特征信息之间的特征可信度,以此特征可信度作为第一结果,即利用第一结果指示出该第二应用的可信程度。需说明,在实际应用中,除了计算第一应用的特征信息和目标特征信息之间的特征可信度的方式来确定出第一结果以外,还可以通过其他的方式来确定,此处不做限定说明。
在本申请实施例中,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以通过获取到第一应用的特征信息后,将第一应用的特征信息和第二应用的目标特征信息进行比较或者匹配,以确定出第一结果,使得该第一结果能够指示出安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
上述图3主要从单侧的角度描述了本申请实施例提供的应用处理的方法,并且该方法可以由用户终端执行,也可以由应用特征服务器执行。下面将从设备交互的角度,详细地描述本申请实施例提供的应用处理的方法,具体可以参照后续图4-图6。其中,图4主要从应用特征服务器执行上述步骤302时的角度来描述应用处理的方法;图5主要从第二终端设备执行上述步骤302时的角度来描述应用处理的方法;图6主要从第二应用来源于已知可信程度的安装源的角度,来描述应用处理的方法。下面将分别对此做介绍:
请参阅图4,为本申请实施例中提供的一种应用处理的方法流程示意图。从图4可知,该应用处理的方法可以包括如下步骤:
401、第一终端设备获取第二应用的第一特征信息。
该示例中,第一终端设备从应用安装源上获取第二应用的应用安装包,并将该第二应用安装在第一终端设备上。第一终端设备在安装该第二应用后,可以对该第二应用进行特征提取,得到该第二应用的第一特征信息。具体地,第一终端设备可以通过自身的应用特征获取模块,来获取第二应用的第一特征信息。
此时的第二应用的应用安装源可以是已知可信程度的安装源,也可以是未知可信程度的安装源,此处不做限定说明。
该第一特征信息可以用于表征第二应用的应用属性。譬如,第一特征信息可以包括第二应用的应用标识、第二应用的安装源信息和第二应用的运行行为特征信息中的一个或多个。在实际应用中,还可以是其他的特征信息,此处不做限定说明。
所描述的第二应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的包大小、应用的签名指纹、应用文件大小的哈希值等可以标识该第二应用的完整性和唯一性的特征。第二应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息。第二应用的运行行为特征信息可以包括但不限于第二应用在后台常驻的时长、申请的权限与实际使用 权限等等,此处均不做限定说明。
402、第一终端设备向应用特征服务器发送第二应用的第一特征信息。
该示例中,在第一终端设备获取到第二应用的第一特征信息后,向应用特征服务器发送该第一特征信息。
403、应用特征服务器获取第二应用的第二特征信息。
在该示例中,应用特征服务器除了接收第一终端设备发送的第一特征信息以外,还获取第二应用的第二特征信息,该第二特征信息可以表征该第二应用的外部特征属性。例如:该第二特征信息可以包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。在实际应用,第二特征信息还可以是其他的能够用于表征该第二应用的外部特征属性的特征,具体此处不做限定说明。
所描述的第二应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等,此处不做限定说明。所描述的第二应用的人工维护信息可以包括但不限于:第二应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等,此处不做限定说明。
在本申请中,对于上述步骤401-402与步骤403的执行顺序不做限定说明。在实际应用中,还可以先执行步骤403、后执行步骤401-402等等。
在另一些情形中,应用特征服务器对第二应用进行特征提取,得到第二应用的第二特征信息后,还可以为第二特征信息赋予相应的特征权重。例如:分别可以对第二应用的公开信息、第二应用的人工维护信息等第二特征信息分别赋予特征权重。针对为对第二应用的公开信息、第二应用的人工维护信息等第二特征信息分别赋予的特征权重,可以相同,也可以不相同,此处不做限定说明。
在另一些情形中,应用特征服务器在接收第一终端设备发送的第二应用的第一特征信息后,也可以对第一特征信息赋予相应的特征权重。例如:可以分别对第二应用的应用标识、第二应用的安装源信息、第二应用的运行行为特征信息等第一特征信息分别赋予特征权重。针对为对第二应用的应用标识、第二应用的安装源信息、第二应用的运行行为特征信息等第一特征信息分别赋予的特征权重,可以相同,也可以不相同,此处不做限定说明。
404、应用特征服务器基于第二应用的第一特征信息和第二应用的第二特征信息确定目标特征信息,目标特征信息用于表征第二应用的可信情况。
该示例中,应用特征服务器在从第一终端设备接收到第一特征信息,以及自身获取或从其他第三方平台获取到第二特征信息之后,根据该第一特征信息和第二特征信息确定第二应用的出目标特征信息。需说明,该第二应用的目标特征信息可以反映出第二应用的可信情况,或者说第二应用的目标特征信息是能够用于反映该第二应用是真实可信的特征信息。
具体地,应用特征服务器可以根据预设规则,基于第一特征信息和第二特征信息确定目标特征信息;或者,应用特征服务器也可以将第一特征信息和第二特征信息作为预设特征模型的输入,进而得到目标特征信息。具体此处不做限定说明。
405、第二终端设备获取第一应用的特征信息,第一应用来源于未知可信程度的安装源。
该示例中,第一应用的特征信息可以用于表征第一应用的应用属性,和/或用于表征该第一应用的外部特征属性,此处不做限定说明。该第一应用的特征信息用于表征第一应用的应用属性时,该第一应用的特征信息可以包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。在实际应用中,该第一应用的第一特征信息还可以是其他的能够表征该第一应用的特征的信息,例如:第一应用的应用名称、IP地址等,此处不做限定说明。
该第一应用的特征信息用于表征第一应用的外部特征属性时,该第一应用的特征信息可以包括第一应用的公开信息、第一应用的人工维护信息中的一个或多个,在实际应用,第一应用的特征信息还可以是其他的能够用于表征该第一应用的外部特征属性的特征。所描述的第一应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等,此处不做限定说明。所描述的第一应用的人工维护信息可以包括但不限于:第二应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等。
所描述的第一应用来源于未知可信程度的安装源,表明该第一应用的安装包的来源是属于未知可信度的,即该第一应用的安装包可能是真实可信的安装包,也可能不是真实的安装包,此处不做限定说明。所描述的未知可信程度的安装源可以包括但不限于第三方应用市场、个人网站等,此处不做限定说明。
上述所描述的第二应用可以与第一应用相同,也可以与第一应用不相同。譬如:第一应用为应用A,那么第二应用可以为应用A,也可以应用B,此处不做限定说明。
406、第二终端设备向应用特征服务器发送第一应用的特征信息。
该示例中,第二终端设备在获取到第一应用的特征信息后,便可以将该第一应用的特征信息发送至应用特征服务器。
针对上述步骤401-404与步骤405-406的执行顺序不做具体限定,在实际应用中,也可以先执行步骤405-406、后执行步骤401-404等等。
407、应用特征服务器基于目标特征信息和第一应用的特征信息确定第一结果,第一结果指示第一应用的可信情况。
该示例中,在应用特征服务器接收到第二终端设备发送的第一应用的特征信息后,便可以结合目标特征信息确定出第一结果。具体地,应用特征服务器可以计算第一应用的特征信息与目标特征信息之间的特征可信度,以此特征可信度作为第一结果,即利用第一结果指示出该第一应用的可信情况。
在实际应用中,应用特征服务器除了计算第一应用的特征信息和目标特征信息之间的特征可信度的方式来确定出第一结果以外,还可以通过其他的方式来确定,此处不做限定说明。
408、应用特征服务器向第二终端设备发送第一结果。
该实例中,应用特征服务器在确定出第一结果后,便可以向第二终端设备发送该第一结果。
409、第二终端设备根据第一结果安装第一应用,或者根据该第一结果阻止安装第一应 用。
该示例中,由于第一结果反映了第一应用的可信情况,因此,第二终端设备接收应用特征服务器发送的第一结果后,便可以获知该第一应用的来源实际上是否真实可信。这样,第二终端设备在第一结果反映出第一应用是真实可信的情形下,安装该第一应用;或者,第二终端设备可以在第一结果反映出第一应用是不真实可信的情形下,阻止安装该第一应用。
例如:当特征可信度大于或等于预设阈值时,则说明该第一应用是真实可信的,此时第二终端设备可以安装该第一应用;若特征可信度小于预设阈值,则说明该第一应用是不真实可信的,此时第二终端设备可以阻止安装该第一应用。具体此处不做限定说明。
在本申请实施例中,在第一应用来源于未知可信程度的安装源的情形下,可以由应用特征服务器通过从第一终端设备接收到的第二应用的第一特征信息、以及获取到的第二应用的第二特征信息,以此确定出第二应用的目标特征信息,进而从第二应用的目标特征信息表征出第二应用的可信情况。这样,在第二终端设备需要安装来源于未知可信程度的安装源的第一应用时,应用特征服务器还接收第二终端设备发送的第一应用的特征信息,以此结合第二应用的目标特征信息确定出第一结果,进而使得第二终端设备基于该第一结果执行是否安装第一应用的操作。
也就是说,本实施例中,在第二终端设备需要安装来源于未知可信程度的安装源的第一应用时,可以基于云测的应用特征服务器、端侧的第一终端设备获取已经在第一终端设备上安装的第二应用的特征信息,并根据人工智能算法等进行特征提取以及赋予相应的特征权重,进而通过端云协同的方式完成对开放互联网上的第一应用可信的识别,以此完成第一应用可信的安装和处理。本申请实施例中,无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本,快速构建终端所需的应用生态。
上述主要从应用特征服务器确定第一结果的角度来描述应用处理的方法,下面图5将从第二终端设备确定第一结果的角度来描述应用处理的方法。具体地,图5示出了本申请实施例中提供的另一种应用处理的方法流程示意图。从图5可知,该应用处理的方法包括如下步骤:
501、第一终端设备获取第二应用的第一特征信息。
502、第一终端设备向应用特征服务器发送第二应用的第一特征信息。
503、应用特征服务器获取第二应用的第二特征信息。
504、应用特征服务器基于第二应用的第一特征信息和第二应用的第二特征信息确定目标特征信息,目标特征信息指示第二应用的可信情况。
需说明,本实施例中的步骤501-504,具体可以参照前述图4中的步骤401-404所描述的内容进行理解,此处不做赘述。
505、应用特征服务器向第二终端设备发送目标特征信息。
该示例中,由于目标特征信息可以指示出第二应用的可信情况,应用特征服务器可以根据第一特征信息和第二特征信息确定出该第二应用的目标特征信息,并将该目标特征信息发送至第二终端设备。这样,第二终端设备便在接收到目标特征信息后,将该目标特征信息与第一应用的特征信息作比较或者特征匹配,以此比较结果或匹配结果来判断该第一应用是否真实可信。
506、第二终端设备获取第一应用的特征信息,第一应用来源于未知可信程度的安装源。
该示例中,步骤506具体可以参照上述图4中的步骤405所描述的内容进行理解,此处步骤限定说明。
针对上述步骤501-505与步骤506的执行顺序不做具体限定,在实际应用中,也可以先执行步骤506、后执行步骤501-505等等。
507、第二终端设备基于目标特征信息和第一应用的特征信息确定第一结果,第一结果指示第一应用的可信情况。
该示例中,在第二终端设备接收到应用特征服务器发送的目标特征信息后,便可以结合第一应用的特征信息确定出第一结果。具体地,第二终端设备可以计算第一特征信息与目标特征信息之间的特征可信度,以此特征可信度作为第一结果,即利用第一结果指示出该第一应用的可信情况。在实际应用中,第二终端设备除了计算第一特征信息和目标特征信息之间的特征可信度的方式来确定出第一结果以外,还可以通过其他的方式来确定,此处不做限定说明。
508、第二终端设备根据第一结果安装第一应用,或者根据该第一结果阻止安装第一应用。
需说明,本实施例中的步骤508,具体可以参照前述图4中的步骤409所描述的内容进行理解,此处不做赘述。
在本申请实施例中,在第一应用来源于未知可信程度的安装源的情形下,可以由应用特征服务器通过从第一终端设备接收到的第二应用的第一特征信息、以及获取到的第二应用的第二特征信息,以此确定出第二应用的目标特征信息,进而从第二应用的目标特征信息表征出第二应用的可信情况。这样,在第二终端设备需要安装来源于未知可信程度的安装源的第一应用时,应用特征服务器将目标特征信息发送至第二终端设备,由该第二终端设备结合第一应用的特征信息来判断该第一应用是否真实可信。
也就是说,本实施例中,在第二终端设备需要安装来源于未知可信程度的安装源的第一应用时,能够基于云测的应用特征服务器、端侧的第一终端设备获取已经在第一终端设备上安装的第二应用的特征信息,并根据人工智能算法等进行特征提取以及特征权重,继而可以通过端云协同的方式完成对开放互联网上的第一应用是否真实可信的识别,以此完成第一应用可信的安装和处理。无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。而且,在第二终端设备这一端侧也能够对第一应用是否真实可信进行判断,极大地丰富了应用安装过程中的适用场景。
在另一些实施例中,若上述所描述的第一终端设备安装的第二应用是来源于已知可信程度的安装源,那么此时可以将该第二应用的第一特征信息作为目标特征信息,以此确定第一结果。具体地,可以参阅图6,为本申请实施例中提供的另一种应用处理的方法流程示意图。从图6可知,该应用处理的方法包括如下步骤:
601、第一终端设备获取第二应用的第一特征信息,第二应用来源于已知可信程度的安装源。
该示例中,第二应用来源于已知可信程度的安装源,即说明该第一终端设备所安装的该第二应用的来源是真实可信、且安全的。此时,第一终端设备可以从真实可信的安装源中获取第二应用的应用安装包,并将该第二应用安装在第一终端设备上。这样,第一终端设备便可以对该第二应用进行特征提取,以获取到第二应用的第一特征信息。
该第一特征信息可以用于表征第二应用的应用属性。譬如,第一特征信息可以包括第二应用的应用标识、第二应用的安装源信息和/第二应用的运行行为特征信息中的一个或多个。在实际应用中,还可以是其他的特征信息,此处不做限定说明。
所描述的第二应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的包大小、应用的签名指纹、应用文件大小的哈希值等可以标识该第二应用的完整性和唯一性的特征。第二应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息。第二应用的运行行为特征信息可以包括但不限于第二应用在后台常驻的时长、申请的权限与实际使用权限等等,此处均不做具体限定说明。
602、第一终端设备向应用特征服务器发送第二应用的第一特征信息。
该示例中,步骤602具体可以参照上述图4中的步骤402所描述的内容进行理解,此处不做限定说明。
603、应用特征服务器基于第二应用的第一特征信息得到目标特征信息,目标特征信息指示第二应用的可信情况。
该示例中,由于第一终端设备安装的第二应用是来源于已知可信程度的安装源,那么应用特征服务器在接收到第一终端设备发送的第二应用的第一特征信息后,便可以直接将该第二应用的第一特征信息中的全部或部分内容作为目标特征信息,便于简化操作流程和运算复杂度,能够进一步地缩短识别第一应用是否真实可信的周期和成本。
604、第二终端设备获取第一应用的特征信息,第一应用来源于未知可信程度的安装源。
605、第二终端设备向应用特征服务器发送第一应用的特征信息。
该示例中,步骤604-605具体可以参照上述图4中的步骤405-406所描述的内容进行理解,此处步骤限定说明。
针对上述步骤601-603与步骤604-605的执行顺序不做具体限定,在实际应用中,也可以先执行步骤604-605、后执行步骤601-603等等。
606、应用特征服务器基于目标特征信息和第一特征信息确定第一结果,第一结果指示第一应用的可信情况。
607、应用特征服务器向第二终端设备发送第一结果。
608、第二终端设备根据第一结果安装第一应用,或者根据该第一结果阻止安装第一应用。
本实施例中的步骤606-608,具体可以参照前述图4中的步骤407-409所描述的内容进行理解,此处不做赘述。
在另一些示例中,在第一终端设备安装的第二应用是来源于已知可信程度的安装源的场景中,除了上述图6中通过应用特征服务器根据目标特征信息和第一应用的特征信息确定第一结果以外,在实际应用中,还可以由应用特征服务器将目标特征信息发送至第二终端设备,由第二终端设备根据目标特征信息和第一应用的特征信息确定第一结果,具体流程可以参照上述图5所描述的过程进行理解,此处不做赘述说明。
在本申请实施例中,在第一应用来源于未知可信程度的安装源,并且第一终端设备已安装的第二应用是来源于已知可信程度的安装源的情形下,可以将第一终端设备获取到的第二应用的第一特征信息直接作为第二应用的目标特征信息。这样,在第二终端设备需要安装来源于未知可信程度的安装源的第一应用时,可以通过端云协同的方式,基于应用的特征信息对第一应用是否真实可信进行判断,以此完成第一应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。此外,在本实施例中直接将安装来源可信的第二应用时的第一特征信息作为目标特征信息,便于简化操作流程和运算复杂度,能够进一步地缩短识别第一应用是否真实可信的周期和成本。
上述主要从方法的角度对本申请实施例提供的方案进行了介绍。可以理解的是,上述的应用处理装置为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的功能,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
从功能单元的角度,本申请可以根据上述方法实施例对应用处理装置进行功能单元的划分,例如,可以对应各个功能划分各个功能单元,也可以将两个或两个以上的功能集成在一个功能单元中。上述集成的功能单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
比如,以采用集成的方式划分各个功能单元的情况下,参见图7,本申请实施例提供了一种应用处理装置的结构示意图,该应用处理装置可以是前述图2中所描述的应用特征服务器,也可以是第二终端设备。所描述的应用处理装置可以包括:
获取单元701,用于第一应用的特征信息,第一应用来源于未知可信程度的安装源;
处理单元702,用于根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一 应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。
可选地,在一些示例中,所述第二应用的目标特征信息是由应用特征服务器根据所述第二应用的特征信息得到。
可选地,在一些示例中,第二应用的特征信息包括据第二应用的第一特征信息和第二应用的第二特征信息得到,其中,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。所描述的第二应用的应用安装源可以是已知可信程度的安装源,也可以是未知可信程度的安装源,因此需要应用特征服务器将第二应用的第一特征信息和第二特征信息确定出该第二应用的目标特征信息,以此目标特征信息表征出第二应用的可信情况。
可选地,在一些示例中,在第二应用来源于已知可信程度的安装源时,第二应用的特征信息包括第二应用的第一特征信息得到,其中,第一特征信息用于表征第二应用的应用属性。由于第一终端设备安装的第二应用是来源于已知可信程度的安装源,那么应用特征服务器在接收到第一终端设备发送的第二应用的第一特征信息后,便可以直接将该第二应用的第一特征信息作为目标特征信息,便于简化操作流程和运算复杂度,能够进一步地缩短识别第一应用是否真实可信的周期和成本。
可选地,在一些示例中,第一特征信息是由第一终端设备针对第二应用获取得到的信息。
可选地,在一些示例中,处理单元702,用于:确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;将特征可信度作为第一结果。
可选地,在一些示例中,第一应用的特征信息包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。所描述的第一应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的签名指纹、应用文件大小的哈希值等可以标识该第一应用的完整性和唯一性的特征。第一应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息,此处均不做具体限定说明。
可选地,在一些示例中,第二应用的第一特征信息包括第二应用的应用标识、二应用的安装源信息、以及第二应用的运行行为特征信息中的一个或多个。所描述的第二应用的应用标识可以包括但不限于:应用名称、应用IP地址、应用的包大小、应用的签名指纹、应用文件大小的哈希值等可以标识该第二应用的完整性和唯一性的特征。第二应用的安装源信息可以包括但不限于安装源的名称、安装源的IP地址、安装源的域名等,还可以包括该安装源所在网站的热度、权威性等附加特征信息。第二应用的运行行为特征信息可以包括但不限于第二应用在后台常驻的时长、申请的权限与实际使用权限等等,此处均不做具体限定说明。
可选地,在一些示例中,第二应用的第二特征信息包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。所描述的第二应用的公开信息可以包括但不限于:在应用安装源上的评分、被评分数量、应用评论、被评论数量、被下载的数量、被分享的数量等等,此处不做限定说明。所描述的第二应用的人工维护信息可以包括但不限于:第二 应用对应的应用安装源的域名信息、应用安装源的可信权重、应用申请权限信息等,此处不做限定说明。
在本申请实施例中,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以通过获取单元701获取到第一应用的特征信息后,由处理单元702将根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果,使得该第一结果能够指示出安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
上述主要从单侧的角度描述了应用处理装置的结构,而且该应用处理装置可以包括图2中的应用特征服务器,也可以是第二终端设备。因此,下面将分别从功能单元的角度介绍图2中的第一终端设备、应用特征服务器以及第二终端设备。具体如下:
比如,以采用集成的方式划分各个功能单元的情况下,参见图8,本申请实施例提供了一种第一终端设备的结构示意图,该第一终端设备可以包括:
应用特征获取模块801,用于获取第二应用的第一特征信息,该第一特征信息可以用于表征第二应用的应用属性;
应用特征发送模块802,用于向应用特征服务器发送第二应用的第一特征信息。
可选的,在一些实施例中,第一特征信息包括第二应用的应用标识、第二应用的安装源信息、以及第二应用的运行行为特征信息中的一个或多个。
上述主要从功能单元的角度描述了第一终端设备,下面将从功能单元的角度描述应用特征服务器。比如,以采用集成的方式划分各个功能单元的情况下,参见图9,本申请实施例提供了一种应用特征服务器的结构示意图,该应用特征服务器可以包括:
获取模块901,用于获取第二应用的特征信息;
处理模块902,用于根据所述第二应用的特征信息得到第二应用的目标特征信息,第二应用的目标特征信息用于表征第二应用的可信情况;
获取模块901,还用于获取第二终端设备发送的第一应用的特征信息,第一应用来源于未知可信程度的安装源;
处理模块902,还用于根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第一结果指示第一应用的可信情况;
发送模块903,用于向第二终端设备发送第一结果,指示第二终端设备安装第一应用、或阻止安装第一应用。
可选地,在一些示例中,第二应用的特征信息包括第二应用的第一特征信息和第二应用的第二特征信息,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性;获取模块901,具体用于获取第一终端设备发送的第二应用的第一特征信息,以及获取第二应用的第二特征信息;
处理模块902,用于根据第二应用的第二特征信息和第二应用的第三特征信息确定第二应用的目标特征信息;
可选的,在一些示例中,第二应用的特征信息包括第二应用的第一特征信息,第一特征信息用于表征第二应用的应用属性;获取模块901,具体用于在第二应用来源于已知可信程度的安装源时,获取第一终端设备发送的第二应用的第一特征信息;
处理模块902,用于根据第二应用的第一特征信息确定第二应用的目标特征信息。
可选的,在一些示例中,发送模块903,还用于在处理模块902根据第二应用的特征信息确定第二应用的目标特征信息之后,向第二终端设备发送第二应用的目标特征信息。
可选的,在另一些实施例中,处理模块902,具体用于确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;将特征可信度作为第一结果。
上述主要从功能单元的角度描述了第一终端设备、应用特征服务器,下面将从功能单元的角度描述第二终端设备。比如,以采用集成的方式划分各个功能单元的情况下,参见图10,本申请实施例提供了一种第二终端设备的结构示意图,该第二终端设备可以包括:
特征获取模块1001,用于获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;
特征发送模块1002,用于向应用特征服务器发送第一应用的特征信息;
特征获取模块1001,还用于接收应用特征服务器发送的第一结果,所述第一结果是基于第一应用的特征信息和第二应用的目标特征信息确定出的结果,第二应用的目标特征信息用于表征第二应用的可信情况;
特征检测模块1003,用于根据第一结果安装第一应用,或根据第一结果阻止安装第一应用。
可选的,在一些示例中,特征获取模块1001还具体用于:获取应用特征服务器发送的第二应用的目标特征信息;
特征检测模块1003,用于根据第一应用的特征信息和第二应用的目标特征信息确定第一结果。
需要说明的是,上述装置各模块/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参见本申请前述所示的方法实施例中的叙述,此处不再赘述。
上述主要从功能单元的角度介绍了第一终端设备、应用特征服务器以及第二终端设备。本申请也可以从系统的交互角度来描述应用处理系统。比如,图11示出了一种应用处理系统的结构示意图。如图11所示,本申请的应用处理系统的一个实施例可以包括:应用特征服务器和第二终端设备;其中,第二终端设备,用于:
获取第一应用的特征信息,第一应用来源于未知可信程度的安装源;
向应用特征服务器发送第一应用的特征信息;
应用特征服务器用于:根据第二应用的目标特征信息和第一应用的特征信息确定第一结果,第二应用的目标特征信息用于表征第二应用的可信情况,第一结果用于指示安装第一应用、或阻止安装第一应用,第一应用与第二应用相同或者不相同。
在本申请实施例中,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,第二终端设备可以通过获取到第一应用的特征信息后,将该第一应用的特征信息发送至应用特征服务器。应用特征服务器能够根据第一应用的特征信息和第二应用的目标特征信息确定出第一结果,使得该第一结果能够指示出安装第一应用或者阻止安装第一应用。
相较于现有方案中需要依赖于开发者的认证和预配置应用分发客户端来完成未知可信程度的第一应用的安装,在本申请实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
在本申请的一些实施例中,应用特征服务器还用于:获取第二应用的特征信息;根据第二应用的特征信息确定第二应用的目标特征信息。
在本申请的一些实施例中,第二应用的特征信息包括第二应用的第一特征信息和第二应用的第二特征信息,第一特征信息用于表征第二应用的应用属性,第二特征信息用于表征第二应用的外部特征属性。
在本申请的一些实施例中,在第二应用来源于已知可信程度的安装源时,第二应用的特征信息包括第二应用的第一特征信息,第一特征信息用于表征第二应用的应用属性。
在上述图11所示的应用处理系统的基础上,图12示出了另一种应用处理系统的结构示意图。如图12所示,本申请的应用处理系统的一个实施例还可以包括:第一终端设备;该第一终端设备,用于:获取第二应用的第一特征信息;向应用特征服务器发送第一特征信息。
在图11和/或图12所示的应用处理系统中,该应用特征服务器还用于:确定第二应用的目标特征信息与第一应用的特征信息之间的特征可信度;将特征可信度作为第一结果。
在图11和/或图12所示的应用处理系统中,应用特征服务器,还用于向第二终端设备发送第一结果;第二终端设备,还用于根据所第一结果安装第一应用、或阻止安装第一应用。
在图11和/或图12所示的应用处理系统中,第一应用的特征信息包括第一应用的应用标识、第一应用的应用包大小和第一应用的安装源信息中的一个或多个。
在图11和/或图12所示的应用处理系统中,第二应用的第一特征信息包括第二应用的应用标识、二应用的安装源信息、以及第二应用的运行行为特征信息中的一个或多个。
在图11和/或图12所示的应用处理系统中,第二应用的第二特征信息包括第二应用的公开信息、第二应用的人工维护信息中的一个或多个。
通过上述方式,由于第二应用的目标特征信息可以表征出第二应用的可信情况,因此在第一应用来源于未知可信程度的安装源的情形下,可以由图11和/或图12中所描述的应用处理系统中的第二终端设备对第一应用进行特征提取,得到第一应用的特征信息;然后,第二终端设备将该第一应用的特征信息发送至应用特征服务器,由应用特征服务器根据第 一应用的特征信息和第二应用的目标特征信息确定出第一结果。应用特征服务器便可以将第一结果反馈至第二终端设备,使得第二终端设备可以根据该第一结果安装第一应用或者阻止安装第一应用。也就是说,本实施例中,在需要安装来源于未知可信程度的安装源的第一应用时,可以通过已安装的第二应用的目标特征信息与第一应用的特征信息进行第一应用是否真实可信的判断,以此完成应用可信的安装和处理;并且,本申请实施例中无需依赖于开发者的认证和预配置应用分发客户端,而是广泛运用已有应用的特征信息和应用源信息来判断来源于未知可信程度的安装源的第一应用,能够减少构建可信应用分发生态所需的时间和成本。
需要说明的是,上述装置各模块/单元之间的信息交互、执行过程等内容,由于与本申请方法实施例基于同一构思,其带来的技术效果与本申请方法实施例相同,具体内容可参见本申请前述所示的方法实施例中的叙述,此处不再赘述。
上面从模块化功能实体的角度对本申请实施例中的应用处理装置进行描述,以及描述了第一终端设备、应用特征服务器和第二终端设备,以及从系统的角度描述了应用处理系统。从实体设备角度来描述,上述应用处理装置、第一终端设备、应用特征服务器和第二终端设备可以由一个实体设备实现,也可以由多个实体设备共同实现,还可以是一个实体设备内的一个逻辑功能单元,本申请实施例对此不做具体限定。
例如,上述应用处理装置、第一终端设备、应用特征服务器和第二终端设备可以由图13中的通信设备来实现。图13为本申请实施例提供的通信设备的硬件结构示意图。该通信设备包括至少一个处理器1301,通信线路1307,存储器1303以及至少一个通信接口1304。
处理器1301可以是一个通用中央处理器(central processing unit,CPU),微处理器,特定应用集成电路(application-specific integrated circuit,服务器IC),或一个或多个用于控制本申请方案程序执行的集成电路。
通信线路1307可包括一通路,在上述组件之间传送信息。
通信接口1304,使用任何收发器一类的装置,用于与其他装置或通信网络通信,如以太网等。
存储器1303可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储装置,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储装置,也可以是电可擦可编程只读存储器(electrically erable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过通信线路1307与处理器相连接。存储器1303也可以和处理器1301集成在一起。
其中,存储器1303用于存储执行本申请方案的计算机执行指令,并由处理器1301来控制执行。处理器1301用于执行存储器1303中存储的计算机执行指令,从而实现本申请 上述实施例提供的应用处理的方法。
可选的,本申请实施例中的计算机执行指令也可以称之为应用程序代码,本申请实施例对此不作具体限定。
在具体实现中,作为一种实施例,处理器1301可以包括一个或多个CPU,例如图13中的CPU0和CPU1。
在具体实现中,作为一种实施例,通信装置可以包括多个处理器,例如图13中的处理器1301和处理器1302。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个装置、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
在具体实现中,作为一种实施例,通信装置还可以包括输出装置1305和输入装置1306。输出装置1305和处理器1301通信,可以以多种方式来显示信息。输入装置1306和处理器1301通信,可以以多种方式接收用户的输入。例如,输入装置1306可以是鼠标、触摸屏装置或传感装置等。
上述的通信装置可以是一个通用装置或者是一个专用装置。在具体实现中,通信装置可以是便携式电脑、移动终端等或有图13中类似结构的装置。本申请实施例不限定通信装置的类型。
需说明,图13中的处理器1301可以通过调用存储器1303中存储的计算机执行指令,使得应用处理装置执行如图3对应的方法实施例中的方法。图13中的处理器1301可以通过调用存储器1303中存储的计算机执行指令,使得第一终端设备执行如图4-图6中对应的方法实施例中第一终端设备所执行的方法。图13中的处理器1301可以通过调用存储器1303中存储的计算机执行指令,使得应用特征服务器执行如图4-图6中对应的方法实施例中应用特征服务器所执行的方法。图13中的处理器1301可以通过调用存储器1303中存储的计算机执行指令,使得第二终端设备执行如图4-图6中对应的方法实施例中第二终端设备所执行的方法。
具体的,图7中的处理单元702,图9中的处理模块902,图10中的特征检测模块1003的功能/实现过程可以通过图13中的处理器1301调用存储器1303中存储的计算机执行指令来实现;图7中的获取单元701,图8中的应用特征获取模块801、应用特征发送模块802,图9中的获取模块901、发送模块903,图10中的特征获取模块1001、特征发送模块1002的功能/实现过程可以通过图13中的通信接口1304来实现。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示 或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
该作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
该集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例该方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
上述实施例,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现,当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。
计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行计算机执行指令时,全部或部分地产生按照本申请实施例的流程或功能。计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如SSD))等。
以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (21)

  1. 一种应用处理的方法,其特征在于,所述方法包括:
    获取第一应用的特征信息,所述第一应用来源于未知可信程度的安装源;
    根据第二应用的目标特征信息和所述第一应用的特征信息确定第一结果,所述第二应用的目标特征信息用于表征所述第二应用的可信情况,所述第一结果用于指示安装所述第一应用、或阻止安装所述第一应用,所述第一应用与所述第二应用相同或者不相同。
  2. 根据权利要求1所述的方法,其特征在于,所述第二应用的目标特征信息是由应用特征服务器根据所述第二应用的特征信息得到。
  3. 根据权利要求2所述的方法,其特征在于,所述第二应用的特征信息包括所述第二应用的第一特征信息和/或所述第二应用的第二特征信息,其中,所述第一特征信息用于表征所述第二应用的应用属性,所述第二特征信息用于表征所述第二应用的外部特征属性。
  4. 根据权利要求3所述的方法,其特征在于,在所述第二应用来源于已知可信程度的安装源时,所述第二应用的目标特征信息根据所述第二应用的第一特征信息确定。
  5. 根据权利要求3或4所述的方法,其特征在于,所述第一特征信息是由第一终端设备针对所述第二应用获取得到的信息。
  6. 根据权利要求1-5中任一项所述的方法,其特征在于,所述根据第二应用的目标特征信息和所述第一应用的特征信息确定第一结果,包括:
    确定所述第二应用的目标特征信息与所述第一应用的特征信息之间的特征可信度;
    将所述特征可信度作为第一结果。
  7. 根据权利要求1-6中任一项所述的方法,其特征在于,所述第一应用的特征信息包括所述第一应用的应用标识、所述第一应用的应用包大小和所述第一应用的安装源信息中的一个或多个。
  8. 根据权利要求3-6中任一项所述的方法,其特征在于,所述第二应用的第一特征信息包括所述第二应用的应用标识、所述二应用的安装源信息、以及所述第二应用的运行行为特征信息中的一个或多个。
  9. 根据权利要求3、5-6中任一项所述的方法,其特征在于,所述第二应用的第二特征信息包括所述第二应用的公开信息、所述第二应用的人工维护信息中的一个或多个。
  10. 一种应用处理系统,其特征在于,所述应用处理系统包括第二终端设备和应用特征 服务器;其中,
    所述第二终端设备,用于:
    获取第一应用的特征信息,所述第一应用来源于未知可信程度的安装源;
    向所述应用特征服务器发送所述第一应用的特征信息;
    所述应用特征服务器,用于根据第二应用的目标特征信息和所述第一应用的特征信息确定第一结果,所述第二应用的目标特征信息用于表征所述第二应用的可信情况,所述第一结果用于指示安装所述第一应用、或阻止安装所述第一应用,所述第一应用与所述第二应用相同或者不相同。
  11. 根据权利要求10所述的应用处理系统,其特征在于,所述应用特征服务器还用于:
    获取所述第二应用的特征信息;
    根据所述第二应用的特征信息确定所述第二应用的目标特征信息。
  12. 根据权利要求11所述的应用处理系统,其特征在于,所述第二应用的特征信息包括第二应用的第一特征信息和/或所述第二应用的第二特征信息,所述第一特征信息用于表征所述第二应用的应用属性,所述第二特征信息用于表征所述第二应用的外部特征属性。
  13. 根据权利要求12所述的应用处理系统,其特征在于,在所述第二应用来源于已知可信程度的安装源时,所述第二应用的特征信息根据所述第二应用的第一特征信息确定。
  14. 根据权利要求12或13所述应用处理系统,其特征在于,所述应用处理系统还包括第一终端设备;
    所述第一终端设备,用于:
    获取所述第二应用的第一特征信息;
    向所述应用特征服务器发送所述第一特征信息。
  15. 根据权利要求10-14中任一项所述的应用处理系统,其特征在于,所述应用特征服务器用于:
    确定所述第二应用的目标特征信息与所述第一应用的特征信息之间的特征可信度;
    将所述特征可信度作为第一结果。
  16. 根据权利要求10-15中任一项所述的应用处理系统,其特征在于,
    所述应用特征服务器,还用于向所述第二终端设备发送所述第一结果;
    所述第二终端设备,还用于根据所第一结果安装所述第一应用、或阻止安装所述第一应用。
  17. 根据权利要求10-16中任一项所述的应用处理系统,其特征在于,所述第一应用的 特征信息包括所述第一应用的应用标识、所述第一应用的应用包大小和所述第一应用的安装源信息中的一个或多个。
  18. 根据权利要求12-16中任一项所述的应用处理系统,其特征在于,所述第二应用的第一特征信息包括所述第二应用的应用标识、所述二应用的安装源信息、以及所述第二应用的运行行为特征信息中的一个或多个。
  19. 根据权利要求12、15-16中任一项所述的应用处理系统,其特征在于,所述第二应用的第二特征信息包括所述第二应用的公开信息、所述第二应用的人工维护信息中的一个或多个。
  20. 一种应用处理装置,其特征在于,包括:
    存储器,用于存储计算机可读指令;
    还包括,与所述存储器耦合的处理器,用于执行所述存储器中的计算机可读指令从而执行如权利要求1至9中任一项所述的方法。
  21. 一种计算机可读存储介质,其特征在于,当指令在计算机上运行时,使得所述计算机执行如权利要求1至9中任一项所述的方法。
PCT/CN2022/083524 2021-04-07 2022-03-29 一种应用处理的方法以及相关装置 WO2022213840A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110372878.8 2021-04-07
CN202110372878.8A CN115185544A (zh) 2021-04-07 2021-04-07 一种应用处理的方法以及相关装置

Publications (1)

Publication Number Publication Date
WO2022213840A1 true WO2022213840A1 (zh) 2022-10-13

Family

ID=83512142

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/083524 WO2022213840A1 (zh) 2021-04-07 2022-03-29 一种应用处理的方法以及相关装置

Country Status (2)

Country Link
CN (1) CN115185544A (zh)
WO (1) WO2022213840A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101512512A (zh) * 2006-08-31 2009-08-19 微软公司 利用软件名声的软件授权
WO2013059131A1 (en) * 2011-10-17 2013-04-25 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
CN104246785A (zh) * 2012-03-21 2014-12-24 迈克菲股份有限公司 用于移动应用声誉的众包的系统和方法
CN107239695A (zh) * 2017-04-10 2017-10-10 青岛海信移动通信技术股份有限公司 一种移动终端中安装应用程序的方法和移动终端
CN112506531A (zh) * 2020-12-11 2021-03-16 中国科学院信息工程研究所 软件安装方法、装置、电子设备和存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101512512A (zh) * 2006-08-31 2009-08-19 微软公司 利用软件名声的软件授权
WO2013059131A1 (en) * 2011-10-17 2013-04-25 Mcafee, Inc. System and method for whitelisting applications in a mobile network environment
CN104246785A (zh) * 2012-03-21 2014-12-24 迈克菲股份有限公司 用于移动应用声誉的众包的系统和方法
CN107239695A (zh) * 2017-04-10 2017-10-10 青岛海信移动通信技术股份有限公司 一种移动终端中安装应用程序的方法和移动终端
CN112506531A (zh) * 2020-12-11 2021-03-16 中国科学院信息工程研究所 软件安装方法、装置、电子设备和存储介质

Also Published As

Publication number Publication date
CN115185544A (zh) 2022-10-14

Similar Documents

Publication Publication Date Title
US10073916B2 (en) Method and system for facilitating terminal identifiers
JP6720211B2 (ja) 仮想ネットワーク機能の安全なブートストラップ技術
JP5802848B2 (ja) モバイル環境用のトロイの木馬化されたアプリケーション(アプリ)を特定するためのコンピュータ実装方法、非一時コンピュータ読み取り可能な媒体およびコンピュータシステム
WO2016029595A1 (zh) 开放平台的调用方法、装置、设备及非易失性计算机存储介质
US10171463B1 (en) Secure transport layer authentication of network traffic
US9270467B1 (en) Systems and methods for trust propagation of signed files across devices
CN108965250B (zh) 一种数字证书安装方法及系统
US20220329591A1 (en) Method, apparatus and device for generating device fingerprint and storage medium
CN112491776B (zh) 安全认证方法及相关设备
US20140019957A1 (en) Method, apparatus, and system for sharing software among terminals
CN113302893A (zh) 用于信任验证的方法及装置
CN112073374A (zh) 信息拦截方法、装置及设备
US11343357B2 (en) Systems and methods for autonomous program detection
WO2021135257A1 (zh) 一种漏洞处理方法及相关设备
US11418570B2 (en) Robust computing device identification framework
CN113129002A (zh) 一种数据处理方法以及设备
WO2022213840A1 (zh) 一种应用处理的方法以及相关装置
US20220038447A1 (en) Systems and methods for autonomous program detection and management
CN114615285A (zh) 一种物理机的部署方法、装置、电子设备及存储介质
CN114357456A (zh) 一种安全防护能力检测系统、方法、装置、设备及介质
JP2022157254A (ja) 分析装置、分析方法及び分析プログラム
US11445003B1 (en) Systems and methods for autonomous program detection
US11657143B2 (en) Request control device, request control method, and request control program
US9350698B2 (en) Computer program product and system for double IP address recovery
CN113868632A (zh) 一种应用弱口令核查方法、主机、控制端、系统及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22783907

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22783907

Country of ref document: EP

Kind code of ref document: A1