CN109977632A - Prevent pirate method, mobile terminal and the computer readable storage medium applied - Google Patents
Prevent pirate method, mobile terminal and the computer readable storage medium applied Download PDFInfo
- Publication number
- CN109977632A CN109977632A CN201910127385.0A CN201910127385A CN109977632A CN 109977632 A CN109977632 A CN 109977632A CN 201910127385 A CN201910127385 A CN 201910127385A CN 109977632 A CN109977632 A CN 109977632A
- Authority
- CN
- China
- Prior art keywords
- public key
- packet name
- name
- application program
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 66
- 238000012795 verification Methods 0.000 claims abstract description 56
- 230000015654 memory Effects 0.000 claims description 44
- 238000004590 computer program Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 description 29
- 230000006870 function Effects 0.000 description 13
- 238000012545 processing Methods 0.000 description 13
- 238000009434 installation Methods 0.000 description 10
- 238000010295 mobile communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000010009 beating Methods 0.000 description 4
- NJPPVKZQTLUDBO-UHFFFAOYSA-N novaluron Chemical compound C1=C(Cl)C(OC(F)(F)C(OC(F)(F)F)F)=CC=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F NJPPVKZQTLUDBO-UHFFFAOYSA-N 0.000 description 4
- 238000012856 packing Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000005236 sound signal Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 241000256844 Apis mellifera Species 0.000 description 1
- 241001062009 Indigofera Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000005764 inhibitory process Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000002463 transducing effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Pirate method, mobile terminal and the computer readable storage medium applied is prevented the present invention provides a kind of, which comprises obtains the first application name and the first packet name of the application program that user is currently installed on;The corresponding second packet name of the first application name of the application program is obtained on Platform Server;The first packet name and the second packet name are subjected to matching verification;When the first packet name is matched with the second packet name, verification passes through.Technical solution provided by the invention, which passes through, carries out matching verification for the Bao Mingyu for the needing application program to be mounted included packet name obtained from Platform Server, if it is legal that matching explanation, which needs application program to be mounted, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.
Description
Technical field
The present embodiments relate to prevent the pirate field applied, and in particular to a kind of to prevent the pirate method applied, move
Dynamic terminal and computer readable storage medium.
Background technique
With the development of internet, various information are propagated in a network.Application program also receives the extensive use of people,
User can meet relevant information required for oneself by downloading all kinds of app (Application, application program).
But it is hot with mobile application, pirate application is also more and more, it is many be packaged parties be packaged it is well-known on the market
App increases ad plug-in or malicious code, and then signature uploads again, endangers from the point of view of user and enterprise all very
Greatly.
Therefore, pirate method, mobile terminal and the computer readable storage medium applied is prevented the present invention provides a kind of
To solve the deficiencies in the prior art.
The description of the above-mentioned discovery procedure to problem, is only used to facilitate the understanding of the technical scheme, and does not represent and holds
Recognizing above content is the prior art.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, the embodiment of the invention provides
It is a kind of to prevent pirate method, mobile terminal and the computer readable storage medium applied.
In a first aspect, the embodiment of the present invention provides a kind of method for preventing pirate application, which comprises
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
Further, further includes:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
Further, the first packet name and the second packet name are subjected to matching verification, further includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
Further, after the first packet name is matched with the second packet name, the method also includes:
Obtain the first public key information of the application program;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
It is further, described that first public key information and second public key information are subjected to matching verification, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
Further, the method also includes:
By the synchronizing information that the developer of blacklist is added to applying distribution platform;
The developer is forbidden to upload application program to applying distribution platform.
Second aspect, this application provides a kind of mobile terminal, the mobile terminal includes memory and processor;It is described
Memory, which is stored with, prevents the pirate computer program applied, and the processor executes the computer program, above-mentioned to realize
The pirate method applied is prevented described in any one.
The third aspect, this application provides a kind of computer readable storage mediums, which is characterized in that the storage medium is deposited
Containing prevents the pirate computer program applied, and the computer program can be executed by least one processor, above-mentioned to realize
The pirate method applied is prevented described in any one.
Above-mentioned technical proposal provided by the embodiments of the present application has the advantages that compared with prior art
What the embodiment of the present invention proposed prevents pirate method, apparatus, mobile terminal and the computer-readable storage medium applied
Matter obtains the application name and packet name of user's application to be installed program first, then obtains and the application on Platform Server again
The corresponding packet name of name, then the packet name in the packet name and Platform Server of application program to be mounted is matched, if matching
Verification passes through.Technical solution provided by the invention passes through Bao Mingyu that application program to be mounted will be needed included from Platform Server
The packet name of upper acquisition carries out matching verification, if matching explanation need application program to be mounted be it is legal, can be led to normal mounting
The verification to application program is crossed, to prevent application program from being occurred by pirate situation.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art
Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the invention
Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these
Figure obtains other attached drawings.
The hardware configuration signal of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the communication system schematic diagram of mobile terminal in Fig. 1;
Fig. 3 is a kind of flow chart for preventing the pirate method applied provided in an embodiment of the present invention;
Fig. 4 is a kind of flow chart for preventing the pirate method applied provided by Embodiment 2 of the present invention;
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiments of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use
For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself
There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving
Phone, smart phone, laptop, digit broadcasting receiver, PDA (PersonalDigital Assistant, a number
Word assistant), PAD (Portable Android Device, tablet computer), PMP (Portable Media Player, it is portable
Formula multimedia player), the mobile terminal of navigation device etc. and such as number TV, desktop computer etc. it is fixed eventually
End.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for mobile purpose
Element except, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input
Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown
Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system
Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module
112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel
Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent
The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information
And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting
Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB)
Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast
Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111
It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video
It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO), received terrestrial digital broadcasting integrated service
(ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/
Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical
Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant
Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module
Typical case be GPS (global positioning system).According to current technology, the calculating of location information module 115 is from three or more
The range information and correct time information of more satellites and Information application triangulation for calculating, thus according to warp
Degree, latitude and highly accurately calculate three-dimensional current location information.Currently, it is used for the method for calculating position and temporal information
Three satellites and the error that calculated position and temporal information are corrected by using an other satellite.In addition, position
Information module 115 can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera
Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus
Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121
Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110
It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can telephone calling model,
Sound (audio data) is received via microphone 122 in logging mode, speech recognition mode etc. operational mode, and can be incited somebody to action
Such acoustic processing is audio data.Audio that treated (voice) data can be converted in the case where telephone calling model
For the format output that can be sent to mobile communication base station via mobile communication module 112.Various types can be implemented in microphone 122
Noise eliminate (or inhibit) algorithm with eliminate noise that (or inhibition) generates during sending and receiving audio signal or
Person's interference.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal
Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch
Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc.
Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape
State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal
100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100
The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone
The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include proximity sensor 141.
Interface unit 170 is used as mobile terminal 100 and connect at least one external device (ED).For example, external device (ED) can wrap
Include wired or wireless headphone port, external power supply (or battery charger) port, wired or wireless data port, storage
Card port, port, the port audio input/output (I/O), video i/o port, ear for connecting the device with identification module
Generator terminal mouth etc..Identification module can be storage for verifying user using the various information of mobile terminal 100 and can wrap
Include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc..Know in addition, having
The device (hereinafter referred to as " identification device ") of other module can take the form of smart card, and therefore, identification device can be via end
Mouth or other attachment devices are connect with mobile terminal 100.Interface unit 170 can be used for receiving the input from external device (ED)
(for example, data information, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100
Or it can be used for transmitting data between mobile terminal and external device (ED).In addition, when mobile terminal 100 is connect with external base
When, interface unit 170 may be used as allowing by its by electric power from pedestal provide to mobile terminal 100 path or can use
Make the various command signals for allowing to input from pedestal and passes through its path for being transferred to mobile terminal.The various orders inputted from pedestal
Signal or electric power may be used as whether mobile terminal for identification is accurately fitted within the signal on pedestal.
Output unit 150 is configured to provide output signal with vision, audio and/or tactile manner (for example, audio is believed
Number, vision signal, alarm signal, vibration signal etc.).Output unit 150 may include display unit 151, audio output mould
Block 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity
When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file
Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode
Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure
Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit
151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving
Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detecting touch
Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode,
It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160
The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement
The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes.
Audio output module 152 may include loudspeaker, buzzer etc..
Alarm unit 153 can provide output, and event is notified to mobile terminal 100.Typical event can
To include calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm list
Member 153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be with the shape of vibration
Formula provides output, when receiving calling, message or some other entrance communications (incoming communication), alarm
Unit 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can also be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke
Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And
And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen
Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more
Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection
The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data
Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers
The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control
Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture
It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member
Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof
Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor
At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180.
For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations
Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai
Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any
Line and wireless communication system and satellite-based communication system operate.
Referring now to Fig. 2 description communication system that wherein mobile terminal according to the present invention can operate.
Different air interface and/or physical layer can be used in such communication system.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (particularly, long term evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such introduction is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system may include multiple mobile terminals 100, multiple base stations (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link.
Back haul link can be constructed according to any in several known interfaces, and the interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system may include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of direction specific direction
Each subregion of line covering is radially far from BS270.Alternatively, each subregion can be by two or more for diversity reception
Antenna covering.Each BS270, which may be constructed such that, supports multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum
(for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly indicating single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Alternatively, each subregion of specific BS270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to the mobile terminal operated in system by broadcsting transmitter (BT) 295
100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 100 to receive the broadcast sent by BT295
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.The help of satellite 300 positions multiple mobile terminals
At least one of 100.
In Fig. 2, multiple satellites 300 are depicted, it is understood that, it is useful to can use any number of satellite acquisition
Location information.Location information module 115 as shown in Figure 1 is generally configured to cooperate with satellite 300 desired to obtain
Location information.It substitutes GPS tracking technique or except GPS tracking technique, the position that can track mobile terminal can be used
Other technologies.In addition, at least one 300 property of can choose of satellite or extraly processing satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100
Signal.Mobile terminal 100 usually participates in call, information receiving and transmitting and other types of communication.Specific BS270 is received each reversed
Link signal is handled in specific BS270.The data of acquisition are forwarded to relevant BSC275.BSC275 provides call money
The mobile management function of source distribution and the coordination including the soft switching process between BS270.The data that BSC275 will also be received
It is routed to MSC280, the additional route service for forming interface with PSTN290 is provided.Similarly, PSTN290 with
MSC280 forms interface, and MSC280 and BSC275 form interface, and BSC275 controls BS270 correspondingly to believe forward link
Number it is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each embodiment of the method for the present invention is proposed.
Embodiment one
A kind of method preventing pirate application provided by one embodiment of the present invention, as shown in Figure 3, comprising the following steps:
S101 obtains the first application name and the first packet name of the application program that user is currently installed on;
S102 obtains the corresponding second packet name of the first application name of the application program on Platform Server;
The first packet name and the second packet name are carried out matching verification by S103;
S104, when the first packet name is matched with the second packet name, verification passes through.
In the embodiment of the present application, the application name and packet name for obtaining user's application to be installed program first, then put down again
Packet name corresponding with the application name is obtained on platform server, then will be in the packet name and Platform Server of application program to be mounted
Packet name is matched, and is verified and is passed through if matching.Technical solution provided by the invention will be by that will need application program to be mounted certainly
The packet name that the Bao Mingyu of band is obtained from Platform Server carries out matching verification, illustrates to need application program to be mounted to be if matching
Legal, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.
In some embodiments of the present application, this method further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
In the embodiment of the present application, a multi-party shared platform is established, application when all enterprise development persons issue application
Name and packet name, are uploaded to the platform there are also the public signature key of enterprise development person and put on record.One blacklist mechanism of Platform Designing simultaneously,
Label is packaged the signature of party.
In some embodiments of the present application, the first packet name and the second packet name are subjected to matching verification, also wrapped
It includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
It is, in some embodiments, when user downloads an app from Platform Server, terminal first reads app's
Then application name reads the corresponding packet name of this application name on Platform Server, if applying packet name with what is currently installed
Unanimously, then pass through verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, prompt is used at this time
Then the public key information of current application installation kit is uploaded to Platform Server by family risk, blacklist is added in this developer.
Embodiment two
A kind of method preventing pirate application provided by one embodiment of the present invention, as shown in figure 4, should include following step
It is rapid:
S201 obtains the first application name and the first packet name of the application program that user is currently installed on;
S202 obtains the corresponding second packet name of the first application name of the application program on Platform Server;
The first packet name and the second packet name are carried out matching verification by S203;
S204 obtains the first public key letter of the application program when the first packet name is matched with the second packet name
Breath;
S205 obtains the second public key of the application program on Platform Server;
First public key information and second public key information are carried out matching verification by S206;
S207, when first public key information is matched with second public key information, verification passes through.
It is, the application name and packet name of user's application to be installed program are obtained first, then again on Platform Server
Obtain corresponding with application name packet name, then by the packet name progress in the packet name and Platform Server of application program to be mounted
Match, if matching, then the public key information for needing application program to be mounted is obtained, and the public key letter obtained on tired state server
Two public key informations are carried out matching verification by breath, if successful match, it is legal program that illustrating, which needs application program to be mounted,
It can be installed, otherwise cannot be installed.By double verification, so that the application program of installation is safer, moreover it is possible to preferably
It combats copyright piracy.
In some embodiments of the present application, first public key information and second public key information are subjected to matching school
It tests, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
It is, in some embodiments, first step verification, when user is from one app of installation, terminal reads app's
Application name reads the corresponding packet name of this application name on Platform Server, if consistent with the application packet name currently installed,
Then by verification, continue second step verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating,
Consumer's risk is prompted at this time, the public key information of current application installation kit is then uploaded to Platform Server, by this developer
Blacklist is added.
Second step verification, after being verified by the first step, reading be currently installed on packet in developer's public key information, then with platform
The public key of the current application owner of server storage compares, if public key is consistent, illustrate this application be it is legal, if public
Key is inconsistent, illustrates that this application is packaged party and signs again, consumer's risk is prompted at this time, by the public key information of current developer
Upload Platform Server.
In some embodiments of the present application, this method further include: after platform runs a period of time, blacklist list includes
Many information for being packaged parties, by this information, if the signature of packing party when signing using discovery when installation in blacklist, directly
Connect prompt consumer's risk.
Blacklist real-time synchronization to distribution platform is applied, put down when packing party uploads to be applied to distribute by such as application shop etc.
When platform, forbid its upload.
This programme passes through the platform of a diversification, carry out partially transparentization for public key information upload, has reached prevention and control
Effect, be capable of the bad behavior of control malicious third parties software.
Embodiment three
The embodiment of the present invention provides a kind of mobile terminal, and the mobile terminal includes memory and processor;The storage
Device, which is stored with, prevents the pirate computer program applied, and the processor executes the computer program, is as above implemented with realizing
The step of two the method for example one or embodiment.
For example, the processor executes the computer program, to realize following steps:
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
In the embodiment of the present application, the application name and packet name for obtaining user's application to be installed program first, then put down again
Packet name corresponding with the application name is obtained on platform server, then will be in the packet name and Platform Server of application program to be mounted
Packet name is matched, and is verified and is passed through if matching.Technical solution provided by the invention will be by that will need application program to be mounted certainly
The packet name that the Bao Mingyu of band is obtained from Platform Server carries out matching verification, illustrates to need application program to be mounted to be if matching
Legal, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.
In some embodiments of the present application, this method further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
In the embodiment of the present application, a multi-party shared platform is established, application when all enterprise development persons issue application
Name and packet name, are uploaded to the platform there are also the public signature key of enterprise development person and put on record.One blacklist mechanism of Platform Designing simultaneously,
Label is packaged the signature of party.
In some embodiments of the present application, the first packet name and the second packet name are subjected to matching verification, also wrapped
It includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
It is, in some embodiments, when user downloads an app from Platform Server, terminal first reads app's
Then application name reads the corresponding packet name of this application name on Platform Server, if applying packet name with what is currently installed
Unanimously, then pass through verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, prompt is used at this time
Then the public key information of current application installation kit is uploaded to Platform Server by family risk, blacklist is added in this developer.
In some embodiments of the present application, this method further include:
When the first packet name is matched with the second packet name, the first public key information of the application program is obtained;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
It is, the application name and packet name of user's application to be installed program are obtained first, then again on Platform Server
Obtain corresponding with application name packet name, then by the packet name progress in the packet name and Platform Server of application program to be mounted
Match, if matching, then the public key information for needing application program to be mounted is obtained, and the public key letter obtained on tired state server
Two public key informations are carried out matching verification by breath, if successful match, it is legal program that illustrating, which needs application program to be mounted,
It can be installed, otherwise cannot be installed.By double verification, so that the application program of installation is safer, moreover it is possible to preferably
It combats copyright piracy.
In some embodiments of the present application, first public key information and second public key information are subjected to matching school
It tests, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name
It is single.
It is, in some embodiments, first step verification, when user is from one app of installation, terminal reads app's
Application name reads the corresponding packet name of this application name on Platform Server, if consistent with the application packet name currently installed,
Then by verification, continue second step verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating,
Consumer's risk is prompted at this time, the public key information of current application installation kit is then uploaded to Platform Server, by this developer
Blacklist is added.
Second step verification, after being verified by the first step, reading be currently installed on packet in developer's public key information, then with platform
The public key of the current application owner of server storage compares, if public key is consistent, illustrate this application be it is legal, if public
Key is inconsistent, illustrates that this application is packaged party and signs again, consumer's risk is prompted at this time, by the public key information of current developer
Upload Platform Server.
In some embodiments of the present application, this method further include: after platform runs a period of time, blacklist list includes
Many information for being packaged parties, by this information, if the signature of packing party when signing using discovery when installation in blacklist, directly
Connect prompt consumer's risk.
Blacklist real-time synchronization to distribution platform is applied, put down when packing party uploads to be applied to distribute by such as application shop etc.
When platform, forbid its upload.
This programme passes through the platform of a diversification, carry out partially transparentization for public key information upload, has reached prevention and control
Effect, be capable of the bad behavior of control malicious third parties software.
Example IV
The embodiment of the present invention provides a kind of computer readable storage medium, and the storage medium, which is stored with, prevents pirate application
Computer program, the computer program can be executed by least one processor, to realize embodiment one or embodiment as above
The step of two the methods.
The embodiment of the present invention in specific implementation, can have corresponding technical effect refering to above-mentioned each embodiment.
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.Mobile terminal shown in fig. 5
400 include: at least one processor 401, memory 402, at least one network interface 404 and other users interface 403.It is mobile
Various components in terminal 400 are coupled by bus system 405.It is understood that bus system 405 is for realizing these groups
Connection communication between part.Bus system 405 further includes power bus, control bus and state in addition to including data/address bus
Signal bus.But for the sake of clear explanation, various buses are all designated as bus system 405 in Fig. 5.
Wherein, user interface 403 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).Memory 402 described herein is intended to include but is not limited to these and any other suitable type
Memory.
In some embodiments, memory 402 stores following element, and unit or data structure can be performed, or
Their subset of person or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 4022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 4022.
In embodiments of the present invention, by the program or instruction of calling memory 402 to store, specifically, can be application
The program or instruction stored in program 4022, processor 401 are used to execute method and step provided by each method embodiment, such as
Include:
Obtain initial exposure value corresponding to each camera in multiple cameras of image acquisition component;
According to initial exposure value corresponding to each camera, automatic exposure is carried out respectively to the multiple camera
Convergence;
When any one camera restrains completion, the human face region that will identify that is transmitted to processor, obtains face figure
Picture;
It carries out preventing pirate application using the facial image.
The method that the embodiments of the present invention disclose can be applied in processor 401, or be realized by processor 401.
Processor 401 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 401 or the instruction of software form.Above-mentioned processing
Device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor
And software unit combination executes completion.Software unit can be located at random access memory, and flash memory, read-only memory may be programmed read-only
In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at
The step of memory 402, processor 401 reads the information in memory 402, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, the techniques described herein can be realized by executing the unit of function described herein.Software generation
Code is storable in memory and is executed by processor.Memory can in the processor or portion realizes outside the processor.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the embodiment of the present invention is substantially
The part of the part that contributes to existing technology or the technical solution can embody in the form of software products in other words
Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can
To be personal computer, server or the network equipment etc.) execute all or part of each embodiment the method for the present invention
Step.And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program
The medium of code.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Herein, the relational terms of such as " first " and " second " or the like are used merely to an entity or operation
It is distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation, there are any this
Actual relationship or sequence.
Through the above description of the embodiments, those skilled in the art can be understood that each reality of the present invention
Applying method described in example can realize by means of software and necessary general hardware platform, naturally it is also possible to by hardware,
But the former is more preferably embodiment in many cases.Based on this understanding, technical solution of the present invention is substantially in other words
The part that contributes to existing technology can be embodied in the form of software products, which is stored in one
In a storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be hand
Machine, computer, server, air conditioner or network equipment etc.) execute method or implementation described in each embodiment of the present invention
Method described in certain parts of example.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (8)
1. a kind of prevent the pirate method applied, which is characterized in that the described method includes:
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
2. according to claim 1 prevent the pirate method applied, which is characterized in that further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
3. according to claim 1 prevent the pirate method applied, which is characterized in that will the first packet name and described the
Two packet names carry out matching verification, further includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to blacklist.
4. according to claim 1 prevent the pirate method applied, which is characterized in that in the first packet name and described the
After the matching of two packet names, the method also includes:
Obtain the first public key information of the application program;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
5. according to claim 4 prevent the pirate method applied, which is characterized in that described by first public key information
Matching verification is carried out with second public key information, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to blacklist.
6. -5 any method for preventing pirate application according to claim 1, which is characterized in that the method also includes:
By the synchronizing information that the developer of blacklist is added to applying distribution platform;
The developer is forbidden to upload application program to applying distribution platform.
7. a kind of mobile terminal, which is characterized in that the mobile terminal includes memory and processor;The memory is stored with
The pirate computer program applied is prevented, the processor executes the computer program, any in claim 1-6 to realize
The pirate method applied is prevented described in one.
8. a kind of computer readable storage medium, which is characterized in that the storage medium, which is stored with, prevents the pirate calculating applied
Machine program, the computer program can be executed by least one processor, to realize as described in any one of claim 1-6
Prevent the pirate method applied.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910127385.0A CN109977632A (en) | 2019-02-20 | 2019-02-20 | Prevent pirate method, mobile terminal and the computer readable storage medium applied |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910127385.0A CN109977632A (en) | 2019-02-20 | 2019-02-20 | Prevent pirate method, mobile terminal and the computer readable storage medium applied |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109977632A true CN109977632A (en) | 2019-07-05 |
Family
ID=67077145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910127385.0A Pending CN109977632A (en) | 2019-02-20 | 2019-02-20 | Prevent pirate method, mobile terminal and the computer readable storage medium applied |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109977632A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
CN104123493A (en) * | 2014-07-31 | 2014-10-29 | 百度在线网络技术(北京)有限公司 | Method and device for detecting safety performance of application program |
US20150288528A1 (en) * | 2014-04-07 | 2015-10-08 | Samsung Electronics Co., Ltd. | Method for application installation, electronic device, and certificate system |
US20160218882A1 (en) * | 2015-01-23 | 2016-07-28 | Canon Kabushiki Kaisha | Methods and systems for installing software |
CN106293779A (en) * | 2015-05-11 | 2017-01-04 | 广州爱九游信息技术有限公司 | A kind of method and device identifying application installation kit |
CN107241298A (en) * | 2016-03-29 | 2017-10-10 | 阿里巴巴集团控股有限公司 | One kind application management-control method, terminal and system |
-
2019
- 2019-02-20 CN CN201910127385.0A patent/CN109977632A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
US20150288528A1 (en) * | 2014-04-07 | 2015-10-08 | Samsung Electronics Co., Ltd. | Method for application installation, electronic device, and certificate system |
CN104123493A (en) * | 2014-07-31 | 2014-10-29 | 百度在线网络技术(北京)有限公司 | Method and device for detecting safety performance of application program |
US20160218882A1 (en) * | 2015-01-23 | 2016-07-28 | Canon Kabushiki Kaisha | Methods and systems for installing software |
CN106293779A (en) * | 2015-05-11 | 2017-01-04 | 广州爱九游信息技术有限公司 | A kind of method and device identifying application installation kit |
CN107241298A (en) * | 2016-03-29 | 2017-10-10 | 阿里巴巴集团控股有限公司 | One kind application management-control method, terminal and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105376062B (en) | A kind of communication security exchange method, apparatus and system | |
CN104915582B (en) | unlocking method and device | |
CN105099669B (en) | Recording encipher-decipher method and device | |
CN105138400B (en) | Application program self-starting management method and device | |
CN106850976B (en) | Using update method and terminal | |
CN105278995B (en) | Management method, system, server and the mobile terminal of application program | |
CN108965727A (en) | A kind of image-pickup method, terminal and computer readable storage medium | |
CN105100477B (en) | Terminal notifying device and method | |
CN104731456B (en) | Desktop widget display methods and device | |
CN109033263A (en) | A kind of application recommended method and terminal | |
CN106102086A (en) | Data processing equipment and method | |
CN110109528A (en) | Management-control method, mobile terminal and the computer readable storage medium of application program | |
CN105764085A (en) | Abnormal electricity consumption detection method and terminal | |
CN105867749B (en) | A kind of menu interface display methods and terminal | |
CN105049582B (en) | A kind of save set of calling record, method and display methods | |
CN106991014A (en) | A kind of method, device and mobile terminal for handling user's incoming event | |
CN104954582B (en) | A kind of method and device for initiating speed dialling according to pressing touch-control | |
CN104735254B (en) | terminal screen locking method and system | |
CN106775336A (en) | A kind of content duplication method, device and terminal | |
CN106412328B (en) | A kind of method and apparatus obtaining field feedback | |
CN105187621B (en) | The method, apparatus and terminal of message notifying | |
CN107071161A (en) | The aggregation display method and mobile terminal of icon in a kind of status bar | |
CN104837122B (en) | Multi-party communications method, terminal and system | |
CN106791016A (en) | A kind of photographic method and terminal | |
CN106227454B (en) | A kind of touch trajectory detection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |
|
RJ01 | Rejection of invention patent application after publication |