CN103853975A - Information processing method and electronic device - Google Patents

Information processing method and electronic device Download PDF

Info

Publication number
CN103853975A
CN103853975A CN201210497367.XA CN201210497367A CN103853975A CN 103853975 A CN103853975 A CN 103853975A CN 201210497367 A CN201210497367 A CN 201210497367A CN 103853975 A CN103853975 A CN 103853975A
Authority
CN
China
Prior art keywords
file
information
electronic equipment
parameter information
course
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210497367.XA
Other languages
Chinese (zh)
Inventor
朱义国
康志洪
林毅福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201210497367.XA priority Critical patent/CN103853975A/en
Publication of CN103853975A publication Critical patent/CN103853975A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Abstract

The invention provides an information processing method and an electronic device. The method comprises the steps of: obtaining a first command executed by the first file in M files in a first electronic device; starting to run the first file, wherein, in starting process, the first electronic device sends the parameter information of the first file and/or starting parameter information corresponding to the starting process to a second electronic device, and then receives the authentication information fed back by the second electronic device; when the authentication information represents that the authentication passed, controlling the first file to enter running process from the starting process; thereby, in prior art, when a user is using the electronic device, the technical problem of the abnormal system of electronic device after some programs are installed by the misoperation of the user on the electronic device due to that the electronic device does not have a reorganization system for software is solved.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, relate in particular to a kind of information processing method and electronic equipment.
Background technology
Along with improving constantly of electronic technology, function integrated described in electronic equipment is also more and more, thereby user also can experience with various software the function having on electronic equipment on electronic equipment, such as, mobile phone in prior art, user can install various application programs and experience the function on mobile phone on mobile phone, specifically, for can be in upper installation music software, the application software such as software of playing, take pictures, thereby can make user in the use of mobile phone, have better experience by the application software of installing.
But there is following technical matters or defect find prior art in enforcement process of the present invention in present inventor:
User, in the time using electronic equipment, because electronic equipment does not exist the recognition mechanism to software, therefore, after the maloperation of user on electronic equipment causes that some programs are installed by mistake, can cause the abnormal technical matters of this electronic apparatus system in the prior art.
User is in the time using electronic equipment in the prior art, because electronic equipment does not exist the recognition mechanism to software, can cause electronic equipment, under background program, Malware is installed, or Malware can be deleted the application software in electronic equipment in backstage malice, thereby cause electronic apparatus system abnormal, and cause in electronic equipment information dangerous, the technical matters that electronic equipment resource is taken in a large number.
Summary of the invention
The invention provides a kind of information processing method and electronic equipment, should be with user in solution prior art in the time using electronic equipment, because electronic equipment does not exist the recognition mechanism to software, therefore after the maloperation of user on electronic equipment causes that some programs are installed by mistake, can cause the abnormal technical matters of this electronic apparatus system, its concrete technical scheme is as follows:
A kind of information processing method, application one first electronic equipment, described the first electronic equipment includes and M M the file that application program is corresponding, and wherein, M is more than or equal to 1 integer, and described method comprises:
Obtain the first instruction to the first file is carried out in a described M file;
Carry out described the first instruction, start described the first file of operation, so that described the first file is in start-up course;
In described start-up course, the start-up parameter information of the parameter information of described the first file and/or corresponding described start-up course is sent to the second electronic equipment;
In described start-up course, receive described the second electronic equipment based on described parameter information and/or described start-up parameter information and the authentication information feeding back;
In the time that described authentication information represents that authentication is passed through, control described the first file and enter into operational process from described start-up course.
Optionally, in described start-up course, receive described the second electronic equipment based on described parameter information and/or described start-up parameter information and after the authentication information feeding back, described method also comprises described:
In the time that described authentication information represents that authentication is not passed through, control described the first file and exit described start-up course, to stop that described the first file is started to operation.
Optionally, be operating instruction in described the first instruction, and described the first file is while being specially first program software of installation of corresponding the first application, described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described operating instruction, start described the first program software of operation; Or
Be delete instruction in described the first instruction, and described the first file is while being specially first program software of installation of corresponding the first application, described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described delete instruction, start and delete described the first program software; Or
In described the first instruction, for instruction is installed, and described the first file is while being specially the first mounting software of corresponding the first application, and described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described installation instruction, start described the first mounting software of operation.
Optionally, the described start-up parameter information by the parameter information of described the first file and/or corresponding described start-up course sends to the second electronic equipment, specifically comprises:
Obtain file name, document size information and described first file of described the first file in the starting state information of described start-up course;
Described file name, described document size information and described starting state information are sent to described the second electronic equipment.
Optionally, described in the time that described authentication information represents that authentication is passed through, control described the first file and enter into operational process from described start-up course, specifically comprise:
Based on described authentication information, obtain corresponding the first steering order of controlling described the first running paper;
Based on described the first steering order, control described the first file and enter into described operational process from described start-up course.
Optionally, described in the time that described authentication information represents that authentication is not passed through, control described the first file and stop starting, specifically comprise:
Based on described authentication information, obtain corresponding described the first file the second steering order out of service of controlling;
Based on described the second steering order, control described the first file and stop starting.
Based on described parameter information and/or described start-up parameter information and the authentication information feeding back be specially:
Receive the authentication information that the cloud server that is connected with described the first electronic equipment by network feeds back based on described parameter information and/or described start-up parameter information, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server; Or
Receive the authentication information that the second electronic equipment of being directly connected with described electronic equipment by wired mode or wireless mode feeds back based on described parameter information and/or described start-up parameter information, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server.
Optionally, described the first file is the first executable file or installation file compressed package.
A kind of electronic equipment, described electronic equipment comprises:
Obtain unit, for obtaining the first instruction that M file the first file is carried out;
Performance element, for carrying out described the first instruction, starts described the first file of operation, so that described the first file is in start-up course;
Transmitting element, in described start-up course, sends to the second electronic equipment by the start-up parameter information of the parameter information of described the first file and/or corresponding described start-up course;
Receiving element, in described start-up course, receives described the second electronic equipment based on described parameter information and/or described start-up parameter information and the authentication information feeding back;
Control module, in the time that described authentication information represents that authentication is passed through, controls described the first file and enters into operational process from described start-up course.
Optionally, control module also for represent at described authentication information authentication by time, control described the first file and exit described start-up course, to stop that described the first file is started to operation.
Optionally, described transmitting element specifically comprises:
Acquisition module, for obtaining file name, document size information and described first file of described the first file in the starting state information of described start-up course;
Sending module, for sending to described the second electronic equipment by described file name, described document size information and described starting state information.
Optionally, described control module comprises:
Obtain module, for based on described authentication information, obtain corresponding the first steering order of controlling described the first running paper;
Control module, for based on described the first steering order, controls described the first file and enters into described operational process from described start-up course.
Optionally, the authentication information of described receiving element specifically for receiving the cloud server that is connected with described the first electronic equipment by network or feeding back based on described parameter information and/or described start-up parameter information by wired mode or direct the second electronic equipment being connected with described electronic equipment of wireless mode, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server.
At least there is following technique effect or advantage in one or more embodiment provided by the invention:
In embodiments of the present invention, this electronic equipment is in the time carrying out the first file, first the parameter information of the first file and start-up parameter information can be sent to second electronic equipment with authentication functions, and receive the authenticating result of the second electronic equipment, last according to the execution of this authenticating result control the first file, thereby solve in prior art user in the time using electronic equipment, because electronic equipment does not exist the recognition mechanism to software, therefore after the maloperation of user on electronic equipment causes that some programs are installed by mistake, can cause the abnormal technical matters of this electronic apparatus system, and then effectively avoid in electronic equipment malicious file in electronic equipment, to install or delete alternative document causing the abnormal problem of electronic apparatus system, improve the security of electronic equipment.
In embodiments of the present invention by the first file in electronic equipment is carried out to authentication, and determine according to authentication information whether the execute file in this electronic equipment can be carried out or be moved, thereby effectively solve in prior art because electronic equipment does not exist the recognition mechanism to software, can cause electronic equipment, under background program, Malware is installed, or Malware can be deleted the application software in electronic equipment in backstage malice, thereby cause electronic apparatus system abnormal, and cause in electronic equipment information dangerous, the technical matters that electronic equipment resource is taken in a large number, and then realize the authentication process to Malware in electronic equipment, and also for electronic equipment has been saved system resource, improve the security of electronic equipment.
Brief description of the drawings
Figure 1 shows that the process flow diagram of a kind of information processing method in the embodiment of the present invention;
Figure 2 shows that the concrete structure schematic diagram of a kind of electronic equipment of the embodiment of the present invention.
Embodiment
The invention provides a kind of information processing method and electronic equipment, the method comprises: obtain the first instruction of the first file execution in M executable file in the first electronic equipment (wherein, M is more than or equal to 1 positive integer), carry out the first instruction, start operation the first file, so that the first file is in start-up course, in the process starting, the first electronic equipment can send to the second electronic equipment by the parameter information of this first file and/or to start-up parameter information that should start-up course, then receive the second electronic equipment based on parameter information and/or start-up parameter information and the authentication information feeding back, in the time that this authentication information represents that authentication is passed through, control this first file and enter into operational process from start-up course.
Simple, in the time that the first electronic equipment corresponding to user need to be carried out a file, (as: install or delete), this first electronic equipment can send to the second electronic equipment by the information of the parameter information of this file and current executing state, then the second electronic equipment can determine whether to continue to carry out by this file according to the parameter information receiving and the current execution state information of file, and generate an authentication information, and this authentication information is sent to the first electronic equipment, in the time that this authentication information represents that this file can continue to move, this first electronic equipment will continue to carry out the subsequent operation of this file.
Below by accompanying drawing and specific embodiment, technical solution of the present invention is described in detail, be to be understood that the just detailed description to technical solution of the present invention of concrete technical characterictic in the embodiment of the present invention and embodiment, and be not limited to the technical solution, in the situation that not conflicting, the concrete technical characterictic in the embodiment of the present invention and embodiment can combine mutually.
The particular flow sheet that is illustrated in figure 1 a kind of information processing method in the embodiment of the present invention, the method comprises:
Step 101, obtains the first instruction to the first file is carried out in M executable file.
Step 102, carries out the first instruction, starts operation the first file.
First, the method of this information processing of the present invention is applied in one first electronic equipment, this first electronic equipment includes M M the file that application program is corresponding, then when user operates first file when execution of controlling in M file, in this first electronic equipment, will generate one first instruction, this first instruction can be controlled the first executable file and carry out, namely start this first file, wherein, the first file can be the first executable file or installation file compressed package, the first executable file can be " .exe " formatted file, " .app " formatted file, the executable files such as " .blk " formatted file, installation file compressed package can be specifically the installation file compressed package of the file layouts such as " .sis " formatted file, " .sisx " formatted file, " .apk " formatted file, " .jar " formatted file.
Describe taking the first file as the first executable file below.
It should be noted that at this, the start-up course of this first executable file is not directly to move the first executable file in embodiments of the present invention, in the time that user controls electronic equipment and carries out the first executable file, this first electronic equipment will start this first executable file, but this first electronic equipment can be switched to backstage delay disposal by this first executable file.
After the first executable file is switched to backstage delay disposal, this first electronic equipment also will obtain the parameter information of this first executable file simultaneously, and the start-up parameter information of this first executable file, the parameter information of this first executable file has just comprised the title of file and the size of file, the starting state parameter information that this start-up parameter information is this first executable file.(such as: delete xx software, xx software is installed.)
Such as, in the time that user uses a mobile phone that one software is installed, this mobile phone can the first processing to this software installation kit according to this user's operation start, namely start the processing procedure of this software, but this software can't be directly installed, and this mobile phone can be placed on backstage by the operation of this software, and now the processing mode of this software has starting state to be switched to delay process state, under this delay process state, this software is in halted state, thereby this software can't be carried out subsequent step.
In this mobile phone, detecting unit will detect and obtain the information such as the title of this software and the size of this software simultaneously, and this mobile phone also will obtain the starting state information of this software, in this starting state information, specifically just comprise this software in mobile phone executive mode, such as executive modes such as deletion, installations, now this mobile phone preservation of the starting state information of the software parameter information getting and software can being packed.
And then, obtain in this electronic equipment first can the parameter information and/or start-up parameter information of execute file after, this electronic equipment will perform step 103.
Step 103, sends to the second electronic equipment by the parameter information of the first executable file and/or to start-up parameter information that should start-up course.
After in step 102, this first electronic equipment gets the parameter information of the first executable file and/or the start-up parameter information of this first executable file, all information that this first electronic equipment can detect this send to one second electronic equipment, this second electronic equipment can carry out authentication to the first executable file according to obtaining parameter information, and its concrete mode is as follows:
Situation one:
This first electronic equipment can and the second electronic equipment between realize the mutual of information, first the first electronic equipment can send to the second electronic equipment by the mode of short message or multimedia message by parameter information corresponding the first executable file getting, thereby the second electronic equipment can determine whether the first executable file can be carried out in the first electronic equipment according to this short message.
Such as, this first electronic equipment is the first mobile phone, the second electronic equipment is the second mobile phone, in the time needing a software is installed in the first mobile phone, this first-hand chance is by size and this software executing state of the title of software and software, therefore the information that, need to issue the second mobile phone will a following form send.Such as this information is specially: XX software-10M-state: install, that is to say that this first-hand chance sends to the second mobile phone in the mode of this kind of information, and then the information that receives of the second mobile phone has just comprised the content of above-mentioned information.
After the second mobile phone receives this content, this the second mobile phone respective user will determine whether this program is security procedure or rogue program according to the information of receiving, thereby can on the second mobile phone, input corresponding authentication information, in this authentication information, just comprise whether this software is allowed to the instruction of operation, after generating this authentication information, this authentication information is sent the first mobile phone by this second-hand's chance.
In addition, this can also be following mode to the authentication mode of the first executable file in embodiments of the present invention:
First this first electronic equipment is connected with cloud server by wireless connections, thereby this first electronic equipment can and be opened parameter information by the parameter information of the first executable file getting and send to cloud server, thereby cloud server is after receiving this parameter information and opening parameter information, this cloud server will carry out authentication to this first executable file according to the parameter information getting and unlatching parameter information, certainly this detection mode is that server will carry out the parameter information that prestores in matching database according to the parameter information getting and unlatching parameter information, thereby determine whether this first executable file is allowed to carry out, and generation comprises the authentication information of whether carrying out the first executable file.
Such as, this first electronic equipment is mobile phone, in the time needing a software is installed in this mobile phone, this mobile phone can move to backstage by this software, and by this software delays processing, namely suspend this software, now this mobile phone will obtain the title of this software and the size of this software, and the executing state of this software, such as: xx software-10M-state: install, after getting this parameter information, first this cloud server mates the title of this software with the dbase prestoring in cloud server, and generate a matching result, and will generate an authentication information according to this cloud server of this matching result, in this authentication information, also comprise the command information that in permission time whether, software is carried out.
When after by the start-up parameter information of the parameter information of the first executable file and this first executable file, this first electronic equipment will perform step 104 and step 105.
Step 104, receives the authentication information that the second electronic equipment feeds back based on parameter information and/or start-up parameter information.
Step 105, in the time that authentication information represents that authentication is passed through, controls the first executable file and enters into operational process from start-up course.
In step 103, on the second electronic equipment, generate authentication information, authentication information is sent to the first electronic equipment by this second electronic equipment, and this first electronic equipment will receive the authentication information of this second electronic equipment transmission.
After the first electronic equipment receives this authentication information, this first electronic equipment can be resolved this authentication information, and the execution instruction of obtaining this first executable file in this authentication information, in the time that the execution instruction in this authentication information represents that this first executable file authentication is passed through, this first electronic equipment enters into operational process by control the first executable file from start-up course.
Such as, after mobile phone receives the authentication information of cloud server or another mobile phone, first this mobile phone can resolve this authentication information, and from this authentication information, get corresponding instruction, in the time that the content in this authentication information is carried out this software for continuation, this mobile phone will continue to carry out the operation of this software.
When the instruction comprising in this authentication information is when forbidding this running software, this mobile phone can be directly by out of service this software, and on this mobile phone, also can generate corresponding information, this information can point out this software of user whether to need to delete or this mobile phone of reminding user in there is dangerous software.
Thereby by the above embodiments, this electronic equipment is in the time carrying out the first executable file, first the parameter information of the first executable file and start-up parameter information can be sent to second electronic equipment with authentication functions, and receive the authenticating result of the second electronic equipment, last according to the execution of this authenticating result control the first executable file, thereby solve in prior art user in the time using electronic equipment, because electronic equipment does not exist the recognition mechanism to software, therefore after the maloperation of user on electronic equipment causes that some programs are installed by mistake, can cause the abnormal technical matters of this electronic apparatus system, and then effectively avoid in electronic equipment malicious file in electronic equipment, to install or delete alternative document causing the abnormal problem of electronic apparatus system, improve the security of electronic equipment, and save system resource in electronic equipment.
Below by concrete application scenarios, the embodiment of the present invention is described further.
In this concrete application scenarios, be still illustrated with mobile phone, the first electronic equipment in the embodiment of the present invention can also be computer or other electronic equipments certainly.
In the time having a software to install or to delete in mobile phone, this software will can directly not installed or delete to this mobile phone, but first this software exchange is arrived to background process, and the installation process of this software or delete procedure are switched to halted state, then this mobile phone will obtain the title of this software and the size of this software, such as: the fruit person of bearing-25M-executing state: install, now this mobile phone can send to this information the authentication device of far-end, this authentication device can be another mobile phone or cloud server, this mobile phone or cloud server are after receiving this parameter information, this mobile phone or cloud server will carry out authentication to this parameter, namely can determine whether safety of this software by this another mobile phone of this parameter information or cloud server, when at another mobile phone or cloud server after authentication finishes, this another mobile phone or cloud server can generate an authentication information, comprise at this authentication information the instruction that moves or do not move this software.
Then this cloud server or mobile phone can send to this authentication information the mobile phone that this software is installed, then this mobile phone can be resolved the execution instruction of obtaining in this authentication information in authentication information, in the time that this execution instruction represents to continue this software is installed, this mobile phone has halted state to be converted to executing state this software, thereby this mobile phone can continue to install this software, when the execution instruction in this authentication information is when stopping carrying out this software, this mobile phone will directly exit the installation of this software, and generation one information is presented on display screen simultaneously, thereby this display screen can show this information, this information is used for pointing out user whether to need to delete this software.
In addition, the installation authentication process of software has just been described in the above-described embodiments, the method is also applied to the delete procedure of software certainly, or the process of transmitting of software.
The method of a kind of information processing of the corresponding embodiment of the present invention, the embodiment of the present invention also provides a kind of electronic equipment, is illustrated in figure 2 the concrete structure schematic diagram of a kind of electronic equipment of the embodiment of the present invention, and this electronic equipment comprises:
Obtain unit 201, for obtaining the first instruction that M file the first file is carried out;
Performance element 202, for carrying out described the first instruction, starts described the first file of operation, so that described the first file is in start-up course;
Transmitting element 203, in described start-up course, sends to the second electronic equipment by the start-up parameter information of the parameter information of described the first file and/or corresponding described start-up course;
Receiving element 204, in described start-up course, receives described the second electronic equipment based on described parameter information and/or described start-up parameter information and the authentication information feeding back;
Control module 205, in the time that described authentication information represents that authentication is passed through, controls described the first file and enters into operational process from described start-up course.
Wherein, transmitting element 203 has also comprised acquisition module and sending module, this acquisition module is for obtaining part title, document size information and described first file of the first executable file in the starting state information of described start-up course, and then described file name, described document size information and described starting state information are sent to described the second electronic equipment by this sending module.
Wherein, this second electronic equipment can be cloud server, therefore, the authentication information of receiving element 204 specifically for receiving the cloud server that is connected with described the first electronic equipment by network or feeding back based on described parameter information and/or described start-up parameter information by wired mode or direct the second electronic equipment being connected with described electronic equipment of wireless mode, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server.
Then after getting authentication information, acquisition module in control module 205 in this first electronic equipment will be based on described authentication information, obtain corresponding the first steering order of controlling described the first running paper, then the control module in control module 205 will be based on described the first steering order, controls described the first file and enters into described operational process from described start-up course.
Certainly it should be noted that, in embodiments of the present invention this control module 205 also for represent at described authentication information authentication by time, control described the first file and exit described start-up course, to stop that described the first file is started to operation.
At least there is following technique effect or advantage in one or more embodiment provided by the invention:
In embodiments of the present invention, this electronic equipment is in the time carrying out the first file, first the parameter information of the first file and start-up parameter information can be sent to second electronic equipment with authentication functions, and receive the authenticating result of the second electronic equipment, last according to the execution of this authenticating result control the first executable file, thereby solve in prior art user in the time using electronic equipment, because electronic equipment does not exist the recognition mechanism to software, therefore after the maloperation of user on electronic equipment causes that some programs are installed by mistake, can cause the abnormal technical matters of this electronic apparatus system, and then effectively avoid in electronic equipment malicious file in electronic equipment, to install or delete alternative document causing the abnormal problem of electronic apparatus system, improve the security of electronic equipment.
In embodiments of the present invention by the first file in electronic equipment is carried out to authentication, and determine according to authentication information whether the execute file in this electronic equipment can be carried out or be moved, thereby effectively solve in prior art because electronic equipment does not exist the recognition mechanism to software, can cause electronic equipment, under background program, Malware is installed, or Malware can be deleted the application software in electronic equipment in backstage malice, thereby cause electronic apparatus system abnormal, and cause in electronic equipment information dangerous, the technical matters that electronic equipment resource is taken in a large number, and then realize the authentication process to Malware in electronic equipment, and also for electronic equipment has been saved system resource, improve the security of electronic equipment.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, completely implement software example or the form in conjunction with the embodiment of software and hardware aspect.And the present invention can adopt the form at one or more upper computer programs of implementing of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) that wherein include computer usable program code.
The present invention is with reference to describing according to process flow diagram and/or the block scheme of the method for the embodiment of the present invention, equipment (system) and computer program.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, the instruction that makes to carry out by the processor of computing machine or other programmable data processing device produces the device for realizing the function of specifying at flow process of process flow diagram or multiple flow process and/or square frame of block scheme or multiple square frame.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, the instruction that makes to be stored in this computer-readable memory produces the manufacture that comprises command device, and this command device is realized the function of specifying in flow process of process flow diagram or multiple flow process and/or square frame of block scheme or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make to carry out sequence of operations step to produce computer implemented processing on computing machine or other programmable devices, thereby the instruction of carrying out is provided for realizing the step of the function of specifying in flow process of process flow diagram or multiple flow process and/or square frame of block scheme or multiple square frame on computing machine or other programmable devices.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if these amendments of the present invention and within modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (12)

1. an information processing method, is applied to the first electronic equipment, and described the first electronic equipment includes and M M the file that application program is corresponding, and wherein, M is more than or equal to 1 integer, it is characterized in that, described method comprises:
Obtain the first instruction to the first file is carried out in a described M file;
Carry out described the first instruction, start described the first file of operation, so that described the first file is in start-up course;
In described start-up course, the start-up parameter information of the parameter information of described the first file and/or corresponding described start-up course is sent to the second electronic equipment;
In described start-up course, receive described the second electronic equipment based on described parameter information and/or described start-up parameter information and the authentication information feeding back;
In the time that described authentication information represents that authentication is passed through, control described the first file and enter into operational process from described start-up course.
2. the method for claim 1, is characterized in that, in described start-up course, receives described the second electronic equipment based on described parameter information and/or described start-up parameter information and after the authentication information feeding back, described method also comprises described:
In the time that described authentication information represents that authentication is not passed through, control described the first file and exit described start-up course, to stop that described the first file is started to operation.
3. the method for claim 1, is characterized in that, is operating instruction in described the first instruction, and when described the first file is specially first program software of installation of corresponding the first application, described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described operating instruction, start described the first program software of operation; Or
Be delete instruction in described the first instruction, and described the first file is while being specially first program software of installation of corresponding the first application, described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described delete instruction, start and delete described the first program software; Or
In described the first instruction, for instruction is installed, and described the first file is while being specially the first mounting software of corresponding the first application, and described the first instruction of described execution, starts described the first file of operation, is specially:
Carry out described installation instruction, start described the first mounting software of operation.
4. method as claimed in claim 3, is characterized in that, the described start-up parameter information by the parameter information of described the first file and/or corresponding described start-up course sends to the second electronic equipment, specifically comprises:
Obtain file name, document size information and described first file of described the first file in the starting state information of described start-up course;
Described file name, described document size information and described starting state information are sent to described the second electronic equipment.
5. method as claimed in claim 4, is characterized in that, described in the time that described authentication information represents that authentication is passed through, and controls described the first file and enters into operational process from described start-up course, specifically comprises:
Based on described authentication information, obtain corresponding the first steering order of controlling described the first running paper;
Based on described the first steering order, control described the first file and enter into described operational process from described start-up course.
6. method as claimed in claim 4, is characterized in that, described in the time that described authentication information represents that authentication is not passed through, and controls described the first file and stops starting, and specifically comprises:
Based on described authentication information, obtain corresponding described the first file the second steering order out of service of controlling;
Based on described the second steering order, control described the first file and stop starting;
Based on described parameter information and/or described start-up parameter information and the authentication information feeding back be specially:
Receive the authentication information that the cloud server that is connected with described the first electronic equipment by network feeds back based on described parameter information and/or described start-up parameter information, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server; Or
Receive the authentication information that the second electronic equipment of being directly connected with described electronic equipment by wired mode or wireless mode feeds back based on described parameter information and/or described start-up parameter information, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server.
7. the method as described in claim as arbitrary in claim 1 ~ 6, is characterized in that, described the first file is the first executable file or installation file compressed package.
8. an electronic equipment, is characterized in that, described electronic equipment comprises:
Obtain unit, for obtaining the first instruction that M file the first file is carried out;
Performance element, for carrying out described the first instruction, starts described the first file of operation, so that described the first file is in start-up course;
Transmitting element, in described start-up course, sends to the second electronic equipment by the start-up parameter information of the parameter information of described the first file and/or corresponding described start-up course;
Receiving element, in described start-up course, receives described the second electronic equipment based on described parameter information and/or described start-up parameter information and the authentication information feeding back;
Control module, in the time that described authentication information represents that authentication is passed through, controls described the first file and enters into operational process from described start-up course.
9. electronic equipment as claimed in claim 8, is characterized in that, control module also for represent at described authentication information authentication by time, control described the first file and exit described start-up course, to stop that described the first file is started to operation.
10. electronic equipment as claimed in claim 8, is characterized in that, described transmitting element specifically comprises:
Acquisition module, for obtaining file name, document size information and described first file of described the first file in the starting state information of described start-up course;
Sending module, for sending to described the second electronic equipment by described file name, described document size information and described starting state information.
11. electronic equipments as claimed in claim 8, is characterized in that, described control module comprises:
Obtain module, for based on described authentication information, obtain corresponding the first steering order of controlling described the first running paper;
Control module, for based on described the first steering order, controls described the first file and enters into described operational process from described start-up course.
12. electronic equipments as claimed in claim 8, it is characterized in that, the authentication information of described receiving element specifically for receiving the cloud server that is connected with described the first electronic equipment by network or feeding back based on described parameter information and/or described start-up parameter information by wired mode or direct the second electronic equipment being connected with described electronic equipment of wireless mode, wherein, described authentication information is that described parameter information and/or described start-up parameter information are mated the rear information obtaining with parameter preset information and/or default start-up parameter information by described cloud server.
CN201210497367.XA 2012-11-28 2012-11-28 Information processing method and electronic device Pending CN103853975A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210497367.XA CN103853975A (en) 2012-11-28 2012-11-28 Information processing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210497367.XA CN103853975A (en) 2012-11-28 2012-11-28 Information processing method and electronic device

Publications (1)

Publication Number Publication Date
CN103853975A true CN103853975A (en) 2014-06-11

Family

ID=50861620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210497367.XA Pending CN103853975A (en) 2012-11-28 2012-11-28 Information processing method and electronic device

Country Status (1)

Country Link
CN (1) CN103853975A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302584A (en) * 2014-06-23 2016-02-03 联想(北京)有限公司 Information processing method and apparatus
CN105468640A (en) * 2014-09-09 2016-04-06 联想(北京)有限公司 Information processing method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1581088A (en) * 2003-08-06 2005-02-16 华为技术有限公司 Method and device for preventing computer virus
CN1618198A (en) * 2003-05-17 2005-05-18 微软公司 Mechanism for evaluating safety and risk
CN101079092A (en) * 2001-11-26 2007-11-28 松下电器产业株式会社 Terminal for application program authentication system and starting method for application program of the same
US20080052705A1 (en) * 2006-08-10 2008-02-28 Microsoft Corporation Securely sharing applications installed by unprivileged users
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN102737192A (en) * 2012-07-09 2012-10-17 江南大学 Operation statistics and operation document backup method of trusted program based on cloud storage
CN102750491A (en) * 2012-06-05 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and system for restricting terminals from mounting or upgrading third-party application programs

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079092A (en) * 2001-11-26 2007-11-28 松下电器产业株式会社 Terminal for application program authentication system and starting method for application program of the same
CN1618198A (en) * 2003-05-17 2005-05-18 微软公司 Mechanism for evaluating safety and risk
CN1581088A (en) * 2003-08-06 2005-02-16 华为技术有限公司 Method and device for preventing computer virus
US20080052705A1 (en) * 2006-08-10 2008-02-28 Microsoft Corporation Securely sharing applications installed by unprivileged users
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
CN102750491A (en) * 2012-06-05 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and system for restricting terminals from mounting or upgrading third-party application programs
CN102737192A (en) * 2012-07-09 2012-10-17 江南大学 Operation statistics and operation document backup method of trusted program based on cloud storage

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302584A (en) * 2014-06-23 2016-02-03 联想(北京)有限公司 Information processing method and apparatus
CN105302584B (en) * 2014-06-23 2019-06-25 联想(北京)有限公司 Information processing method and device
CN105468640A (en) * 2014-09-09 2016-04-06 联想(北京)有限公司 Information processing method and apparatus
CN105468640B (en) * 2014-09-09 2019-04-23 联想(北京)有限公司 A kind of information processing method and device

Similar Documents

Publication Publication Date Title
CN106155751B (en) Application packaging and issuing method and device
CN106095458B (en) The management method and device of plug-in unit in a kind of application program
WO2017071207A1 (en) Application installation method, corresponding apparatus, and application installation system
CN106598584B (en) Method, device and system for processing resource file
KR101281825B1 (en) Apparatus and method that enhance security using virtual interface in cloud system
US10176327B2 (en) Method and device for preventing application in an operating system from being uninstalled
CN107172075B (en) Communication method, system and readable storage medium based on network isolation
CN104809400A (en) Process protection method and device
CN104750523A (en) Information processing method and electronic equipment
CN112328217A (en) Code deployment method, device, system, computer equipment and medium
CN1869927A (en) Device controller, method for controlling a device, and program therefor
EP2897053B1 (en) Device management method and apparatus
CN108090345B (en) Linux system external command execution method and device
CN104360880B (en) One kind applies installation method and electronic equipment
WO2014190788A1 (en) Method, apparatus and system for acquiring input events
CN111338663B (en) System upgrading method, terminal and storage medium
CN103067246A (en) Method and apparatus used for processing file received based on instant communication service
CN112966257B (en) Authorization method and device for application program
CN104751046B (en) A kind of user authen method and mobile terminal device of application program
CN103853975A (en) Information processing method and electronic device
CN103034811A (en) File processing method and system and device
WO2014106391A1 (en) Method, device and system for installing application
CN111142900A (en) Program updating method and device and terminal equipment
CN110225106A (en) A kind of data transmission method, device and storage medium
WO2017092315A1 (en) Method and device for controlling television

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140611