Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

295 results about "Package.name" patented technology

Application program classification method and device

ActiveCN103092604AFast and Accurate Classification ProcessingSolve the problem that classification will be more cumbersomeSpecific program execution arrangementsInput/output processes for data processingClassification methodsApplication software
The invention discloses an application program classification method and an application program classification device. The device comprises a storage module, an acquiring module, a matching module and a classification module, wherein the storage module is used for storing a corresponding relationship between a program identifier and a classification identifier; the acquiring module is used for acquiring a program identifier of an application program to be classified; the matching module is used for obtaining a classification identifier which corresponds to the acquired program identifier; the classification module is used for storing icons of the application program to be classified into a folder which corresponds to the classification identifier; the acquiring module comprises a first acquiring unit and a second acquiring unit; the first acquiring unit is used for acquiring the package name of an application program installation package which corresponds to an application program to be classified on electronic equipment; and the second acquiring unit is used for acquiring a program identifier which corresponds to the package name of the application program installation package according to the package name of the application program installation package. By adoption of the technical scheme, the application program on the electronic equipment can be rapidly and accurately classified, so that a user can rapidly find the application program, and a user-friendly interface can be represented.
Owner:BEIJING QIHOO TECH CO LTD

Method and device for processing notification information of mobile terminal system notification bar and mobile terminal

The invention provides a method and a device for processing notification information of a mobile terminal system notification bar. The method comprises the steps of monitoring a system broadcast message and obtaining the notification information released to the system notification bar; according to an attribute or an application program package name corresponding to the notification information, determining a predefined notification type to which the notification information belongs; according to the notification type, determining a concern degree of the notification information, wherein the concern degree is generated based on a user history operating record for each notification type of the notification information on a terminal device; and according to the determined concern degree and a preset display strategy, displaying the notification information in the system notification bar or a pull-down notification list. The system can display the notification information according to the user history operating record and the preset display strategy, so that the notification information with the high user concern degree can attract an attention of a user at a relatively conspicuous position, and the user can be guaranteed to quickly find the notification information concerned by himself/herself; the operating efficiency of the terminal device is improved, and the experience of the user is promoted; and in addition, the invention further provides a mobile terminal.
Owner:BEIJING ANYUNSHIJI TECH CO LTD

Method and terminal for upgrading library files of system application

The invention discloses a method and a terminal for upgrading library files of system application. The method mainly includes searching upgraded library files in user partitions according to package names of upgrade installation packages when the package names of the upgrade installation packages are recorded in system properties; replacing original library files stored in system partitions by the found upgraded library files; deleting package names, which are recorded in the system properties, of the upgrade installation packages. The upgraded library files correspond to the upgrade installation packages. The package names of the upgrade installation packages are recorded in the system properties when application corresponding to the upgrade installation packages is determined to be the system application. According to the scheme, the method and the terminal have the advantages that the problem that upgraded library files cannot be loaded when system application corresponding to upgrade installation packages is individually upgraded can be solved; the problem that an integral system is upgraded due to individual upgrading of certain system application can be solved, accordingly, system overhead can be reduced, the system application upgrading efficiency can be improved, and the user experience can be enhanced to a certain extent.
Owner:HISENSE BROADBAND MULTIMEDIA TECH

Network permission control method and apparatus of application program

InactiveCN104869569AThere will be no phenomenon that cannot be controlled separatelyHigh control precisionSecurity arrangementNetwork connectionApplication software
The embodiments of the disclosure disclose a network permission control method and apparatus of an application program. When an application program makes a request of network connection, a package name corresponding to the application program is obtained, and a network permission rule corresponding to the application program is obtained according to the package name of the application program; and on the basis of the network permission rule corresponding to the application program, a networking state of the application program is controlled. The package name is a unique identification mark of the application program; different application programs have different corresponding package names; and thus the various application programs can be distinguished by the package names. Because the networking states of the application programs are controlled based on the package names of the appliction programs, a phenomenon that networking states of application programs sharing the same UID can not be controlled respectively can be prevented and a phenomenon that the network permission rule can not be backed up to another intelligent terminal can also be avoided. Therefore, the networking states of the application programs can be controlled by using the package names of the application programs as the identity marks of the application programs, so that the control precision is improved.
Owner:XIAOMI INC

Malicious application detection method and system

The invention relates to a malicious application detection method and system. The method comprises the steps of S1, performing static code scanning on a received to-be-detected application, analyzing whether the application has a malicious behavior conforming to any malicious behavior information in a malicious behavior information library or not based on three dimensions of right application, function call and information output, if the malicious behavior exists, marking the application as a suspected malicious application, and if the malicious behavior does not exist, marking the application as a normal application; and S2, performing application name, package name, signature certificate, directory structure, text file and image file-based similarity analysis between the application marked as the suspected malicious application and a malicious application sample in a malicious application sample library, and marking the application with the similarity conforming to a set value as a malicious application. According to the method and the system, the performance bottleneck of loading the application through a virtual machine for execution and analysis is avoided, the false alarm rate is effectively reduced, and the accuracy of identification is improved.
Owner:卓望数码技术(深圳)有限公司

Managing package dependencies

An illustrative embodiment provides a computer implemented method for managing package dependencies for an application installation. The computer implemented method identifies a set of used files for the application and a package for a respective file in the set of used files to form identified packages, adding names of the identified packages to an original package list of package names for the application, wherein the original package list defines package dependencies, and determines whether the identified packages can be located. The computer implemented method, responsive to a determination that the identified packages can be located, determines whether files within the identified packages can be found, responsive to a determination that the files within the identified packages can be found, determines whether files within the identified packages were used, and responsive to a determination that the files within the identified packages were used, updates the original list of package names for the application to form an updated list of managed package dependencies. The computer implemented method further creates a difference list between the updated list and the original list of package names and selectively installs the application using a combination of the original list of package names and the difference list according to the package dependencies.
Owner:IBM CORP

Method for root authority management and control in Android platform

The present invention provides a method for root authortity management and control in an Android platform. The management and control method comprises: establishing and storing a rootagent executable file that is added with a package name of an application program allowed to be granted a root authority; an Android init process enabling a rootagent service corresponding to the rootagent executable file by reading a configuration file; before the application program applies for the root authority, judging whether a rootagent service process is running or not first; and the rootagent service process matching a process ID of the application program that submits an application with a process ID corresponding to the package name of the application program allowed to be granted the root authority in the rootagent service process, and if the matching is successful, then granting the application program, that submits the application, the root authority, or otherwise, rejecting. By using the method, the fact that only individual application is subjected to root authorization can be accurately limited, and at the same time, opening and closing operations of the root authority can be performed conveniently and quickly by setting system attributes.
Owner:湖州帷幄知识产权运营有限公司

Class dependency graph based Android application similarity detection method

The invention belongs to the mobile Internet technical field and particularly relates to a class dependency graph based Android application similarity detection method. The class dependency graph based Android application similarity detection method specifically comprises step 1, decompiling an Android application and obtaining Dalvik byte codes of the Android application; step 2, obtaining package names and class names in the Android application according to a decompiled file directory and Dalvik byte code file names of the Android application; step 3, establishing a dependency relation graph between classes according to the package names, the class names and Dalvik byte code files; step 4, repeating the step 1 to the step 3 until class dependency graphs of Android application which need to be compared are obtained; step 5, performing comparison on similarities of the Android applications by a graph similarity comparison method according to the class dependency graphs of the Android applications. According to the class dependency graph based Android application similarity detection method, the structured information in the Android applications can be effectively extracted and the influences on the detection rate of the similar applications from an Android application confusion and deformation technology can be resisted.
Owner:XIANGTAN UNIV

Application increment upgrading method and system based on Android system

ActiveCN105657191ASave upgrade stepsIncremental upgrade is convenientSubstation equipmentProgram loading/initiatingOperating systemData library
The invention discloses an application increment upgrading method and system based on an Android system. The method includes the steps that application starting is detected, and a cloud configuration file version number and a local configuration file version number of an application are obtained; a system judges whether the local configuration file version number is coincident with the cloud configuration file version number, if the local configuration file version number is not coincident with the cloud configuration file version number, a corresponding cloud configuration file is downloaded from a cloud server; the downloaded cloud configuration file is analyzed through the system, a first bundle file in the loud configuration file is obtained, and a second bundle file coincident with the first bundle file in the file-package name in a local configuration file is found and unloaded from a database; the downloaded first bundle file is installed and started through the system, and the database is updated. According to the application increment upgrading method and system, when some module and / or a plurality of modules are updated, the corresponding bundle file only needs to be updated, the upgrading step is saved, and application increment upgrading is convenient.
Owner:TCL CORPORATION

Derived process staying-resident method, derived program generating method and corresponding device

The invention discloses a derived program generating method. The derived program generating method comprises following steps: responding to a user operation instruction, and determining an original program installation package where a derived program needs to be generated; reversing the original installation package with an original package name into an installation package mirror image, configuring a new package name different from that of the original installation package for the mirror image and implanting a resetting module in the mirror image, wherein the resetting module is used for informing the process that the package name of itself is the original package name during the consultation of the process of the derived program; and performing repackaging and signing on the mirror image so as to form and store the derived program. In addition, the invention also discloses a derived process staying-resident method for describing the operation control technology of the derived program generated by the derived program generating method. According to the invention, a scheme that processes of an original program and a copy thereof stay resident simultaneously is achieved through a simpler technology; and on the premise of following an application program copyright control technology, a blockade on the technology of an Android system is broken and user experience is improved.
Owner:北京世界星辉科技有限责任公司

Mobile application single sign-on method and device

ActiveCN106209726AAvoid typing username multiple timesAvoid the hassle of user login information such as passwordsSecuring communicationApplication serverPackage.name
The invention discloses a mobile application single sign-on method and device. The method comprises the following steps: when mobile application single sign-on is carried out for the first time, a terminal sends a first sign-on verification request carrying user sign-on information, a package name of a first application and user identification to an application server through a pseudo single sign-on server to enable the pseudo single sign-on server to acquire a pseudo password after the application server verifies the first sign-on verification request; and when the mobile application single sign-on is carried out again, the terminal acquires the pseudo password from the pseudo single sign-on server by using the user identification to sign on a second application; and the terminal performs second application single sign-on processing by using the user sign-on information and the pseudo password, wherein the user sign-on information of the first application is the same as that of the second application, and the first application and the second application are associated with each other through the user identification. Through adoption of the method provided by the invention, single sign-on of multiple mobile applications and single sign-on of cross-terminal applications are realized.
Owner:ZTE CORP

Method for generating code by frame-based code generation tool

The invention discloses a method for generating a code by a frame-based code generation tool. The method comprises the following steps that: configuring database link information and a code generation path; configuring a table name and a package name corresponding to the code, and configuring whether the table name and the package name are intermediate table information or not; checking a code option to be generated; connecting with database information; reading a template; generating a BO layer, a Dao layer, a Dao layer implementation class, a Service layer, a Service layer implementation class, mybatis, Mapper and a View layer code; when the table name and the package name are the intermediate table, generating a view layer interface code; generating an interface permission control code; if the table name and the package name are not the intermediate table, generating a query condition sub interface; generating a list sub interface; generating a new/ revised sub interface; and generating a checking sub interface. The code generation process is simple, efficiency is high, parameter verification is carried out on a front side and a service side, code robustness is good, code development cost is lowered, a development cost is shortened, and the repeated coding and the difference of the code can be reduced.
Owner:深圳互联天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products