Disclosure of Invention
The embodiment of the application provides a software detection method, equipment and a storage medium, and aims to solve the technical problems that the software of terminal equipment is at risk in use and economic loss is easily caused to enterprises due to the fact that the software is randomly installed on the terminal equipment.
The embodiment of the application provides a software detection method, which comprises the following steps:
Acquiring installation information of installed software, wherein the installation information comprises the information of the installed software and equipment information of a terminal where the installed software is located;
comparing the installed software information with software information stored in a preset blacklist;
marking an offending mark on the installed software when the installed software information is the same as the software information;
And/or marking an violation on the installed software when the installed software information is not the same as the software information and the installed software information does not match the software information associated with the device information.
In an embodiment, the software information associated with the different device information is different.
In an embodiment, before the step of obtaining the installation information of the installed software, the method further includes:
when a software installation approval request is received, acquiring equipment information for sending the software installation approval request and to-be-approved software information in the software installation approval request;
And when the to-be-approved software information is approved, the equipment information is associated with the to-be-approved software information.
In an embodiment, when the installed software information is different from the software information and the installed software information does not match the software information associated with the device information, after the step of marking the installed software with a violation mark, the method further comprises:
Outputting an installation application prompt to a terminal for installing the installed software, wherein the installation application prompt is used for prompting a user whether to supplement an installation application for installing the installed software;
When receiving an installation application triggered based on the application installation prompt, generating a post-patch installation approval request according to the installed software information and the equipment information;
And receiving an approval failing response triggered based on the post-patch installation approval request, and maintaining the violation mark for marking the violation mark on the installed software.
In an embodiment, after the step of generating an approval request according to the installed software information and the device information when the installation application triggered by the application installation prompt is received, the method further includes:
And receiving an approval passing response triggered based on the post-patch installation approval request, associating the equipment information in the approval request with the installed software information, and cancelling the violation mark marked on the installed software.
In one embodiment, after the step of marking the violation on the installed software, the method further comprises:
Acquiring the installation quantity of the installed software, which has the same information of the installed software and marks the violation mark;
And when the installation quantity is larger than a set value, associating the installed software information of the installed software marking the violation mark with the equipment information of the terminal where the installed software marking the violation mark is located.
In one embodiment, after the step of marking the violation on the installed software, the method further comprises:
Acquiring user information according to the equipment information of the terminal where the installed software marking the violation mark is located;
acquiring a communication account of a user according to the user information;
And sending a violation notification message to the communication account of the user.
In one embodiment, after the step of marking the violation on the installed software, the method further comprises:
Acquiring the total number of installed software marked with the violation mark in each terminal;
generating a user notification list according to the user information, the device information, the installed software information and the total number;
and generating a report list of the offending software according to the installed software marked with the offending mark and the total number.
In addition, to achieve the above object, the present invention also provides a software detection device including: the device comprises a memory, a processor and a software detection program which is stored in the memory and can run on the processor, wherein the software detection program realizes the steps of the software detection method when being executed by the processor.
In addition, in order to achieve the above object, the present invention also provides a storage medium having stored thereon a software detection program which, when executed by a processor, implements the steps of the software detection method described above.
The technical scheme of the software detection method, the software detection equipment and the storage medium provided by the embodiment of the application has at least the following technical effects or advantages:
Because the method adopts the steps of acquiring the installed software information of the installed software and the equipment information of the terminal; the technical scheme of marking the illegal marks on the installed software is used for solving the technical problems that the software of the terminal equipment is used at random and is easy to cause economic loss to enterprises due to the fact that the software of the terminal equipment is used at random, and the illegal installation checking of the software installed in the terminal is realized, so that the risk brought to enterprises due to the random installation of the software is reduced.
Detailed Description
In order that the above-described aspects may be better understood, exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a hardware running environment according to an embodiment of the present invention.
It should be noted that fig. 1 is a schematic structural diagram of a hardware running environment of the software detection device.
As shown in fig. 1, the software detection device may include: a processor 1001, such as a CPU, memory 1005, user interface 1003, network interface 1004, communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the software detection device structure shown in fig. 1 is not meant to be limiting, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a software detection program may be included in the memory 1005 as one type of storage medium. The operating system is a program for managing and controlling hardware and software resources of the software detection device, the software detection program and other software or running of the program.
In the software detection device shown in fig. 1, the user interface 1003 is mainly used for connecting a terminal, and performing data communication with the terminal; the network interface 1004 is mainly used for a background server and is in data communication with the background server; the processor 1001 may be used to invoke a software detection program stored in the memory 1005.
In this embodiment, the software detection device includes: a memory 1005, a processor 1001, and a software detection program stored on the memory 1005 and executable on the processor, wherein:
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are performed:
Acquiring installation information of installed software, wherein the installation information comprises the information of the installed software and equipment information of a terminal where the installed software is located;
comparing the installed software information with software information stored in a preset blacklist;
marking an offending mark on the installed software when the installed software information is the same as the software information;
And/or marking an violation on the installed software when the installed software information is not the same as the software information and the installed software information does not match the software information associated with the device information.
The software information associated with different device information is different.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
when a software installation approval request is received, acquiring equipment information for sending the software installation approval request and to-be-approved software information in the software installation approval request;
And when the to-be-approved software information is approved, the equipment information is associated with the to-be-approved software information.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
Outputting an installation application prompt to a terminal for installing the installed software, wherein the installation application prompt is used for prompting a user whether to supplement an installation application for installing the installed software;
When receiving an installation application triggered based on the application installation prompt, generating a post-patch installation approval request according to the installed software information and the equipment information;
And receiving an approval failing response triggered based on the post-patch installation approval request, and maintaining the violation mark for marking the violation mark on the installed software.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
And receiving an approval passing response triggered based on the post-patch installation approval request, associating the equipment information in the approval request with the installed software information, and cancelling the violation mark marked on the installed software.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
Acquiring the installation quantity of the installed software, which has the same information of the installed software and marks the violation mark;
And when the installation quantity is larger than a set value, associating the installed software information of the installed software marking the violation mark with the equipment information of the terminal where the installed software marking the violation mark is located.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
Acquiring user information according to the equipment information of the terminal where the installed software marking the violation mark is located;
acquiring a communication account of a user according to the user information;
And sending a violation notification message to the communication account of the user.
When the processor 1001 calls the software detection program stored in the memory 1005, the following operations are also performed:
Acquiring the total number of installed software marked with the violation mark in each terminal;
generating a user notification list according to the user information, the device information, the installed software information and the total number;
and generating a report list of the offending software according to the installed software marked with the offending mark and the total number.
Embodiments of the present invention provide embodiments of a software detection method, it being noted that although a logic sequence is shown in the flow diagrams, in some cases the steps shown or described may be performed in a different order than that shown or described herein.
As shown in fig. 2, in a first embodiment of the present application, the software detection method of the present application includes the steps of:
step S210: and acquiring installation information of the installed software.
In the present embodiment, the installed software refers to software that has been installed on a terminal, which is a type of device on which software can be installed, such as a computer, or the like. The installation information includes installed software information and device information of a terminal where the installed software is located, for example, the terminal is a computer in which a 360 browser, a dongle music, a CAD, etc. are installed, the 360 browser, the dongle music, the CAD, etc. are all installed software in the desktop computer, and the installed software information may be understood as software information of each software in the 360 browser, the dongle music, the CAD, etc. for example, the software information of the 360 browser includes a software name, a version number, a software score, etc. The device information includes the MAC address of the terminal, the device number, and the like. For example, an enterprise may have computers for each employee, each computer having a unique computer number.
Specifically, the installation information of all installed software on each device is obtained at regular time according to the set time, for example, when 20 computers exist currently, the computer numbers of the 20 computers are obtained, meanwhile, the installed software information is obtained from the control panel of each computer, or the installed software information can be obtained from the shortcut of the software on the desktop of the computer, namely, the installation path of the software is obtained according to the shortcut of the software, and then the installed software information is obtained through the installation path.
Step S220: and comparing the installed software information with the software information stored in a preset blacklist.
Step S230: and marking an offending mark on the installed software when the installed software information is the same as the software information. And/or the number of the groups of groups,
Step S240: when the installed software information is not the same as the software information and the installed software information does not match the software information associated with the device information, a violation is marked on the installed software.
In an embodiment, a preset white list, a preset black list and a preset controlled list are preset, and the preset white list, the preset black list and the preset controlled list are all used for storing corresponding software and software information. The software stored in the preset white list is software which is allowed to be installed after the enterprise verifies in advance, and if the acquired installed software information of the installed software is the same as the software information stored in the preset white list, the acquired installed software can be normally reserved in the terminal, staff can use the software normally, and the software cannot be marked as illegal software.
The preset blacklist stores software which is not allowed to be installed by enterprises and software information, and the software is verified in advance and is regarded as software with installation risk. For ease of understanding, the software information stored in the preset blacklist is referred to as comparison software information. If the software belonging to the preset blacklist is installed, the enterprise computer may be remotely monitored by an lawbreaker through the installed software, invaded by viruses, etc. Therefore, after the installed software information of all installed software on each device is obtained at regular time according to the set time, comparing the installed software information of each installed software with the comparison software information stored in the preset blacklist, if the installed software information of any one installed software is identical to the comparison software information stored in the preset blacklist, determining that the installed software corresponding to the installed software information identical to the comparison software information is software which is not allowed to be installed by enterprises, and marking the software on the software as illegal software, namely marking the installed software corresponding to the installed software information identical to the comparison software information as illegal software. For example, the acquired installed software information of the 1 st installed software includes: software name A2, version number 2.0, software score 4.5; the comparison software information of the 2 nd software stored in the preset blacklist comprises the following steps: the software name is A2, the version number is 2.0, and the software score is 4.5. Comparing the installed software information of the 1 st installed software with the comparison software information stored in the preset blacklist to determine that the installed software information of the 1 st installed software is identical to the comparison software information of the 2 nd software stored in the preset blacklist, and marking the acquired 1 st installed software as illegal software.
The preset controlled list stores equipment information and software information, and each piece of equipment information is at least associated with one piece of software information. Wherein the software information associated with different device information is different, or the different device information may be associated with the same software information. When the acquired software information of the installed software is different from the comparison software information stored in the preset blacklist, the software information stored in the preset controlled list is matched with the installed software information, if the software information stored in the preset controlled list is different from the installed software information, the software information stored in the preset controlled list is determined to be not matched with the installed software information, and the acquired installed software is marked as illegal software. Or if the software information stored in the preset controlled list contains the same software information as the installed software information, judging whether the equipment information related to the same software information as the installed software information is the same as the equipment information of the installed software, and if the equipment information is different, marking the acquired installed software as illegal software. Or if one piece of equipment information stored in the preset controlled list is the same as the equipment information of the installed software, judging whether the software information related to the equipment information stored in the preset controlled list is the same as the installed software information of the installed software, if so, determining that the installed software information of the installed software is not matched with the software information related to the equipment information stored in the preset controlled list, and further marking the installed software as illegal software, namely marking the installed software as illegal software. It should be appreciated that after the offending flag is marked on the installed software, the offending software is the installed software. If the software information stored in the preset controlled list is the same as the installed software information, and the equipment information related to the software information is the same as the equipment information of the terminal where the installed software is located, the installed software can be normally reserved in the terminal, staff can normally use the software, and the software cannot be marked as illegal software.
According to the technical scheme, the method and the device realize illegal installation inspection of the software installed in the terminal, can inspect the software installed illegally, and reduce risks brought to enterprises by randomly installing the software.
Further, before the step of acquiring the installation information of the installed software in step S210, the method further includes:
When a software installation approval request is received, acquiring equipment information for sending the software installation approval request and to-be-approved software information in the software installation approval request; and when the to-be-approved software information is approved, the equipment information is associated with the to-be-approved software information.
It should be noted that, if an employee needs to install a certain software to be examined in his own computer, a software installation and approval request needs to be set forth in advance, where the software installation and approval request includes software information of the software to be installed and device information of his own computer, the software information of the software to be installed is the software information to be examined, and after the software installation and approval request passes, the device information of the employee computer that sets forth the software installation and approval request is associated with the software information to be examined and stored in a preset controlled list. For example, after staff a makes a software installation approval request for installing software B through a computer with the number No.12, the software B approves, and the software information of the software B is information M, and after No.12 is associated with the information M, the software information is stored in a preset controlled list. When the software installed on each terminal is subjected to illegal checking, the information M is obtained from the computer with the number of NO.12, and the software B cannot be marked as illegal software because the information M related to the NO.12 exists in the preset controlled list, namely, the staff A can normally use the software B.
As shown in fig. 3, in the second embodiment of the present application, the following steps are further included after step S240:
Step S241: and outputting an installation application prompt to the terminal for installing the installed software.
Step S242: and when receiving an installation application triggered based on the application installation prompt, generating a post-patch installation approval request according to the installed software information and the equipment information.
Step S243: and receiving an approval failing response triggered based on the post-patch installation approval request, and keeping marking the violation mark on the installed software.
Step S244: and receiving an approval passing response triggered based on the post-patch installation approval request, associating the equipment information in the approval request with the installed software information, and cancelling the violation mark marked on the installed software.
In this embodiment, after obtaining all installed software and marking out the offending software, an installation application prompt is output to a terminal where the installed software that is the offending software is installed, where the installation application prompt is used to prompt a user whether to make up an installation application for installing the installed software. For example, if the installed software C in the computer No.15 is illegal software and the installed software information is information N, an installation prompt is output to the computer No.15, and if the employee corresponding to the computer No.15 triggers the installation request, a post-repair installation approval request is generated according to the information N and No. 15.
And the post-patch installation approval request is sent to the background terminal, and the manager approves the installed software C based on the information N in the post-patch installation approval request, if the installed software C is not approved, the approval is triggered to be failed, and the illegal marks marked on the installed software C are kept, namely the installed software mark C is still illegal software. If the software C is approved, an approval passing response is triggered, information N and NO.15 in the approval request are associated and stored to a preset controlled list, meanwhile, the illegal marks marked on the software C are withdrawn, namely the software C is not illegal, and after the software C is acquired from a computer with the number NO.15 again next time, the software C is not marked as illegal.
As shown in fig. 4, in the third embodiment of the present application, the following steps are further included after step S240:
Step S251: acquiring the installation quantity of the installed software, which has the same information of the installed software and marks the violation mark;
Step S252: and when the installation quantity is larger than a set value, associating the installed software information of the installed software marking the violation mark with the equipment information of the terminal where the installed software marking the violation mark is located.
After all the obtained installed software is subjected to violation inspection, all the installed software marked as the violation software is obtained, corresponding installed software information is obtained from all the obtained violation software, the installed quantity of the installed software with the same installed software information and marked with the violation mark is counted, the installed quantity is compared with a set value, if the installed quantity is larger than the set value, the fact that the use requirement of staff on the installed software with the same installed software information and marked with the violation mark is larger is indicated, and the violation software can be stored to a preset controlled list as software passing approval. For example, the set value is 15, all installed software D is installed in 20 computers, the current installation number of the installed software D is 20, and if the current installation number is greater than the set value, the computer numbers of all computers of the installed software D are associated with the installed software information of the installed software D, and the computer numbers are stored in a preset controlled list. After the installed software D is obtained from the 20 computers again next time, the installed software D in each computer is not marked as illegal software.
As shown in fig. 5, in the fourth embodiment of the present application, the following steps are further included after step S240:
Step S261: and acquiring user information according to the equipment information of the terminal where the installed software marking the violation mark is located.
Step S262: and acquiring a communication account of the user according to the user information.
Step S263: and sending a violation notification message to the communication account of the user.
In this embodiment, after the enterprise equips each employee with a computer, the device information of the computer is bound with the user information of the employee, for example, the computer label of the computer is bound with the user information of the employee. The user information comprises user name, sex, contact information and the like, and the user information of staff can be obtained through the equipment information of the computer.
After carrying out violation inspection on all the acquired installed software, acquiring all the installed software marked as the violation software, acquiring the user information of the staff according to the equipment information of the terminal where the violation software is located, and then acquiring the communication account of the staff according to the user information. For example, the contact information in the user information includes phone numbers, mailboxes, etc., and the communication account may be a mailbox account number, a phone number, a micro signal obtained by the phone number or a QQ number, etc. After the communication account of the staff is obtained, a violation notification message is sent to the communication account of the staff, wherein the violation notification message is used for notifying that certain software installed in the personal computer of the staff belongs to the violation software, and if the installed software marked as the violation software belongs to a preset blacklist, the staff is notified that the software enterprise is not allowed to be installed; if the installed software marked as offending software does not belong to the preset controlled list, the employee is notified that the software is to be approved for installation.
As shown in fig. 6, in the fifth embodiment of the present application, the following steps are further included after step S240:
Step S271: and acquiring the total number of installed software marked with the violation mark in each terminal.
Step S272: and generating a user notification list according to the user information, the device information, the installed software information and the total number.
Step S273: and generating a report list of the offending software according to the installed software marked with the offending mark and the total number.
In this embodiment, after performing rule violation inspection on all the acquired installed software, the total number of the installed software of each terminal is acquired, and then a user notification list is generated according to the user information, the device information, the installed software information and the total number of the installed software of each terminal. The user notification list comprises how many pieces of illegal software are installed in the terminal of the user every day, every week and other set time, the illegal software are respectively, and the quantity of the illegal software installed in the terminal of the user can be ranked, for example, the first ten pieces of illegal software are displayed.
Further, a violation software notification list is also generated according to the total number of the violation software and the violation software, wherein the violation software notification list can comprise the installation number of each violation software every day, and the installation number of all the violation software every day is displayed if the first ten pieces are respectively taken; the report list of the offence software can also comprise the installation trend of the offence software in the set time period of weekly, monthly and the like, and the installation trend is displayed through a discount chart; the report list of the offence software can also comprise classification of all offence software, the offence software with the same type is divided, and then the classified offence software is displayed. Thus, the enterprise can conveniently check the illegal software and handle staff installing the illegal software.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.