Supercharge Your Innovation With Domain-Expert AI Agents!

A widget application protection method and device

A user and algorithm technology, applied in the field of mobile Internet, to achieve the effect of improving user experience and security

Active Publication Date: 2015-10-21
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are still some problems to be solved in the field of widget application in the mobile Internet field, such as how to ensure that the mobile device information involved in the operation of widget application is absolutely safe on different terminals, and the personal privacy information of users is not leaked or maliciously stolen, etc. Currently, relevant Neither the widget standard organization nor the widget software vendors in the industry have made clear specifications and solutions for this problem.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A widget application protection method and device
  • A widget application protection method and device
  • A widget application protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 2 As shown, the terminal A binding user identity process includes the following steps:

[0053] Step 1: Choose a binding usage strategy for a widget application user; including the following steps:

[0054] Step 201, the user first selects a binding policy for a widget application through the corresponding menu on terminal A, and the terminal determines that the user chooses to bind with the device, then executes step 202, and if it judges that the user chooses to bind with the SIM card, then executes step 203, If the user does not choose, the process ends;

[0055] Step 202, start the process of binding with the device, and execute step 204;

[0056] Step 203, start the process of binding with the card number, and execute step 205;

[0057] If the selected binding strategy is 1) bind the device number of terminal A, the widget application downloaded, installed and running on terminal A can only be used on terminal A, and terminal B cannot continue to...

Embodiment 2

[0079] Such as image 3 As shown, the permission confirmation process when terminal B uses the widget application includes the following steps:

[0080] Step 1: After terminal B obtains the widget application from terminal A, when running the widget application, the widget engine first decrypts the UserId of the legal user from the Data; including the following steps:

[0081] Step 301, terminal B runs the widget application after obtaining the widget application from terminal A through some means;

[0082] Step 302, the widget engine parses the widget application resource package, and parses the identify.txt file therein;

[0083] Step 303, the widget engine reads the data stored in the file;

[0084] Step 304, according to the policy identifier, judge whether terminal A has adopted the device number binding policy or the card number binding policy, and execute step 309;

[0085] Step 305, read authentication data;

[0086] Step 306, read the id of the widget application;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a method and device for protection of widget applications which enhance security of use of widget applications and guarantee security of private user data. The protection method comprises: acquiring user ID data required for binding according to the binding policy selected by a user for a widget application; performing computation on a widget application identifier and on said user ID data on the basis of a preset algorithm; utilizing the data obtained through computation as authentication data; storing the authentication data and the widget application binding policy identifier among the widget application files.

Description

technical field [0001] The invention relates to the field of mobile Internet, in particular to a protection method and device for widget applications. Background technique [0002] Widget applications are lightweight Web applications developed based on Web technologies and used to customize Internet services. Users can make or download widget applications and put them on terminals such as PC desktops, webpages or mobile phones, and they can run like local applications. Users can browse personalized pages through the mobile Internet and enjoy personalized mobile Internet services without being limited by the size of the interface. [0003] Typical widget applications include clock, weather forecast, stock, music player, and advanced applications that can access terminal device information and network service capabilities, etc. With the popularization of widget standardization, its development space will be wider, and more and more mobile operators have begun to pay attentio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06G06F21/12
CPCG06F21/121
Inventor 王晓
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More