Method and system for restricting terminals from mounting or upgrading third-party application programs

An application program and terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of unchecked security and stability, reduce the risk of customer complaints, avoid normal use, and avoid terminal The effect of unstable performance

Active Publication Date: 2012-10-24
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a security system that can effectively check the security of installed or upgraded third-party applications in view of the defects in the prior art that terminals do not check their security and stability when installing third-party applications. Method and system for terminal installation or upgrade of third-party application programs due to limitations in performance and stability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for restricting terminals from mounting or upgrading third-party application programs
  • Method and system for restricting terminals from mounting or upgrading third-party application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] Such as figure 1 As shown, the embodiment of the present invention restricts the terminal to install or upgrade the method for the third-party application mainly includes the following steps:

[0027] S101. The terminal downloads a third-party application program; the terminal generally downloads a third-party application program through a network, and the third-party application program may be an installation program or an upgrade program.

[0028] S102. When the terminal downloads a third-party application, download and save download information of the third-party application, where the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for restricting terminals from mounting or upgrading third-party application programs, wherein the method includes the following steps: downloading and saving downloading information of the third-party application programs while downloading the third-party application programs at the terminals; and matching the downloaded information with prestored and authorized information while mounting or upgrading the third-party application programs at the terminals, and allowing the third-party application programs to be mounted or updated if the information are matched. According to the method and the system for restricting the terminals from mounting or upgrading the third-party application programs, the problem of unstable terminal performances caused by the fact that users download the third-party application programs from informal channels can be solved, and the influence of some malicious third-party application programs on the normal use of users can also be avoided, so that risks of customer complaints about terminal suppliers caused by third-party application programs are reduced greatly.

Description

technical field [0001] The present invention relates to the field of terminal security, in particular to a method and system for restricting terminal installation or upgrading of third-party application programs. Background technique [0002] In the prior art, a third-party application program downloaded from the Internet is often installed on the terminal, and its safety and stability are not checked during installation, but only whether the signature is consistent is matched, and if they are consistent, it can be installed normally. There are many sources of third-party applications on the Internet. The current installation and upgrade strategy is to only match the signature information of the application when installing and upgrading, while ignoring its stability and security. The applications in the channel have been strictly tested, but some third-party applications from unknown sources may contain other malicious plug-ins or run unstable, which will lead to certain ris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22
Inventor 林华坚何健
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products