Application program security verification method and terminal

An application and security verification technology, applied in the direction of digital data authentication, electrical components, transmission systems, etc., can solve problems such as misleading users and high security risks, and achieve the effect of ensuring security and improving security.

Active Publication Date: 2013-12-25
北京明华联盟科技有限公司
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the C / S architecture requires the installation of client software, there is a security risk that the client software may be replaced; for example, illegal programs mislead users to install fake client software, thereby using fake client software to capture users' personal accounts and Password information, etc.; therefore, using the above method to install client software on the C / S architecture has a high security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program security verification method and terminal
  • Application program security verification method and terminal
  • Application program security verification method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] In the embodiment of the application program security verification method and terminal of the present invention, the second-generation USB Key is used as the security basis of the terminal app (Application, application program), and the built-in first reliable app (that is, the aforementioned The service management program, which will be referred to as app1 for the convenience of description, downloads, verifies, and manages other apps on the verification terminal through app1. When the USB Key and the terminal are not bound, the USB Key cannot be used; and after the USB Key is successfully paired with the terminal, the terminal must first install the built-in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application program security verification method and a terminal. A reliable application program, namely a service management program is provided by a USB (universal serial bus) Key and used for verifying other application programs such as a security detection program on the terminal, so that validity and security of the application programs on the terminal are effectively verified, and the problem of security risks due to incapability of verifying validity of traditional application program download and installation is solved. The method has the advantages that security of the application programs on the terminal is improved, and further, security of personal information of users is ensured.

Description

technical field [0001] The invention relates to information security technology, and also to the field of smart keys, in particular to an application program security verification method and a terminal. Background technique [0002] With the development of wireless Internet, electronic banking has also been widely used, and gradually expanded from traditional PCs to mobile devices such as mobile phones and tablet computers. At present, there are two ways of electronic banking application on the terminal: the B / S structure that uses the browser to access the transaction webpage to complete the transaction, and the C / S structure that installs the application client on the terminal to complete the transaction. The B / S architecture must rely on the browser, and the browser, as an open basic application software, has high security risks; while the C / S architecture is the application software independently developed by each bank. Compared with the B / S structure, with a certain de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44H04L29/06
Inventor 陈柳章
Owner 北京明华联盟科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products