Method and system for controlling network application operation
A network application and application operation technology, applied in the Internet field, can solve the problems of cumbersome account and password input operation, and achieve the effect of simplifying the operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Such as figure 1 As shown, in one embodiment, a method for controlling the operation of a network application includes the following steps:
[0024] In step S110, the acquisition of the device identifier is triggered by an operation command of the network application, and a query request is initiated according to the device identifier.
[0025] In this embodiment, the device identifier is UDID (Unique Device Identification), which is a unique device identifier of a terminal device, and each terminal device installed with a network application has a unique device identifier. The operation instruction of the network application is an instruction generated when the user triggers an operation on the network application. The execution of this operation instruction must ensure security. The operation instruction includes the opening operation of the network application and some sensitive operations. During the running of the network application, the operation instruction wil...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


