Application program control method based on two-time signature verification technology
A secondary signature and application program technology, which is applied in the direction of program control devices, program loading/starting, instruments, etc., can solve problems such as easy to be bypassed and inflexible, and achieve the effect of ensuring safe and efficient verification solutions
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0018] An Android terminal application management and control method based on two-signature signature verification technology: Android application developers sign the application for the first time, and the signed application is subjected to security detection by a third-party security testing agency The app is re-signed, and then the signed app is returned to the developer or uploaded to the app store.
[0019] When an Android smart terminal installs an application, the security management and control module of the Android smart terminal verifies the signature of the application and compares it with the third-party signature verification information stored in the security management and control module. For example, the third-party signature verification information stored in the security management and control module contains the application. If the third-party signature verification information stored in the security control module does not contain the signature of the applic...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap