Installing verification method for intelligent terminal application program and system

An application program and smart terminal technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as the inability to effectively prevent the installation of illegal application programs, to protect interests, prevent the installation of illegal application programs, and prevent Effects of hacking and dissemination

Inactive Publication Date: 2015-02-04
北京视博数字电视科技有限公司
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention is completed in order to solve the above-mentioned deficiencies in the prior art. The purpose of the present invention is to propose a method and system for verifying the installa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Installing verification method for intelligent terminal application program and system
  • Installing verification method for intelligent terminal application program and system
  • Installing verification method for intelligent terminal application program and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] figure 2 A schematic flowchart of the method for verifying the installation of smart terminal applications provided by Embodiment 1 of the present invention is given.

[0086] Such as figure 2 The installation verification method of the smart terminal application program provided by the first embodiment includes the following steps:

[0087] Step S21, obtaining the first public key pre-stored in the system layer of the smart terminal;

[0088] In this step, the obtained first public key is pre-stored in the system layer and used to determine whether the application to be installed meets the installation conditions.

[0089] Step S22, judge whether the application to be installed satisfies the installation condition according to the first public key, if not, execute step S23, prohibit installation of the application to be installed; if yes, execute step S24, allow installation of the application to be installed.

[0090] The installation verification method of the s...

Embodiment 2

[0092] image 3 A schematic flow chart of the method for verifying the installation of smart terminal applications provided by Embodiment 2 of the present invention is given.

[0093] Such as image 3 As shown, the installation verification method of the smart terminal application program provided by Embodiment 2 of the present invention includes the following steps:

[0094] Step S31, obtaining the first public key pre-stored in the system layer of the smart terminal;

[0095] In this step, the obtained first public key is pre-stored in the system layer and used to determine whether the application to be installed meets the installation conditions.

[0096] Step S32, obtaining an application data packet carrying an application to be installed;

[0097] In this step, besides the application program to be installed, the obtained application data package also carries the first signature data obtained by using the first private key, and the signer needs to keep the first priva...

Embodiment 3

[0106] Figure 6 A schematic flow chart of the method for verifying the installation of smart terminal applications provided by Embodiment 3 of the present invention is given.

[0107] Such as Figure 6 As shown, the installation verification method of the smart terminal application program provided by Embodiment 3 of the present invention includes the following steps:

[0108] Step S61, obtaining the first public key pre-stored in the system layer of the smart terminal;

[0109] In this step, the obtained first public key is pre-stored in the system layer and used to determine whether the application to be installed meets the installation conditions.

[0110] Step S62, obtaining an application data packet carrying an application to be installed;

[0111] In this step, in addition to the application to be installed, the obtained application data package also carries the second signature data and the application public key obtained by using the first private key, and the sig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an installing verification method for an intelligent terminal application program. The method comprises the following steps: acquiring a first public key pre-stored in an intelligent terminal system layer; judging if a to-be-installed application program meets an installing condition according to the pre-stored first public key; if yes, allowing to install the to-be-installed application program; if not, forbidding the installing for the to-be-installed application program. The invention also provides a system for realizing the method. According to the installing verification method for the intelligent terminal application program provided by the invention, before the application program is installed, the pre-stored first public key of the system layer is utilized to judge if the application program meets the installing condition, and the application program can be installed when the installing condition is met, so that the application program on the terminal equipment being an authenticated legal program can be ensured; the installing for an illegal application program can be effectively prevented; the manageable and controllable terminal application can be ensured; the illegal entry and spreading of harmful information can be prevented; the benefits of operators and users can be protected.

Description

technical field [0001] The present invention relates to the field of application program installation, in particular to a method and system for verifying the installation of application programs on smart terminals. Background technique [0002] Smart terminal equipment products, such as smart phones, smart TVs and smart boxes, are rapidly becoming popular. They generally use smart operating system platforms such as Android, and users can freely choose to install applications from different channels. As the number of users increases, malicious programs become a hazard. An important factor in the security and privacy of end users, which seriously infringes upon the legitimate rights and interests of users. Embedding malicious codes in application program development or embedding malicious codes by tampering with applications written by others is currently the main means of making malicious programs. In addition, replacing the entire system and all applications by flashing the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51
CPCG06F21/51
Inventor 郭永伟王天星李伟东李红艳
Owner 北京视博数字电视科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products