Method and device for acquiring control power of operating system
A technology of operating system and control rights, applied in the security field, can solve the problems of mobile terminal harm, obtain control rights of operating system, etc., to achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0020] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.
[0021] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purpo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 