Method and system for installing application program between multiple systems and terminal

A technology of application programs and installation methods, which is applied in the field of multi-system control, can solve problems such as data information tampering, operating system crashes, difficulties, etc., and achieve the effect of avoiding theft and leakage of safe data, realizing intelligent installation, and data security and smoothness

Inactive Publication Date: 2015-03-25
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the promotion and continuous development of multi-system terminals, more and more applications are developed and applied to multi-system terminals. However, due to the loose management process of applications, the security level of many applications is extremely low, or they are extremely easy to be exploited. Criminals take advantage of, for example, using virus programs attached to non-safe applications. When users download and install non-safe applications, virus programs will cause user information leakage, operating system crashes, and data tampering. It poses a great threat to the security of private information, and for users who are not familiar with the program code, it is very difficult to distinguish between secure applications and non-secure applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for installing application program between multiple systems and terminal
  • Method and system for installing application program between multiple systems and terminal
  • Method and system for installing application program between multiple systems and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] like figure 1 As shown, the method for installing an application between multiple systems according to an embodiment of the present invention includes: step 102, judging whether the security level of the application to be installed is higher than the preset security level according to the pre-stored data template; step 104 , when it is determined that the security level of the application to be installed is higher than the preset security level, installing the application into the first system.

[0054] In this technical solution, when the security level of the application program to be installed is judged to be higher than the preset security level according to the pre-stored data template, the above-mentioned application program is installed in the first system, realizing the intelligent installation of the application program, effectively avoiding It prevents non-secure applications from stealing and leaking user's security data, and ensures the security of user's in...

Embodiment 2

[0072] like figure 2 As shown, the method for installing application programs among multiple systems according to an embodiment of the present invention includes: Step 202, the user inputs or sets security data; Step 204, creates a data module; Step 206, the security monitoring module judges; Step 208 , judge whether the APK (Android Package, installation package) is trustworthy, if so, then execute step 212, if not, then execute step 214; Step 218; Step 212, install to the secure system; install to the non-secure system; transfer the APK in the non-secure system to the secure system; transfer the APK in the secure system to the non-secure system; Step 220, perform security processing.

[0073] like image 3 and Figure 4 As shown, the system for installing application programs among multiple systems according to an embodiment of the present invention includes multiple implementation manners.

[0074] Embodiment one:

[0075] like image 3 As shown, the system 300 for in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for installing an application program between multiple systems, a system for installing the application program between the multiple systems and a terminal. The method for installing the application program between the multiple systems comprises the steps that whether the security level of the application program to be installed is higher than a preset security level or not is judged according to a pre-stored data template; when it is judged that the security level of the application program to be installed is higher than the preset security level, the application program is installed to a first system. According to the technical scheme, the intelligent mounting progress is achieved for different application programs of different security levels, the phenomenon that the security data of a user are stolen or leaked by a non-security application program is effectively avoided, and the information security of the user is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of multi-system control, in particular to a method for installing application programs among multiple systems, a system for installing application programs among multiple systems, and a terminal. Background technique [0002] With the promotion and continuous development of multi-system terminals, more and more applications are developed and applied to multi-system terminals. However, due to the loose management process of applications, the security level of many applications is extremely low, or they are extremely easy to be exploited. Criminals take advantage of, for example, using virus programs attached to non-safe applications. When users download and install non-safe applications, virus programs will cause user information leakage, operating system crashes, and data tampering. It poses a great threat to the security of private information, and for users who are not familiar with program codes, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57G06F2221/033
Inventor 董志伟鞠志涛
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products