Method, system and terminal for managing and controlling application installation
An application program and terminal technology, applied in the field of mobile Internet, can solve the problem of user information being stolen, and achieve the effect of avoiding theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present disclosure will be described below with reference to the accompanying drawings. It is to be noted that the following description is merely explanatory and exemplary in nature, and in no way serves as any limitation of the present disclosure, its application or uses. Relative arrangements of components and steps and numerical expressions and numerical values set forth in the embodiments do not limit the scope of the present disclosure unless otherwise specifically stated. Additionally, techniques, methods and devices known to those skilled in the art may not be discussed in detail but are intended to be part of the description where appropriate.
[0039] In view of the fact that it cannot be guaranteed that these applications to be installed are officially released security versions, in order to avoid these unsafe factors, the following embodiments of the present disclosure use encryption to realize that only applications that have been verified by a third ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com