Method, system and terminal for managing and controlling application installation
An application program and terminal technology, applied in the field of mobile Internet, can solve the problem of user information being stolen, and achieve the effect of avoiding theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The present disclosure will be described below with reference to the accompanying drawings. It is to be noted that the following description is merely explanatory and exemplary in nature, and in no way serves as any limitation of the present disclosure, its application or uses. Relative arrangements of components and steps and numerical expressions and numerical values set forth in the embodiments do not limit the scope of the present disclosure unless otherwise specifically stated. Additionally, techniques, methods and devices known to those skilled in the art may not be discussed in detail but are intended to be part of the description where appropriate.
[0039] In view of the fact that it cannot be guaranteed that these applications to be installed are officially released security versions, in order to avoid these unsafe factors, the following embodiments of the present disclosure use encryption to realize that only applications that have been verified by a third ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


