System application installation method and device
A system application and device installation technology, applied in computer security devices, software deployment, instruments, etc., can solve problems such as user loss, application confusion, and users' inability to uninstall malicious applications, so as to avoid losses and improve user experience.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0038] figure 1 It is an implementation flow chart of the system application installation method provided in the first embodiment of the present invention, the method can be executed by the system application installation device, wherein the device can be implemented by software and / or hardware, and can be installed as a part of the mobile device built into the mobile device. Such as figure 1 As shown, the implementation process includes:
[0039] Step 11. When a system application installation event is detected, determine whether the system application to be installed belongs to a security application.
[0040] At present, during the process of installing applications on mobile devices, the malicious code included in the applications can cause the applications to be installed in the system application installation directory of the mobile device, so that the installed applications become the system applications of the mobile device, resulting in The user cannot uninstall th...
no. 2 example
[0047] In this embodiment, on the basis of the above-mentioned embodiments, determining whether the system application to be installed is a security application is further limited to: obtaining the identification information of the system application to be installed; judging whether the preset application whitelist includes the application to be installed If so, it is determined that the system application to be installed belongs to a security application; otherwise, it is determined that the system application to be installed does not belong to a security application.
[0048] figure 2 It is a flow chart of the implementation of the system application installation method provided in the second embodiment of the present invention, as shown in figure 2 As shown, the implementation process includes:
[0049] Step 21. When a system application installation event is detected, the identification information of the system application to be installed is obtained.
[0050] Wherein...
no. 3 example
[0058] On the basis of the above embodiments, this embodiment further defines the installation method of the system application as follows: after determining whether the system application to be installed belongs to a safe application, it also includes: when the system application to be installed does not belong to a safe application , stop the installation operation on the system application to be installed. image 3 It is a flow chart of the implementation of the system application installation method provided in the third embodiment of the present invention, as shown in image 3 As shown, the implementation process includes:
[0059] Step 31. When a system application installation event is detected, obtain identification information of the system application to be installed.
[0060] Wherein, the identification information of the system application to be installed includes at least one of a name of the system application to be installed and a number corresponding to the sy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


