Method and device for controlling the application calls

An application and application identification technology, applied in the field of communication, can solve the problems of user property loss, user private data theft, etc.

Inactive Publication Date: 2017-05-31
BEIJING ANYUNSHIJI TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the operating system of smart mobile terminals will inevitably have security program loopholes, all applications have the risk of user private data being stolen by malicious applicat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling the application calls
  • Method and device for controlling the application calls
  • Method and device for controlling the application calls

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0092] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for controlling the application calls. The method includes that when call operation between at least two applications is monitored, whether the called applications are on the predetermined isolation application white list is judged. The predetermined isolation application white list is applied to stored applications required isolation. If the called applications are on the predetermined isolation application white list, authentication undergoes to the application that initiates calls in the call operation according to the predetermined verification list. If the application that initiates calls in the call operation fails the authentication, the call operations between at least two applications are prohibited. The technical scheme of the method and device for controlling the application calls prevents malicious applications from intercepting the call operation and coverage displays the self-designing malicious user interface on the top of the application's interface based on the call operation to cheat the user and therefore the purpose of stealing the user's property data and private data is achieved.

Description

technical field [0001] The present invention relates to the technical field of communication, and specifically, the present invention relates to a method for controlling application program invocation, a device for controlling application program invocation and a mobile terminal. Background technique [0002] With the development of the Internet, mobile terminals have also developed from traditional digital mobile terminals to intelligent mobile terminals. Because the smart mobile terminal not only realizes all the functions of the traditional digital mobile terminal, but also satisfies the various needs of users by installing various applications, such as entertainment needs, learning needs, shopping needs, office needs, etc. [0003] In order to meet the above-mentioned various needs of users, correspondingly, the number and types of application programs installed on smart mobile terminals are also increasing; thus, more and more private data of users are stored in the app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/44
CPCG06F21/51G06F21/44G06F2221/2113
Inventor 张纪刚
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products