Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Isolation method and isolation device for application program

An application and isolation area technology, applied in the field of communications, can solve problems such as destruction or camouflage, user property loss, application intrusion, etc., to achieve the effect of protecting security, improving security reliability, and reducing the possibility of being attacked

Active Publication Date: 2017-05-31
BEIJING ANYUNSHIJI TECH CO LTD
View PDF9 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the operating system of smart mobile terminals will inevitably have security program loopholes, all applications are in danger of being invaded, destroyed or disguised by malicious applications to obtain user private data in applications
In particular, about property-type applications; because property-type applications store a large amount of user property data; once a malicious application obtains the application by invading the application, destroying the application, or disguising the application, it will Cause huge property losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Isolation method and isolation device for application program
  • Isolation method and isolation device for application program
  • Isolation method and isolation device for application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0074] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an isolation method and an isolation device for an application program. The method comprises steps as follows: when a to-be-isolated application program stored in a storage path in a non-isolation region is detected, the storage path of application data of the to-be-isolated application program is modified to be a storage path in an isolation region; the access right of the application data in the storage path in the isolation region is modified, and only the application program has the access right to the application data. According to the technical scheme, the application data of the application program which needs to be protected are independently stored in the isolation region, so that only the isolated application program in the isolation region has the access right to the application data, and any application program outside the isolation region has no access right to the application data of the isolated application program in the isolation region; the probability that a malicious application program in the non-isolation region has access to private data of a user in the application data of the isolated application program is avoided; the safety of the isolated application program and the data safety and the property safety of a user are protected better.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular, the present invention relates to an application program isolation method, an application program isolation device and a mobile terminal. Background technique [0002] With the development of the Internet, mobile terminals have also developed from traditional digital mobile terminals to intelligent mobile terminals. Because the smart mobile terminal not only realizes all the functions of the traditional digital mobile terminal, but also satisfies the various needs of users by installing various applications, such as entertainment needs, learning needs, shopping needs, office needs, etc. [0003] In order to meet the above-mentioned various needs of users, correspondingly, the number and types of application programs installed on smart mobile terminals are also increasing; thus, more and more private data of users are stored in the application programs of smart m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/53
Inventor 王海腾
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products