Method and device for invoking application range and mobile terminal

A technology of application programs and calling instructions, which is applied in computer security devices, instruments, electrical digital data processing, etc., and can solve problems such as security needs to be improved, sandbox security isolation is not guaranteed, and a large amount of space is occupied in the system.

Active Publication Date: 2017-06-20
BEIJING ANYUNSHIJI TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if APP1 (such as Meituan APP) is installed in normal mode but APP2 (such as Alipay APP) is not installed, but APP2 is installed in safe mode, if APP1 needs to call APP2, it cannot be called because the safe mode and normal mode are isolated from each other. If successful, the user is forced to install APP1 in safe mode or APP2 in normal mode. Repeated installation of APP takes up a lot of space in the system, and the user experience is not good.
[0003] On the other hand, these security models are usually based on "sandbox" isolation technology, but because many applications require permissions outside the sandbox, when users download and install an application, they may be required to grant the application to break the sandbox permission
Since users want to use all the functions of the application, they will be guided to grant relevant permissions to the application, resulting in no guarantee for the security isolation of the sandbox, and the security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for invoking application range and mobile terminal
  • Method and device for invoking application range and mobile terminal
  • Method and device for invoking application range and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0067] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for invoking an application program. The method comprises: receiving an invoking instruction to invoke a second application by a first application; determining whether the second application is installed in a current system normal mode with an administrator logged in; if yes, running the second application in the system normal mode according to the invoking instruction; if no, continuing to determine whether the second application is installed in a system protection mode with a normal user logged in; switching the system from the current system normal mode to the system protection mode when the second application is installed in the system protection mode; and running the second application in the system protection mode according to the invoking instruction, wherein a safe space providing a running resource for running of a predetermined application is configured in the system protection mode, and the safe space is unavailable in the system normal mode. The above method and device avoid repeated installation of an application in multiple modes, thereby saving the system space and enhancing the user experience. Besides, a mobile terminal is also provided.

Description

technical field [0001] The present invention relates to the technical field of mobile terminal security, in particular, the present invention relates to an application calling method, device and mobile terminal. Background technique [0002] For safety considerations, some mobile terminals have set corresponding security modes to protect users' security in online transactions, online payments, bank inquiries, and the like. For example, the property isolation system of 360 mobile phones. On the one hand, the system prevents the intrusion of Trojan horses and counterfeit applications through the built-in security application store, ensuring the source security of applications from the source; on the other hand, it also builds special network channels , encrypt and transmit data such as account passwords to ensure data security during transmission. At the same time, financial management and other data are systematically isolated to prohibit illegal reading by malicious applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/74
CPCG06F21/51G06F21/74
Inventor 李翔
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products