Method and device for of traceless running of application program in multi-container system

An application program and multi-container technology, applied in the computer field, can solve problems such as illegal data theft and inability to effectively guarantee user privacy data in terminal devices, so as to avoid potential safety hazards, improve user experience, and avoid illegal theft

Active Publication Date: 2017-07-28
北京元心君盛科技有限公司
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, encryption technology is often used to encrypt user sensitive data and private data in terminal devices, but encryption can only solve the problem of illegal data theft after some mobile devices are lost
Although the encrypted data storage form creates certain obstacles for illegal users to obtain corresponding data, there are still various problems in data encryption, such as: in the prior art, the plaintext key is often stored in the terminal device, and the ciphertext data is It cannot be used directly, but after the terminal device is lost, illegal users can still obtain the plaintext key by illegally traversing the storage area of ​​the entire terminal device, thereby decrypting the ciphertext. At the same time, because the ciphertext can be obtained directly in the existing technology, illegal users can easily crack the ciphertext through violent means, therefore, the existing technology cannot effectively guarantee the privacy data of the user in the terminal device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for of traceless running of application program in multi-container system
  • Method and device for of traceless running of application program in multi-container system
  • Method and device for of traceless running of application program in multi-container system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0043] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for traceless running of an application program in a multi-container system. The method comprises the steps of when it is monitored that any application program which needs to be run in a traceless mode in a main container system of the multi-container system, determining an application container system matched with the application program, and creating a memory file system corresponding to the application program; starting and running the application program in the determined application container system; when it is monitored that the running state of the application program is that running finishes, deleting corresponding data in the memory file system, uninstalling the memory file system, and exiting the application container system. Through the method and device for traceless running of the application program in the multi-container system, the purpose is achieved that the memory file system corresponding to the application program is isolated, and the data in the application program running process cannot be illegally obtained at the same time; the corresponding data of the application program is timely cleaned away, the potential safety hazard is fundamentally avoided that the application program data is illegally stolen, and the using experience of a user is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular, the present invention relates to a method for running an application program in a multi-container system without trace, and a device for running an application program in a multi-container system without trace. Background technique [0002] With the development of today's computer technology, users' requirements for the diversity of terminal equipment usage scenarios are increasing day by day. Terminal equipment is not only used for daily entertainment, but also for important scenarios such as work and study. In the process of users using terminal equipment, on the one hand, various viruses and Trojan horses in the network are constantly looking for opportunities to illegally invade each terminal equipment to steal users' private information; on the other hand, due to various factors , There is a great risk of loss of terminal equipment. The problems in the above two aspe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/53G06F21/62
CPCG06F21/53G06F21/6245
Inventor 高连凯
Owner 北京元心君盛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products