Security detection method and apparatus for application program
An application program and security detection technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as potential safety hazards, slow hardening time, and inflexible selection of hardening schemes, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040] In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure, interface, technology, etc. are proposed for a thorough understanding of the present invention. However, it should be clear to those skilled in the art that the present invention can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of the present invention.
[0041] figure 1 It is a schematic flowchart of a method for performing security detection on an application program provided by an embodiment of the present invention. Specific as figure 1 As shown, the method includes:
[0042] Step 110: Obtain a signed certificate corresponding to the installation package of the application, and verify the signed certificate.
[0043] Specifically, after obtaining the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap