Information processing method and mobile terminal
An information processing method and mobile terminal technology, applied in the fields of electrical digital data processing, instruments, platform integrity maintenance, etc., can solve problems such as real-time malicious behavior of malicious applications, improve operating experience, improve security, and reduce losses and injuries. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] An embodiment of the present invention provides an information processing method, and the information processing method is applied to a mobile terminal. figure 1 It is a schematic flow diagram of the information processing method in Embodiment 1 of the present invention; figure 1 As shown, the information processing method includes:
[0041] Step 101: A first application installation instruction is detected; the first application installation instruction represents an installation instruction of an untrustworthy application.
[0042] Step 102: Install the first application in a specific user space in response to the first application installation instruction, so that the first application runs in the specific user space.
[0043] Step 103: Generate a first application identifier, output and display the first application identifier in the display area corresponding to the main space; wherein, the specific user space is isolated from the main space, so that the first app...
Embodiment 2
[0050] The embodiment of the present invention also provides an information processing method, and the information processing method is applied to a mobile terminal. figure 2 It is a schematic flow chart of the information processing method in Embodiment 2 of the present invention; as figure 2 As shown, the information processing method includes:
[0051] Step 201: A first application installation instruction is detected; the first application installation instruction represents an installation instruction of an untrustworthy application.
[0052] Step 202: Install the first application in a specific user space in response to the first application installation instruction, so that the first application runs in the specific user space.
[0053] Step 203: Generate a first application identifier, output and display the first application identifier in the display area corresponding to the main space; wherein, the specific user space is isolated from the main space, so that the ...
Embodiment 3
[0067] The embodiment of the present invention also provides an information processing method, and the information processing method is applied to a mobile terminal. image 3 It is a schematic flow chart of the information processing method in Embodiment 2 of the present invention; as image 3 As shown, the information processing method includes:
[0068] Step 301: The user uses various applications on the screen corresponding to the main space on the mobile phone, such as SMS, Instant Messaging (IM, Instant Messaging) applications, browsers and other applications.
[0069] Step 302: When the user is using various applications, a download link pops up in the various applications, and the user can download the application or upgrade the application by clicking the download link.
[0070] Step 303: The mobile phone downloads application data.
[0071] Step 304: Judging whether the downloaded application data is the application upgrade data installed in the main space; if the j...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


