Unlock instant, AI-driven research and patent intelligence for your innovation.

Plug-in verification method and device, terminal equipment and storage medium

A verification method and plug-in technology, applied in the computer field, can solve problems affecting data security and achieve the effect of ensuring data security

Inactive Publication Date: 2018-04-27
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, sometimes these plug-ins may be maliciously tampered with, such as tampering with login plug-ins to obtain login information, tampering with payment plug-ins to hijack payment data, etc., affecting data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Plug-in verification method and device, terminal equipment and storage medium
  • Plug-in verification method and device, terminal equipment and storage medium
  • Plug-in verification method and device, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] refer to figure 1 , shows a flowchart of steps of a method for verifying a plug-in according to an embodiment of the present invention.

[0035] Step 102, call the embedded software development kit (Software Development Kit, SDK) during the running of the application to obtain the corresponding application plug-in module.

[0036] Step 104, the application host module in the SDK performs at least one level of security verif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a plug-in verification method and device, terminal equipment and a storage medium. The method comprises the steps that a software development kit (SDK) which is called and implanted in the running process is applied so as to obtain a corresponding application plug-in module; an application host module in the SDK performs at least one-level safety verification on the application plug-in module; after verification at all levels is successful, the application plug-in module is obtained. Therefore, dubious application plug-in modules are prevented from being obtained, and the data security is ensured.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a plug-in verification method and device, a terminal device and a storage medium. Background technique [0002] With the development of terminal technology, the performance of terminal equipment is getting better and better, so more and more mobile games are emerging. Mobile games have enriched the spiritual world and the material world of human beings, making human life better and happier. [0003] Mobile games on terminals often have some plug-ins installed to assist the operation of game applications, such as login plug-ins, payment plug-ins, and the like. However, sometimes these plug-ins may be maliciously tampered with, such as tampering with login plug-ins to obtain login information, tampering with payment plug-ins to hijack payment data, etc., affecting data security. Contents of the invention [0004] In view of the above problems, the present invention is propose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/51G06F9/445
CPCG06F9/44526G06F21/44G06F21/51
Inventor 方顺豹
Owner BEIJING QIHOO TECH CO LTD