Verification method for application program, terminal equipment and storage medium
A technology of application programs and verification methods, applied in the field of information security, can solve problems such as the inability to verify the legality, and achieve the effect of verifying the legality and avoiding attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure and technology are proposed for a thorough understanding of the embodiments of the present application. However, it should be clear to those skilled in the art that the present application can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known systems, devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of this application.
[0023] It should be understood that when used in this specification and appended claims, the term "comprising" indicates the existence of the described features, wholes, steps, operations, elements, and / or components, but does not exclude one or more other features , The existence or addition of a whole, a step, an operation, an element, a component, and / or a collection thereof.
[0024] It ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com