Application processing method, device, terminal and storage medium based on combined public key
A technology of application and combination of public keys, applied in the field of information security, can solve problems such as the inability to guarantee the security and legitimacy of application programs, and achieve the effect of ensuring security and improving security mechanisms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0039] figure 1 It is a schematic flowchart of an application program processing method provided by an embodiment of the present invention. Such as figure 1 As shown, the method is applied to an intelligent terminal, including the following steps:
[0040] Step 101, when receiving the installation instruction of the application program, extract the digital signature information in the application program, the digital signature information is the digital signature performed by the signature parameter on the executable code file corresponding to the application program;
[0041] Step 102, verifying the digital signature information by using verification paramet...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com