Application processing method, device, terminal and storage medium based on combined public key

A technology of application and combination of public keys, applied in the field of information security, can solve problems such as the inability to guarantee the security and legitimacy of application programs, and achieve the effect of ensuring security and improving security mechanisms

Active Publication Date: 2021-04-02
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide an application program processing method, device, terminal and storage medium based on a combined public key, which solves the problem that the security and legitimacy of the application program cannot be guaranteed when the application program is installed on the smart terminal in the prior art. The executable code file in the application program is digitally signed, and the legality verification is performed when the application program is installed, which ensures the security of the application program and improves the security mechanism of the smart terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application processing method, device, terminal and storage medium based on combined public key
  • Application processing method, device, terminal and storage medium based on combined public key
  • Application processing method, device, terminal and storage medium based on combined public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0039] figure 1 It is a schematic flowchart of an application program processing method provided by an embodiment of the present invention. Such as figure 1 As shown, the method is applied to an intelligent terminal, including the following steps:

[0040] Step 101, when receiving the installation instruction of the application program, extract the digital signature information in the application program, the digital signature information is the digital signature performed by the signature parameter on the executable code file corresponding to the application program;

[0041] Step 102, verifying the digital signature information by using verification paramet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, discloses an application program processing method and device, a terminal and a storage medium, and solves the problem that the security legality of an application program cannot be ensured when the application program is installed in an intelligent terminal in the prior art. The method comprises: when an installation instruction of an application program is received, digital signature information in the application program is extracted, and the digital signature information is a digital signature carried out on an executable code file corresponding to the application program through signature parameters; verifying the digital signature information by utilizing a verification parameter, wherein the verification parameteris associated with the signature parameter; and when the digital signature information passes the verification, installing the application program. The embodiment of the invention is suitable for theinstallation process of the application program.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an application program processing method, device, terminal and storage medium based on a combined public key. Background technique [0002] At present, when an application is installed on a smart terminal, it will receive a notification from the system whether to authorize the application to access user sensitive data (for example, short message content, address book content, etc.), and the user only needs to make a choice of yes or no . However, due to the endless emergence of malicious applications, the legitimacy of the developers of the applications to be installed cannot be guaranteed. If the applications are maliciously attacked and tampered with, it will bring security problems to users. Contents of the invention [0003] The purpose of the present invention is to provide an application program processing method, device, terminal and storage medium ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51
CPCG06F21/51
Inventor 南相浩
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products