Security processing method, device and system for application installation
A technology for security processing and application installation, applied in the field of information processing, which can solve problems such as hidden security risks, malicious applications installed on devices, and increased costs for maintaining whitelists
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0102] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0103] Currently, the existing method of processing application installation relies on real-time updates of the network and requires a preset whitelist to verify the installation of the application. However, under special circumstances, real-time connection to the network cannot be guaranteed, and maintaining the whitelist increases the time for application installation. cost. In order to solve this problem, this embodiment provides a security processing method for application installation, such as figure 1 As shown, the method includes:
[0104] 101. The client obtains the signature file in the application installation package.
[0105] Wherein, the signature file includes the signature info...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com