Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security processing method, device and system for application installation

A technology for security processing and application installation, applied in the field of information processing, which can solve problems such as hidden security risks, malicious applications installed on devices, and increased costs for maintaining whitelists

Inactive Publication Date: 2019-10-22
KOUBEI SHANGHAI INFORMATION TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, this application provides a security processing method, device and system for application installation, the main purpose of which is to solve the problem that if the update is not timely through the whitelist mechanism, the latest malicious application will be installed on the device, thereby causing security risks, and maintenance The whitelist will also increase the corresponding cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security processing method, device and system for application installation
  • Security processing method, device and system for application installation
  • Security processing method, device and system for application installation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0103] Currently, the existing method of processing application installation relies on real-time updates of the network and requires a preset whitelist to verify the installation of the application. However, under special circumstances, real-time connection to the network cannot be guaranteed, and maintaining the whitelist increases the time for application installation. cost. In order to solve this problem, this embodiment provides a security processing method for application installation, such as figure 1 As shown, the method includes:

[0104] 101. The client obtains the signature file in the application installation package.

[0105] Wherein, the signature file includes the signature info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security processing method, device and system for application installation, belongs to the field of application security, and aims to enhance security detection of equipmenton application installation and more effectively ensure equipment security. The method comprises the steps of: obtaining a signature file in an application installation package, wherein the signaturefile comprises signature information, a first root certificate and a working certificate; performing certificate chain verification according to the first root certificate and a second root certificate preset in the equipment; if the signature information passes the certificate chain verification, performing signature verification on the signature information by using the working certificate; andif the signature verification is passed, triggering an installation instruction of the application installation package in the device.

Description

technical field [0001] The present application relates to the technical field of information processing, and in particular to a method, device and system for secure processing of application installation. Background technique [0002] With the development of mobile Internet technology, the use of mobile devices has become widespread. A user may install an application (Application, APP) on a mobile device to meet various needs of the user. For example, a mobile device may install an application program by loading an application installation package (Android Package, APK). [0003] In order to prevent the installation of malicious applications, the current traditional method is to write a white list of applications that can be installed in the device, and determine whether the application can be installed by comparing whether it is in the white list before the application is installed. [0004] However, the whitelist mechanism relies on the network and needs to be updated in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/60G06F21/64
CPCG06F21/51G06F21/602G06F21/64
Inventor 宋瑞瑞
Owner KOUBEI SHANGHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products