CN112799739A - Application protection method and terminal - Google Patents

Application protection method and terminal Download PDF

Info

Publication number
CN112799739A
CN112799739A CN202110154141.9A CN202110154141A CN112799739A CN 112799739 A CN112799739 A CN 112799739A CN 202110154141 A CN202110154141 A CN 202110154141A CN 112799739 A CN112799739 A CN 112799739A
Authority
CN
China
Prior art keywords
application
judging whether
protection
protection file
exists
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110154141.9A
Other languages
Chinese (zh)
Inventor
邱熠龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Huisibo Information Technology Co ltd
Original Assignee
Fuzhou Huisibo Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Huisibo Information Technology Co ltd filed Critical Fuzhou Huisibo Information Technology Co ltd
Priority to CN202110154141.9A priority Critical patent/CN112799739A/en
Publication of CN112799739A publication Critical patent/CN112799739A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses an application protection method and a terminal, which judge whether an identity label of a sending terminal is a root authority or not by receiving an application unloading request sent by the sending terminal, if so, the application is allowed to be unloaded, if not, whether equipment corresponding to the application is in a use state or not is judged, if not, an unloading protection process is executed, if not, the application is allowed to be unloaded, the root authority represents the highest authority, the sending terminal with the identity label as the root authority allows the application to be unloaded, when the identity label of the sending terminal is not the root authority and the equipment corresponding to the application is in a non-use state, a developer is convenient to carry out system development and does not enter the unloading protection process, when the equipment is in the use state, the description is that a common user carries out unloading operation through the sending terminal, executes the unloading protection process, and can protect the unloaded application according to requirements, and the protection appeal of various users to the specified application is met.

Description

Application protection method and terminal
Technical Field
The invention relates to the technical field of electronics, in particular to an application protection method and a terminal.
Background
With the continuous development of the Android system, the Android system is used for more and more devices, such as a POS machine, a cash register and the like.
The mobile phone end manufacturer does not need to make different versions for the application pre-installed by the customer according to different customers, and the requirement of unloading protection on the application by a specific user is less met. However, due to the industry nature of devices such as POS and cash registers, many customers such as banks, acquiring agencies and merchants have a great need for deep protection of their designated applications when they are uninstalled.
At present, some manufacturers preset the applications that cannot be uninstalled as specified by a customer as system applications, and some manufacturers specify some applications that cannot be uninstalled to a user when the manufacturers leave a factory, but the requirements of multiple users for flexibly uninstalling and protecting the applications of the same system version cannot be realized.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: an application protection method and a terminal are provided, which can protect the uninstalled application according to the requirement.
In order to solve the technical problems, the invention adopts a technical scheme that:
an application protection method comprising the steps of:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an application protection terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
The invention has the beneficial effects that:
judging whether the identity of the sending terminal is the root authority or not by receiving an application uninstalling request sent by the sending terminal, if so, the application is allowed to be unloaded, if not, whether the equipment corresponding to the application is in a use state is judged, if yes, executing the unloading protection process, if not, allowing to unload the application, the root authority represents the highest authority, the sending terminal with the identity mark as the root authority allows to unload the application, when the identity of the sending terminal is not the root authority and the device corresponding to the application is in the non-use state, in order to facilitate the system development of a developer, the uninstallation protection process is not entered, when the device is in a use state, the description is that the common user carries out the unloading operation through the sending terminal, executes the unloading protection process, can protect the unloaded application according to the requirement, and meets the protection requirements of various users on the specified application.
Drawings
FIG. 1 is a flowchart illustrating steps of a method for application protection according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an application protection terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of an application protection method according to an embodiment of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, an embodiment of the present invention provides an application protection method, including:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
From the above description, the beneficial effects of the present invention are: judging whether the identity of the sending terminal is the root authority or not by receiving an application uninstalling request sent by the sending terminal, if so, the application is allowed to be unloaded, if not, whether the equipment corresponding to the application is in a use state is judged, if yes, executing the unloading protection process, if not, allowing to unload the application, the root authority represents the highest authority, the sending terminal with the identity mark as the root authority allows to unload the application, when the identity of the sending terminal is not the root authority and the device corresponding to the application is in the non-use state, in order to facilitate the system development of a developer, the uninstallation protection process is not entered, when the device is in a use state, the description is that the common user carries out the unloading operation through the sending terminal, executes the unloading protection process, can protect the unloaded application according to the requirement, and meets the protection requirements of various users on the specified application.
Further, the executing the uninstall protection process includes:
inquiring the application according to a preset application protection file, wherein the preset application protection file comprises a first application protection file and a second application protection file;
and judging whether the application exists in the first application protection file, if so, forbidding to unload the application, if not, judging whether third-party verification is started, if so, executing the third-party verification, if not, judging whether the application exists in the second application protection file, if so, forbidding to unload the application, and if not, allowing to unload the application.
According to the description, the preset application protection file comprises the first application protection file and the second application protection file, the application is inquired according to the preset application protection file, the applications which need to be protected by a manufacturer and a user are stored in the preset application protection file, whether the unloaded application is the application which needs to be protected and is appointed by the manufacturer and the client or not can be determined, and therefore the unloaded application is protected according to the requirements of the manufacturer and the client.
Further, the determining whether the application exists in the first application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the first application protection file;
judging whether the application exists in the first application protection file or not according to a matching result;
the determining whether the application exists in the second application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the second application protection file;
and judging whether the application exists in the second application protection file or not according to the matching result.
According to the description, the application package name in the preset application protection file can support the wildcard character, and when the first application protection file and the second application protection file are judged to exist in the application, the application package name of the application is matched with the application package name containing the wildcard character in the preset application protection file, so that the application package names of multiple versions in the preset application protection file can be processed at one time, and the query efficiency is improved.
Further, the performing the third party verification includes:
and judging whether the APK verified by the third party is legal or not, if not, executing the step of judging whether the application exists in the second application protection file, if so, judging whether the verification of binding the third party is successful or not, if not, executing the step of judging whether the application exists in the second application protection file or not, and if so, verifying the application through the third party.
Further, the method also comprises the following steps:
storing a preset key corresponding to the application which is forbidden to be uninstalled to the third party for verification;
the verifying the application through the third party verification comprises:
and judging whether a preset secret key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application.
As can be seen from the above description, for an application that is not included in the first application protection file and is already checked by the third party, the third party check is performed, and the specific user can determine the application that needs to be protected in the third party check, thereby implementing the deep protection of the specific user on the specific application.
Referring to fig. 2, another embodiment of the present invention provides an application protection terminal, including a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor executes the computer program to implement the following steps:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
From the above description, the beneficial effects of the present invention are: judging whether the identity of the sending terminal is the root authority or not by receiving an application uninstalling request sent by the sending terminal, if so, the application is allowed to be unloaded, if not, whether the equipment corresponding to the application is in a use state is judged, if yes, executing the unloading protection process, if not, allowing to unload the application, the root authority represents the highest authority, the sending terminal with the identity mark as the root authority allows to unload the application, when the identity of the sending terminal is not the root authority and the device corresponding to the application is in the non-use state, in order to facilitate the system development of a developer, the uninstallation protection process is not entered, when the device is in a use state, the description is that the common user carries out the unloading operation through the sending terminal, executes the unloading protection process, can protect the unloaded application according to the requirement, and meets the protection requirements of various users on the specified application.
Further, the executing the uninstall protection process includes:
inquiring the application according to a preset application protection file, wherein the preset application protection file comprises a first application protection file and a second application protection file;
and judging whether the application exists in the first application protection file, if so, forbidding to unload the application, if not, judging whether third-party verification is started, if so, executing the third-party verification, if not, judging whether the application exists in the second application protection file, if so, forbidding to unload the application, and if not, allowing to unload the application.
According to the description, the preset application protection file comprises the first application protection file and the second application protection file, the application is inquired according to the preset application protection file, the applications which need to be protected by a manufacturer and a user are stored in the preset application protection file, whether the unloaded application is the application which needs to be protected and is appointed by the manufacturer and the client or not can be determined, and therefore the unloaded application is protected according to the requirements of the manufacturer and the client.
Further, the determining whether the application exists in the first application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the first application protection file;
judging whether the application exists in the first application protection file or not according to a matching result;
the determining whether the application exists in the second application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the second application protection file;
and judging whether the application exists in the second application protection file or not according to the matching result.
According to the description, the application package name in the preset application protection file can support the wildcard character, and when the first application protection file and the second application protection file are judged to exist in the application, the application package name of the application is matched with the application package name containing the wildcard character in the preset application protection file, so that the application package names of multiple versions in the preset application protection file can be processed at one time, and the query efficiency is improved.
Further, the performing the third party verification includes:
and judging whether the APK verified by the third party is legal or not, if not, executing the step of judging whether the application exists in the second application protection file, if so, judging whether the verification of binding the third party is successful or not, if not, executing the step of judging whether the application exists in the second application protection file or not, and if so, verifying the application through the third party.
Further, the method also comprises the following steps:
storing a preset key corresponding to the application which is forbidden to be uninstalled to the third party for verification;
the verifying the application through the third party verification comprises:
and judging whether a preset secret key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application.
As can be seen from the above description, for an application that is not included in the first application protection file and is already checked by the third party, the third party check is performed, and the specific user can determine the application that needs to be protected in the third party check, thereby implementing the deep protection of the specific user on the specific application.
The application protection method and the terminal can be applied to relevant equipment using an Android system, and are described in the following by specific embodiments:
example one
Referring to fig. 1 and 3, an application protection method of the present embodiment includes the steps of:
s1, receiving an application uninstalling request sent by a sending terminal;
for example, a PMS (Package Manager Service) receives an application offload request sent by an offload initiator;
s2, judging whether the identity of the sending terminal is a root authority, if so, allowing the application to be uninstalled, if not, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled;
the state of the equipment comprises a debugging state and a using state, and the equipment is convenient for a developer to develop when in the debugging state and does not trigger an unloading protection process;
for example, as shown in fig. 3, it is determined whether a UID (User Identification) of the offload initiator is Root authority, if so, the application is allowed to be offloaded, if not, it is determined whether a device corresponding to the application is in a use state, if so, an offload protection process is executed, and if not, the application is allowed to be offloaded.
Example two
Referring to fig. 3, the present embodiment further defines how to execute the offload protection process based on the first embodiment, and specifically includes:
inquiring the application according to a preset application protection file, wherein the preset application protection file comprises a first application protection file and a second application protection file;
the preset application protection file comprises a manufacturer application protection file and a client application protection file, and the priority of the manufacturer application protection file is higher than that of the client application protection file;
for example, when querying whether the application exists in a preset application protection file, querying in a manufacturer application protection file and then querying in a client application protection file;
in this embodiment, the first application protection file is a manufacturer application protection file, and the second application protection file is a client application protection file;
judging whether the application exists in the first application protection file or not, if so, forbidding to unload the application, if not, judging whether third-party verification is started or not, if so, executing the third-party verification, if not, judging whether the application exists in the second application protection file or not, if so, forbidding to unload the application, and if not, allowing to unload the application;
specifically, the determining whether the application exists in the first application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the first application protection file;
judging whether the application exists in the first application protection file or not according to a matching result;
the determining whether the application exists in the second application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the second application protection file;
judging whether the application exists in the second application protection file or not according to a matching result;
for example, as shown in fig. 3, the application is queried according to a preset application protection file, the application package name of the application is matched with the application package name containing a wildcard in a vendor application protection file, whether the application exists in the vendor application protection file is determined according to a matching result, if the application exists in the vendor application protection file, the application is prohibited from being uninstalled, if the application does not exist in the vendor application protection file, whether third-party verification is started is determined, if yes, third-party verification is executed, if not, the application package name of the application is matched with the application package name containing a wildcard in a client application protection file, whether the application exists in the client application protection file is determined according to a matching result, if yes, the application is prohibited from being uninstalled, and if not, the application is permitted to be uninstalled;
the client application protection file can be installed to a designated position of a sending terminal in the form of pkg files (installation package configuration files), in order to guarantee the validity and the security of the file, the client application protection file needs to be signed, and the validity of the file signature is verified when the PMS is initialized.
EXAMPLE III
Referring to fig. 3, the embodiment further defines how to perform the third party verification based on the first and second embodiments, and specifically includes:
storing a preset key corresponding to the application which is forbidden to be uninstalled to the third party for verification;
the preset key is provided by a system and is generated by an RSA private key, an encryption application package name, signature information and the like, and the preset key is required to be filled in the corresponding < meta-data > for verification by a third party;
judging whether the APK verified by the third party is legal or not, if not, executing and judging whether the application step exists in the second application protection file or not, if so, judging whether the verification of binding the third party is successful or not, if not, executing and judging whether the application step exists in the second application protection file or not, and if so, verifying and verifying the application through the third party;
the PMS calls an authentication Interface provided for the verification of the third party of the protected application through an Android Interface Definition Language (AIDL);
specifically, the verifying the application through the third party verification includes:
judging whether a preset secret key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application;
for example, as shown in fig. 3, it is determined whether the APK verified by the third party is legal, if not, a step of matching the application package name of the application with the application package name including the wildcard in the client application protection file is performed, if so, it is determined whether the verification by the third party is successful, if not, a step of matching the application package name of the application with the application package name including the wildcard in the client application protection file is performed, and if so, the application is verified by the third party;
and judging whether a preset key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application.
Example four
Referring to fig. 2, an application protection terminal includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, the steps in the first embodiment, the second embodiment, or the third embodiment are implemented.
In summary, according to the application protection method and the terminal provided by the present invention, by receiving an application uninstalling request sent by a sending terminal, it is determined whether an identity of the sending terminal is a root authority, if so, the application is allowed to be uninstalled, if not, it is determined whether a device corresponding to the application is in a use state, if so, an uninstall protection process is executed, and if not, the application is allowed to be uninstalled; the unloading protection executing process is specifically that the application is inquired according to a preset application protection file, the preset application protection file comprises a first application protection file and a second application protection file, whether the application exists in the first application protection file is judged, if the application exists in the first application protection file, unloading of the application is forbidden, if the application does not exist in the first application protection file, whether third-party verification is started is judged, if yes, the third-party verification is executed, if no, whether the application exists in the second application protection file is judged, if yes, the application is forbidden to be unloaded, if not, the application is allowed to be unloaded, and whether the unloaded application is the application which needs to be protected and is specified by a manufacturer and a customer can be determined; the third-party verification is carried out on the applications which are not contained in the first application protection file and are opened by the third-party verification, and a specific user can determine the applications needing to be protected in the third-party verification, so that the deep protection of the specific user on the specific applications is realized; when the identity of the sending terminal is not the root authority and the device corresponding to the application is in the non-use state, the unloading protection process is not performed for a developer to conveniently develop the system, and when the device is in the use state, the unloading operation is performed by a common user through the sending terminal to execute the unloading protection process, and the unloaded application can be protected according to the requirement, so that the protection appeal of various users to the specified application is met.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. An application protection method, comprising the steps of:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
2. The application protection method according to claim 1, wherein the executing the offload protection process comprises:
inquiring the application according to a preset application protection file, wherein the preset application protection file comprises a first application protection file and a second application protection file;
and judging whether the application exists in the first application protection file, if so, forbidding to unload the application, if not, judging whether third-party verification is started, if so, executing the third-party verification, if not, judging whether the application exists in the second application protection file, if so, forbidding to unload the application, and if not, allowing to unload the application.
3. The method according to claim 2, wherein the determining whether the application exists in the first application protection file comprises:
matching the application package name of the application with the application package name containing wildcards in the first application protection file;
judging whether the application exists in the first application protection file or not according to a matching result;
the determining whether the application exists in the second application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the second application protection file;
and judging whether the application exists in the second application protection file or not according to the matching result.
4. The application protection method of claim 2, wherein the performing the third-party verification comprises:
and judging whether the APK verified by the third party is legal or not, if not, executing the step of judging whether the application exists in the second application protection file, if so, judging whether the verification of binding the third party is successful or not, if not, executing the step of judging whether the application exists in the second application protection file or not, and if so, verifying the application through the third party.
5. The application protection method according to claim 4, further comprising the steps of:
storing a preset key corresponding to the application which is forbidden to be uninstalled to the third party for verification;
the verifying the application through the third party verification comprises:
and judging whether a preset secret key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application.
6. An application protection terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
receiving an application unloading request sent by a sending terminal;
and judging whether the identity of the sending terminal is the root authority, if so, allowing the application to be uninstalled, otherwise, judging whether the equipment corresponding to the application is in a use state, if so, executing an uninstalling protection process, and if not, allowing the application to be uninstalled.
7. The application protection terminal according to claim 6, wherein the executing the offload protection process comprises:
inquiring the application according to a preset application protection file, wherein the preset application protection file comprises a first application protection file and a second application protection file;
and judging whether the application exists in the first application protection file, if so, forbidding to unload the application, if not, judging whether third-party verification is started, if so, executing the third-party verification, if not, judging whether the application exists in the second application protection file, if so, forbidding to unload the application, and if not, allowing to unload the application.
8. The application protection terminal of claim 7, wherein the determining whether the application exists in the first application protection file comprises:
matching the application package name of the application with the application package name containing wildcards in the first application protection file;
judging whether the application exists in the first application protection file or not according to a matching result;
the determining whether the application exists in the second application protection file includes:
matching the application package name of the application with the application package name containing wildcards in the second application protection file;
and judging whether the application exists in the second application protection file or not according to the matching result.
9. The application protection terminal of claim 7, wherein the performing the third party verification comprises:
and judging whether the APK verified by the third party is legal or not, if not, executing the step of judging whether the application exists in the second application protection file, if so, judging whether the verification of binding the third party is successful or not, if not, executing the step of judging whether the application exists in the second application protection file or not, and if so, verifying the application through the third party.
10. The application protection terminal according to claim 9, further comprising the steps of:
storing a preset key corresponding to the application which is forbidden to be uninstalled to the third party for verification;
the verifying the application through the third party verification comprises:
and judging whether a preset secret key corresponding to the application exists in the third-party verification, if so, forbidding to uninstall the application, and if not, allowing to uninstall the application.
CN202110154141.9A 2021-02-04 2021-02-04 Application protection method and terminal Pending CN112799739A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110154141.9A CN112799739A (en) 2021-02-04 2021-02-04 Application protection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110154141.9A CN112799739A (en) 2021-02-04 2021-02-04 Application protection method and terminal

Publications (1)

Publication Number Publication Date
CN112799739A true CN112799739A (en) 2021-05-14

Family

ID=75814238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110154141.9A Pending CN112799739A (en) 2021-02-04 2021-02-04 Application protection method and terminal

Country Status (1)

Country Link
CN (1) CN112799739A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100077475A1 (en) * 2008-09-22 2010-03-25 Microsoft Corporation Partial installation based on available privileges
CN101727358A (en) * 2009-12-15 2010-06-09 中国电信股份有限公司 Method and system for realizing inter-Widget-application communication
KR101308859B1 (en) * 2012-02-24 2013-09-16 주식회사 팬택 Terminal having temporary root authority granting function and root authority granting method using the same
CN103595774A (en) * 2013-11-01 2014-02-19 北京奇虎科技有限公司 System application uninstalling method and device with terminal based on server side
CN104023032A (en) * 2014-06-23 2014-09-03 北京握奇智能科技有限公司 Application limited unloading method based on dependable execution environment technology, server and terminal
CN104461656A (en) * 2014-12-26 2015-03-25 深圳数字电视国家工程实验室股份有限公司 Application program unloading protection method and system based on Android platform
US20190196801A1 (en) * 2017-12-22 2019-06-27 Toshiba Tec Kabushiki Kaisha Method and apparatus for application development environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100077475A1 (en) * 2008-09-22 2010-03-25 Microsoft Corporation Partial installation based on available privileges
CN101727358A (en) * 2009-12-15 2010-06-09 中国电信股份有限公司 Method and system for realizing inter-Widget-application communication
KR101308859B1 (en) * 2012-02-24 2013-09-16 주식회사 팬택 Terminal having temporary root authority granting function and root authority granting method using the same
CN103595774A (en) * 2013-11-01 2014-02-19 北京奇虎科技有限公司 System application uninstalling method and device with terminal based on server side
CN104023032A (en) * 2014-06-23 2014-09-03 北京握奇智能科技有限公司 Application limited unloading method based on dependable execution environment technology, server and terminal
CN104461656A (en) * 2014-12-26 2015-03-25 深圳数字电视国家工程实验室股份有限公司 Application program unloading protection method and system based on Android platform
US20190196801A1 (en) * 2017-12-22 2019-06-27 Toshiba Tec Kabushiki Kaisha Method and apparatus for application development environment

Similar Documents

Publication Publication Date Title
US8479005B2 (en) Applet, archive file generation method, archive file generation program, and archive file generation device
JP4440983B2 (en) Secure application distribution and execution in a wireless environment
US8086861B2 (en) Information processing terminal and status notification method
US20100229242A1 (en) Program execution control system, program execution control method and computer program for program execution control
US20080104416A1 (en) Apparatus and method for enabling applications on a security processor
CN108763951B (en) Data protection method and device
JP2005182789A (en) Method and system for ensuring that software update may be installed or run only on specific device or class of devices
CN108780482B (en) Method and device for managing applications in a secure device
US11425127B2 (en) Securing application behavior in serverless computing
CN109344605B (en) Authority control method and system of intelligent POS machine
CN108595950A (en) A kind of safe Enhancement Methods of SGX of combination remote authentication
CN106548065B (en) Application program installation detection method and device
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
CN112231702A (en) Application protection method, device, equipment and medium
JP4526383B2 (en) Tamper evident removable media for storing executable code
CN112134905B (en) Android system based signature method, device and equipment
CN114329358A (en) Application signature method and system, transaction terminal and service platform
CN109902500B (en) Method and system for realizing service call data security through link library
CN112799739A (en) Application protection method and terminal
CN107315610B (en) Method, device and computer readable storage medium for realizing password function
CN110602051A (en) Information processing method based on consensus protocol and related device
CN106648770B (en) Generation method, loading method and device of application program installation package
CN113220314B (en) APP resource loading and APK generation method, device, equipment and medium
CN112364340B (en) Authority management method, device, equipment and computer readable storage medium
CN111695113B (en) Terminal software installation compliance detection method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210514

RJ01 Rejection of invention patent application after publication