Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application program processing method

A technology of application programs and processing methods, applied in the direction of platform integrity maintenance, etc., can solve problems such as the inability to guarantee the security of the client system, the failure to propose a solution, and the inability to prevent the uninstallation and deletion of security product programs, so as to ensure integrity and guarantee The effect of end system security

Inactive Publication Date: 2015-06-24
成都睿峰科技有限公司
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this type of security program is only installed on the client as an application program, and is limited by the processor and storage device. It cannot guarantee the system security of the client, nor can it prevent the security product program itself from being uninstalled and deleted.
[0003] Therefore, for the above-mentioned problems existing in related technologies, effective solutions have not yet been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0019] One aspect of the present invention provides an application program processing method. figure 1 is a flow chart of an application program processing method according to an embodiment of the present invention.

[0020] The safet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application program processing method. The method includes the steps that a TPM model is applied to a mobile terminal, a series of hook functions are interpolated in kernel system call logic, a third party security module is called back to detect modification operation of an application program, the security module determines whether the access or modification of the application program is allowed or not, detected values before each executable file, each library file and each kernel file are loaded into a system are acquired, and the security state of the system is monitored through the detected values. By the adoption of the application program processing method, the integrity of the application program and the security of the terminal system are guaranteed in the mobile terminal through a virtual machine.

Description

technical field [0001] The invention relates to an application program processing method. Background technique [0002] When more and more smart mobile terminals are connected to the Internet in the form of network clients, security issues will appear in the smart mobile terminals, especially application security. Although operating systems are designed to incorporate system-level security mechanisms and a security framework determined by inter-component communication in order to protect applications and data, there are still dangerous behaviors and system vulnerabilities targeting application files. The current common practice for mobile terminal security is to use intelligent mobile terminal security programs to detect malicious behaviors of application programs. However, this type of security program is only installed on the client as an application program, and is limited by processors and storage devices. It cannot guarantee the system security of the client, nor can i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 马泳宇
Owner 成都睿峰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products