Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019079998 - METHOD AND TERMINAL FOR MANAGING AND CONTROLLING PERMISSION OF APPLICATION, AND POS TERMINAL

Publication Number WO/2019/079998
Publication Date 02.05.2019
International Application No. PCT/CN2017/107641
International Filing Date 25.10.2017
IPC
G06F 9/44 2018.1
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
44Arrangements for executing specific programs
CPC
G06F 21/44
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
44Program or device authentication
G06F 21/52
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
52during program execution, e.g. stack integrity ; ; Preventing unwanted data erasure; Buffer overflow
G06F 21/6218
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
60Protecting data
62Protecting access to data via a platform, e.g. using keys or access control rules
6218to a system of files or objects, e.g. local or distributed file system or database
G06F 2221/2141
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
Applicants
  • 福建联迪商用设备有限公司 FUJIAN LANDI COMMERCIAL EQUIPMENT CO., LTD [CN]/[CN]
Inventors
  • 彭波涛 PENG, Botao
Agents
  • 福州市博深专利事务所(普通合伙) BORSAM INTELLECTUAL PROPERTY (FUZHOU)
Priority Data
Publication Language Chinese (zh)
Filing Language Chinese (ZH)
Designated States
Title
(EN) METHOD AND TERMINAL FOR MANAGING AND CONTROLLING PERMISSION OF APPLICATION, AND POS TERMINAL
(FR) PROCÉDÉ ET TERMINAL SERVANT À LA GESTION ET À LA COMMANDE D'AUTORISATION D'APPLICATION ET TERMINAL DE POINT DE VENTE
(ZH) 一种应用程序权限的管控方法、终端及POS终端
Abstract
(EN) The present invention relates to the field of data processing, and in particular to a method and terminal for managing and controlling a permission of an application, and a POS terminal. By obtaining a permission file corresponding to an application, the permission file comprising information of an accessible interface of the application, packaging an original installation package corresponding to the application and the permission file to obtain a checked installation package, and performing a sign operation on the checked installation package to obtain a signed installation package, the present invention improves the legitimacy of a third-party application installed on a terminal.
(FR) La présente invention concerne le domaine du traitement de données et en particulier un procédé et un terminal servant à la gestion et à la commande d'une autorisation d'application, ainsi qu'un terminal de point de vente (POS). Par l'obtention d'un fichier d'autorisation correspondant à une application, le fichier d'autorisation comprenant des informations d'une interface accessible de l'application, par l'association d'un progiciel d'installation d'origine correspondant à l'application et du fichier d'autorisation afin d'obtenir un progiciel d'installation vérifié, et par l'exécution d'une opération de signature sur le progiciel d'installation vérifié afin d'obtenir un progiciel d'installation signé, la présente invention améliore la légitimité d'une application tierce installée sur un terminal.
(ZH) 本发明涉及数据处理领域,尤其涉及一种应用程序权限的管控方法、终端及POS终端。本发明通过获取与应用程序对应的权限文件;所述权限文件中包括所述应用程序可访问接口的信息;将与所述应用程序对应的原始安装包和所述权限文件打包,得到已审核安装包;对所述已审核安装包进行签名操作,得到已签名安装包。实现提高安装在终端上的第三方应用程序的合法性。
Related patent documents
Latest bibliographic data on file with the International Bureau