Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting safety performance of application program

An application program and security technology, applied in computer security devices, program/content distribution protection, platform integrity maintenance, etc., can solve the problems of genuine application developers not being able to make profits, stealing user privacy information, infection, etc.

Active Publication Date: 2014-10-29
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF7 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The openness of Android applications has enabled the rapid development of the applications themselves. However, due to the lack of a strict audit mechanism and an effective application authentication mechanism in the Android operating system itself, various hidden dangers have been brought, one of which is the pirated application. flood
[0003] Pirated applications will bring various problems: a large number of "ad-free" versions cause developers to suffer economic losses, so that genuine application developers cannot profit from developing applications; more seriously, a large number of malicious The program pretends to be a genuine application to trick users into downloading, and implants malicious code in it, which can steal users' private information or infect their mobile phones, causing users to suffer huge economic losses
[0005] The security detection technology of the above application program has the following defects: because the pirated application program modifies the package name of the original application program, or takes some approximate application name, the detection rate of the pirated application program is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting safety performance of application program
  • Method and device for detecting safety performance of application program
  • Method and device for detecting safety performance of application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] see Figure 1a , which is a flow chart of a method for detecting the security of an application program provided in Embodiment 1 of the present invention. The method in the embodiment of the present invention may be executed by a hardware and / or software implemented application program security detection device, and the implementation device is typically configured in a server capable of providing application program security detection services.

[0024] Such as Figure 1a As shown, the method includes:

[0025] 110. Obtain program features from the application program to be detected, where the program features at least include: code structure features and / or file structure features;

[0026] This operation is specifically to obtain the program characteristics of the application program to be detected. Specifically, only the code structure characteristics of the application program to be detected may be obtained, or only the file structure characteristics of the applic...

Embodiment 2

[0064] see Figure 2a , is a flow chart of a method for detecting the security of an application program provided by Embodiment 2 of the present invention.

[0065] Such as Figure 2a As shown, the method includes:

[0066] 210. Receive program features obtained from the application program to be detected from the client, wherein the program features are summary data calculated by the client based on a set summary algorithm;

[0067] In this operation, the program features at least include: code structure features and / or file structure features.

[0068] This operation is specifically to acquire the summary data of the code structure characteristics and / or the summary data of the file structure characteristics of the application program to be detected.

[0069] Among them, the digest algorithm is an algorithm that generates a fixed-length smaller binary output from an arbitrary-length binary input. For example, the program feature of the application program to be detected ...

Embodiment approach

[0082] see Figure 2b , as a preferred implementation of this embodiment, the preferred method includes:

[0083] 210. Receive program features obtained from the application program to be detected from the client, wherein the program features are summary data calculated by the client based on a set summary algorithm;

[0084] In this operation, the program features at least include: code structure features and / or file structure features.

[0085] 230. Match the program feature with a standard program feature, and determine the security of the application program to be detected according to the matching result, where the standard program feature is summary data calculated based on a set summary algorithm.

[0086] This operation specifically matches the summary data of the program features of the application to be tested with the summary data of the standard program features of the genuine application, and determines the security of the application to be tested based on the ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for detecting the safety performance of an application program. The method includes the steps of obtaining program characteristics from the application program to be detected, wherein the program characteristics at least include the code structure characteristics and / or the file structure characteristics; matching the program characteristics with standard program characteristics, and determining the safety performance of the application program according to the matching result. By means of the scheme, the program characteristics are obtained from the application program to be detected, the important characteristics including the code structure characteristics and / or the file structure characteristics can be obtained, the program characteristics and the standard program characteristics are matched, the safety performance of the application program to be detected can be determined according to the matching result including successful matching, failed matching or the characteristic contact ratio and the like, whether codes are changed or not or whether malicious codes are added or not and whether files are replaced or not can be detected by matching the program characteristics, and therefore whether the application program to be detected is piratical or not can be fundamentally detected through the code structure characteristics and / or the file structure characteristics.

Description

technical field [0001] The embodiments of the present invention relate to software security technologies, and in particular, to a method and device for detecting the security of an application program. Background technique [0002] Take the Android (Andorid) application program as an example. The Andorid platform is currently a popular Linux-based open source operating system in the world, and is mainly used in mobile terminals such as mobile phones and tablet computers. Android platform is composed of operating system, middleware, user interface and application software. Android application refers to application software under Android platform. The openness of Android applications has enabled the rapid development of the applications themselves. However, due to the lack of a strict audit mechanism and an effective application authentication mechanism in the Android operating system itself, various hidden dangers have been brought, one of which is the pirated application. f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/12
CPCG06F21/12G06F21/563G06F21/565G06F2221/033
Inventor 包沉浮夏良钊
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products