Application program installation package processing method and device, and mobile apparatus

A technology of application programs and processing methods, which is applied in the computer field, can solve problems such as the limited effect of installation package reinforcement and protection, and achieve the effect of improving security and increasing flexibility

Inactive Publication Date: 2015-04-01
BEIJING QIHOO TECH CO LTD +1
3 Cites 51 Cited by

AI-Extracted Technical Summary

Problems solved by technology

Obviously, the existing solutions have very limited effect o...
View more

Abstract

The invention relates to an application program installation package processing method and device, and a mobile apparatus. The method comprises the steps that an executable file in an application program installation package is obtained; the executable file is decompiled, and an intermediate file is obtained; function codes are implanted into the intermediate file; the intermediate file with the implanted function codes is recompiled and repackaged into a new executable file; the executable file in the application program installation package is replaced with the new executable file. According to the application program installation package processing method and device, and the mobile apparatus, the flexibility of the protection of the executable file is improved, and the safety of the software installation package is improved.

Application Domain

Program/content distribution protection

Technology Topic

ExecutableNew Executable +5

Image

  • Application program installation package processing method and device, and mobile apparatus
  • Application program installation package processing method and device, and mobile apparatus
  • Application program installation package processing method and device, and mobile apparatus

Examples

  • Experimental program(1)

Example Embodiment

[0032] In order to make the objectives, technical solutions, and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, not all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0033] Such as figure 1 As shown, a schematic flowchart of the method for processing the application installation package provided in the first embodiment of the present invention. The execution subject of the method provided in the first embodiment may be a processing device of the application installation package configured on the server side, and the device may be specifically characterized as a server having the method provided in this embodiment. Correspondingly, the client can be configured with a client reinforcement application. The user can upload the application installation package to be processed to the reinforcement application on the server side through the interactive platform provided by the reinforcement application on the user side. The hardening application on the server side can use the method provided in the first embodiment to process the application installation package.
[0034] Specific, such as figure 1 As shown, the method provided in the first embodiment includes:
[0035] Step 101: Obtain an executable file in the application installation package.
[0036] This embodiment can be applied to the Android system, that is, the application installation package may be an application installation package (APK) based on the Android platform. On the Android system, an application that can be installed and run needs to be packaged into the APK file format of the Android system. APK is the abbreviation of Android application package file, referred to as APK file, that is, the Android installation package, which can also be understood as the application software installed on the Android terminal. The APK file is actually a ZIP file format, but the suffix name is modified to apk. Specifically, you can use Apktool to unpack the APK. After unpacking, you can see the file structure inside the APK file, as shown in Table 1:
[0037] Table 1. Files included in the APK installation package
[0038]
[0039]
[0040] As can be seen from Table 1 above, executable files include Dex files, and Dex files are mainly classes.dex files in the APK, that is, Dalvik Executable (Dalvik virtual machine executable file). It is well known that Dalvik is a Java virtual machine for the Android platform. The Dalvik virtual machine (Dalvik VM) is one of the core components of the Android mobile device platform. It can support the running of Java applications that have been converted to .dex (Dalvik Executable) format. The .dex format is a compression format designed for Dalvik, suitable for systems with limited memory and processor speed. Dalvik is optimized to allow multiple instances of virtual machines to run simultaneously in limited memory, and each Dalvik application is executed as an independent Linux process. A separate process can prevent all programs from being closed when the virtual machine crashes. The threading mechanism, memory allocation and management of the virtual machine, etc. are all implemented by the underlying operating system. Generally, the dex file contained in the apk file will be optimized at runtime, and the optimized file will be stored in the cache.
[0041] In addition to files with the extension .dex, the executable file can also be a file with the extension .jar. The JAR file in the Android installation package is actually a Dex file, but its extension is .jar.
[0042] Step 102: Decompile the executable file to obtain an intermediate file.
[0043] Wherein, the intermediate file may be a Smali file.
[0044] Step 103: Implant function code in the intermediate file.
[0045] When the intermediate file is a Smali file, the function code also needs to be decompiled into Smali code. Specifically, this step can be implemented using the following methods:
[0046] First, decompile the function code into Smali code.
[0047] Then, get the implant position.
[0048] Wherein, the implantation position may be the end of the intermediate file, of course, it may also be other positions of the intermediate file, which is not specifically limited in this embodiment.
[0049] Finally, insert the Smali code at the implantation position in the intermediate file.
[0050] What needs to be explained here is that the function code provided in this embodiment may simply be a hardening protection code, or it may include hardening protection code as well as codes with other functions, such as codes with statistical functions.
[0051] Step 104: Recompile and repackage the intermediate file with the function code implanted into a new executable file.
[0052] After the functional code is implanted, the Apktool tool can be used to recompile and repackage the intermediate file after the functional code is implanted into a new executable file.
[0053] Specifically, this step can be implemented in the following manner:
[0054] First, recompile the intermediate file with the function code implanted into a dex file.
[0055] Then, repackage the recompiled dex file to generate the new executable file.
[0056] What needs to be added here is that: in the above steps, the dex file may be encrypted while repacking the recompiled dex file.
[0057] Step 105: Replace the executable file in the application installation package with the new executable file.
[0058] That is, copy the new executable file to the application installation package.
[0059] What needs to be explained here is: the function codes described in this embodiment can be multiple, that is, for each type of code in the application installation package, the corresponding function code can be implanted separately, so that when the program is executed, there is no need Restore all the dex files at one time. Only when a certain class is loaded, the execution code of that class needs to be restored to realize memory segmentation to prevent memory dumps.
[0060] The technical solution provided by this embodiment realizes the problem by directly implanting function code in the executable file of the application installation package, and replacing the executable file in the original installation package with the executable file implanted with the function code. Reconstruction of executable files in the existing installation package, so that when the program is running, the executable file is protected by executing the implanted function code, which increases the flexibility of executable file protection and improves the software installation Security of the package.
[0061] The technical solution of the embodiment of the present invention can perform a hardening operation on the code files in the installation package of the application program. The hardening operation can improve the security of the application program, effectively prevent the application program from being decompiled, maliciously tampered with, and protect the application program. The data and information of the software will not be stolen by hackers, which reduces the risk of application being virus implanted, ad addition, payment channel tampering, phishing, and information hijacking.
[0062] Further, such as figure 2 As shown, if the function code in the foregoing embodiment is a reinforcement code used to pack and unpack the executable file, the method provided in the foregoing embodiment further includes the following steps:
[0063] Step 106: Obtain the configuration file in the application installation package.
[0064] Step 107: Modify the corresponding parameters in the configuration file according to the entry point of the implanted function code, so that the new executable file is started from the function program.
[0065] In a specific embodiment, for the Android package of the Android program, you can check whether the configuration file (AndroidManifest.xml, see Table 1 above) is configured with an application node label (application); if so, modify the application node label according to the entry point of the function code; if No, create a new application node label, and configure the new application node label according to the entry point of the function code. When parsing, according to the application node label of the configuration file, the function code will be executed first to decrypt this type of program. Since the corresponding function code can be implanted for each type of code, it is not necessary to restore all dex at one time. Only when the class is loaded, the execution code of the class needs to be restored, which realizes memory segmentation.
[0066] After replacing the executable file in the application installation package and modifying the configuration file, you can repackage the application installation package to generate a hardened and protected application installation package.
[0067] Further, in the method provided in the foregoing embodiment, step 101, before the obtaining the executable file in the application installation package, may further include:
[0068] Receiving a processing request uploaded by the user terminal, the processing request carrying the application program installation package.
[0069] Here are some additional content: Based on the content described in the first embodiment, it can be seen that the execution subject of the method provided in this embodiment can be specifically characterized as a reinforcement application installed on the server. In contrast, the client may be configured with a corresponding client reinforcement application. The user can upload the application installation package to be processed to the server through the interface provided by the client reinforcement application, so that the server can perform reinforcement protection processing on the application installation package. Among them, the above-mentioned server and client constitute a reinforcement system.
[0070] In the specific implementation, when the user uploads the software installation package through the web or other platforms, the upload interface will be displayed. After the user clicks the "Upload" button, the local directory will be expanded for the user to select the software installation package to be detected, and the input box will display accordingly The package name of the uploaded software installation package, and the link of "Common problems and solutions for upload failure" can lead the user's interface to the introduction page of common problems, which can be used by the user to solve the problems during the upload process, such as network failure, upload Stop or other issues related to reinforcement. If you click "Reinforce Now", a new page will pop up, leading the user to the reinforcement page. In addition, the display function of status information such as upload progress and detection progress can be further added.
[0071] Further in the embodiment of the present invention, the detection result may be analyzed first to determine the type of security reinforcement of the software installation package, and then the software installation package is scored according to the type of security reinforcement, thereby generating a security that includes the type of security reinforcement and the security score. analysis report. The security analysis report can include the following content: reinforcement recommendations, file protection detection results, code confusion detection results, anti-secondary packaging detection results, and source code encryption detection results. Among them, the reinforcement recommendations can generate security recommendations for the software installation package according to the type of security reinforcement; add the security recommendations to the security analysis report, and provide operation options for security reinforcement. If the user clicks the "Reinforce Now" button, the list of reinforcement applications can be loaded directly, and the applications that can be reinforced can be directly submitted for reinforcement. The items of the above detection results correspond to the reinforcement methods that the software installation package has performed. Generally, the security reinforcement method used can be determined to correspond to the protected items.
[0072] In a specific embodiment, the reinforcement system may have the following two deployment modes:
[0073] The first is to cooperate with the application market, that is, to cooperate with the operator or the third-party software market. After the application installation package is uploaded by the developer to the software market, the application installation package can be put on the shelf after the method provided in the first embodiment is used to strengthen the application installation package. When the user obtains the application installation package through the subscription service or the software market , You can download the hardened and protected application installation package as needed.
[0074] The second, deployment in the cloud, can add a module to download the application installation package on the mobile client. Whenever the user browses the software market and wants to download the application, the user can choose to send the application to the cloud service, and then It is reinforced and protected and downloaded to the user's mobile phone.
[0075] Cloud deployment is mainly to store a reinforced feature library in the cloud. The feature library stores multiple feature information in advance, and each feature information identifies at least one feature after the software installation package executes a type of security reinforcement method. These characteristic information can be obtained by testing and analyzing existing reinforcement methods, and can include information about functions added in the security reinforcement process and/or information about dynamic link libraries. Generally speaking, functions and dynamic link libraries (.so files) added by different hardening methods, and some will add other files. The information of these added functions and files can constitute the characteristics of software hardening. Because of the legacy of different kinds of hardening methods The features are different, so you can use the changes produced during the reinforcement process as feature information, and collect and summarize them, and finally generate a feature library. Then use the existing features in the feature library to perform feature matching with the software installation package to be checked, and obtain whether the software installation package has been reinforced and the reinforcement method adopted, so as to detect the anti-cracking ability of the software installation package.
[0076] Further, the method provided in the foregoing embodiment may further include the following steps:
[0077] Sign the replaced application installation package.
[0078] Specifically, this step can be implemented using the following methods:
[0079] Sending the replaced application installation package to the user terminal, and the user signs the replaced application installation package using his identity; or
[0080] Receive the identity identifier uploaded by the user terminal, and sign the replaced application installation package according to the identity identifier.
[0081] It should be noted that for the foregoing method embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not limited by the described sequence of actions. Because according to the present invention, some steps can be performed in other order or simultaneously. Secondly, those skilled in the art should also know that the embodiments described in the specification are all preferred embodiments, and the involved actions and modules are not necessarily required by the present invention.
[0082] Such as image 3 As shown, a schematic structural diagram of an apparatus for processing an application installation package provided in Embodiment 2 of the present invention. Such as image 3 As shown, the device for processing the application installation package provided in the second embodiment includes: an acquisition module 1, a decompilation module 2, an implant module 3, a recompilation module 4, and a replacement module 5. Wherein, the obtaining module 1 is used to obtain the executable file in the application installation package. The decompilation module 2 is used to decompile the executable file to obtain an intermediate file. The implantation module 3 is used to implant function codes in the intermediate file. The recompilation module 4 is used to recompile and repackage the intermediate file implanted with the function code into a new executable file. The replacement module 5 is used to replace the executable file in the application installation package with the new executable file.
[0083] What needs to be explained here is that the device for processing the application installation package provided in this embodiment can implement the processing method of the application installation package provided in the first embodiment. For the specific implementation method, see the description in the first embodiment. The corresponding content will not be repeated here.
[0084] The technical solution provided by this embodiment realizes the problem by directly implanting function code in the executable file of the application installation package, and replacing the executable file in the original installation package with the executable file implanted with the function code. Reconstruction of executable files in the existing installation package, so that when the program is running, the executable file is protected by executing the implanted function code, which increases the flexibility of executable file protection and improves the software installation Security of the package.
[0085] Further, the application installation package described in the above embodiment may be an application installation package based on the Android platform; the executable file is a dex file; and the intermediate file is a Smali file. Correspondingly, the implanted module can be implemented with the following structure. Specifically, the implantation module includes: a decompilation unit, an acquisition unit, and an insertion unit. Wherein, the decompilation unit is used to decompile the function code into Smali code. The acquiring unit is used to acquire the implantation position. The inserting unit is configured to insert the Smali code at the implantation position in the intermediate file.
[0086] Further, the function code described in the foregoing embodiment may be a reinforcement code used to pack and unpack the executable file, and the apparatus for processing an application installation package provided in the foregoing embodiment may further include: modification Module. Correspondingly, the aforementioned acquisition module is also used to acquire the configuration file in the application installation package. The modification module is used to modify the corresponding parameters in the configuration file according to the entry point of the implanted function code, so that the new executable file is started from the function program.
[0087] Further, the apparatus for processing an application installation package provided in the foregoing embodiment may further include: a receiving module. The receiving module is configured to receive a processing request uploaded by a user terminal, and the processing request carries the application program installation package and the reinforcement parameter set by the user.
[0088] Further, the apparatus for processing application installation packages provided in the foregoing embodiment may further include a signature module. The signature module is used to sign the replaced application installation package.
[0089] Still further, the signature module is specifically configured to send the replaced application installation package to the user terminal, and the user signs the replaced application installation package using his identity; or Receive the identity identifier uploaded by the user terminal, and sign the replaced application installation package according to the identity identifier.
[0090] The third embodiment of the present invention provides a mobile terminal. The mobile terminal includes: an application program installation package processing device. Wherein, the processing device of the application installation package is used for:
[0091] Obtain the executable file in the application installation package;
[0092] Decompile the executable file to obtain an intermediate file;
[0093] Implant function code in the intermediate file;
[0094] Recompiling and repacking the intermediate file with the function code implanted into a new executable file;
[0095] Replace the executable file in the application installation package with the new executable file.
[0096] What needs to be explained here is that the device for processing the application installation package in this embodiment may specifically adopt the device provided in the second embodiment above. For the specific implementation structure and working principle, please refer to the corresponding content in the above embodiment. I won't repeat them here.
[0097] The technical solution provided by this embodiment realizes the problem by directly implanting function code in the executable file of the application installation package, and replacing the executable file in the original installation package with the executable file implanted with the function code. Reconstruction of executable files in the existing installation package, so that when the program is running, the executable file is protected by executing the implanted function code, which increases the flexibility of executable file protection and improves the software installation Security of the package.
[0098] The device for processing the application installation package in this embodiment may be an application installed on the mobile terminal, or it may be set in the mobile terminal and communicatively connected with the processor in the mobile terminal. Logic circuit or chip with the above functions.
[0099] specific, Figure 4 A schematic diagram of an implementation structure of the mobile terminal provided in the third embodiment is shown. Such as Figure 4 As shown, the mobile terminal 50 described in the third embodiment includes a processor 51 and a memory 53. The processor 51 and the memory 53 communicate with each other through a communication line 54. The processor 51 is configured to execute an application program 531. The memory 53 is used to store the application program 531. Wherein, the application program 531 is a processing device of an application program installation package, and the application program is used for:
[0100] Obtain the executable file in the application installation package;
[0101] Decompile the executable file to obtain an intermediate file;
[0102] Implant function code in the intermediate file;
[0103] Recompiling and repacking the intermediate file with the function code implanted into a new executable file;
[0104] Replace the executable file in the application installation package with the new executable file.
[0105] In the above-mentioned embodiments, the description of each embodiment has its own focus. For parts that are not described in detail in an embodiment, reference may be made to related descriptions of other embodiments.
[0106] It can be understood that the above method and related features in the switch can be referred to each other. In addition, the “first”, “second”, etc. in the foregoing embodiments are used to distinguish the embodiments, and do not represent the advantages and disadvantages of the embodiments.
[0107] Those skilled in the art can clearly understand that, for the convenience and conciseness of the description, the specific working process of the above-described system, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
[0108] The algorithms and displays provided here are not inherently related to any particular computer, virtual system or other equipment. Various general-purpose systems can also be used with the teaching based on this. From the above description, the structure required to construct this type of system is obvious. In addition, the present invention is not directed to any specific programming language. It should be understood that various programming languages ​​can be used to implement the content of the present invention described herein, and the above description of a specific language is to disclose the best embodiment of the present invention.
[0109] In the instructions provided here, a lot of specific details are explained. However, it can be understood that the embodiments of the present invention can be practiced without these specific details. In some instances, well-known methods, structures and technologies are not shown in detail, so as not to obscure the understanding of this specification.
[0110] Similarly, it should be understood that in order to simplify the present disclosure and help understand one or more of the various inventive aspects, in the above description of the exemplary embodiments of the present invention, the various features of the present invention are sometimes grouped together into a single embodiment, Figure, or its description. However, the disclosed method should not be interpreted as reflecting the intention that the claimed invention requires more features than those explicitly stated in each claim. More precisely, as reflected in the following claims, the inventive aspect lies in less than all the features of a single embodiment disclosed previously. Therefore, the claims following the specific embodiment are thus explicitly incorporated into the specific embodiment, wherein each claim itself serves as a separate embodiment of the present invention.
[0111] Those skilled in the art can understand that it is possible to adaptively change the modules in the device in the embodiment and set them in one or more devices different from the embodiment. The modules or units or components in the embodiments can be combined into one module or unit or component, and in addition, they can be divided into multiple sub-modules or sub-units or sub-components. Except that at least some of such features and/or processes or units are mutually exclusive, any combination can be used to compare all features disclosed in this specification (including the accompanying claims, abstract and drawings) and any method or methods disclosed in this manner or All the processes or units of the equipment are combined. Unless expressly stated otherwise, each feature disclosed in this specification (including the accompanying claims, abstract and drawings) may be replaced by an alternative feature providing the same, equivalent or similar purpose.
[0112] In addition, those skilled in the art can understand that although some embodiments described herein include certain features included in other embodiments but not other features, the combination of features of different embodiments means that they are within the scope of the present invention. Within and form different embodiments. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
[0113] The various component embodiments of the present invention may be implemented by hardware, or by software modules running on one or more processors, or by their combination. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) can be used in practice to implement the protection device for the Android platform application or the running device for the Android platform protected application according to the embodiment of the present invention. Some or all functions of some or all of the components. The present invention can also be implemented as a device or device program (for example, a computer program and a computer program product) for executing part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may have the form of one or more signals. Such signals can be downloaded from Internet websites, or provided on carrier signals, or provided in any other form.
[0114] It should be noted that the above-mentioned embodiments illustrate rather than limit the present invention, and those skilled in the art can design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses should not be constructed as a limitation to the claims. The word "comprising" does not exclude the presence of elements or steps not listed in the claims. The word "a" or "an" preceding an element does not exclude the presence of multiple such elements. The invention can be implemented by means of hardware comprising several different elements and by means of a suitably programmed computer. In the unit claims enumerating several devices, several of these devices may be embodied in the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.
[0115] The invention discloses A1, an application program installation package processing method, including:
[0116] Obtain the executable file in the application installation package;
[0117] Decompile the executable file to obtain an intermediate file;
[0118] Implant function code in the intermediate file;
[0119] Recompiling and repacking the intermediate file with the function code implanted into a new executable file;
[0120] Replace the executable file in the application installation package with the new executable file.
[0121] A2. The method described in A1 above, wherein the application installation package is an application installation package based on the Android platform; the executable file is a dex file; and the intermediate file is a Smali file.
[0122] A3. The method described in A2 above, wherein the embedding of function codes in the intermediate file includes:
[0123] Decompiling the function code into Smali code;
[0124] Get the implant position;
[0125] Insert the Smali code at the implantation position in the intermediate file.
[0126] A. In the method described in A2 above, the function code is a reinforcement code used to pack and unpack the executable file, then the method further includes:
[0127] Obtain the configuration file in the application installation package;
[0128] Modify the corresponding parameter in the configuration file according to the entry point of the implanted function code, so that the new executable file is started from the function program.
[0129] A5. The method according to any one of A1 to A4 above, before the obtaining the executable file in the application installation package, further includes:
[0130] Receiving a processing request uploaded by the user terminal, the processing request carrying information of the application installation package.
[0131] A6. The method according to any one of A1 to A4 above, further comprising:
[0132] Sign the replaced application installation package.
[0133] A7. The method described in A6 above, wherein the signing the replaced application installation package includes:
[0134] Sending the replaced application installation package to the user terminal, and the user signs the replaced application installation package using his identity; or
[0135] Receive the identity identifier uploaded by the user terminal, and sign the replaced application installation package according to the identity identifier.
[0136] The present invention also discloses B8, an application program installation package processing device, including:
[0137] The obtaining module is used to obtain the executable file in the application installation package;
[0138] The decompilation module is used to decompile the executable file to obtain an intermediate file;
[0139] The implantation module is used to implant function codes in the intermediate file;
[0140] The recompilation module is used to recompile and repackage the intermediate file with the function code implanted into a new executable file;
[0141] The replacement module is used to replace the executable file in the application installation package with the new executable file.
[0142] B9. The device according to B8, wherein the application installation package is an application installation package based on the Android platform; the executable file is a dex file; and the intermediate file is a Smali file;
[0143] Correspondingly, the implanted module includes:
[0144] The decompilation unit is used to decompile the function code into Smali code;
[0145] The obtaining unit is used to obtain the implantation position;
[0146] The insertion unit is used to insert the Smali code at the implantation position in the intermediate file.
[0147] B10. The device as described in B9 above, wherein the function code is a reinforcement code used to pack and unpack the executable file, and the device further includes:
[0148] The obtaining module is also used to obtain the configuration file in the application installation package;
[0149] The modification module is used to modify the corresponding parameters in the configuration file according to the entry point of the implanted function code, so that the new executable file is started from the function program.
[0150] B11. The device according to any one of B8 to B10 above, further comprising:
[0151] The receiving module is configured to receive a processing request uploaded by the user terminal, the processing request carrying the application installation package and the processing request of the reinforcement parameters set by the user.
[0152] B12. The device according to any one of B8 to B10 above, further comprising:
[0153] The signature module is used to sign the replaced application installation package.
[0154] B13. The device as described in B12 above, wherein the signature module is specifically configured to send the replaced application installation package to the user terminal, and the user uses its identity to verify the replaced application Sign the installation package; or receive the identity identifier uploaded by the user terminal, and sign the replaced application installation package according to the identity.
[0155] The present invention also discloses C14, a mobile device, including a processing device for the application installation package described in any one of B8 to B13.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Audio playing control method and device

InactiveCN106708466AIncrease the use of functionsHigh flexibility
Owner:SHENZHEN TCL DIGITAL TECH CO LTD

Shoe sole used for diabetic patient and slipper made of shoe sole

ActiveCN103960816Agood cohesionHigh flexibility
Owner:ZHEJIANG RUNYANG NEW MATERIAL TECH

Classification and recommendation of technical efficacy words

  • High flexibility
  • improve security

Indwelling implant for embolization

InactiveUS20060116708A1high flexibilitysafe operation
Owner:KANEKA CORP +1

Memory controller

ActiveCN101702326Alow costHigh flexibility
Owner:DAWNING INFORMATION IND BEIJING +1

Self-reducing, cold-bonded pellets

ActiveUS20050061207A1lower production costhigh flexibility
Owner:HANQING LIU

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products