Vulnerability detection method and device

A vulnerability detection and installation package technology, applied in the field of mobile Internet, can solve problems such as incomplete vulnerability detection, and achieve the effect of improving security and integrity

Active Publication Date: 2016-08-03
JIANGSU PAYEGIS TECH CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above problems, the vulnerability detection method and device of the present invention are proposed to solve the problem of incomplete detection of mobile application vulnerabilities in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability detection method and device
  • Vulnerability detection method and device
  • Vulnerability detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] figure 1 A flow chart of Embodiment 1 of the vulnerability detection method provided by the present invention is shown. like figure 1 As shown, the vulnerability detection method of this embodiment may specifically include the following steps:

[0028] Step S100, for a mobile application installation package, multiple application pages are acquired.

[0029] The mobile application installation package in this embodiment m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability detection method and device. The method comprises the steps that multiple application pages are acquired for a mobile application installation package; the application pages are subjected to recognition processing to obtain the registration page and the login page; preset user information and first verification code information are input to the registration page for registration; if registration succeeds, the preset user information is input to the login page for login; if login succeeds, application programming interface information and login conversation information generated after a mobile application program logs in are acquired, and vulnerability detection is conducted on the application programming interface information. On the basis of the implementation scheme, automatic registration and login of the mobile application program are achieved, the problems that the login-state application programming interface information cannot be acquired, or the acquired application programming interface information is incomplete are solved, therefore, the integrity of vulnerability detection of the mobile application program is improved, and the safety of the mobile application program is improved.

Description

technical field [0001] The present invention relates to the technical field of mobile Internet, in particular to a vulnerability detection method and device. Background technique [0002] With the development of mobile smart terminals, security issues on mobile platforms have become increasingly prominent. The security risks of mobile applications directly threaten the information security of mobile smart terminal users. In addition to the security of the mobile application client, it also includes the security of the server to which the mobile application client is connected. Serious security risks at the mobile application server end can directly lead to data leakage and economic losses. In order to avoid potential security risks in the mobile application server, the vulnerability scanning technology is used to detect security vulnerabilities in the application programming interface (API) of the mobile application server. [0003] At present, there are two main methods f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 汪德嘉张瑞钦
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products