Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for implementing application program security detection

An application program and security technology, applied in the field of application program security detection, can solve the problems of increased consumption of resources, consumption of large computing resources, and increased costs

Inactive Publication Date: 2017-03-15
CHINA MOBILE COMM GRP CO LTD
View PDF8 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identification process of these methods requires extraction and analysis of a large number of APK file features. For example, the Dalvik bytecode in an APK file has an average of tens of thousands of levels, and fingerprints need to be calculated, which consumes a lot of computing resources.
[0006] In summary, the existing methods of detecting pirated applications will increase the consumption of resources, resulting in an increase in the cost of piracy monitoring in the application market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for implementing application program security detection
  • Method and device for implementing application program security detection
  • Method and device for implementing application program security detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] like figure 1 As shown, it is a flow chart of the main steps of a method for implementing application program security detection in an embodiment of the present invention, and the method includes:

[0051] Step 101, acquiring web page characteristic data of a specified website.

[0052] It should be noted that the designated website refers to the website used to download the application installation package. The application installation package can be the installation package (APK) of the application program of the Android operating system, the installation package of the application program of the Apple operating system, or the installation package of the Windows operating system. The installation package of the operating application program, the web page feature data includes the application name and / or application description information of the application program to be detected.

[0053] Step 102, according to the characteristic data of the web page and the pre-set...

Embodiment 2

[0061] like figure 2 As shown, it is a detailed step-by-step flowchart of a method for implementing application program security detection in an embodiment of the present invention, which mainly includes the following steps:

[0062] Step 201, acquiring web page characteristic data of a specified website.

[0063] In this step, the web page feature data of the specified website is obtained. It should be noted that the specified website refers to a website for downloading an application installation package, and the application installation package may be an application installation package (APK ), the installation package of the application program of the Apple operating system or the installation package of the application program operated by Windows, the web page feature data includes the application name and application description information of the application program to be detected.

[0064] Specifically, a crawler program may be used to crawl the web page feature data...

Embodiment 3

[0154] see image 3 , the specific step-by-step flowchart of step 104 is shown in the figure, and the specific steps are as follows:

[0155] Step 301 , obtain at least one suspected sample installation package signature database of suspected samples, and then go to step 302 .

[0156] In this step, the obtained suspected sample installation package feature library of at least one suspected sample includes: the MD5 value of the suspected sample, the certificate information of the suspected sample, the size of the suspected sample, and the IDs of all files in the decompiled code folder of the suspected sample. One or more of the MD5 value and function name list, and the MD5 values ​​of all files under the resource folder. Specifically, the suspected sample installation package feature library may also include the version number of the suspected sample. Specifically, after obtaining at least one suspected sample installation package feature library of suspected samples,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for implementing application program security detection. The method comprises following steps: obtaining webpage feature data of a designated website, wherein the designated website is where application program installation packages are downloaded, and the webpage feature data comprises application names and / or application description information of an application program to be detected; screening and selecting a suspected sample set to be downloaded from the designated website according to the webpage feature data and a preset official application program keyword database; downloading at least one suspected sample of the suspected sample set to be downloaded; according to a preset official application program installation package feature database, performing installation package feature matching on the downloaded at least one suspected sample and determining the security of the at least one suspected sample according to matching results. By means of the method and device of the invention, illegal applications in the application market can be detected without consuming large amount of resource, which saves resources and increases data processing efficiency.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a method and device for realizing application security detection. Background technique [0002] With the rapid development of the mobile Internet, mobile smart terminals have become more and more popular. According to relevant data reports, the total number of applications of Google Play in 2014 reached 1.43 million. However, the blowout development of Android applications (Application, APP for short) also makes many pirated applications appear in application download channels. The so-called pirated application is mainly a new application generated by tampering with the obtained genuine application and then repackaging it. There are three main types of piracy. One is to crack the paid application or the payment point in the application, which will damage the interests of developers; Add malicious code to steal user passwords, private data, etc. The data shows that, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 刘颖卿
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products