Application security analysis method and apparatus

A technology for analyzing applications and security, applied in the computer field, can solve the problems of taking up a lot of time and resources, insufficient application security detection, lack of effective detection solutions, etc., and achieve good analysis results

Inactive Publication Date: 2017-06-27
BEIJING QIHOO TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of smart terminal systems, more and more developers have joined the application development camp. These developers are mixed, and some developers lack security awareness, resulting in various security vulnerabilities in the application of smart terminal systems.
[0003] At present, there is a lack of effective detection solutions for application security issues: a comprehensive detection of application security often takes a lot of time and resources; and if the time and resources used to detect applications are compressed, it will cause serious damage to application security. Insufficient testing of sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application security analysis method and apparatus
  • Application security analysis method and apparatus
  • Application security analysis method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0017] Such as figure 1 As shown, a method for analyzing application security in an embodiment of the present invention includes:

[0018] Step 110, for the application to be analyzed, obtain the installation package of the application and send it to the mobile terminal for installation. In this embodiment, for example, for a mobile terminal with an Android system, the installation package used is an apk file.

[0019] Step 120, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application security analysis method and apparatus. The method comprises the steps of obtaining an installation package of a to-be-analyzed application and sending the installation package to a mobile terminal for performing installation; obtaining security data corresponding to the application, and generating interactive data between a system of the mobile terminal and the application according to the security data; sending the interactive data to the mobile terminal, and controlling the system of the mobile terminal and the application to interact according to the interactive data to obtain an interactive result; and according to the interactive result, calculating the security of the application. According to the method and the apparatus, a part, possibly having a security problem, of the application can be tested, and the security of the application is analyzed according to the interactive data, so that excessive time and resources are not occupied but the analysis effect is relatively good.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for analyzing application security. Background technique [0002] With the development of smart terminal systems, more and more developers have joined the application development camp. These developers are mixed, and some developers lack security awareness, resulting in various security vulnerabilities in the application of smart terminal systems. [0003] At present, there is a lack of effective detection solutions for application security issues: comprehensive detection of application security often takes a lot of time and resources; and if the time and resources used to detect applications are compressed, it will cause serious damage to application security. Sex testing is not adequate. Contents of the invention [0004] In view of the above problems, the present invention is proposed to provide a method and device for analyzing application sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
CPCG06F11/3612G06F11/3692
Inventor 申迪卢加磊田从新龚广
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products