Security detection method and apparatus for application program

An application program and security detection technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as potential safety hazards, slow hardening time, and inflexible selection of hardening schemes, and achieve the effect of ensuring security

Inactive Publication Date: 2017-09-08
北京思特奇信息技术股份有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Correspondingly, the normal use of the user has brought a great security risk
Although there are security hardening software such as Ai Encryption, Tencent Hardening, 360 Hardening, and Bangbang Security on the market, these softwar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security detection method and apparatus for application program
  • Security detection method and apparatus for application program

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure, interface, technology, etc. are proposed for a thorough understanding of the present invention. However, it should be clear to those skilled in the art that the present invention can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of the present invention.

[0041] figure 1 It is a schematic flowchart of a method for performing security detection on an application program provided by an embodiment of the present invention. Specific as figure 1 As shown, the method includes:

[0042] Step 110: Obtain a signed certificate corresponding to the installation package of the application, and verify the signed certificate.

[0043] Specifically, after obtaining the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security detection method and apparatus for an application program. The security detection method comprises the steps of obtaining a signature certificate corresponding to an installation package of the application program; performing verification on the signature certificate; when the verification is successful, judging whether the installation package is subjected to packaging treatment or not; when it is determined that the installation package is not subjected to packaging treatment, sending prompting information to a user, wherein the prompting information is used for indicating that the installation package has security risk, so that the user can perform packaging treatment conveniently; or when it is determined that the installation package is already subjected to packaging treatment, completing operation. Whether the application program is safe or not is detected from different angles; when it is detected that the application program has dangerous factors, corresponding measures can be taken in time; and by reinforcing the application program, security, completeness and effectiveness of data can be realized indirectly.

Description

technical field [0001] The invention relates to the technical field of safety control, in particular to a method and device for safety detection of application programs. Background technique [0002] According to statistics, the global mobile phone shipments of Android mobile phones far exceed the shipments of iOS mobile phones, but the open source nature of the Android system and the diversity of system manufacturers have brought great convenience to hackers in writing malicious virus programs. Correspondingly, the normal use of the user has brought great potential safety hazards. Although there are security hardening software such as Ai Encryption, Tencent Hardening, 360 Hardening, and Bangbang Security on the market, these software require developers to upload their own installation packages to the service provider's cloud environment for testing or hardening, and the hardening time is relatively slow. , the reinforcement scheme cannot be flexibly selected. Contents of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/44
CPCG06F21/562G06F21/44G06F2221/033
Inventor 王小丹
Owner 北京思特奇信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products