Method and server for identifying risk application

A technology of risk and target application, applied in the electronic field, can solve problems such as fee deduction, security risks of smart terminal users, information leakage of smart terminal users, etc., and achieve the effect of improving security

Inactive Publication Date: 2017-12-15
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the installation file of the application program is maliciously tampered with, running the application corresponding to the installation file may bring security risks to the smart terminal user, for example, it may cause the user information in the smart terminal to be leaked, or cause malicious deduction Wait

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and server for identifying risk application
  • Method and server for identifying risk application
  • Method and server for identifying risk application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0039] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and server for identifying a risk application. The method comprises the steps of obtaining installation information of a to-be-recognized target application, wherein the installation information of the target application includes the package name of an installation package of the target application, edition information, and a sole feature value corresponding to an executable file; obtaining a target sole feature value corresponding to the target application according to the package name of the installation package of the target application and the edition information, wherein the target sole value is the pre-stored sole feature value, corresponding to the executable file, of the target application; identifying the target application as an application which has a potential risk if the sole feature value corresponding to the executable file is different from the target sole feature value. According to the embodiment, by executing the executable file which is falsified in the installation package, the falsified installation package can be effectively identified, thus the risk application can be effectively identified, and the safety of terminal information is then improved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and server for identifying risky applications. Background technique [0002] With the development of mobile communication technology, the functions of smart terminals are becoming more and more powerful. Smart terminals can obtain and run application installation files to install applications (Application, App), and expand the functions of smart terminals by installing various applications to meet user needs. Wherein, the installation file of the application program may be the installation file of the application program provided by the smart terminal system, or the installation file of the application program of the third-party application. [0003] However, when the installation file of the application program is maliciously tampered with, running the application corresponding to the installation file may bring security risks to the smart terminal user, for exampl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/56
CPCG06F21/51G06F21/565
Inventor 魏为
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products