Application monitoring method, development platform, client and information system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology that applies information and clients. It is applied in the information field and can solve problems such as time lag and timeliness dependence on time.
Inactive Publication Date: 2018-03-06
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 4 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0012] However, the discovery and monitoring of pirated apps by this method depends on the timeliness of crawli
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
example 1
[0202] Such as Figure 9 As shown, this embodiment provides an information processing method including:
[0203] Step A: Add a monitoring module to the application code and package it to generate an APK file. The APK file here is the installation file.
[0204] Step B: After the APK file is installed, the monitoring module is called to obtain monitoring information during runtime, and it is determined whether the current application is a pirated application.
[0205] Said step A may comprise:
[0206] In the APP development stage, the monitoring module is added to the code project, and an APK file containing the monitoring module is packaged and released as a genuine application on the application channel. Specifically, to package the monitoring module into a library file, add the calling code of the library file in the startup code segment of the APP, obtain the SHA1-Digest values of all files contained in the APK after decompression, and encrypt them, store them in the ...
example 2
[0253] Such as Figure 12 As shown, this example provides a system applicable to the aforementioned information processing method: the system includes two parts: a monitoring software development kit SDK and a server.
[0254] The monitoring SDK is included in the application to be monitored as a library file, including a server-side interaction module 100 , a file difference comparison module 200 , and an APK feature extraction module 300 . As the cloud, the server side can interact with all applications to be monitored, issue instructions to them, and manage all application data, including monitoring SDK interaction module 400, risk score calculation module 500, pirated application monitoring management module 600, and monitoring SDK library files A module 700 is generated.
[0255] The function of the server-side interaction module 100 is mainly to interact with the server side. When the file difference comparison module finds that it is a pirated application, it sends pir...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The embodiment of the invention discloses an information processing method, a development platform, a client and an information system. The information processing method applied to the development platform includes the following steps: acquiring a monitoring module of a genuine application; acquiring a first characteristic value of the genuine application; and encapsulating the monitoring module,the first characteristic value and an application code of the genuine application to form an installation file of the genuine application, wherein the monitoring module is used for extracting a secondcharacteristic value of the current application in an application running process, comparing the second characteristic value with the first characteristic value, and further determining whether the current application is a pirated application. Thereby, by adding the monitoring module and the first characteristic value to the genuine application, the operation of automatically acquiring the secondcharacteristic value of the current application in a subsequent application running process can be facilitated; and through the comparison with the first characteristic value, whether the current application is the pirated application can be found in time, and the characteristic of simple operation can also be achieved.
Description
technical field [0001] The invention relates to the field of information technology, in particular to an application monitoring method, a development platform, a client and an information system. Background technique [0002] With the development of electronic technology and information, more and more applications (Application, App) are installed on electronic devices, and the types are also becoming more and more abundant. Lawbreakers think that it is profitable and usually release pirated apps. However, once pirated apps are installed in electronic devices, problems such as excessive interference information, leakage of user information, and frequent equipment failures often occur. [0003] Under normal circumstances, pirated apps are formed by tampering with genuine apps. And usually, the more downloads of genuine APPs, the more corresponding pirated versions. There are three main methods of tampering with genuine applications: [0004] The first: [0005] Implanting ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.