Verification method for application program, terminal equipment and storage medium

A technology of application programs and verification methods, applied in the field of information security, can solve problems such as the inability to verify the legality, and achieve the effect of verifying the legality and avoiding attacks.

Active Publication Date: 2018-06-29
PAX COMP TECH SHENZHEN
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides an application program verification method, a terminal device and a storage medium to solve the current problem that the application program cannot verify its legitimacy after installation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method for application program, terminal equipment and storage medium
  • Verification method for application program, terminal equipment and storage medium
  • Verification method for application program, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure and technology are proposed for a thorough understanding of the embodiments of the present application. However, it should be clear to those skilled in the art that the present application can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known systems, devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of this application.

[0023] It should be understood that when used in this specification and appended claims, the term "comprising" indicates the existence of the described features, wholes, steps, operations, elements, and / or components, but does not exclude one or more other features , The existence or addition of a whole, a step, an operation, an element, a component, and / or a collection thereof.

[0024] It ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security and provides a verification method for an application program, terminal equipment and a storage medium. The method comprises the steps that after the application program is installed, a core assembly of the application program is encrypted to generate ciphertext, the generated ciphertext is stored in a preset storage space, undera preset trigger mechanism, the core assembly of the application program is encrypted again to generate the ciphertext, the newly-generated ciphertext is matched with the ciphertext stored in the storage space, and if matching fails, the application program is forbidden from running or the running application program is forced to be stopped. According to the verification method, the legality of the installed application program can be verified.

Description

Technical field [0001] This application belongs to the field of information security technology, and in particular relates to an application verification method, terminal device and storage medium. Background technique [0002] Android is a free and open source operating system based on Linux, mainly used in mobile devices, such as smart phones and tablet computers. With the rapid development of the Internet, massive applications based on the android system have also been born. [0003] Android system applications usually undergo security verification during installation. After the installation is completed, verification of installed applications is no longer provided. However, the application program may also be tampered with by attack after installation. Therefore, the existing verification method of the application program cannot verify the legality of the installed application program. Summary of the invention [0004] In view of this, the embodiments of the present applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52
CPCG06F21/52G06F2221/033
Inventor 赵荣辉罗玉海曾检生
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products