Unlock instant, AI-driven research and patent intelligence for your innovation.

Applied security analysis method, device, computing device and computer storage medium

A technology for application security and security analysis, applied in the field of application security analysis methods, computing equipment, computer storage media, and devices, can solve problems such as low detection efficiency, time-consuming, one-sided detection results, etc., and achieve the effect of improving efficiency

Active Publication Date: 2021-06-15
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of using detection software for security analysis has the following disadvantages: first, the application entity of the mobile application must be detected, which takes a long time and has low detection efficiency; second, it can only detect specific dimensions, and the detection results are one-sided , and cannot comprehensively obtain the security of mobile applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Applied security analysis method, device, computing device and computer storage medium
  • Applied security analysis method, device, computing device and computer storage medium
  • Applied security analysis method, device, computing device and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] figure 1 A flow chart of an analysis method for application security according to an embodiment of the present invention is shown. This method is suitable for application security analysis equipment. Such as figure 1 As shown, the method includes:

[0026] Step S101: Capture the image of the area to be detected; identify one or more applications to be analyzed in the image, and obtain application icons and / or application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application security analysis method, device, computing equipment and computer storage medium. Among them, the method is suitable for applying security analysis equipment, intercepting the image of the area to be detected; identifying one or more applications to be analyzed in the image, and obtaining application icons and / or application names corresponding to one or more applications to be analyzed; For each application to be analyzed, match the application icon and / or application name of the application to be analyzed with multiple pre-stored reference applications; generate a security analysis report of one or more applications to be analyzed according to the matching results. The solution of the present invention does not need to perform security detection on the application entity of the application to be analyzed, but determines the security of the application to be analyzed through the matching result of the application name and / or application icon, thereby improving the efficiency of the analysis; and, according to multiple references The security analysis report generated by the matching result of the application is consistent with the security of the reference application, making the analysis result more accurate.

Description

technical field [0001] The present invention relates to the technical field of application security, in particular to an analysis method, device, computing device and computer storage medium of application security. Background technique [0002] Nowadays, users can meet various needs such as shopping, dining, and travel through mobile applications. It can be seen that the popularity of mobile applications has brought many conveniences to life. At the same time, with the dependence on mobile terminals, more and more private information such as personal identity information and fund account information are stored in mobile terminals. In mobile terminals, the security of mobile applications is an important guarantee for the security of private information. Therefore, it is particularly important to analyze the security of mobile applications. [0003] However, after actually downloading the mobile application, the user cannot obtain the security information of the mobile appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F2221/033
Inventor 汪德嘉华保健樊淇梁黄舒君张静王瑞麟
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD