Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for security authentication of application programs

An application program and security certification technology, applied in the computer field, can solve problems such as blocking multiple security risks, and achieve the effect of improving security and overcoming security risks

Active Publication Date: 2022-04-26
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a method and device for security authentication of application programs, which can solve the problem that APPs face multiple security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for security authentication of application programs
  • A method and device for security authentication of application programs
  • A method and device for security authentication of application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0059] figure 1 is a schematic diagram of a main flow of a method for security authentication of an application program according to an embodiment of the present invention. As an embodiment of the present invention. The subject of execution of the method may be various terminals, such as mobile phones, tablet computers, personal computers, personal digital assistants, wea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for safety authentication of an application program, and relates to the technical field of computers. A specific implementation of the method includes: acquiring the dynamic attribute data of the master library, signing the dynamic attribute data, and generating a first dynamic signature; acquiring the static attribute data of the master library stored in the dynamic library, and signing the dynamic attribute data of the master library Sign the above static attribute data to generate a first static signature; compare whether the first dynamic signature is consistent with the first static signature, so as to complete the security authentication of the main library. This implementation manner can solve the problem that the APP is faced with multiple security risks.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for security authentication of application programs. Background technique [0002] Starting from the iOS 8 system (iPhone Operating System, a mobile operating system developed by Apple), the operating system allows APPs (Applications) with dynamic libraries to pass the review. With the development of the APP business, the size of the APP will become larger and larger. If APP continues to support iOS 7, it will face a limitation: Apple limits the size of executable files under the framework of iOS 7 to 60M. Therefore, it is necessary to convert part of the business into a dynamic library, that is, to transfer part of the executable files of the APP to the dynamic library. [0003] In the process of realizing the present invention, the inventor finds that there are at least the following problems in the prior art: since the dynamic library is placed in the r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247
Inventor 马德友
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD