Method, device and terminal for dynamically detecting simulator

A dynamic detection and simulator technology, applied in the field of information security, can solve problems such as unsatisfactory effects, achieve the effects of not easy to identify, reduce memory pressure, and increase security

Active Publication Date: 2019-08-20
武汉瓯越网视有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are a large number of detection methods for simulators, but most of the detection methods are to pre-write the detection code in the APP. This method makes it easy for hackers to find the preset detection code through mem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for dynamically detecting simulator
  • Method, device and terminal for dynamically detecting simulator
  • Method, device and terminal for dynamically detecting simulator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0029]The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for dynamically detecting a simulator, which is used for a terminal and relates to the technical field of information security. The method comprises steps of obtainingdetection codes, calling a memory allocation function mmap (), and allocating a first memory area and a second memory area from the system memory; calling a system file reading function, searching aspecified system module from the system memory, and copying codes of the specified system module to the first memory area; inserting the detection codes into the codes of the specified system module;calling a memory copy function Memcpy (), and copying the detection code from the first memory area to the second memory area; executing the detection code stored in the second memory area to obtain adetection result; releasing the first memory area and the second memory area; and sending the detection result to the server, so that the server judges whether the terminal is a simulator according to the execution result. The invention further provides a device and a terminal for dynamically detecting the simulator. The above process can effectively hide the detection code and prevent the detection code from being discovered and cracked by hackers.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to a method, device and terminal for dynamically detecting a simulator. Background technique [0002] With the development of the Internet, the application of the application program (Application, APP for short) of the Android system is more and more common. Hackers often simulate the Android system on the computer through the emulator, and use the operating environment of the terminal APP to simulate illegal activities such as flashing the phone, flashing the installed capacity, and swiping various lottery welfare data in the APP. In order to make the APP of the Android system safe and reliable, and to protect the legitimate rights and interests of APP users and developers, it is necessary to determine whether the APP has been hacked by judging whether the operating environment of the APP is a simulator. [0003] At present, there are a large number of de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36G06F21/44G06F21/60
CPCG06F11/3628G06F21/602G06F21/44G06F21/56
Inventor 周志刚
Owner 武汉瓯越网视有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products