CN108710801B - A kind of behavior management-control method of mobile application dynamically load code - Google Patents
A kind of behavior management-control method of mobile application dynamically load code Download PDFInfo
- Publication number
- CN108710801B CN108710801B CN201810534156.6A CN201810534156A CN108710801B CN 108710801 B CN108710801 B CN 108710801B CN 201810534156 A CN201810534156 A CN 201810534156A CN 108710801 B CN108710801 B CN 108710801B
- Authority
- CN
- China
- Prior art keywords
- api
- code
- dynamic execution
- execution code
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The present invention provides a kind of behavior management-control method of mobile application dynamically load code, comprising: server-side pre-establishes the first control rule database and the second control rule database;Before application software is online, server-side first corresponds to be scanned with the API of software, identifies that attribute first manages the API of rule database, and be encapsulated as the first safe API;When application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, load the control version of Dynamic Execution code, the control version of Dynamic Execution code is loaded in operational process, when the second safe API is called, mobile terminal obtains access authority corresponding with the second safe API by server-side inquiry the second control rule database.Advantage are as follows: the present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy leakage and property loss of user, improve the safety that user uses mobile application.
Description
Technical field
The invention belongs to mobile terminal dynamic codes to manage technical field, and in particular to a kind of mobile application dynamically load code
Behavior management-control method.
Background technique
Popularizing for cell phone, while facilitating users, also brings various safety problems.Currently, relatively more normal
The safety problem seen are as follows: the behavior of mobile application dynamically load Malware, mobile application dynamically load Malware refers to:
When user runs some mobile application, such as some APP software, in mobile application operational process, mobile application meeting and server
Carry out interacting message, and then from server dynamic download Malware, for example, wooden horse, virus, worm, DDoS, abduction, corpse,
Back door, spyware threaten software, extort software, ad ware and tracking software etc., hidden so as to cause user's property loss
Private leakage.And due to dynamic acquisition when above-mentioned Malware is mobile application operation, therefore, it is difficult to accurately be examined by antivirus software
It surveys.So how effectively to solve the above problems, the safety that user uses mobile application is improved, is in the urgent need to address at present
Thing.
Summary of the invention
In view of the defects existing in the prior art, the present invention provides a kind of behavior control side of mobile application dynamically load code
Method can effectively solve the above problems.
The technical solution adopted by the invention is as follows:
The present invention provides a kind of behavior management-control method of mobile application dynamically load code, comprising the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is for storing
It is all can dynamic loading code API API mark and corresponding local code store path;
Server-side pre-establishes the second control rule database, and the second control rule database is accessed for storing with privacy
The API of related API is identified, and each corresponding access authority of API related to privacy access;
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all
In API, the API then identified, if it is present in the first control rule database, if be not present,
Show that application software is carried out there is no the API for needing to be managed by normal flow, and terminates process;If it does, identifying
All API in, identify attribute first manage rule database API;
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, by its envelope
Dress is the first safe API;
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, first
Safe API obtains the ID of currently called Dynamic Execution code;Then, the first safe API is deposited according to corresponding local code
It is local to store up path scanning, judges local with the presence or absence of the Dynamic Execution corresponding with Dynamic Execution code ID downloaded and cached
The control version of code;If it does not, executing step 5;If it does, further judgement is corresponding with Dynamic Execution code ID
Whether the caching duration of the control version of Dynamic Execution code is more than effective time, if it does, executing step 5;If no
It is more than to then follow the steps 6;
Step 5:
Step 5.1, the first safe API sends inquiry dynamic to server using Dynamic Execution code ID as searching keyword
Execute the inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether server-side
In the presence of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present being returned to the first safe API
Notification message is downloaded, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and delays
There are locals, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether exist and Dynamic Execution code ID
Corresponding original Dynamic Execution code;If it does, executing step 5.4;If it does not exist, then in the first safe API transmission
The notification message for passing the corresponding original Dynamic Execution code of Dynamic Execution code ID, receives Dynamic Execution in the first safe API
After the corresponding original Dynamic Execution code of code ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code;
Detailed process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;So
Afterwards, it will identify that the API come is compared with the second control rule database, in all API identified, identify category
In the API of the second control rule database, then the API for belonging to the second control rule database identified is packaged, is obtained
To the second safe API;Original API in original Dynamic Execution code is replaced with into the second safe API, obtains Dynamic Execution code
Control version;
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages generation to server-side
Code library, and downloading notification message is returned to the first safe API, the first safe API downloading is corresponding with Dynamic Execution code ID dynamic
State executes the control version of code, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code are loaded fortune
During row, when the second safe API is called, mobile terminal by server-side inquiry the second control rule database, obtain and
The corresponding access authority of second safe API executes corresponding visiting demand, must visit if access authority is to allow to access
It asks as a result, terminating process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement
Access will be as a result, and will forge access result return, end process.
Preferably, Dynamic Execution code ID is the MD5 value of Dynamic Execution code.
A kind of behavior management-control method of mobile application dynamically load code provided by the invention has the advantage that
The present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy of user
Leakage and property loss improve the safety that user uses mobile application.
Detailed description of the invention
Fig. 1 is a kind of execution of the mobile terminal of the behavior management-control method of mobile application dynamically load software provided by the invention
Flow diagram;
Fig. 2 is a kind of execution of the server-side of the behavior management-control method of mobile application dynamically load software provided by the invention
Flow diagram;
Fig. 3 is a kind of overall flow signal of behavior management-control method of mobile application dynamically load software provided by the invention
Figure.
Specific embodiment
In order to which the technical problems, technical solutions and beneficial effects solved by the present invention is more clearly understood, below in conjunction with
Accompanying drawings and embodiments, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein only to
It explains the present invention, is not intended to limit the present invention.
The behavior of mobile application dynamically load code is managed to realize, the present invention provides a kind of mobile application dynamic
The behavior management-control method of loading code, with reference to Fig. 1-Fig. 3, comprising the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is for storing
It is all can dynamic loading code API API mark and corresponding local code store path;
Specifically, API (Application Programming Interface, application programming interface) is
Function predetermined, it is therefore an objective to provide application program and developer based on certain software or hardware and be able to one group of routine of access
Ability, and be not necessarily to access source code, or understand the details of internal work mechanism.
Currently, the API type for capableing of dynamically load code is very limited, since main purpose of the present invention is exactly to add to dynamic
It carries code behavior to be managed, therefore, the first control rule database stores all known API for capableing of dynamically load code
Mark.
Server-side pre-establishes the second control rule database, and the second control rule database is accessed for storing with privacy
The API of related API is identified, and each corresponding access authority of API related to privacy access;
Dynamic code behavior is divided into network access, file access, phone, short message, contact person, classification of recording, take pictures etc.,
Different behaviors are mapped to the calling of unused system API.After some API loads some dynamic code, this dynamic code is again
It can be mapped at least one API, this API may be related to privacy access, it is also possible to uncorrelated to privacy access.Therefore,
To realize that the behavior after being loaded to dynamic code is managed, server-side establishes the API mark of API related to privacy access
Know, and each corresponding access authority of API related to privacy access, for example, being used for the API of telephonograph, access authority
Are as follows: forbid accessing;For reading the API of contact person, access authority are as follows: forbid accessing.For the API of network access, visit
Ask permission are as follows: allow to access.
The access authority of each API can flexibly match in the second control rule database of server-side according to actual needs
It sets, the present invention is not intended to limit this.
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all
API, it is first layer API that scanning recognition, which goes out, herein, in the API then identified, if is present in first pipe
Rule database is controlled, if be not present, showing application software, there is no the API for needing to be managed, that is to say, that knows at this time
Not Chu API, be not intended to the API of dynamically load code, therefore do not handle, carried out by normal flow, and terminate process;If
In the presence of identifying that attribute first manages the API of rule database, that is, in application software in all API identified
In, identify it is all can dynamic loading code API.
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, encapsulation side
Formula is to pre-process by source code level and binary code level, is encapsulated as the first safe API;
The concrete function of first safe API embodies in the step of being described below.
Then, the application software after abstract API is downloaded for mobile terminal.
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, first
Safe API obtains the ID of currently called Dynamic Execution code;Herein, the ID of Dynamic Execution code is Dynamic Execution code
Characteristic parameter, for example, being MD5 value.By carrying out analysis identification to unknown Dynamic Execution code, can obtain and Dynamic Execution
The unique corresponding MD5 value of code.Wherein, MD5, that is, Message-Digest Algorithm 5 (Message-Digest Algorithm 5) is meter
One of widely used hash algorithm of calculation machine (and translating digest algorithm, hash algorithm).
Then, the first safe API is scanned local according to corresponding local code store path, is judged local with the presence or absence of
The control version of Dynamic Execution code corresponding with Dynamic Execution code ID downloaded and cached;If it does not, executing step
Rapid 5;If it does, further judging the caching duration of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID
Whether more than effective time, such as 48 hours, if it does, executing step 5;If be not above, 6 are thened follow the steps;
Step 5:
Step 5.1, the first safe API sends inquiry dynamic to server using Dynamic Execution code ID as searching keyword
Execute the inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether server-side
In the presence of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present being returned to the first safe API
Notification message is downloaded, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and delays
There are locals, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether exist and Dynamic Execution code ID
Corresponding original Dynamic Execution code;If it does, executing step 5.4;If it does not exist, then in the first safe API transmission
The notification message for passing the corresponding original Dynamic Execution code of Dynamic Execution code ID, receives Dynamic Execution in the first safe API
After the corresponding original Dynamic Execution code of code ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code;
Detailed process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;Herein
The API identified is second layer API, then, will identify that the API come is compared with the second control rule database, is knowing
Not Chu Lai all API in, identify the API for belonging to the second control rule database, then belong to the second control to what is identified
The API of rule database is packaged, and obtains the second safe API;Original API in original Dynamic Execution code is replaced with
Two safe API obtain the control version of Dynamic Execution code;
The concrete function of second safe API, embodies in step below.
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages generation to server-side
Code library, and downloading notification message is returned to the first safe API, the first safe API downloading is corresponding with Dynamic Execution code ID dynamic
State executes the control version of code, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code are loaded fortune
During row, when the second safe API is called, mobile terminal by server-side inquiry the second control rule database, obtain and
The corresponding access authority of second safe API executes corresponding visiting demand, must visit if access authority is to allow to access
It asks as a result, terminating process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement
Access will be as a result, and will forge access result return, end process.
It is accessed as it can be seen that dynamic code behavior is divided into network, file access, phone, short message, contact person, recording, take pictures etc.
Classification, different behaviors are mapped to the calling of unused system API, and the present invention is by reading configuration and in dynamic code
API Calls are HOOK, generate control code, corresponding behavior have been known that according to API Calls when control code is run, according to clothes
The permission of business end configuration, for improper activity, permission is to forbid, to turn off the API Calls permission of improper activity.
The present invention by setting the first safe API, identify first can dynamic loading code API;Then, for movable
The dynamic code that the API of state loading code is loaded, due to the feature of dynamic code, be it is unknown, therefore, will be in dynamic code
API relevant to privacy access is encapsulated as the second safe API, by the second safe API, judges the dynamic code that API is loaded
Concrete behavior whether be allowed, if it is not allowed, then forbid the calling of corresponding A PI, guarantee system safety.
With the continuous operation of system, the first control rule database and the second control rule database can be gradually perfect,
Server-side manages code library also simultaneously can be more and more perfect, therefore, manages ability to the behavior of mobile application dynamically load code
It can be more and more stronger.
A kind of behavior management-control method of mobile application dynamically load code provided by the invention has the advantage that
The present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy of user
Leakage and property loss improve the safety that user uses mobile application.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
Depending on protection scope of the present invention.
Claims (2)
1. a kind of behavior management-control method of mobile application dynamically load code, which comprises the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is all for storing
Can dynamic loading code API API mark and corresponding local code store path;
Server-side pre-establishes the second control rule database, and the second control rule database is related to privacy access for storing
The API of API is identified, and each corresponding access authority of API related to privacy access;
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all API, so
In the API identified afterwards, if be present in the first control rule database and show to answer if be not present
It is carried out there is no the API for needing to be managed by normal flow with software, and terminates process;If it does, all what is identified
In API, identify that attribute first manages the API of rule database;
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, be encapsulated for
First safe API;
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, the first safety
API obtains the ID of currently called Dynamic Execution code;Then, the first safe API stores road according to corresponding local code
Diameter scanning is local, judges local with the presence or absence of the Dynamic Execution code corresponding with Dynamic Execution code ID downloaded and cached
Control version;If it does not, executing step 5;If it does, further judging dynamic corresponding with Dynamic Execution code ID
Whether the caching duration for executing the control version of code is more than effective time, if it does, executing step 5;If be not above,
Then follow the steps 6;
Step 5:
Step 5.1, the first safe API sends inquiry Dynamic Execution to server using Dynamic Execution code ID as searching keyword
The inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether there is server-side
The control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present returning to downloading to the first safe API
Notification message, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and is buffered in
It is local, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether to exist corresponding with Dynamic Execution code ID
Original Dynamic Execution code;If it does, executing step 5.4;It is driven if it does not exist, then being sent to the first safe API
State executes the notification message of the corresponding original Dynamic Execution code of code ID, receives Dynamic Execution code in the first safe API
After the corresponding original Dynamic Execution code of ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code;Specifically
Process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;Then, will
The API identified is compared with the second control rule database, in all API identified, identifies and belongs to the
The API of two control rule databases, then is packaged the API for belonging to the second control rule database identified, obtains the
Two safe API;Original API in original Dynamic Execution code is replaced with into the second safe API, obtains the pipe of Dynamic Execution code
Control version;
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages code to server-side
Library, and downloading notification message is returned to the first safe API, the first safe API downloads dynamic corresponding with Dynamic Execution code ID
The control version of code is executed, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code, which is loaded, to be run
Cheng Zhong, when the second safe API is called, mobile terminal is obtained and second by server-side inquiry the second control rule database
The corresponding access authority of safe API executes corresponding visiting demand if access authority is to allow to access, and obtains access knot
Fruit terminates process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement and accesses
As a result, and access result return, end process will be forged.
2. a kind of behavior management-control method of mobile application dynamically load code according to claim 1, which is characterized in that dynamic
State executes the MD5 value that code ID is Dynamic Execution code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810534156.6A CN108710801B (en) | 2018-05-29 | 2018-05-29 | A kind of behavior management-control method of mobile application dynamically load code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810534156.6A CN108710801B (en) | 2018-05-29 | 2018-05-29 | A kind of behavior management-control method of mobile application dynamically load code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108710801A CN108710801A (en) | 2018-10-26 |
CN108710801B true CN108710801B (en) | 2019-03-22 |
Family
ID=63870033
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810534156.6A Expired - Fee Related CN108710801B (en) | 2018-05-29 | 2018-05-29 | A kind of behavior management-control method of mobile application dynamically load code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108710801B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124474B (en) * | 2018-10-31 | 2022-02-15 | 北京数聚鑫云信息技术有限公司 | API version control method and device |
CN109558725A (en) * | 2018-12-05 | 2019-04-02 | 南京大学 | A kind of method for secret protection for android system dynamically load situation based on pitching pile |
CN112560083B (en) * | 2020-12-02 | 2023-04-18 | 支付宝(杭州)信息技术有限公司 | Safety protection method and device and electronic equipment |
CN112596823B (en) * | 2020-12-23 | 2023-03-21 | 支付宝(杭州)信息技术有限公司 | Safety control method and device and electronic equipment |
CN112926049A (en) * | 2021-03-25 | 2021-06-08 | 支付宝(杭州)信息技术有限公司 | Information risk prevention and control method, device and equipment |
CN115208933A (en) * | 2022-07-07 | 2022-10-18 | 成都域卫科技有限公司 | Software application control method, device and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105493470A (en) * | 2013-08-28 | 2016-04-13 | 亚马逊科技公司 | Dynamic application security verification |
CN106778088A (en) * | 2016-11-28 | 2017-05-31 | 四川长虹电器股份有限公司 | Dynamic loading method based on Hook technologies |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2012154838A2 (en) * | 2011-05-09 | 2012-11-15 | Google Inc. | Generating application recommendations based on user installed applications |
CN103927476B (en) * | 2014-05-07 | 2017-09-15 | 上海联彤网络通讯技术有限公司 | Realize the intelligence system and method for application program rights management |
CN105656860A (en) * | 2014-11-20 | 2016-06-08 | 中兴通讯股份有限公司 | Safety management and control method, apparatus and system for Android system |
CN107241298B (en) * | 2016-03-29 | 2020-06-23 | 阿里巴巴集团控股有限公司 | Application control method, terminal and system |
-
2018
- 2018-05-29 CN CN201810534156.6A patent/CN108710801B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105493470A (en) * | 2013-08-28 | 2016-04-13 | 亚马逊科技公司 | Dynamic application security verification |
CN106778088A (en) * | 2016-11-28 | 2017-05-31 | 四川长虹电器股份有限公司 | Dynamic loading method based on Hook technologies |
Also Published As
Publication number | Publication date |
---|---|
CN108710801A (en) | 2018-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108710801B (en) | A kind of behavior management-control method of mobile application dynamically load code | |
KR101071597B1 (en) | Update system and method for updating a scanning subsystem in a mobile communication framework | |
CN105427096B (en) | Payment security sandbox implementation method and system and application program monitoring method and system | |
US9158918B2 (en) | Method and apparatus for determining malicious program | |
US7392043B2 (en) | API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework | |
US9112899B2 (en) | Remedial action against malicious code at a client facility | |
KR101120447B1 (en) | System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device | |
CA2517553C (en) | Platform-independent scanning subsystem api for use in a mobile communication framework | |
CN103632096B (en) | A kind of method and apparatus that safety detection is carried out to equipment | |
CN103679031B (en) | A kind of immune method and apparatus of file virus | |
CN109818937A (en) | For the control method of Android permission, device and storage medium, electronic device | |
US11086983B2 (en) | System and method for authenticating safe software | |
US20130122861A1 (en) | System and method for verifying apps for smart phone | |
US10257222B2 (en) | Cloud checking and killing method, device and system for combating anti-antivirus test | |
Hu et al. | Migdroid: Detecting app-repackaging android malware via method invocation graph | |
CN103207970B (en) | Virus document scan method and device | |
CN103116722A (en) | Processing method, processing device and processing system of notification board information | |
CN106372465A (en) | Safety management method and system for dynamic link library and electronic equipment | |
CN108763921A (en) | A kind of method of application software and SDK management and control | |
CN110084064B (en) | Big data analysis processing method and system based on terminal | |
US20240143734A1 (en) | RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs) | |
CN110071924B (en) | Big data analysis method and system based on terminal | |
EP2693349A1 (en) | A system and method for massive call data storage and retrieval | |
KR102648653B1 (en) | Mail security-based zero-day URL attack defense service providing device and method of operation | |
CN113949579A (en) | Website attack defense method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190322 |
|
CF01 | Termination of patent right due to non-payment of annual fee |