CN108710801B - A kind of behavior management-control method of mobile application dynamically load code - Google Patents

A kind of behavior management-control method of mobile application dynamically load code Download PDF

Info

Publication number
CN108710801B
CN108710801B CN201810534156.6A CN201810534156A CN108710801B CN 108710801 B CN108710801 B CN 108710801B CN 201810534156 A CN201810534156 A CN 201810534156A CN 108710801 B CN108710801 B CN 108710801B
Authority
CN
China
Prior art keywords
api
code
dynamic execution
execution code
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810534156.6A
Other languages
Chinese (zh)
Other versions
CN108710801A (en
Inventor
邹勇
胡超博
朱建锋
赵盛先
周亚金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dino Yijia Mdt Infotech Ltd
Original Assignee
Beijing Dino Yijia Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dino Yijia Mdt Infotech Ltd filed Critical Beijing Dino Yijia Mdt Infotech Ltd
Priority to CN201810534156.6A priority Critical patent/CN108710801B/en
Publication of CN108710801A publication Critical patent/CN108710801A/en
Application granted granted Critical
Publication of CN108710801B publication Critical patent/CN108710801B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Virology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention provides a kind of behavior management-control method of mobile application dynamically load code, comprising: server-side pre-establishes the first control rule database and the second control rule database;Before application software is online, server-side first corresponds to be scanned with the API of software, identifies that attribute first manages the API of rule database, and be encapsulated as the first safe API;When application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, load the control version of Dynamic Execution code, the control version of Dynamic Execution code is loaded in operational process, when the second safe API is called, mobile terminal obtains access authority corresponding with the second safe API by server-side inquiry the second control rule database.Advantage are as follows: the present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy leakage and property loss of user, improve the safety that user uses mobile application.

Description

A kind of behavior management-control method of mobile application dynamically load code
Technical field
The invention belongs to mobile terminal dynamic codes to manage technical field, and in particular to a kind of mobile application dynamically load code Behavior management-control method.
Background technique
Popularizing for cell phone, while facilitating users, also brings various safety problems.Currently, relatively more normal The safety problem seen are as follows: the behavior of mobile application dynamically load Malware, mobile application dynamically load Malware refers to: When user runs some mobile application, such as some APP software, in mobile application operational process, mobile application meeting and server Carry out interacting message, and then from server dynamic download Malware, for example, wooden horse, virus, worm, DDoS, abduction, corpse, Back door, spyware threaten software, extort software, ad ware and tracking software etc., hidden so as to cause user's property loss Private leakage.And due to dynamic acquisition when above-mentioned Malware is mobile application operation, therefore, it is difficult to accurately be examined by antivirus software It surveys.So how effectively to solve the above problems, the safety that user uses mobile application is improved, is in the urgent need to address at present Thing.
Summary of the invention
In view of the defects existing in the prior art, the present invention provides a kind of behavior control side of mobile application dynamically load code Method can effectively solve the above problems.
The technical solution adopted by the invention is as follows:
The present invention provides a kind of behavior management-control method of mobile application dynamically load code, comprising the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is for storing It is all can dynamic loading code API API mark and corresponding local code store path;
Server-side pre-establishes the second control rule database, and the second control rule database is accessed for storing with privacy The API of related API is identified, and each corresponding access authority of API related to privacy access;
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all In API, the API then identified, if it is present in the first control rule database, if be not present, Show that application software is carried out there is no the API for needing to be managed by normal flow, and terminates process;If it does, identifying All API in, identify attribute first manage rule database API;
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, by its envelope Dress is the first safe API;
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, first Safe API obtains the ID of currently called Dynamic Execution code;Then, the first safe API is deposited according to corresponding local code It is local to store up path scanning, judges local with the presence or absence of the Dynamic Execution corresponding with Dynamic Execution code ID downloaded and cached The control version of code;If it does not, executing step 5;If it does, further judgement is corresponding with Dynamic Execution code ID Whether the caching duration of the control version of Dynamic Execution code is more than effective time, if it does, executing step 5;If no It is more than to then follow the steps 6;
Step 5:
Step 5.1, the first safe API sends inquiry dynamic to server using Dynamic Execution code ID as searching keyword Execute the inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether server-side In the presence of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present being returned to the first safe API Notification message is downloaded, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and delays There are locals, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether exist and Dynamic Execution code ID Corresponding original Dynamic Execution code;If it does, executing step 5.4;If it does not exist, then in the first safe API transmission The notification message for passing the corresponding original Dynamic Execution code of Dynamic Execution code ID, receives Dynamic Execution in the first safe API After the corresponding original Dynamic Execution code of code ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code; Detailed process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;So Afterwards, it will identify that the API come is compared with the second control rule database, in all API identified, identify category In the API of the second control rule database, then the API for belonging to the second control rule database identified is packaged, is obtained To the second safe API;Original API in original Dynamic Execution code is replaced with into the second safe API, obtains Dynamic Execution code Control version;
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages generation to server-side Code library, and downloading notification message is returned to the first safe API, the first safe API downloading is corresponding with Dynamic Execution code ID dynamic State executes the control version of code, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code are loaded fortune During row, when the second safe API is called, mobile terminal by server-side inquiry the second control rule database, obtain and The corresponding access authority of second safe API executes corresponding visiting demand, must visit if access authority is to allow to access It asks as a result, terminating process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement Access will be as a result, and will forge access result return, end process.
Preferably, Dynamic Execution code ID is the MD5 value of Dynamic Execution code.
A kind of behavior management-control method of mobile application dynamically load code provided by the invention has the advantage that
The present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy of user Leakage and property loss improve the safety that user uses mobile application.
Detailed description of the invention
Fig. 1 is a kind of execution of the mobile terminal of the behavior management-control method of mobile application dynamically load software provided by the invention Flow diagram;
Fig. 2 is a kind of execution of the server-side of the behavior management-control method of mobile application dynamically load software provided by the invention Flow diagram;
Fig. 3 is a kind of overall flow signal of behavior management-control method of mobile application dynamically load software provided by the invention Figure.
Specific embodiment
In order to which the technical problems, technical solutions and beneficial effects solved by the present invention is more clearly understood, below in conjunction with Accompanying drawings and embodiments, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein only to It explains the present invention, is not intended to limit the present invention.
The behavior of mobile application dynamically load code is managed to realize, the present invention provides a kind of mobile application dynamic The behavior management-control method of loading code, with reference to Fig. 1-Fig. 3, comprising the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is for storing It is all can dynamic loading code API API mark and corresponding local code store path;
Specifically, API (Application Programming Interface, application programming interface) is Function predetermined, it is therefore an objective to provide application program and developer based on certain software or hardware and be able to one group of routine of access Ability, and be not necessarily to access source code, or understand the details of internal work mechanism.
Currently, the API type for capableing of dynamically load code is very limited, since main purpose of the present invention is exactly to add to dynamic It carries code behavior to be managed, therefore, the first control rule database stores all known API for capableing of dynamically load code Mark.
Server-side pre-establishes the second control rule database, and the second control rule database is accessed for storing with privacy The API of related API is identified, and each corresponding access authority of API related to privacy access;
Dynamic code behavior is divided into network access, file access, phone, short message, contact person, classification of recording, take pictures etc., Different behaviors are mapped to the calling of unused system API.After some API loads some dynamic code, this dynamic code is again It can be mapped at least one API, this API may be related to privacy access, it is also possible to uncorrelated to privacy access.Therefore, To realize that the behavior after being loaded to dynamic code is managed, server-side establishes the API mark of API related to privacy access Know, and each corresponding access authority of API related to privacy access, for example, being used for the API of telephonograph, access authority Are as follows: forbid accessing;For reading the API of contact person, access authority are as follows: forbid accessing.For the API of network access, visit Ask permission are as follows: allow to access.
The access authority of each API can flexibly match in the second control rule database of server-side according to actual needs It sets, the present invention is not intended to limit this.
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all API, it is first layer API that scanning recognition, which goes out, herein, in the API then identified, if is present in first pipe Rule database is controlled, if be not present, showing application software, there is no the API for needing to be managed, that is to say, that knows at this time Not Chu API, be not intended to the API of dynamically load code, therefore do not handle, carried out by normal flow, and terminate process;If In the presence of identifying that attribute first manages the API of rule database, that is, in application software in all API identified In, identify it is all can dynamic loading code API.
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, encapsulation side Formula is to pre-process by source code level and binary code level, is encapsulated as the first safe API;
The concrete function of first safe API embodies in the step of being described below.
Then, the application software after abstract API is downloaded for mobile terminal.
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, first Safe API obtains the ID of currently called Dynamic Execution code;Herein, the ID of Dynamic Execution code is Dynamic Execution code Characteristic parameter, for example, being MD5 value.By carrying out analysis identification to unknown Dynamic Execution code, can obtain and Dynamic Execution The unique corresponding MD5 value of code.Wherein, MD5, that is, Message-Digest Algorithm 5 (Message-Digest Algorithm 5) is meter One of widely used hash algorithm of calculation machine (and translating digest algorithm, hash algorithm).
Then, the first safe API is scanned local according to corresponding local code store path, is judged local with the presence or absence of The control version of Dynamic Execution code corresponding with Dynamic Execution code ID downloaded and cached;If it does not, executing step Rapid 5;If it does, further judging the caching duration of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID Whether more than effective time, such as 48 hours, if it does, executing step 5;If be not above, 6 are thened follow the steps;
Step 5:
Step 5.1, the first safe API sends inquiry dynamic to server using Dynamic Execution code ID as searching keyword Execute the inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether server-side In the presence of the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present being returned to the first safe API Notification message is downloaded, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and delays There are locals, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether exist and Dynamic Execution code ID Corresponding original Dynamic Execution code;If it does, executing step 5.4;If it does not exist, then in the first safe API transmission The notification message for passing the corresponding original Dynamic Execution code of Dynamic Execution code ID, receives Dynamic Execution in the first safe API After the corresponding original Dynamic Execution code of code ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code; Detailed process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;Herein The API identified is second layer API, then, will identify that the API come is compared with the second control rule database, is knowing Not Chu Lai all API in, identify the API for belonging to the second control rule database, then belong to the second control to what is identified The API of rule database is packaged, and obtains the second safe API;Original API in original Dynamic Execution code is replaced with Two safe API obtain the control version of Dynamic Execution code;
The concrete function of second safe API, embodies in step below.
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages generation to server-side Code library, and downloading notification message is returned to the first safe API, the first safe API downloading is corresponding with Dynamic Execution code ID dynamic State executes the control version of code, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code are loaded fortune During row, when the second safe API is called, mobile terminal by server-side inquiry the second control rule database, obtain and The corresponding access authority of second safe API executes corresponding visiting demand, must visit if access authority is to allow to access It asks as a result, terminating process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement Access will be as a result, and will forge access result return, end process.
It is accessed as it can be seen that dynamic code behavior is divided into network, file access, phone, short message, contact person, recording, take pictures etc. Classification, different behaviors are mapped to the calling of unused system API, and the present invention is by reading configuration and in dynamic code API Calls are HOOK, generate control code, corresponding behavior have been known that according to API Calls when control code is run, according to clothes The permission of business end configuration, for improper activity, permission is to forbid, to turn off the API Calls permission of improper activity.
The present invention by setting the first safe API, identify first can dynamic loading code API;Then, for movable The dynamic code that the API of state loading code is loaded, due to the feature of dynamic code, be it is unknown, therefore, will be in dynamic code API relevant to privacy access is encapsulated as the second safe API, by the second safe API, judges the dynamic code that API is loaded Concrete behavior whether be allowed, if it is not allowed, then forbid the calling of corresponding A PI, guarantee system safety.
With the continuous operation of system, the first control rule database and the second control rule database can be gradually perfect, Server-side manages code library also simultaneously can be more and more perfect, therefore, manages ability to the behavior of mobile application dynamically load code It can be more and more stronger.
A kind of behavior management-control method of mobile application dynamically load code provided by the invention has the advantage that
The present invention can the behavior effectively to dynamically load code manage, to be effectively prevented the privacy of user Leakage and property loss improve the safety that user uses mobile application.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered Depending on protection scope of the present invention.

Claims (2)

1. a kind of behavior management-control method of mobile application dynamically load code, which comprises the following steps:
Step 1, server-side pre-establishes the first control rule database, and the first control rule database is all for storing Can dynamic loading code API API mark and corresponding local code store path;
Server-side pre-establishes the second control rule database, and the second control rule database is related to privacy access for storing The API of API is identified, and each corresponding access authority of API related to privacy access;
Step 2, before application software is online, server-side first corresponds to be scanned with the API of software, identifies all API, so In the API identified afterwards, if be present in the first control rule database and show to answer if be not present It is carried out there is no the API for needing to be managed by normal flow with software, and terminates process;If it does, all what is identified In API, identify that attribute first manages the API of rule database;
Step 3, server-side is packaged the API for belonging to the first control rule database that step 2 identifies, be encapsulated for First safe API;
Step 4, when application software is run by mobile terminal, when the first safe API is called by Dynamic Execution code, the first safety API obtains the ID of currently called Dynamic Execution code;Then, the first safe API stores road according to corresponding local code Diameter scanning is local, judges local with the presence or absence of the Dynamic Execution code corresponding with Dynamic Execution code ID downloaded and cached Control version;If it does not, executing step 5;If it does, further judging dynamic corresponding with Dynamic Execution code ID Whether the caching duration for executing the control version of code is more than effective time, if it does, executing step 5;If be not above, Then follow the steps 6;
Step 5:
Step 5.1, the first safe API sends inquiry Dynamic Execution to server using Dynamic Execution code ID as searching keyword The inquiry request of the control version of code;
Step 5.2, using Dynamic Execution code ID as term, query service end pipe control code library judges whether there is server-side The control version of Dynamic Execution code corresponding with Dynamic Execution code ID, if it is present returning to downloading to the first safe API Notification message, the first safe API downloads the control version of Dynamic Execution code corresponding with Dynamic Execution code ID, and is buffered in It is local, then execute step 6;If it does not exist, then executing step 5.3;
Step 5.3, server-side query service end source code library further determines whether to exist corresponding with Dynamic Execution code ID Original Dynamic Execution code;If it does, executing step 5.4;It is driven if it does not exist, then being sent to the first safe API State executes the notification message of the corresponding original Dynamic Execution code of code ID, receives Dynamic Execution code in the first safe API After the corresponding original Dynamic Execution code of ID, it is stored to server-side source code library, then execute step 5.4;
Step 5.4, server-side is based on original Dynamic Execution code, generates the control version of corresponding Dynamic Execution code;Specifically Process are as follows:
Server-side scans original Dynamic Execution code, identifies all API embedded by original Dynamic Execution code;Then, will The API identified is compared with the second control rule database, in all API identified, identifies and belongs to the The API of two control rule databases, then is packaged the API for belonging to the second control rule database identified, obtains the Two safe API;Original API in original Dynamic Execution code is replaced with into the second safe API, obtains the pipe of Dynamic Execution code Control version;
Step 5.5, the control version storage for the Dynamic Execution code that server-side obtains step 5.4 manages code to server-side Library, and downloading notification message is returned to the first safe API, the first safe API downloads dynamic corresponding with Dynamic Execution code ID The control version of code is executed, and is buffered in local, then executes step 6;
Step 6, the control version of mobile terminal load Dynamic Execution code, the control version of Dynamic Execution code, which is loaded, to be run Cheng Zhong, when the second safe API is called, mobile terminal is obtained and second by server-side inquiry the second control rule database The corresponding access authority of safe API executes corresponding visiting demand if access authority is to allow to access, and obtains access knot Fruit terminates process;If it is forbidding accessing, the second safe API forges a forgery corresponding with current accessed requirement and accesses As a result, and access result return, end process will be forged.
2. a kind of behavior management-control method of mobile application dynamically load code according to claim 1, which is characterized in that dynamic State executes the MD5 value that code ID is Dynamic Execution code.
CN201810534156.6A 2018-05-29 2018-05-29 A kind of behavior management-control method of mobile application dynamically load code Expired - Fee Related CN108710801B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810534156.6A CN108710801B (en) 2018-05-29 2018-05-29 A kind of behavior management-control method of mobile application dynamically load code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810534156.6A CN108710801B (en) 2018-05-29 2018-05-29 A kind of behavior management-control method of mobile application dynamically load code

Publications (2)

Publication Number Publication Date
CN108710801A CN108710801A (en) 2018-10-26
CN108710801B true CN108710801B (en) 2019-03-22

Family

ID=63870033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810534156.6A Expired - Fee Related CN108710801B (en) 2018-05-29 2018-05-29 A kind of behavior management-control method of mobile application dynamically load code

Country Status (1)

Country Link
CN (1) CN108710801B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124474B (en) * 2018-10-31 2022-02-15 北京数聚鑫云信息技术有限公司 API version control method and device
CN109558725A (en) * 2018-12-05 2019-04-02 南京大学 A kind of method for secret protection for android system dynamically load situation based on pitching pile
CN112560083B (en) * 2020-12-02 2023-04-18 支付宝(杭州)信息技术有限公司 Safety protection method and device and electronic equipment
CN112596823B (en) * 2020-12-23 2023-03-21 支付宝(杭州)信息技术有限公司 Safety control method and device and electronic equipment
CN112926049A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Information risk prevention and control method, device and equipment
CN115208933A (en) * 2022-07-07 2022-10-18 成都域卫科技有限公司 Software application control method, device and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105493470A (en) * 2013-08-28 2016-04-13 亚马逊科技公司 Dynamic application security verification
CN106778088A (en) * 2016-11-28 2017-05-31 四川长虹电器股份有限公司 Dynamic loading method based on Hook technologies

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012154838A2 (en) * 2011-05-09 2012-11-15 Google Inc. Generating application recommendations based on user installed applications
CN103927476B (en) * 2014-05-07 2017-09-15 上海联彤网络通讯技术有限公司 Realize the intelligence system and method for application program rights management
CN105656860A (en) * 2014-11-20 2016-06-08 中兴通讯股份有限公司 Safety management and control method, apparatus and system for Android system
CN107241298B (en) * 2016-03-29 2020-06-23 阿里巴巴集团控股有限公司 Application control method, terminal and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105493470A (en) * 2013-08-28 2016-04-13 亚马逊科技公司 Dynamic application security verification
CN106778088A (en) * 2016-11-28 2017-05-31 四川长虹电器股份有限公司 Dynamic loading method based on Hook technologies

Also Published As

Publication number Publication date
CN108710801A (en) 2018-10-26

Similar Documents

Publication Publication Date Title
CN108710801B (en) A kind of behavior management-control method of mobile application dynamically load code
KR101071597B1 (en) Update system and method for updating a scanning subsystem in a mobile communication framework
CN105427096B (en) Payment security sandbox implementation method and system and application program monitoring method and system
US9158918B2 (en) Method and apparatus for determining malicious program
US7392043B2 (en) API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework
US9112899B2 (en) Remedial action against malicious code at a client facility
KR101120447B1 (en) System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
CA2517553C (en) Platform-independent scanning subsystem api for use in a mobile communication framework
CN103632096B (en) A kind of method and apparatus that safety detection is carried out to equipment
CN103679031B (en) A kind of immune method and apparatus of file virus
CN109818937A (en) For the control method of Android permission, device and storage medium, electronic device
US11086983B2 (en) System and method for authenticating safe software
US20130122861A1 (en) System and method for verifying apps for smart phone
US10257222B2 (en) Cloud checking and killing method, device and system for combating anti-antivirus test
Hu et al. Migdroid: Detecting app-repackaging android malware via method invocation graph
CN103207970B (en) Virus document scan method and device
CN103116722A (en) Processing method, processing device and processing system of notification board information
CN106372465A (en) Safety management method and system for dynamic link library and electronic equipment
CN108763921A (en) A kind of method of application software and SDK management and control
CN110084064B (en) Big data analysis processing method and system based on terminal
US20240143734A1 (en) RESTRICTING ACCESS TO APPLICATION PROGRAMMING INTERFACES (APIs)
CN110071924B (en) Big data analysis method and system based on terminal
EP2693349A1 (en) A system and method for massive call data storage and retrieval
KR102648653B1 (en) Mail security-based zero-day URL attack defense service providing device and method of operation
CN113949579A (en) Website attack defense method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190322

CF01 Termination of patent right due to non-payment of annual fee