CN107563188A - Safe evaluating method, device and the computer-readable storage medium of application - Google Patents

Safe evaluating method, device and the computer-readable storage medium of application Download PDF

Info

Publication number
CN107563188A
CN107563188A CN201710817529.6A CN201710817529A CN107563188A CN 107563188 A CN107563188 A CN 107563188A CN 201710817529 A CN201710817529 A CN 201710817529A CN 107563188 A CN107563188 A CN 107563188A
Authority
CN
China
Prior art keywords
risk class
operation behavior
application
evaluating method
assessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710817529.6A
Other languages
Chinese (zh)
Other versions
CN107563188B (en
Inventor
钟根胜
康德恩
罗富贵
孙侃侃
廖想宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianhai Shenzhen Good Software Technology Co Ltd
Original Assignee
Qianhai Shenzhen Good Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianhai Shenzhen Good Software Technology Co Ltd filed Critical Qianhai Shenzhen Good Software Technology Co Ltd
Priority to CN201710817529.6A priority Critical patent/CN107563188B/en
Publication of CN107563188A publication Critical patent/CN107563188A/en
Application granted granted Critical
Publication of CN107563188B publication Critical patent/CN107563188B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of safe evaluating method of application, including:All operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;The risk class of each operation behavior is summed, obtains the risk class of the application to be assessed.The invention also discloses a kind of device of the safe evaluating method of application, realizes the security for comprehensively and accurately assessing the application that user uses.

Description

Safe evaluating method, device and the computer-readable storage medium of application
Technical field
The present invention relates to software development application field, more particularly to a kind of safe evaluating method of application, device and calculating Machine storage medium.
Background technology
With making constant progress for science and technology, have become a kind of instrument essential in people's life using app.It is raw Living, work all needs to use and also relates to the various information of people and privacy using app, app use at any time, such as: The geographical position of user can be determined by app, our various social tool accounts, bank's card number and friendship is saved in app Easy information etc., therefore have become the problem of we pay close attention to using the safe to use of app.
In order to determine user download application whether safety, typically detect the application whether access safety data, or Number of access safety event etc..For application security evaluation be typically for the application some function execution event or The execution event of the several functions of person whether safety, to assess the safe class of the application, such assessment mode is not comprehensive enough, Accurately, easy omission or mistake.
The content of the invention
It is a primary object of the present invention to provide a kind of safe evaluating method of application, device and computer-readable storage medium, Aim to solve the problem that traditional assessment application safety is not comprehensive enough, accurate, easily the technical problem of omission or mistake.
To achieve the above object, the present invention provides a kind of safe evaluating method of application, device and computer-readable storage medium, The safe evaluating method of the application includes step:
All operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;
The risk class of each operation behavior is summed, obtains the risk class of the application to be assessed.
Preferably, all operation behaviors for obtaining application to be assessed, evaluate and test the risk class of each operation behavior Also include before step:
Detecting that what will currently be downloaded applies as the application to be assessed when applying down operation;
When completion is downloaded in the application to be assessed, the step of all operation behaviors for obtaining application to be assessed is performed Suddenly.
Preferably, all operation behaviors for obtaining application to be assessed, evaluate and test the risk class of each operation behavior Step includes:
The risk class of each operation behavior of the predetermined number of storage is obtained, each operation is obtained in evaluation and test After the risk class of behavior, the risk class of the operation behavior is stored;
The risk class of each operation behavior is averaged respectively;
Risk class using the average value as each operation behavior.
Preferably, the step of risk class of each operation behavior of evaluation and test includes:
According to default operation behavior and risk class mapping relations, the risk class of acquisition each operation behavior.
Preferably, it is described according to default operation behavior and risk class mapping table, obtain each operation row For risk class the step of after, also include the step of the risk class of each operation behavior of the evaluation and test:
Frequency of use of the user to each operation behavior in acquisition prefixed time interval;
The risk class of each operation behavior is modified according to the frequency of use;
Risk class using revised risk class as each operation behavior.
Preferably, it is described according to default operation behavior and risk class mapping relations, obtain each operation behavior Risk class the step of after, also include the step of the risk class of each operation behavior of the evaluation and test:
Receive the modification of risk class of operation behavior instruction when, obtain modification instruction corresponding to operation behavior and Risk class, using the risk class based on the risk class that the modification instruction obtains as the operation behavior.
In addition, to achieve the above object, the present invention also provides a kind of device of the safe evaluating method of application, the application The device of safe evaluating method include memory, processor and being stored on the memory and can transporting on the processor Capable computer program, the step of realizing method as described above when the computer program is by the computing device.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, described computer-readable The Security Testing program of application is stored with storage medium, is realized such as when the Security Testing program of the application is executed by processor The step of safe evaluating method of above-described application.
Safe evaluating method, device and the computer-readable storage medium of application proposed by the present invention, by obtaining to be assessed answer All operation behaviors, the risk class of each operation behavior is evaluated and tested, the risk class of each operation behavior is summed, obtained The risk class of application to be assessed.Realize the security for comprehensively and accurately assessing the application that user uses.
Brief description of the drawings
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is the schematic flow sheet for the safe evaluating method first embodiment that the present invention applies;
Fig. 3 is the schematic flow sheet for the safe evaluating method second embodiment that the present invention applies;
Fig. 4 is the schematic flow sheet for the safe evaluating method 3rd embodiment that the present invention applies;
Fig. 5 is the schematic flow sheet for the safe evaluating method fourth embodiment that the present invention applies;
Fig. 6 is the schematic flow sheet for the embodiment of safe evaluating method the 5th that the present invention applies;
Fig. 7 is the schematic flow sheet for the safe evaluating method sixth embodiment that the present invention applies;
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:
All operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;
The risk class of each operation behavior is summed, obtains the risk class of the application to be assessed.
Because in the prior art, the security evaluation for application is typically the execution event for some function of the application Or whether the execution event of certain several function is safe, to assess the safe class of the application, such assessment mode is not complete enough Face, accurate, easy omission or mistake.
The present invention provides a solution, by obtaining all operation behaviors of application to be assessed, evaluates and tests each operation The risk class of behavior, the risk class of each operation behavior is summed, obtains the risk class of application to be assessed.Realize complete Face, the security for accurately assessing the application that user uses.
As shown in figure 1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to.
The terminal of the embodiment of the present invention can be the networking such as smart mobile phone or PC, tablet personal computer, television set And it is mounted with the terminal device of various application programs.
As shown in figure 1, the terminal can include:Processor 1001, such as CPU, network interface 1004, user interface 1003rd, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to realize the connection communication between these components. User interface 1003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface 1003 can also include wireline interface, the wave point of standard.Network interface 1004 can optionally connect including the wired of standard Mouth, wave point (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory or stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 1 not structure paired terminal, can be wrapped Include than illustrating more or less parts, either combine some parts or different parts arrangement.
As shown in figure 1, it can lead to as in a kind of memory 1005 of computer-readable storage medium including operating system, network Believe module, Subscriber Interface Module SIM and the Security Testing program of application.
In the terminal shown in Fig. 1, network interface 1004 is mainly used in connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used in connecting client (user terminal), enters row data communication with client;And processor 1001 can be used for calling the Security Testing program of application stored in memory 1005, and perform following operate:
All operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;
The risk class of each operation behavior is summed, obtains the risk class of the application to be assessed.
Further, processor 1001 can call the journey of the safe evaluating method of the application stored in memory 1004 Sequence, also perform following operate:
Detecting that what will currently be downloaded applies as the application to be assessed when applying down operation;
When completion is downloaded in the application to be assessed, the step of all operation behaviors for obtaining application to be assessed is performed Suddenly.
Further, processor 1001 can call the journey of the safe evaluating method of the application stored in memory 1004 Sequence, also perform following operate:
The risk class of each operation behavior of the predetermined number of storage is obtained, each operation is obtained in evaluation and test After the risk class of behavior, the risk class of the operation behavior is stored;
The risk class of each operation behavior is averaged respectively;
Risk class using the average value as each operation behavior.
Further, processor 1001 can call the journey of the safe evaluating method of the application stored in memory 1004 Sequence, also perform following operate:
According to default operation behavior and risk class mapping relations, the risk class of acquisition each operation behavior.
Further, processor 1001 can call the journey of the safe evaluating method of the application stored in memory 1004 Sequence, also perform following operate:
Frequency of use of the user to each operation behavior in acquisition prefixed time interval;
The risk class of each operation behavior is modified according to the frequency of use;
Risk class using revised risk class as each operation behavior.
Further, processor 1001 can call the journey of the safe evaluating method of the application stored in memory 1004 Sequence, also perform following operate:
Receive the modification of risk class of operation behavior instruction when, obtain modification instruction corresponding to operation behavior and Risk class, using the risk class based on the risk class that the modification instruction obtains as the operation behavior.
Reference picture 2, Fig. 2 are the safe evaluating method that the present invention applies and the schematic flow sheet of device first embodiment;
The present embodiment proposes a kind of safe evaluating method and device of application, the safe evaluating method and device bag of the application Include step:
Step S10, all operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;
When application to be assessed is downloaded completion and installed, pass through the feature list or interface of Scanning Detction application to be assessed List determines all operation behaviors of application to be assessed, for each operation behavior of the application, evaluates and tests its risk class.Herein The risk class for evaluating and testing each operation behavior determined by default operation behavior with risk class mapping table, not after Phase can be modified according to user for the service condition of the operation behavior of application, such as the operation row that user's frequency of use is higher For, it is related to the operation behavior of individual subscriber privacy, or it is related to the operation behavior of customer transaction payment, its risk etc. can be improved Level.In addition, user also can voluntarily correct the risk class of the operation behavior of application.
Step S20, the risk class of each operation behavior is summed, obtains the risk class of application to be assessed.
When obtaining the risk class of each operation behavior, the risk class of each operation behavior is added summation, with To the risk class of application to be assessed.The summation illustrated herein is one way in which, also can be by the way of weighted sum, its He relates to the use of the risk class of each operation behavior to obtain the calculation of the risk class of application to be assessed herein no longer Enumerate.
The safe evaluating method for the application that the present embodiment proposes, by obtaining all operation behaviors of application to be assessed, is commented The risk class of each operation behavior is surveyed, the risk class of each operation behavior is summed, obtains risk of application to be assessed etc. Level.Realize the security for comprehensively and accurately assessing the application that user uses.
Further, reference picture 3, propose that the safe evaluating method second that the present invention applies is implemented based on first embodiment Example, in the present embodiment, also include before the step S10:
Step S30, detecting that what will currently be downloaded applies as application to be assessed when applying down operation;
Step S10, when completion is downloaded in application to be assessed, perform all operation behaviors for obtaining application to be assessed Step.
In technical scheme disclosed in the present embodiment, when completion is downloaded in application to be assessed, the safety for proceeding by application is commented Survey, it is unsafe so as to avoid user from using it is known that whether the application downloaded is safe so before user is using application Cause to perplex using to working or living.
Further, when the terminal idle of the time to application progress Security Testing or user, or user is certainly If time, or receive evaluation and test instruction time, to this evaluation and test time can not specifically be defined.
Further, reference picture 4, propose that the safe evaluating method the 3rd that the present invention applies is implemented based on first embodiment Example, in the present embodiment, the step S10 includes:
Step S40, obtains the risk class of each operation behavior of the predetermined number of storage, and each operation is obtained in evaluation and test After the risk class of behavior, the risk class of operation behavior is stored;
Step S50, the risk class of each operation behavior is averaged respectively;
Step S60, the risk class using average value as each operation behavior.
In technical scheme disclosed in the present embodiment, the nearest n times using current point in time as from date are taken to evaluate and test data, will The risk class for each operation behavior that nearest n times are evaluated and tested to obtain averages to obtain each operation behavior proximal segment time more respectively Accurately risk class.Average herein simply one way in which, can also pass through the weight point of nearest n times evaluation result Cloth, such as take apart from the higher risk class of the nearlyer weight of current time, or can also remove the minimum in nearest n times evaluation and test And peak, the mode such as then average, Recent data can be so associated, historical data farther out can be abandoned again to existing knot The influence of fruit, so that the risk class of each operation behavior of evaluation and test gained is more accurate, it is more accurate, comprehensive subsequently to obtain The risk class of application to be assessed.
Further, reference picture 5, propose that the safe evaluating method the 4th that the present invention applies is implemented based on first embodiment Example, in the present embodiment, the step S10 includes:
Step S70, according to default operation behavior and risk class mapping relations, obtain risk of each operation behavior etc. Level.
In technical scheme disclosed in the present embodiment, the risk class for evaluating and testing each operation behavior is gone by default operation For what is realized with risk class mapping table, directly from backstage, acquisition data can obtain risk of each operation behavior etc. Level, simple and direct-viewing operation, data are reliable and secure.
Further, if the operation behavior of application is not in default operation behavior and risk class mapping table, this Shi Kecong background servers obtain risk class corresponding to this operation behavior as reference value, refresh default operation behavior and wind Dangerous grade mapping table, this operation behavior and its risk class are increased into mapping table, commented in the safety applied During survey, the mapping table after refreshing is obtained therefrom to obtain the risk class of this operation behavior.So as to ensure from default The risk class of operation behavior of the operation behavior with getting needs in risk class mapping table, make the safety of subsequent applications Evaluation and test is more accurate, is not in the situation of omission or mistake.
Further, reference picture 6, propose that the safe evaluating method the 5th that the present invention applies is implemented based on fourth embodiment Example, in the present embodiment, after the step S70, step S10 also includes:
Step S80, user is obtained in prefixed time interval to the frequency of use of each operation behavior;
Step S90, the risk class of each operation behavior is modified according to frequency of use;
Step S100, the risk class using revised risk class as each operation behavior.
In technical scheme disclosed in the present embodiment, backstage counting user is within a preset time interval to each operation behavior Service condition, pass through data analysis, it may be appreciated that the preference of user, user use frequently operation behavior, or pacify for a user It is complete to require higher operation behavior, its risk class is improved to the operation behavior being related to based on analysis result, this operation is more comprehensively Protection userspersonal information to improve the security of application, can not meet use so as to avoid the occurrence of the risk class of system default The situation of family demand.
Further, reference picture 7, the safe evaluating method the 6th of the invention applied is proposed based on the 4th or the 5th embodiment Embodiment, in the present embodiment, after the step S70, step S10 also includes:
Step S110, when receiving the modification of risk class of operation behavior instruction, obtain and grasped corresponding to modification instruction Make behavior and risk class, using the risk class based on the risk class that modification instruction obtains as operation behavior.
, can be according to corresponding operating behavior during user uses application in technical scheme disclosed in the present embodiment Safety requirements voluntarily change risk class, participated in using amended risk class as the risk class of the operation behavior follow-up The Security Testing of this application.So that whole scheme is more comprehensively, accurately, more meet user's request.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, cloud Hold server, air conditioner, or network equipment etc.) method that performs each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (8)

1. a kind of safe evaluating method of application, it is characterised in that the safe evaluating method of the application includes step:
All operation behaviors of application to be assessed are obtained, evaluate and test the risk class of each operation behavior;
The risk class of each operation behavior is summed, obtains the risk class of the application to be assessed.
2. the safe evaluating method applied as claimed in claim 1, it is characterised in that described to obtain all of application to be assessed Operation behavior, also include before the step of evaluating and testing the risk class of each operation behavior:
Detecting that what will currently be downloaded applies as the application to be assessed when applying down operation;
The application to be assessed download complete when, perform it is described obtain application to be assessed all operation behaviors the step of.
3. the safe evaluating method applied as claimed in claim 1, it is characterised in that described to obtain all of application to be assessed Operation behavior, include the step of the risk class for evaluating and testing each operation behavior:
The risk class of each operation behavior of the predetermined number of storage is obtained, each operation behavior is obtained in evaluation and test Risk class after, store the risk class of the operation behavior;
The risk class of each operation behavior is averaged respectively;
Risk class using the average value as each operation behavior.
4. the safe evaluating method applied as claimed in claim 1, it is characterised in that the wind of each operation behavior of evaluation and test The step of dangerous grade, includes:
According to default operation behavior and risk class mapping relations, the risk class of acquisition each operation behavior.
5. the safe evaluating method applied as claimed in claim 4, it is characterised in that it is described according to default operation behavior with Risk class mapping relations, after the step of obtaining the risk class of each operation behavior, each operation row of evaluation and test For risk class the step of also include:
Frequency of use of the user to each operation behavior in acquisition prefixed time interval;
The risk class of each operation behavior is modified according to the frequency of use;
Risk class using revised risk class as each operation behavior.
6. the safe evaluating method of the application as described in claim 4 or 5, it is characterised in that described to be gone according to default operation For with risk class mapping relations, after the step of obtaining the risk class of each operation behavior, each behaviour of evaluation and test The step of risk class for making behavior, also includes:
When receiving the modification of risk class of operation behavior instruction, operation behavior and risk corresponding to modification instruction are obtained Grade, using the risk class based on the risk class that the modification instruction obtains as the operation behavior.
A kind of 7. device of the safe evaluating method of application, it is characterised in that the device bag of the safe evaluating method of the application Include memory, processor and be stored in the computer program that can be run on the memory and on the processor, the meter Calculation machine program is realized the method as any one of claim 1 to 6 during computing device the step of.
8. a kind of computer-readable recording medium, it is characterised in that be stored with application on the computer-readable recording medium Security Testing program, realized when the Security Testing program of the application is executed by processor such as any one of claim 1 to 6 institute The step of safe evaluating method for the application stated.
CN201710817529.6A 2017-09-08 2017-09-08 Application security evaluation method and device and computer storage medium Active CN107563188B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710817529.6A CN107563188B (en) 2017-09-08 2017-09-08 Application security evaluation method and device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710817529.6A CN107563188B (en) 2017-09-08 2017-09-08 Application security evaluation method and device and computer storage medium

Publications (2)

Publication Number Publication Date
CN107563188A true CN107563188A (en) 2018-01-09
CN107563188B CN107563188B (en) 2022-01-25

Family

ID=60980528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710817529.6A Active CN107563188B (en) 2017-09-08 2017-09-08 Application security evaluation method and device and computer storage medium

Country Status (1)

Country Link
CN (1) CN107563188B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109471804A (en) * 2018-11-14 2019-03-15 苏州科达科技股份有限公司 Application detection method, device and storage medium in iOS
CN110223140A (en) * 2019-05-24 2019-09-10 深圳市彬讯科技有限公司 A kind of network order competitive tender method, apparatus, computer equipment and storage medium
CN110472162A (en) * 2019-08-20 2019-11-19 深圳前海微众银行股份有限公司 Appraisal procedure, system, terminal and readable storage medium storing program for executing

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927485A (en) * 2014-04-24 2014-07-16 东南大学 Android application program risk assessment method based on dynamic monitoring
CN105740715A (en) * 2016-01-29 2016-07-06 广东欧珀移动通信有限公司 Safety assessment method and terminal equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103927485A (en) * 2014-04-24 2014-07-16 东南大学 Android application program risk assessment method based on dynamic monitoring
CN105740715A (en) * 2016-01-29 2016-07-06 广东欧珀移动通信有限公司 Safety assessment method and terminal equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109471804A (en) * 2018-11-14 2019-03-15 苏州科达科技股份有限公司 Application detection method, device and storage medium in iOS
CN110223140A (en) * 2019-05-24 2019-09-10 深圳市彬讯科技有限公司 A kind of network order competitive tender method, apparatus, computer equipment and storage medium
CN110472162A (en) * 2019-08-20 2019-11-19 深圳前海微众银行股份有限公司 Appraisal procedure, system, terminal and readable storage medium storing program for executing
CN110472162B (en) * 2019-08-20 2024-03-08 深圳前海微众银行股份有限公司 Evaluation method, system, terminal and readable storage medium

Also Published As

Publication number Publication date
CN107563188B (en) 2022-01-25

Similar Documents

Publication Publication Date Title
US11164238B1 (en) Cross selling recommendation engine
EP2851857A1 (en) Mobile application daily user engagement scores and user profiles
JP2017188113A (en) Providing per-application resource usage information
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
CN105933266A (en) Verification method and server
CN109901881B (en) Plug-in loading method and device of application program, computer equipment and storage medium
CN106033575A (en) Risk account identification method and apparatus
US20150269391A1 (en) Privacy utility trade off tool
CN104331648A (en) Locking system, locking method, unlocking system and unlocking method for application
CN107563188A (en) Safe evaluating method, device and the computer-readable storage medium of application
CN109213857A (en) A kind of fraud recognition methods and device
CN109688183A (en) Group control device recognition methods, device, equipment and computer readable storage medium
CN107688957A (en) Customer evaluation method, equipment and computer-readable recording medium
CN104754136A (en) Method and system for managing account numbers relevant to mobile phone numbers on basis of intelligent terminals
EP3570242A1 (en) Method and system for quantifying quality of customer experience (cx) of an application
US20230072086A1 (en) Heuristic credit risk assessment engine
CN109194689A (en) Abnormal behaviour recognition methods, device, server and storage medium
CN109145590A (en) A kind of function hook detection method, detection device and computer-readable medium
Meskini et al. Reliability models applied to mobile applications
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
JP2017134750A (en) Authentication device, authentication method and authentication program
CN109408304A (en) Block chain introduces test method, device, equipment and readable storage medium storing program for executing
CN109472312A (en) Application assessment method, apparatus, computer equipment and storage medium
CN109426960A (en) Account authentication method, mobile device, account authentication equipment and readable storage medium storing program for executing
CN107870851A (en) Application performance test method, apparatus, computer-readable recording medium and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant