CN108234469A - Mobile terminal application safety protecting method, apparatus and system - Google Patents

Mobile terminal application safety protecting method, apparatus and system Download PDF

Info

Publication number
CN108234469A
CN108234469A CN201711455189.3A CN201711455189A CN108234469A CN 108234469 A CN108234469 A CN 108234469A CN 201711455189 A CN201711455189 A CN 201711455189A CN 108234469 A CN108234469 A CN 108234469A
Authority
CN
China
Prior art keywords
information
intended application
application
attack
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711455189.3A
Other languages
Chinese (zh)
Inventor
汪德嘉
华保健
樊淇梁
叶延玲
张文琴
丁敏秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Pay Shield Information Safe Technology Ltd
Original Assignee
Jiangsu Pay Shield Information Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Pay Shield Information Safe Technology Ltd filed Critical Jiangsu Pay Shield Information Safe Technology Ltd
Priority to CN201711455189.3A priority Critical patent/CN108234469A/en
Publication of CN108234469A publication Critical patent/CN108234469A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of mobile terminal application safety protecting method, apparatus and systems.Wherein, method includes:After intended application starts, the relevant information of intended application is obtained;Whether monitoring objective application is under attack;If so, obtaining attack information, and the relevant information of the attack information and the intended application is sent to server-side, so that server-side analyzes the relevant information of the attack information and the intended application;The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.Automation security protection to being applied in mobile terminal can be realized using this programme, avoid the drawbacks such as the privacy of user leakage brought for the malicious attack that mobile terminal is applied, property loss, improve the safety of mobile terminal application.

Description

Mobile terminal application safety protecting method, apparatus and system
Technical field
The present invention relates to field of computer technology, and in particular to a kind of mobile terminal application safety protecting method, device and System.
Background technology
With the continuous development of science and technology and society, the appearance extreme enrichment of the types of applications in mobile terminal people Working Life.However, repeated currently for the malicious attack applied in mobile terminal, so as to cause privacy of user leakage, Property such as is damaged at the consequences.Especially when mobile terminal carries out root or uses modifier frame and simulator, easily feel Malicious application is contaminated, so as to which the safety of mobile terminal be greatly reduced.It can be effectively to mobile terminal so still lacking one kind at present In application carry out security protection scheme.
Invention content
In view of the above problems, it is proposed that the present invention overcomes the above problem in order to provide one kind or solves at least partly State mobile terminal application safety protecting method, the apparatus and system of problem.
According to an aspect of the invention, there is provided a kind of mobile terminal application safety protecting method, including:
After intended application starts, the relevant information of intended application is obtained;
Whether monitoring objective application is under attack;
If so, attack information is obtained, and by the attack information and the relevant information of the intended application Server-side is sent to, so that server-side analyzes the relevant information of the attack information and the intended application;
The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.
According to another aspect of the present invention, a kind of mobile terminal application safety device is provided, including:
Acquisition module after working as intended application startup, obtains the relevant information of intended application;
Monitoring modular, it is whether under attack suitable for monitoring objective application;
Sending module if under attack suitable for monitoring module monitors intended application, obtains attack information, and by described in The relevant information of attack information and the intended application is sent to server-side, so that server-side believes the attack The relevant information of breath and the intended application is analyzed;
Receiving module, suitable for receiving the analysis result of server-side feedback;
Protection module, suitable for carrying out security protection to intended application according to analysis result.
According to another aspect of the invention, a kind of mobile terminal application security protection system is provided, including above-mentioned shifting Dynamic terminal applies safety device and the server-side;
Wherein, the server-side is suitable for the attack information and target that mobile terminal application safety device is sent The relevant information of application is analyzed.
According to mobile terminal application safety protecting method provided by the invention, apparatus and system, first, when intended application opens After dynamic, the relevant information of intended application is obtained;Whether monitoring objective application is under attack;If so, attack information is obtained, and The relevant information of attack information and intended application is sent to server-side, for server-side to attack behavioural information and The relevant information of intended application is analyzed;Receive server-side feedback analysis result, according to analysis result to intended application into Row security protection.Automation security protection to being applied in mobile terminal can be realized using this programme, avoided for mobile terminal The malicious attack of application and bring privacy of user leakage, the drawbacks such as property loss, improve the safety of mobile terminal application.
Above description is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, below the special specific embodiment for lifting the present invention.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this field Technical staff will become clear.Attached drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 is shown to be illustrated according to the flow of mobile terminal application safety protecting method provided by one embodiment of the present invention Figure;
Fig. 2 shows the flows of mobile terminal application safety protecting method provided according to a further embodiment of the invention to show It is intended to;
Fig. 3 shows the structural frames according to mobile terminal application safety device provided by one embodiment of the present invention Figure;
Fig. 4 shows the structural frames according to mobile terminal application security protection system provided by one embodiment of the present invention Figure.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
Fig. 1 is shown to be illustrated according to the flow of mobile terminal application safety protecting method provided by one embodiment of the present invention Figure.As shown in Figure 1, this method includes:
Step S110 after intended application starts, obtains the relevant information of intended application.
Wherein, intended application can be one or more.For example, intended application can be all on mobile terminal answers With, or a certain in mobile terminal or certain several application, as intended application can be related to the payment class of user's property should With or be related to privacy of user social class application etc..User can pass through preset setting interface dynamic change intended application.
Further, the relevant information of intended application is obtained.Wherein, the relevant information of intended application is and intended application Relevant information of safe operation state etc., such as the package informatin of intended application, system version information.The present embodiment should to target The particular content of relevant information is not construed as limiting, and those skilled in the art can voluntarily be set according to practical business demand.
Whether step S120, monitoring objective application are under attack.
During intended application is run, whether monitoring objective application is under attack.Wherein, monitoring objective application whether by Specific method those skilled in the art of attack can voluntarily select, for example, can by monitoring objective application it is current it is occupied into Whether new signal intrusion is had in journey, if so, performing step S130;Otherwise, then continue whether monitoring objective application is attacked It hits.
Step S130 obtains attack information, and the relevant information of attack information and intended application is sent To server-side, so that server-side analyzes the relevant information of attack behavioural information and intended application.
It, should by the attack information and target that monitor after monitoring that intended application is under attack in the step s 120 Relevant information is sent to server-side.Wherein, server-side is not located in mobile terminal.Server-side is receiving mobile terminal hair After the attack information and intended application sent, the current security status of analysis intended application obtains corresponding analysis As a result, and feed back to mobile terminal.
Step S140 receives the analysis result of server-side feedback, and security protection is carried out to intended application according to analysis result.
It is out of service to intended application progress according to the analysis result after the analysis result for receiving server-side feedback, Or the security protections such as threat early warning.
According to mobile terminal application safety protecting method provided in this embodiment, after intended application starts, target is obtained The relevant information of application;Whether monitoring objective application is under attack;If so, obtaining attack information, and attack is believed The relevant information of breath and intended application is sent to server-side, so that server-side is to the phase of attack behavioural information and intended application Information is closed to be analyzed;The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.It adopts With this programme, it can be achieved that automation security protection to being applied in mobile terminal, avoids the malice for mobile terminal application from attacking The drawbacks such as the privacy of user leakage hitting and bring, property loss improve the safety of mobile terminal application;Also, the present embodiment In relevant information is just only sent to server-side after intended application is under attack, so as to reduce the flow of mobile terminal damage Consumption;Also, it is not located at the server-side of mobile terminal by the way that relevant information is sent to and handles, can avoid to relevant information etc. The drawbacks of mobile terminal resource being occupied in processing procedure and running of mobile terminal rate is caused to reduce.
Fig. 2 shows the flows of mobile terminal application safety protecting method provided according to a further embodiment of the invention to show It is intended to.As shown in Fig. 2, this method includes:
Step S210 after intended application starts, obtains the base of the essential information of intended application, system residing for intended application This information, and/or intended application running environment information.
Wherein, intended application can be one or more.For example, intended application can be all on mobile terminal answers With, or a certain in mobile terminal or certain several application, as intended application can be related to the payment class of user's property should With or be related to privacy of user social class application etc..User can pass through preset setting interface dynamic change intended application.
Further, the relevant information of intended application is obtained.Wherein, the relevant information of intended application is the base of intended application The essential information of system residing for this information, intended application, and/or intended application running environment information.Wherein, intended application is basic Information further comprises:Publisher, packet name, certificate, and/or the signing messages of intended application;The base of system residing for intended application This information further comprises:System version number, and/or type;Intended application running environment information further comprises:Pacify in terminal Third-party application list of dress etc..
Whether step S220, monitoring objective application are under attack.
During intended application is run, whether monitoring objective application is under attack.Specifically, monitoring objective application whether by Kidnapped to so injections, Dex injections, dynamic debugging, and/or interface etc..It for example, can be by monitoring current goal using occupied Whether new signal intrusion is had in process, if so, determining that intended application is injected by so, Dex injects, and/or dynamic debugging Wait external attacks;When monitoring the page, whether the packet name for monitoring intended application operation stack top in jump procedure is correct, if so, Determine that intended application is kidnapped by interface.
If monitoring, intended application is under attack, further performs step S230;Otherwise, continuing monitoring objective application is It is no under attack.
Optionally, after monitoring whether intended application is under attack, information warning can be sent out, to provide mobile terminal User's current goal is using under attack.Wherein, the present embodiment does not limit for the presentation mode of specific information warning, for example, It can be the information warning of the forms such as voice, pop-up.
Step S230 obtains attack information, and attack information, the essential information of intended application, target is answered Server-side is sent to the essential information, and/or intended application running environment information of residing system, so that server-side goes to attack Relevant information for information and intended application is analyzed.
Specifically, after step S220 monitors that intended application is under attack, the attack information is obtained, and this is attacked It hits the relevant information of intended application obtained in behavioural information and step S210 and is sent to server-side together.
Server-side is after the relevant information of attack information and intended application is received, the peace positioned at service end side Full detecting and alarm is analyzed according to the relevant information of the attack information and intended application.Wherein, safety detection engine For the safety detection engine based on machine learning and/or big data technology, by being trained to the detection of magnanimity application sample, constantly Optimize the performance of safety detection engine.Optionally, to improve the detection efficiency to intended application safe condition, safety detection engine Can also based on by symbol for core static analysis with reference in a manner of the dynamic detection by dynamic sandbox for core come to attack The relevant information of information and intended application is analyzed.
Specifically, safety detection engine is according to the relevant information of attack information and intended application and positioned at server-side Information in the information bank of side is compared, and the analysis result of intended application is determined according to comparison result, is set for intended application After putting corresponding label, the relevant information of attack information and intended application is stored into information bank.Wherein, information bank Including terminal risk information library, the counterfeit information bank of terminal, terminal fallacious message library, and/or attack information bank etc..Safety detection is drawn It holds up and draws including counterfeit applied analysis sub- engine, malicious application analysis sub- engine, environmental monitoring sub- engine, and/or attack analysis It holds up.For example, by counterfeit applied analysis sub- engine and/or malicious application analyze sub- engine to terminal counterfeit information bank, and/or end Information in the fallacious message library of end is compared with the relevant information of the intended application received, determines whether intended application is imitative Emit application;Alternatively, it is determined by the system environmental information residing for intended application of the environmental monitoring sub- engine in intended application With the presence or absence of virus, wooden horse, and/or cheating application etc. or determining intended application running environment in intended application running environment Whether it is simulator or root states;And attack analysis engine determines target according to the relevant information and attack of intended application Using suffered specific attack signature, such as secondary packing, interface are kidnapped, so injects, dex injections.
The security threat that intended application is subject to can be tracked and traced to the source by the safety detection engine of server-side, accurately Pinpoint threat source.After server-side analyzes the relevant information of attack behavioural information and intended application, analysis is tied Fruit feeds back to mobile terminal.
Step S240 receives the analysis result of server-side feedback, and security protection is carried out to intended application according to analysis result.
Wherein, the analysis result of server-side feedback includes current goal application operation status safety information and/or threatens Warning information.When the current goal application operation status safety information and/or threat early warning information that receive server-side feedback Destination application operation can be terminated later and/or threat early warning information is presented.
According to mobile terminal application safety protecting method provided in this embodiment, after intended application starts, target is obtained The essential information of system, and/or intended application running environment information residing for the essential information of application, intended application;Monitoring objective Using whether under attack;If so, attack information is obtained, and by the basic letter of attack information and intended application The essential information of system, and/or intended application running environment information are sent to server-side residing for breath, intended application, for service The safety detection engine of end side analyzes the relevant information of attack behavioural information and intended application;And it is anti-to receive server-side The analysis result of feedback carries out security protection according to analysis result to intended application.Using this programme, it can be achieved that in mobile terminal The automation security protection of application accurately positions the security threat source of intended application, avoids for mobile terminal application Malicious attack and bring privacy of user leakage, the drawbacks such as property loss, improve the safety of mobile terminal application.
Fig. 3 shows the structural frames according to mobile terminal application safety device provided by one embodiment of the present invention Figure.As shown in figure 3, the device includes:Acquisition module 31, monitoring modular 32 and sending module 33, receiving module 34 and Protection module 35.
Wherein, acquisition module 31 after working as intended application startup, obtain the relevant information of intended application.
Monitoring modular 32, it is whether under attack suitable for monitoring objective application.
Sending module 33 if under attack suitable for monitoring module monitors intended application, obtains attack information, and by institute The relevant information for stating attack information and the intended application is sent to server-side, so that server-side is to the attack The relevant information of information and the intended application is analyzed.
Receiving module 34, suitable for receiving the analysis result of server-side feedback.
Protection module 35, suitable for carrying out security protection to intended application according to analysis result.
Optionally, the relevant information of intended application includes:The base of system residing for the essential information of intended application, intended application This information, and/or intended application running environment information.
Optionally, intended application essential information further comprises:Publisher, packet name, certificate, and/or the label of intended application Name information;And/or the essential information of system further comprises residing for the intended application:System version number, and/or type; And/or the intended application running environment information further comprises:The third-party application list installed in terminal.
Optionally, monitoring modular is further adapted for:Whether monitoring objective application is injected by so, Dex injections, dynamically adjusts Examination, and/or interface are kidnapped.
Optionally, which further includes:Alarm module (not shown), suitable for monitoring that intended application is under attack Afterwards, information warning is sent out.
Optionally, the analysis result of server-side feedback further comprises:Current goal application operation status safety information, And/or threat early warning information.
Optionally, protection module 35 is further adapted for:It terminates destination application operation and/or threat early warning letter is presented Breath.
Optionally, sending module 33 is further adapted for:The relevant information of attack information and intended application is sent To server-side, for servicing the safety detection engine of end side according to attack information and the relevant information of the intended application It is analyzed.
Optionally, safety detection engine is the safety detection engine based on machine learning and/or big data technology.
Optionally, sending module 33 is further adapted for:The relevant information of attack information and intended application is sent To server-side, for servicing the safety detection engine of end side according to the attack information and the relevant information of intended application It is compared with the information in the information bank of service end side, and point for the intended application is determined according to comparison result Analysis for the intended application as a result, set corresponding label, by the attack information and the correlation of the intended application Information is stored into information bank.
Optionally, information bank further comprises:Terminal risk information library, the counterfeit information bank of terminal, terminal fallacious message library, And/or attack information bank;
And/or safety detection engine includes:Counterfeit applied analysis sub- engine, malicious application analysis sub- engine, environmental monitoring Sub- engine, and/or attack analysis sub- engine.
Wherein, the specific implementation of modules can refer to explaining in Fig. 1 or embodiment illustrated in fig. 2 in the present embodiment It states, this will not be repeated here.
According to mobile terminal application safety device provided in this embodiment, after intended application starts, target is obtained The relevant information of application;Whether monitoring objective application is under attack;If so, obtaining attack information, and attack is believed The relevant information of breath and intended application is sent to server-side, so that server-side is to the phase of attack behavioural information and intended application Information is closed to be analyzed;The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.It adopts With this programme, it can be achieved that automation security protection to being applied in mobile terminal, avoids the malice for mobile terminal application from attacking The drawbacks such as the privacy of user leakage hitting and bring, property loss improve the safety of mobile terminal application.
Fig. 4 shows the structural frames according to mobile terminal application security protection system provided by one embodiment of the present invention Figure.As shown in figure 4, the device includes:Mobile terminal application safety device 41 and server-side 42.
Wherein, server-side 42 is suitable for the attack information of mobile terminal application safety device transmission and target should Relevant information is analyzed.
According to mobile terminal application security protection system provided in this embodiment, it can be achieved that applied in mobile terminal from Dynamicization security protection, the disadvantages such as the privacy of user leakage for avoiding the malicious attack for mobile terminal application and bringing, property loss The safety of mobile terminal application is improved at end.
So far, although those skilled in the art will appreciate that detailed herein have shown and described multiple showing for the present invention Example property embodiment, still, without departing from the spirit and scope of the present invention, still can be directly true according to disclosure of invention Determine or derive many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is it should be understood that and recognize It is set to and covers other all these variations or modifications.
It will be appreciated by those skilled in the art that embodiments of the present invention can be implemented as a kind of system, device, equipment, Method or computer program product.In addition, the present invention is not also directed to any certain programmed language, it should be appreciated that can utilize each Kind programming language realizes the content that the present invention describes, and the description done above to language-specific is to disclose the present invention Preferred forms.
It should be noted that recognize although Website server, user terminal and identity are described in detail in explanation above Several modules of card system, but this division is only exemplary, and is not enforceable.Those skilled in the art can To understand, indeed, it is possible to adaptively be changed to the module in embodiment, by multiple block combiners in embodiment Into a module, also a module can be divided into multiple modules.
In addition, although describing the present invention in the accompanying drawings with particular order implements operation, this is not required that or secretly Desired knot must could be realized according to the particular order come the operation for performing these operations or having to carry out shown in whole by showing Fruit.Certain steps are can be omitted, multiple steps are merged into a step execution or a step is divided into multiple steps and are held Row.
It, can be in conclusion using identity identifying method of the present invention and system, Website server, user terminal Realize certification rule of the certificate server dynamic adjustment Website server to user terminal, it, can due to certification rule flexibility and changeability With reduce certification rule crack risk;Alternatively, after some certification rule is cracked, certification rule can be rapidly replaced Then, solve the problems, such as that there are security risks due to the algorithm between certificate server and Website server is fixed, and further improve The safety of identity authorization system, and enhance the safety of site resource and user information.
The method and specific implementation method of the present invention are described in detail, and give corresponding implementation above Example.Certainly, in addition to the implementation, the present invention can also have other embodiment, all to use equivalent substitution or equivalent transformation shape Into technical solution, all fall within invention which is intended to be protected.
The invention discloses:A1. a kind of mobile terminal application safety protecting method, including:
After intended application starts, the relevant information of intended application is obtained;
Whether monitoring objective application is under attack;
If so, attack information is obtained, and by the attack information and the relevant information of the intended application Server-side is sent to, so that server-side analyzes the relevant information of the attack information and the intended application;
The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.
A2. the method according to A1, wherein, the relevant information of the intended application includes:
The essential information of system residing for the essential information of intended application, intended application, and/or intended application running environment letter Breath.
A3. the method according to A2, wherein, the intended application essential information further comprises:The hair of intended application Passerby, packet name, certificate, and/or signing messages;
And/or the essential information of system further comprises residing for the intended application:System version number, and/or type;
And/or the intended application running environment information further comprises:The third-party application list installed in terminal.
A4. the method according to any one of A1-A3, wherein, whether the monitoring objective application is under attack into one Step includes:
Whether monitoring objective application is injected by so, Dex injects, dynamic debugging, and/or interface are kidnapped.
A5. the method according to any one of A1-A3, wherein, the method further includes:
After monitoring that intended application is under attack, information warning is sent out.
A6. the method according to any one of A1-A3, wherein, the analysis result of the server-side feedback is further wrapped It includes:
Current goal application operation status safety information and/or threat early warning information.
A7. the method according to any one of A1-A3, wherein, it is described that intended application is pacified according to analysis result Full protection further comprises:
It terminates destination application operation and/or threat early warning information is presented.
A8. the method according to any one of A1-A3, wherein, it is described and by the attack information and described The relevant information of intended application is sent to server-side, so that server-side is to the attack information and the intended application Relevant information carries out analysis and further comprises:
The relevant information of the attack information and the intended application is sent to server-side, for servicing end side Safety detection engine analyzed according to the relevant information of the attack information and the intended application.
A9. the method according to A8, wherein, the safety detection engine is based on machine learning and/or big data skill The safety detection engine of art.
A10. the method according to A9, wherein, the safety detection engine of the service end side is according to the attack The relevant information of information and the intended application carries out analysis and further comprises:
The safety detection engine of end side is serviced according to the attack information and the relevant information of the intended application It is compared, and the analysis knot of the intended application is determined according to comparison result with the information in the information bank of service end side After setting corresponding label for the intended application, the attack information and the related of the intended application are believed for fruit Breath is stored into information bank.
A11. the method according to A10, wherein, described information storehouse further comprises:
Terminal risk information library, the counterfeit information bank of terminal, terminal fallacious message library, and/or attack information bank;
And/or safety detection engine includes:Counterfeit applied analysis sub- engine, malicious application analysis sub- engine, environmental monitoring Sub- engine, and/or attack analysis sub- engine.
The invention also discloses:B12. a kind of mobile terminal application safety device, including:
Acquisition module after working as intended application startup, obtains the relevant information of intended application;
Monitoring modular, it is whether under attack suitable for monitoring objective application;
Sending module if under attack suitable for monitoring module monitors intended application, obtains attack information, and by described in The relevant information of attack information and the intended application is sent to server-side, so that server-side believes the attack The relevant information of breath and the intended application is analyzed;
Receiving module, suitable for receiving the analysis result of server-side feedback;
Protection module, suitable for carrying out security protection to intended application according to analysis result.
B13. the device according to B12, wherein, the relevant information of the intended application includes:
The essential information of system residing for the essential information of intended application, intended application, and/or intended application running environment letter Breath.
B14. the device according to B13, wherein, the intended application essential information further comprises:Intended application Publisher, packet name, certificate, and/or signing messages;
And/or the essential information of system further comprises residing for the intended application:System version number, and/or type;
And/or the intended application running environment information further comprises:The third-party application list installed in terminal.
B15. the device according to any one of B12-B14, wherein, the monitoring modular is further adapted for:
Whether monitoring objective application is injected by so, Dex injects, dynamic debugging, and/or interface are kidnapped.
B16. the device according to any one of B12-B14, wherein, described device further includes:
Alarm module, suitable for after monitoring that intended application is under attack, sending out information warning.
B17. the device according to any one of B12-B14, wherein, the analysis result of the server-side feedback is further Including:
Current goal application operation status safety information and/or threat early warning information.
B18. the device according to any one of B12-B14, wherein, the protection module is further adapted for:
It terminates destination application operation and/or threat early warning information is presented.
B19. the device according to any one of B12-B14, wherein, the sending module is further adapted for:
The relevant information of the attack information and the intended application is sent to server-side, for servicing end side Safety detection engine analyzed according to the relevant information of the attack information and the intended application.
B20. the device according to B19, wherein, the safety detection engine is based on machine learning and/or big data The safety detection engine of technology.
B21. the device according to B20, wherein, the sending module is further adapted for:
The relevant information of the attack information and the intended application is sent to server-side, for servicing end side Safety detection engine according to the relevant information of the attack information and the intended application with positioned at service end side Information in information bank is compared, and determines the analysis result for the intended application according to comparison result, is the mesh Mark application sets corresponding label, and the relevant information of the attack information and the intended application is stored to information bank In.
B22. the device according to B21, wherein, described information storehouse further comprises:
Terminal risk information library, the counterfeit information bank of terminal, terminal fallacious message library, and/or attack information bank;
And/or safety detection engine includes:Counterfeit applied analysis sub- engine, malicious application analysis sub- engine, environmental monitoring Sub- engine, and/or attack analysis sub- engine.
The invention also discloses:C23. a kind of mobile terminal application security protection system, including such as any one of B12-B22 The mobile terminal application safety device and the server-side;
Wherein, the server-side is suitable for the attack information and target that mobile terminal application safety device is sent The relevant information of application is analyzed.

Claims (10)

1. a kind of mobile terminal application safety protecting method, including:
After intended application starts, the relevant information of intended application is obtained;
Whether monitoring objective application is under attack;
If so, obtaining attack information, and the relevant information of the attack information and the intended application is sent To server-side, so that server-side analyzes the relevant information of the attack information and the intended application;
The analysis result of server-side feedback is received, security protection is carried out to intended application according to analysis result.
2. according to the method described in claim 1, wherein, the relevant information of the intended application includes:
The essential information of system, and/or intended application running environment information residing for the essential information of intended application, intended application.
3. according to the method described in claim 2, wherein, the intended application essential information further comprises:Intended application Publisher, packet name, certificate, and/or signing messages;
And/or the essential information of system further comprises residing for the intended application:System version number, and/or type;
And/or the intended application running environment information further comprises:The third-party application list installed in terminal.
4. method according to any one of claim 1-3, wherein, whether the monitoring objective application is under attack into one Step includes:
Whether monitoring objective application is injected by so, Dex injects, dynamic debugging, and/or interface are kidnapped.
5. method according to any one of claim 1-3, wherein, the method further includes:
After monitoring that intended application is under attack, information warning is sent out.
6. method according to any one of claim 1-3, wherein, the analysis result of the server-side feedback is further wrapped It includes:
Current goal application operation status safety information and/or threat early warning information.
7. method according to any one of claim 1-3, wherein, it is described that intended application is pacified according to analysis result Full protection further comprises:
It terminates destination application operation and/or threat early warning information is presented.
8. method according to any one of claim 1-3, wherein, it is described and by the attack information and described The relevant information of intended application is sent to server-side, so that server-side is to the attack information and the intended application Relevant information carries out analysis and further comprises:
The relevant information of the attack information and the intended application is sent to server-side, for servicing the peace of end side Full detecting and alarm is analyzed according to the relevant information of the attack information and the intended application.
9. a kind of mobile terminal application safety device, including:
Acquisition module after working as intended application startup, obtains the relevant information of intended application;
Monitoring modular, it is whether under attack suitable for monitoring objective application;
Sending module if under attack suitable for monitoring module monitors intended application, obtains attack information, and by the attack The relevant information of behavioural information and the intended application is sent to server-side, for server-side to the attack information with And the relevant information of the intended application is analyzed;
Receiving module, suitable for receiving the analysis result of server-side feedback;
Protection module, suitable for carrying out security protection to intended application according to analysis result.
10. a kind of mobile terminal application security protection system, including mobile terminal application security protection as claimed in claim 9 Device and server-side;
Wherein, the server-side is suitable for the attack information and intended application that mobile terminal application safety device is sent Relevant information analyzed.
CN201711455189.3A 2017-12-28 2017-12-28 Mobile terminal application safety protecting method, apparatus and system Pending CN108234469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711455189.3A CN108234469A (en) 2017-12-28 2017-12-28 Mobile terminal application safety protecting method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711455189.3A CN108234469A (en) 2017-12-28 2017-12-28 Mobile terminal application safety protecting method, apparatus and system

Publications (1)

Publication Number Publication Date
CN108234469A true CN108234469A (en) 2018-06-29

Family

ID=62649290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711455189.3A Pending CN108234469A (en) 2017-12-28 2017-12-28 Mobile terminal application safety protecting method, apparatus and system

Country Status (1)

Country Link
CN (1) CN108234469A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135154A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 The injection attack detection system and method for application program
CN112601227A (en) * 2020-12-29 2021-04-02 湖北快付宝信息科技有限公司 Application safety protection method of mobile terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621511A (en) * 2009-06-09 2010-01-06 北京安天电子设备有限公司 Multilayer detecting method without local virus library and multilayer detecting system
CN105429956A (en) * 2015-11-02 2016-03-23 重庆大学 Malicious software detection system based on P2P dynamic cloud and malicious software detection method
CN105678167A (en) * 2015-12-24 2016-06-15 北京奇虎科技有限公司 Safety protection method and apparatus
CN106534174A (en) * 2016-12-07 2017-03-22 北京奇虎科技有限公司 Cloud protection method, apparatus and system of sensitive data
CN106713246A (en) * 2015-11-17 2017-05-24 中国移动通信集团公司 Method and apparatus for detecting application program page hijacking, and mobile terminal
CN107292173A (en) * 2017-06-06 2017-10-24 北京奇虎科技有限公司 File safety protection method, device and equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621511A (en) * 2009-06-09 2010-01-06 北京安天电子设备有限公司 Multilayer detecting method without local virus library and multilayer detecting system
CN105429956A (en) * 2015-11-02 2016-03-23 重庆大学 Malicious software detection system based on P2P dynamic cloud and malicious software detection method
CN106713246A (en) * 2015-11-17 2017-05-24 中国移动通信集团公司 Method and apparatus for detecting application program page hijacking, and mobile terminal
CN105678167A (en) * 2015-12-24 2016-06-15 北京奇虎科技有限公司 Safety protection method and apparatus
CN106534174A (en) * 2016-12-07 2017-03-22 北京奇虎科技有限公司 Cloud protection method, apparatus and system of sensitive data
CN107292173A (en) * 2017-06-06 2017-10-24 北京奇虎科技有限公司 File safety protection method, device and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135154A (en) * 2019-03-28 2019-08-16 江苏通付盾信息安全技术有限公司 The injection attack detection system and method for application program
CN112601227A (en) * 2020-12-29 2021-04-02 湖北快付宝信息科技有限公司 Application safety protection method of mobile terminal

Similar Documents

Publication Publication Date Title
US11716348B2 (en) Malicious script detection
CN107483458A (en) The recognition methods of network attack and device, computer-readable recording medium
US20140173736A1 (en) Method and system for detecting webpage Trojan embedded
CN109347882B (en) Webpage Trojan horse monitoring method, device, equipment and storage medium
US11475133B2 (en) Method for machine learning of malicious code detecting model and method for detecting malicious code using the same
CN104361285B (en) The safety detection method and device of mobile device application program
CN104091140B (en) A kind of information processing method and electronic equipment
CN106850687A (en) Method and apparatus for detecting network attack
US10764311B2 (en) Unsupervised classification of web traffic users
CN109600362B (en) Zombie host recognition method, device and medium based on recognition model
EP2901290A1 (en) Detecting malicious advertisements using source code analysis
CN105844146B (en) Method and device for protecting driver and electronic equipment
CN108566399A (en) Fishing website recognition methods and system
CN106549980A (en) A kind of malice C&C server determines method and device
CN109753790A (en) A kind of landing page monitoring method and system
CN107103237A (en) A kind of detection method and device of malicious file
CN110336835A (en) Detection method, user equipment, storage medium and the device of malicious act
CN108600162A (en) User authen method and device, computing device and computer storage media
CN108234469A (en) Mobile terminal application safety protecting method, apparatus and system
CN111881449A (en) Auxiliary analysis method and device for malicious codes
CN104486312B (en) A kind of recognition methods of application program and device
CN103369555B (en) A kind of method and apparatus for detecting mobile phone viruses
CN110543783A (en) Voting system and implementation method, equipment and storage medium thereof
CN105447348B (en) A kind of hidden method of display window, device and user terminal
CN108337227B (en) Method and middleware based on OpenID account login application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629

RJ01 Rejection of invention patent application after publication