CN109583157A - A kind of long-range trace protecting method of APP and system - Google Patents
A kind of long-range trace protecting method of APP and system Download PDFInfo
- Publication number
- CN109583157A CN109583157A CN201710905795.4A CN201710905795A CN109583157A CN 109583157 A CN109583157 A CN 109583157A CN 201710905795 A CN201710905795 A CN 201710905795A CN 109583157 A CN109583157 A CN 109583157A
- Authority
- CN
- China
- Prior art keywords
- app
- security information
- application
- background server
- feature database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 claims abstract description 22
- 238000009434 installation Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 3
- 239000012141 concentrate Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of long-range trace protecting method of APP and systems.The described method includes: being embedded in preset security management and control component to the APP used for user's downloading, when user is after user terminal downloads APP, the security information of APP is read using security management and control component, and background server will be uploaded to after the security information read encryption, utilize APP security information feature database preset in background server, centralized safety verification is carried out to the security information got, to judge whether APP is legal copy, corresponding safe handling is carried out to APP according to judging result remote control user terminal.The present invention is not under the premise of changing primary signature, the security information of APP is obtained by security management and control component and encryption is transferred to background server, the remote centralized safety verification of mountain vallage version, encryption transmitting ensuring information safety property of application message, authenticity and reliability are made whether using background server.
Description
Technical field
The present invention relates to APP security technology area, in particular to the long-range trace protecting method of a kind of APP and system.
Background technique
The development of mobile Internet at this stage greatly enriches people's lives, and mobile terminal user can download all kinds of
Using being worked and entertained, however mobile terminal also brought while bringing conveniently life it is very much
Security risk, APP publication channel multiplicity, all kinds of stores APP are full of a large amount of mountain vallages and distort application, and many applications can be compiled by counter
It translates, beat again packet, destroy application integrity, confidentiality, attacker can forge Android application with additions and deletions code, and then cause
Privacy of user is stolen, a series of harm such as maliciously deduct fees.
Technology can not lack protection and control to the APP issued on channel to controlling after the online installation of APP at present
Measure simply by the signing messages for judging application or judges the cryptographic Hash of master program file and determines whether application is legal.
But android signing certificate can be generated voluntarily, can arbitrarily be filled in certificate about the information of developer, be needed not move through and recognize
Card, can not trace its true source, or can not prove source credibility, so cannot identify and protect according to signing certificate completely
Shield application.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of long-range trace protecting method of APP and it is
System.The technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of long-range trace protecting methods of APP, which comprises
Preset security management and control component is embedded in the APP used for user's downloading;
When user is after user terminal downloads APP, using the security information of security management and control component reading APP, and will reading
Background server is uploaded to after the security information encryption got;
Using APP security information feature database preset in background server, centralization is carried out to the security information got
Safety verification, to judge whether APP is legal;
Corresponding safe handling is carried out to APP according to judging result remote control user terminal.
In the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention, the APP security information feature database includes:
Legal white list feature database and mountain vallage blacklist feature database;
It is described to utilize preset APP security information feature database in background server, the security information got is collected
Chinese style safety verification, to judge whether APP is legal, comprising:
When the security information of APP meets the similarity verifying of legal white list feature database, judge APP for legal copy application;
When the security information of APP meets the similarity verifying of mountain vallage blacklist feature database, judge APP for mountain vallage application;
When the security information of APP mismatches the similarity verifying of APP security information feature database, judge that APP answers for risk
With.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention
Family end carries out corresponding safe handling to APP, comprising:
When judging APP to be legal in application, prompt user is safe to use.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention
Family end carries out corresponding safe handling to APP, comprising:
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention
Family end carries out corresponding safe handling to APP, comprising:
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
On the other hand, the embodiment of the invention provides a kind of APP remotely to track protection system, the system comprises:
User terminal is encrypted for being read the security information of APP using security management and control component, and by the security information read
After be uploaded to background server, the security management and control component is preset in APP;
Background server concentrates the security information got for utilizing preset APP security information feature database
Formula safety verification, to judge whether APP is legal;
The background server is also used to carry out corresponding safe place to APP according to judging result remote control user terminal
Reason.
It is remotely tracked in protection system in the above-mentioned APP of the embodiment of the present invention, the APP security information feature database includes:
Legal white list feature database and mountain vallage blacklist feature database;
The background server is also used to meet the similarity verifying of legal white list feature database when the security information of APP
When, judge APP for legal copy application;
The background server is also used to meet the similarity verifying of mountain vallage blacklist feature database when the security information of APP
When, judge APP for mountain vallage application;
The background server, the similarity for being also used to mismatch APP security information feature database when the security information of APP are tested
When card, judge APP for risk application.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention
APP is legal in application, prompt user is safe to use.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention
APP is mountain vallage in application, remotely disabling APP, and remotely replaces with corresponding legal application.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention
In application, prompting user, there are operation risks for risk by APP, need to use with caution.
Technical solution provided in an embodiment of the present invention has the benefit that
By being embedded in preset security management and control component to the APP used for user's downloading, when user downloads APP in user terminal
Afterwards, the security information of APP is read using security management and control component, and will be uploaded to background service after the security information read encryption
Device carries out centralization safety to the security information got and tests using APP security information feature database preset in background server
Card to judge whether APP is legal, and carries out corresponding safe handling to APP according to judging result remote control user terminal.This
The long-range trace protecting method of the sample APP obtains the peace of APP by security management and control component under the premise of not changing primary signature
Full information and encrypt be transferred to background server, be made whether that the remote centralized of mountain vallage version is tested safely using background server
Card, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, remote centralized safety verification utilize
APP security information feature database carries out similarity mode verifying, and verification result is safe and reliable, in addition, if discovery is that non-legal copy is answered
With, it is optional that forced unloading is carried out to application or is directly updated, official's legal copy is replaced with, evades and being led because careless using mountain vallage application
The privacy of cause steals, maliciously deducts fees, the long-range multinomial safety problem such as control.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 is the long-range trace protecting method flow chart of a kind of APP that the embodiment of the present invention one provides;
Fig. 2 is a kind of detail flowchart for the long-range trace protecting method of APP that the embodiment of the present invention one provides;
Fig. 3 is that a kind of APP provided by Embodiment 2 of the present invention remotely tracks protection system structure diagram.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Embodiment one
The embodiment of the invention provides a kind of long-range trace protecting methods of APP, suitable for providing downloading to the store APP
APP carries out safety verification, and referring to Fig. 1, this method may include:
Step S11 is embedded in preset security management and control component to the APP used for user's downloading.
In the present embodiment, can first require for user download APP need to be embedded in preset security management and control component, for
Family end carries out security information reading to the APP that user downloads.
Step S12, when user is after user terminal downloads APP, using the security information of security management and control component reading APP, and
Background server will be uploaded to after the security information read encryption.
In the present embodiment, when user is when user terminal starts the APP of installation downloading, security management and control component can read this
The security information of APP, comprising: the APP's applies packet name, version, primary signature, key code cryptographic Hash etc., and by above-mentioned peace
It is uploaded to background server after full information encryption, carries out secure remote authentication for background server.
Step S13, using APP security information feature database preset in background server, to the security information got into
Row centralization safety verification, to judge whether APP is legal.
In the present embodiment, preset APP security information feature database may include: that legal white list is special in background server
Library and mountain vallage blacklist feature database are levied, background server can be established a set of based on feature according to above-mentioned APP security information feature database
The application recognizer rule of information similarity analysis, to carry out centralized safety verification to the security information got, specifically
Realization process is as follows:
A1 judges that APP answers for legal copy when the security information of APP meets the similarity verifying of legal white list feature database
With;
B1 judges that APP answers for mountain vallage when the security information of APP meets the similarity verifying of mountain vallage blacklist feature database
With;
C1 judges APP for risk when the security information of APP mismatches the similarity verifying of APP security information feature database
Using.The APP similarity stored in the security information of the APP and legal white list feature database and mountain vallage blacklist feature database is equal
It is unqualified, alternatively, the APP is neither in legal white list feature database, also not in mountain vallage blacklist feature database.
Step S14 carries out corresponding safe handling to APP according to judging result remote control user terminal.
Specifically, above-mentioned steps S14 can be accomplished in that
When judging that APP in application, prompt user is safe to use, and prompts user that can carry out version and rise safely to be legal
Grade.
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
In the present embodiment, the long-range trace protecting method of the APP can carry out remote protecting to APP, not be to having been acknowledged
Official channel legal copy applies or can not carry out the credible application traced to the source to carry out forcing replacement or unloading, to ensure that user uses official
Legal copy protects application in the link after online publication, persistently ensures that application is safe.The long-range trace protecting method of the APP, according to
Centralized secure authentication mechanisms control APP running track, realize that safe APP remote protecting, problem APP are remotely recalled.In addition, logical
It crosses the mode remotely replaced to apply to protect, if unofficial mountain vallage application legal copy application or forged by attacker, remotely certainly
Dynamic replacement current application avoids user from causing the losses such as information leakage, rate consumption using non-legal application, to legal copy application into
Row auto upgrading, it is ensured that application continues safety.
Below with reference to Fig. 2, the process of the long-range trace protecting method of the APP is elaborated:
101) after user starts the APP downloaded in user terminal, built in security management and control component read APP safety
Information, including apply packet name, version, primary signature, key code cryptographic Hash etc.;
102) security management and control component is sent to after the security information read encryption in background server remote validation
The heart;
103) centralized safety verification is carried out in background server, is tested from integrality, confidentiality, availability etc. synthesis
Card.Matching is legal to apply sample, and based on characteristic information similarity and mountain vallage application recognizer rule, is answered by analyzing target
It is obtained and is divided with characteristic informations similarities such as title, packet name, certificate, resource file, configuration file, the source codes applied with white list
Analyse the mountain vallage possibility of application;The legal sample in legal white list feature database is matched to determine whether matching mountain for legal copy
Mountain vallage sample in stockaded village's blacklist feature database is to determine whether be knockoff.
If 104) centralized safety verification passes through, indicate the APP for legal application;
It if 105) APP is legal application, may determine that whether the APP has upgrading, prompt user to have upgrade package, such as
Fruit user confirms upgrading, can remotely update and be applied to latest edition, if user does not upgrade, can continue to use current version;
If 106) APP is legal application, source and the developer's information of legal application can also look at;
If 107) matched with feature in the application of mountain vallage blacklist, assert that application is mountain vallage application;
If 108) APP is mountain vallage application, which is disabled and is remotely replaced, when comparison result is mountain vallage
In application, being confirmed whether to replace with user, if user confirms replacement, downloads and apply from server-side, and by enabling Android
The unloading and installation of the included Package Manager Service processing application of system.The APP is carried out to force replacement peace
Dress, is updated to trusted application for mountain vallage application, if user's selection is not disposed, goes to step 110;
If 109) be not matched to the feature of server-side application, assert that the application is risk application;
110) it is remotely managed for risk application, if user's selection is not disposed, risk application or user is selected
The mountain vallage application not updated carries out indicating risk, informs that there are risks to use with caution by user, is voluntarily handled by user;If with
Family selection disposition, risk application is unloaded.
In the present embodiment, APP integrated security component progress legal copy is traced to the source, and is answered by way of remotely substituting to protect
With, APP running track is controlled using centralized secure authentication mechanisms, realizes that safe APP remote protecting, problem APP are remotely recalled,
To avoid in existing method only whether being trusted sources using reminding to application, can not but be carried out when running application
Prompt and the status prevented, while privacy caused by evading because being applied accidentally using mountain vallage is stolen, is maliciously deducted fees, remotely controlled etc.
Multinomial safety problem.
The embodiment of the present invention is by being embedded in preset security management and control component to the APP used for user's downloading, when user exists
After user terminal downloads APP, the security information of APP is read using security management and control component, and will be after the security information that read encryption
Be uploaded to background server, using APP security information feature database preset in background server, to the security information got into
Row centralization safety verification to judge whether APP is legal, and carries out phase to APP according to judging result remote control user terminal
The safe handling answered.The long-range trace protecting method of the APP in this way passes through security management and control under the premise of not changing primary signature
Component obtains the security information of APP and encryption is transferred to background server, is made whether mountain vallage version using background server
Remote centralized safety verification, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, it is long-range to collect
Chinese style safety verification carries out similarity mode verifying using APP security information feature database, and verification result is safe and reliable, in addition, such as
Fruit discovery is non-legal application, may be selected to carry out application forced unloading or directly update, replaces with official's legal copy, evade because not
It is careful steal, maliciously deduct fees using caused privacy using mountain vallage, the long-range multinomial safety problem such as control.
Embodiment two
The embodiment of the invention provides a kind of APP remotely to track protection system, realizes method described in embodiment one, ginseng
See Fig. 3, which may include: user terminal 100, background server 200.
User terminal 100 is read the security information of APP using security management and control component, and the security information read is encrypted
After be uploaded to background server 200, which is preset in APP.
In the present embodiment, can first require for user download APP need to be embedded in preset security management and control component, for
Family end carries out security information reading to the APP that user downloads.As APP of the user in the starting installation downloading of user terminal 100, APP
In preset security management and control component can read the security information of the APP, comprising: the application packet name of the APP, version, primary signature,
Key code cryptographic Hash etc., and will above-mentioned security information encryption after be uploaded to background server 200, for background server 200 into
Row secure remote authentication.
Background server 200 concentrates the security information got using preset APP security information feature database
Formula safety verification, to judge whether APP is legal.
In the present embodiment, preset APP security information feature database may include: legal white name in background server 200
Single feature database and mountain vallage blacklist feature database, background server 200 can be established a set of according to above-mentioned APP security information feature database
Application recognizer rule based on characteristic information similarity analysis, is tested to carry out centralization safety to the security information got
Card.
Background server 200 is also used to according to judging result remote control user terminal, using security management and control component to APP
Carry out corresponding safe handling.
Specifically, APP security information feature database includes: legal white list feature database and mountain vallage blacklist feature database.
Background server 200, when meeting the similarity verifying of legal white list feature database for the security information as APP,
Judge APP for legal copy application.
Background server 200, when meeting the similarity verifying of mountain vallage blacklist feature database for the security information as APP,
Judge APP for mountain vallage application.
Background server 200 mismatches the similarity verifying of APP security information feature database for the security information as APP
When, judge APP for risk application.
Further, background server 200 are also used to judge APP to be legal in application, prompt user is safe to use.
Background server 200, for when judge APP for mountain vallage in application, disable APP, and remotely replace with accordingly just
Version application.
Background server 200, for that ought judge APP, for risk, in application, prompting user, there are operation risks, need to make with caution
With.
In the present embodiment, the long-range trace protecting method of the APP can carry out remote protecting to APP, not be to having been acknowledged
Official channel legal copy applies or can not carry out the credible application traced to the source to carry out forcing replacement or unloading, to ensure that user uses official
Legal copy protects application in the link after online publication, persistently ensures that application is safe.The long-range trace protecting method of the APP, according to
Centralized secure authentication mechanisms control APP running track, realize that safe APP remote protecting, problem APP are remotely recalled.In addition, logical
It crosses the mode remotely replaced to apply to protect, if unofficial mountain vallage application legal copy application or forged by attacker, remotely certainly
Dynamic replacement current application avoids user from causing the losses such as information leakage, rate consumption using non-legal application, to legal copy application into
Row auto upgrading, it is ensured that application continues safety.
In the present embodiment, APP integrated security component progress legal copy is traced to the source, and is answered by way of remotely substituting to protect
With, APP running track is controlled using centralized secure authentication mechanisms, realizes that safe APP remote protecting, problem APP are remotely recalled,
To avoid in existing method only whether being trusted sources using reminding to application, can not but be carried out when running application
Prompt and the status prevented, while privacy caused by evading because being applied accidentally using mountain vallage is stolen, is maliciously deducted fees, remotely controlled etc.
Multinomial safety problem.
The embodiment of the present invention is by being embedded in preset security management and control component to the APP used for user's downloading, when user exists
After user terminal downloads APP, the security information of APP is read using security management and control component, and will be after the security information that read encryption
Be uploaded to background server, using APP security information feature database preset in background server, to the security information got into
Row centralization safety verification to judge whether APP is legal, and carries out phase to APP according to judging result remote control user terminal
The safe handling answered.The APP remotely tracks protection system in this way, under the premise of not changing primary signature, passes through security management and control
Component obtains the security information of APP and encryption is transferred to background server, is made whether mountain vallage version using background server
Remote centralized safety verification, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, it is long-range to collect
Chinese style safety verification carries out similarity mode verifying using APP security information feature database, and verification result is safe and reliable, in addition, such as
Fruit discovery is non-legal application, may be selected to carry out application forced unloading or directly update, replaces with official's legal copy, evade because not
It is careful steal, maliciously deduct fees using caused privacy using mountain vallage, the long-range multinomial safety problem such as control.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of long-range trace protecting method of APP, which is characterized in that the described method includes:
Preset security management and control component is embedded in the APP used for user's downloading;
When user is after user terminal downloads APP, the security information of APP is read using the security management and control component, and will be read
Security information encryption after be uploaded to background server;
Using APP security information feature database preset in background server, centralization safety is carried out to the security information got
Verifying, to judge whether APP is legal;
Corresponding safe handling is carried out to APP according to judging result remote control user terminal.
2. the method according to claim 1, wherein the APP security information feature database includes: legal white list
Feature database and mountain vallage blacklist feature database;
It is described to utilize preset APP security information feature database in background server, centralization is carried out to the security information got
Safety verification, to judge whether APP is legal, comprising:
When the security information of APP meets the similarity verifying of legal white list feature database, judge APP for legal copy application;
When the security information of APP meets the similarity verifying of mountain vallage blacklist feature database, judge APP for mountain vallage application;
When the security information of APP mismatches the similarity verifying of APP security information feature database, judge APP for risk application.
3. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP
Carry out corresponding safe handling, comprising:
When judging APP to be legal in application, prompt user is safe to use.
4. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP
Carry out corresponding safe handling, comprising:
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
5. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP
Carry out corresponding safe handling, comprising:
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
6. a kind of APP remotely tracks protection system characterized by comprising
User terminal, for using security management and control component read APP security information, and by the security information read encryption after on
Background server is reached, the security management and control component is preset in APP;
Background server carries out centralized peace to the security information got for utilizing preset APP security information feature database
Full verifying, to judge whether APP is legal;
The background server is also used to carry out corresponding safe handling to APP according to judging result remote control user terminal.
7. system according to claim 6, which is characterized in that the APP security information feature database includes: legal white list
Feature database and mountain vallage blacklist feature database;
The background server is also used to sentence when the security information of APP meets the similarity verifying of legal white list feature database
Disconnected APP is legal application;
The background server is also used to sentence when the security information of APP meets the similarity verifying of mountain vallage blacklist feature database
Disconnected APP is mountain vallage application;
The background server is also used to mismatch the similarity verifying of APP security information feature database when the security information of APP
When, judge APP for risk application.
8. system according to claim 7, which is characterized in that the background server is also used to judge APP for legal copy
In application, prompt user is safe to use.
9. system according to claim 7, which is characterized in that the background server is also used to APP ought be judged for mountain vallage
In application, remotely disabling APP, and remotely replace with corresponding legal application.
10. system according to claim 7, which is characterized in that the background server is also used to APP ought be judged for wind
In application, prompting user, there are operation risks for danger, need to use with caution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905795.4A CN109583157A (en) | 2017-09-29 | 2017-09-29 | A kind of long-range trace protecting method of APP and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905795.4A CN109583157A (en) | 2017-09-29 | 2017-09-29 | A kind of long-range trace protecting method of APP and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109583157A true CN109583157A (en) | 2019-04-05 |
Family
ID=65914160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710905795.4A Withdrawn CN109583157A (en) | 2017-09-29 | 2017-09-29 | A kind of long-range trace protecting method of APP and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109583157A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111768238A (en) * | 2020-06-29 | 2020-10-13 | 广州津虹网络传媒有限公司 | Channel tracking method, device, equipment and storage medium |
CN112565274A (en) * | 2020-12-11 | 2021-03-26 | 国家计算机网络与信息安全管理中心江苏分中心 | Method and system for intelligently identifying malicious APP |
CN113742696A (en) * | 2021-11-08 | 2021-12-03 | 太平金融科技服务(上海)有限公司深圳分公司 | User login method, device, equipment and medium based on distributed login component |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130101957A (en) * | 2012-02-22 | 2013-09-16 | 숭실대학교산학협력단 | Method for copyright protection of application, apparatus and the computer readable mediim storing the program thereof |
CN103888410A (en) * | 2012-12-19 | 2014-06-25 | 卓望数码技术(深圳)有限公司 | Application authentication method and system |
CN105426706A (en) * | 2015-11-20 | 2016-03-23 | 北京奇虎科技有限公司 | Pirate application detection method, device and system |
CN105989251A (en) * | 2015-02-12 | 2016-10-05 | 卓望数码技术(深圳)有限公司 | Piratic android application discrimination method and piratic android application discrimination system |
-
2017
- 2017-09-29 CN CN201710905795.4A patent/CN109583157A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20130101957A (en) * | 2012-02-22 | 2013-09-16 | 숭실대학교산학협력단 | Method for copyright protection of application, apparatus and the computer readable mediim storing the program thereof |
CN103888410A (en) * | 2012-12-19 | 2014-06-25 | 卓望数码技术(深圳)有限公司 | Application authentication method and system |
CN105989251A (en) * | 2015-02-12 | 2016-10-05 | 卓望数码技术(深圳)有限公司 | Piratic android application discrimination method and piratic android application discrimination system |
CN105426706A (en) * | 2015-11-20 | 2016-03-23 | 北京奇虎科技有限公司 | Pirate application detection method, device and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111768238A (en) * | 2020-06-29 | 2020-10-13 | 广州津虹网络传媒有限公司 | Channel tracking method, device, equipment and storage medium |
CN112565274A (en) * | 2020-12-11 | 2021-03-26 | 国家计算机网络与信息安全管理中心江苏分中心 | Method and system for intelligently identifying malicious APP |
CN113742696A (en) * | 2021-11-08 | 2021-12-03 | 太平金融科技服务(上海)有限公司深圳分公司 | User login method, device, equipment and medium based on distributed login component |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2334336T3 (en) | DISTRIBUTION AND EXECUTION OF SAFE APPLICATION IN A WIRELESS ENVIRONMENT. | |
AU2002324717B2 (en) | Test enabled application execution | |
KR101740256B1 (en) | Apparatus for mobile app integrity assurance and method thereof | |
KR101402057B1 (en) | Analyzing system of repackage application through calculation of risk and method thereof | |
CN108334753B (en) | Pirate application verification method and distributed server node | |
CN104683409A (en) | Method for sharing applications between terminals and terminal | |
AU2002324717A1 (en) | Test enabled application execution | |
CN106355081A (en) | Android program start verification method and device | |
KR101277517B1 (en) | Apparatus and method for detecting falsified application | |
CN103679005A (en) | Method to enable development mode of a secure electronic control unit | |
CN104680061A (en) | Method and system for verifying code signing during startup of application in Android environment | |
CN111666564A (en) | Application program safe starting method and device, computer equipment and storage medium | |
CN109583157A (en) | A kind of long-range trace protecting method of APP and system | |
CN106548065B (en) | Application program installation detection method and device | |
CN106709281B (en) | Patch granting and acquisition methods, device | |
CN111737304B (en) | Processing method, device and equipment of block chain data | |
CN111324517B (en) | Application service supervision method, supervision server and storage medium | |
CN117546164A (en) | Detection of supply chain related security threats to software applications | |
CN110717770B (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
CN106888094B (en) | A kind of endorsement method and server | |
US20160352522A1 (en) | User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same | |
KR101410255B1 (en) | System, device, method and computer readable recording medium for determining potential risk of application files | |
CN112182509A (en) | Method, device and equipment for detecting abnormity of compliance data | |
KR101382549B1 (en) | Method for pre-qualificating social network service contents in mobile environment | |
CN113868628A (en) | Signature verification method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190405 |