CN109583157A - A kind of long-range trace protecting method of APP and system - Google Patents

A kind of long-range trace protecting method of APP and system Download PDF

Info

Publication number
CN109583157A
CN109583157A CN201710905795.4A CN201710905795A CN109583157A CN 109583157 A CN109583157 A CN 109583157A CN 201710905795 A CN201710905795 A CN 201710905795A CN 109583157 A CN109583157 A CN 109583157A
Authority
CN
China
Prior art keywords
app
security information
application
background server
feature database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710905795.4A
Other languages
Chinese (zh)
Inventor
杨颖�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aspire Digital Technologies Shenzhen Co Ltd
Original Assignee
Aspire Digital Technologies Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aspire Digital Technologies Shenzhen Co Ltd filed Critical Aspire Digital Technologies Shenzhen Co Ltd
Priority to CN201710905795.4A priority Critical patent/CN109583157A/en
Publication of CN109583157A publication Critical patent/CN109583157A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level

Abstract

The invention discloses a kind of long-range trace protecting method of APP and systems.The described method includes: being embedded in preset security management and control component to the APP used for user's downloading, when user is after user terminal downloads APP, the security information of APP is read using security management and control component, and background server will be uploaded to after the security information read encryption, utilize APP security information feature database preset in background server, centralized safety verification is carried out to the security information got, to judge whether APP is legal copy, corresponding safe handling is carried out to APP according to judging result remote control user terminal.The present invention is not under the premise of changing primary signature, the security information of APP is obtained by security management and control component and encryption is transferred to background server, the remote centralized safety verification of mountain vallage version, encryption transmitting ensuring information safety property of application message, authenticity and reliability are made whether using background server.

Description

A kind of long-range trace protecting method of APP and system
Technical field
The present invention relates to APP security technology area, in particular to the long-range trace protecting method of a kind of APP and system.
Background technique
The development of mobile Internet at this stage greatly enriches people's lives, and mobile terminal user can download all kinds of Using being worked and entertained, however mobile terminal also brought while bringing conveniently life it is very much Security risk, APP publication channel multiplicity, all kinds of stores APP are full of a large amount of mountain vallages and distort application, and many applications can be compiled by counter It translates, beat again packet, destroy application integrity, confidentiality, attacker can forge Android application with additions and deletions code, and then cause Privacy of user is stolen, a series of harm such as maliciously deduct fees.
Technology can not lack protection and control to the APP issued on channel to controlling after the online installation of APP at present Measure simply by the signing messages for judging application or judges the cryptographic Hash of master program file and determines whether application is legal. But android signing certificate can be generated voluntarily, can arbitrarily be filled in certificate about the information of developer, be needed not move through and recognize Card, can not trace its true source, or can not prove source credibility, so cannot identify and protect according to signing certificate completely Shield application.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides a kind of long-range trace protecting method of APP and it is System.The technical solution is as follows:
On the one hand, the embodiment of the invention provides a kind of long-range trace protecting methods of APP, which comprises
Preset security management and control component is embedded in the APP used for user's downloading;
When user is after user terminal downloads APP, using the security information of security management and control component reading APP, and will reading Background server is uploaded to after the security information encryption got;
Using APP security information feature database preset in background server, centralization is carried out to the security information got Safety verification, to judge whether APP is legal;
Corresponding safe handling is carried out to APP according to judging result remote control user terminal.
In the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention, the APP security information feature database includes: Legal white list feature database and mountain vallage blacklist feature database;
It is described to utilize preset APP security information feature database in background server, the security information got is collected Chinese style safety verification, to judge whether APP is legal, comprising:
When the security information of APP meets the similarity verifying of legal white list feature database, judge APP for legal copy application;
When the security information of APP meets the similarity verifying of mountain vallage blacklist feature database, judge APP for mountain vallage application;
When the security information of APP mismatches the similarity verifying of APP security information feature database, judge that APP answers for risk With.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention Family end carries out corresponding safe handling to APP, comprising:
When judging APP to be legal in application, prompt user is safe to use.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention Family end carries out corresponding safe handling to APP, comprising:
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
It is described to be used according to judging result remote control in the long-range trace protecting method of the above-mentioned APP of the embodiment of the present invention Family end carries out corresponding safe handling to APP, comprising:
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
On the other hand, the embodiment of the invention provides a kind of APP remotely to track protection system, the system comprises:
User terminal is encrypted for being read the security information of APP using security management and control component, and by the security information read After be uploaded to background server, the security management and control component is preset in APP;
Background server concentrates the security information got for utilizing preset APP security information feature database Formula safety verification, to judge whether APP is legal;
The background server is also used to carry out corresponding safe place to APP according to judging result remote control user terminal Reason.
It is remotely tracked in protection system in the above-mentioned APP of the embodiment of the present invention, the APP security information feature database includes: Legal white list feature database and mountain vallage blacklist feature database;
The background server is also used to meet the similarity verifying of legal white list feature database when the security information of APP When, judge APP for legal copy application;
The background server is also used to meet the similarity verifying of mountain vallage blacklist feature database when the security information of APP When, judge APP for mountain vallage application;
The background server, the similarity for being also used to mismatch APP security information feature database when the security information of APP are tested When card, judge APP for risk application.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention APP is legal in application, prompt user is safe to use.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention APP is mountain vallage in application, remotely disabling APP, and remotely replaces with corresponding legal application.
It remotely tracks in protection system, the background server, is also used to when judgement in the above-mentioned APP of the embodiment of the present invention In application, prompting user, there are operation risks for risk by APP, need to use with caution.
Technical solution provided in an embodiment of the present invention has the benefit that
By being embedded in preset security management and control component to the APP used for user's downloading, when user downloads APP in user terminal Afterwards, the security information of APP is read using security management and control component, and will be uploaded to background service after the security information read encryption Device carries out centralization safety to the security information got and tests using APP security information feature database preset in background server Card to judge whether APP is legal, and carries out corresponding safe handling to APP according to judging result remote control user terminal.This The long-range trace protecting method of the sample APP obtains the peace of APP by security management and control component under the premise of not changing primary signature Full information and encrypt be transferred to background server, be made whether that the remote centralized of mountain vallage version is tested safely using background server Card, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, remote centralized safety verification utilize APP security information feature database carries out similarity mode verifying, and verification result is safe and reliable, in addition, if discovery is that non-legal copy is answered With, it is optional that forced unloading is carried out to application or is directly updated, official's legal copy is replaced with, evades and being led because careless using mountain vallage application The privacy of cause steals, maliciously deducts fees, the long-range multinomial safety problem such as control.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the long-range trace protecting method flow chart of a kind of APP that the embodiment of the present invention one provides;
Fig. 2 is a kind of detail flowchart for the long-range trace protecting method of APP that the embodiment of the present invention one provides;
Fig. 3 is that a kind of APP provided by Embodiment 2 of the present invention remotely tracks protection system structure diagram.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
Embodiment one
The embodiment of the invention provides a kind of long-range trace protecting methods of APP, suitable for providing downloading to the store APP APP carries out safety verification, and referring to Fig. 1, this method may include:
Step S11 is embedded in preset security management and control component to the APP used for user's downloading.
In the present embodiment, can first require for user download APP need to be embedded in preset security management and control component, for Family end carries out security information reading to the APP that user downloads.
Step S12, when user is after user terminal downloads APP, using the security information of security management and control component reading APP, and Background server will be uploaded to after the security information read encryption.
In the present embodiment, when user is when user terminal starts the APP of installation downloading, security management and control component can read this The security information of APP, comprising: the APP's applies packet name, version, primary signature, key code cryptographic Hash etc., and by above-mentioned peace It is uploaded to background server after full information encryption, carries out secure remote authentication for background server.
Step S13, using APP security information feature database preset in background server, to the security information got into Row centralization safety verification, to judge whether APP is legal.
In the present embodiment, preset APP security information feature database may include: that legal white list is special in background server Library and mountain vallage blacklist feature database are levied, background server can be established a set of based on feature according to above-mentioned APP security information feature database The application recognizer rule of information similarity analysis, to carry out centralized safety verification to the security information got, specifically Realization process is as follows:
A1 judges that APP answers for legal copy when the security information of APP meets the similarity verifying of legal white list feature database With;
B1 judges that APP answers for mountain vallage when the security information of APP meets the similarity verifying of mountain vallage blacklist feature database With;
C1 judges APP for risk when the security information of APP mismatches the similarity verifying of APP security information feature database Using.The APP similarity stored in the security information of the APP and legal white list feature database and mountain vallage blacklist feature database is equal It is unqualified, alternatively, the APP is neither in legal white list feature database, also not in mountain vallage blacklist feature database.
Step S14 carries out corresponding safe handling to APP according to judging result remote control user terminal.
Specifically, above-mentioned steps S14 can be accomplished in that
When judging that APP in application, prompt user is safe to use, and prompts user that can carry out version and rise safely to be legal Grade.
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
In the present embodiment, the long-range trace protecting method of the APP can carry out remote protecting to APP, not be to having been acknowledged Official channel legal copy applies or can not carry out the credible application traced to the source to carry out forcing replacement or unloading, to ensure that user uses official Legal copy protects application in the link after online publication, persistently ensures that application is safe.The long-range trace protecting method of the APP, according to Centralized secure authentication mechanisms control APP running track, realize that safe APP remote protecting, problem APP are remotely recalled.In addition, logical It crosses the mode remotely replaced to apply to protect, if unofficial mountain vallage application legal copy application or forged by attacker, remotely certainly Dynamic replacement current application avoids user from causing the losses such as information leakage, rate consumption using non-legal application, to legal copy application into Row auto upgrading, it is ensured that application continues safety.
Below with reference to Fig. 2, the process of the long-range trace protecting method of the APP is elaborated:
101) after user starts the APP downloaded in user terminal, built in security management and control component read APP safety Information, including apply packet name, version, primary signature, key code cryptographic Hash etc.;
102) security management and control component is sent to after the security information read encryption in background server remote validation The heart;
103) centralized safety verification is carried out in background server, is tested from integrality, confidentiality, availability etc. synthesis Card.Matching is legal to apply sample, and based on characteristic information similarity and mountain vallage application recognizer rule, is answered by analyzing target It is obtained and is divided with characteristic informations similarities such as title, packet name, certificate, resource file, configuration file, the source codes applied with white list Analyse the mountain vallage possibility of application;The legal sample in legal white list feature database is matched to determine whether matching mountain for legal copy Mountain vallage sample in stockaded village's blacklist feature database is to determine whether be knockoff.
If 104) centralized safety verification passes through, indicate the APP for legal application;
It if 105) APP is legal application, may determine that whether the APP has upgrading, prompt user to have upgrade package, such as Fruit user confirms upgrading, can remotely update and be applied to latest edition, if user does not upgrade, can continue to use current version;
If 106) APP is legal application, source and the developer's information of legal application can also look at;
If 107) matched with feature in the application of mountain vallage blacklist, assert that application is mountain vallage application;
If 108) APP is mountain vallage application, which is disabled and is remotely replaced, when comparison result is mountain vallage In application, being confirmed whether to replace with user, if user confirms replacement, downloads and apply from server-side, and by enabling Android The unloading and installation of the included Package Manager Service processing application of system.The APP is carried out to force replacement peace Dress, is updated to trusted application for mountain vallage application, if user's selection is not disposed, goes to step 110;
If 109) be not matched to the feature of server-side application, assert that the application is risk application;
110) it is remotely managed for risk application, if user's selection is not disposed, risk application or user is selected The mountain vallage application not updated carries out indicating risk, informs that there are risks to use with caution by user, is voluntarily handled by user;If with Family selection disposition, risk application is unloaded.
In the present embodiment, APP integrated security component progress legal copy is traced to the source, and is answered by way of remotely substituting to protect With, APP running track is controlled using centralized secure authentication mechanisms, realizes that safe APP remote protecting, problem APP are remotely recalled, To avoid in existing method only whether being trusted sources using reminding to application, can not but be carried out when running application Prompt and the status prevented, while privacy caused by evading because being applied accidentally using mountain vallage is stolen, is maliciously deducted fees, remotely controlled etc. Multinomial safety problem.
The embodiment of the present invention is by being embedded in preset security management and control component to the APP used for user's downloading, when user exists After user terminal downloads APP, the security information of APP is read using security management and control component, and will be after the security information that read encryption Be uploaded to background server, using APP security information feature database preset in background server, to the security information got into Row centralization safety verification to judge whether APP is legal, and carries out phase to APP according to judging result remote control user terminal The safe handling answered.The long-range trace protecting method of the APP in this way passes through security management and control under the premise of not changing primary signature Component obtains the security information of APP and encryption is transferred to background server, is made whether mountain vallage version using background server Remote centralized safety verification, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, it is long-range to collect Chinese style safety verification carries out similarity mode verifying using APP security information feature database, and verification result is safe and reliable, in addition, such as Fruit discovery is non-legal application, may be selected to carry out application forced unloading or directly update, replaces with official's legal copy, evade because not It is careful steal, maliciously deduct fees using caused privacy using mountain vallage, the long-range multinomial safety problem such as control.
Embodiment two
The embodiment of the invention provides a kind of APP remotely to track protection system, realizes method described in embodiment one, ginseng See Fig. 3, which may include: user terminal 100, background server 200.
User terminal 100 is read the security information of APP using security management and control component, and the security information read is encrypted After be uploaded to background server 200, which is preset in APP.
In the present embodiment, can first require for user download APP need to be embedded in preset security management and control component, for Family end carries out security information reading to the APP that user downloads.As APP of the user in the starting installation downloading of user terminal 100, APP In preset security management and control component can read the security information of the APP, comprising: the application packet name of the APP, version, primary signature, Key code cryptographic Hash etc., and will above-mentioned security information encryption after be uploaded to background server 200, for background server 200 into Row secure remote authentication.
Background server 200 concentrates the security information got using preset APP security information feature database Formula safety verification, to judge whether APP is legal.
In the present embodiment, preset APP security information feature database may include: legal white name in background server 200 Single feature database and mountain vallage blacklist feature database, background server 200 can be established a set of according to above-mentioned APP security information feature database Application recognizer rule based on characteristic information similarity analysis, is tested to carry out centralization safety to the security information got Card.
Background server 200 is also used to according to judging result remote control user terminal, using security management and control component to APP Carry out corresponding safe handling.
Specifically, APP security information feature database includes: legal white list feature database and mountain vallage blacklist feature database.
Background server 200, when meeting the similarity verifying of legal white list feature database for the security information as APP, Judge APP for legal copy application.
Background server 200, when meeting the similarity verifying of mountain vallage blacklist feature database for the security information as APP, Judge APP for mountain vallage application.
Background server 200 mismatches the similarity verifying of APP security information feature database for the security information as APP When, judge APP for risk application.
Further, background server 200 are also used to judge APP to be legal in application, prompt user is safe to use.
Background server 200, for when judge APP for mountain vallage in application, disable APP, and remotely replace with accordingly just Version application.
Background server 200, for that ought judge APP, for risk, in application, prompting user, there are operation risks, need to make with caution With.
In the present embodiment, the long-range trace protecting method of the APP can carry out remote protecting to APP, not be to having been acknowledged Official channel legal copy applies or can not carry out the credible application traced to the source to carry out forcing replacement or unloading, to ensure that user uses official Legal copy protects application in the link after online publication, persistently ensures that application is safe.The long-range trace protecting method of the APP, according to Centralized secure authentication mechanisms control APP running track, realize that safe APP remote protecting, problem APP are remotely recalled.In addition, logical It crosses the mode remotely replaced to apply to protect, if unofficial mountain vallage application legal copy application or forged by attacker, remotely certainly Dynamic replacement current application avoids user from causing the losses such as information leakage, rate consumption using non-legal application, to legal copy application into Row auto upgrading, it is ensured that application continues safety.
In the present embodiment, APP integrated security component progress legal copy is traced to the source, and is answered by way of remotely substituting to protect With, APP running track is controlled using centralized secure authentication mechanisms, realizes that safe APP remote protecting, problem APP are remotely recalled, To avoid in existing method only whether being trusted sources using reminding to application, can not but be carried out when running application Prompt and the status prevented, while privacy caused by evading because being applied accidentally using mountain vallage is stolen, is maliciously deducted fees, remotely controlled etc. Multinomial safety problem.
The embodiment of the present invention is by being embedded in preset security management and control component to the APP used for user's downloading, when user exists After user terminal downloads APP, the security information of APP is read using security management and control component, and will be after the security information that read encryption Be uploaded to background server, using APP security information feature database preset in background server, to the security information got into Row centralization safety verification to judge whether APP is legal, and carries out phase to APP according to judging result remote control user terminal The safe handling answered.The APP remotely tracks protection system in this way, under the premise of not changing primary signature, passes through security management and control Component obtains the security information of APP and encryption is transferred to background server, is made whether mountain vallage version using background server Remote centralized safety verification, wherein encryption transmitting ensuring information safety property of application message, authenticity and reliability, it is long-range to collect Chinese style safety verification carries out similarity mode verifying using APP security information feature database, and verification result is safe and reliable, in addition, such as Fruit discovery is non-legal application, may be selected to carry out application forced unloading or directly update, replaces with official's legal copy, evade because not It is careful steal, maliciously deduct fees using caused privacy using mountain vallage, the long-range multinomial safety problem such as control.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of long-range trace protecting method of APP, which is characterized in that the described method includes:
Preset security management and control component is embedded in the APP used for user's downloading;
When user is after user terminal downloads APP, the security information of APP is read using the security management and control component, and will be read Security information encryption after be uploaded to background server;
Using APP security information feature database preset in background server, centralization safety is carried out to the security information got Verifying, to judge whether APP is legal;
Corresponding safe handling is carried out to APP according to judging result remote control user terminal.
2. the method according to claim 1, wherein the APP security information feature database includes: legal white list Feature database and mountain vallage blacklist feature database;
It is described to utilize preset APP security information feature database in background server, centralization is carried out to the security information got Safety verification, to judge whether APP is legal, comprising:
When the security information of APP meets the similarity verifying of legal white list feature database, judge APP for legal copy application;
When the security information of APP meets the similarity verifying of mountain vallage blacklist feature database, judge APP for mountain vallage application;
When the security information of APP mismatches the similarity verifying of APP security information feature database, judge APP for risk application.
3. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP Carry out corresponding safe handling, comprising:
When judging APP to be legal in application, prompt user is safe to use.
4. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP Carry out corresponding safe handling, comprising:
When judging that APP in application, remotely disable APP, and remotely replaces with corresponding legal application for mountain vallage.
5. according to the method described in claim 2, it is characterized in that, it is described according to judging result remote control user terminal to APP Carry out corresponding safe handling, comprising:
When judging APP, for risk, in application, prompting user, there are operation risks, need to use with caution.
6. a kind of APP remotely tracks protection system characterized by comprising
User terminal, for using security management and control component read APP security information, and by the security information read encryption after on Background server is reached, the security management and control component is preset in APP;
Background server carries out centralized peace to the security information got for utilizing preset APP security information feature database Full verifying, to judge whether APP is legal;
The background server is also used to carry out corresponding safe handling to APP according to judging result remote control user terminal.
7. system according to claim 6, which is characterized in that the APP security information feature database includes: legal white list Feature database and mountain vallage blacklist feature database;
The background server is also used to sentence when the security information of APP meets the similarity verifying of legal white list feature database Disconnected APP is legal application;
The background server is also used to sentence when the security information of APP meets the similarity verifying of mountain vallage blacklist feature database Disconnected APP is mountain vallage application;
The background server is also used to mismatch the similarity verifying of APP security information feature database when the security information of APP When, judge APP for risk application.
8. system according to claim 7, which is characterized in that the background server is also used to judge APP for legal copy In application, prompt user is safe to use.
9. system according to claim 7, which is characterized in that the background server is also used to APP ought be judged for mountain vallage In application, remotely disabling APP, and remotely replace with corresponding legal application.
10. system according to claim 7, which is characterized in that the background server is also used to APP ought be judged for wind In application, prompting user, there are operation risks for danger, need to use with caution.
CN201710905795.4A 2017-09-29 2017-09-29 A kind of long-range trace protecting method of APP and system Withdrawn CN109583157A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710905795.4A CN109583157A (en) 2017-09-29 2017-09-29 A kind of long-range trace protecting method of APP and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710905795.4A CN109583157A (en) 2017-09-29 2017-09-29 A kind of long-range trace protecting method of APP and system

Publications (1)

Publication Number Publication Date
CN109583157A true CN109583157A (en) 2019-04-05

Family

ID=65914160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710905795.4A Withdrawn CN109583157A (en) 2017-09-29 2017-09-29 A kind of long-range trace protecting method of APP and system

Country Status (1)

Country Link
CN (1) CN109583157A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768238A (en) * 2020-06-29 2020-10-13 广州津虹网络传媒有限公司 Channel tracking method, device, equipment and storage medium
CN112565274A (en) * 2020-12-11 2021-03-26 国家计算机网络与信息安全管理中心江苏分中心 Method and system for intelligently identifying malicious APP
CN113742696A (en) * 2021-11-08 2021-12-03 太平金融科技服务(上海)有限公司深圳分公司 User login method, device, equipment and medium based on distributed login component

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130101957A (en) * 2012-02-22 2013-09-16 숭실대학교산학협력단 Method for copyright protection of application, apparatus and the computer readable mediim storing the program thereof
CN103888410A (en) * 2012-12-19 2014-06-25 卓望数码技术(深圳)有限公司 Application authentication method and system
CN105426706A (en) * 2015-11-20 2016-03-23 北京奇虎科技有限公司 Pirate application detection method, device and system
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130101957A (en) * 2012-02-22 2013-09-16 숭실대학교산학협력단 Method for copyright protection of application, apparatus and the computer readable mediim storing the program thereof
CN103888410A (en) * 2012-12-19 2014-06-25 卓望数码技术(深圳)有限公司 Application authentication method and system
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system
CN105426706A (en) * 2015-11-20 2016-03-23 北京奇虎科技有限公司 Pirate application detection method, device and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768238A (en) * 2020-06-29 2020-10-13 广州津虹网络传媒有限公司 Channel tracking method, device, equipment and storage medium
CN112565274A (en) * 2020-12-11 2021-03-26 国家计算机网络与信息安全管理中心江苏分中心 Method and system for intelligently identifying malicious APP
CN113742696A (en) * 2021-11-08 2021-12-03 太平金融科技服务(上海)有限公司深圳分公司 User login method, device, equipment and medium based on distributed login component

Similar Documents

Publication Publication Date Title
ES2334336T3 (en) DISTRIBUTION AND EXECUTION OF SAFE APPLICATION IN A WIRELESS ENVIRONMENT.
AU2002324717B2 (en) Test enabled application execution
KR101402057B1 (en) Analyzing system of repackage application through calculation of risk and method thereof
CN108334753B (en) Pirate application verification method and distributed server node
US20140150096A1 (en) Method for assuring integrity of mobile applications and apparatus using the method
CN104683409A (en) Method for sharing applications between terminals and terminal
CN106355081A (en) Android program start verification method and device
CN103677892A (en) Authorization scheme to enable special privilege mode in secure electronic control unit
US20160330030A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same
CN109583157A (en) A kind of long-range trace protecting method of APP and system
CN104680061A (en) Method and system for verifying code signing during startup of application in Android environment
CN111666564A (en) Application program safe starting method and device, computer equipment and storage medium
CN106548065B (en) Application program installation detection method and device
CN106709281B (en) Patch granting and acquisition methods, device
CN111324517B (en) Application service supervision method, supervision server and storage medium
US11349658B2 (en) Blockchain data processing method, apparatus, and device
CN106888094B (en) A kind of endorsement method and server
US20160352522A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same
CN110717770B (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
KR101410255B1 (en) System, device, method and computer readable recording medium for determining potential risk of application files
KR101382549B1 (en) Method for pre-qualificating social network service contents in mobile environment
CN117546164A (en) Detection of supply chain related security threats to software applications
CN113868628A (en) Signature verification method and device, computer equipment and storage medium
CN115022096B (en) Method and device for downloading software
US11874752B1 (en) Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190405