CN110795133B - Automatic protection method and device for auxiliary application - Google Patents

Automatic protection method and device for auxiliary application Download PDF

Info

Publication number
CN110795133B
CN110795133B CN201910977340.2A CN201910977340A CN110795133B CN 110795133 B CN110795133 B CN 110795133B CN 201910977340 A CN201910977340 A CN 201910977340A CN 110795133 B CN110795133 B CN 110795133B
Authority
CN
China
Prior art keywords
application
auxiliary
list
applications
judging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910977340.2A
Other languages
Chinese (zh)
Other versions
CN110795133A (en
Inventor
周立群
黄小勇
雷磊
黄坚
李全斌
蔡广奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Duling Technology Co ltd
Original Assignee
Guangzhou Micro Computing Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Micro Computing Information Technology Co ltd filed Critical Guangzhou Micro Computing Information Technology Co ltd
Priority to CN201910977340.2A priority Critical patent/CN110795133B/en
Publication of CN110795133A publication Critical patent/CN110795133A/en
Application granted granted Critical
Publication of CN110795133B publication Critical patent/CN110795133B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses an automatic protection method and device for auxiliary application, wherein the method comprises the following steps: acquiring an installed application list of equipment, and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule; and removing the application information which is judged to be the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list. The invention solves the time-consuming problem caused by frequent network requests when detecting the application list, thereby being capable of rapidly responding to the application request, reducing the maintenance cost of operators and achieving the purpose of automatically protecting auxiliary applications.

Description

Automatic protection method and device for auxiliary application
Technical Field
The invention relates to the technical field of software management, in particular to an automatic protection method and device for auxiliary application.
Background
Since many games or software will detect if certain auxiliary applications (e.g., key fairs, game cells) are installed on the device at run-time, uninstallation is required to continue using if already installed, whether or not these auxiliary applications threaten game balance. In fact, most auxiliary applications do not negatively affect the games or software, but can effectively improve the operation convenience of users, so that certain auxiliary applications need to be hidden, and normal operation of the auxiliary applications is ensured.
In the prior art, when the game software acquires the installed application list, the application list information needing to be hidden at the rear end is returned through an http request, and then the corresponding application information is not returned through a packet name filtering condition, so that the game cannot know whether the auxiliary is installed or not, and the purpose of protecting the auxiliary application is achieved. However, the prior art has the disadvantages of causing frequent network requests, possibly causing high network concurrency problems, and requiring frequent maintenance of the list of auxiliary applications by the operator.
Disclosure of Invention
The embodiment of the invention aims to provide an automatic protection method and device for auxiliary applications, which are used for solving the time-consuming problem caused by frequent network requests when an application list is detected, so that the application requests can be responded quickly, the maintenance cost of operators is reduced, and the aim of automatically protecting the auxiliary applications is fulfilled.
In order to solve the above technical problems, an embodiment of the present invention provides an automatic protection method for auxiliary applications, including:
acquiring an installed application list of equipment, and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
the step of judging whether the application in the installed application list is an auxiliary application one by one according to a preset auxiliary application judging rule comprises the following steps:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page; if yes, judging the target application as an auxiliary application;
judging whether the component information of each application exists in a system setting list one by one according to the package information; if yes, judging the application as an auxiliary application;
and removing the application information which is judged to be the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
In order to solve the same technical problems, the invention also provides an automatic protection device for auxiliary application, comprising:
the auxiliary application judging module is used for acquiring an installed application list of the equipment and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
wherein, the auxiliary application judging module comprises:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page; if yes, judging the target application as an auxiliary application;
judging whether the component information of each application exists in a system setting list one by one according to the package information; if yes, judging the application as an auxiliary application;
and the auxiliary application hiding module is used for removing the application information judged as the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
To solve the same technical problem, the present invention also provides an auxiliary application automatic protection device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the memory being coupled to the processor, and the processor implementing any one of the auxiliary application automatic protection methods when executing the computer program.
To solve the same technical problem, the present invention further provides a computer readable storage medium, where a computer program is stored, where the computer program controls a device where the computer readable storage medium is located to execute any one of the auxiliary application automatic protection methods when running.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides an automatic protection method and device for auxiliary applications, which can automatically detect and hide auxiliary applications to protect the auxiliary applications when software needs to acquire an application list, and meanwhile, the auxiliary application list is not required to be manually maintained, so that the method and device solve the time-consuming problem caused by frequent network requests when the application list is detected in the prior art, further, the application requests can be responded quickly, the maintenance cost of operators is reduced, and the aim of automatically protecting the auxiliary applications is fulfilled.
Drawings
FIG. 1 is a flowchart of an automatic protection method for an auxiliary application according to an embodiment of the present invention;
fig. 2 is another flow chart of an automatic protection method for auxiliary applications according to an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, an embodiment of the present invention provides an automatic protection method for auxiliary applications, including:
step S1, acquiring an installed application list of equipment, and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
further, the step S1 specifically includes:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page;
if yes, the target application is judged to be the auxiliary application.
Further, step S1 further includes:
judging whether the component information of each application exists in a system setting list one by one according to the package information;
if yes, the application is judged to be the auxiliary application.
And S2, removing the application information which is judged to be the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
In the prior art, an application is determined to be an auxiliary application through artificial analysis and can be rejected by game detection, then a background database needs to be manually updated, when the application acquires an installed application list, information of the application list which needs to be hidden in the background database is returned through an http request, and then the application information is not returned through a packet name filtering condition, so that whether the auxiliary application is installed or not can not be known by a game. The prior art has the disadvantages of causing frequent network requests, possibly causing high network concurrency problems, and requiring frequent maintenance of auxiliary application lists by operators. The invention aims to solve the problem of how to replace manual judgment and hiding of auxiliary type application.
It will be appreciated that when the game or software obtains the installed application list, two methods getInstalledPackages, getInstalledApplications in the PackageManager class are called to return the installed application list, then the auxiliary application is judged whether to exist by traversing the returned package information list data, if so, the installation is judged, otherwise, the installation is not judged. The prior art scheme is that in the two functions, all auxiliary packet name information is returned through the back end of an http request, and then double-loop retrieval is carried out, namely, the prior art scheme carries out double traversal according to an auxiliary information list which is required to be protected through the http request, and then data in an installed list of a system, and if one or more auxiliary applications of the auxiliary list returned through the http are contained in the installed list of the system, the auxiliary application information is never returned.
In the embodiment of the invention, in the returned packet information list, the application characteristics of the packet information list are judged by detecting the information corresponding to the packet name to distinguish whether the packet information list is auxiliary application, and if so, the content corresponding to the packet name is removed from the normal packet information list without returning auxiliary application information through the http request back end. Therefore, the time-consuming problem caused by frequent network requests is avoided, the application requests can be responded quickly, the maintenance cost of operators is reduced, and the aim of automatically protecting auxiliary applications is fulfilled.
Referring to fig. 2, in an embodiment of the present invention, determining whether an application in an installed application list is an auxiliary application according to a preset auxiliary application determining rule includes:
rule 1: whether an application containing an input method but not containing an input method setting page exists is detected. It should be noted that, the normal input method App development needs to inherit the class InputMethodService in the Android API, and a setting page is implemented to allow the user to set options according to preference. However, some auxiliary applications, such as script-type auxiliary applications like game cells, require a self-implementing input method to implement a text input function, but the script-type auxiliary application does not implement a setup page, and according to this generality, it can be determined whether each application is a standard input method or a script-type auxiliary input method. Script type applications such as game cells and key fairs need to support text input, and normal system input execution files do not support Chinese input, so that input method service can be realized in auxiliary applications, and input method setting pages are not realized.
Rule 2: it is determined whether the application requires auxiliary functions. It should be noted that, the auxiliary function type application does not need root permission, the auxiliary function type application is actually provided by the Android system for convenience to the disabled, if the function capable of conveniently clicking is required to be developed according to the API, certain service component information must be added into the system setting, so that whether the component information of the application exists in the system setting list is judged, whether the application is an auxiliary application or not can be judged, if the application exists, the auxiliary application is the auxiliary application, and if the application is not the auxiliary application, the auxiliary application is not the auxiliary application. Common usage scenarios for these auxiliary applications: the WeChat robs the red packet App and automatically assists in the determination of the installation application. The auxiliary function is originally used for supporting people with disorder, but is applied to the scene of interface monitoring and automatic clicking, and is most commonly used for robbery package auxiliary application.
The two rules can judge that the application is the auxiliary application only if the judging condition of one rule is satisfied, and the application information of the application needs to be automatically hidden from being detected, so that the aim of automatically protecting the auxiliary application is fulfilled.
It should be noted that, for simplicity of description, the above method or flow embodiments are all described as a series of combinations of acts, but it should be understood by those skilled in the art that the embodiments of the present invention are not limited by the order of acts described, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are all alternative embodiments and that the actions involved are not necessarily required for the embodiments of the present invention.
In order to solve the same technical problems, the invention also provides an automatic protection device for auxiliary application, comprising:
the auxiliary application judging module is used for acquiring an installed application list of the equipment and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
and the auxiliary application hiding module is used for removing the application information judged as the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
Further, the auxiliary application judging module is specifically configured to:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page;
if yes, the target application is judged to be the auxiliary application.
Further, the auxiliary application judging module is further configured to:
judging whether the component information of each application exists in a system setting list one by one according to the package information;
if yes, the application is judged to be the auxiliary application.
It can be understood that the embodiment of the device item corresponds to the embodiment of the method item of the present invention, and the automatic protection device for the auxiliary application provided by the embodiment of the present invention can implement the automatic protection method for the auxiliary application provided by any one of the embodiment of the method item of the present invention.
To solve the same technical problem, the present invention also provides an auxiliary application automatic protection device, including a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the memory being coupled to the processor, and the processor implementing any one of the auxiliary application automatic protection methods when executing the computer program.
To solve the same technical problem, the present invention further provides a computer readable storage medium, where a computer program is stored, where the computer program controls a device where the computer readable storage medium is located to execute any one of the auxiliary application automatic protection methods when running.
Compared with the prior art, the invention has the following beneficial effects:
the invention provides an automatic protection method and device for auxiliary applications, which can automatically detect and hide auxiliary applications to protect the auxiliary applications when software needs to acquire an application list, and meanwhile, the auxiliary application list is not required to be manually maintained, so that the method and device solve the time-consuming problem caused by frequent network requests when the application list is detected in the prior art, further, the application requests can be responded quickly, the maintenance cost of operators is reduced, and the aim of automatically protecting the auxiliary applications is fulfilled.
While the foregoing is directed to the preferred embodiments of the present invention, it will be appreciated by those skilled in the art that changes and modifications may be made without departing from the principles of the invention, such changes and modifications are also intended to be within the scope of the invention.

Claims (4)

1. An auxiliary application automatic protection method, comprising:
acquiring an installed application list of equipment, and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
the step of judging whether the application in the installed application list is an auxiliary application one by one according to a preset auxiliary application judging rule comprises the following steps:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page; if yes, judging the target application as an auxiliary application;
judging whether the component information of each application exists in a system setting list one by one according to the package information; if yes, judging the application as an auxiliary application;
and removing the application information which is judged to be the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
2. An auxiliary application automatic protection device, characterized by comprising:
the auxiliary application judging module is used for acquiring an installed application list of the equipment and judging whether the applications in the installed application list are auxiliary applications one by one according to a preset auxiliary application judging rule;
wherein, the auxiliary application judging module comprises:
acquiring package information of each application in the installed application list;
judging whether target applications exist in all applications one by one according to the package information; the target application comprises an application which has an input method function and does not contain an input method setting page; if yes, judging the target application as an auxiliary application;
judging whether the component information of each application exists in a system setting list one by one according to the package information; if yes, judging the application as an auxiliary application;
and the auxiliary application hiding module is used for removing the application information judged as the auxiliary application from the installed application list, obtaining an auxiliary application hiding list and returning the auxiliary application hiding list.
3. An auxiliary application automatic protection device comprising a processor, a memory and a computer program stored in the memory and configured to be executed by the processor, the memory being coupled to the processor, and the processor implementing the auxiliary application automatic protection method of claim 1 when the computer program is executed by the processor.
4. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, wherein the computer program, when run, controls a device on which the computer readable storage medium is located to execute the auxiliary application automatic protection method according to claim 1.
CN201910977340.2A 2019-10-14 2019-10-14 Automatic protection method and device for auxiliary application Active CN110795133B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910977340.2A CN110795133B (en) 2019-10-14 2019-10-14 Automatic protection method and device for auxiliary application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910977340.2A CN110795133B (en) 2019-10-14 2019-10-14 Automatic protection method and device for auxiliary application

Publications (2)

Publication Number Publication Date
CN110795133A CN110795133A (en) 2020-02-14
CN110795133B true CN110795133B (en) 2024-03-15

Family

ID=69439198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910977340.2A Active CN110795133B (en) 2019-10-14 2019-10-14 Automatic protection method and device for auxiliary application

Country Status (1)

Country Link
CN (1) CN110795133B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN106708566A (en) * 2016-11-30 2017-05-24 武汉斗鱼网络科技有限公司 Method for judgment of installation of application programs and judgment system
CN108833956A (en) * 2018-06-13 2018-11-16 何世容 A kind of short-sighted sound interval sort run method, apparatus, terminal and computer storage medium
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN106708566A (en) * 2016-11-30 2017-05-24 武汉斗鱼网络科技有限公司 Method for judgment of installation of application programs and judgment system
CN108833956A (en) * 2018-06-13 2018-11-16 何世容 A kind of short-sighted sound interval sort run method, apparatus, terminal and computer storage medium
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device

Also Published As

Publication number Publication date
CN110795133A (en) 2020-02-14

Similar Documents

Publication Publication Date Title
US8793682B2 (en) Methods, systems, and computer program products for controlling software application installations
US8181254B1 (en) Setting default security features for use with web applications and extensions
JP6577399B2 (en) System and method for preventing installation and execution of undesirable programs
KR100968126B1 (en) System for Detecting Webshell and Method Thereof
CN101964026A (en) Method and system for detecting web page horse hanging
CN111416811A (en) Unauthorized vulnerability detection method, system, equipment and storage medium
CN105607986A (en) Acquisition method and device of user behavior log data
CN107147645B (en) Method and device for acquiring network security data
JP2016015114A (en) Method and device for identifying attached software
CN114065196A (en) Java memory horse detection method and device, electronic equipment and storage medium
CN111563015A (en) Data monitoring method and device, computer readable medium and terminal equipment
US8561195B1 (en) Detection of malicious code based on its use of a folder shortcut
CN102156650B (en) Method and device capable of implementing automatic analysis of patch
Seo et al. A study on memory dump analysis based on digital forensic tools
KR101503827B1 (en) A detect system against malicious processes by using the full path of access files
CN110795133B (en) Automatic protection method and device for auxiliary application
KR101716690B1 (en) Unauthorized data access blocking method and computing apparatus having Unauthorized data access blocking function
CN116595523A (en) Multi-engine file detection method, system, equipment and medium based on dynamic arrangement
US20180020075A1 (en) Apparatus and method for providing data based on cloud service
CN111241547A (en) Detection method, device and system for unauthorized vulnerability
CN112434287B (en) Method, device, equipment and storage medium for detecting Hook
CN116450533B (en) Security detection method and device for application program, electronic equipment and medium
US11354440B1 (en) Analyzing and mitigating privacy issues on a computing device using cookie generation flows
CN111488230A (en) Method and device for modifying log output level, electronic equipment and storage medium
Yoon et al. A Hidden File Extraction Scheme Defeating Malware Using Android Dynamic Loading

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240314

Address after: Room 290, First Floor, No. 2429 Xingang East Road, Zhuhai District, Guangzhou City, Guangdong Province, 510220

Applicant after: Guangzhou Duling Technology Co.,Ltd.

Country or region after: China

Address before: B301, building 2, Rongxi center, no.713, Jiangnan Avenue South, Haizhu District, Guangzhou, Guangdong 510000

Applicant before: GUANGZHOU MICRO-COMPUTING INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 290, First Floor, No. 2429 Xingang East Road, Haizhu District, Guangzhou City, Guangdong Province, 510220

Patentee after: Guangzhou Duling Technology Co.,Ltd.

Country or region after: China

Address before: Room 290, First Floor, No. 2429 Xingang East Road, Zhuhai District, Guangzhou City, Guangdong Province, 510220

Patentee before: Guangzhou Duling Technology Co.,Ltd.

Country or region before: China