CN112540929A - Detection method, device, equipment and storage medium - Google Patents

Detection method, device, equipment and storage medium Download PDF

Info

Publication number
CN112540929A
CN112540929A CN202011561954.1A CN202011561954A CN112540929A CN 112540929 A CN112540929 A CN 112540929A CN 202011561954 A CN202011561954 A CN 202011561954A CN 112540929 A CN112540929 A CN 112540929A
Authority
CN
China
Prior art keywords
installation package
detection result
server
obtaining
package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011561954.1A
Other languages
Chinese (zh)
Other versions
CN112540929B (en
Inventor
钟普
杜威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202011561954.1A priority Critical patent/CN112540929B/en
Publication of CN112540929A publication Critical patent/CN112540929A/en
Application granted granted Critical
Publication of CN112540929B publication Critical patent/CN112540929B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure discloses a detection method, a detection device, detection equipment and a storage medium, and relates to the technical field of cloud computing, big data and intelligent search. The specific implementation scheme is as follows: acquiring an installation package needing to be detected of an application to be issued; acquiring a category name of information needing to be detected in the installation package; acquiring a detection result of the conformity condition of the installation package and the release rule according to the category name; and uploading the detection result to a server, so that the server can execute the issuing operation of the application to be issued according to the detection result. The method and the device can reduce the total time for transmitting and detecting the installation package before the application is released.

Description

Detection method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technology, and more particularly, to the field of cloud computing, big data, and intelligent search technology.
Background
With the development of computer technology and various computer terminals, the utilization of computer technology is increasing. For example, in addition to installing a computer program on a device such as a computer, an application can be downloaded and installed by a mobile terminal such as a mobile phone, and network access and information transmission/reception operations can be performed on the mobile terminal such as a mobile phone by the installed application.
Before an application is released, compliance checking is often required for an installation package of the application. Sometimes, due to the reasons of overlarge installation package, network speed limitation and the like, the transmission time of the installation package is too long, the time consumption of compliance check is too long, and the publishing efficiency of the installation package is low.
Disclosure of Invention
The disclosure provides a detection method, a detection device, a detection apparatus and a storage medium.
According to an aspect of the present disclosure, there is provided a detection method including:
acquiring an installation package needing to be detected of an application to be issued;
acquiring a category name of information needing to be detected in an installation package;
according to the class name, obtaining a detection result of the condition of conformity of the installation package and the release rule;
and uploading the detection result to the server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
According to another aspect of the present disclosure, there is provided a detection method including:
receiving a request of a client for uploading an installation package of an application to be issued;
based on the request, obtaining a detection result of the condition that the installation package and the release rule accord with each other, wherein the detection result is obtained according to the category name of the information to be detected in the installation package;
and executing the issuing operation of the application to be issued based on the detection result.
According to still another aspect of the present disclosure, there is provided a detection apparatus including:
the installation package obtaining module is used for obtaining an installation package which needs to be detected and is applied to be issued;
the system comprises a category name obtaining module, a category name detecting module and a category name detecting module, wherein the category name obtaining module is used for obtaining a category name of information needing to be detected in an installation package;
the detection result module is used for obtaining the detection result of the condition of conformity of the installation package and the release rule according to the category name;
and the uploading module is used for uploading the detection result to the server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
According to still another aspect of the present disclosure, there is provided a detection apparatus including:
the request receiving module is used for receiving a request of uploading an installation package of an application to be issued from a client;
the detection result obtaining module is used for obtaining a detection result of the condition that the installation package and the release rule accord with each other based on the request, and the detection result is obtained according to the category name of the information to be detected in the installation package;
and the response module is used for executing the issuing operation of the application to be issued based on the detection result.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method according to any one of the embodiments of the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method in any of the embodiments of the present disclosure.
According to another aspect of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method in any of the embodiments of the present disclosure.
According to the technology disclosed by the invention, the sending and receiving efficiency of the applied installation package can be improved, and the operation time of the transmission or detection of the installation package of the sender and the receiver is obviously reduced.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram of a detection method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a detection method according to another embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a detection method according to an example of the present disclosure;
FIG. 4 is a schematic view of a detection device according to an embodiment of the present disclosure;
FIG. 5 is a schematic view of a detection device according to another embodiment of the present disclosure;
FIG. 6 is a schematic view of a detection device according to yet another embodiment of the present disclosure;
FIG. 7 is a schematic view of a detection device according to yet another embodiment of the present disclosure;
FIG. 8 is a schematic view of a detection device according to yet another embodiment of the present disclosure;
FIG. 9 is a schematic view of a detection device according to yet another embodiment of the present disclosure;
FIG. 10 is a block diagram of an electronic device for implementing a detection method of an embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
The embodiment of the present disclosure provides a detection method, as shown in fig. 1, including:
step S11: obtaining an installation package needing to be detected of an application to be issued;
step S12: acquiring a category name of information needing to be detected in an installation package;
step S13: according to the class name, obtaining a detection result of the condition of conformity of the installation package and the release rule;
step S14: and uploading the detection result to the server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
In this embodiment, the application to be released may be various applications that can be installed in the terminal. Such as a cell phone application, a tablet application, a smart watch application, a smart player application, a smart television application, a game console application, and so forth.
The applications to be published can be various categories of applications, such as game applications, shopping applications, chat applications.
The installation package needing to be detected can be an unpublished installation package or an upgrade package of an application.
The information that needs to be detected in the installation package may specifically be information that may not meet the specification and information that may have a risk in the installation package. Specifically, the installation package may be a part of code of the installation package, a file in the installation package, or the like.
Obtaining a detection result of the compliance status of the installation package and the release rule according to the category name, which may specifically include: detecting whether the category names accord with set rules or detecting the category names of all information needing to be detected, and judging whether the category names which do not accord with the rules exist. A category name that does not comply with the rules may correspond to a file with a higher risk, a code with a higher risk, etc.
Obtaining a detection result of the compliance status of the installation package and the release rule according to the category name, which may specifically include: and determining the conformity condition of the installation package and the release rule according to the category name and the set category name white list, and obtaining a detection result.
Obtaining a detection result of the compliance status of the installation package and the release rule according to the category name, which may specifically include: and determining the conformity condition of the installation package and the release rule according to the category name and the set category name blacklist, and obtaining a detection result.
The publication rule may be a rule corresponding to an application scenario of the installation package. Specifically, the server receiving the installation package may perform setting and issue.
The detection result may include: the installation package conforms to the release rule, part of the installation package does not conform to the release rule, and all the installation packages do not conform to the release rule.
And uploading the detection result to the server, specifically, uploading the detection result and the corresponding relationship between the detection result and the installation package to the server. The server can be a cloud end, and also can be a back end used for checking the installation rule condition.
In this embodiment, can carry out compliance detection earlier in application installation package provider one end, after the detection, upload the testing result to the server, when making follow-up upload the installation package, can normally carry out comparatively accurate judgement to uploading operation according to the testing result, thereby application installation package provider can carry out abundant inspection when uploading the installation package, judge in advance according to the inspection result whether need modify the installation package after uploading to the server, furthest avoids the installation package of uploading to be out of conformity with the standard and need to modify and upload again, the amount of operation that the installation package of using uploaded has been saved.
In one embodiment, obtaining a category name of information to be detected in an installation package includes:
acquiring an application program package file and a core code package in an installation package;
acquiring a virtual machine file format in an application program package file and a core code package;
and analyzing the file format of the virtual machine to obtain the category name.
In this embodiment, the virtual machine file format may be a Dalvik executable file format.
In this embodiment, the virtual machine file format is obtained according to the application package file and the core code package, so that a category name of information to be detected in the installation package can be obtained according to the virtual machine file format, and a compliance detection result of the installation package related to the application can be obtained according to the category name. Meanwhile, in the embodiment, the third-party category name is obtained by directly analyzing the file, and the whole code detail is not completely decompiled through an external tool, so that the decompiling process at the minute level is compressed to the second level.
In one embodiment, parsing the file format of the virtual machine to obtain a class name comprises:
analyzing the file format of the virtual machine, and positioning a type identifier list of information to be detected in the installation package in the analyzed information;
from the list of type identifiers, the category names are obtained.
In this embodiment, obtaining the category name according to the type identifier list may specifically include: and obtaining the plain text of all the category names of the installation package by indexing the type identifier list.
In this embodiment, the type identifier list is obtained, and the category name is obtained according to the type identifier list, so that more comprehensive information to be detected can be extracted, and the detection result is more accurate.
Illustratively, obtaining a detection result of the compliance of the installation package and the release rule according to the class name includes:
and determining the conformity status of the installation package and the release rule according to whether the category name accords with the set category name rule or not, and obtaining a detection result.
In one embodiment, uploading the detection result to the server includes:
and binding the Message Digest Algorithm value (MD5, Message-Digest Algorithm) of the installation package with the detection result, and uploading the result to the server.
In some implementation scenarios, the information digest algorithm value of the installation package is calculated according to the installation package under the condition that the detection result indicates that the installation package meets the release rule. And under the condition that the detection result is that the installation package does not accord with or does not accord with the release rule completely, the applied installation package provider can correct the installation package by self so that the installation package accords with the release rule.
In other embodiments, a numerical value having a unique correspondence with the content of the installation package can be calculated through other algorithms, so that when the installation package is subsequently uploaded, the server can perform traditional server check on the installation package according to the uploaded detection result.
An embodiment of the present disclosure further provides a detection method, as shown in fig. 2, including:
step S21: receiving a request of a client for uploading an installation package of an application to be issued;
step S22: based on the request, obtaining a detection result of the condition that the installation package and the release rule accord with each other, wherein the detection result is obtained according to the category name of the information to be detected in the installation package;
step S23: and executing the issuing operation of the application to be issued based on the detection result.
In this embodiment, the client may be an application installation package provider side.
The detection result that the installation package and the release rule accord with the condition is obtained based on the request, and the detection result can be obtained by receiving the installation package based on the request, calculating an information abstract algorithm value according to the received installation package, and searching and obtaining the detection result consistent with the uploaded installation package in the detection result received by the server side according to the calculated information abstract algorithm value.
And obtaining a detection result of the condition that the installation package and the release rule accord with each other based on the request, or obtaining an information abstract algorithm value of the installation package based on the request, and obtaining a detection result consistent with the uploaded installation package by searching in the detection result received by the server side according to the information abstract algorithm value.
Based on the detection result, the issuing operation of the application to be issued is executed, which may specifically include, in a case where the detection result is qualified, skipping a conventional detection process, and executing the issuing operation.
Based on the detection result, executing the publishing operation of the application to be published, which may specifically include: and executing a traditional detection process under the condition that the detection result is unqualified, and executing issuing operation after the traditional detection result is qualified.
In this embodiment, the server can determine the subsequent operation to be executed on the installation package according to the detection result, so that the detection result of the client can play a role in performing reference assistance on the server, and the operation amount of the server can be reduced while the data transmission operation of the client is reduced.
In one embodiment, obtaining a detection result that the installation package and the release rule meet the condition based on the request comprises:
receiving an installation package based on the request;
obtaining an information abstract algorithm value according to the received installation package;
and inquiring the detection result according to the information abstract algorithm value.
In this embodiment, the server calculates an information digest algorithm value based on the received installation package, thereby ensuring that a detection result consistent with the installation package is searched. And potential safety hazards caused by data tampering when other terminals transmit the information digest algorithm value are avoided.
In one embodiment, based on the detection result, the issuing operation of the application to be issued is executed, and the method includes:
executing issuing operation based on the received installation package under the condition that the detection result is that the installation package is in accordance with the issuing rule;
and under the condition that the detection result does not exist or does not accord with the release rule, performing server-side check on the received installation package, and executing release operation based on the server-side check.
The server side check may be a generally conventional server side check.
And under the condition that the detection result is that the installation package is in accordance with the release rule, receiving the installation package, skipping the checking process of the server side, and executing the release operation.
The issuing operation is executed based on the server side check, and the issuing operation comprises the following steps: and executing the issuing operation under the condition that the server side check result is qualified.
In the case where the installation package is an installation package of a game application, the server check may include: background detection is performed after a game installation package is uploaded on an application market background management interface by a game manufacturer, tools such as AAPT (Android Packaging Tool), Apktool (Android application package Tool), bakmali (program for assembling/disassembling files in a dex format in Java virtual machine salvik of an Android system) and Jad (Java Decompiler ) can be used for performing reverse engineering on the installation package of the game application, decompilating the code of the installation package, extracting information such as Android statement configuration, resource information and introduced third party SDK (software development Kit) in the decompilated code, judging whether each item of information of the installation package conforms to a specification, and finally, a management interface display service end detection result is obtained on a service end platform.
In this embodiment, the server can perform different operations on the installation package according to the detection result, thereby saving the operation amount of the server and saving the processing time of the server.
In an example of the present disclosure, as shown in fig. 3, the detection method includes:
step S31: the rule settings are checked. The server administrator of the installation package receiver can set rules to be checked of the installation package in the inspection rule management module background of the server in advance, and can set different rule groups according to different scenes. For example, different rule sets may be set corresponding to a game, a merchandise distribution, and the like.
Step S32: and acquiring a check rule. The check rule management module of the server side can issue the rule to the client side and store the rule in the memory when the local check tool of the client side is started.
Step S33: and extracting key information. Namely, the key information of the installation package is extracted quickly. An operator at a client can select an installation package to be inspected in a local inspection tool interface, and directly analyze an apk (Android Asset Package) package file and a core code package class. Because the file is directly parsed to obtain the third party class name, rather than completely decompiling the entire code details through an external tool, the decompilation process at the minute level is compressed to the second level.
The Dalvik is a virtual machine designed by Google corporation for the Android platform itself. The Dalvik virtual machine is one of the core components of the Android mobile device platform developed by Google and other manufacturers. It can support the running of Java applications that have been converted to the @ (i.e., Dalvik Executable) format, a compressed format designed specifically for Dalvik, which is suitable for systems with limited memory and processor speeds. Dalvik is optimized to allow multiple instances of the virtual machine to run simultaneously in limited memory, and each Dalvik application executes as a separate Linux process. The independent process may prevent all programs from being shut down when the virtual machine crashes.
Step S34: the information is compared to the rules. And after the step of obtaining the information such as the key category alias and the like, comparing the information with the issued check rule one by one, if illegal information is found, terminating the comparison process, and prompting the user that the installation package is illegal, otherwise, continuing until all information is compared. After the comparison, if the check is passed, the process proceeds to step S35.
Step S35: and uploading the inspection result. The client operator can select to bind the inspection result with the installation package MD5 value on the premise of the detection result compliance of the installation package, and upload the inspection result to the inspection result management module of the server.
Step S36: and uploading the installation package. After uploading the detection result, the client operator may upload the installation package, and the server receives the inspection result bound with the MD5 value. The client side can upload the installation package under the condition that the check is passed, and can also upload the installation package under the condition that the check is not passed.
Step S37: and (6) judging the inspection result. Calculating the value of the installation package MD5, searching results from the check result management module through the MD5, and if the check result is legal, uploading the installation package this time is legal; and if the checking result is not found, the server side checking flow of the traditional scheme is carried out.
The embodiment of the present disclosure further provides a detection apparatus, as shown in fig. 4, including:
an installation package obtaining module 41, configured to obtain an installation package of an application to be published, which needs to be detected;
a category name obtaining module 42, configured to obtain a category name of information to be detected in the installation package;
a detection result module 43, configured to obtain, according to the class name, a detection result of the compliance status of the installation package and the release rule;
and the uploading module 44 is configured to upload the detection result to the server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
In one embodiment, as shown in FIG. 5, the category name obtaining module comprises:
a file unit 51, configured to obtain an application package file and a core code package in an installation package;
a virtual machine file format unit 52, configured to obtain a virtual machine file format in the application package file and the core code package;
and the analyzing unit 53 is configured to analyze the file format of the virtual machine to obtain the category name.
In one embodiment, the parsing unit is further configured to:
analyzing the file format of the virtual machine, and positioning a type identifier list of information to be detected in the installation package in the analyzed information;
from the list of type identifiers, the category names are obtained.
In one embodiment, as shown in fig. 6, the upload module includes:
and the binding unit 61 is used for binding the information abstract algorithm value of the installation package with the detection result and uploading the binding result to the server.
The embodiment of the present disclosure further provides a detection apparatus, as shown in fig. 7, including:
a request receiving module 71, configured to receive a request for uploading an installation package of an application to be published by a client;
a detection result obtaining module 72, configured to obtain, based on the request, a detection result that the installation package and the release rule meet the condition, where the detection result is obtained according to a category name of the information to be detected in the installation package;
and the response module 73 is configured to execute a publishing operation of the application to be published based on the detection result.
In one embodiment, as shown in fig. 8, the detection result obtaining module includes:
an installation package receiving unit 81 for receiving an installation package based on the request;
an information digest algorithm unit 82, configured to obtain an information digest algorithm value according to the received installation package;
and the query unit 83 is configured to query the detection result according to the information digest algorithm value.
In one embodiment, as shown in FIG. 9, the response module includes:
a first response unit 91, configured to, in a case that the detection result is that the installation package conforms to the publishing rule, perform a publishing operation based on the received installation package;
and a second response unit 92, configured to perform a server check on the received installation package in the absence of the detection result, and perform an issuing operation based on the server check result.
The functions of each unit, module or sub-module in each data processing apparatus in the embodiments of the present disclosure may refer to the corresponding description in the above data processing method embodiments, and are not described herein again.
The embodiment of the disclosure can be applied to various fields, for example, the technical fields of big data, intelligent search and cloud computing.
The disclosed embodiment reduces the rule checking of the original game installation rule from tens of minutes to a few seconds before, and can be applied to a plurality of fields except games. Such as: checking embedded advertisements of the application market installation package; checking Apk security and privacy authority of an application developer; a static test scenario is applied.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 10 illustrates a schematic block diagram of an example electronic device 110 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 10, the apparatus 110 includes a computing unit 111 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)112 or a computer program loaded from a storage unit 118 into a Random Access Memory (RAM) 113. In the RAM113, various programs and data required for the operation of the device 110 can also be stored. The calculation unit 111, the ROM 112, and the RAM113 are connected to each other by a bus 114. An input/output (I/O) interface 115 is also connected to bus 114.
A number of components in device 110 are connected to I/O interface 115, including: an input unit 116 such as a keyboard, a mouse, and the like; an output unit 117 such as various types of displays, speakers, and the like; a storage unit 118, such as a magnetic disk, optical disk, or the like; and a communication unit 119 such as a network card, a modem, a wireless communication transceiver, and the like. The communication unit 119 allows the device 110 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 111 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 111 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and the like. The calculation unit 111 performs the respective methods and processes described above, such as the detection method. For example, in some embodiments, the detection method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 118. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 110 via ROM 112 and/or communications unit 119. When the computer program is loaded into RAM113 and executed by the computing unit 111, one or more steps of the detection method described above may be performed. Alternatively, in other embodiments, the computing unit 111 may be configured to perform the detection method by any other suitable means (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A method of detection, comprising:
acquiring an installation package needing to be detected of an application to be issued;
acquiring a category name of information needing to be detected in the installation package;
acquiring a detection result that the installation package and the release rule accord with the condition according to the category name;
and uploading the detection result to a server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
2. The method of claim 1, wherein the obtaining of the category name of the information to be detected in the installation package comprises:
acquiring an application program package file and a core code package in the installation package;
acquiring the virtual machine file format in the application program package file and the core code package;
and analyzing the file format of the virtual machine to obtain the category name.
3. The method of claim 2, wherein said parsing the virtual machine file format to obtain the class name comprises:
analyzing the file format of the virtual machine, and positioning a type identifier list of information needing to be detected in the installation package in the analyzed information;
and acquiring the category name according to the type identifier list.
4. The method according to any one of claims 1 to 3, wherein the uploading the detection result to a server comprises:
and binding the information abstract algorithm value of the installation package with the detection result, and uploading the information abstract algorithm value to the server.
5. A method of detection, comprising:
receiving a request of a client for uploading an installation package of an application to be issued;
based on the request, obtaining a detection result of the condition that the installation package and the release rule accord with each other, wherein the detection result is obtained according to the category name of the information to be detected in the installation package;
and executing the issuing operation of the application to be issued based on the detection result.
6. The method of claim 5, wherein obtaining a detection result of compliance of the installation package with a publication rule based on the request comprises:
receiving the installation package based on the request;
obtaining an information abstract algorithm value according to the received installation package;
and inquiring the detection result according to the information abstract algorithm value.
7. The method of claim 5, wherein the performing, based on the detection result, the publishing operation of the application to be published comprises:
executing issuing operation based on the received installation package under the condition that the detection result is that the installation package is in accordance with the issuing rule;
and under the condition that the detection result does not exist, performing server side inspection on the received installation package, and executing issuing operation based on the server side inspection result.
8. A detection device, comprising:
the installation package obtaining module is used for obtaining an installation package which needs to be detected and is applied to be issued;
the class name obtaining module is used for obtaining a class name of the information needing to be detected in the installation package;
the detection result module is used for obtaining the detection result of the condition of conformity of the installation package and the release rule according to the category name;
and the uploading module is used for uploading the detection result to a server, so that the server can execute the issuing operation of the application to be issued according to the detection result.
9. The apparatus of claim 8, wherein the class name obtaining module comprises:
the file unit is used for obtaining the application program package file and the core code package in the installation package;
the virtual machine file format unit is used for obtaining the virtual machine file format in the application program package file and the core code package;
and the analysis unit is used for analyzing the file format of the virtual machine to obtain the category name.
10. The apparatus of claim 9, wherein the parsing unit is further configured to:
analyzing the file format of the virtual machine, and positioning a type identifier list of information needing to be detected in the installation package in the analyzed information;
and obtaining the category name according to the type identifier list.
11. The apparatus of any of claims 9-10, wherein the upload module comprises:
and the binding unit is used for binding the information abstract algorithm value of the installation package with the detection result and uploading the information abstract algorithm value to the server.
12. A detection device, comprising:
the request receiving module is used for receiving a request of uploading an installation package of an application to be issued from a client;
a detection result obtaining module, configured to obtain, based on the request, a detection result that the installation package and the release rule meet a condition, where the detection result is obtained according to a category name of information to be detected in the installation package;
and the response module is used for executing the issuing operation of the application to be issued based on the detection result.
13. The apparatus of claim 12, wherein the detection result obtaining module comprises:
an installation package receiving unit configured to receive the installation package based on the request;
the information abstract algorithm unit is used for obtaining an information abstract algorithm value according to the received installation package;
and the query unit is used for querying the detection result according to the information abstract algorithm value.
14. The apparatus of claim 12, wherein the response module comprises:
the first response unit is used for executing the issuing operation based on the received installation package under the condition that the detection result is that the installation package is in accordance with the issuing rule;
and the second response unit is used for carrying out server-side check on the received installation package under the condition that the detection result does not exist, and executing issuing operation based on the server-side check result.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
16. A non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform the method of any one of claims 1-7.
17. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-7.
CN202011561954.1A 2020-12-25 2020-12-25 Detection method, detection device, detection equipment and storage medium Active CN112540929B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011561954.1A CN112540929B (en) 2020-12-25 2020-12-25 Detection method, detection device, detection equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011561954.1A CN112540929B (en) 2020-12-25 2020-12-25 Detection method, detection device, detection equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112540929A true CN112540929A (en) 2021-03-23
CN112540929B CN112540929B (en) 2024-03-12

Family

ID=75017425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011561954.1A Active CN112540929B (en) 2020-12-25 2020-12-25 Detection method, detection device, detection equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112540929B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090327300A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Manifest-based enhanced presence publishing
CN104331376A (en) * 2014-11-14 2015-02-04 北京奇虎科技有限公司 Method and device for clearing installation package stored in mobile terminal
WO2015090153A1 (en) * 2013-12-16 2015-06-25 北京网秦天下科技有限公司 Security detection method, apparatus, and system for application installation package
CN104766008A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Application program installation package safety detection method and server
WO2018121266A1 (en) * 2016-12-29 2018-07-05 北京奇虎科技有限公司 Method and device for obtaining application and terminal device
CN109933381A (en) * 2019-03-06 2019-06-25 腾讯科技(深圳)有限公司 A kind of loading method and device of kernel
CN110297776A (en) * 2019-07-03 2019-10-01 深圳市腾讯网域计算机网络有限公司 Examining report generation, method of reseptance, device, equipment and storage medium
CN110826068A (en) * 2019-11-01 2020-02-21 海南车智易通信息技术有限公司 Safety detection method and safety detection system
CN110896540A (en) * 2019-11-21 2020-03-20 国网辽宁省电力有限公司电力科学研究院 Mobile internet client security assessment tool, method, computer device and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090327300A1 (en) * 2008-06-26 2009-12-31 Microsoft Corporation Manifest-based enhanced presence publishing
WO2015090153A1 (en) * 2013-12-16 2015-06-25 北京网秦天下科技有限公司 Security detection method, apparatus, and system for application installation package
CN104766008A (en) * 2014-01-07 2015-07-08 腾讯科技(深圳)有限公司 Application program installation package safety detection method and server
CN104331376A (en) * 2014-11-14 2015-02-04 北京奇虎科技有限公司 Method and device for clearing installation package stored in mobile terminal
WO2018121266A1 (en) * 2016-12-29 2018-07-05 北京奇虎科技有限公司 Method and device for obtaining application and terminal device
CN109933381A (en) * 2019-03-06 2019-06-25 腾讯科技(深圳)有限公司 A kind of loading method and device of kernel
CN110297776A (en) * 2019-07-03 2019-10-01 深圳市腾讯网域计算机网络有限公司 Examining report generation, method of reseptance, device, equipment and storage medium
CN110826068A (en) * 2019-11-01 2020-02-21 海南车智易通信息技术有限公司 Safety detection method and safety detection system
CN110896540A (en) * 2019-11-21 2020-03-20 国网辽宁省电力有限公司电力科学研究院 Mobile internet client security assessment tool, method, computer device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
管飞诗;徐夫田;: "基于类别SVM的Android系统恶意软件检测研究", 科技风, no. 21 *
蒋煦;张长胜;戴大蒙;慕德俊;: "Android平台恶意应用程序静态检测方法", 计算机系统应用, no. 04 *

Also Published As

Publication number Publication date
CN112540929B (en) 2024-03-12

Similar Documents

Publication Publication Date Title
CN106156186B (en) Data model management device, server and data processing method
CN110149298B (en) Hijacking detection method and device
CN107506256B (en) Method and device for monitoring crash data
CN108111364B (en) Service system testing method and device
CN110267215B (en) Data detection method, equipment and storage medium
CN110244963B (en) Data updating method and device and terminal equipment
CN112035344A (en) Multi-scenario test method, device, equipment and computer readable storage medium
CN111221727A (en) Test method, test device, electronic equipment and computer readable medium
CN106301975B (en) Data detection method and device
CN113641544B (en) Method, apparatus, device, medium and product for detecting application state
CN112269706A (en) Interface parameter checking method and device, electronic equipment and computer readable medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN114139161A (en) Method, device, electronic equipment and medium for batch vulnerability detection
CN113609027A (en) ARM cloud server testing method and device, electronic equipment and storage medium
CN113377381A (en) Method and device for distributing small program package, electronic equipment and medium
CN111414154A (en) Method and device for front-end development, electronic equipment and storage medium
CN112540929B (en) Detection method, detection device, detection equipment and storage medium
US20240031166A1 (en) Web-side data signature method and apparatus and computer device
CN112379967B (en) Simulator detection method, device, equipment and medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN113138768A (en) Application package generation method and device, electronic equipment and readable storage medium
AU2013206622B2 (en) Download management method and device based on Android browser
CN106294411B (en) Software category identification method and system
CN114327602B (en) Information processing method, device, electronic equipment and storage medium
CN113760765B (en) Code testing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant