CN114329360B - Method, electronic device and medium for fuzzification pkg - Google Patents

Method, electronic device and medium for fuzzification pkg Download PDF

Info

Publication number
CN114329360B
CN114329360B CN202210012991.XA CN202210012991A CN114329360B CN 114329360 B CN114329360 B CN 114329360B CN 202210012991 A CN202210012991 A CN 202210012991A CN 114329360 B CN114329360 B CN 114329360B
Authority
CN
China
Prior art keywords
pkg
file
files
installation amount
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210012991.XA
Other languages
Chinese (zh)
Other versions
CN114329360A (en
Inventor
叶新江
姚建明
尹雅露
董霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merit Interactive Co Ltd
Original Assignee
Merit Interactive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merit Interactive Co Ltd filed Critical Merit Interactive Co Ltd
Priority to CN202210012991.XA priority Critical patent/CN114329360B/en
Publication of CN114329360A publication Critical patent/CN114329360A/en
Application granted granted Critical
Publication of CN114329360B publication Critical patent/CN114329360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method, an electronic device and a medium for fuzzifying pkg, wherein the method comprises the steps of obtaining a first pkg list according to a pkg white list and obtaining a second pkg list based on the first pkg list; acquiring an installation amount interval corresponding to the file identifier of a first type pkg file according to a first installation amount corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the installation amount interval are acquired according to a device proportion threshold corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first class pkg files are determined according to the installation amount interval, and therefore the method can accurately determine the limitation condition for screening the installation amount of the second class pkg texts, and avoid the situation that a pkg file group constructed by the first class pkg files and the second class pkg files corresponding to the first class pkg files cannot effectively obscure the first class pkg and further cannot improve the information security due to the fact that the number of the second class pkg files corresponding to the first class pkg files is small.

Description

Method, electronic device and medium for fuzzification pkg
Technical Field
The invention relates to the technical field of pkg processing, in particular to a method, electronic equipment and medium for fuzzification pkg.
Background
With the popularization of electronic devices, each electronic device is related to information security, and information security is more and more emphasized in the current network environment.
At present, most electronic equipment has installed a large amount of APPs, these APPs are used for the use of scenes such as life or work how much, therefore every APP all involves the information, and then can produce malicious behaviors such as revealing information or malicious transmission information and influence information security, especially must have installation package configuration file when installing the APP, pkg file for short, pkg file is one of the sources of obtaining the information, but among the prior art, all encrypt or many information transmission in-process through many information encryption to information security's technical scheme, few technical scheme relates to the security that improves pkg file information, therefore, lead to pkg file information's revealing or malicious transmission, influence electronic equipment's information security.
Disclosure of Invention
In order to solve the problems in the prior art, any second type pkg file corresponding to the first type pkg file is screened out through the installation amount of the first type pkg file to form a target pkg file group, so that a single pkg file is replaced, the pkg is fuzzified, and the information safety is improved; the embodiment of the invention provides a method for fuzzification pkg, which comprises the following steps:
a method for obfuscating pkg, the method comprising the steps of:
s10, obtaining a first pkg list A ═ A (A) according to pkg white list1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred, i is 1 … … m, and m is the number of first-type pkg files;
s20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
Figure BDA0003459692450000021
piMeans AiA corresponding first equipment proportion value;
Figure BDA0003459692450000022
qimeans AiA corresponding second equipment fraction value;
wherein, λ is a preset parameter;
s30, according to Z in AiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1);
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein, BjThe file identifier of the jth second-type pkg file is referred to, j is 1 … … n, and n is the number of the second-type pkg files;
s50, traverse A 'and B' and when BjSecond installation amount < ZiAt the time of corresponding installation amount, B is acquiredjSecond installation ofLoading capacity
Figure BDA0003459692450000023
To Bj+λSecond installation amount of
Figure BDA0003459692450000024
And build an intermediate data set
Figure BDA0003459692450000025
Figure BDA0003459692450000026
S60, based on UijObtaining FiAnd is
Figure BDA0003459692450000027
S70, according to FiObtaining FiCorresponding first object pkg group and FiThe corresponding set of first objectives pkg is fed back to the database.
The invention also protects a non-transitory computer readable storage medium having stored therein at least one instruction or at least one program, which is loaded and executed by a processor to implement the above method.
The invention also protects an electronic device comprising a processor and the non-transitory computer readable storage medium described above.
The invention provides a method, an electronic device and a medium for fuzzifying pkg, which have the following technical effects:
the method comprises the steps of obtaining a first pkg list and a second pkg list based on a first pkg list according to an pkg white list; acquiring an installation amount interval corresponding to the file identifier of a first type pkg file according to a first installation amount corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the installation amount interval are acquired according to a device proportion threshold corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first pkg files are determined according to the installation amount interval, so that the method can accurately determine the limitation condition for screening the installation amount of the second pkg files, and avoid the situation that the pkg file group constructed by the first pkg files and the second pkg files corresponding to the first pkg files cannot effectively obscure the first pkg files due to the fact that the number of the second pkg files corresponding to the first pkg files is small, and further cannot improve the information safety.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for obfuscating pkg according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
As shown in fig. 1, the present embodiment provides a method for obfuscating pkg, the method including the steps of:
s10, obtaining a first pkg list A ═ A (A) according to pkg white list1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred to, i is 1 … … m, and m is the number of first-type pkg files.
Specifically, the sample pkg list includes file identifications for the S sample pkg files.
Specifically, before the step S100, the sample pkg is also determined by the following steps:
s1, obtaining the file identification of a plurality of original pkg files and the installation amount corresponding to each original pkg file.
Further, the installation amount corresponding to the original pkg file refers to the number of electronic devices that install the original pkg file.
Further, the file identification of the original pkg file refers to the unique identity that characterizes the original pkg file.
And S3, when the installation amount corresponding to the original pkg file is larger than a preset first installation amount threshold value, taking the original pkg file as a sample pkg file.
Further, the value range of the first installation amount threshold is 500-600, and preferably, the value of the first installation amount threshold is 500.
The steps S1-S3 can remove pkg files with small installation amount, and avoid the influence of overlarge data amount on the data processing efficiency.
Specifically, the pkg white list refers to a pkg list constructed based on file identification of a target pkg file, where an installation amount corresponding to the target pkg file is greater than a preset second installation amount threshold D0
Further, D0Has a value in the range of 10000-15000, preferably D0Has a value of 10000.
Specifically, the first type pkg file refers to any target pkg file in the pkg white list stored in the sample pkg list.
S20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
Figure BDA0003459692450000051
piMeans AiA corresponding first equipment proportion value;
Figure BDA0003459692450000052
qimeans AiThe corresponding second equipment accounts for the ratio;
wherein λ is a preset parameter.
Specifically, the first installation amount refers to the number of electronic devices that install any one first type pkg file.
In particular, Zip>ZiqThe installation amount interval to be supplemented corresponding to any one first-type pkg file can be determined, so that the equipment proportion value of the first-type pkg file meets the corresponding equipment proportion threshold, pkg fuzzification is realized, and information safety is improved.
Specifically, in the step S20, q is also determined by the following stepsiAnd pi
S201, obtaining a mounting quantity threshold set D { (D)0,D1],(D1,D2],……,(Dk-1,Dk]Wherein (D)r-1,Dr]The number of the r installation quantity threshold intervals is defined, wherein r is 1 … … k, and k is the number of the installation quantity intervals; it can be understood that: d1To DkAre all preset installation quantity threshold values, wherein Dr-1Is the lower limit value of the threshold interval of the r-th installation amount, DrIs the upper limit value of the threshold interval of the r-th installation quantity, namely Dr>Dr-1
S203, obtaining L { [ L ] according to D1,L2),[L2,L3),……,[Lk,Lk+1)},LrMeans that (D)r-1,Dr]Corresponding device duty cycle threshold, specifically L1<L2<……<Lk<Lk+1And L isk+1Is 0.99 to 1, preferably, Lk+1Is 0.99.
Specifically, the device utilization threshold refers to a preset utilization threshold of the number of electronic devices corresponding to the first type pkg file.
S205, when TiIs in (D)r-1,Dr]When internal, the L isrAs q isiAnd will Lr+1As pi
Preferably, when k is 3, L is (L)1,L2,L3) Wherein L is1=0.85,L2=0.9,L3=0.95,L40.99; the installation amount interval corresponding to any one first type pkg file can be determined according to the installation amount threshold and the equipment proportion threshold, and the accuracy of the installation amount interval corresponding to the first type pkg file is guaranteed.
S30, according to Z in AiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1) It can be understood that: the file identification of the first type pkg file in A' is in Z1p<Z2p<……<Zip<……<ZmpThe rules of (c) are ordered.
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein, BjRefers to the file identifier of the jth second type pkg file, j equals to 1 … … n, and n is the number of the second type pkg files.
Specifically, the second type pkg file refers to any sample pkg file in the list of samples pkg except a.
Further, S ═ m + n.
Preferably, BnSecond installation amount > Bn-1Second mounting amount > … … > B1The second mounting amount of (2).
Specifically, the second installation amount refers to the number of electronic devices that install any of the second type pkg files.
S50, go through A 'and B' and when BjSecond installation amount < ZiAt the time of corresponding installation amount, B is acquiredjSecond mounting amount of
Figure BDA0003459692450000061
To Bj+λSecond installation amount of
Figure BDA0003459692450000062
And constructed as intermediate data sets
Figure BDA0003459692450000063
Figure BDA0003459692450000064
S60 based on UijObtaining FiAnd is
Figure BDA0003459692450000065
S70, according to FiObtaining FiCorresponding first target pkg group and FiThe corresponding set of first objectives pkg is fed back to the database.
Specifically, the step S70 further includes the steps of:
s701, obtaining FiCorresponding target ratio Fi', wherein, Fi' the following conditions are met:
Figure BDA0003459692450000066
wherein, VβiRefers to UiThe installation amount corresponding to the file identifier corresponding to the beta-th designated pkg file; any first type of files can be accurately determined through the installation amount interval corresponding to the first type pkg filespkg the second type pkg file matched with the file, the accuracy of the device occupation ratio of the pkg file group is ensured.
S703, when q isi≤Fi'≤piWhen is, F isi' corresponding first target pkg in the file group feedback database, wherein, Fi' corresponding first object pkg File group includes AiCorresponding first type pkg file and VβiThe corresponding designation pkg file.
The present implementation provides a method for obfuscating pkg by obtaining a first pkg list according to a pkg whitelist and obtaining a second pkg list based on the first pkg list; acquiring a mounting quantity interval corresponding to the file identifier of a first type pkg file according to a first mounting quantity corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the mounting quantity interval are acquired according to an equipment proportion threshold value corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first class pkg files are determined according to the installation amount interval, and therefore the method can accurately determine the limitation condition for screening the installation amount of the second class pkg texts, and avoid the situation that a pkg file group constructed by the first class pkg files and the second class pkg files corresponding to the first class pkg files cannot effectively obscure the first class pkg and further cannot improve the information security due to the fact that the number of the second class pkg files corresponding to the first class pkg files is small.
In a specific embodiment, the method further comprises the following steps:
s600, according to FiObtaining FiCorresponding second target pkg group and FiThe corresponding set of second objectives pkg is fed back to the database.
Specifically, the step S600 further includes the steps of:
s601, obtaining A ═ A'1,A'2,……,A't),A'xThe file identifier of the xth first key pkg file is referred to, where x is 1 … … t, and t is the number of files of the first key pkg.
Specifically, the file identification of the file of the first key pkg refers to the deletion of F from Ai' the file identification of any first type pkg file after the corresponding Ai.
Specifically, A'1Corresponding installation amount > A'2Corresponding installation quantity > … … > A'tThe corresponding installation amount; it can be understood that: a'xThe corresponding mount amount is A'xThe upper limit value of the corresponding installation amount interval.
S603, obtaining B ═ B'1,B'2,……,B'g),B'yThe file identifier of the x-th second key pkg file is referred to, y is 1 … … g, and g is the number of second key pkg files.
Specifically, the file identification of the file of the second key pkg refers to the deletion of F from Bi' File identification of any second class pkg file following the file identification of the corresponding designated pkg file.
Specifically, B'1Installation amount of (2) > B'2Installation amount of > … … > B'gThe mounting amount of (a); it can be understood that: b'yThe corresponding mount amount is mount B'yThe number of electronic devices corresponding to the second key pkg file.
S605, traverse A ' and B ' and when B 'yInstallation amount of (2) < A'xA 'is obtained at the time of the corresponding mount amount'xA corresponding second target pkg file group, wherein A'xThe corresponding second target pkg file group includes: a'xCorresponding first Key pkg File and B'yCorresponding second Key pkg File to B'y+λCorresponding second key pkg file.
In the step S600, the second type pkg file which is suitable for the equipment occupation ratio value not meeting the condition pkg file group or the first type pkg file is not determined can be reconstructed or the second type pkg file is constructed, the installation amount of the screened second type pkg file is accurately determined, the suitable pkg file group is established, omission of the first type pkg file is avoided, the probability of templating the first type pkg is realized, and the information security is further improved.
In a specific embodiment, the method further comprises the following step of obtaining Fi
S100, obtaining Zp=(Z1p,Z2p,……,Zip,……,Zmp) And Zq=(Z1q,Z2q,……,Ziq,……,Zmq)。
In particular, Z1p<Z2p<……<Zip<……<Zmp
In particular, Z1q<Z2q<……<Ziq<……<Zmq
S200, traverse H ═ H (H)1,H2,……,Hn) And when Z is1q≤Hj≤ZmpWhen it is, BjAs a file identifier for specifying pkg file, wherein HjMeans BjA corresponding second installation amount.
Specifically, the second installation amount refers to the number of electronic devices that install any of the second type pkg files.
S300, obtain V ═ V (V)1,V2,……,Vw) Wherein V isrThe installation amount corresponding to the file identifier corresponding to the r-th designated pkg file is defined, wherein r is 1 … … w, and w is λ m.
Specifically, V ∈ H and V1<V2<……<Vw
S400, obtaining U ═ according to V1,U2,……,Um) Wherein, Ui=(Vλi-λ+1,……,Vλi)。
S500, according to U, obtaining FiAnd Fi=(Ti,Ui) I.e. Fi=(Ti,Vλi-λ+1,……,Vλi)。
Preferably, F is 2 when λi=(Ti,V2i-1,V2i) (ii) a The method can select the proper second-class pkg files through the installation amount interval and the preset parameters of the first-class pkg files, reduce the probability of poor matching degree of pkg file groups formed by a plurality of second-class pkg files and the first-class pkg files, improve the construction of a proper pkg file group to replace a single first-class pkg file, and further improve the information safety.
The above embodiment enables a rough determination of a group of pkg files that are partially suitable for obscuring the first type pkg file, improving the efficiency of determining pkg the group of files.
Embodiments of the present invention further provide an electronic device, which includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executed to implement the method according to the above embodiments.
The computer apparatus of the embodiments of the present invention exists in many forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication functions and are primarily targeted at providing voice and data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
Embodiments of the present invention also provide a non-transitory computer readable storage medium, in which at least one instruction or at least one program is stored, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the method of the above embodiments.
Alternatively, in this embodiment, the storage medium may be located in at least one network server of a plurality of network servers of a computer network. Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and electronic apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (4)

1. A method for obfuscating pkg, the method comprising the steps of:
s10, according to pkg white list, obtain the first pkg list a ═ (a)1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred, i is 1 … … m, and m is the number of first-type pkg files;
wherein, prior to the step of S10, the sample pkg is further determined by:
s1, acquiring file identifications of a plurality of original pkg files and installation amount corresponding to each original pkg file;
s3, when the installation amount corresponding to the original pkg file is larger than a preset first installation amount threshold value, taking the original pkg file as a sample pkg file; the installation amount corresponding to the original pkg files refers to the number of electronic devices for installing the original pkg files;
s20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
Figure FDA0003669296390000011
piMeans AiA corresponding first equipment proportion value;
Figure FDA0003669296390000012
qimeans AiA corresponding second equipment fraction value;
wherein, λ is a preset parameter;
wherein, in the step of S20, q is further determined by the following stepsiAnd pi
S201, obtaining a mounting quantity threshold set D { (D)0,D1],(D1,D2],……,(Dk-1,Dk]In which (D)r-1,Dr]The number of the r installation quantity threshold intervals is defined, wherein r is 1 … … k, and k is the number of the installation quantity intervals;
s203, obtaining L { [ L ] according to D1,L2),[L2,L3),……,[Lk,Lk+1)},LrMeans that (D)r-1,Dr]Corresponding device duty ratio threshold, where L1<L2<……<Lk<Lk+1
S205, when TiIs in (D)r-1,Dr]When internal, the L isrAs q isiAnd will Lr+1As pi
S30, in A, according to ZiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1);
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein B isjThe file identifier of the jth second-class pkg file is defined, j is 1 … … n, n is the number of second-class pkg files, and the second-class pkg file is any sample pkg file except a in the sample pkg list;
s50, go through A 'and B' and when BjSecond installation amount < ZiWhen the corresponding installation amount is obtained, BjSecond mounting amount Vi jTo Bj+λSecond mounting amount Vi j+λAnd build up an intermediate data set Uij=(Vi j,……,Vi j+λ);
S60, based on UijObtaining FiAnd Fi=(Ti,Vi j,……,Vi j+λ);
S70, according to FiObtaining FiCorresponding first object pkg group and FiThe corresponding set of first objectives pkg is fed back to the database;
wherein, the step of S70 further comprises the following steps:
s701, acquiring FiCorresponding target ratio Fi', wherein, Fi' the following conditions are met:
Figure FDA0003669296390000021
wherein, VβiRefers to UiThe installation amount corresponding to the file identifier corresponding to the beta-th appointed pkg file;
s703, when q isi≤Fi'≤piWhen is, F isi' corresponding first target pkg in the file group feedback database, wherein Fi' corresponding first object pkg File group includes AiCorresponding first type pkg file and VβiThe corresponding designation pkg file.
2. The method for obfuscating pkg of claim 1, wherein D isr>Dr-1
3. A non-transitory computer readable storage medium having stored therein at least one instruction or at least one program, the at least one instruction or the at least one program being loaded and executed by a processor to implement the method of any one of claims 1 or 2.
4. An electronic device comprising a processor and the non-transitory computer readable storage medium of claim 3.
CN202210012991.XA 2022-01-07 2022-01-07 Method, electronic device and medium for fuzzification pkg Active CN114329360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210012991.XA CN114329360B (en) 2022-01-07 2022-01-07 Method, electronic device and medium for fuzzification pkg

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210012991.XA CN114329360B (en) 2022-01-07 2022-01-07 Method, electronic device and medium for fuzzification pkg

Publications (2)

Publication Number Publication Date
CN114329360A CN114329360A (en) 2022-04-12
CN114329360B true CN114329360B (en) 2022-07-15

Family

ID=81024608

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210012991.XA Active CN114329360B (en) 2022-01-07 2022-01-07 Method, electronic device and medium for fuzzification pkg

Country Status (1)

Country Link
CN (1) CN114329360B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424402B (en) * 2013-08-28 2019-03-29 卓易畅想(北京)科技有限公司 It is a kind of for detecting the method and device of pirate application program
CN106681720A (en) * 2016-12-23 2017-05-17 光锐恒宇(北京)科技有限公司 Compression method and device and decompression method and device for installation packages
CN110333874B (en) * 2019-06-10 2022-09-23 腾讯科技(成都)有限公司 iOS system installation packet data acquisition method, device, equipment and medium
CN112364309A (en) * 2021-01-13 2021-02-12 北京云真信科技有限公司 Information processing method, electronic device, and computer-readable storage medium

Also Published As

Publication number Publication date
CN114329360A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN110852882B (en) Packet consensus method, apparatus, device, and medium for blockchain networks
CN105894028B (en) User identification method and device
CN113591068B (en) Online login device management method and device and electronic device
CN110851817A (en) Terminal type identification method and device
CN111309946B (en) Established file optimization method and device
CN106534280A (en) Data sharing method and device
CN111625348A (en) Task allocation method, device, server and storage medium
US20170104683A1 (en) Dynamically segmenting traffic for a/b testing in a distributed computing environment
CN114329360B (en) Method, electronic device and medium for fuzzification pkg
CN110737458A (en) code updating method and related device
CN106982250A (en) Information-pushing method and device
CN106326258B (en) URL matching method and device
CN112767028B (en) Method for predicting number of active users, computer device and storage medium
CN111274433A (en) Method and device for updating voice resource library
CN111932076B (en) Rule configuration and release method and device and computing equipment
CN113065748A (en) Business risk assessment method, device, equipment and storage medium
CN111338607A (en) Method and device for selecting service data for testing and electronic equipment
CN114021200A (en) Data processing system for pkg fuzzification
CN109213924B (en) Popularization task allocation method and device and computer equipment
CN111967798B (en) Method, device and equipment for distributing experimental samples and computer readable storage medium
CN105653540A (en) Method and device for processing file attribute information
CN110471926B (en) File establishing method and device
CN110442456B (en) Multi-channel load balancing method based on Hyperridge-fabric
CN108509560B (en) User similarity obtaining method and device, equipment and storage medium
CN111538911A (en) Information pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant