CN116956306A - Method, device, equipment and storage medium for acquiring cheating application installation package - Google Patents

Method, device, equipment and storage medium for acquiring cheating application installation package Download PDF

Info

Publication number
CN116956306A
CN116956306A CN202310833784.5A CN202310833784A CN116956306A CN 116956306 A CN116956306 A CN 116956306A CN 202310833784 A CN202310833784 A CN 202310833784A CN 116956306 A CN116956306 A CN 116956306A
Authority
CN
China
Prior art keywords
application
sdk
information
cheating
installation package
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310833784.5A
Other languages
Chinese (zh)
Inventor
李伟
龚正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202310833784.5A priority Critical patent/CN116956306A/en
Publication of CN116956306A publication Critical patent/CN116956306A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure provides a method, a device, equipment and a storage medium for acquiring a cheating application installation package, relates to the technical field of computers, and particularly relates to the technical fields of mobile security, anti-cheating and the like. The method for acquiring the cheating application installation package comprises the following steps: acquiring application information of a second application on a terminal where a first application is located by adopting an SDK integrated in the first application; the SDK is adopted, the application information is sent to a server side, and the server side determines cheating application in the second application based on the application information; and adopting the SDK, responding to a control instruction sent by the server, and sending an installation package of the cheating application to the server, wherein the control instruction is used for indicating to upload the installation package. The method and the device can improve the acquisition range of the cheating application installation package.

Description

Method, device, equipment and storage medium for acquiring cheating application installation package
Technical Field
The disclosure relates to the technical field of computers, in particular to the technical fields of mobile security, anti-cheating and the like, and particularly relates to a method, a device, equipment and a storage medium for acquiring a cheating application installation package.
Background
Android applications are a subject of issuing by adding a signature to the application. The signature of the normal subject may be stolen by the black party, which issues a black party application using the stolen signature. The black-date application has the same signature as the normal application, and is counterfeited to be issued by the normal application for acquiring advertising benefits and user data. This can pose a threat to the application body and the user.
Disclosure of Invention
The disclosure provides a method, a device, equipment and a storage medium for acquiring a cheating application installation package.
According to an aspect of the present disclosure, there is provided a method for acquiring a cheating application installation package, including: acquiring application information of a second application on a terminal where a first application is located by adopting an SDK integrated in the first application; the SDK is adopted, the application information is sent to a server side, and the server side determines cheating application in the second application based on the application information; and adopting the SDK, responding to a control instruction sent by the server, and sending an installation package of the cheating application to the server, wherein the control instruction is used for indicating to upload the installation package.
According to another aspect of the present disclosure, there is provided a method for acquiring a cheating application installation package, including: receiving application information sent by an integrated SDK in a first application, wherein the application information is application information of a second application on a terminal where the first application is located; determining a cheating application in the second application based on the application information; and sending a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application so that the SDK can upload the installation package to a server.
According to another aspect of the present disclosure, there is provided an acquisition apparatus of a cheating application installation package, including: the acquisition module is used for acquiring application information of a second application on a terminal where the first application is located by adopting an SDK integrated in the first application; the sending module is used for sending the application information to a server side by adopting the SDK so that the server side can determine cheating application in the second application based on the application information; the processing module is used for adopting the SDK, responding to a control instruction sent by the server side, sending an installation package of the cheating application to the server side, and the control instruction is used for indicating to upload the installation package.
According to another aspect of the present disclosure, there is provided an acquisition apparatus of a cheating application installation package, including: the receiving module is used for receiving application information sent by the SDK integrated in the first application, wherein the application information is application information of a second application on a terminal where the first application is located; the determining module is used for determining cheating application in the second application based on the application information; and the sending module is used for sending a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application so that the SDK can upload the installation package to a server.
According to another aspect of the present disclosure, there is provided an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the above aspects.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method according to any one of the above aspects.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements a method according to any of the above aspects.
According to the technical scheme, the acquisition range of the cheating application installation package can be improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram according to a first embodiment of the present disclosure;
fig. 2 is a schematic diagram of an application scenario provided according to an embodiment of the present disclosure;
FIG. 3 is an overall system schematic provided in accordance with an embodiment of the present disclosure;
FIG. 4 is a schematic diagram according to a second embodiment of the present disclosure;
FIG. 5 is a schematic diagram according to a third embodiment of the present disclosure;
FIG. 6 is a schematic diagram according to a fourth embodiment of the present disclosure;
FIG. 7 is a schematic diagram according to a fifth embodiment of the present disclosure;
fig. 8 is a schematic diagram of an electronic device for implementing a method of acquiring a cheating application installation package according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In the related art, a Web crawler technology can be utilized to identify the black-out application according to a certain rule and acquire a black-out application installation package so as to further analyze the black-out application installation package. However, the method of obtaining the black-out application installation package by using the Web crawler has limited coverage.
In order to improve the acquisition scope of the cheating application installation package, the present disclosure provides the following embodiments.
Fig. 1 is a schematic diagram of a first embodiment of the present disclosure, where the present embodiment provides a method for obtaining a cheating application installation package, the method includes:
101. and acquiring application information of a second application on a terminal where the first application is located by adopting a software development kit (SoftwareDevelopment Kit, SDK) integrated in the first application.
102. And sending the application information to a server by adopting the SDK, so that the server determines the cheating application in the second application based on the application information.
103. And adopting the SDK, responding to a control instruction sent by the server, and sending an installation package of the cheating application to the server, wherein the control instruction is used for indicating to upload the installation package.
The SDK is a software development kit, which is a collection of development tools when a software engineer builds application software for a specific software package, a software framework, a hardware platform, an operating system, and the like.
In this embodiment, the SDK is used to acquire application information.
A first Application (APP) is an Application issued by a certain vendor, and the Application may integrate the SDK for obtaining Application information in advance before issuing.
The SDK may be integrated in one or more applications that it publishes for a vendor, and thus the first APP may be one or more.
Second APP refers to APP that is located on same terminal with first APP, and this second APP can include first APP and other APP outside first APP. For example, the user installs application a, application B, and application C on a certain terminal, and if the SDK is integrated in application a, application a is a first application, and application a, application B, and application C are second applications.
The SDK within the first application may communicate with the second application through an application programming interface (ApplicationProgrammingInterface, API) provided by the second application to obtain application information for the second application.
Since the API information of the second application needs to be set in the SDK, for this purpose, the first application and the second application are generally applications of the same vendor. That is, for a certain vendor, it can use the SDK integrated in the application it issues to learn whether the application it issues is signed by the blackout piracy, and whether the normal application it issues is forged to the blackout application.
The application information includes, for example: application package name, application signature, application version number, application file characteristic information, etc., the application file characteristic information may specifically be MD5 information of the application file. MD5, the fifth version of the Message-digest algorithm (Message-digest algorithm), is a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value.
The application file characteristic information is used for identifying the application file, and if the content of a certain application file is tampered, the characteristic information of the application file is changed.
For normal applications, the server side can store application information of the normal applications, such as application package names, application signatures, application version numbers, application file characteristic information and the like.
After the SDK sends the application information of the second application to the server, the server can compare the application information of the second application with the pre-stored application information of the normal application aiming at a certain second application, and if the application information of the second application is inconsistent with the pre-stored application information of the normal application, the second application is determined to be the cheating application.
When the black-out application is forged, the content of the application file is usually required to be tampered, for example, the advertisement content of the black-out application is added into the file of the normal application, and as the file content of the black-out application is tampered, the application file characteristic information of the black-out application is modified and inconsistent with the application file characteristic information of the normal application, and based on the application, the application can be determined to be the cheating application.
For example, for application a, after the application file feature information of the application a recorded by the server side is the first MD5 value and the SDK uploads the application information, if the application package name of a certain second application is also a, but the application file feature information of the second application is the second MD5 value, if the second MD5 value is different from the first MD5 value, it is determined that the second application is a cheating application.
After determining that a certain second application is a cheating application, the server side may send a control instruction to the SDK, where the control instruction may also be called a wanted instruction, and is used to instruct the client to upload an installation package of the cheating application, for example, if the application is an Android application, the installation package is an installation package (Androidapplication package, APK). For example, after the server determines the cheating application, the control instruction may include identification information (for example, an application package name) of the cheating application, and after the SDK receives the control instruction, the installation package of the cheating application indicated by the identification information is sent to the server.
After the server receives the installation package of the cheating application, signature analysis and other treatments can be carried out after the installation of the cheating application, so that the normal application of the server can be better optimized, and the risk of being stolen is reduced.
In the related art, the coverage range for obtaining the black-producing application by using the web crawler technology is limited because some black-producing applications may be transmitted by an offline sharing or group mode, and these transmission paths cannot be obtained by the web crawler technology.
In this embodiment, the application information of the second application is acquired through the SDK, so that the application information can be acquired from the environment where the application ultimately acts, and further, the cheating application is determined based on the application information, and the installation package of the cheating application is sent to the server.
For better understanding of the present disclosure, application scenarios of embodiments of the present disclosure are described.
Fig. 2 is a schematic diagram of an application scenario provided according to an embodiment of the present disclosure. As shown in fig. 2, an Application (APP) may be installed on a terminal 201, which may include: personal computers (Personal Computer, PCs), mobile devices, smart home devices, wearable devices, and the like, wherein the mobile devices include mobile phones, portable computers, tablet computers, and the like, the smart home devices include smart speakers, smart televisions, and the like, and the wearable devices include smart watches, smart glasses, and the like.
The server may include: and identifying the server and the signature system. The identification server identifies whether the second application is a cheating application based on the application information of the second application. The identification server can compare the application information of the second application with the application information of the normal application stored in the signature system, and determine that the corresponding second application is the cheating application when the application information of the second application and the application information of the normal application are inconsistent. Application information of the normal application, such as an application package name, an application signature, an application version number and an application file MD5 characteristic of the normal application, is recorded in the signature system.
The identification server and the signature system are deployed on a server, and may be represented by an identification server 202 and a signature server 203, respectively. The server may be an application vendor local server or cloud server, and the server may be a single server or a cluster server.
As shown in fig. 3, the overall system may include: an SDK301, an identification server 302, and a signature system 303. In connection with fig. 2, the sdk301 is deployed on a terminal, the identification server 302 is deployed on an identification server, and the signature system 303 is deployed on a signature server.
The SDK is integrated within a first APP, which may also be referred to as a client. The identification server and the signature system both belong to the server.
The SDK can acquire application information of the second application and send the application information to the identification server, and the identification server can compare the received application information with the application information stored in the signature system, and determine the cheating application when the received application information is inconsistent with the application information stored in the signature system. After the identification server determines the cheating application, a control instruction is sent to the SDK, and after the SDK receives the control instruction, an installation package of the cheating application is sent to the identification server.
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the personal information of the user accord with the regulations of related laws and regulations, and the public order colloquial is not violated.
The embodiment shown in fig. 1 described above may be performed by a client, and in particular by an SDK.
Correspondingly, the procedure executed by the server may be as follows:
fig. 4 is a schematic diagram of a second embodiment of the present disclosure, where the present embodiment provides a method for obtaining a cheating application installation package, the method including:
401. and receiving application information sent by the SDK integrated in the first application, wherein the application information is application information of a second application on a terminal where the first application is located.
402. Based on the application information, a cheating application is determined in the second application.
403. And sending a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application so that the SDK can upload the installation package to a server.
The present embodiment may be specifically executed by the identification server.
In this embodiment, the application information of the second application is acquired through the SDK, so that the application information can be acquired from the environment where the application ultimately acts, and further, the cheating application is determined based on the application information, and the installation package of the cheating application is sent to the server.
The identification server may use a signature system to compare the application information of the second application with the application information of the normal application stored in the signature system in advance, so as to determine the cheating application.
In this embodiment, since the signature system records accurate application information of normal applications, and determines the cheating application based on the signature system, the identification accuracy of the cheating application can be improved.
The execution flows of the SDK and the identification server are described above, and the interaction flow of each party is described below.
In combination with the application scenario, the present disclosure further provides a method for obtaining the cheating application installation package.
Fig. 5 is a schematic diagram of a third embodiment of the present disclosure, where the present embodiment provides a method for obtaining a cheating application installation package, the method includes:
501. and receiving identification information of the second application sent by the identification server by adopting the SDK integrated in the first application.
Wherein the identification information may specifically be a signature. The identification information may be one or more, and when plural, a signature list may be composed, so that the SDK may specifically receive the signature list, as shown in fig. 5.
The identification server can acquire a signature list of an application issued by a manufacturer of the identification server from the signature system, the signature list is configured in the identification server, a request message can be sent to the identification server when the SDK is initialized, and the identification server sends the configured signature list to the SDK based on the request message.
502. And determining a second application based on the identification information by adopting the SDK.
For example, if the identification information includes a first signature and a second signature, an application having the first signature and an application having the second signature on the terminal are regarded as second applications, and then application information of these second applications can be acquired.
Wherein different versions of the same application may have the same signature and different applications may have different signatures.
In this embodiment, the second application is determined based on the identification information sent by the server, and the server may designate the second application to be monitored, thereby improving the processing efficiency.
In addition, the signature is used as the identification information of the second application to be monitored, so that the signature can be monitored aiming at the condition of illegal use of the black product, and the effectiveness of processing is improved.
503. And acquiring application information of the second application by adopting the SDK through a preset API between the SDK and the second application.
The APIs can be preset by the APP issued by a certain manufacturer, and the information of the APIs is set in the SDK, so that communication between the SDK and the application can be realized based on the APIs. Since the black-out is usually tampered with the file content of the application, even if a certain application is tampered with the content, the API of the application still exists, and the SDK can communicate with the black-out application through the API to obtain the application information of the black-out application.
In this embodiment, based on the API, application information of the second application may be efficiently and simply acquired.
504. And transmitting the application information of the second application to an identification server by adopting the SDK.
And the SDK can also be preset with an API between the identification server and communicate with the identification server through the API so as to send the application information of the second application to the identification server. In addition, the API can also receive a control instruction sent by the identification server and upload an installation package of the cheating application to the identification server.
In this embodiment, application information of the second application may be simply and efficiently acquired through the API.
505. And the identification server adopts a signature system to compare the application information of the second application with the application information of the normal application stored in the signature system in advance so as to determine the cheating application in the second application.
Wherein, the black product is generally tampered with the content of the application file of the normal application, and for this reason, the application file characteristic information of the black product application is different from the application file characteristic information of the normal application. Based on which the cheating application can be determined. For example, for an application with an application package name a, the application file feature information of the application a sent by the SDK received by the identification server is a first MD5 value, the application file feature information of the application a stored by the signature system is a second MD5 value, and if the first MD5 value is different from the second MD5 value, the application a installed on the terminal is a cheating application.
In the present embodiment, the application file feature information is taken as an example, and in practice, if any application information of a certain second application does not match the application information of a normal application, the second application may be considered as a cheating application. For example, the application version number of the application a uploaded by the SDK is a first version number, the application version number of the application a stored by the signature system is a second version number, and if the two version numbers are different, the application a is considered as a cheating application.
In this embodiment, the signature system identifies the cheating application, so that the identification accuracy can be improved.
506. And the identification server side sends a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application.
507. And the SDK responds to the control instruction sent by the server side and sends the installation package of the cheating application to the server side.
The control instruction may include identification information of the cheating application, such as an application package name a, and the SDK may upload the application indicated by the application package name a, that is, the APK of the application a, to the identification server.
In addition, before the identification server side issues the control instruction, decision can be made, and the control instruction is issued based on a decision result. For example, by comparing the application information uploaded by the SDK with the application information stored in the signature system, it is determined that both the application a and the application B are cheating applications, but if the APK of the application a has been uploaded in the previous flow, the control instruction at this time may not include the identification information of the application a any more, that is, only the SDK may be instructed to upload the APK of the application B at this time, so as to save resource overhead.
Fig. 6 is a schematic diagram of a fourth embodiment of the present disclosure, which provides an acquisition apparatus of a cheating application installation package. The apparatus 600 includes: an acquisition module 601, a transmission module 602 and a processing module 603.
The acquiring module 601 is configured to acquire application information of a second application on a terminal where the first application is located by using an SDK integrated in the first application; the sending module 602 is configured to send the application information to a server by using the SDK, so that the server determines a cheating application in the second application based on the application information; the processing module 603 is configured to send, by using the SDK, an installation package of the cheating application to the server in response to a control instruction sent by the server, where the control instruction is used to instruct uploading of the installation package.
In this embodiment, the application information of the second application is acquired through the SDK, so that the application information can be acquired from the environment where the application ultimately acts, and further, the cheating application is determined based on the application information, and the installation package of the cheating application is sent to the server.
In some embodiments, the obtaining module 601 is further configured to: receiving identification information of the second application sent by the server by adopting the SDK; and determining the second application based on the identification information by adopting the SDK, and acquiring application information of the second application.
In this embodiment, the second application is determined based on the identification information sent by the server, and the server may designate the second application to be monitored, thereby improving the processing efficiency.
In some embodiments, the identification information of the second application includes: a signature of the second application.
In this embodiment, the signature is used as the identification information of the second application to be monitored, so that the signature can be monitored against the condition of illegal use of the black product, and the effectiveness of the processing is improved.
In some embodiments, the obtaining module 601 is further configured to: and acquiring application information of the second application by adopting the SDK through a preset API between the SDK and the second application.
In this embodiment, based on the API, application information of the second application may be efficiently and simply acquired.
Fig. 7 is a schematic diagram of a fifth embodiment of the present disclosure, which provides an acquisition apparatus of a cheating application installation package. The apparatus 700 includes: a receiving module 701, a determining module 702 and a transmitting module 703.
The receiving module 701 is configured to receive application information sent by an SDK integrated in a first application, where the application information is application information of a second application on a terminal where the first application is located; the determining module 702 is configured to determine, based on the application information, a cheating application in the second application; the sending module 703 is configured to send a control instruction to the SDK, where the control instruction is used to instruct uploading of an installation package of the cheating application, so that the SDK uploads the installation package to a server.
In this embodiment, the application information of the second application is acquired through the SDK, so that the application information can be acquired from the environment where the application ultimately acts, and further, the cheating application is determined based on the application information, and the installation package of the cheating application is sent to the server.
In some embodiments, the determining module 702 is further configured to: and comparing the application information of the second application with the application information of the normal application stored in the signature system in advance by adopting the signature system so as to determine the cheating application.
In this embodiment, since the signature system records accurate application information of normal applications, and determines the cheating application based on the signature system, the identification accuracy of the cheating application can be improved.
It is to be understood that in the embodiments of the disclosure, the same or similar content in different embodiments may be referred to each other.
It can be understood that "first", "second", etc. in the embodiments of the present disclosure are only used for distinguishing, and do not indicate the importance level, the time sequence, etc.
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the personal information of the user accord with the regulations of related laws and regulations, and the public order colloquial is not violated.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 8 illustrates a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, servers, blade servers, mainframes, and other appropriate computers. Electronic device 800 may also represent various forms of mobile devices, such as personal digital assistants, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the electronic device 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data required for the operation of the electronic device 800 can also be stored. The computing unit 801, the ROM802, and the RAM803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to the bus 804.
Various components in electronic device 800 are connected to I/O interface 805, including: an input unit 806 such as a keyboard, mouse, etc.; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, etc.; and a communication unit 809, such as a network card, modem, wireless communication transceiver, or the like. The communication unit 809 allows the electronic device 800 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 801 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 801 performs the respective methods and processes described above, for example, the acquisition method of the cheating application installation package. For example, in some embodiments, the method of obtaining the cheating application installation package may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 808. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 800 via the ROM802 and/or the communication unit 809. When the computer program is loaded into the RAM803 and executed by the computing unit 801, one or more steps of the above-described acquisition method of the cheating application installation package may be performed. Alternatively, in other embodiments, the computing unit 801 may be configured to perform the method of obtaining the cheating application installation package in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems-on-chips (SOCs), complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable load balancing apparatus, such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service ("VirtualPrivate Server" or simply "VPS") are overcome. The server may also be a server of a distributed system or a server that incorporates a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (15)

1. A method for acquiring a cheating application installation package comprises the following steps:
acquiring application information of a second application on a terminal where a first application is located by adopting a Software Development Kit (SDK) integrated in the first application;
the SDK is adopted, the application information is sent to a server side, and the server side determines cheating application in the second application based on the application information;
and adopting the SDK, responding to a control instruction sent by the server, and sending an installation package of the cheating application to the server, wherein the control instruction is used for indicating to upload the installation package.
2. The method of claim 1, wherein the acquiring, using the SDK integrated within the first application, application information of the second application on the terminal where the first application is located includes:
receiving identification information of the second application sent by the server by adopting the SDK;
and determining the second application based on the identification information by adopting the SDK, and acquiring application information of the second application.
3. The method of claim 2, wherein the identification information of the second application comprises:
a signature of the second application.
4. The method of any one of claims 1-3, wherein the acquiring, using the SDK integrated within the first application, application information of the second application on the terminal where the first application is located includes:
and acquiring application information of the second application by adopting the SDK through a preset API between the SDK and the second application.
5. A method for acquiring a cheating application installation package comprises the following steps:
receiving application information sent by an SDK (software development kit) integrated in a first application, wherein the application information is application information of a second application on a terminal where the first application is located;
determining a cheating application in the second application based on the application information;
and sending a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application so that the SDK can upload the installation package to a server.
6. The method of claim 5, wherein the determining a cheating application in the second application based on the application information comprises:
and comparing the application information of the second application with the application information of the normal application stored in the signature system in advance by adopting the signature system so as to determine the cheating application.
7. An acquisition device of a cheating application installation package, comprising:
the system comprises an acquisition module, a storage module and a control module, wherein the acquisition module is used for acquiring application information of a second application on a terminal where a first application is located by adopting a Software Development Kit (SDK) integrated in the first application;
the sending module is used for sending the application information to a server side by adopting the SDK so that the server side can determine cheating application in the second application based on the application information;
the processing module is used for adopting the SDK, responding to a control instruction sent by the server side, sending an installation package of the cheating application to the server side, and the control instruction is used for indicating to upload the installation package.
8. The apparatus of claim 7, wherein the acquisition module is further to:
receiving identification information of the second application sent by the server by adopting the SDK;
and determining the second application based on the identification information by adopting the SDK, and acquiring application information of the second application.
9. The apparatus of claim 8, wherein the identification information of the second application comprises:
a signature of the second application.
10. The apparatus of any of claims 7-9, wherein the acquisition module is further to:
and acquiring application information of the second application by adopting the SDK through a preset API between the SDK and the second application.
11. An acquisition device of a cheating application installation package, comprising:
the receiving module is used for receiving application information sent by an SDK (software development kit) integrated in a first application, wherein the application information is application information of a second application on a terminal where the first application is located;
the determining module is used for determining cheating application in the second application based on the application information;
and the sending module is used for sending a control instruction to the SDK, wherein the control instruction is used for indicating to upload the installation package of the cheating application so that the SDK can upload the installation package to a server.
12. The apparatus of claim 11, wherein the means for determining is further for:
and comparing the application information of the second application with the application information of the normal application stored in the signature system in advance by adopting the signature system so as to determine the cheating application.
13. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
14. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-6.
15. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any of claims 1-6.
CN202310833784.5A 2023-07-07 2023-07-07 Method, device, equipment and storage medium for acquiring cheating application installation package Pending CN116956306A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310833784.5A CN116956306A (en) 2023-07-07 2023-07-07 Method, device, equipment and storage medium for acquiring cheating application installation package

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310833784.5A CN116956306A (en) 2023-07-07 2023-07-07 Method, device, equipment and storage medium for acquiring cheating application installation package

Publications (1)

Publication Number Publication Date
CN116956306A true CN116956306A (en) 2023-10-27

Family

ID=88461231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310833784.5A Pending CN116956306A (en) 2023-07-07 2023-07-07 Method, device, equipment and storage medium for acquiring cheating application installation package

Country Status (1)

Country Link
CN (1) CN116956306A (en)

Similar Documents

Publication Publication Date Title
US10404753B2 (en) Method and apparatus for detecting security using an industry internet operating system
EP3575975B1 (en) Method and apparatus for operating smart network interface card
CN110290522B (en) Risk identification method and device for mobile equipment and computer system
CN110572399B (en) Vulnerability detection processing method, device, equipment and storage medium
CN109376534B (en) Method and apparatus for detecting applications
WO2020019485A1 (en) Simulator identification method, identification device, and computer readable medium
US20140237568A1 (en) Unique identification for an information handling system
CN113766487B (en) Cloud mobile phone information acquisition method, device, equipment and medium
CN113794706B (en) Data processing method and device, electronic equipment and readable storage medium
US20150067139A1 (en) Agentless monitoring of computer systems
CN110705635B (en) Method and apparatus for generating an isolated forest
CN116028917A (en) Authority detection method and device, storage medium and electronic equipment
CN116956306A (en) Method, device, equipment and storage medium for acquiring cheating application installation package
CN113609520A (en) Interface calling method, device, equipment and computer readable storage medium
CN113609156A (en) Data query and write-in method and device, electronic equipment and readable storage medium
CN108920352B (en) Method and device for acquiring information
CN113704016B (en) Cloud function component diagnosis method, device, equipment and storage medium
CN114791996B (en) Information processing method, device, system, electronic equipment and storage medium
CN117251769B (en) Abnormal data identification method, device, equipment and medium based on monitoring component
CN110262756B (en) Method and device for caching data
CN109347869B (en) Method, device, medium and electronic equipment for generating inter-cluster communication security factor
CN114764713A (en) Method and device for generating merchant patrol task, electronic equipment and storage medium
US11243761B2 (en) Link management device, link management method, and computer readable medium
CN108984313B (en) Method and device for processing information and server
CN116506165A (en) Cloud mobile phone identification method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination