WO2020114374A1 - 一种检测被篡改的应用的方法及设备 - Google Patents

一种检测被篡改的应用的方法及设备 Download PDF

Info

Publication number
WO2020114374A1
WO2020114374A1 PCT/CN2019/122594 CN2019122594W WO2020114374A1 WO 2020114374 A1 WO2020114374 A1 WO 2020114374A1 CN 2019122594 W CN2019122594 W CN 2019122594W WO 2020114374 A1 WO2020114374 A1 WO 2020114374A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
image
verification code
data
tampered
Prior art date
Application number
PCT/CN2019/122594
Other languages
English (en)
French (fr)
Inventor
胡晨鹏
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2020114374A1 publication Critical patent/WO2020114374A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements

Definitions

  • the invention belongs to the technical field of mobile Internet, and in particular relates to a method and device for detecting tampered applications with concealment capability on a mobile intelligent terminal.
  • Copycat apps affect the privacy and user experience of users. Therefore, the integrity of the app needs to be verified. If the app is illegally tampered with, it should be judged on the server side and copycats are prohibited. APP use function.
  • the application installation files stored in the large-capacity area are stored on the large-capacity card by copying the files. It is not known whether the installation files originate from legal channels (such as operators or third-party application providers). Such applications installed on the card may bring many uncertain security risks to the smart card.
  • Some applications are not completely free for users to use, and users need to apply in advance for authorization before use. Once the authorized application installation files are copied to other unauthorized large-capacity cards, it may happen that unauthorized users can successfully install the application, which will cause great harm to the interests of application providers .
  • the core method of the current APP integrity verification method is to collect the summary value of the APP installation file and resource file, and report it through the interface. After the server matches the official APP summary value, it is concluded whether the APP is the official version. Judgment.
  • Chinese Invention Patent Publication No. CN102663292A discloses a method and system for implementing smart card application deployment, where the method includes: when an application is released, the application installation file and the verification file are packaged into an application installation file package for publication; when the application is installed , If the application installation file package does not have a verification file package, or the calculated summary value does not match the summary value in the plain text of the verification data decrypted from the verification file, or Authorization prohibits application installation; otherwise, installation is allowed.
  • the present invention proposes an APP integrity verification method, which has strong concealment capability and is applied to mobile intelligent terminals.
  • the present invention provides a method for detecting a tampered application of a terminal, including:
  • the first image associated with the upload operation of the application is obtained, and the upload operation is triggered by the use of the function of the application;
  • the second image is provided to the server.
  • a method for detecting a tampered application on the server side including:
  • a device integrity verification device including:
  • One or more processors storage devices that store one or more programs
  • the one or more processors When the one or more programs are executed by the one or more processors, the one or more processors implement the method as described above.
  • a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the method as described above.
  • the advantage of the present invention is that the digest value of the APP is hidden in normal user data (picture) for reporting, thus avoiding the process of hackers detecting the integrity check.
  • FIG. 1 shows a schematic diagram of an application integrity checking system of the present invention
  • FIG. 2 shows a flowchart of a method for detecting a tampered application of the present invention
  • FIG. 3 shows a structural diagram of a first verification device for application integrity of the present invention.
  • FIG. 4 shows a structural diagram of a second verification device for application integrity of the present invention.
  • the present invention provides a method for detecting a tampered application of a terminal for a client, including:
  • A1 Calculate the verification code of the application installed on the terminal; after the user completes the application installation, when the client activates the application for the first time, the application will start a daemon to calculate the verification code of the current application.
  • the application After the application is started, obtain the first image associated with the upload operation of the application, and the upload operation is triggered by the use of the function of the application. For example, when a user uses an application, the application prompts the user to perform certain product process operations that inevitably upload pictures (such as uploading avatars, setting background pictures, etc.), and the pictures generated in this process are recorded as the first image; the image is When the user uses the application normally, the image provided by the application to the server is not a step specifically added for verification. For example, the avatar uploaded by the user when using the application.
  • certain product process operations such as uploading avatars, setting background pictures, etc.
  • A3. Use the check code to process the data of the first image, and generate a second image based on the processed data.
  • the visual effect of the second image is similar to that of the first image;
  • image transformation is performed on the first image to obtain first transformation data, and the first transformation data includes a first frequency domain matrix; using the check code, the first transformation data is changed, Preferably, the partial sequence of the middle frequency band of the first frequency domain matrix may be changed based on the check code, for example, the check code may be encrypted and replaced with the encrypted check code Partial data of the middle frequency band in the first frequency domain matrix.
  • Use the obtained second frequency domain matrix as second transformed data; perform reverse image transformation on the second transformed data to obtain the second image.
  • the above image conversion operation will not affect the visual effect of the uploaded image, because although the high-frequency part of the image will be lost during the image conversion process, the low-frequency part is unchanged, and only A part of the mid-band sequence that still exists after the image transformation is replaced. Since the low-frequency part determines the visual effect of the picture, and the low-frequency part of the picture does not change before and after the transformation in this embodiment, the visual effect of the transformed image does not change significantly.
  • the processed picture is visually The original picture is not much different.
  • the image transformation includes discrete cosine transformation or wavelet transformation.
  • Discrete Cosine Transform (DCT for Discrete Transform) is a transform related to Fourier Transform. It is similar to Discrete Fourier Transform (DFT for Discrete Fourier Transform), but only uses real numbers.
  • the discrete cosine transform is equivalent to a discrete Fourier transform that is about twice its length. This discrete Fourier transform is performed on a real even function (because the Fourier transform of a real even function is still a real even function ), in some variants it is necessary to move the input or output position by half a unit (DCT has 8 standard types, 4 of which are common).
  • Wavelet transform is a new transform analysis method, which inherits and develops the idea of localization of short-time Fourier transform, and at the same time overcomes the shortcomings that the window size does not change with frequency, and can provide a change with frequency
  • the "time-frequency" window is an ideal tool for time-frequency analysis and processing of signals. Its main feature is that it can fully highlight the characteristics of some aspects of the problem through transformation, can localize the analysis of time (space) frequency, and gradually refine the signal (function) through scaling and translation operations at multiple scales, and finally reach the high frequency. Time subdivision, frequency subdivision at low frequency, can automatically adapt to the requirements of time-frequency signal analysis, so that it can focus on any details of the signal and solve the difficult problem of Fourier transform.
  • the encryption uses at least one of the following methods: MD5 algorithm, SHA encryption, and DES encryption algorithm.
  • MD5 Message Digest Algorithm (English: MD5 Message-Digest Algorithm), a widely used cryptographic hash function, can produce a 128-bit (16 byte) hash value (hash value), used to ensure information transmission Complete and consistent.
  • the secure hash algorithm (English: Secure Hash Algorithm, abbreviated as SHA) is a family of cryptographic hash functions, and is a secure hash algorithm certified by FIPS. An algorithm that can calculate a fixed-length character string (also called message digest) corresponding to a digital message. And if the input messages are different, the probability that they correspond to different character strings is very high.
  • Data encryption algorithm (Data Encryption Algorithm, DEA) is a symmetric encryption algorithm, is the most widely used key system.
  • the check code includes a summary value generated based on the running core file and resource file of the application.
  • A4 Provide the second image to the server. After that, the client enters a short waiting period, waiting for the server to give the application detection result.
  • A5. Receive the application detection result from the server; if the application detection result indicates that the application has been tampered with, perform at least one of the following operations: prompt the user that the application is an illegal application; prohibit the application from being used. If there is a match, the customer can be prompted to use the application with confidence.
  • the server sends the comparison result to the client. If the application has not been tampered with, it can prompt the user that the application is a legitimate application and the user can use it with confidence. That is, if the application is legal, the server can issue an application detection result indicating that it has not been tampered. Of course, in this case, the server may also choose not to issue the detection result, and the client defaults that the application can be used normally.
  • the verification code (based on the digest value generated by the APP running core file and resource file) is hidden in the process of the product normally uploading information (for example, hidden in the avatar uploaded by the user). Check code to reduce the possibility of being cracked.
  • a method for detecting a tampered application on the server side includes:
  • the main role of the server is to compare the encrypted verification code with the original verification code stored on the server when the application was first released to identify the authenticity of the newly installed application on the client, thereby preventing the application that has been tampered with from being compromised Information security of client users.
  • Step B2. Perform image transformation on the second image to obtain second transformation data; preferably, the image transformation includes discrete cosine transformation or wavelet transformation.
  • the purpose of this step is to transform the second image to obtain the verification code of the application to be hidden hidden in it.
  • the second transformed data may include Two frequency domain matrix.
  • the verification code includes a summary value generated based on the core file and the resource file run by the application program.
  • the operation of the client is to hide the check code of the application to be verified in the middle frequency band of the frequency domain matrix corresponding to the image
  • the operation of the server is a reverse process, that is, the data extraction operation is performed first, and the client will encrypt The verification code of the application to be verified is extracted, and then the corresponding decryption process is performed, so that the verification code of the verification code of the application to be verified can be obtained so as to carry out the next comparative verification work.
  • the verification code obtained after the image conversion and extraction of the server side is compared with the initial verification code stored on the server side by the application. If they are the same, the application is considered to have not been tampered with, otherwise the application is considered to be Tampered cottage application.
  • the server sends the comparison result to the client. If the application has not been tampered with, it can prompt the user that the application is a legitimate application and the user can use it with confidence. That is, if the application is legal, the server can issue an application detection result indicating that it has not been tampered. Of course, in this case, the server may also choose not to issue the detection result, and the client defaults that the application can be used normally.
  • the verification code (based on the digest value generated by the APP running core file and resource file) is hidden in the process of the product normally uploading information (for example, hidden in the avatar uploaded by the user). Check code to reduce the possibility of being cracked.
  • an application program integrity verification device including: one or more processors, a storage device storing one or more programs; when the one or more programs are When the one or more processors execute, the one or more processors implement the method described above.
  • the verification device is client hardware, and common clients such as mobile phones, tablet computers, and smart watches can be used.
  • the verification device is the server itself.
  • a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the method as described above.
  • the computer-readable storage medium is located in the client hardware, such as memory.
  • the computer-readable storage medium is located in the server, such as a memory or a hard disk.
  • An APP integrity verification method with hidden capability on a mobile intelligent terminal used for an application integrity verification system, including a client and a server as shown in FIG. 1, as shown in FIG. 2, wherein It includes the following steps:
  • the APP prompts the user to perform certain product process operations that will inevitably upload pictures (such as uploading avatars, setting background pictures, etc.), and the pictures generated in this process are denoted as P1; the image is used by the user normally When applying, the image provided by the application to the server is not a step specifically added for verification. For example, the avatar uploaded by the user when using the application.
  • step S4 Perform a discrete cosine transform on P1 to obtain a frequency domain matrix M1.
  • the partial sequence of the mid-band of M1 is replaced to obtain a frequency domain matrix M2 containing the digest value.
  • the above image conversion operation will not affect the visual effect of the uploaded image, because: although the high frequency part of the image will be lost during the image conversion process, the low frequency part is unchanged, and only Replace a part of the mid-band sequence that still exists after the image conversion.
  • the encryption of the digest value T2 may use the MD5 algorithm, SHA encryption, or DES encryption.
  • the server After receiving the picture P2, the server performs discrete cosine transform to obtain the frequency domain matrix M2, and extracts the encrypted digest value T2 from the mid-band of M2 based on preset rules, and decrypts it to obtain the APP digest. Value T2;
  • the check code (based on the digest value generated by the APP running core file and resource file) is hidden in the process of the product normally uploading information (for example, hidden in the avatar uploaded by the user), in order to hide the school Check the code to reduce the possibility of being cracked.
  • the enumerated image transformation method is discrete cosine transform, but the enumeration is not a limitation of the image transformation method, and those skilled in the art may also use other image transformation methods according to the inventive idea of the present invention.
  • Process the picture Specifically, for example, wavelet transform.
  • this embodiment provides an apparatus for checking the integrity of an application program, including:
  • Installation unit used to download and install the current application
  • the verification code calculation unit is used to activate the current application program and calculate the verification code of the current application program; preferably, the verification code is a summary value generated based on the core file and the resource file run by the application program.
  • the first prompt unit is used to prompt the user to upload the first picture
  • An image transformation unit is used to acquire the first picture and perform image transformation on it to obtain a first frequency domain matrix; preferably, the image transformation is discrete cosine transformation.
  • An encryption and replacement unit for encrypting the check code of the current application program, and replacing the partial sequence of the middle frequency band of the first frequency domain matrix with the encrypted check code to obtain a second frequency domain matrix; Encryption uses at least one of the following methods: MD5 algorithm, SHA encryption, DES encryption algorithm.
  • the inverse transform unit is used to perform inverse image transform on the second frequency domain matrix to obtain a second picture, and upload the second picture to the server.
  • the second prompting unit is used to receive the judgment result sent by the server, and when the current application is judged as an illegal application, prompt the user that the current application is illegal.
  • the prompt method is at least one of the following methods: pop-up dialog box, vibration, and sound broadcast. Or, when the current application is determined to be an illegal application, the user is prohibited from continuing to use the current application.
  • the check code (based on the digest value generated by the APP running core file and resource file) is hidden in the process of the product normally uploading information (for example, hidden in the avatar uploaded by the user), in order to hide the school Check the code to reduce the possibility of being cracked.
  • the enumerated image transformation method is discrete cosine transform, but the enumeration is not a limitation of the image transformation method, and those skilled in the art can also use other image transformation methods according to the inventive idea of the present invention.
  • Process the picture Specifically, for example, wavelet transform.
  • this embodiment provides an application integrity verification device, including:
  • Recording unit used to record and save the verification code of legal application
  • the image transformation unit is used to receive the picture uploaded by the client and perform image transformation; the image transformation is discrete cosine transformation.
  • the check code extraction unit is used to extract the encrypted check code in the picture; the encrypted check code is obtained by encrypting the digest value generated based on the current application running core file and resource file.
  • the decryption unit is used to decrypt the encrypted verification code to obtain the verification code of the current application program; the verification code is a summary value generated based on the core file and the resource file run by the application program.
  • the comparison unit compares the verification code of the legal application program with the verification code of the current application program to determine the legality of the current application program. If the verification code of the legal application is the same as the verification code of the current application, the current application is legal; if the verification code of the legitimate application is different from the verification code of the current application, the current application is illegal.
  • the result sending unit is used to send the comparison result to the client, so that the client prompts the user that the application is legal or illegal.
  • the check code (based on the digest value generated by the APP running core file and resource file) is hidden in the process of the product normally uploading information (for example, hidden in the avatar uploaded by the user), in order to hide the school Check the code to reduce the possibility of being cracked.
  • the enumerated image transformation method is discrete cosine transform, but the enumeration is not a limitation of the image transformation method, and those skilled in the art can also use other image transformation methods according to the inventive idea of the present invention.
  • Process the picture Specifically, for example, wavelet transform.
  • modules in the device in the embodiment can be adaptively changed and set in one or more devices different from the embodiment.
  • the modules or units or components in the embodiments may be combined into one module or unit or component, and in addition, they may be divided into a plurality of submodules or subunits or subcomponents. Except that at least some of such features and/or processes or units are mutually exclusive, all features disclosed in this specification (including the accompanying claims, abstract and drawings) and any method so disclosed or All processes or units of equipment are combined. Unless expressly stated otherwise, each feature disclosed in this specification (including the accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or implemented in software modules running on one or more processors, or implemented in a combination thereof.
  • a microprocessor or a digital signal processor (DSP) may be used to implement some or all functions of some or all components in the apparatus for creating a virtual machine according to an embodiment of the present invention.
  • DSP digital signal processor
  • the present invention may also be implemented as a device or device program (eg, computer program and computer program product) for performing a part or all of the method described herein.
  • Such a program implementing the present invention may be stored on a computer-readable medium, or may have the form of one or more signals.
  • Such a signal can be downloaded from an Internet website, or provided on a carrier signal, or provided in any other form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种检测被篡改的应用的方法及设备,包括:计算所述终端上所安装的应用的校验码;所述应用启动后,获取所述应用的上传操作关联的第一影像,所述上传操作由所述应用的功能使用触发;使用所述校验码处理所述第一影像的数据,并根据处理后的数据生成第二影像,所述第二影像的视觉效果与所述第一影像相似;将所述第二影像提供给服务端。服务端比较图像变换后得到的校验码是否与官方验码相同,以判断当前应用程序的合法性。优点在于:将APP的校验码隐藏在正常的用户数据中进行上报,这样就避免了黑客察觉完整性校验的过程。

Description

一种检测被篡改的应用的方法及设备 技术领域
本发明属于移动互联网技术领域,具体涉及一种移动智能终端上具有隐蔽能力的检测被篡改的应用的方法及装置。
背景技术
目前移动终端上山寨APP的现象比较普遍,山寨APP会影响用户的隐私与用户体验,因此需要对APP的完整性进行校验,如果APP被非法篡改,就应当在服务端做出判断,禁止山寨APP使用功能。
具体来说,由于本地应用部署脱离了和应用平台服务器的通信,这就使得它的一些安全隐患凸显了出来,一般来讲存在以下安全问题:
(1)应用来源不能得到保证。
存储在大容量区域的应用安装文件是通过拷贝文件的方式存放在大容量卡上的,安装文件是否来源于合法渠道(如运营商或第三方应用提供商)不得而知。这样的应用安装到卡上可能会给智能卡带来很多不确定的安全隐患。
(2)应用完整性不能得到保证。
安装文件存储在大容量区域时并不会进行完整性检查,因此应用是否包含完整以及是否未被恶意篡改也不得而知。这样的应用安装在卡上可能会导致安装失败,或者造成用户信息被不法分子非法窃取等风险。
(3)应用授权安装不能得到保证。
有些应用并非完全免费提供给用户使用的,需要用户预先申请得到授权后方可使用。一旦被授权的应用安装文件被拷贝到了其它未经授权的大容量卡上,就有可能出现未经授权的用户能够成功安装应用的情况,由此会对应用提供商的利益造成极大的损害。
目前APP完整性校验的方法的核心手段都是收集APP的安装文件与资源文件的摘要值,并通过接口进行上报,在服务端与官方APP摘要值进行匹配后 得出该APP是否为官方版本的判断。
例如,中国发明专利公开号CN102663292A披露了一种实现智能卡应用部署的方法及系统,其中方法包括:在发布应用时,将应用安装文件与校验文件一起打包成应用安装文件包发布;在安装应用时,若检查应用安装文件包内不具备校验文件包,或者计算出的摘要值与从校验文件解密出的校验数据明文中的摘要值不符,或者,检查需经授权的用户未经授权,则禁止应用安装;否则,允许进行安装。
但是这种直接的接口上报方法不具备隐蔽性,容易被黑客察觉并寻找机会进行破解。
发明内容
为解决以上问题,本发明提出一种APP的完整性校验方法,该方法具有较强的隐蔽能力,并应用在移动智能终端上。
具体的,根据本发明的一个方面,本发明提供一种用于终端的检测被篡改的应用的方法,包括:
计算所述终端上所安装的应用的校验码;
所述应用启动后,获取所述应用的上传操作关联的第一影像,所述上传操作由所述应用的功能使用触发;
使用所述校验码处理所述第一影像的数据,并根据处理后的数据生成第二影像,所述第二影像的视觉效果与所述第一影像相似;
将所述第二影像提供给服务端。
根据本发明的另一个方面,还提供了一种用于服务端的检测被篡改的应用的方法,包括:
接收安装有所述应用的终端在所述应用的功能使用过程中上传的第二影像;
对所述第二影像进行图像变换,获得第二变换数据;
基于预设规则,从所述第二变换数据中提取数据,以获得来自所述终端的校验码;
将来自所述终端的校验码与预先存储的所述应用的基准校验码进行匹配;
若来自所述终端的校验码与所述基准校验码不匹配,确定所述应用被篡改。
根据本发明的另一个方面,还提供了一种应用程序完整性的校验设备,包括:
一个或多个处理器、存储一个或多个程序的存储装置;
当所述一个或多个程序被所述一个或多个处理器执行时,所述一个或多个处理器实现如上所述的方法。
根据本发明的另一个方面,还提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的方法。
本发明的优点在于:将APP的摘要值隐藏在正常的用户数据(图片)中进行上报,这样就避免了黑客察觉完整性校验的过程。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了本发明的一种应用程序完整性的校验系统原理图;
图2示出了本发明的一种检测被篡改的应用的方法流程图;
图3示出了本发明的一种应用程序完整性的第一种校验装置结构图。
图4示出了本发明的一种应用程序完整性的第二种校验装置结构图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施方式。虽然附图中显示了本公开的示例性实施方式,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施方式所限制。相反,提供这些实施方式是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
具体的,根据本发明的一个方面,本发明提供一种用于终端的检测被篡改的应用的方法,用于客户端,包括:
A1、计算所述终端上所安装的应用的校验码;用户完成应用安装之后,在 客户端第一次激活应用时,应用会启动守护进程,计算当前应用的校验码。
A2、所述应用启动后,获取所述应用的上传操作关联的第一影像,所述上传操作由所述应用的功能使用触发。例如用户在使用某个应用时,应用促使用户进行某些必然会上传图片的产品流程操作(例如上传头像,设置背景图片等),在这个过程中产生的图片记为第一影像;该图像是用户正常使用应用时,应用提供给服务端的图像,而非专门为了校验而增加的步骤。例如,用户使用应用时上传的头像等。
A3、使用所述校验码处理所述第一影像的数据,并根据处理后的数据生成第二影像,所述第二影像的视觉效果与所述第一影像相似;根据本发明的一个优选方案,在这个步骤,对所述第一影像进行图像变换,获得第一变换数据,所述第一变换数据包括第一频域矩阵;使用所述校验码,改变所述第一变换数据,优选的,可以例如基于所述校验码,改变所述第一频域矩阵的中频段的部分序列,进一步优选的,可以对所述校验码进行加密,并使用加密后的校验码替换所述第一频域矩阵中的中频段的部分数据。将得到的所述第二频域矩阵,作为第二变换数据;对所述第二变换数据进行反向图像变换,获得所述第二影像。
在这个图像变换的过程中,上述图像变换操作不会影响上传图像的视觉效果,原因是虽然图像的高频部分在图像变换的过程中会有损失,但是低频部分是不变的,而仅对图像变换后仍然存在的中频段的一部分序列进行替换。由于低频部分决定了图片的视觉效果,而本实施例中图片的低频部分在变换前后并无变化,因此,经过变换后的图像的视觉效果并没有明显的变化,处理后的图片在视觉上与原图片没有太大区别。
所述图像变换包括离散余弦变换或小波变换。离散余弦变换(DCT for Discrete Cosine Transform)是与傅里叶变换相关的一种变换,它类似于离散傅里叶变换(DFT for Discrete Fourier Transform),但是只使用实数。离散余弦变换相当于一个长度大概是它两倍的离散傅里叶变换,这个离散傅里叶变换是对一个实偶函数进行的(因为一个实偶函数的傅里叶变换仍然是一个实偶函数),在有些变形里面需要将输入或者输出的位置移动半个单位(DCT有8种标准类型,其中4种是常见的)。小波变换(wavelet transform,WT)是一种新的变换分析 方法,它继承和发展了短时傅立叶变换局部化的思想,同时又克服了窗口大小不随频率变化等缺点,能够提供一个随频率改变的“时间-频率”窗口,是进行信号时频分析和处理的理想工具。它的主要特点是通过变换能够充分突出问题某些方面的特征,能对时间(空间)频率的局部化分析,通过伸缩平移运算对信号(函数)逐步进行多尺度细化,最终达到高频处时间细分,低频处频率细分,能自动适应时频信号分析的要求,从而可聚焦到信号的任意细节,解决了Fourier变换的困难问题。
作为本发明的更优选实施例,优选的,所述加密采用如下方法的至少一种:MD5算法、SHA加密、DES加密算法。MD5消息摘要算法(英语:MD5 Message-Digest Algorithm),一种被广泛使用的密码散列函数,可以产生出一个128位(16字节)的散列值(hash value),用于确保信息传输完整一致。安全散列算法(英语:Secure Hash Algorithm,缩写为SHA)是一个密码散列函数家族,是FIPS所认证的安全散列算法。能计算出一个数字消息所对应到的,长度固定的字符串(又称消息摘要)的算法。且若输入的消息不同,它们对应到不同字符串的机率很高。数据加密算法(Data Encryption Algorithm,DEA)是一种对称加密算法,是使用最广泛的密钥系统。
所述校验码包括基于所述应用的运行核心文件和资源文件生成的摘要值。
A4、将所述第二影像提供给服务端。此后客户端进入短暂的等待阶段,等待服务端给出应用检测结果。
A5、接收来自服务端的应用检测结果;若所述应用检测结果指示所述应用被篡改,执行以下至少一项操作:提示用户所述应用为非法应用;禁止所述应用被使用。如果匹配,则可以提示客户放心使用该应用。
例如,将服务端的图像变换和提取后得到的校验码与应用存储在服务端的初始校验码相比较,如果相同,则认为该应用是没有经过篡改的,否则认为该应用是被篡改的山寨应用。服务端将比较结果发送给客户端,如果该应用是没有经过篡改的,可以提示用户该应用为合法应用,用户可以放心使用。即应用若合法,服务端可以发出用于指示未被篡改的应用检测结果,当然,在这种情形下,服务器也可以选择不发出检测结果,则客户端默认该应用可以正常使用。
反之,若判断该应用是被篡改的山寨应用,则在客户端用弹出对话框或者 振动、声音播报等形式提醒用户此为非法应用,请用户留意;更进一步的,还可以在用户端直接禁止继续使用该应用,从而彻底断绝安全隐患。
本实施例的方案中,由于将校验码(基于APP运行核心文件和资源文件生成的摘要值)隐藏在产品正常上传信息的流程中(例如,隐藏在用户上传的头像中),以此隐藏校验码,减少被破解的可能性。
根据本发明的另一个方面,还提供了一种用于服务端的检测被篡改的应用的方法,用于服务端,包括:
B1、接收安装有所述应用的终端在所述应用的功能使用过程中上传的第二影像。如前所述,所述第二影像的视觉效果与第一影像相似,更重要的是,第二影像包含有加密后的待验证应用的校验码。
服务端的主要作用就是基于该加密后的校验码,与该应用刚发布时存储在服务端的原始校验码进行比较,以鉴别客户端新安装应用的真伪,从而防止已经被篡改的应用危及客户端用户的信息安全。
B2、对所述第二影像进行图像变换,获得第二变换数据;优选的,所述图像变换包括离散余弦变换或小波变换。这个步骤的目的是为了将第二影像进行图像变换从而获得其中隐藏的待验证应用的校验码。
B3、基于预设规则,从所述第二变换数据的中频段提取数据,并将所提取的数据解密以获得来自所述终端的校验码;优选的,所述第二变换数据可以包括第二频域矩阵。优选的,所述校验码包括基于应用程序运行核心文件和资源文件生成的摘要值。
由于客户端的操作是将待验证应用的校验码隐藏于图像对应的频域矩阵的中频段,因此,服务端的操作是一个反向的过程,即先进行数据的提取操作,将经过客户端加密的待验证应用的校验码提取出来,然后对其进行相应的解密过程,这样就可以获得待验证应用的校验码的校验码,以便进行下一步的对比验证工作。
B4、将来自所述终端的校验码与预先存储的所述应用的基准校验码进行匹配;若来自所述终端的校验码与所述基准校验码不匹配,确定所述应用被篡改。优选的,若所述应用被篡改,向客户端发送用于指示所述应用被篡改的应用检测结果。
例如,在服务端,将服务端的图像变换和提取后得到的校验码与应用存储在服务端的初始校验码相比较,如果相同,则认为该应用是没有经过篡改的,否则认为该应用是被篡改的山寨应用。服务端将比较结果发送给客户端,如果该应用是没有经过篡改的,可以提示用户该应用为合法应用,用户可以放心使用。即应用若合法,服务端可以发出用于指示未被篡改的应用检测结果,当然,在这种情形下,服务器也可以选择不发出检测结果,则客户端默认该应用可以正常使用。
反之,若判断该应用是被篡改的山寨应用,则在客户端用弹出对话框或者振动、声音播报等形式提醒用户此为非法应用,请用户留意;更进一步的,还可以在用户端直接禁止继续使用该应用,从而彻底断绝安全隐患。
本实施例的方案中,由于将校验码(基于APP运行核心文件和资源文件生成的摘要值)隐藏在产品正常上传信息的流程中(例如,隐藏在用户上传的头像中),以此隐藏校验码,减少被破解的可能性。
根据本发明的另一个方面,还提供了一种应用程序完整性的校验设备,包括:一个或多个处理器、存储一个或多个程序的存储装置;当所述一个或多个程序被所述一个或多个处理器执行时,所述一个或多个处理器实现如上所述的方法。当上述方法是用于客户端时,所述校验设备就是客户端硬件,可以采用例如手机、平板电脑、智能手表等常见客户端。当上述方法是用于服务端时,所述校验设备就是服务器本身。
根据本发明的另一个方面,还提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上所述的方法。当上述方法是用于客户端时,所述计算机可读存储介质位于客户端硬件内,例如内存。当上述方法是用于服务端时,所述计算机可读存储介质位于服务器内,例如内存或硬盘。
实施例1
一种移动智能终端上具有隐蔽能力的APP完整性校验方法,用于一种应用程序完整性的校验系统,包括如图1所示的客户端和服务端,如图2所示,其中包括如下步骤:
S1、官方APP发布时,在服务端记录APP安装文件的摘要值T1,并保存在服务端;
S2、用户完成APP安装之后,第一次激活APP时,APP启动守护进程,计算当前APP的摘要值T2;
S3、用户在使用APP时,APP促使用户进行某些必然会上传图片的产品流程操作(例如上传头像,设置背景图片等),在这个过程中产生的图片记为P1;该图像是用户正常使用应用时,应用提供给服务端的图像,而非专门为了校验而增加的步骤。例如,用户使用应用时上传的头像等。
S4、对P1进行离散余弦变换,得到频域矩阵M1。将第S2步中的摘要值T2进行加密后,替换M1的中频段的部分序列,得到包含摘要值的频域矩阵M2。在这个图像变换的过程中,上述图像变换操作不会影响上传图像的视觉效果,原因是:虽然图像的高频部分在图像变换的过程中会有损失,但是低频部分是不变的,而仅对图像变换后仍然存在的中频段的一部分序列进行替换。由于低频部分决定了图片的视觉效果,而本发明中图片的低频部分在变换前后并无变化,因此,经过变换后的图像的视觉效果并没有明显的变化,处理后的图片在视觉上与原图片没有太大区别。本发明中,所述对摘要值T2的加密,可以采用MD5算法,也可以使用SHA的加密方式,也可以使用DES加密算法加密。
S5、将M2进行反向离散余弦变换,重新得到图片P2,并上传到服务端;
S6、服务端收到图片P2后,进行离散余弦变换,得到频域矩阵M2,并基于预设规则从M2的中频段中将加密后的摘要值T2提取出来,并进行解密,得到APP的摘要值T2;
S7、将T2与T1进行比较,如果相同,则认为该APP是没有经过篡改的,否则认为该APP是被篡改的山寨应用。服务端将比较结果发送给客户端,如果该APP是没有经过篡改的,可以提示用户该APP为合法应用,用户可以放心使用。即APP若合法,可以发用于指示未被篡改的应用检测结果;也可以不发。
S8、若判断该APP是被篡改的山寨应用,则在客户端用弹出对话框或者振动、声音播报等形式提醒用户此为非法应用,请用户留意;更进一步的,还可以直接禁止继续使用该APP,彻底断绝安全隐患。
本实施例的方案中,将校验码(基于APP运行核心文件和资源文件生成的摘要值)隐藏在产品正常上传信息的流程中(例如,隐藏在用户上传的头像中),以此隐藏校验码,减少被破解的可能性。
虽然本发明的具体实施例中,列举的图像变换方式是离散余弦变换,但是该列举并非是对图像变换方式的限制,本领域技术人员根据本发明的发明思想,也可以采用其他的图像变换方式对图片进行处理。具体的,例如小波变换。
实施例2
对应于客户端的方法,本实施例提供一种应用程序完整性的校验装置,包括:
安装单元,用于下载并安装当前应用程序;
校验码计算单元,用于激活当前应用程序,并计算所述当前应用程序的校验码;优选的,所述校验码为基于应用程序运行核心文件和资源文件生成的摘要值。
第一提示单元,用于提示用户上传第一图片;
图像变换单元,用于获取第一图片并对其进行图像变换,得到第一频域矩阵;优选的,所述图像变换为离散余弦变换。
加密及替换单元,用于加密所述当前应用程序的校验码,并使用加密后的校验码替换所述第一频域矩阵的中频段的部分序列,得到第二频域矩阵;所述加密采用如下方法的至少一种:MD5算法、SHA加密、DES加密算法。
反向变换单元,用于对第二频域矩阵进行反向图像变换,得到第二图片,并将所述第二图片上传服务端。
第二提示单元,用于接收服务端发送的判断结果,并当所述当前应用被判断为非法应用时,提示用户所述当前应用非法。所述提示方法为以下方法的至少一种:弹出对话框、振动、声音播报。或者,当所述当前应用被判断为非法应用时,禁止用户继续使用当前应用。
本实施例的方案中,将校验码(基于APP运行核心文件和资源文件生成的摘要值)隐藏在产品正常上传信息的流程中(例如,隐藏在用户上传的头像中),以此隐藏校验码,减少被破解的可能性。
虽然本发明的具体实施例中,列举的图像变换方式是离散余弦变换,但是该列举并非是对图像变换方式的限制,本领域技术人员根据本发明的发明思想,也可以采用其他的图像变换方式对图片进行处理。具体的,例如小波变换。
实施例3
对应于服务端的方法,本实施例提供一种应用程序完整性的校验装置,包括:
记录单元,用于记录并保存合法应用程序的校验码;
图像变换单元,用于接收客户端上传的图片,进行图像变换;所述图像变换为离散余弦变换。
校验码提取单元,用于提取所述图片中的加密校验码;所述加密校验码为基于当前应用程序运行核心文件和资源文件生成的摘要值经过加密后得到的。
解密单元,用于解密所述加密校验码,得到当前应用程序的校验码;所述校验码为基于应用程序运行核心文件和资源文件生成的摘要值。
比较单元,比较所述合法应用程序的校验码和当前应用程序的校验码,以判断当前应用程序的合法性。如果合法应用程序的校验码和当前应用程序的校验码相同,则当前应用程序合法;如果合法应用程序的校验码和当前应用程序的校验码不同,则当前应用程序非法。
结果发送单元,用于将比较结果发送给客户端,以便于客户端提示用户该应用程序为合法或者非法。
本实施例的方案中,将校验码(基于APP运行核心文件和资源文件生成的摘要值)隐藏在产品正常上传信息的流程中(例如,隐藏在用户上传的头像中),以此隐藏校验码,减少被破解的可能性。
虽然本发明的具体实施例中,列举的图像变换方式是离散余弦变换,但是该列举并非是对图像变换方式的限制,本领域技术人员根据本发明的发明思想,也可以采用其他的图像变换方式对图片进行处理。具体的,例如小波变换。
需要说明的是:
在此提供的算法和显示不与任何特定计算机、虚拟装置或者其它设备固有 相关。各种通用装置也可以与基于在此的示教一起使用。根据上面的描述,构造这类装置所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解, 可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的虚拟机的创建装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以所述权利要求的保护范围为准。

Claims (16)

  1. 一种用于终端的检测被篡改的应用的方法,其特征在于,包括:
    计算所述终端上所安装的应用的校验码;
    所述应用启动后,获取所述应用的上传操作关联的第一影像,所述上传操作由所述应用的功能使用触发;
    使用所述校验码处理所述第一影像的数据,并根据处理后的数据生成第二影像,所述第二影像的视觉效果与所述第一影像相似;
    将所述第二影像提供给服务端。
  2. 根据权利要求1所述的方法,其特征在于,所述使用所述校验码处理所述第一影像的数据,并根据处理后的数据生成第二影像,包括:
    对所述第一影像进行图像变换,获得第一变换数据;
    使用所述校验码,改变所述第一变换数据,获得第二变换数据;
    对所述第二变换数据进行反向图像变换,获得所述第二影像。
  3. 根据权利要求2所述的方法,其特征在于,所述第一变换数据包括第一频域矩阵,所述第二变换数据包括第二频域矩阵,所述使用所述校验码改变所述第一变换数据,获得第二变换数据,包括:
    基于所述校验码,改变所述第一频域矩阵的中频段的部分序列,得到所述第二频域矩阵。
  4. 根据权利要求3所述的方法,其特征在于,所述基于所述校验码,改变所述第一频域矩阵的中频段的部分序列,包括:
    对所述校验码进行加密,并使用加密后的校验码替换所述第一频域矩阵中的中频段的部分数据。
  5. 根据权利要求4所述的方法,其特征在于,所述加密采用如下方法的至少一种:MD5算法、SHA加密、DES加密算法。
  6. 根据权利要求2所述的方法,其特征在于,
    所述图像变换包括离散余弦变换或小波变换。
  7. 根据权利要求1所述的方法,其特征在于,
    所述校验码包括基于所述应用的运行核心文件和资源文件生成的摘要值。
  8. 根据权利要求1所述的方法,其特征在于,所述方法进一步包括:
    接收来自服务端的应用检测结果;
    若所述应用检测结果指示所述应用被篡改,执行以下至少一项操作:
    提示用户所述应用为非法应用;
    禁止所述应用被使用。
  9. 一种用于服务端的检测被篡改的应用的方法,其特征在于,包括:
    接收安装有所述应用的终端在所述应用的功能使用过程中上传的第二影像;
    对所述第二影像进行图像变换,获得第二变换数据;
    基于预设规则,从所述第二变换数据中提取数据,以获得来自所述终端的校验码;
    将来自所述终端的校验码与预先存储的所述应用的基准校验码进行匹配;
    若来自所述终端的校验码与所述基准校验码不匹配,确定所述应用被篡改。
  10. 根据权利要求9所述的方法,其特征在于,该方法还包括:
    若所述应用被篡改,向所述终端发送用于指示所述应用被篡改的应用检测结果。
  11. 根据权利要求9所述的方法,其特征在于,所述第二变换数据包括第二频域矩阵,所述基于预设规则从所述第二变换数据中提取数据,包括:
    基于所述预设规则,从所述第二频域矩阵的中频段中提取数据。
  12. 根据权利要求9所述的方法,其特征在于,所提取的数据被解密以获得所述来自终端的校验码。
  13. 根据权利要求9所述的方法,其特征在于,
    所述校验码包括基于应用程序运行核心文件和资源文件生成的摘要值。
  14. 根据权利要求9所述的方法,其特征在于,
    所述图像变换包括离散余弦变换或小波变换。
  15. 一种应用程序完整性的校验设备,其特征在于,包括:
    一个或多个处理器、存储一个或多个程序的存储装置;
    当所述一个或多个程序被所述一个或多个处理器执行时,所述一个或多个处理器实现如权利要求1至14中任一项所述的方法。
  16. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计 算机程序被处理器执行时实现如权利要求1至14任一项所述的方法。
PCT/CN2019/122594 2018-12-03 2019-12-03 一种检测被篡改的应用的方法及设备 WO2020114374A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811468551.5 2018-12-03
CN201811468551.5A CN111259387B (zh) 2018-12-03 2018-12-03 一种检测被篡改的应用的方法及设备

Publications (1)

Publication Number Publication Date
WO2020114374A1 true WO2020114374A1 (zh) 2020-06-11

Family

ID=70952059

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122594 WO2020114374A1 (zh) 2018-12-03 2019-12-03 一种检测被篡改的应用的方法及设备

Country Status (2)

Country Link
CN (1) CN111259387B (zh)
WO (1) WO2020114374A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112346904A (zh) * 2020-10-20 2021-02-09 威胜集团有限公司 智能电表校验方法、装置、智能电表及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763108A (zh) * 2014-02-07 2014-04-30 陈子祺 一种识别移动设备硬件唯一序列号的远程系统及方法
CN104123491A (zh) * 2014-07-18 2014-10-29 广州金山网络科技有限公司 一种检测应用程序安装包是否被篡改的方法及装置
CN105426709A (zh) * 2015-11-12 2016-03-23 福建北卡科技有限公司 基于jpeg图像信息隐藏的私密信息通信方法与系统
CN105471886A (zh) * 2015-12-23 2016-04-06 东软集团股份有限公司 一种用户身份识别方法及装置
US20160352522A1 (en) * 2014-10-20 2016-12-01 Soongsil University Research Consortium Techno-Park User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same
CN108108618A (zh) * 2017-12-28 2018-06-01 中国信息通信研究院 伪造攻击的应用界面检测方法及装置

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1249002B1 (en) * 2000-01-13 2011-03-16 Digimarc Corporation Authenticating metadata and embedding metadata in watermarks of media signals
CN101316169B (zh) * 2008-07-18 2010-11-03 张曌 基于互联网第三方生物特征验证的网络身份验证方法
CN102034220B (zh) * 2010-12-23 2012-12-26 武汉大学苏州研究院 一种基于数字水印的票据电子影像防篡改方法
CN104268822A (zh) * 2014-09-18 2015-01-07 上海理工大学 网络上传图像的防伪认证方法
CN106778099A (zh) * 2016-11-29 2017-05-31 北京奇虎科技有限公司 防篡改apk的生成方法和装置、安装及运行方法和装置
CN107403089B (zh) * 2017-07-10 2020-09-04 东软集团股份有限公司 基于应用程序的资源篡改识别方法和装置
CN108875385B (zh) * 2018-05-07 2021-09-17 麒麟合盛网络技术股份有限公司 应用间通信的方法及装置
CN108923910B (zh) * 2018-07-12 2021-06-25 南方电网科学研究院有限责任公司 一种移动应用apk防篡改的方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763108A (zh) * 2014-02-07 2014-04-30 陈子祺 一种识别移动设备硬件唯一序列号的远程系统及方法
CN104123491A (zh) * 2014-07-18 2014-10-29 广州金山网络科技有限公司 一种检测应用程序安装包是否被篡改的方法及装置
US20160352522A1 (en) * 2014-10-20 2016-12-01 Soongsil University Research Consortium Techno-Park User Terminal For Detecting Forgery Of Application Program Based On Signature Information And Method Of Detecting Forgery Of Application Program Using The Same
CN105426709A (zh) * 2015-11-12 2016-03-23 福建北卡科技有限公司 基于jpeg图像信息隐藏的私密信息通信方法与系统
CN105471886A (zh) * 2015-12-23 2016-04-06 东软集团股份有限公司 一种用户身份识别方法及装置
CN108108618A (zh) * 2017-12-28 2018-06-01 中国信息通信研究院 伪造攻击的应用界面检测方法及装置

Also Published As

Publication number Publication date
CN111259387A (zh) 2020-06-09
CN111259387B (zh) 2021-06-15

Similar Documents

Publication Publication Date Title
TWI557589B (zh) 用於產品驗證和啟動的安全軟體產品識別器
US10360463B2 (en) Method and apparatus of verifying usability of biological characteristic image
US9906513B2 (en) Network authorization system
US10726111B2 (en) Increased security using dynamic watermarking
CN110798315A (zh) 基于区块链的数据处理方法、装置及终端
TWI436235B (zh) 資料加密方法與系統,資料解密方法
CN111917535B (zh) 一种数据加密存储方法、装置及服务器
US11425165B2 (en) Methods, systems, articles of manufacture and apparatus to reduce spoofing vulnerabilities
CN106992859B (zh) 一种堡垒机私钥管理方法及装置
WO2008088979A1 (en) Self validation of user authentication requests
US9025770B1 (en) Dynamic encryption arrangement with a wireless device and methods therefor
WO2020114374A1 (zh) 一种检测被篡改的应用的方法及设备
CN111338841A (zh) 数据处理方法、装置、设备和存储介质
US20160055339A1 (en) Encryption Processing Method and Device for Application, and Terminal
CN108985075A (zh) 一种轻量级的镜像文件磁盘加密系统和方法
WO2020057389A1 (zh) 一种签名验证方法、装置、电子设备及可读存储介质
CN112825093B (zh) 安全基线检查方法、主机、服务器、电子设备及存储介质
US9882879B1 (en) Using steganography to protect cryptographic information on a mobile device
TWI656454B (zh) Method and system for preventing password file leakage detection
CN114791834B (zh) 一种应用程序的启动方法、装置、电子设备及存储介质
CN114091088B (zh) 用于提高通信安全的方法和装置
US20080104414A1 (en) Apparatus And Method For Decryption, Electronic Apparatus And Method For Inputting Password Encryption, And Electronic System With A Password
CN109660355B (zh) 防止pos终端被非法篡改的方法、装置、存储介质以及终端
CN108848051B (zh) 应用数据的获取方法和装置
CN110263553B (zh) 基于公钥验证的数据库访问控制方法、装置及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19894180

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19894180

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/12/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19894180

Country of ref document: EP

Kind code of ref document: A1