Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application security protection method and device

A technology for application and security protection, applied in the field of application security management, to avoid secondary packaging, improve user experience, and enhance security

Inactive Publication Date: 2017-09-15
MIGU DIGITAL MEDIA CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some technical problems in this technical solution: Once a third party obtains the public key through illegal means, it can still tamper with the application program. As long as the public key is not modified, it is easy to escape the step of public key verification; at the same time, When an application is downloaded by hundreds of thousands or millions of clients, how to inform the client of the public key is another big problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application security protection method and device
  • Application security protection method and device
  • Application security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to understand the characteristics and technical content of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The accompanying drawings are for reference and explanation purposes only and are not used to limit the present invention.

[0031] In the embodiment of the present invention, the smart terminal may include, but is not limited to, electronic devices such as mobile phones, tablets, and palmtop computers.

[0032] Such as figure 1 As shown, the implementation process of the method for application security protection in the embodiment of the present invention includes the following steps:

[0033] Step 101: Obtain relevant information of the application downloaded by the client;

[0034] Here, the related information of the application downloaded by the client may be a complete application or a part of the application, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application security protection method. The method comprises the steps that relevant information of an application downloaded by a client is acquired; whether the application downloaded by the client is an original-version application published by a publisher is detected; and when it is detected that the application downloaded by the client is not the original-version application, warning information is sent to the client, and a link of an installation package corresponding to the original-version application is sent to the client. Meanwhile, the invention furthermore discloses an application security protection device.

Description

Technical field [0001] The present invention relates to application program safety management technology, in particular to a method and device for application program safety protection. Background technique [0002] With the rapid development of smart devices, such as smart phones, tablet computers, etc., the applications of these smart devices are becoming more and more extensive. At the same time, there are more and more types of smart device-based applications, such as readers and music players. And so on, to provide users with great convenience. [0003] However, after the application is packaged to generate an Android installation package (APK, Android Package) file, it may be maliciously decompiled by a third party, tampered with the source code, or implanted a variety of malicious advertising information in the source code. At this time, the source program code that has been decompiled, tampered with, or embedded with advertising information needs to be repackaged and signe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 佘志强杨琳岳振李翼
Owner MIGU DIGITAL MEDIA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products