Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application monitoring method, development platform, client and information system

A technology that applies information and clients. It is applied in the information field and can solve problems such as time lag and timeliness dependence on time.

Inactive Publication Date: 2018-03-06
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, the discovery and monitoring of pirated apps by this method depends on the timeliness of crawling to the APK sample and the length of analysis and judgment after crawling, and there is a problem of time lag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application monitoring method, development platform, client and information system
  • Application monitoring method, development platform, client and information system
  • Application monitoring method, development platform, client and information system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0202] Such as Figure 9 As shown, this embodiment provides an information processing method including:

[0203] Step A: Add a monitoring module to the application code and package it to generate an APK file. The APK file here is the installation file.

[0204] Step B: After the APK file is installed, the monitoring module is called to obtain monitoring information during runtime, and it is determined whether the current application is a pirated application.

[0205] Said step A may comprise:

[0206] In the APP development stage, the monitoring module is added to the code project, and an APK file containing the monitoring module is packaged and released as a genuine application on the application channel. Specifically, to package the monitoring module into a library file, add the calling code of the library file in the startup code segment of the APP, obtain the SHA1-Digest values ​​of all files contained in the APK after decompression, and encrypt them, store them in the ...

example 2

[0253] Such as Figure 12 As shown, this example provides a system applicable to the aforementioned information processing method: the system includes two parts: a monitoring software development kit SDK and a server.

[0254] The monitoring SDK is included in the application to be monitored as a library file, including a server-side interaction module 100 , a file difference comparison module 200 , and an APK feature extraction module 300 . As the cloud, the server side can interact with all applications to be monitored, issue instructions to them, and manage all application data, including monitoring SDK interaction module 400, risk score calculation module 500, pirated application monitoring management module 600, and monitoring SDK library files A module 700 is generated.

[0255] The function of the server-side interaction module 100 is mainly to interact with the server side. When the file difference comparison module finds that it is a pirated application, it sends pir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information processing method, a development platform, a client and an information system. The information processing method applied to the development platform includes the following steps: acquiring a monitoring module of a genuine application; acquiring a first characteristic value of the genuine application; and encapsulating the monitoring module,the first characteristic value and an application code of the genuine application to form an installation file of the genuine application, wherein the monitoring module is used for extracting a secondcharacteristic value of the current application in an application running process, comparing the second characteristic value with the first characteristic value, and further determining whether the current application is a pirated application. Thereby, by adding the monitoring module and the first characteristic value to the genuine application, the operation of automatically acquiring the secondcharacteristic value of the current application in a subsequent application running process can be facilitated; and through the comparison with the first characteristic value, whether the current application is the pirated application can be found in time, and the characteristic of simple operation can also be achieved.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an application monitoring method, a development platform, a client and an information system. Background technique [0002] With the development of electronic technology and information, more and more applications (Application, App) are installed on electronic devices, and the types are also becoming more and more abundant. Lawbreakers think that it is profitable and usually release pirated apps. However, once pirated apps are installed in electronic devices, problems such as excessive interference information, leakage of user information, and frequent equipment failures often occur. [0003] Under normal circumstances, pirated apps are formed by tampering with genuine apps. And usually, the more downloads of genuine APPs, the more corresponding pirated versions. There are three main methods of tampering with genuine applications: [0004] The first: [0005] Implanting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/12
CPCG06F21/128H04L63/145H04L63/1491H04L2463/101
Inventor 刘颖卿
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products