Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack detection method and device for application program, electronic device and readable medium

An attack detection and application technology, applied in the Internet field, can solve problems such as difficult detection and inability to detect, and achieve the effect of improving accuracy and reducing the risk of being attacked.

Active Publication Date: 2020-07-10
TONGDUN HLDG CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above detection methods for attacking applications have been well known by hackers, and are easy to bypass through some technical means. For example, it is difficult to detect under non-root conditions. For example, by prohibiting access to certain "specific" files, lead to undetectable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and device for application program, electronic device and readable medium
  • Attack detection method and device for application program, electronic device and readable medium
  • Attack detection method and device for application program, electronic device and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus their repeated descriptions will be omitted.

[0037] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the invention. However, those skilled in the art will appreciate that the technical solutions of the present invention may be practiced without one or more of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attack detection method and device for an application program, an electronic device and a readable medium. The method comprises: calling a first interface to obtain first operator information of the equipment; calling a second interface to obtain base station information of the equipment, and obtaining second operator information based on the base station information; comparing the first operator information with the second operator information to obtain a comparison result; and determining whether the target application program is attacked or not based on the comparison result. The attack detection of the application program based on the operator information is realized, the risk that the detection method is attacked is reduced, and the accuracyof the attack detection method of the application program is improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an application program attack detection method, device, electronic equipment and readable medium. Background technique [0002] With the development of mobile Internet technology, more and more users choose to perform daily operations on mobile phones. Some unscrupulous traders and black producers have begun to frequently attack applications on mobile phones to obtain excess profits for certain interests. [0003] At present, in related technologies, attacks against applications are generally detected through the following detection methods: [0004] 1. Check whether the device is xposed by modifying the system framework service. [0005] 2. Detect whether the device has the highest authority root. [0006] 3. Detect application-specific attacks by detecting the presence of certain "specific" files. [0007] The above detection methods for attacking applications ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/00
CPCH04W12/35H04W12/121H04W12/122
Inventor 李国琛
Owner TONGDUN HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products