Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Threat disposal method and safety monitoring probe for Android application

A disposal method and probe technology, which is applied in the field of security monitoring probes, can solve problems such as damage to user interests, weak certificate verification, and theft, and achieve the effects of effective progressive disposal methods, high security disposal capabilities, and reduced security risks

Pending Publication Date: 2021-07-13
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In recent years, with the popularization and application of smart devices, the traditional business applications of enterprises are developing in the direction of mobile, and the application clients are basically compatible with supporting the Android system. However, due to the openness and version fragmentation of the Android system, the system There are certain deficiencies in the security mechanism and platform operation mode of the platform, and more and more security vulnerabilities have been found, such as Web View remote code execution of Android applications, weak certificate verification and privilege escalation and other security issues, which have become a hot spot for hackers. Seriously threaten the intellectual property and data security of business application operators and damage the interests of users
[0003] In order to improve the security of Android applications, security monitoring and security reinforcement protection are usually required before Android applications go online to reduce the impact of application vulnerabilities and the risk of being reversed. , when the application is running online, there are still security risks such as being attacked and cracked, unauthorized use, and sensitive data theft.
[0004] A lot of research has been done on Android application running state monitoring solutions, such as Tencent's Bugly and Virtual APP based on the plug-in framework. The need for device compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat disposal method and safety monitoring probe for Android application
  • Threat disposal method and safety monitoring probe for Android application
  • Threat disposal method and safety monitoring probe for Android application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] In order to improve the security of Android applications, security monitoring and security reinforcement protection are usually required before Android applications go online to reduce the impact of application vulnerabilities and the risk of being reversed. However, when the application is running online, there are still security risks such as being attacked and cracked, unauthorized use, and sensitive data theft.

[0027] To solve this problem, the present invention provides a threat handling method for Android applications. The execution subject of the threat handling method for Android applications is a security monitoring probe provided to the Android application in the form of an SDK. When the Android application is running, the security monitoring probe It can monitor and listen to the threat behaviors that pose security risks to Android applications, such as abnormal running environment and sensitive behaviors in the application, and generate threat behavior sequ...

Embodiment 2

[0084] The present invention provides a security monitoring probe for Android applications, such as figure 2 As shown, the probes include:

[0085] The monitoring module is used to monitor the abnormal environment and HOOK monitoring of the Android application within a preset period of time, and correspondingly obtain the abnormal environmental behavior and sensitive behavior of the Android application within the preset period of time;

[0086] A security event judgment module, configured to generate a threat behavior sequence of an Android application within a preset period based on the environmental abnormal behavior and sensitive behavior of the Android application within a preset period;

[0087] The threat handling module is configured to perform threat handling on the Android application based on the threat behavior sequence of the Android application within a preset period of time.

[0088] Preferably, the probe also includes:

[0089] The interactive interface is us...

Embodiment 3

[0126] In order to verify the effectiveness of the technical solution provided by the present invention, use the method provided by the present invention to perform threat treatment on an Android application and use the traditional method to perform threat treatment on an Android application, and obtain the threat treatment effects of the two;

[0127] The method provided by the present invention is used to deal with threats to an Android application, and its flow is as follows Figure 4 shown, including:

[0128] Initialize the start time of the life cycle, and make the number of triggers of various sensitive behaviors be 0;

[0129] Step 1: The abnormal environment monitoring unit monitors the abnormal behavior of the environment, and if triggered, records the corresponding abnormal behavior of the environment;

[0130] Step 2: The HOOK monitoring unit monitors the sensitive behavior of the monitored application, if triggered, records the corresponding sensitive behavior an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an Android application threat disposal method and a safety monitoring probe. The method comprises the steps: carrying out the abnormal environment monitoring and HOOK monitoring of an Android application in a preset time period, and correspondingly obtaining the environment abnormal behavior and sensitive behavior of the Android application in the preset time period; generating a threat behavior sequence of the Android application in the preset time period based on the environment abnormal behavior and the sensitive behavior of the Android application in the preset time period; and based on the threat behavior sequence of the Android application in the preset time period, performing threat disposal on the Android application. According to the technical scheme provided by the invention, the abnormal behavior of the Android application environment and the sensitive behavior of the application are jointly monitored, so that the threat disposal operation of the Android application is accurately executed, and the safety risk of the Android application is reduced.

Description

technical field [0001] The invention relates to the fields of electric power information security and mobile Internet security, in particular to a threat handling method for Android applications and a security monitoring probe. Background technique [0002] In recent years, with the popularization and application of smart devices, the traditional business applications of enterprises are developing in the direction of mobile, and the application clients are basically compatible and support the Android system. However, due to the openness and version fragmentation of the Android system, the system There are certain deficiencies in the security mechanism and platform operation mode of the platform, and more and more security vulnerabilities have been found, such as Web View remote code execution of Android applications, weak certificate verification and privilege escalation and other security issues, which have become a hot spot for hackers. Seriously threaten the intellectual ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/552G06F21/566
Inventor 李勇陈牧戴造建陈璐李尼格卢子昂
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products