CN103809974A - Method and device for automatically verifying application and cloud server - Google Patents
Method and device for automatically verifying application and cloud server Download PDFInfo
- Publication number
- CN103809974A CN103809974A CN201410049044.3A CN201410049044A CN103809974A CN 103809974 A CN103809974 A CN 103809974A CN 201410049044 A CN201410049044 A CN 201410049044A CN 103809974 A CN103809974 A CN 103809974A
- Authority
- CN
- China
- Prior art keywords
- information
- legal
- api
- item
- information list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The invention is suitable for the technical field of computers and provides a method and device for automatically verifying an application and a cloud server. The method comprises the steps that an API information list used by the application to be verified and the SDK version information of the application to be verified are obtained; an open legal API information list, corresponding to the SDK version information, in a system library is obtained; information items in the API information list are extracted one by one, matching is conducted on each information item and legal information items in the legal API information list, and the information items which are not matched with all the legal information items in the legal API information list and the number of APIs which are not matched with all the legal information items are recorded; according to the information items which are not matched with all the legal information items in the legal API information list and the number of the APIs which are not matched with all the legal information items, a verification result is generated. According to the method and device for automatically verifying the application and the cloud server, due to the fact that the application to be verified is verified through automatic flow, the contingency of manual verification is avoided, and the verification period is shortened.
Description
Technical field
The invention belongs to field of computer technology, relate in particular to a kind of method, device and Cloud Server of applying automatic audit.
Background technology
Along with the development of communication, in order to meet the demand of user to difference in functionality, application program shop applications and giving birth to, take the mobile terminal of Android system as example, allow user to browse and download some from application program shop for SDK (Software Development Kit) (Software Development Kit, SDK) the various application of exploitation, comprise the software of the multiple practicalities such as various game, calendar, translation formula, picture library.User can buy or freely use, and allows this application be directly downloaded on mobile terminal.At present, in order to guarantee the compatibility of legal and safe particularly application version of application, after application is submitted to application program shop, often need by manual examination and verification, tester carries out experimental test to it, the method of this manual examination and verification is concrete contingency not only, and greatly increased Review Cycle.
Summary of the invention
The embodiment of the present invention provides a kind of method, device and Cloud Server of applying automatic audit, and being intended to solve existing application checking method not only specifically has contingency, and the long problem of Review Cycle.
On the one hand, provide a kind of method of applying automatic audit, described method comprises:
S1, obtain API information list and SDK version information that pending application is used, described API information list comprises some items of information, and described item of information comprises name and several class inheritances;
S2, obtain in described SDK version information correspondence system storehouse open legal AP I information list, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances;
S3, extract item of information in described API information list one by one and mate with legal information item described in described legal AP I information list, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity;
S4, according to the unmatched item of information of all described legal information items in described and described legal AP I information list and do not mate API quantity, generate auditing result.
On the other hand, provide a kind of device of applying automatic audit, described device comprises:
Application message extraction unit, the API information list and the SDK version information that use for obtaining pending application, described API information list comprises some items of information, described item of information comprises name and several class inheritances;
System information extraction unit, for obtaining the open legal AP I information list in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances;
Information contrast unit, mate with legal information item described in described legal AP I information list for extracting described API information list item of information one by one, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity;
Result generation unit, for according to the described and described legal AP I information list unmatched item of information of all described legal information items and do not mate API quantity, generates auditing result.
On the one hand, provide a kind of Cloud Server again, described Cloud Server comprises the application as above device of audit automatically.
In the embodiment of the present invention, obtain API information list and SDK version information that pending application is used, described API information list comprises some items of information, described item of information comprises name and several class inheritances; Obtain legal AP I information list open in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances; Extract one by one item of information in described API information list and mate with legal information item described in described legal AP I information list, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity; According to the unmatched item of information of all described legal information items in described and described legal AP I information list and do not mate API quantity, generate auditing result, the present invention, adopt automatic flow to process pending application, the API content that intactly extraction is used is mated with legal AP I content open in the SDK version information correspondence system storehouse of pending application, illegally calling wherein carried out to statistical study, avoid the contingency of manual examination and verification, shortened Review Cycle, for refuse illegal application added provide stylize, the basis for estimation of datumization.
Accompanying drawing explanation
Fig. 1 is the application realization flow figure of the method for audit automatically that the embodiment of the present invention one provides;
Fig. 2 is the application concrete structure figure of the device of audit automatically that the embodiment of the present invention two provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
In embodiments of the present invention, obtain API information list and SDK version information that pending application is used, described API information list comprises some items of information, and described item of information comprises name and several class inheritances; Obtain legal AP I information list open in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances; Extract one by one item of information in described API information list and mate with legal information item described in described legal AP I information list, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity; According to the unmatched item of information of all described legal information items in described and described legal AP I information list and do not mate API quantity, generate auditing result.
Below in conjunction with specific embodiment, realization of the present invention is described in detail:
Embodiment mono-
Fig. 1 shows the application realization flow of the method for audit automatically that the embodiment of the present invention one provides, and details are as follows:
It should be noted that, the present embodiment and following examples are all take Cloud Server as executive agent, illustrate with the concrete audit correspondence of android installation kit (A ndroidPackage, APK) of the upper compiling of SDK (Software Development Kit) (Software Development Kit, SDK).
In step S1, obtain API information list and SDK version information that pending application is used, described API information list comprises some items of information, described item of information comprises name and several class inheritances.In the present embodiment, the pending software package that the described pending developer of being applied as uploads, as various APK.Described API information list comprises some items of information, described item of information comprises name and several class inheritances, wherein, class inheritance comprises class inheritance and class members, class members comprises public member method and the member variable in member method and the member variable in class, particularly public class.Described SDK version information refers to the version information of the system library that described pending application call manufacturer supports.Wherein, API information list and SDK version information can be stored in application API information bank.API information list wraps name under first describing open API, and type modifier and the inheritance of open API, then enumerate all publicly-owned member under open API.As:
Concrete, this step S1 specifically comprises:
S11, utilize applied analysis instrument to obtain class file and api interface that pending application is used, and class file and api interface described in Formatting Output, generate some items of information, export described some items of information to API information list, described item of information comprises name and several class inheritances;
Wherein, described analysis tool comprises Apkanalyser, can use ApkAnalyser project instrument to resolve class file in pending application and api interface, and is formatted as the item of information that comprises name and inheritance thereof, exports API information list to.
S12, obtain the edition configuration file of described pending application by decompiling instrument, resolve described configuration file and obtain SDK version information.
Wherein, decompiling instrument comprises apktool.Operation apktool decompiling instrument parses SDK version information text AndroidMannifest.xml, the SDK version information that the APK of institute supports is obtained in parsing, wherein SDK version information specifically comprises the SDK version scope that API is corresponding, the version scope of the system library that manufacturer supports.Wherein, in edition configuration file, concrete SDK version information text is as follows:
Obtain SDK version information, the API version number that in Android system, target platform SDK externally provides by resolving SDK version information text.
In step S2, obtain legal AP I information list open in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, described legal information item comprises legal bag name and several legal class inheritances.
In the present embodiment, described system library comprises described in the system library that Android system storehouse and equipment vendors provide that legal AP I information list comprises some items of information, described legal information item is that pending application has the data entries that can call authority and system support, comprise legal bag name and several legal class inheritances, wherein bag name comprises that the system library jar that the corresponding jar bag of framework layer API that Android system framework provides and equipment vendors provide wraps two classes.Wherein, legal AP I information list can be stored in system API information bank.
Concrete, this step S2 is specially operation analytical tool and obtains described SDK version information correspondence system storehouse and comprise some legal information items, and described some legal information items are preserved to the information list into legal AP I.Described analytical tool comprises dex2jar and javap.The corresponding jar bag of framework layer API and user that extracting the android framework in described SDK version information correspondence system storehouse provides ask the system library jar being provided by equipment vendors quoting to wrap, first use dex2jar that jar bag is converted into jar file, then will after jar file decompress(ion), extract all class files, re-use javap instrument and extract several the legal class inheritances in these class files, bag name and several legal class inheritances are formatted as to some items of information, output to application and there is the legal AP I information list that can call authority and system support.Below enumerate the open partial information item content of domestic os TVOS AddOn platform:
From illustrating above, this step has derived the legal information item of all openings of pending application operation platform.
In step S3, extract one by one item of information in described API information list and mate with legal information item described in described legal AP I information list, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity.
In the present embodiment, this step S3 is specially bag name and the some class inheritances of extracting one by one item of information in described API information list, and mate one by one with legal bag name and the legal class inheritance of legal information item in described legal AP I information list, if the described legal information item not mating with described item of information, obtain with described legal AP I information list in the corresponding unmatched item of information of legal information item, do not mate API quantity and add 1, carry out next item of information coupling in described API information list, until item of information all completes contrast coupling in described API information list.The contrast of this step has comprised that running package is containing logical code content, avoid pending and quoted compiling by situation about still cannot move at corresponding platform, owing to just deriving the public statement attribute of API, do not analyze inner realization, there is not randomness in this part Decompilation, by the means such as sorting by name, can comprehensively derive the legal AP I information list of APK and platform, the item of information that above matching process obtains is all unique confirmable.Concrete as following two kinds of situations:
Situation 1, software conditions, the newly-increased API providing in TVOS 4.4SDK has been provided APK, but the unreceipted 4.4 above versions of only supporting, when user downloads on the equipment that this APK is contained in TVOS4.2, causes APK to collapse.Derive the system library opening API list of TVOS.2, derive again the system API list that APK calls, can find carrying out audit, in APK, comprise in the API list that an API is not present in TVOS4.2 platform, therefore can examine out this APK incompatible in TVOS4.2.
Situation 2, hardware case, is used the APK of SDK exploitation that the upper strata API of certain the special physical layer interface support providing with hardware vendor has been provided, but unreceipted must operation on corresponding hardware platform, be contained on the equipment that Fei Gai manufacturer provides when user downloads this APK, cause APK collapse.Derive the system library opening API list of operational outfit, derive again the system API list that APK calls, can find carrying out audit, in APK, comprise an API and be not present in operational outfit API list, therefore can check out this APK incompatible in this hardware environment.
In step S4, according to the unmatched item of information of all described legal information items in described and described legal AP I information list and do not mate API quantity, generate auditing result.
In the present embodiment, read the unmatched item of information of all described legal information items in all and described legal AP I information list, and statistics do not mate API quantity, summarize the difference between the legal AP I information list that in the pending application that SDK develops, API information list and target platform provide, generate the auditing result of described pending application, described auditing result, with the output of audit report document form, cannot normally be moved and cause incompatible foundation as pending application meeting.
As a preferred version, this method can also comprise:
Be zero if do not mate API quantity described in the described auditing result of S5, issue described pending application;
As another preferred version, this method can also comprise:
If it is non-vanishing not mate API quantity described in the described auditing result of S6, auditing result is fed back to described developer and revise not mating API for described developer.
Wherein, developer provides developer website to carry out and examines the mutual of Cloud Server, and the auditing result of pending application is submitted in inquiry to, revises not mating API for described developer.
The present embodiment, can reach and adopt automatic flow to process pending application, the API content that intactly extraction is used is mated with legal AP I content open in the SDK version information correspondence system storehouse of pending application, illegally calling wherein carried out to statistical study, avoid the contingency of manual examination and verification, shortened Review Cycle, for refuse illegal application added provide stylize, the basis for estimation of datumization.
Embodiment bis-
Fig. 2 shows the application concrete structure block diagram of the device of audit automatically that the embodiment of the present invention two provides, and for convenience of explanation, only shows the part relevant to the embodiment of the present invention.In the present embodiment, the device that this application is examined automatically comprises: application message extraction unit 21, system information extraction unit 22, information contrast unit 23, result generation unit 24, application release unit 25 and invalid information feedback unit 26.
Wherein, application message extraction unit 21, the API information list and the SDK version information that use for obtaining pending application, described API information list comprises some items of information, described item of information comprises name and several class inheritances;
System information extraction unit 22, for obtaining the open legal AP I information list in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances;
The present embodiment, can reach and adopt automatic flow to process pending application, the API content that intactly extraction is used is mated with legal AP I content open in the SDK version information correspondence system storehouse of pending application, illegally calling wherein carried out to statistical study, avoid the contingency of manual examination and verification, shortened Review Cycle, for refuse illegal application added provide stylize, the basis for estimation of datumization.
Further, class file and api interface that described application message extraction unit 21 uses specifically for obtaining pending application, and class file and api interface described in Formatting Output, generate some items of information, export described some items of information to API information list, described item of information comprises name and several class inheritances; Obtain the edition configuration file of described pending application, resolve described configuration file and obtain SDK version information.
Further, described system information extraction unit 22 comprises some legal information items specifically for obtaining described SDK version information correspondence system storehouse, export described some legal information items to legal AP I information list, described legal information item comprises legal bag name and several legal class inheritances.
Further, described information contrast unit 23 is specifically for extracting one by one bag name and some class inheritances of item of information in described API information list, and mate one by one with legal bag name and the legal class inheritance of legal information item in described legal AP I information list, if the described legal information item not mating with described item of information, obtain with described legal AP I information list in the corresponding unmatched item of information of legal information item, do not mate API quantity and add 1, carry out next item of information coupling in described API information list, until item of information all completes contrast coupling in described API information list.
Further, described device also comprises:
Invalid information feedback unit 26, if non-vanishing for not mating API quantity described in described auditing result, feed back to described developer by auditing result and revises not mating API for described developer.
The application that the embodiment of the present invention provides the automatically device of audit can be applied in the embodiment of the method one of aforementioned correspondence, and details, referring to the description of above-described embodiment one, do not repeat them here.
It should be noted that in said system embodiment, included unit is just divided according to function logic, but is not limited to above-mentioned division, as long as can realize corresponding function; In addition, the concrete title of each functional unit also, just for the ease of mutual differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that all or part of step realizing in the various embodiments described above method is can carry out the hardware that instruction is relevant by program to complete, corresponding program can be stored in a computer read/write memory medium, described storage medium, as ROM/RAM, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any modifications of doing within the spirit and principles in the present invention, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.
Claims (11)
1. an application method for audit automatically, is characterized in that, described method comprises:
S1, obtain API information list and SDK version information that pending application is used, described API information list comprises some items of information, and described item of information comprises name and several class inheritances;
S2, obtain in described SDK version information correspondence system storehouse open legal AP I information list, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances;
S3, extract item of information in described API information list one by one and mate with legal information item described in described legal AP I information list, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity;
S4, according to the unmatched item of information of all described legal information items in described and described legal AP I information list and do not mate API quantity, generate auditing result.
2. the method for claim 1, is characterized in that, described S1 specifically comprises:
S11, obtain class file and api interface that pending application is used, and class file and api interface described in Formatting Output, generate some items of information, export described some items of information to API information list, described item of information comprises name and several class inheritances;
S12, obtain the edition configuration file of described pending application, resolve described configuration file and obtain SDK version information.
3. the method for claim 1, is characterized in that, described S2 is specially:
Obtain described SDK version information correspondence system storehouse and comprise some legal information items, export described some legal information items to legal AP I information list, described legal information item comprises legal bag name and several legal class inheritances.
4. the method for claim 1, is characterized in that, described S3 is specially:
Extract one by one bag name and some class inheritances of item of information in described API information list, and mate one by one with legal bag name and the legal class inheritance of legal information item in described legal AP I information list, if the described legal information item not mating with described item of information, obtain with described legal AP I information list in the corresponding unmatched item of information of legal information item, do not mate API quantity and add 1, carry out next item of information coupling in described API information list, until item of information all completes contrast coupling in described API information list.
5. the method as described in claim 1,2,3 or 4, is characterized in that, after described S4, also comprises:
Be zero if do not mate API quantity described in the described auditing result of S5, issue described pending application;
If it is non-vanishing not mate API quantity described in the described auditing result of S6, auditing result is fed back to described developer and revise not mating API for described developer.
6. an application device for audit automatically, is characterized in that, described device comprises:
Application message extraction unit, the API information list and the SDK version information that use for obtaining pending application, described API information list comprises some items of information, described item of information comprises name and several class inheritances;
System information extraction unit, for obtaining the open legal AP I information list in described SDK version information correspondence system storehouse, described legal AP I information list comprises some legal information items, and described legal information item comprises legal bag name and several legal class inheritances;
Information contrast unit, mate with legal information item described in described legal AP I information list for extracting described API information list item of information one by one, record is with the unmatched item of information of all described legal information items in described legal AP I information list and do not mate API quantity;
Result generation unit, for according to the described and described legal AP I information list unmatched item of information of all described legal information items and do not mate API quantity, generates auditing result.
7. device as claimed in claim 6, it is characterized in that, class file and api interface that described application message extraction unit uses specifically for obtaining pending application, and class file and api interface described in Formatting Output, generate some items of information, export described some items of information to API information list, described item of information comprises name and several class inheritances; Obtain the edition configuration file of described pending application, resolve described configuration file and obtain SDK version information.
8. device as claimed in claim 6, it is characterized in that, described system information extraction unit comprises some legal information items specifically for obtaining described SDK version information correspondence system storehouse, export described some legal information items to legal AP I information list, described legal information item comprises legal bag name and several legal class inheritances.
9. device as claimed in claim 6, it is characterized in that, described information contrast unit is specifically for extracting one by one bag name and some class inheritances of item of information in described API information list, and mate one by one with legal bag name and the legal class inheritance of legal information item in described legal AP I information list, if the described legal information item not mating with described item of information, obtain with described legal AP I information list in the corresponding unmatched item of information of legal information item, do not mate API quantity and add 1, carry out next item of information coupling in described API information list, until item of information all completes contrast coupling in described API information list.
10. the device as described in claim 6,7,8 or 9, is characterized in that, described device also comprises:
Application release unit, if be zero for not mating API quantity described in described auditing result, issues described pending application;
Invalid information feedback unit, if non-vanishing for not mating API quantity described in described auditing result, feed back to described developer by auditing result and revises not mating API for described developer.
11. 1 kinds of Cloud Servers, is characterized in that, described Cloud Server comprises the application device of audit automatically described in claim 6 to 10 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410049044.3A CN103809974B (en) | 2014-02-12 | 2014-02-12 | It is a kind of to apply the method, apparatus audited automatically and Cloud Server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410049044.3A CN103809974B (en) | 2014-02-12 | 2014-02-12 | It is a kind of to apply the method, apparatus audited automatically and Cloud Server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103809974A true CN103809974A (en) | 2014-05-21 |
CN103809974B CN103809974B (en) | 2017-11-21 |
Family
ID=50706800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410049044.3A Active CN103809974B (en) | 2014-02-12 | 2014-02-12 | It is a kind of to apply the method, apparatus audited automatically and Cloud Server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103809974B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318164A (en) * | 2014-10-29 | 2015-01-28 | 北京金和软件股份有限公司 | Application program verification method |
CN105554025A (en) * | 2016-01-19 | 2016-05-04 | 四川长虹电器股份有限公司 | Management method for unifying users by open platform and management system thereof |
CN105989232A (en) * | 2015-02-17 | 2016-10-05 | 深圳迈瑞生物医疗电子股份有限公司 | Automatic examination and verification system and method for sample inspection result |
CN106156502A (en) * | 2016-07-05 | 2016-11-23 | 东软集团股份有限公司 | The appraisal procedure of a kind of report examination & verification and device |
CN106484374A (en) * | 2015-08-26 | 2017-03-08 | 北京奇虎科技有限公司 | Method and transfer server that a kind of control APK reaches the standard grade |
CN107450909A (en) * | 2017-06-30 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | The treating method and apparatus of validity check is integrated for SDK |
CN108763921A (en) * | 2018-05-29 | 2018-11-06 | 北京迪诺益佳信息科技有限公司 | A kind of method of application software and SDK management and control |
CN109032687A (en) * | 2018-06-11 | 2018-12-18 | 北京奇艺世纪科技有限公司 | Shield the method and device that SDK danger is called |
CN111240694A (en) * | 2020-01-03 | 2020-06-05 | 北京小米移动软件有限公司 | Application detection method, application detection device and storage medium |
CN111310181A (en) * | 2020-02-21 | 2020-06-19 | 广州欢网科技有限责任公司 | Application program processing method, device and system in application store system |
CN112764797A (en) * | 2021-01-06 | 2021-05-07 | 浙江大华技术股份有限公司 | Software compatibility detection method and device, electronic device and storage medium |
CN113343219A (en) * | 2021-05-31 | 2021-09-03 | 烟台中科网络技术研究所 | Automatic and efficient high-risk mobile application program detection method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957899A (en) * | 2010-09-17 | 2011-01-26 | 百度在线网络技术(北京)有限公司 | Online-application platform and control method thereof |
CN102724204A (en) * | 2012-06-28 | 2012-10-10 | 电子科技大学 | Secure and trusted capability opening platform |
CN102779255A (en) * | 2012-07-16 | 2012-11-14 | 腾讯科技(深圳)有限公司 | Method and device for judging malicious program |
-
2014
- 2014-02-12 CN CN201410049044.3A patent/CN103809974B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101957899A (en) * | 2010-09-17 | 2011-01-26 | 百度在线网络技术(北京)有限公司 | Online-application platform and control method thereof |
CN102724204A (en) * | 2012-06-28 | 2012-10-10 | 电子科技大学 | Secure and trusted capability opening platform |
CN102779255A (en) * | 2012-07-16 | 2012-11-14 | 腾讯科技(深圳)有限公司 | Method and device for judging malicious program |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318164B (en) * | 2014-10-29 | 2017-06-20 | 北京金和软件股份有限公司 | A kind of checking method of application program |
CN104318164A (en) * | 2014-10-29 | 2015-01-28 | 北京金和软件股份有限公司 | Application program verification method |
CN105989232A (en) * | 2015-02-17 | 2016-10-05 | 深圳迈瑞生物医疗电子股份有限公司 | Automatic examination and verification system and method for sample inspection result |
CN106484374B (en) * | 2015-08-26 | 2021-05-18 | 北京奇虎科技有限公司 | Method for controlling APK online and transfer server |
CN106484374A (en) * | 2015-08-26 | 2017-03-08 | 北京奇虎科技有限公司 | Method and transfer server that a kind of control APK reaches the standard grade |
CN105554025A (en) * | 2016-01-19 | 2016-05-04 | 四川长虹电器股份有限公司 | Management method for unifying users by open platform and management system thereof |
CN106156502A (en) * | 2016-07-05 | 2016-11-23 | 东软集团股份有限公司 | The appraisal procedure of a kind of report examination & verification and device |
CN106156502B (en) * | 2016-07-05 | 2018-11-06 | 东软集团股份有限公司 | A kind of appraisal procedure and device of report audit |
CN107450909B (en) * | 2017-06-30 | 2020-09-08 | 武汉斗鱼网络科技有限公司 | Processing method and device for software development kit integration validity check |
CN107450909A (en) * | 2017-06-30 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | The treating method and apparatus of validity check is integrated for SDK |
CN108763921A (en) * | 2018-05-29 | 2018-11-06 | 北京迪诺益佳信息科技有限公司 | A kind of method of application software and SDK management and control |
CN108763921B (en) * | 2018-05-29 | 2019-04-02 | 北京迪诺益佳信息科技有限公司 | A kind of method of application software and SDK control |
CN109032687B (en) * | 2018-06-11 | 2021-09-03 | 北京奇艺世纪科技有限公司 | Method and device for shielding dangerous call of SDK (software development kit) |
CN109032687A (en) * | 2018-06-11 | 2018-12-18 | 北京奇艺世纪科技有限公司 | Shield the method and device that SDK danger is called |
CN111240694A (en) * | 2020-01-03 | 2020-06-05 | 北京小米移动软件有限公司 | Application detection method, application detection device and storage medium |
CN111240694B (en) * | 2020-01-03 | 2024-01-09 | 北京小米移动软件有限公司 | Application detection method, application detection device and storage medium |
CN111310181A (en) * | 2020-02-21 | 2020-06-19 | 广州欢网科技有限责任公司 | Application program processing method, device and system in application store system |
CN112764797A (en) * | 2021-01-06 | 2021-05-07 | 浙江大华技术股份有限公司 | Software compatibility detection method and device, electronic device and storage medium |
CN113343219A (en) * | 2021-05-31 | 2021-09-03 | 烟台中科网络技术研究所 | Automatic and efficient high-risk mobile application program detection method |
CN113343219B (en) * | 2021-05-31 | 2023-03-07 | 烟台中科网络技术研究所 | Automatic and efficient high-risk mobile application program detection method |
Also Published As
Publication number | Publication date |
---|---|
CN103809974B (en) | 2017-11-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103809974A (en) | Method and device for automatically verifying application and cloud server | |
CN104793946B (en) | Dispositions method and system are applied based on cloud computing platform | |
US9946537B2 (en) | Integrated development environment-based repository searching in a networked computing environment | |
CN1641583B (en) | Self-describing software image update components | |
US11120018B2 (en) | Spark query method and system supporting trusted computing | |
US20200233790A1 (en) | Designer defined mocking service behavior | |
JP7131946B2 (en) | Method and system for assessing application security | |
US20180260199A1 (en) | Method and apparatus for intermediate representation of applications | |
CN104965712B (en) | Application program method for reinforcing and protecting, device and mobile terminal | |
CN102135892B (en) | Application program running method, device and system | |
KR102281052B1 (en) | Mobile terminal application update method and apparatus | |
JP2021518619A (en) | Systems and methods for connector development and integrated channel deployment | |
US11030085B2 (en) | User defined mocking service behavior | |
CN106605212A (en) | Modular co-versioning in a dynamically linked runtime environment | |
CN102455912A (en) | Runtime extensions | |
CN112256321A (en) | Static library packaging method and device, computer equipment and storage medium | |
CN108536451A (en) | Application program buries a method for implanting and device | |
US20170249143A1 (en) | Detecting open source components built into mobile applications | |
US9389879B2 (en) | System and method for manipulating user-interface display items for web widgets | |
CN105760761A (en) | Software behavior analyzing method and device | |
CN106778270B (en) | Malicious application detection method and system | |
CN104239112A (en) | Device driver installation method and device | |
CN113342660B (en) | File testing method, device, system, electronic equipment and readable storage medium | |
CN104978221A (en) | Method and system for implementing downloading and deleting of program | |
US20180181382A1 (en) | Consuming persistent library bundles |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |