CN105354485A - Data processing method for portable device - Google Patents

Data processing method for portable device Download PDF

Info

Publication number
CN105354485A
CN105354485A CN201510658131.3A CN201510658131A CN105354485A CN 105354485 A CN105354485 A CN 105354485A CN 201510658131 A CN201510658131 A CN 201510658131A CN 105354485 A CN105354485 A CN 105354485A
Authority
CN
China
Prior art keywords
authority
api
contingency table
function
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510658131.3A
Other languages
Chinese (zh)
Other versions
CN105354485B (en
Inventor
时翔
冉欢欢
张悍裴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shine Technology Co ltd
Original Assignee
Sichuan Xiechuang Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Xiechuang Information Technology Service Co Ltd filed Critical Sichuan Xiechuang Information Technology Service Co Ltd
Priority to CN201510658131.3A priority Critical patent/CN105354485B/en
Publication of CN105354485A publication Critical patent/CN105354485A/en
Application granted granted Critical
Publication of CN105354485B publication Critical patent/CN105354485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data processing method for a portable device. The method comprises: uncompressing an application installation package file to obtain a byte code file and a Manifest file; extracting all API calls in a program by traversing the byte code file, and analyzing corresponding rights required in APIs; modifying rights required by the Manifest file, and deleting rights which are requested but not used; and re-integrating the Manifest file subjected to right modification and the byte code file into an installation package file. According to the data processing method for the portable device, provided by the invention, the right of the application program is analyzed and constrained, so that the security and reliability of the program are improved and the correct operation of the program is not influenced.

Description

A kind of portable set data processing method
Technical field
The present invention relates to mobile Internet, particularly a kind of portable set data processing method.
Background technology
Along with the development of mobile Internet, the popularity rate of portable terminal improves constantly, and safety problem more and more causes the attention of people.While increasing application program brings advantage to the user, also stores user's private data.Due to increasing income property of system and application market opening, Android platform is very easily attacked.Application program wants the API provided by system carry out certain operation or use certain resource, just must have the authority corresponding with this API.These authorities must be asked in the Manifest file of program, when applying mounted by system carry out inspections also this application of reminding user specifically request which authority.
Developer follows minimum principle when writing Android application program, namely carry out which operation or use which resource, just only request operates the authority relevant with resource to these, but, the imperfection of a lot of exploitation documents own, or authority name relatively, cause and request the too much authority that can not use.Person not only can bring misunderstanding to user, and user is thrown doubt upon to the reliability of program and the confidentiality of individual privacy, and can be utilized by other rogue program due to the leak existed, and brings potential safety hazard.
Summary of the invention
For solving the problem existing for above-mentioned prior art, the present invention proposes a kind of portable set data processing method, comprising:
Application programs installation kit file decompresses, and obtains byte code files and Manifest file;
By API Calls all in traversal byte code files extraction procedure, analyze corresponding authority required in API;
The authority that Manifest file is asked is modified, deletes and asked but untapped authority;
Installation kit file will be reintegrated into byte code files through the amended Manifest file of authority.
Preferably, described by API Calls all in traversal byte code files extraction procedure, comprise further:
Extract to function call extraction, Intent extraction and ContentProvider the authority used in these three kinds of situations to extract respectively, the API authority contingency table produced in the byte code files obtained in installation kit decomposable process and API authority contingency table generative process as input, using the actual least privilege list used of application program as output;
Api function calls all function calls extracted and comprise in extraction procedure, and in API authority contingency table, search authority corresponding to institute's call function, the authority found is added in the list of rights of using of output;
Api function calls each instruction of extracting in each method comprising each class of traversal, and checks that present instruction is activation instruction, if so, then obtains the function lambda that activation instruction calls, and this function lambda comprises the title of function, parameter and affiliated class; Judge whether to have in API authority contingency table associating of function lambda and its authority, if had, then all authorities in authority contingency table corresponding to λ are joined in the list of the rights of using L of output, only can add once for same authority;
If do not have the authority of function lambda to associate in authority contingency table, then check whether function lambda likely inherits certain API in authority contingency table, extract the affiliated class α sum functions title β of function lambda respectively, the inheritance chain of backtracking class α, and to check in authority contingency table that the authority whether containing (α: β) associates, if do not have authority to associate, then continue backtracking α, if have permission association, then the permissions list be checked through in authority contingency table is joined in L;
Intent extracts the Action parameter comprised when extraction procedure sends Intent request, and in API authority contingency table, searches the authority corresponding to these Action parameters, adds in rights of using list;
ContentProvider extracts the schema comprising the URL request that extraction procedure sends, and the authority of searching in API authority contingency table corresponding to these schema, add in rights of using list, namely search in byte code files whether have corresponding character string.
Preferably, corresponding authority required in described analysis API, comprises further:
Manifest is extracted from installation kit to be measured, the authority that analysis application is applied for, then according to the detection option that applied for authority determination sensitive permission detects, detection option comprises the required private data type of detection and the border of required detection, carries out sensitive permission detection according to detection option for corresponding private data type and border;
System property is adopted to store detection option, when system initialization, distribute one piece of shared section key and carry out memory attribute, init finger daemon starts attribute service, system property is used for the global variable of the message exchange between register system setting or process, each attribute has a title and a respective value, and title and value are character string, and client is by attribute service amendment, establishment, the system property obtained in shared drive;
After startup completes, directly system property is set, read the value of Tag and Bound two system propertys, namely the detection option arranged, before interpolation sensitive permission, according to the detection option Tag value read, determine required private data type of adding sensitive permission, perform corresponding code, at Boundary Detection place, according to the detection option Bound value read, determine the outlet of required monitoring, perform corresponding code, compile source code generation system mirror image, the image file compiled out is loaded in simulator, then install in simulation system and run application program to be measured, the private data of application program is revealed behavior be automatically recorded in system journal, finally obtain system journal, analyze daily record and generate examining report.
The present invention compared to existing technology, has the following advantages:
The present invention proposes a kind of portable set data processing method, the authority of application programs carries out analyzing and retraining, and improves program security and reliability, and does not affect the true(-)running of program.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the portable set data processing method according to the embodiment of the present invention.
Embodiment
Detailed description to one or more embodiment of the present invention is hereafter provided together with the accompanying drawing of the diagram principle of the invention.Describe the present invention in conjunction with such embodiment, but the invention is not restricted to any embodiment.Scope of the present invention is only defined by the claims, and the present invention contain many substitute, amendment and equivalent.Set forth many details in the following description to provide thorough understanding of the present invention.These details are provided for exemplary purposes, and also can realize the present invention according to claims without some in these details or all details.
An aspect of of the present present invention provides a kind of portable set data processing method.Fig. 1 is the portable set data processing method process flow diagram according to the embodiment of the present invention.
Method of the present invention is by checking Android application program installation kit file, all API Calls in extraction procedure, analyze the corresponding authority needed for these API, the least privilege list that acquisition program uses, and carry out yojan by the permissions list that this list application programs is asked, delete those and asked but untapped authority.And can't have an impact to the true(-)running of most of program, can be applicable to carry out automatic analysis and yojan to a large amount of program, improve program security and reliability.
The present invention adopts static analysis, analyzes Android installation kit file and revises.The inventive method is made up of five parts, comprises the association of API authority, installation kit decomposition, API extraction, manifest yojan and installation kit and integrates.
In the association of API authority, read API authority associated data files, generate the contingency table of API and its authority, belong to the preliminary work of system.This module only needs to run once to all need installation kit file to be processed.
In the present invention, the result data using AndroidAPI authority corresponding is as API authority associated data source.Corresponding to three kinds of situations of scope check mechanism, this data source comprises api function and calls and its requested permissions corresponding data, IntentAction and its requested permissions corresponding data, ContentProviderURLschema and its requested permissions corresponding data.The inventive method can use other data as its API authority associated source equally, also by the incidence relation of User Defined API authority, can the present invention is not limited thereto.
Using the data structure storage API of Hash table and the incidence relation of its authority, because some API can corresponding multiple authority, so need the many Mapping data structure using the multiple value of single key correspondence, take API as key, with its requested permissions for being worth.The contingency table of this API and authority is used in API extracts, obtain the authority corresponding to API extracted.
Manifest is extracted, the authority that analysis application is applied for from installation kit to be measured.Then according to the detection option that applied for authority determination sensitive permission detects, detection option comprises the required private data type of detection and the border of required detection.Finally according to detection option, sensitive permission detection is carried out for corresponding private data type and border.
When system initialization, distribute one piece of shared section key and carry out memory attribute.Init finger daemon starts attribute service, and system property is used for register system and arranges or the global variable of message exchange between process.Each attribute has a title and a respective value, and title and value are character string.Client is by attribute service amendment, establishment, the system property obtained in shared drive.
System property is adopted to store detection option in the present invention.After Android has started, directly system property is set.Read the value of Tag and Bound two system propertys of Android, the detection option namely arranged.Before interpolation sensitive permission, according to the detection option Tag value read, determine required private data type of adding sensitive permission, perform corresponding code.At Boundary Detection place, according to the detection option Bound value read, determine the outlet of required monitoring, perform corresponding code.Compile source code generates android system mirror image, loads the image file compiled out in Android simulator.Then install in simulation system and run application program to be measured.The private data of this application program is revealed behavior and can is automatically recorded in system journal.Finally obtain system journal, analyze daily record and generate examining report.
The groundwork that installation kit decomposes decompresses to Android application program installation kit file, thus obtain byte code files and Manifest file.These two files are respectively used in the middle of API extraction and manifest yojan.API extraction step checks all API Calls by traversal byte code files.Manifest reduction steps is modified to the authority that Manifest file is asked by the permissions list of the actual use obtained in API extraction module, deletes those and has asked but untapped authority.Eventually synthesize by installation kit synthesis module the installation kit file that new lack of competence excessively asks through the Manifest file of yojan and original byte code files.
API leaching process is the core component of the inventive method.Its Main Function is from byte code files, extract all authorities used.The authority to using in these three kinds of situations is needed to extract respectively.Accordingly, API extracts and is divided into three modules, i.e. function call extraction module, Intent extraction module and ContentProvider extraction module.The API authority contingency table produced in the byte code files that these three modules all obtain in installation kit decomposable process and API authority contingency table generative process, as input, exports the least privilege list used for application program is actual.
Api function calls all function calls in extraction module extraction procedure, and in API authority contingency table, search authority corresponding to institute's call function, the authority found is added in the list of rights of using of output.
Api function calls extraction module and travels through each instruction in each method of each class, and checks that this instruction is activation instruction.If so, then obtain the function lambda called of activation instruction, λ comprises the title of this function, parameter and affiliated class.Judge whether to have in API authority contingency table associating of function lambda and its authority, if had, then all authorities in authority contingency table corresponding to λ are joined in the list of the rights of using L of output.In order to ensure that L is least privilege list, only can add once for same authority.
If do not have the authority of function lambda to associate in authority contingency table, then check whether λ likely inherits certain API in authority contingency table.Extract the affiliated class α sum functions title β of function lambda respectively, the inheritance chain of backtracking class α, and to check in authority contingency table that the authority whether containing (α: β) associates, if do not had, then continue backtracking α, if had, then the permissions list be checked through in authority contingency table is joined in L.Prevent because some applies the mode access system resources and failing to report of causing of being served by inheritance system.
Intent extraction module extraction procedure sends Action parameter during Intent request, and in API authority contingency table, search the authority corresponding to these Action parameters, adds in rights of using list.The schema of the URL request that ContentProvider extraction module extraction procedure sends, and in API authority contingency table, search the authority corresponding to these schema, add in rights of using list.Action parameter and URLschema are character string types, and therefore Intent and ContentProvider extraction module searches the mode of these two parameters is search in byte code files whether have corresponding character string.
After API extracts the permissions list obtaining the actual use of application program, the inventive method is also modified to the Manifest file requesting authority, and yojan is fallen asks but those authorities untapped, thus reaches least privilege.。
Installation kit integration step performs decomposes contrary operation with installation kit.Integrate through installation kit together with the byte code files obtained during Manifest file after yojan decomposes with installation kit and some other resource file of decompositing, reintegrate into installation kit file.Again the installation kit file synthesized is except its manifest file is except amendment, and other parts all not through amendment, therefore can not affect the original structure of application program, function and semanteme.The jar order in JDK is used to pack to manifest file, byte code files and other resource files.
In sum, the present invention proposes a kind of portable set data processing method, the authority of application programs carries out analyzing and retraining, and improves program security and reliability, and does not affect the true(-)running of program.
Obviously, it should be appreciated by those skilled in the art, above-mentioned of the present invention each module or each step can realize with general computing system, they can concentrate on single computing system, or be distributed on network that multiple computing system forms, alternatively, they can realize with the executable program code of computing system, thus, they can be stored and be performed by computing system within the storage system.Like this, the present invention is not restricted to any specific hardware and software combination.
Should be understood that, above-mentioned embodiment of the present invention only for exemplary illustration or explain principle of the present invention, and is not construed as limiting the invention.Therefore, any amendment made when without departing from the spirit and scope of the present invention, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.In addition, claims of the present invention be intended to contain fall into claims scope and border or this scope and border equivalents in whole change and modification.

Claims (3)

1. a portable set data processing method, is characterized in that, comprising:
Application programs installation kit file decompresses, and obtains byte code files and Manifest file;
By API Calls all in traversal byte code files extraction procedure, analyze corresponding authority required in API;
The authority that Manifest file is asked is modified, deletes and asked but untapped authority;
Installation kit file will be reintegrated into byte code files through the amended Manifest file of authority.
2. method according to claim 1, is characterized in that, described by API Calls all in traversal byte code files extraction procedure, comprises further:
Extract to function call extraction, Intent extraction and ContentProvider the authority used in these three kinds of situations to extract respectively, the API authority contingency table produced in the byte code files obtained in installation kit decomposable process and API authority contingency table generative process as input, using the actual least privilege list used of application program as output;
Api function calls all function calls extracted and comprise in extraction procedure, and in API authority contingency table, search authority corresponding to institute's call function, the authority found is added in the list of rights of using of output;
Api function calls each instruction of extracting in each method comprising each class of traversal, and checks that present instruction is activation instruction, if so, then obtains the function lambda that activation instruction calls, and this function lambda comprises the title of function, parameter and affiliated class; Judge whether to have in API authority contingency table associating of function lambda and its authority, if had, then all authorities in authority contingency table corresponding to λ are joined in the list of the rights of using L of output, only can add once for same authority;
If do not have the authority of function lambda to associate in authority contingency table, then check whether function lambda likely inherits certain API in authority contingency table, extract the affiliated class α sum functions title β of function lambda respectively, the inheritance chain of backtracking class α, and to check in authority contingency table that the authority whether containing (α: β) associates, if do not have authority to associate, then continue backtracking α, if have permission association, then the permissions list be checked through in authority contingency table is joined in L;
Intent extracts the Action parameter comprised when extraction procedure sends Intent request, and in API authority contingency table, searches the authority corresponding to these Action parameters, adds in rights of using list;
ContentProvider extracts the schema comprising the URL request that extraction procedure sends, and the authority of searching in API authority contingency table corresponding to these schema, add in rights of using list, namely search in byte code files whether have corresponding character string.
3. method according to claim 2, is characterized in that, corresponding authority required in described analysis API, comprises further:
Manifest is extracted from installation kit to be measured, the authority that analysis application is applied for, then according to the detection option that applied for authority determination sensitive permission detects, detection option comprises the required private data type of detection and the border of required detection, carries out sensitive permission detection according to detection option for corresponding private data type and border;
System property is adopted to store detection option, when system initialization, distribute one piece of shared section key and carry out memory attribute, init finger daemon starts attribute service, system property is used for the global variable of the message exchange between register system setting or process, each attribute has a title and a respective value, and title and value are character string, and client is by attribute service amendment, establishment, the system property obtained in shared drive;
After startup completes, directly system property is set, read the value of Tag and Bound two system propertys, namely the detection option arranged, before interpolation sensitive permission, according to the detection option Tag value read, determine required private data type of adding sensitive permission, perform corresponding code, at Boundary Detection place, according to the detection option Bound value read, determine the outlet of required monitoring, perform corresponding code, compile source code generation system mirror image, the image file compiled out is loaded in simulator, then install in simulation system and run application program to be measured, the private data of application program is revealed behavior be automatically recorded in system journal, finally obtain system journal, analyze daily record and generate examining report.
CN201510658131.3A 2015-10-13 2015-10-13 A kind of portable set data processing method Active CN105354485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510658131.3A CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510658131.3A CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Publications (2)

Publication Number Publication Date
CN105354485A true CN105354485A (en) 2016-02-24
CN105354485B CN105354485B (en) 2018-02-16

Family

ID=55330456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510658131.3A Active CN105354485B (en) 2015-10-13 2015-10-13 A kind of portable set data processing method

Country Status (1)

Country Link
CN (1) CN105354485B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096399A (en) * 2016-06-01 2016-11-09 努比亚技术有限公司 The detection device and method of application programming interface
CN107315950A (en) * 2017-05-03 2017-11-03 北京大学 Automation division methods and access control method that a kind of cloud computing platform administrator right is minimized
CN108763922A (en) * 2018-06-19 2018-11-06 北京金山安全软件有限公司 Authority detection method and device, electronic equipment and medium
CN109597620A (en) * 2018-08-08 2019-04-09 北京字节跳动网络技术有限公司 A kind of data processing method, device, equipment and storage medium
CN111327683A (en) * 2020-01-21 2020-06-23 奇安信科技集团股份有限公司 Encrypted information extraction method and device, computer equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
US20120096545A1 (en) * 2004-09-29 2012-04-19 Sysmex Coporation Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN104408366A (en) * 2014-11-26 2015-03-11 清华大学 Android application permission usage behavior tracking method based on plug-in technology
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096545A1 (en) * 2004-09-29 2012-04-19 Sysmex Coporation Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium
CN102289633A (en) * 2011-09-02 2011-12-21 广东欧珀移动通信有限公司 Method for managing dynamic permission of application program under Android platform
CN103761472A (en) * 2014-02-21 2014-04-30 北京奇虎科技有限公司 Application program accessing method and device based on intelligent terminal
CN104408366A (en) * 2014-11-26 2015-03-11 清华大学 Android application permission usage behavior tracking method based on plug-in technology
CN104462970A (en) * 2014-12-17 2015-03-25 中国科学院软件研究所 Android application program permission abuse detecting method based on process communication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096399A (en) * 2016-06-01 2016-11-09 努比亚技术有限公司 The detection device and method of application programming interface
CN107315950A (en) * 2017-05-03 2017-11-03 北京大学 Automation division methods and access control method that a kind of cloud computing platform administrator right is minimized
CN107315950B (en) * 2017-05-03 2020-10-09 北京大学 Automatic division method for minimizing authority of cloud computing platform administrator and access control method
CN108763922A (en) * 2018-06-19 2018-11-06 北京金山安全软件有限公司 Authority detection method and device, electronic equipment and medium
CN109597620A (en) * 2018-08-08 2019-04-09 北京字节跳动网络技术有限公司 A kind of data processing method, device, equipment and storage medium
CN109597620B (en) * 2018-08-08 2022-04-01 北京字节跳动网络技术有限公司 Data processing method, device, equipment and storage medium
CN111327683A (en) * 2020-01-21 2020-06-23 奇安信科技集团股份有限公司 Encrypted information extraction method and device, computer equipment and readable storage medium

Also Published As

Publication number Publication date
CN105354485B (en) 2018-02-16

Similar Documents

Publication Publication Date Title
CN105184152A (en) Mobile terminal data processing method
TWI575397B (en) Point-wise protection of application using runtime agent and dynamic security analysis
CN105956474A (en) Abnormal behavior detection system of Android platform software
CN105893848A (en) Precaution method for Android malicious application program based on code behavior similarity matching
CN105354485A (en) Data processing method for portable device
Arnatovich et al. A comparison of android reverse engineering tools via program behaviors validation based on intermediate languages transformation
Hemdan et al. An efficient digital forensic model for cybercrimes investigation in cloud computing
CN105204973A (en) Abnormal behavior monitoring and analysis system and method based on virtual machine technology under cloud platform
Cheng et al. EviHunter: Identifying digital evidence in the permanent storage of Android devices via static analysis
Fu et al. Data correlation‐based analysis methods for automatic memory forensic
Khademi et al. An empirical evaluation of web-based fingerprinting
Stirparo et al. In-memory credentials robbery on android phones
Seo et al. A study on memory dump analysis based on digital forensic tools
Wen et al. An empirical study of sdk credential misuse in ios apps
Vinayaga-Sureshkanth et al. An investigative study on the privacy implications of mobile e-scooter rental apps
Roy Choudhary Cross-platform testing and maintenance of web and mobile applications
CN103413093B (en) A kind of XEN cloud platform virtual machine partition method based on internal memory isolation
Noorulla Web browser private mode forensics analysis
Kumar et al. InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems
Leopard et al. Memory forensics and the Macintosh OS X operating system
Lathar et al. Stacy-static code analysis for enhanced vulnerability detection
Mathews et al. Analysis of virtual machine in digital forensics
Pieterse Evaluation and Identification of Authentic Smartphone Data
Moreb Detecting Privacy Leaks Utilizing Digital Forensics and Reverse Engineering Methodologies
Hou et al. Investigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190510

Address after: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee after: Sichuan Boiling Zhi Technology Co.,Ltd.

Address before: 610000 No. 704, 7th Floor, No. 1800, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee before: SICHUAN XIECHUANG INFORMATION TECHNOLOGY SERVICE Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220705

Address after: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee after: SHINE TECHNOLOGY Co.,Ltd.

Address before: 610000 Room 2101, 21/F, G5 Building 1858, Middle Section of Yizhou Avenue, Chengdu High-tech Zone, Sichuan Province

Patentee before: Sichuan Boiling Zhi Technology Co.,Ltd.

TR01 Transfer of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A data processing method for portable equipment

Effective date of registration: 20220713

Granted publication date: 20180216

Pledgee: Chengdu Tianfu New Area sub branch of Postal Savings Bank of China Ltd.

Pledgor: SHINE TECHNOLOGY Co.,Ltd.

Registration number: Y2022510000209

PE01 Entry into force of the registration of the contract for pledge of patent right