CN106713246A - Method and apparatus for detecting application program page hijacking, and mobile terminal - Google Patents

Method and apparatus for detecting application program page hijacking, and mobile terminal Download PDF

Info

Publication number
CN106713246A
CN106713246A CN201510790695.2A CN201510790695A CN106713246A CN 106713246 A CN106713246 A CN 106713246A CN 201510790695 A CN201510790695 A CN 201510790695A CN 106713246 A CN106713246 A CN 106713246A
Authority
CN
China
Prior art keywords
page
target pages
application program
information
pages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510790695.2A
Other languages
Chinese (zh)
Other versions
CN106713246B (en
Inventor
张二鹏
彭华熹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510790695.2A priority Critical patent/CN106713246B/en
Publication of CN106713246A publication Critical patent/CN106713246A/en
Application granted granted Critical
Publication of CN106713246B publication Critical patent/CN106713246B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Navigation (AREA)

Abstract

The invention provides a method and apparatus for detecting application program page hijacking, and a mobile terminal, and relates to the field of communication. The problems that a hijacked page cannot be effectively detected, the efficiency is relatively low and that the operation efficiency of an application program is affected in the prior art are solved. The method comprises the following steps: when a first application program operates, if a target page displayed at the most front end of the first application program is the same as or similar to the page in an activated state, extracting packet name information of the target page, wherein the page in the activated state is a page that is about to be displayed in the first application program; determining whether the target page is a hijacked page or a suspicious hijacked page according to the packet name information of the target page; if the target page is the suspicious hijacked page, extracting application feature information of the target page according to the packet name information of the target page; and determining whether the target page is the hijacked page according to the application feature information of the target page. The scheme of the invention effectively detects the hijacked page and improves the accuracy and the detection efficiency.

Description

Detection method, device and mobile terminal that a kind of application program page is kidnapped
Technical field
The present invention relates to the communications field, detection method, device that more particularly to a kind of application program page is kidnapped And mobile terminal.
Background technology
With intelligent mobile terminal explosive increase, intelligent mobile terminal is faced, and security issues become increasingly urgent, Such as Malware, harassing call, refuse messages, privacy are stolen, Pagejack is gone fishing, and are not only made vast The interests of user suffer a loss, while the business for having a strong impact on company is carried out and brand image.
With developing rapidly for mobile terminal internet, intelligent mobile terminal increases, evil on mobile terminal Meaning program code is threatened and also gradually increased.Current user by intelligent mobile terminal APP (Application, Application program) paid, transfer accounts it is more and more universal, but user using these APP when need to be input into account Number, the sensitive information such as password, when this allows for that rogue program is counterfeit to kidnap the APP interfaces that user uses, An interface for striking resemblances can be forged, the basic None- identified of domestic consumer is true and false.When user is forging boundary After face input account, password, user profile just can be uploaded to rogue program by rogue program with quiet Server, so as to steal the sensitive information such as account, password, identity information of user, or even can inveigle user Using the page of personation transfer accounts waiting and operate, cause the interests of user to be lost.
Currently for the detection method of intelligent mobile terminal APP Pagejacks, the main means for using are to sentence With the presence or absence of in the advance white and black list for building, foundation judges the disconnected characteristic information for extracting the page As a result, determine whether be held as a hostage in the APP pages.Such as, when target pages are displayed in screen foremost, Acquisition is currently at the characteristic information of the page of state foremost;According to acquired characteristic information, institute is judged Whether the page for stating the state foremost that is currently at meets default security feature;If it is not, then determining system There is Pagejack risk.
Such scheme can be on the premise of operating system mechanism not be changed, directly by extending system letter Several modes are realized, realized simple and convenient.But, the page and original APP of current rogue program personation The page it is basically identical, it might even be possible to the page of original APP is directly replicated, so as to cause rogue program Kidnap the page consistent with the feature of original APP pages, it is impossible to be identified by way of aspect ratio pair. Meanwhile, target pages feature needs to compare with all APP page features, and this is more for the page For large-scale application, the operational efficiency of APP can be directly affected, and Pagejack detection efficiency it is same compared with It is low.Also there is a problem of that blacklist storehouse complete or collected works cannot be built.
The content of the invention
The technical problem to be solved in the present invention is to provide detection method, the device that a kind of application program page is kidnapped And mobile terminal, solve prior art cannot effective detection kidnap the page, it is less efficient, and APP can be influenceed The problem of operational efficiency.
In order to solve the above technical problems, embodiments of the invention provide the detection that a kind of application program page is kidnapped Method, including:
When the first application program is run, if first application program be displayed in target pages foremost with The page being active is same page or similar pages, then extract the bag name information of the target pages, The page that is active is the page that will be shown in first application program;
Bag name information according to the target pages, determines whether the target pages are to kidnap the page or can Doubt and kidnap the page;
If the target pages are the suspicious abduction page, the bag name information extraction institute according to the target pages State the application characteristic information of target pages;
Application characteristic information according to the target pages, determines whether the target pages are to kidnap the page.
Wherein, the bag name information according to the target pages, determines whether the target pages are abduction The page or the suspicious abduction page, including:
The bag name information of the target pages is compared with the bag name information of first application program;
If the bag name information of the target pages is consistent with the bag name information of first application program, it is determined that The target pages are the suspicious abduction page, otherwise, it determines the target pages are the abduction page.
Wherein, the application characteristic information according to the target pages, determine the target pages whether be The page is kidnapped, including:
The application characteristic information of the target pages is entered with the application characteristic information of first application program Row is compared;
If the application characteristic information of the application characteristic information of the target pages and first application program is not Unanimously, it is determined that the target pages are to kidnap the page, otherwise, it determines the target pages are described first The original page of application program.
Wherein, the application feature letter of target pages described in the bag name information extraction according to the target pages Breath includes:
Bag name information according to the target pages reversely extracts the progress information and/or number of the target pages Word certificate.
Wherein, if first application program is displayed in target pages foremost and is active The page be same page or similar pages, then extract the target pages bag name information before, the inspection Survey method also includes:
Extract the page feature information of the target pages, and by the page feature information of the target pages with The page feature information of the page being active is compared, and the page feature information is included extremely A kind of few page feature;
If having at least one page feature with described in activation in the page feature information of the target pages The page feature of the page of state is consistent, it is determined that the target pages are with the page that is active Same page;
If having at least one page feature with described in activation in the page feature information of the target pages The page feature of the page of state is similar features, it is determined that the target pages are active with described The page is similar pages.
Wherein, the page feature information for extracting the target pages, and by the page of the target pages Before characteristic information is compared with the page feature information of the page being active, the detection Method also includes:
Extract the page feature information of all pages of the first application program and preserved, the page is special Reference breath includes one or more in bag name, layout, color, control title and the content of pages of the page.
Wherein, the page feature information for extracting the target pages, and by the page of the target pages Before characteristic information is compared with the page feature information of the page being active, the detection Method also includes:
The state of the page that will be shown in first application program is set to state of activation, it is described will The page of display is the page that first application program is being called or will be entered by returning to function The page.
In order to solve the above technical problems, embodiments of the invention also provide the inspection that a kind of application program page is kidnapped Device is surveyed, including:
First extraction module, for when the first application program is run, if first application program is displayed in Target pages foremost are same page or similar pages with the page being active, then extract described Target pages bag name information, the page being active be first application program in will show The page for showing;
First determining module, for the bag name information according to the target pages, determines that the target pages are No is the abduction page or the suspicious abduction page;
Second extraction module, if being the suspicious abduction page for the target pages, according to the page object The application characteristic information of target pages described in the bag name information extraction in face;
Second determining module, for the application characteristic information according to the target pages, determines the page object Whether face is to kidnap the page.
Wherein, first determining module includes:
First comparing unit, for by the bag of the bag name information of the target pages and first application program Name information is compared;
First determining unit, if the bag of bag name information and first application program for the target pages Name information is consistent, it is determined that the target pages are the suspicious abduction page, otherwise, it determines the target pages To kidnap the page.
Wherein, second determining module includes:
Second comparing unit, for by the application characteristic information of the target pages and first application program Application characteristic information compare;
Second determining unit, if for the application characteristic information and first application program of the target pages Application characteristic information it is inconsistent, it is determined that the target pages for kidnap the page, otherwise, it determines the mesh The mark page is the original page of the first application program.
Wherein, second extraction module includes:
First extraction unit, the target pages are reversely extracted for the bag name information according to the target pages Progress information and/or digital certificate.
Wherein, the detection means also includes:
3rd extraction module, the page feature information for extracting the target pages, and by the page object The page feature information in face is compared with the page feature information of the page being active, described Page feature information includes at least one page feature;
3rd determining module, if special for there is at least one page in the page feature information of the target pages Levy consistent with the page feature of the page being active, it is determined that the target pages and the place In the state of activation page be same page;
4th determining module, if special for there is at least one page in the page feature information of the target pages It is similar features to levy with the page feature of the page being active, it is determined that the target pages with The page that is active is for similar pages.
Wherein, the detection means also includes:
4th extraction module, the page feature information for extracting all pages of the first application program is gone forward side by side Row is preserved, and the page feature information is included in bag name, layout, color, control title and the page of the page One or more in appearance.
Wherein, the detection means also includes:
Setup module, for the state of the page that will be shown in first application program to be set into activation State, the page that will show is the page that first application program is being called or by returning to work( The page that will can enter.
In order to solve the above technical problems, embodiments of the invention also provide a kind of mobile terminal, including:As above The detection means that the described application program page is kidnapped.
Above-mentioned technical proposal has the beneficial effect that:
The detection method that the application program page of the embodiment of the present invention is kidnapped, runs in the first application program first When, if the first application program is displayed in target pages foremost and the page being active is same page Face or similar pages, then extract the bag name information of target pages, wherein the page being active is first The page that will be shown in application program;Then the bag name information according to target pages, determines that target pages are No is the abduction page or the suspicious abduction page;If target pages are the suspicious abduction page, according to target pages Registration information extraction target pages application characteristic information, and according to the application characteristic information of target pages, Determine whether target pages are to kidnap the page.The application characteristic information that the method passes through reversely extraction target pages, Can effectively realize kidnapping target pages the detection of situation, improve the accuracy and detection efficiency of detection, solve Prior art of having determined cannot effective detection kidnap the page, it is less efficient, and APP operational efficiency can be influenceed Problem.
Brief description of the drawings
Fig. 1 is the detection method flow chart that the application program page of the present invention is kidnapped;
Fig. 2 is the flow chart of the specific embodiment of detection method one that the application program page of the present invention is kidnapped;
Fig. 3 is the structural representation of the detection means that the application program page of the present invention is kidnapped.
Specific embodiment
To make the technical problem to be solved in the present invention, technical scheme and advantage clearer, below in conjunction with attached Figure and specific embodiment are described in detail.
As shown in figure 1, the detection method that a kind of application program page of the embodiment of the present invention is kidnapped, including:
Step 101, when the first application program is run, if first application program is displayed in foremost Target pages are same page or similar pages with the page being active, then extract the target pages Bag name information, the page that is active is the page that will be shown in first application program.
Here, if it is same page or phase to be displayed in target pages foremost and the page being active Like the page, then the target pages are likely to be the page being held as a hostage, it is necessary to pass through following step to target pages Further detected.
Step 102, the bag name information according to the target pages, determines whether the target pages are abduction The page or the suspicious abduction page.
Step 103, if the target pages are the suspicious abduction page, the bag name according to the target pages The application characteristic information of target pages described in information extraction.
Step 104, the application characteristic information according to the target pages, determine the target pages whether be Kidnap the page.
Here, by reversely extracting the application characteristic information of target pages, effectively target pages can be determined whether To kidnap the page.
The detection method that the application program page of the embodiment of the present invention is kidnapped, runs in the first application program first When, if the first application program is displayed in target pages foremost and the page being active is same page Face or similar pages, then extract the bag name information of target pages, wherein the page being active is first The page that will be shown in application program;Then the bag name information according to target pages, determines that target pages are No is the abduction page or the suspicious abduction page;If target pages are the suspicious abduction page, according to target pages Registration information extraction target pages application characteristic information, and according to the application characteristic information of target pages, Determine whether target pages are to kidnap the page.The application characteristic information that the method passes through reversely extraction target pages, Can effectively realize kidnapping target pages the detection of situation, improve the accuracy and detection efficiency of detection, solve Prior art of having determined cannot effective detection kidnap the page, it is less efficient, and APP operational efficiency can be influenceed Problem.
Preferably, the step of above-mentioned steps 102 can include:
Step 1021, by the bag name information of the bag name information of the target pages and first application program Compare;
Step 1022, if the bag name information of the bag name information of the target pages and first application program Unanimously, it is determined that the target pages are the suspicious abduction page, otherwise, it determines the target pages are abduction The page.
Here, the bag name information of all pages of the first application program should be with the first application program of current operation Bag name it is consistent, if the bag name information of target pages is inconsistent with the bag information of the first application program, can Determine that the target pages are the abduction page forged;If the bag name information of target pages and the first application program Bag name information is consistent, it is likely that be that target pages replicate the original page of the first application program completely, therefore Determine target pages for it is suspicious abduction the page, it is necessary to further be detected to target pages.
Now, compare with the bag name information of the first application program by by the bag name information of target pages, Can further detect whether target pages are to kidnap the page, it is ensured that the accuracy and validity of detection, improve Detection efficiency.
Preferably, the step of above-mentioned steps 104 can include:
Step 1041, by the application of the application characteristic information of the target pages and first application program Characteristic information is compared;
Step 1042, if the application of the application characteristic information of the target pages and first application program Characteristic information is inconsistent, it is determined that the target pages are the abduction page, otherwise, it determines the target pages It is the original page of the first application program.
Here, the application characteristic information of all pages of the first application program should also be answered with the first of current operation Application characteristic information with program is consistent, if the application characteristic information of target pages differs with the first application program Cause, then can determine that target pages to kidnap the page;If the application characteristic information of target pages and first applies journey Sequence is consistent, because kidnapping the page can not completely replicate the application characteristic information of the page, therefore can determine that page object Face is the original page of the first application program.
Now, it is consistent in the bag name information of target pages and the bag name information of the first application program, determine target When the page is for the suspicious abduction page, by answering the application characteristic information of target pages and the first application program Further compared with characteristic information, can effective detection target pages whether be kidnap the page, it is ensured that inspection The accuracy and validity of survey, improve detection efficiency.
Specifically, the step of above-mentioned steps 103 can include:
Bag name information according to the target pages reversely extracts the progress information and/or number of the target pages Word certificate.
Now, the progress information and/or number of target pages can be reversely extracted according to the bag name information of target pages Word certificate, so as to be carried out by by the progress information and/or digital certificate of target pages and the first application program Compare, can effectively determine whether target pages are to kidnap the page, improve the accuracy of detection.
Wherein, in Android Android device, its APK store path is in/data/app ,/system/app Read right is each provided with to arbitrary user with/tri- files of system/priv-app, it is not necessary to System Privileges Just can read application related information.
Certain APK in/data/app, the process letter of/system/app and/tri- files of system/priv-app Breath is as follows:
ls-al/data/app
-rw-r--r--system system 7376902 1970-01-13 14:07 NewsArticle-3.6.apk
-rw-r--r--system system 10317590 1970-01-13 14:07 cleanmaster.apk
-rw-r--r--system system 13857237 2015-04-30 14:07 com.ali.money.shield-
2.apk
ls-al/system/app
-rw-r--r--root root 18938 2015-04-23 09:56 AntHalService.apk
-rw-r--r--root root 585808 2015-04-23 09:56 Antispam.apk
-rw-r--r--root root 16361 2015-04-23 09:56 ApplicationsProvider.apk
ls-al/system/priv-app
-rw-r--r--root root 1473168 2015-04-23 09:56 AuthManager.apk
-rw-r--r--root root 428407 2015-04-23 09:56 Backup.apk
-rw-r--r--root root 15674 2015-04-23 09:56 BackupRestoreConfirmation.apk
Now, the progress information of the APK can be directly read in three files.
Certainly, the system equipment of read right is not provided for other, application is read again after System Privileges can be obtained Relevant information.
Preferably, before above-mentioned steps 101, the detection method can also include:
Step 1001, extracts the page feature information of the target pages, and by the page of the target pages Region feature information is compared with the page feature information of the page being active, and the page is special Reference breath includes at least one page feature;
Step 1002, if having at least one page feature and institute in the page feature information of the target pages The page feature for stating the page being active is consistent, it is determined that the target pages are with described in activation Status page is same page;
Step 1003, if having at least one page feature and institute in the page feature information of the target pages The page feature for stating the page being active is similar features, it is determined that the target pages and the place In the state of activation page be similar pages.
Now, carried out with the page feature being active by obtaining the page feature information of target pages Compare, can effective detection current page whether with the page being active be same page or similar pages, It is probably to mesh when kidnapping the page with target pages so as to judge whether target pages are probably the abduction page The mark page is further detected.Wherein, it is same page in target pages and the page being active Or during similar pages, target pages are likely to be the page being held as a hostage.
Further, the page feature information of the page, before above-mentioned steps 1001, institute are extracted for convenience Stating detection method can also include:
Step 1004, extracts the page feature information of all pages of the first application program and is preserved, In bag name of the page feature information including the page, layout, color, control title and content of pages one Plant or several.
Now, by extracting the page feature information of all pages of the first application program in advance and being preserved, Subsequent step is facilitated to the extraction of page feature information and is called, so as to optimize processing mode, improve Treatment effeciency.
Specifically, the page feature information of extraction can be preserved in the way of following form, feature is formed Storehouse, extracts and calls to facilitate:
The page Page feature information
The page 1 Feature 1, feature 2, feature 3 ...
The page 2 Feature 1, feature 2, feature 3 ...
The page 3 Feature 1, feature 2, feature 3 ...
The page 4 Feature 1, feature 2, feature 3 ...
.... ....
Preferably, before above-mentioned steps 1001, the detection method can also include:
Step 1005, the state of the page that will be shown in first application program is set to activate shape State, the page that will show is the page that first application program is being called or by returning to function The page that will enter.
Here, the page that the first application program can called or by returning to the page that function will enter State of activation is set to, other page setups are frozen state, convenient to distinguish and the state of activation page is carried Take.For example, the invoking page 2 of the page 1, the page 2 is to be displayed on foremost, now sets the page 2 State is state of activation, and the state of other pages is frozen state.
Now, by setting the page status that will be shown in advance for state of activation, facilitate follow-up to activation The extraction of status page and call, so as to further optimize processing mode, improve treatment effeciency.
Embodiment is implemented to of the invention one below to be illustrated below:
As shown in Fig. 2 the detection method that the application program page of the embodiment of the present invention is kidnapped, including:
Step 201, extracts the page feature information of all pages of the first application program and is preserved, and is formed Feature database.
Here, the page feature information of extraction includes bag name, layout, color, control title and the page of the page Face content etc..
Step 202, is set to state of activation, i.e., by the state of the page that will be shown in the first application program The page of display is referred to that the first application program is being called or by returning to the page that function will enter.
Step 203, in the first application program operation phase, extracts each and is displayed in page object foremost The page feature information in face, the page feature information with the page being active is compared.
Step 204, whether the comparison result for judging above-mentioned steps 203 is target pages and be active The page be same page or similar pages.
Step 205, if the judged result of above-mentioned steps 204 is yes, extracts the application bag name of target pages Information, and jump to step 207.
Here, if having at least one page feature in the page feature information of target pages and being active The page it is consistent or similar, it is determined that target pages to be active the page for same page or similar page Face.
Step 206, if the judged result of above-mentioned steps 204 is no, it is determined that target pages are the first application The original page of program, does not find Pagejack, detection of end.
Step 207, the application bag name information of target pages is compared with the bag name information of the first application program It is right.
Step 208, judge above-mentioned steps 207 comparison result whether be target pages application bag name information Bag name information with the first application program is consistent.
Step 209, if the judged result of above-mentioned steps 208 is yes, it is determined that target pages are suspicious abduction The page, and jump to step 211.
Step 210, if the judged result of above-mentioned steps 208 is no, it is determined that target pages are the abduction page, Detection of end.
Step 211, the bag name information according to target pages reversely extracts the application characteristic information of target pages, And the application characteristic information of target pages is compared with the application characteristic information of the first application program.
Here, progress information, digital certificate etc. are included using characteristic information.
Step 212, judge above-mentioned steps 211 comparison result whether be target pages application characteristic information It is consistent with the first application program.
Step 213, if the judged result of above-mentioned steps 212 is no, it is determined that target pages are the abduction page, Detection of end.
Step 214, if the judged result of above-mentioned steps 212 is yes, it is determined that target pages are the first application The original page of program, does not find Pagejack, detection of end.
The detection method that the application program page of the embodiment of the present invention is kidnapped, by reversely extracting target pages Using characteristic information, can effectively realize kidnapping target pages the detection of situation, improve the accuracy of detection And detection efficiency, solve prior art cannot effective detection kidnap the page, it is less efficient, and can influence The problem of APP operational efficiency.
As shown in figure 3, embodiments of the invention also provide the detection means that a kind of application program page is kidnapped, Including:
First extraction module, for when the first application program is run, if first application program is displayed in Target pages foremost are same page or similar pages with the page being active, then extract described Target pages bag name information, the page being active be first application program in will show The page for showing;
First determining module, for the bag name information according to the target pages, determines that the target pages are No is the abduction page or the suspicious abduction page;
Second extraction module, if being the suspicious abduction page for the target pages, according to the page object The application characteristic information of target pages described in the bag name information extraction in face;
Second determining module, for the application characteristic information according to the target pages, determines the page object Whether face is to kidnap the page.
The detection means that the application program page of the embodiment of the present invention is kidnapped, by reversely extracting target pages Using characteristic information, can effectively realize kidnapping target pages the detection of situation, improve the accuracy of detection And detection efficiency, solve prior art cannot effective detection kidnap the page, it is less efficient, and can influence The problem of APP operational efficiency.
Preferably, first determining module can include:
First comparing unit, for by the bag of the bag name information of the target pages and first application program Name information is compared;
First determining unit, if the bag of bag name information and first application program for the target pages Name information is consistent, it is determined that the target pages are the suspicious abduction page, otherwise, it determines the target pages To kidnap the page.
Preferably, second determining module can include:
Second comparing unit, for by the application characteristic information of the target pages and first application program Application characteristic information compare;
Second determining unit, if for the application characteristic information and first application program of the target pages Application characteristic information it is inconsistent, it is determined that the target pages for kidnap the page, otherwise, it determines the mesh The mark page is the original page of the first application program.
Preferably, second extraction module can include:
First extraction unit, the target pages are reversely extracted for the bag name information according to the target pages Progress information and/or digital certificate.
Further, the detection means can also include:
3rd extraction module, the page feature information for extracting the target pages, and by the page object The page feature information in face is compared with the page feature information of the page being active, described Page feature information includes at least one page feature;
3rd determining module, if special for there is at least one page in the page feature information of the target pages Levy consistent with the page feature of the page being active, it is determined that the target pages and the place In the state of activation page be same page;
4th determining module, if special for there is at least one page in the page feature information of the target pages It is similar features to levy with the page feature of the page being active, it is determined that the target pages with The page that is active is for similar pages.
Further, the detection means can also include:
4th extraction module, the page feature information for extracting all pages of the first application program is gone forward side by side Row is preserved, and the page feature information is included in bag name, layout, color, control title and the page of the page One or more in appearance.
Further, the detection means can also include:
Setup module, for the state of the page that will be shown in first application program to be set into activation State, the page that will show is the page that first application program is being called or by returning to work( The page that will can enter.
The detection means that the application program page of the embodiment of the present invention is kidnapped, by reversely extracting target pages Using characteristic information, can effectively realize kidnapping target pages the detection of situation, improve the accuracy of detection And detection efficiency, solve prior art cannot effective detection kidnap the page, it is less efficient, and can influence The problem of APP operational efficiency.
It should be noted that the detection means that the application program page is kidnapped is to realize that electronic equipment is determined with above-mentioned The corresponding device of method of position, all implementations are applied to the device wherein in above method embodiment Embodiment in, can also reach same technique effect.
Because the detection means that the application program page of the embodiment of the present invention is kidnapped is applied to mobile terminal, therefore, The embodiment of the present invention additionally provides a kind of mobile terminal, including:Application program as described in above-mentioned embodiment The detection means of Pagejack.Wherein, the realization reality of the detection means that the above-mentioned application program page is kidnapped Example is applied suitable for the embodiment of the mobile terminal, identical technique effect can be also reached.Shifting of the invention Dynamic terminal such as can be mobile phone, panel computer mobile electronic device.
The above is the preferred embodiment of the present invention, it is noted that for the common skill of the art For art personnel, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, These improvements and modifications also should be regarded as protection scope of the present invention.

Claims (15)

1. the detection method that a kind of application program page is kidnapped, it is characterised in that including:
When the first application program is run, if first application program be displayed in target pages foremost with The page being active is same page or similar pages, then extract the bag name information of the target pages, The page that is active is the page that will be shown in first application program;
Bag name information according to the target pages, determines whether the target pages are to kidnap the page or can Doubt and kidnap the page;
If the target pages are the suspicious abduction page, the bag name information extraction institute according to the target pages State the application characteristic information of target pages;
Application characteristic information according to the target pages, determines whether the target pages are to kidnap the page.
2. detection method according to claim 1, it is characterised in that described according to the page object The bag name information in face, determines whether the target pages are to kidnap the page or the suspicious abduction page, including:
The bag name information of the target pages is compared with the bag name information of first application program;
If the bag name information of the target pages is consistent with the bag name information of first application program, it is determined that The target pages are the suspicious abduction page, otherwise, it determines the target pages are the abduction page.
3. detection method according to claim 1, it is characterised in that described according to the page object The application characteristic information in face, determines whether the target pages are to kidnap the page, including:
The application characteristic information of the target pages is entered with the application characteristic information of first application program Row is compared;
If the application characteristic information of the application characteristic information of the target pages and first application program is not Unanimously, it is determined that the target pages are to kidnap the page, otherwise, it determines the target pages are described first The original page of application program.
4. detection method according to claim 1, it is characterised in that described according to the page object The application characteristic information of target pages includes described in the bag name information extraction in face:
Bag name information according to the target pages reversely extracts the progress information and/or number of the target pages Word certificate.
5. detection method according to claim 1, it is characterised in that if first application Program display is same page or similar pages in target pages foremost and the page being active, Before then extracting the bag name information of the target pages, the detection method also includes:
Extract the page feature information of the target pages, and by the page feature information of the target pages with The page feature information of the page being active is compared, and the page feature information is included extremely A kind of few page feature;
If having at least one page feature with described in activation in the page feature information of the target pages The page feature of the page of state is consistent, it is determined that the target pages are with the page that is active Same page;
If having at least one page feature with described in activation in the page feature information of the target pages The page feature of the page of state is similar features, it is determined that the target pages are active with described The page is similar pages.
6. detection method according to claim 5, it is characterised in that the extraction page object The page feature information in face, and the page feature information of the target pages is active with described Before the page feature information of the page is compared, the detection method also includes:
Extract the page feature information of all pages of the first application program and preserved, the page is special Reference breath includes one or more in bag name, layout, color, control title and the content of pages of the page.
7. detection method according to claim 5, it is characterised in that the extraction page object The page feature information in face, and the page feature information of the target pages is active with described Before the page feature information of the page is compared, the detection method also includes:
The state of the page that will be shown in first application program is set to state of activation, it is described will The page of display is the page that first application program is being called or will be entered by returning to function The page.
8. the detection means that a kind of application program page is kidnapped, it is characterised in that including:
First extraction module, for when the first application program is run, if first application program is displayed in Target pages foremost are same page or similar pages with the page being active, then extract described Target pages bag name information, the page being active be first application program in will show The page for showing;
First determining module, for the bag name information according to the target pages, determines that the target pages are No is the abduction page or the suspicious abduction page;
Second extraction module, if being the suspicious abduction page for the target pages, according to the page object The application characteristic information of target pages described in the bag name information extraction in face;
Second determining module, for the application characteristic information according to the target pages, determines the page object Whether face is to kidnap the page.
9. detection means according to claim 8, it is characterised in that the first determining module bag Include:
First comparing unit, for by the bag of the bag name information of the target pages and first application program Name information is compared;
First determining unit, if the bag of bag name information and first application program for the target pages Name information is consistent, it is determined that the target pages are the suspicious abduction page, otherwise, it determines the target pages To kidnap the page.
10. detection means according to claim 8, it is characterised in that the second determining module bag Include:
Second comparing unit, for by the application characteristic information of the target pages and first application program Application characteristic information compare;
Second determining unit, if for the application characteristic information and first application program of the target pages Application characteristic information it is inconsistent, it is determined that the target pages for kidnap the page, otherwise, it determines the mesh The mark page is the original page of the first application program.
11. detection means according to claim 8, it is characterised in that the second extraction module bag Include:
First extraction unit, the target pages are reversely extracted for the bag name information according to the target pages Progress information and/or digital certificate.
12. detection means according to claim 8, it is characterised in that the detection means also includes:
3rd extraction module, the page feature information for extracting the target pages, and by the page object The page feature information in face is compared with the page feature information of the page being active, described Page feature information includes at least one page feature;
3rd determining module, if special for there is at least one page in the page feature information of the target pages Levy consistent with the page feature of the page being active, it is determined that the target pages and the place In the state of activation page be same page;
4th determining module, if special for there is at least one page in the page feature information of the target pages It is similar features to levy with the page feature of the page being active, it is determined that the target pages with The page that is active is for similar pages.
13. detection means according to claim 12, it is characterised in that the detection means is also wrapped Include:
4th extraction module, the page feature information for extracting all pages of the first application program is gone forward side by side Row is preserved, and the page feature information is included in bag name, layout, color, control title and the page of the page One or more in appearance.
14. detection means according to claim 12, it is characterised in that the detection means is also wrapped Include:
Setup module, for the state of the page that will be shown in first application program to be set into activation State, the page that will show is the page that first application program is being called or by returning to work( The page that will can enter.
A kind of 15. mobile terminals, it is characterised in that including:As described in claim any one of 8-14 The detection means that the application program page is kidnapped.
CN201510790695.2A 2015-11-17 2015-11-17 A kind of detection method, device and mobile terminal that the application program page is kidnapped Active CN106713246B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510790695.2A CN106713246B (en) 2015-11-17 2015-11-17 A kind of detection method, device and mobile terminal that the application program page is kidnapped

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510790695.2A CN106713246B (en) 2015-11-17 2015-11-17 A kind of detection method, device and mobile terminal that the application program page is kidnapped

Publications (2)

Publication Number Publication Date
CN106713246A true CN106713246A (en) 2017-05-24
CN106713246B CN106713246B (en) 2019-08-13

Family

ID=58933326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510790695.2A Active CN106713246B (en) 2015-11-17 2015-11-17 A kind of detection method, device and mobile terminal that the application program page is kidnapped

Country Status (1)

Country Link
CN (1) CN106713246B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992745A (en) * 2017-11-29 2018-05-04 暨南大学 Kidnap countermeasure in a kind of interface based on Android platform
CN108108618A (en) * 2017-12-28 2018-06-01 中国信息通信研究院 The application interface detection method and device of forgery attack
CN108234469A (en) * 2017-12-28 2018-06-29 江苏通付盾信息安全技术有限公司 Mobile terminal application safety protecting method, apparatus and system
CN109543407A (en) * 2018-10-19 2019-03-29 北京奇虎科技有限公司 A kind of hold-up interception method and device that Activity is kidnapped

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082792A (en) * 2010-12-31 2011-06-01 成都市华为赛门铁克科技有限公司 Phishing webpage detection method and device
CN102737183A (en) * 2012-06-12 2012-10-17 腾讯科技(深圳)有限公司 Method and device for webpage safety access
CN103780659A (en) * 2012-10-25 2014-05-07 中国电信股份有限公司 Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102082792A (en) * 2010-12-31 2011-06-01 成都市华为赛门铁克科技有限公司 Phishing webpage detection method and device
CN102737183A (en) * 2012-06-12 2012-10-17 腾讯科技(深圳)有限公司 Method and device for webpage safety access
CN103780659A (en) * 2012-10-25 2014-05-07 中国电信股份有限公司 Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992745A (en) * 2017-11-29 2018-05-04 暨南大学 Kidnap countermeasure in a kind of interface based on Android platform
CN108108618A (en) * 2017-12-28 2018-06-01 中国信息通信研究院 The application interface detection method and device of forgery attack
CN108234469A (en) * 2017-12-28 2018-06-29 江苏通付盾信息安全技术有限公司 Mobile terminal application safety protecting method, apparatus and system
CN108108618B (en) * 2017-12-28 2021-05-25 中国信息通信研究院 Application interface detection method and device for counterfeiting attack
CN109543407A (en) * 2018-10-19 2019-03-29 北京奇虎科技有限公司 A kind of hold-up interception method and device that Activity is kidnapped
CN109543407B (en) * 2018-10-19 2024-04-05 三六零科技集团有限公司 Activity hijacking interception method and device

Also Published As

Publication number Publication date
CN106713246B (en) 2019-08-13

Similar Documents

Publication Publication Date Title
EP3165019B1 (en) Method and apparatus of notifying of smishing
CN103886025B (en) The display methods and device of picture in webpage
CN104966053A (en) Face recognition method and recognition system
CN106713246A (en) Method and apparatus for detecting application program page hijacking, and mobile terminal
CN111866270B (en) Application program control method and device and electronic equipment
US9124623B1 (en) Systems and methods for detecting scam campaigns
CN102981902A (en) Intelligent mobile terminal and screen protection method based on same
CN104572650A (en) Method and device for realizing browser intelligent reading and terminal comprising device
WO2014131306A1 (en) Method and system for detecting network link
CN104751086A (en) Terminal anti-theft method
EP3176719A1 (en) Methods and devices for acquiring certification document
CN105975554B (en) Big data searching method and device based on mobile terminal
CN102521569A (en) Method and system for identifying identity card by using smart phone and mobile phone
CN105391860A (en) Method and apparatus for processing communication request
CN106789973B (en) Page security detection method and terminal equipment
CN105376636B (en) Fill in method, householder method, smart television and the intelligent mobile terminal of identifying code
CN116707965A (en) Threat detection method and device, storage medium and electronic equipment
CN107992745A (en) Kidnap countermeasure in a kind of interface based on Android platform
WO2019217462A1 (en) System and method for detecting a malicious file using image analysis prior to execution of the file
CN103475673A (en) Phishing website recognizing method and device and client side
CN106709337A (en) Malicious bundled software processing method and apparatus
CN112307464A (en) Fraud identification method and device and electronic equipment
CN105847012A (en) Method for inputting verification information
CN111859356B (en) Application program login method and device
CN104751087A (en) Terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant