CN110287087B - Method and device for detecting application - Google Patents

Method and device for detecting application Download PDF

Info

Publication number
CN110287087B
CN110287087B CN201810223858.2A CN201810223858A CN110287087B CN 110287087 B CN110287087 B CN 110287087B CN 201810223858 A CN201810223858 A CN 201810223858A CN 110287087 B CN110287087 B CN 110287087B
Authority
CN
China
Prior art keywords
application
detected
information
determining
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810223858.2A
Other languages
Chinese (zh)
Other versions
CN110287087A (en
Inventor
荆博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810223858.2A priority Critical patent/CN110287087B/en
Publication of CN110287087A publication Critical patent/CN110287087A/en
Application granted granted Critical
Publication of CN110287087B publication Critical patent/CN110287087B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application discloses a method and a device for detecting an application. One embodiment of the method comprises the following steps: receiving an application file of an application to be detected; obtaining an application identifier of the application to be detected based on the application file; determining whether a preset first application information set comprises application information of a target application with an application identifier identical to that of the application to be detected, wherein the first application information set is used for storing locally received application information of the application; in response to determining that the first application information set includes application information of a target application having an application identifier identical to the application identifier of the application to be detected, determining whether a developer of the application to be detected is identical to a developer of the target application. The embodiment realizes the detection of whether the application to be detected is infringed or not.

Description

Method and device for detecting application
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of Internet, and particularly relates to a method and a device for detecting application.
Background
With the rise of the mobile internet and the rapid popularization of electronic devices such as smart phones and tablet computers, application distribution is becoming particularly important. Corresponding to the application distribution is an application open platform, and after the application open platform submits the application to be recorded, the application can be distributed to an application distribution channel for the user to download and install. However, due to the existence of the packing party (particularly, after unpacking an application, replacing part of resource files, such as adding an advertisement, malicious fee absorption and other plug-ins, and then repackaging to generate new applications, and disguising as part of malicious developers of the original application) and the disguising party (directly taking other applications as own and submitting the application open platform as malicious developers for illegally obtaining benefits), the problem of how to identify the original application and the original developer is brought to the application open platform. Furthermore, since the applications are updated very frequently, it is also important how to determine whether the application submitted by the developer is the latest version.
Disclosure of Invention
The embodiment of the application provides a method and a device for detecting an application.
In a first aspect, embodiments of the present application provide a method for detecting an application, including: receiving an application file of an application to be detected; obtaining an application identifier of the application to be detected based on the application file; determining whether a preset first application information set comprises application information of a target application with an application identifier identical to that of the application to be detected, wherein the first application information set is used for storing locally received application information of the application; in response to determining that the first application information set includes application information of a target application having an application identifier identical to the application identifier of the application to be detected, determining whether a developer of the application to be detected is identical to a developer of the target application.
In some embodiments, the above method further comprises; detecting whether the version of the application to be detected is up-to-date in response to determining that the developer of the application to be detected is the same as the developer of the target application; and in response to determining that the developer of the application to be detected is different from the developer of the target application, sending first prompt information to the client, wherein the first prompt information is used for prompting that the target application, which is the same as the application identifier of the application to be detected, of a user has been uploaded by other developers, and the application to be detected is uploaded by the user through the client.
In some embodiments, the detecting whether the version of the application to be detected is up to date includes: obtaining a first latest version number corresponding to the application identifier of the application to be detected from the first application information set according to the application identifier of the application to be detected; determining whether the version of the application to be detected is newer than the version corresponding to the first latest version number according to the version number of the application to be detected and the first latest version number; in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user that the application newer than the version of the application to be detected or the same as the version of the application to be detected has been uploaded; in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, obtaining a second latest version number corresponding to the application identifier of the application to be detected from a preset second application information set according to the application identifier of the application to be detected, where the second application information set is used for storing application information of the application acquired from a third-party website, and executing the following detection operations: detecting whether the version of the application to be detected is older than the version corresponding to the second latest version number; determining the application to be detected as a valid application in response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number; and sending third prompt information to the client in response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, wherein the third prompt information is used for prompting the user that the third-party website has an application newer than the version of the application to be detected.
In some embodiments, the above method further comprises; and in response to determining that the application to be detected is a valid application, storing application information of the application to be detected and a user identifier of the user in association with the first application information set.
In some embodiments, the obtaining, based on the application file, an application identifier of the application to be detected includes: determining whether the first application information set comprises standby application information or not based on the application files of the application to be detected, wherein the application files of the application corresponding to the standby application information are matched with the application files of the application to be detected, and the application information in the first application information set comprises an application identifier; in response to determining that the standby application information exists in the first application information set, taking an application identifier of the standby application information as an application identifier of the application to be detected; and in response to determining that the standby application information does not exist in the first application information set, analyzing the application file of the application to be detected to obtain an application identifier of the application to be detected.
In some embodiments, the determining, based on the application file of the application to be detected, whether the first application information set includes standby application information includes: generating a download link according to the application file of the application to be detected, wherein the download link comprises a uniform resource locator and a time stamp, and the time stamp is generated based on the time of receiving the application file of the application to be detected; matching the download link with the download link of the application included in the application information in the first application information set, wherein the application information in the first application information set includes the download link of the application; and in response to determining that the download link is matched with the download link of the application included in the application information in the first application information set, determining that the matched application information is standby application information.
In some embodiments, the determining, based on the application file of the application to be detected, whether the first application information set includes standby application information includes: calculating a hash value of the application file of the application to be detected; matching the hash value with the hash value of the application file of the application corresponding to the application information in the first application information set; and in response to determining that the hash value is matched with the hash value of the application file of the application corresponding to the application information in the first application information set, determining that the application information corresponding to the application file with the matched hash value is standby application information.
In some embodiments, the determining whether the developer of the application to be detected is the same as the developer of the target application includes: and determining whether the developer of the application to be detected is the same as the developer of the target application according to the user identifier of the user uploading the application file of the application to be detected and the user identifier of the user uploading the target application, wherein the user identifier of the user is generated based on registration information sent by the user.
In a second aspect, embodiments of the present application provide an apparatus for detecting an application, including: the receiving unit is used for receiving application files of the application to be detected; an obtaining unit, configured to obtain an application identifier of the application to be detected based on the application file; a first determining unit, configured to determine whether a preset first application information set includes application information of a target application having an application identifier that is the same as an application identifier of the application to be detected, where the first application information set is used to store application information of a locally received application; and a second determining unit, configured to determine whether a developer of the application to be detected is the same as a developer of the target application in response to determining that the first application information set includes application information of the target application whose application identifier is the same as that of the application to be detected.
In some embodiments, the apparatus further comprises: a detection unit, configured to detect whether a version of the application to be detected is up to date in response to determining that a developer of the application to be detected is the same as a developer of the target application; and the sending unit is used for sending first prompt information to the client in response to the fact that the developer of the application to be detected is different from the developer of the target application, wherein the first prompt information is used for prompting that the target application with the same application identifier as the application to be detected is uploaded by other developers, and the application to be detected is uploaded by the user through the client.
In some embodiments, the detection unit is further configured to: obtaining a first latest version number corresponding to the application identifier of the application to be detected from the first application information set according to the application identifier of the application to be detected; determining whether the version of the application to be detected is newer than the version corresponding to the first latest version number according to the version number of the application to be detected and the first latest version number; in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user that the application newer than the version of the application to be detected or the same as the version of the application to be detected has been uploaded; in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, obtaining a second latest version number corresponding to the application identifier of the application to be detected from a preset second application information set according to the application identifier of the application to be detected, where the second application information set is used for storing application information of the application acquired from a third-party website, and executing the following detection operations: detecting whether the version of the application to be detected is older than the version corresponding to the second latest version number; determining the application to be detected as a valid application in response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number; and sending third prompt information to the client in response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, wherein the third prompt information is used for prompting the user that the third-party website has an application newer than the version of the application to be detected.
In some embodiments, the apparatus further comprises: and the storage unit is used for storing the application information of the application to be detected and the user identifier of the user in the first application information set in an associated mode in response to determining that the application to be detected is a valid application.
In some embodiments, the obtaining unit includes: a third determining unit, configured to determine, based on the application file of the application to be detected, whether the first application information set includes standby application information, where an application file of an application corresponding to the standby application information is matched with an application file of the application to be detected, and the application information in the first application information set includes an application identifier; a first obtaining unit, configured to, in response to determining that standby application information exists in the first application information set, use an application identifier of the standby application information as an application identifier of the application to be detected; and the second obtaining unit is used for responding to the fact that the first application information set does not contain the standby application information, analyzing the application file of the application to be detected, and obtaining the application identifier of the application to be detected.
In some embodiments, the third determining unit is further configured to: generating a download link according to the application file of the application to be detected, wherein the download link comprises a uniform resource locator and a time stamp, and the time stamp is generated based on the time of receiving the application file of the application to be detected; matching the download link with the download link of the application included in the application information in the first application information set, wherein the application information in the first application information set includes the download link of the application; and in response to determining that the download link is matched with the download link of the application included in the application information in the first application information set, determining that the matched application information is standby application information.
In some embodiments, the third determining unit is further configured to: calculating a hash value of the application file of the application to be detected; matching the hash value with the hash value of the application file of the application corresponding to the application information in the first application information set; and in response to determining that the hash value is matched with the hash value of the application file of the application corresponding to the application information in the first application information set, determining that the application information corresponding to the application file with the matched hash value is standby application information.
In some embodiments, the second determining unit is further configured to: and determining whether the developer of the application to be detected is the same as the developer of the target application according to the user identifier of the user uploading the application file of the application to be detected and the user identifier of the user uploading the target application, wherein the user identifier of the user is generated based on registration information sent by the user.
In a third aspect, embodiments of the present application provide a server, including: one or more processors; and a storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method as described in any of the implementations of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements a method as described in any of the implementations of the first aspect.
According to the method and the device for detecting the application, the application identifier of the application to be detected is obtained based on the application file of the application to be detected, whether the preset first application information set comprises application information of the target application with the same application identifier as the application identifier of the application to be detected or not is determined, whether the developer of the application to be detected is the same as the developer of the target application or not is determined in response to the fact that the first application information set comprises the application information of the target application with the same application identifier as the application identifier of the application to be detected, verification of the developer of the application to be detected is achieved, and accordingly whether the application to be detected is infringed or not is detected.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a method for detecting an application according to the present application;
FIG. 3 is a schematic illustration of one application scenario of a method for detecting an application according to the present application;
FIG. 4 is a flow chart of yet another embodiment of a method for detecting an application according to the present application;
FIG. 5 is a schematic structural view of one embodiment of an apparatus for detecting an application according to the present application;
FIG. 6 is a schematic diagram of a computer system suitable for use in implementing embodiments of the present application.
Detailed Description
The present application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
FIG. 1 illustrates an exemplary system architecture 100 to which embodiments of the methods for detecting applications or apparatuses for detecting applications of the present application may be applied.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various client applications, such as a web browser application, a search class application, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen and supporting information transmission and display, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like. When the terminal devices 101, 102, 103 are software, they can be installed in the above-listed electronic devices. Which may be implemented as multiple software or software modules (e.g., to provide distributed services), or as a single software or software module. The present invention is not particularly limited herein.
The server 105 may be a server providing various services, such as a server providing support for information displayed on the terminal devices 101, 102, 103. The server may detect the application file of the application to be detected sent by the received terminal devices 101, 102, 103, and generate prompt information based on the detection result and feed back the prompt information to the terminal devices.
It should be noted that, the method for detecting an application provided in the embodiments of the present application is generally performed by the server 105, and accordingly, the device for detecting an application is generally disposed in the server 105.
The server may be hardware or software. When the server is hardware, the server may be implemented as a distributed server cluster formed by a plurality of servers, or may be implemented as a single server. When the server is software, it may be implemented as a plurality of software or software modules (e.g., to provide distributed services), or as a single software or software module. The present invention is not particularly limited herein.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for detecting an application according to the present application is shown. The method for detecting an application comprises the following steps:
in step 201, an application file of an application to be detected is received.
In this embodiment, an execution body (e.g., the server 105 shown in fig. 1) on which the method for detecting an application runs may receive an application file of an application to be detected, where the application file of the application to be detected may refer to a computer program file of the application to be detected, and may be, for example, an installation package of the application to be detected.
Step 202, obtaining an application identifier of the application to be detected based on the application file.
In this embodiment, the executing body may obtain the application identifier of the application to be detected based on the received application file of the application to be detected, where the application identifier may be an identifier for distinguishing different applications, and one application identifier uniquely identifies one application, and different versions of the same application use the same application identifier. As an example, the application identifier of an application may be the package name of the application.
In some optional implementations of this embodiment, the step 202 may specifically include:
And step I, based on the application file of the application to be detected, the execution body can determine whether the first application information set comprises standby application information, wherein the application file of the application corresponding to the standby application information is matched with the application file of the application to be detected, and the application information in the first application information set comprises an application identifier. As an example, the application file of the application corresponding to the standby application information being matched with the application file of the application to be detected may mean that the application file of the application corresponding to the standby application information is identical to the application file of the application to be detected.
And step II, in response to determining that the standby application information exists in the first application information set, the execution body may use an application identifier of the standby application information as an application identifier of the application to be detected.
And step III, in response to determining that the standby application information does not exist in the first application information set, the execution body can analyze the application file of the application to be detected to obtain an application identifier of the application to be detected. As an example, the executing body may analyze the application file of the application to be detected using an existing application file analysis tool, so as to obtain application information such as an application identifier, version number, developer information, hash value, and the like of the application to be detected.
In some alternative implementations, the step I may specifically include: first, the execution body may generate a download link according to the application file of the application to be detected, where the download link may include a uniform resource locator (Uniform Resource Locator, URL) and a timestamp, where the timestamp is generated based on a time of receiving the application file of the application to be detected, and the execution body may obtain a time of receiving the application file of the application to be detected according to the download link, where the download link may uniquely correspond to the application file, and for the same application file, URLs in the generated download link are the same and different at different times. It should be noted that, for one download link, when the content of the application file pointed to by the download link URL occurs due to modification by the developer, the timestamp in the download link is updated to the timestamp generated based on the modification time. As an example, the download link may also include a random number, received at different times for the same application file, the URL in the generated download link being the same, the timestamp and the random number being different. Then, the executing body may match the download link with a download link of an application included in the application information in the first application information set, where the application information in the first application information set includes a download link of the application. Finally, in response to determining that the download link matches a download link of an application included in the application information in the first application information set, the execution body may determine that the matched application information is standby application information. As an example, when the time corresponding to the URL and the time stamp of the download link is the same as the time corresponding to the URL and the time stamp of the download link of a certain piece of application information in the first application information set, the execution subject may determine that the download link matches the download link of the application included in the application information in the first application information set, and at this time, the piece of application information in the first application information set may be used as the standby application information.
In some alternative implementations, the step I may specifically include: first, the execution body may calculate a hash value of the application file of the application to be detected. Then, the execution body may match the hash value with a hash value of an application file of an application corresponding to the application information in the first application information set. Finally, in response to determining that the hash value matches a hash value of an application file of an application corresponding to the application information in the first application information set, the execution body may determine that the application information corresponding to the application file with the hash value matching is standby application information. As an example, when the hash value of the application file of the application to be detected is equal to the hash value of the application file of the application corresponding to a certain piece of application information in the first application information set, the execution body may determine that the hash value matches the hash value of the application file of the application corresponding to the application information in the first application information set, and at this time, the piece of application information in the first application information set that matches the hash value of the application file of the application to be detected may be used as the standby application information.
Step 203, determining whether the preset first application information set includes application information of the target application with the same application identifier as the application identifier of the application to be detected.
In this embodiment, a first application information set may be preset in the execution body, where the first application information set may be used to store application information of an application received locally, and the application information of the application may include various information related to the application, for example, developer information of the application, a name of the application, version information of the application, an application identifier of the application, software copyright certification qualification information of an application developer, and so on. The execution body may determine whether application information of the target application having the same application identifier as the application identifier of the application to be tested is included in the first application information set.
In step 204, in response to determining that the first set of application information includes application information for a target application having an application identifier that is the same as an application identifier of the application to be detected, it is determined whether a developer of the application to be detected is the same as a developer of the target application.
In this embodiment, in response to determining that the first application information set includes application information of a target application having an application identifier identical to an application identifier of the application to be detected, the execution body may determine whether a developer of the application to be detected is identical to a developer of the target application.
In some optional implementations of this embodiment, in the step 204, determining whether the developer of the application to be detected is the same as the developer of the target application may specifically include: the execution body may determine whether the developer of the application to be detected is the same as the developer of the target application according to a user identifier of a user who uploads the application file of the application to be detected and a user identifier of a user who uploads the target application, wherein the user identifier of the user is generated based on registration information transmitted by the user. Here, the application to be detected is uploaded by the user through a client. Typically, before the user uploads the application file through the client, the user needs to send registration information through the client, for example, the registration information may include a developer property (personal, company, etc.), a business license (for the case where the developer property is company), a contact address, a mailbox, an identification number (for the case where the developer property is personal), etc., after the registration is successful, the user may obtain a unique user identifier thereof, and when it is determined that the user identifier of the user uploading the application file of the application to be detected is identical to the user identifier of the user uploading the target application, the executing entity may determine whether the developer of the application to be detected is identical to the developer of the target application.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the method for detecting an application according to the present embodiment. In the application scenario of fig. 3, a user first sends an application file of an application to be detected to a server 302 through a terminal device 301; then, the server 302 obtains the application identifier com.aa.123 of the application to be detected based on the received application file; then, the server 302 determines whether the locally preset first application information set includes application information of the target application with the same application identifier as the application identifier com.aa.123 of the application to be detected; finally, in response to determining that the first application information set includes application information of a target application having an application identifier identical to the application identifier com.aa.123 of the application to be detected, the server 302 may further determine whether a developer of the application to be detected is identical to a developer of the target application.
The method provided by the embodiment of the application to be detected can realize verification of the developer of the application to be detected by determining whether the developer of the application to be detected is the same as the developer of the target application in the first application information set, so that whether the application to be detected is infringing or not is detected.
With further reference to fig. 4, a flow 400 of yet another embodiment of a method for detecting an application is shown. The flow 400 of the method for detecting an application comprises the steps of:
in step 401, an application file of an application to be detected is received.
In this embodiment, an execution body (e.g., the server 105 shown in fig. 1) on which the method for detecting an application runs may receive an application file of an application to be detected, where the application file of the application to be detected may refer to a computer program file of the application to be detected, and may be, for example, an installation package of the application to be detected.
Step 402, obtaining an application identifier of the application to be detected based on the application file.
In this embodiment, the executing body may obtain the application identifier of the application to be detected based on the received application file of the application to be detected, where the application identifier may be an identifier for distinguishing different applications, and one application identifier uniquely identifies one application, and different versions of the same application use the same application identifier. As an example, the application identifier of an application may be the package name of the application.
Step 403, determining whether the preset first application information set includes application information of the target application with the same application identifier as the application identifier of the application to be detected.
In this embodiment, a first application information set may be preset in the execution body, where the first application information set may be used to store application information of an application received locally, and the application information of the application may include various information related to the application, for example, developer information of the application, a name of the application, version information of the application, an application identifier of the application, software copyright certification qualification information of an application developer, and so on. The execution body may determine whether application information of the target application having the same application identifier as the application identifier of the application to be tested is included in the first application information set.
In response to determining that the first set of application information includes application information for a target application having an application identifier that is the same as the application identifier of the application to be detected, a determination is made as to whether the developer of the application to be detected is the same as the developer of the target application, step 404.
In this embodiment, in response to determining that the first application information set includes application information of a target application having an application identifier identical to an application identifier of the application to be detected, the execution body may determine whether a developer of the application to be detected is identical to a developer of the target application.
In response to determining that the developer of the application to be detected is the same as the developer of the target application, it is detected whether the version of the application to be detected is up to date, step 405.
In this embodiment, in response to determining that the developer of the application to be detected is the same as the developer of the target application, the execution subject may further detect whether the version of the application to be detected is up to date, and as an example, the execution subject may compare version information (for example, version number) corresponding to the target application with version information of the application to be detected, and determine whether the version of the application to be detected is up to date according to the comparison result.
In some optional implementations of this embodiment, in step 405, detecting whether the version of the application to be detected is up to date may specifically include the following steps:
in step S1, the executing body may obtain, from the first application information set, a first latest version number corresponding to the application identifier of the application to be detected according to the application identifier of the application to be detected. When an application has multiple versions, each version corresponds to a version number, the executing body may determine, according to a preset version number definition rule, that one of the multiple version numbers of the same application is the version number corresponding to the latest version, and determine the version number corresponding to the latest version as the latest version number. As an example, the execution body may use, as the first latest version number, a latest version number corresponding to an application having the same application identifier as the application identifier of the application to be detected in the first application information set.
In step S2, the executing body may determine, according to the version number of the application to be detected and the first latest version number, whether the version of the application to be detected is newer than the version corresponding to the first latest version number.
And step S3, in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user to upload an application newer than the version of the application to be detected or the same as the version of the application to be detected. As an example, when detecting that the version of the application to be detected is older than the version corresponding to the first latest version number or the same as the version corresponding to the first latest version number, the execution body may send a prompt message "you have released an application of a higher version or the same version," if you want to update this application, please update the version to XXX or above, to the client. ".
In step S4, in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, the executing body may obtain, from a second set of application information set in advance, a second latest version number corresponding to the application identifier of the application to be detected according to the application identifier of the application to be detected, and as an example, the executing body may use, as the second latest version number, the latest version number corresponding to the application having the same application identifier as the application identifier of the application to be detected in the second application information set. Here, the second application information set may be used to store application information of an application acquired from a third-party website, and the execution subject may further perform the following detection operation:
The execution body may detect whether the version of the application to be detected is older than the version corresponding to the second latest version number.
In response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number, i.e., the version of the application to be detected is newer than the version corresponding to the second latest version number, or the same as the version corresponding to the second latest version number, the execution body may determine that the application to be detected is a valid application.
In response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, the execution body may send third prompting information to the client, where the third prompting information is used to prompt the user that the third party website already has an application newer than the version of the application to be detected. As an example, when detecting that the version of the application to be detected is older than the version corresponding to the second latest version number, the execution subject may send a hint message "the same application of higher version XXX has been found in XX application store" to the client, if you want to update this application, please update the version to XXX or above. ".
In some optional implementations, in step S4, in response to determining that the application to be detected is a valid application, the executing entity may store application information of the application to be detected and a user identifier of the user in association with the first application information set.
And step 406, in response to determining that the developer of the application to be detected is different from the developer of the target application, sending first prompt information to the client.
In this embodiment, in response to determining that the developer of the application to be detected is different from the developer of the target application, the executing body may send first prompt information to the client, where the first prompt information is used to prompt the user that the target application having the same application identifier as the application to be detected has been uploaded by another developer, and the application to be detected is uploaded by the user through the client. As an example, when it is detected that the developer of the application to be detected is different from the developer of the target application, the execution subject may send the following hint information "there is currently an application with the same application identifier submitted by other developers locally" to the client: xxx. If you are the developer of the application, please click here to get the application. ", to prompt the user that the application to be detected may have copyright problems, and may prompt the user to apply for claims, for example, the user may claim by submitting information such as identity information, business license, notarization material, etc. Here, the client may be hardware or software. When the client is hardware, the client may be implemented as a distributed device cluster formed by a plurality of devices (e.g., terminal devices 101, 102, 103 shown in fig. 1), or may be implemented as a single device. When the client is software, it may be implemented as a plurality of software or software modules (e.g., to provide distributed services), or as a single software or software module. The present invention is not particularly limited herein.
As can be seen from fig. 4, compared with the corresponding embodiment of fig. 2, the flow 400 of the method for detecting an application in this embodiment highlights the steps of detecting the version of the application to be detected and sending the first hint information. Therefore, the scheme described in the embodiment can prompt a user that the application to be detected possibly has the copyright problem when the application to be detected is determined to have the copyright problem; and further detecting whether the application to be detected is latest in version or not when the application to be detected is determined to be free of copyright problems.
With further reference to fig. 5, as an implementation of the method shown in the foregoing figures, the present application provides an embodiment of an apparatus for detecting an application, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 5, the apparatus 500 for detecting an application of the present embodiment includes: a receiving unit 501, an obtaining unit 502, a first determining unit 503, and a second determining unit 504. The receiving unit 501 is configured to receive an application file of an application to be detected; the obtaining unit 502 is configured to obtain an application identifier of the application to be detected based on the application file; the first determining unit 503 is configured to determine whether a preset first application information set includes application information of a target application having an application identifier that is the same as an application identifier of the application to be detected, where the first application information set is used to store application information of a locally received application; the second determining unit 504 is configured to determine, in response to determining that the first application information set includes application information of a target application whose application identifier is the same as the application identifier of the application to be detected, whether a developer of the application to be detected is the same as a developer of the target application.
In this embodiment, the specific processes of the receiving unit 501, the obtaining unit 502, the first determining unit 503 and the second determining unit 504 of the apparatus 500 for detecting an application and the technical effects thereof may refer to the relevant descriptions of the step 201, the step 202, the step 203 and the step 204 in the corresponding embodiment of fig. 2, and are not repeated herein.
In some optional implementations of this embodiment, the apparatus 500 may further include: a detecting unit (not shown in the figure) for detecting whether the version of the application to be detected is latest in response to determining that the developer of the application to be detected is the same as the developer of the target application; and a sending unit (not shown in the figure) configured to send, in response to determining that the developer of the application to be detected is different from the developer of the target application, first prompt information to the client, where the first prompt information is used to prompt the user that the target application having the same application identifier as the application to be detected has been uploaded by another developer, and the application to be detected is uploaded by the user through the client.
In some optional implementations of this embodiment, the detection unit may be further configured to: obtaining a first latest version number corresponding to the application identifier of the application to be detected from the first application information set according to the application identifier of the application to be detected; determining whether the version of the application to be detected is newer than the version corresponding to the first latest version number according to the version number of the application to be detected and the first latest version number; in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user that the application newer than the version of the application to be detected or the same as the version of the application to be detected has been uploaded; in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, obtaining a second latest version number corresponding to the application identifier of the application to be detected from a preset second application information set according to the application identifier of the application to be detected, where the second application information set is used for storing application information of the application acquired from a third-party website, and executing the following detection operations: detecting whether the version of the application to be detected is older than the version corresponding to the second latest version number; determining the application to be detected as a valid application in response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number; and sending third prompt information to the client in response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, wherein the third prompt information is used for prompting the user that the third-party website has an application newer than the version of the application to be detected.
In some optional implementations of this embodiment, the apparatus 500 may further include: and the storage unit is used for storing the application information of the application to be detected and the user identifier of the user in the first application information set in an associated mode in response to determining that the application to be detected is a valid application.
In some optional implementations of this embodiment, the obtaining unit 502 may include: a third determining unit (not shown in the figure) configured to determine, based on the application file of the application to be detected, whether the first application information set includes standby application information, where an application file of an application corresponding to the standby application information matches with an application file of the application to be detected, and where the application information in the first application information set includes an application identifier; a first obtaining unit (not shown in the figure) configured to, in response to determining that standby application information exists in the first application information set, use an application identifier of the standby application information as an application identifier of the application to be detected; and a second obtaining unit (not shown in the figure) configured to, in response to determining that the first application information set does not have the standby application information, parse the application file of the application to be detected, and obtain an application identifier of the application to be detected.
In some optional implementations of this embodiment, the third determining unit may further be configured to: generating a download link according to the application file of the application to be detected, wherein the download link comprises a uniform resource locator and a time stamp, and the time stamp is generated based on the time of receiving the application file of the application to be detected; matching the download link with the download link of the application included in the application information in the first application information set, wherein the application information in the first application information set includes the download link of the application; and in response to determining that the download link is matched with the download link of the application included in the application information in the first application information set, determining that the matched application information is standby application information.
In some optional implementations of this embodiment, the third determining unit may further be configured to: calculating a hash value of the application file of the application to be detected; matching the hash value with the hash value of the application file of the application corresponding to the application information in the first application information set; and in response to determining that the hash value is matched with the hash value of the application file of the application corresponding to the application information in the first application information set, determining that the application information corresponding to the application file with the matched hash value is standby application information.
In some optional implementations of this embodiment, the second determining unit 504 may be further configured to: and determining whether the developer of the application to be detected is the same as the developer of the target application according to the user identifier of the user uploading the application file of the application to be detected and the user identifier of the user uploading the target application, wherein the user identifier of the user is generated based on registration information sent by the user.
Referring now to FIG. 6, there is illustrated a schematic diagram of a computer system 600 suitable for use in implementing a server of an embodiment of the present application. The server illustrated in fig. 6 is merely an example, and should not be construed as limiting the functionality and scope of use of the embodiments herein.
As shown in fig. 6, the computer system 600 includes a central processing unit (CPU, central Processing Unit) 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage portion 606 into a random access Memory (RAM, random Access Memory) 603. In the RAM 603, various programs and data required for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other through a bus 604. An Input/Output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: a storage portion 606 including a hard disk and the like; and a communication section 607 including a network interface card such as a LAN (local area network ) card, a modem, or the like. The communication section 607 performs communication processing via a network such as the internet. The drive 608 is also connected to the I/O interface 605 as needed. Removable media 609, such as magnetic disks, optical disks, magneto-optical disks, semiconductor memories, and the like, are mounted on the drive 608 as needed so that a computer program read therefrom is mounted into the storage section 606 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such embodiments, the computer program may be downloaded and installed from a network via the communication portion 607, and/or installed from the removable medium 609. The above-described functions defined in the method of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 601. It should be noted that, the computer readable medium described in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by software, or may be implemented by hardware. The described units may also be provided in a processor, for example, described as: a processor includes a receiving unit, an obtaining unit, a first determining unit, and a second determining unit. The names of these units do not in any way constitute a limitation of the unit itself, for example, the receiving unit may also be described as "a unit that receives an application file of an application to be detected".
As another aspect, the present application also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be present alone without being fitted into the device. The computer readable medium carries one or more programs which, when executed by the apparatus, cause the apparatus to: receiving an application file of an application to be detected; obtaining an application identifier of the application to be detected based on the application file; determining whether a preset first application information set comprises application information of a target application with an application identifier identical to that of the application to be detected, wherein the first application information set is used for storing locally received application information of the application; in response to determining that the first application information set includes application information of a target application having an application identifier identical to the application identifier of the application to be detected, determining whether a developer of the application to be detected is identical to a developer of the target application.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the invention referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the invention. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.

Claims (16)

1. A method for detecting an application, comprising:
receiving an application file of an application to be detected;
obtaining an application identifier of the application to be detected based on the application file;
determining whether a preset first application information set comprises application information of a target application with an application identifier identical to that of the application to be detected, wherein the first application information set is used for storing locally received application information of the application;
in response to determining that the first application information set includes application information of a target application with an application identifier identical to that of the application to be detected, determining whether a developer of the application to be detected is identical to that of the target application;
the obtaining the application identifier of the application to be detected based on the application file includes:
determining whether the first application information set comprises standby application information or not based on the application files of the application to be detected, wherein the application files of the application corresponding to the standby application information are matched with the application files of the application to be detected, and the application information in the first application information set comprises an application identifier;
In response to determining that standby application information exists in the first application information set, taking an application identifier of the standby application information as an application identifier of the application to be detected;
and in response to determining that the standby application information does not exist in the first application information set, analyzing the application file of the application to be detected to obtain an application identifier of the application to be detected.
2. The method of claim 1, wherein the method further comprises:
detecting whether the version of the application to be detected is up-to-date in response to determining that the developer of the application to be detected is the same as the developer of the target application;
and in response to determining that the developer of the application to be detected is different from the developer of the target application, sending first prompt information to a client, wherein the first prompt information is used for prompting that the target application, which is the same as the application identifier of the application to be detected, of a user has been uploaded by other developers, and the application to be detected is uploaded by the user through the client.
3. The method of claim 2, wherein the detecting whether the version of the application to be detected is up-to-date comprises:
Obtaining a first latest version number corresponding to the application identifier of the application to be detected from the first application information set according to the application identifier of the application to be detected;
determining whether the version of the application to be detected is newer than the version corresponding to the first latest version number according to the version number of the application to be detected and the first latest version number;
in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user that the application newer than or the same as the version of the application to be detected has been uploaded;
in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, obtaining a second latest version number corresponding to the application identifier of the application to be detected from a second preset application information set according to the application identifier of the application to be detected, wherein the second application information set is used for storing application information of the application acquired from a third-party website, and executing the following detection operation:
Detecting whether the version of the application to be detected is older than the version corresponding to the second latest version number;
determining that the application to be detected is a valid application in response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number;
and in response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, sending third prompt information to the client, wherein the third prompt information is used for prompting the user that the third-party website has an application newer than the version of the application to be detected.
4. A method according to claim 3, wherein the method further comprises:
in response to determining that the application to be detected is a valid application, application information of the application to be detected is stored in association with a user identifier of the user to the first set of application information.
5. The method of claim 1, wherein the determining whether the first set of application information includes standby application information based on the application file of the application to be detected comprises:
generating a download link according to the application file of the application to be detected, wherein the download link comprises a uniform resource locator and a time stamp, and the time stamp is generated based on the time of receiving the application file of the application to be detected;
Matching the download link with the download link of the application included in the application information in the first application information set, wherein the application information in the first application information set includes the download link of the application;
in response to determining that the download link matches a download link of an application included in the application information in the first set of application information, determining that the matched application information is standby application information.
6. The method of claim 1, wherein the determining whether the first set of application information includes standby application information based on the application file of the application to be detected comprises:
calculating a hash value of the application file of the application to be detected;
matching the hash value with the hash value of the application file of the application corresponding to the application information in the first application information set;
and in response to determining that the hash value is matched with the hash value of the application file of the application corresponding to the application information in the first application information set, determining that the application information corresponding to the application file with the matched hash value is standby application information.
7. The method of claim 1, wherein the determining whether the developer of the application to be detected is the same as the developer of the target application comprises:
And determining whether the developer of the application to be detected is the same as the developer of the target application according to the user identifier of the user uploading the application file of the application to be detected and the user identifier of the user uploading the target application, wherein the user identifier of the user is generated based on registration information sent by the user.
8. An apparatus for detecting an application, comprising:
the receiving unit is used for receiving application files of the application to be detected;
the obtaining unit is used for obtaining the application identifier of the application to be detected based on the application file;
a first determining unit, configured to determine whether a preset first application information set includes application information of a target application with an application identifier identical to an application identifier of the application to be detected, where the first application information set is used to store application information of a locally received application;
a second determining unit, configured to determine whether a developer of the application to be detected is the same as a developer of the target application in response to determining that application information of the target application, in which an application identifier is the same as an application identifier of the application to be detected, is included in the first application information set;
Wherein the obtaining unit includes:
a third determining unit, configured to determine, based on the application file of the application to be detected, whether the first application information set includes standby application information, where an application file of an application corresponding to the standby application information is matched with an application file of the application to be detected, and the application information in the first application information set includes an application identifier;
a first obtaining unit, configured to, in response to determining that standby application information exists in the first application information set, take an application identifier of the standby application information as an application identifier of the application to be detected;
and the second obtaining unit is used for responding to the fact that the first application information set does not contain the standby application information, analyzing the application file of the application to be detected, and obtaining the application identifier of the application to be detected.
9. The apparatus of claim 8, wherein the apparatus further comprises:
a detection unit, configured to detect whether a version of the application to be detected is up to date in response to determining that a developer of the application to be detected is the same as a developer of the target application;
and the sending unit is used for sending first prompt information to the client in response to the fact that the developer of the application to be detected is different from the developer of the target application, wherein the first prompt information is used for prompting that the target application with the same application identifier as the application to be detected is uploaded by other developers, and the application to be detected is uploaded by the user through the client.
10. The apparatus of claim 9, wherein the detection unit is further to:
obtaining a first latest version number corresponding to the application identifier of the application to be detected from the first application information set according to the application identifier of the application to be detected;
determining whether the version of the application to be detected is newer than the version corresponding to the first latest version number according to the version number of the application to be detected and the first latest version number;
in response to determining that the version of the application to be detected is not newer than the version corresponding to the first latest version number, sending second prompt information to the client, wherein the second prompt information is used for prompting the user that the application newer than or the same as the version of the application to be detected has been uploaded;
in response to determining that the version of the application to be detected is newer than the version corresponding to the first latest version number, obtaining a second latest version number corresponding to the application identifier of the application to be detected from a second preset application information set according to the application identifier of the application to be detected, wherein the second application information set is used for storing application information of the application acquired from a third-party website, and executing the following detection operation:
Detecting whether the version of the application to be detected is older than the version corresponding to the second latest version number;
determining that the application to be detected is a valid application in response to determining that the version of the application to be detected is not older than the version corresponding to the second latest version number;
and in response to determining that the version of the application to be detected is older than the version corresponding to the second latest version number, sending third prompt information to the client, wherein the third prompt information is used for prompting the user that the third-party website has an application newer than the version of the application to be detected.
11. The apparatus of claim 10, wherein the apparatus further comprises:
and the storage unit is used for storing the application information of the application to be detected and the user identifier of the user into the first application information set in an associated mode in response to determining that the application to be detected is a valid application.
12. The apparatus of claim 8, wherein the third determination unit is further configured to:
generating a download link according to the application file of the application to be detected, wherein the download link comprises a uniform resource locator and a time stamp, and the time stamp is generated based on the time of receiving the application file of the application to be detected;
Matching the download link with the download link of the application included in the application information in the first application information set, wherein the application information in the first application information set includes the download link of the application;
in response to determining that the download link matches a download link of an application included in the application information in the first set of application information, determining that the matched application information is standby application information.
13. The apparatus of claim 8, wherein the third determination unit is further configured to:
calculating a hash value of the application file of the application to be detected;
matching the hash value with the hash value of the application file of the application corresponding to the application information in the first application information set;
and in response to determining that the hash value is matched with the hash value of the application file of the application corresponding to the application information in the first application information set, determining that the application information corresponding to the application file with the matched hash value is standby application information.
14. The apparatus of claim 8, wherein the second determining unit is further configured to:
and determining whether the developer of the application to be detected is the same as the developer of the target application according to the user identifier of the user uploading the application file of the application to be detected and the user identifier of the user uploading the target application, wherein the user identifier of the user is generated based on registration information sent by the user.
15. A server, comprising:
one or more processors;
storage means for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
16. A computer readable medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the method of any of claims 1-7.
CN201810223858.2A 2018-03-19 2018-03-19 Method and device for detecting application Active CN110287087B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810223858.2A CN110287087B (en) 2018-03-19 2018-03-19 Method and device for detecting application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810223858.2A CN110287087B (en) 2018-03-19 2018-03-19 Method and device for detecting application

Publications (2)

Publication Number Publication Date
CN110287087A CN110287087A (en) 2019-09-27
CN110287087B true CN110287087B (en) 2023-06-13

Family

ID=68000909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810223858.2A Active CN110287087B (en) 2018-03-19 2018-03-19 Method and device for detecting application

Country Status (1)

Country Link
CN (1) CN110287087B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113761512A (en) * 2020-06-02 2021-12-07 深圳兆日科技股份有限公司 Third-party software package processing method, tool and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8869284B1 (en) * 2012-10-04 2014-10-21 Symantec Corporation Systems and methods for evaluating application trustworthiness
CN104253791A (en) * 2013-06-27 2014-12-31 华为终端有限公司 Webpage application security access method, server and client
CN104317599A (en) * 2014-10-30 2015-01-28 北京奇虎科技有限公司 Method and device for detecting whether installation package is packaged repeatedly or not
CN107135077A (en) * 2017-05-05 2017-09-05 中国联合网络通信集团有限公司 Software protecting method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092653A (en) * 2013-01-16 2013-05-08 珠海市君天电子科技有限公司 Method and device capable of providing official application program in application market
CN103632096B (en) * 2013-11-29 2018-01-16 北京奇虎科技有限公司 A kind of method and apparatus that safety detection is carried out to equipment
CN104462971B (en) * 2014-12-17 2017-10-03 北京奇虎科技有限公司 The method and apparatus that malicious application is recognized according to application program stated features
CN105204895B (en) * 2015-08-31 2018-10-19 小米科技有限责任公司 Acquisition methods, equipment and the system of application version information
CN105426706B (en) * 2015-11-20 2018-06-15 北京奇虎科技有限公司 Piracy applies detection method and device, system
CN105488361B (en) * 2015-11-20 2018-09-25 北京奇虎科技有限公司 Piracy applies detection method and device, system
CN106485153A (en) * 2016-10-10 2017-03-08 聚好看科技股份有限公司 Version upgrading method and terminal unit
CN106874037B (en) * 2017-01-13 2020-08-18 北京安云世纪科技有限公司 Application program installation method and device and mobile terminal
CN107480519A (en) * 2017-08-04 2017-12-15 深圳市金立通信设备有限公司 A kind of method and server for identifying risk application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8869284B1 (en) * 2012-10-04 2014-10-21 Symantec Corporation Systems and methods for evaluating application trustworthiness
CN104253791A (en) * 2013-06-27 2014-12-31 华为终端有限公司 Webpage application security access method, server and client
CN104317599A (en) * 2014-10-30 2015-01-28 北京奇虎科技有限公司 Method and device for detecting whether installation package is packaged repeatedly or not
CN107135077A (en) * 2017-05-05 2017-09-05 中国联合网络通信集团有限公司 Software protecting method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
薛飞洁.一种Android平台反钓鱼攻击解决方案.《中国优秀硕士学位论文全文数据库信息科技辑》.2016,(第04期),I139-36. *

Also Published As

Publication number Publication date
CN110287087A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN107729352B (en) Page resource loading method and terminal equipment
CN109598127B (en) Privacy risk assessment method and device
CN110708346B (en) Information processing system and method
CN107302597B (en) Message file pushing method and device
CN109582873B (en) Method and device for pushing information
CN111258602B (en) Information updating method and device
CN109376534B (en) Method and apparatus for detecting applications
CN109814889B (en) Method and apparatus for updating source code base
CN110708335A (en) Access authentication method and device and terminal equipment
US9582260B2 (en) Method and apparatus for remote purchase, installation, and licensing of software
CN111488995A (en) Method and apparatus for evaluating a joint training model
CN110796462A (en) Method and device for guiding flow
CN111367531B (en) Code processing method and device
CN110928571A (en) Business program development method and device
CN110287087B (en) Method and device for detecting application
CN111506904B (en) Method and device for online bug repair
CN112559024A (en) Method and device for generating transaction code change list
CN109145591B (en) Plug-in loading method of application program
CN109542743B (en) Log checking method and device, electronic equipment and computer readable storage medium
CN112788084A (en) Application program installation package downloading method, application program installation package pushing device and computer equipment
CN107634942B (en) Method and device for identifying malicious request
CN107247661B (en) Method and system for supporting automatic verification of installation package of application
CN110427745B (en) Verification code obtaining method and device, electronic equipment and computer readable medium
CN112835609B (en) Method and device for modifying download address of dependent packet
CN110196803B (en) Software defect training method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant