scispace - formally typeset
Patent

Method for detecting compromised application, and apparatus

Hu Chenpeng
Reads0
Chats0
TLDR
In this paper, the authors proposed a method for detecting compromised applications and an apparatus, the method comprising: calculating a verification code of an application installed on a terminal; after the application is launched, acquiring a first image associated with an upload operation of the application, the upload operation being triggered by using a function of the program; processing, by using the verification code, data of the first image, and generating a second image according to the processed data, a visual effect of the second image being similar to that of the original image; and providing the two image to a server.
Abstract
A method for detecting a compromised application and an apparatus, the method comprising: calculating a verification code of an application installed on a terminal; after the application is launched, acquiring a first image associated with an upload operation of the application, the upload operation being triggered by using a function of the application; processing, by using the verification code, data of the first image, and generating a second image according to the processed data, a visual effect of the second image being similar to that of the first image; and providing the second image to a server. The server compares whether the verification code obtained from image conversion is identical to an official verification code, so as to determine validity of a current application program. The invention enables a verification code of an application to be hidden in normal user data and reported, so as to provide the advantage of preventing hackers from detecting an integrity check process.

read more

References
More filters
Patent

Method and device for detecting whether application program installation package is tempered

TL;DR: In this paper, a method and device for detecting whether an application program installation package is tempered is presented, and the method is applied to a mobile terminal, which comprises the steps that terminal side digital signature certificate information of the application program install package in the mobile terminal is read; the terminal side certificate information is converted into first mark information according to a preset first algorithm; the first signal information is sent to a server to be detected; a detection result sent back by the server is received, wherein the detection result is obtained by comparing obtained second mark information with the first message information,
Patent

JPEG image information hiding based private information communication method and system

TL;DR: In this article, the authors proposed a multi-morphological information hiding core algorithm taking an image as a medium and a communication solution, where the information hiding module comprises an entropy decoding module, an information embedding module and an entropy encryption module.
Patent

User identification method and device

Jia Hongchao
TL;DR: In this paper, a user identification method and device is presented, which consists of three steps: determining whether a specific picture is loaded on a webpage or not, sending the specific picture to a local cache of the user terminal by a website server, and reading the user identifier from the local cache by a browser when the page is required to be displayed.
Patent

Forgery attack application interface detection method and device

TL;DR: In this article, a forgery attack application interface detection method and device is presented, where screenshots of application interfaces of types to be detected in the running process of equipment are acquired.
Patent

Remote system and method for recognizing unique serial number of mobile device hardware

Chen Ziqi
TL;DR: In this paper, a remote system and method for recognizing the unique serial number of mobile device hardware is presented, where the serial number can be effectively prevented from being forged, replaced and simulated through verification of a third-party platform.