Pirate application identification method and device

A recognition method and application recognition technology, applied in the field of information processing, can solve the problems of limited manual matching ability, long matching time, low matching accuracy, etc., to shorten the recognition time, reduce the number, and improve the recognition efficiency.

Active Publication Date: 2014-11-05
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Since the number of applications in the pre-stored application collection of the above method is extremely large, and the ability of manual matching is limited, the above method takes a long time to match between the application and the application collection, and the matching accuracy is low at the same time, which makes piracy The recognition time of the application is long and the recognition efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pirate application identification method and device
  • Pirate application identification method and device
  • Pirate application identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] In combination with the above implementation environment, this embodiment provides a method for identifying pirated applications, see figure 1 , the method flow provided by this embodiment is specifically as follows:

[0032] 101: Obtain the first name index of the first application, and obtain the second application that matches the first name index in the pre-stored application collection, where the application collection is a genuine application or a pirated application identified in the previous identification of pirated applications application accumulated;

[0033] Optionally, acquiring a second application that matches the first name index in the pre-stored application collection includes:

[0034] Obtain the second name index of each application in the pre-stored application collection, and calculate the first similarity between the first name index and each second name index;

[0035] Screening out first similarities greater than a first preset threshold from...

Embodiment 2

[0056] Embodiment two

[0057] This embodiment provides a method for identifying pirated applications. For ease of illustration, this embodiment takes the first application as application A and its name as "chat tool" as an example, and describes the method provided by this embodiment in detail. see figure 2 , the method flow provided by this embodiment is specifically as follows:

[0058] 201: Obtain and store an application collection;

[0059] Wherein, the application set is accumulated according to genuine applications or pirated applications identified during the previous identification of pirated applications.

[0060] Specifically, the genuine application collection is formed according to the accumulation of genuine applications identified during the previous identification of pirated applications; or, the collection of pirated applications is formed according to the accumulation of pirated applications identified during the previous identification of pirated applicati...

Embodiment 3

[0117] This embodiment provides a device for identifying a pirated application, which is used to implement the method for identifying a pirated application provided in Embodiment 1 or Embodiment 2 above, see image 3 , the device consists of:

[0118] A first acquiring module 301, configured to acquire a first name index of a first application;

[0119] The second acquiring module 302 is configured to acquire the second application in the pre-stored application set that matches the first name index acquired by the first acquiring module 301, and the application set is a legitimate version identified when the pirated application is identified before Apps or pirated apps are accumulated;

[0120] A matching module 303, configured to match the first application with each second application one by one when the second obtaining module 302 obtains at least one second application;

[0121] The identification module 304 is configured to identify the pirated application of the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a pirate application identification method and device, and belongs to the technical field of information processing. The method comprises the following steps: obtaining a first name index of a first application, obtaining a second application matched with the first name index in a prestored application set, wherein the application set is accumulated by legal copy applications or pirate applications identified when pirate application identification is carried out before; if at least one second application is obtained, matching the first application with each second application one by one; and according to a matching result, carrying out the pirate application identification of the first application. The second application matched with the name index of the first application in the prestored application set is obtained, the first application and each second application are matched one by one, the pirate application identification is carried out according to the matching result, so that the amount of the second applications matched with the first application one by one is reduced, identification time is shortened, and identification efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a method and device for identifying pirated applications. Background technique [0002] Excellent applications often have a large number of users, and piracy of excellent genuine applications can achieve a large number of users owned by genuine applications at a relatively low development cost. Therefore, piracy against genuine applications emerges in endlessly. Identifying pirated applications can protect the intellectual property rights of genuine applications from infringement and safeguard the legitimate interests of genuine applications. [0003] Currently, the identification method for pirated applications is: manual identification. After obtaining the application, the personnel involved in the identification of pirated applications will match the application with the applications in the pre-stored application collection one by one. Apps and pirated apps ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F21/10
CPCG06F16/2228G06F21/10
Inventor 尹华彬周畅宁合军
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products