Identification method and device of cheating application program

A technology of application programs and identification methods, applied in the field of network communication, can solve problems such as easy misjudgment and difficult identification of identification schemes, and achieve the effect of accurate identification

Active Publication Date: 2014-12-31
BEIJING CHEETAH MOBILE TECH CO LTD +4
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a method and device for identifying plug-in applications, so as to at least solve th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and device of cheating application program
  • Identification method and device of cheating application program
  • Identification method and device of cheating application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0030] The following embodiments can be applied to computers, such as PCs. It can also be applied to mobile terminals using intelligent operating systems at present, and is not limited thereto. There is no special requirement for the operating system of the computer or mobile terminal, as long as it supports the operation of the plug-in application. For example, the following embodiments can be applied to a Windows operating system.

[0031] figure 1 It is a flowchart of a method for identifying plug-in applications according to an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0032] Step S102, acquiring current behavior feature information generated dur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identification method and a device of a cheating application program. The method comprises obtaining current behavior characteristic information produced by the cheating application program to be identified during operation, and identifying the cheating application program according to the current behavior characteristic information, wherein the type of the current behavior characteristic information corresponds to the type of the cheating application program. By adopting the technical scheme, the problems that cheating application program identification schemes have difficulty in identifying cheating application programs and are likely to make erroneous judgment in relevant technologies are solved, so that precise identification of cheating application programs is realized.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and device for identifying plug-in application programs. Background technique [0002] Due to the popularity of online games and the popularity of programming languages, programming is becoming increasingly simple. As a result, a large number of game auxiliary plug-in software has appeared. Some of these game auxiliary plug-in software contain malicious viruses and traffic advertisements. Therefore, it is necessary to conduct virus detection on the plug-in software. The software is changeable and the update iteration speed is fast. It is difficult for ordinary detection and recognition technology to accurately identify and classify, so as to make effective processing and classification. [0003] Security software in the prior art usually adopts feature matching and heuristic identification methods when identifying auxiliary plug-in software. The characteristic data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F9/445
CPCA63F2300/209A63F2300/402A63F2300/538A63F2300/6009G06F21/566
Inventor 潘泉海张楠
Owner BEIJING CHEETAH MOBILE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products