Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for identifying pirated applications

An identification method and application identification technology, applied in the field of data processing, can solve the problems of requiring regular updates, large false alarm rate, and small coverage, and achieve the effect of solving the problem of small identification coverage and optimizing the identification technology.

Active Publication Date: 2017-11-14
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantage of this method is that it can only detect pirated applications for the applications included in the genuine application library, the coverage is relatively small and the genuine application library needs to be updated regularly;
However, since all reinforcement protection technologies currently on the market need to be packaged with apktool, this leads to a large false positive rate in this detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying pirated applications
  • Method and device for identifying pirated applications
  • Method and device for identifying pirated applications

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0023] figure 1 It is a flow chart of the method for identifying pirated applications provided in the first embodiment of the present invention. The method in this embodiment can be executed by a device for identifying pirated applications. The device can be implemented by means of hardware and / or software, and can generally be integrated In the application end used to provide pirated application identification services. Wherein, the application end may be a server or a client. For example, the application end can be an application store or a server that downloads assistant software, and the server first identifies the pirated version of the application program before releasing the application program on the public platform; the application end can also be a mobile phone guard A client of similar software, when the client detects a new application to be installed, the new application is firstly identified for piracy.

[0024] The method of this embodiment specifically includ...

no. 2 example

[0033] figure 2 It is a flowchart of a method for identifying a pirated application according to the second embodiment of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, it further preferably includes: according to the application identification of the application installation package to be detected, obtaining the corresponding certificate version information set from the application sample library, wherein the certificate The version information set includes a certificate and at least one piece of version information corresponding to the certificate; if the version information in the certificate version information set satisfies a set condition, the certificate included in the certificate version information set is determined to be a genuine certificate.

[0034] Correspondingly, the method in this embodiment specifically includes:

[0035] 210. Acquire a corresponding certificate version information set from th...

no. 3 example

[0051] image 3 It is a flow chart of a method for identifying a pirated application according to the third embodiment of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, if the version information in the certificate version information set satisfies the set conditions, then identifying the certificate included in the certificate version information set as a genuine certificate is optimized as follows: from at least In the two certificate version information sets, the certificate in the certificate version information set including the largest number of version information is identified as a genuine certificate.

[0052] Correspondingly, the method in this embodiment specifically includes:

[0053] 310. Acquire a corresponding certificate version information set from the application sample library according to the application identifier of the application installation package to be detected, where the certificate v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a device for identifying pirate application. The method comprises the following steps of obtaining a certificate of a to-be-detected application installation package; comparing the certificate of the to-be-detected application installation package and an original certificate which is pre-determined according to the version information, so as to verify the piracy of the to-be-detected application installation package. The method has the advantages that the pre-establishing of an original application base is not needed, the watermark detection is not needed, and the pirate application can be accurately and effectively identified; the technical problems of small coverage surface, high false judging rate and the like of the existing piracy identifying technique are solved, the existing pirate application identifying technique is optimized, and the increasing personalized and accurate identifying requirements on the pirate application are met.

Description

technical field [0001] Embodiments of the present invention relate to data processing technologies, and in particular, to a method and device for identifying pirated applications. Background technique [0002] With the continuous development of computer technology and communication technology, more and more people download various application programs (APP, also referred to as application) through various smart terminal devices to meet daily work, life and study needs. However, the resulting pirated applications (also known as cottage applications) make people very annoying. The pirated application refers to an application generated by a developer by cracking a genuine application and implanting advertisements or malicious codes inside it. If a user accidentally installs a pirated application, it will only push spam information, advertisements, etc., or it will steal important personal information such as user passwords and online banking, which will bring great harm to use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 贾志军施敏夏良钊王磊
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD