Method and device for identifying pirated applications
An identification method and application identification technology, applied in the field of data processing, can solve the problems of requiring regular updates, large false alarm rate, and small coverage, and achieve the effect of solving the problem of small identification coverage and optimizing the identification technology.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0023] figure 1 It is a flow chart of the method for identifying pirated applications provided in the first embodiment of the present invention. The method in this embodiment can be executed by a device for identifying pirated applications. The device can be implemented by means of hardware and / or software, and can generally be integrated In the application end used to provide pirated application identification services. Wherein, the application end may be a server or a client. For example, the application end can be an application store or a server that downloads assistant software, and the server first identifies the pirated version of the application program before releasing the application program on the public platform; the application end can also be a mobile phone guard A client of similar software, when the client detects a new application to be installed, the new application is firstly identified for piracy.
[0024] The method of this embodiment specifically includ...
no. 2 example
[0033] figure 2 It is a flowchart of a method for identifying a pirated application according to the second embodiment of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, it further preferably includes: according to the application identification of the application installation package to be detected, obtaining the corresponding certificate version information set from the application sample library, wherein the certificate The version information set includes a certificate and at least one piece of version information corresponding to the certificate; if the version information in the certificate version information set satisfies a set condition, the certificate included in the certificate version information set is determined to be a genuine certificate.
[0034] Correspondingly, the method in this embodiment specifically includes:
[0035] 210. Acquire a corresponding certificate version information set from th...
no. 3 example
[0051] image 3 It is a flow chart of a method for identifying a pirated application according to the third embodiment of the present invention. This embodiment is optimized on the basis of the above embodiments. In this embodiment, if the version information in the certificate version information set satisfies the set conditions, then identifying the certificate included in the certificate version information set as a genuine certificate is optimized as follows: from at least In the two certificate version information sets, the certificate in the certificate version information set including the largest number of version information is identified as a genuine certificate.
[0052] Correspondingly, the method in this embodiment specifically includes:
[0053] 310. Acquire a corresponding certificate version information set from the application sample library according to the application identifier of the application installation package to be detected, where the certificate v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


