Pirate application detection method, device and system

A pirated, currently used technology, applied in the field of communications, can solve the problem of no effective method for detecting pirated applications, and achieve the effect of effective detection and identification

Active Publication Date: 2016-03-23
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, no effective method for detecting pirated apps currently exists

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pirate application detection method, device and system
  • Pirate application detection method, device and system
  • Pirate application detection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0052] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0053] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0054] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the descriptio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a pirate application detection method, device and system. The method comprises the following steps: inquiring a relevant application of a current application from a white list database, wherein the relevant application comprises any one same or similar application and an application which is the same with a developer in application characteristic information, and the application characteristic information comprises the name, the package name and the function of the application; storing more than one piece of legal copy application information in the white list database, wherein each piece of legal copy application information comprises the name, the package name, the signature, the version number and the developer information of at least one legal copy application; independently comparing the current application with each relevant application to obtain a similarity between the current application and each relevant application to obtain more than one similarity value; comparing whether a maximum similarity value in the more than one similarity value is greater than a preset minimum similarity threshold value or not; and if the maximum similarity value is greater than the preset minimum similarity threshold value, judging the current application is the legal copy application. The embodiment of the invention can detect the private application.

Description

technical field [0001] The invention relates to communication technology, in particular to a method, device and system for detecting pirated applications. Background technique [0002] The Android (Android) system has gradually developed into the most widely used operating system on mobile terminals at present, and at the same time, the number of applications based on the Android system is also very large. Compared with other mobile terminal operating systems, the Android system provides application developers with more functional interfaces, many of which at the bottom of the system improve the scalability of the system, but at the same time provide convenience for malicious applications. There are many distribution channels for Android system applications. At present, the cracking and piracy of Android-based applications on the market is serious. For a cracker, he only needs a few simple steps, and can tamper with an application and reinstall it in minutes. Pack. These p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/12
Inventor 冯成蹊吴磊
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products