Unlock instant, AI-driven research and patent intelligence for your innovation.

Application identification methods, application identification system and related equipment

A target application and terminal device technology, applied in the computer field, can solve problems such as difficult to continuously detect malicious applications, difficult to accurately and continuously identify terminal device application security, and fast virus mutation

Pending Publication Date: 2018-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, viruses in malicious applications mutate quickly and grow in large numbers. If the identification of malicious applications only depends on the number of blacklists in the cloud server, there is a lag in identifying malicious applications and it is difficult to effectively and continuously detect malicious applications.
[0004] It can be seen from the above that the identification accuracy rate of the application identification method based on the blacklist in the cloud server is low, and it is difficult to accurately and continuously identify the security of the application in the terminal device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application identification methods, application identification system and related equipment
  • Application identification methods, application identification system and related equipment
  • Application identification methods, application identification system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0144] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0145] See Figure 1a-Figure 1b , is a schematic diagram of a scenario of an application identification method provided by an embodiment of the present invention. Such as Figure 1a As shown, the server 10f is connected to the personal computer 10a, the personal computer 10b, the smart phone 10c, ..., the tablet computer 10d through the switch 10e. The log data of N malicious applications and the log data of N normal applications are stored in the server 10f. Inp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses application identification methods, an application identification system and related equipment. The method includes: obtaining a target log data set of a target application; generating a target time behavior vector, which corresponds to the target log data set, according to a service behavior type corresponding to each piece of log data in the target log data set; generating a target probability behavior vector, which corresponds to the target log data set, according to the service behavior type corresponding to each log data in the target log data set; extracting target time-sequence feature information of the target time behavior vector; extracting target space feature information of the target probability behavior vector; carrying out feature fusion on the target space feature information and the target time-sequence feature information to obtain target fusion feature information; and identifying the application security type of the target application according to the target fusion feature information. By using the method, accuracy of application identification can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an application identification method, system and related equipment. Background technique [0002] In recent years, the Android (Android) platform has become a very popular mobile phone operating system platform, and has occupied more than half of the mobile phone operating system market share in the world. With the popularization of Android smartphones and Android tablets, malicious applications based on Android are also developing rapidly. Malicious applications are aimed at destroying the system, stealing privacy, maliciously deducting fees, and consuming traffic. They are mainly divided into Trojan horses, backdoors, worms, botnets, offensive advertisements, spyware, etc. Malicious applications carry offensive operation instructions and cause huge damage to users. economic loss. [0003] The existing application identification method is mainly that the terminal dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/55
CPCG06F21/552G06F21/566G06F2221/033Y02D10/00
Inventor 雷经纬
Owner TENCENT TECH (SHENZHEN) CO LTD