Method and system for detecting apk file hijacking behavior
A document and behavior technology, applied in electrical components, telephone communication, security devices, etc., can solve problems such as effect error, decrease in calculation precision and accuracy, no advertising attribution calculation and channel index analysis.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] Such as figure 1 As shown, step 100 is executed to enter the information into the database. Information includes ad click data and app activation data. Such as figure 2 As shown, the method for obtaining advertisement click data includes the following steps: execute step 1a1, the user clicks on the advertisement; the user browses the advertisement in application A, and the advertisement is displayed to the user in application A by the advertisement platform A2 entrusted by the advertiser A1, and the user Interested in what the ad showed and clicked on the creative. Step 1a2 is executed, the background receives the click data; when the advertisement is clicked, a click URL is sent from the application A client, and the click URL carries the detailed information of the click on the advertisement. Step 1a3 is executed to attribute the click data, and extract the attribution data of the click end. Such as image 3 As shown, the method for obtaining App activation data...
Embodiment 2
[0085] Such as Figure 5 As shown, a system for detecting apk file hijacking behavior includes a database 200 , a hijacking working module 210 , an output module 220 and a display module 230 .
[0086] Database 200: for entering information. Information includes ad click data and app activation data. The method for obtaining advertisement click data includes the following steps: Step a1: the user clicks on the advertisement; the user browses the advertisement in application A, the advertisement is commissioned by the advertiser A1 to display the advertisement to the user in the application A by the advertising platform A2, and the user responds to the advertisement Interested in the displayed content and clicked on the corresponding creative. Step a2: The background receives the click data; when the advertisement is clicked, a click URL is sent from the application A client, and the click URL carries the detailed information of the click on the advertisement. Step a3: perfo...
Embodiment 3
[0091] Since the mobile application store is a sub-application under the mobile device manufacturer's system, other external company products or plug-ins, including advertisers and third-party statistical monitoring companies, have no right to perceive and detect the entire hijacking action scenario. The technical difficulty in solving this problem; and due to technical barriers, the existing technical logic of other companies related to the installation of hijacking detection has not been disclosed to the public, but in terms of product functions, it lacks real-time performance, high manslaughter rate, and lacks necessary The analysis dimension, these deficiencies, also makes it inefficient to install a hijack detection feature.
[0092] This application proposes a method for detecting apk file hijacking behavior, which solves the following technical problems:
[0093] 1. Attribute hijacking and the hijacked party, and associate it with the information of advertising activiti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


