Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for detecting apk file hijacking behavior

A document and behavior technology, applied in electrical components, telephone communication, security devices, etc., can solve problems such as effect error, decrease in calculation precision and accuracy, no advertising attribution calculation and channel index analysis.

Active Publication Date: 2020-05-01
北京热云科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of this method are 1. The patent does not reflect the application in the mobile Internet advertising industry, and there is no attribution calculation and channel index analysis for advertisements; 2. The simulated click event is not a click event actually reported by the user, and the calculation accuracy and accuracy 3. The abnormality judgment rules are not dynamic, and different customers and different apps use the product, and the effect will be inaccurate; 4. Lack of early warning mechanism, only for detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting apk file hijacking behavior
  • Method and system for detecting apk file hijacking behavior
  • Method and system for detecting apk file hijacking behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as figure 1 As shown, step 100 is executed to enter the information into the database. Information includes ad click data and app activation data. Such as figure 2 As shown, the method for obtaining advertisement click data includes the following steps: execute step 1a1, the user clicks on the advertisement; the user browses the advertisement in application A, and the advertisement is displayed to the user in application A by the advertisement platform A2 entrusted by the advertiser A1, and the user Interested in what the ad showed and clicked on the creative. Step 1a2 is executed, the background receives the click data; when the advertisement is clicked, a click URL is sent from the application A client, and the click URL carries the detailed information of the click on the advertisement. Step 1a3 is executed to attribute the click data, and extract the attribution data of the click end. Such as image 3 As shown, the method for obtaining App activation data...

Embodiment 2

[0085] Such as Figure 5 As shown, a system for detecting apk file hijacking behavior includes a database 200 , a hijacking working module 210 , an output module 220 and a display module 230 .

[0086] Database 200: for entering information. Information includes ad click data and app activation data. The method for obtaining advertisement click data includes the following steps: Step a1: the user clicks on the advertisement; the user browses the advertisement in application A, the advertisement is commissioned by the advertiser A1 to display the advertisement to the user in the application A by the advertising platform A2, and the user responds to the advertisement Interested in the displayed content and clicked on the corresponding creative. Step a2: The background receives the click data; when the advertisement is clicked, a click URL is sent from the application A client, and the click URL carries the detailed information of the click on the advertisement. Step a3: perfo...

Embodiment 3

[0091] Since the mobile application store is a sub-application under the mobile device manufacturer's system, other external company products or plug-ins, including advertisers and third-party statistical monitoring companies, have no right to perceive and detect the entire hijacking action scenario. The technical difficulty in solving this problem; and due to technical barriers, the existing technical logic of other companies related to the installation of hijacking detection has not been disclosed to the public, but in terms of product functions, it lacks real-time performance, high manslaughter rate, and lacks necessary The analysis dimension, these deficiencies, also makes it inefficient to install a hijack detection feature.

[0092] This application proposes a method for detecting apk file hijacking behavior, which solves the following technical problems:

[0093] 1. Attribute hijacking and the hijacked party, and associate it with the information of advertising activiti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for detecting an apk file hijacking behavior, and the method comprises inputting information into a database, and also comprises the following steps: judgingwhether an apk file is hijacked or not through a hijacking work module, outputting a judgment result, and graphically displaying the structured data to a UI interface. According to the method and system for detecting the apk file hijacking behavior, hijacking and hijacked parties are attributed, the hijacked parties are associated with advertisement putting activity information, hijacking actionsare detected, estimated and installed in real time, a judgment model is automatically corrected, and the mistaken killing rate is reduced.

Description

technical field [0001] The invention relates to the technical field of text word feature extraction, in particular to a method and system for detecting apk file hijacking behavior. Background technique [0002] With the popularity of smart phones, more and more software suppliers have developed a variety of software for mobile phones to download, and publicize through advertisements to guide customers to download applications through browsers. However, when many users download apps through their browsers and prepare to install them, a dialog box pops up on their mobile phones, prompting that the app is "unknown source" and is not downloaded from "official channels". There may be viruses or unsafe factors. It is recommended to download from "official channels" Download; or, after downloading, the system prompts that there is an ad plug-in marked as "potentially risky". After seeing similar prompts, most users will follow the guidance to download the application from the appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04W12/00H04W12/12H04W12/122H04W12/30
CPCH04M1/72406H04W12/30H04W12/68H04W12/128
Inventor 谭鑫白冬立
Owner 北京热云科技有限公司