APP brush user recognition method and device based on Android system, and storage medium
A user identification, Android system technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as the inability to prevent users from brushing points, the inability to recognize the running space of the machine, and the inability to recognize virtual containers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0042] In view of the current phenomenon that APP users frequently use APP points to make money, APP operators have been working on how to prevent this phenomenon from happening. APP operators usually limit a mobile device to one user at most when designing user login. But some users bypass this mechanism by forging unique device identifiers. The unique identifier of the Android device, such as IMEI, Android Id, etc.
[0043] In terms of forging the unique identification code of the device, it is the most convenient and the lowest cost to use the simulator directly. Therefore, the identification of brush users (users with the purpose of earning money by swiping APP points) in the traditional sense is mainly to detect whether the APP is running on the emulator. This technology mainly uses static feature value identification to determine whether the APP is running on the simulator. If it is found that the APP is running on the emulator, it is considered that the user has abno...
Embodiment 2
[0069] The method described in the first embodiment above identifies the brush user by detecting the characteristic value of the virtual container on the mobile terminal device (such as a mobile phone) of the Android system or the abnormality of the call stack to identify the brush user. This embodiment also provides a method for identifying the brush user. Methods:
[0070] Obtain the digital signature of the target APP when it is running, and perform signature verification; if the verification fails, it is determined that the target APP is abnormal, and the user who logs in to the target APP is a brush user.
[0071] The APP operator can add a signature when designing the APP, read the signature of the target APP at the C++ layer when the target APP starts, verify the read APP signature, and judge whether it is the signature of the APP operator. Since the APP operator's own signature is kept confidential to the outside world, others do not know. If the read APP signature is...
Embodiment 3
[0074] The present invention also provides an APP brush user identification device based on the Android system, please refer to Figure 4 , the device consists of:
[0075] Xposed framework implantation judging module 1: used to detect whether the running space of the target APP has been implanted with the Xposed framework by the virtual container, and if so, determine that the user who logs in the target APP is a brush user; the virtual container is a multi-opening assistant class software;
[0076] Main thread running space detection module 2: used to detect whether the main thread of the target APP is running in the virtual container space; if so, it is determined that the user logging into the target APP is a brush user.
[0077] Specifically, the Xposed framework implantation judging module 1 judges whether the running space of the target APP is implanted with the Xposed framework by the virtual container by loading the feature value of the Xposed framework when the targ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


