Detection method and system for counterfeit mobile application and related product
A mobile application and detection method technology, which is applied in the field of mobile information security, can solve the problems of automatic identification and detection of counterfeit mobile applications, and achieve the effect of reducing manual intervention and ensuring accuracy and efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0144] Example 1:
[0145]In this example, the automatic collection and update of the genuine information in the genuine application information base is realized.
[0146] Step 1: Define the crawler that collects APP data and which application dimension information needs to be extracted through the data collection strategy management module in this system.
[0147] Step 2: The genuine application information collection module regularly collects application information from third-party application markets and major official websites according to the collection strategy, including application name, package name, issuer, installation package, etc., and regularly reports the collection results to the administrator .
[0148] Step 3: According to manual settings, the genuine application information collection module regularly crawls third-party application markets and major official websites, and checks the version number. If the version number is updated, download it again, updat...
Example Embodiment
[0149] Example 2:
[0150] In this example, the counterfeiting detection and judgment of the mobile application package is implemented.
[0151] Step 1: The user uploads the mobile application installation package A, and the installation package enters the counterfeit mobile application analysis and determination module
[0152] Step 2: For the uploaded installation package A, perform static analysis and dynamic analysis, read the data of the genuine application information database, and use the counterfeit application judgment rule base for judgment. If the APP satisfies at least one of the first type of satisfaction conditions and the second type of satisfaction conditions, it enters the third type of satisfaction conditions to filter.
Example
[0153] Example 1: The user uploads the APP "Didi Finance", and there is "Didi Finance" in the genuine APP library, but the historical version number is different from the uploaded APP, and the uploaded APP logo has a low resolution, which is suspected to be a screenshot, so the output high counterfeiting score, It is determined to be a counterfeit APP.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap