Detection method and system for counterfeit mobile application and related product

A mobile application and detection method technology, which is applied in the field of mobile information security, can solve the problems of automatic identification and detection of counterfeit mobile applications, and achieve the effect of reducing manual intervention and ensuring accuracy and efficiency

Pending Publication Date: 2021-09-24
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of the problem that the existing mobile application detection and identification technology cannot effectively automatically identify and detect counterfeit mobile applications, the purpose of the present invention is to provide a detection method for counterfeit mobile applications, so as

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and system for counterfeit mobile application and related product
  • Detection method and system for counterfeit mobile application and related product
  • Detection method and system for counterfeit mobile application and related product

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0144] Example 1:

[0145]In this example, the automatic collection and update of the genuine information in the genuine application information base is realized.

[0146] Step 1: Define the crawler that collects APP data and which application dimension information needs to be extracted through the data collection strategy management module in this system.

[0147] Step 2: The genuine application information collection module regularly collects application information from third-party application markets and major official websites according to the collection strategy, including application name, package name, issuer, installation package, etc., and regularly reports the collection results to the administrator .

[0148] Step 3: According to manual settings, the genuine application information collection module regularly crawls third-party application markets and major official websites, and checks the version number. If the version number is updated, download it again, updat...

Example Embodiment

[0149] Example 2:

[0150] In this example, the counterfeiting detection and judgment of the mobile application package is implemented.

[0151] Step 1: The user uploads the mobile application installation package A, and the installation package enters the counterfeit mobile application analysis and determination module

[0152] Step 2: For the uploaded installation package A, perform static analysis and dynamic analysis, read the data of the genuine application information database, and use the counterfeit application judgment rule base for judgment. If the APP satisfies at least one of the first type of satisfaction conditions and the second type of satisfaction conditions, it enters the third type of satisfaction conditions to filter.

Example

[0153] Example 1: The user uploads the APP "Didi Finance", and there is "Didi Finance" in the genuine APP library, but the historical version number is different from the uploaded APP, and the uploaded APP logo has a low resolution, which is suspected to be a screenshot, so the output high counterfeiting score, It is determined to be a counterfeit APP.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method and system for a counterfeit mobile application and a related product, and the method comprises the steps: analyzing an obtained to-be-judged mobile application package, and obtaining the multi-dimensional attribute information of the mobile application package; judging whether the attribute information of the mobile application package is similar to corresponding genuine mobile application information stored in a genuine application information base or not; if yes, according to the judgment rules in the constructed counterfeit mobile application judgment rule base, carrying out counterfeit analysis and judgment on the obtained multi-dimensional static and/or dynamic attribute information of the mobile application package and the corresponding genuine mobile application package information in the genuine application information base. According to the scheme provided by the invention, automatic detection of the counterfeit mobile application can be realized, manual intervention is reduced, and the problems in the prior art can be effectively solved.

Description

technical field [0001] The invention relates to mobile information security technology, in particular to detection technology for mobile applications. Background technique [0002] With the development and popularization of the mobile Internet and smart terminals, there are a huge number of mobile applications emerging one after another, covering all aspects of life. [0003] At the same time, there is also a black industry chain in the development, production, and dissemination of mobile applications, such as generating illegal applications in batches, embedding false advertisements, stealing user privacy, and conducting fraudulent activities, etc. Big question. [0004] For this type of mobile application, the existing detection technology is mainly for dynamic and static detection of mobile applications, such as analyzing whether the application has obtained permissions that should not be obtained, whether there is malicious behavior, and whether it contains malicious co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06Q30/00
CPCG06F21/12G06Q30/0185
Inventor 孙文琦吴松洋俞诗博王娟
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products