Detection method and system for counterfeit mobile application and related product

A mobile application and detection method technology, which is applied in the field of mobile information security, can solve the problems of automatic identification and detection of counterfeit mobile applications, and achieve the effect of reducing manual intervention and ensuring accuracy and efficiency

Pending Publication Date: 2021-09-24
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of the problem that the existing mobile application detection and identification technology cannot effectively automatically identify and detect counterfeit mobile applications, the purpose of the present invention is to provide a detection method for counterfeit mobile applications, so as to realize effective automatic detection and detection of counterfeit mobile applications. identification to ensure the security of mobile application information; on the basis of this, the present invention further provides a detection system capable of realizing the detection method and related products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and system for counterfeit mobile application and related product
  • Detection method and system for counterfeit mobile application and related product
  • Detection method and system for counterfeit mobile application and related product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0145]In this example, the automatic collection and updating of licensed information in the licensed application information database is realized.

[0146] Step 1: Through the data collection policy management module in this system, define the crawlers that collect APP data and which application dimension information needs to be extracted.

[0147] Step 2: The genuine application information collection module regularly collects application information in the third-party application market and major official websites according to the collection strategy, including application name, package name, publisher, installation package, etc., and regularly feedbacks the collection results to the administrator .

[0148] Step 3: The genuine application information collection module regularly and repeatedly crawls third-party application markets and major official websites according to manual settings, and checks the version number. If the version number is updated, re-download and update...

Embodiment 2

[0150] In this example, the counterfeit detection and judgment of the mobile application package is realized.

[0151] Step 1: The user uploads the mobile application installation package A, and the installation package enters the counterfeit mobile application analysis and determination module

[0152] Step 2: For the uploaded installation package A, perform static analysis and dynamic analysis, read the data in the genuine application information database, and use the counterfeit application determination rule base to determine. If the APP satisfies at least one of the first type of satisfaction conditions and the second type of satisfaction conditions, it will enter the filter of the third type of satisfaction conditions.

example 1

[0153] Example 1: The user uploaded the APP "DiDi Finance", and "DiDi Finance" exists in the genuine APP library, but the historical version number is different from that of the uploaded APP, and the uploaded APP logo has a low resolution, which is suspected to be a screenshot, so a high counterfeit score is output. It is judged as a counterfeit APP.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a detection method and system for a counterfeit mobile application and a related product, and the method comprises the steps: analyzing an obtained to-be-judged mobile application package, and obtaining the multi-dimensional attribute information of the mobile application package; judging whether the attribute information of the mobile application package is similar to corresponding genuine mobile application information stored in a genuine application information base or not; if yes, according to the judgment rules in the constructed counterfeit mobile application judgment rule base, carrying out counterfeit analysis and judgment on the obtained multi-dimensional static and / or dynamic attribute information of the mobile application package and the corresponding genuine mobile application package information in the genuine application information base. According to the scheme provided by the invention, automatic detection of the counterfeit mobile application can be realized, manual intervention is reduced, and the problems in the prior art can be effectively solved.

Description

technical field [0001] The invention relates to mobile information security technology, in particular to detection technology for mobile applications. Background technique [0002] With the development and popularization of the mobile Internet and smart terminals, there are a huge number of mobile applications emerging one after another, covering all aspects of life. [0003] At the same time, there is also a black industry chain in the development, production, and dissemination of mobile applications, such as generating illegal applications in batches, embedding false advertisements, stealing user privacy, and conducting fraudulent activities, etc. Big question. [0004] For this type of mobile application, the existing detection technology is mainly for dynamic and static detection of mobile applications, such as analyzing whether the application has obtained permissions that should not be obtained, whether there is malicious behavior, and whether it contains malicious co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06Q30/00
CPCG06F21/12G06Q30/0185
Inventor 孙文琦吴松洋俞诗博王娟
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products