CN103324697A - Method for removing copycatting applications in android application search and based on icon contrast - Google Patents

Method for removing copycatting applications in android application search and based on icon contrast Download PDF

Info

Publication number
CN103324697A
CN103324697A CN2013102247216A CN201310224721A CN103324697A CN 103324697 A CN103324697 A CN 103324697A CN 2013102247216 A CN2013102247216 A CN 2013102247216A CN 201310224721 A CN201310224721 A CN 201310224721A CN 103324697 A CN103324697 A CN 103324697A
Authority
CN
China
Prior art keywords
application
icon
prime
grabs
authentication database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102247216A
Other languages
Chinese (zh)
Other versions
CN103324697B (en
Inventor
王京
缪志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHANGHUI TIANXIA TECHNOLOGY Co Ltd
Original Assignee
BEIJING ZHANGHUI TIANXIA TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHANGHUI TIANXIA TECHNOLOGY Co Ltd filed Critical BEIJING ZHANGHUI TIANXIA TECHNOLOGY Co Ltd
Priority to CN201310224721.6A priority Critical patent/CN103324697B/en
Publication of CN103324697A publication Critical patent/CN103324697A/en
Application granted granted Critical
Publication of CN103324697B publication Critical patent/CN103324697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a method for removing copycatting applications in android application search. The method includes the following steps: capturing eligible applications through a crawler network, judging whether the captured eligible applications have identical icons with applications stored in an authentication database, judging the captured applications as copycatting applications if the applications with package names different from that of the captured applications but with icons identical with that of the captured applications exist in the database, judging the eligible applications as new applications otherwise; judging whether the captured eligible applications have identical signatures with the applications in the authentication database; judging the applications as an authorized edition on yes judgment and judging the applications as the copycatting applications on no judgment. The modes of package names, signatures and icon authentication are adopted in the method, and the copycatting applications in the search process are effectively removed.

Description

A kind of android application searches mountain vallage based on the icon contrast is used elimination method
Technical field
The present invention relates to a kind of search elimination method, particularly a kind of android application searches mountain vallage based on icon contrast and signature comparison is used elimination method.
Background technology
There is a serious problem at present in android application searches field, is exactly that the mountain vallage application emerges in an endless stream, and various application markets all exist a large number of users to seem similar (or identical) application that can't differentiate, make the user at a loss as to what to do; The generation person that mountain vallage is used has two kinds of main packing manner: the one, do not change former application bag name, and add malicious code and use afterwards own signature issue; The 2nd, revise and use the bag name, use simultaneously own signature issue.Even above the Google Play, also there is the mountain vallage software of many this forms, in the third party market, this problem is just general especially.In manual examination and verification, this problem can reasonable knowledge by the auditor manually be filtered in well-known especially application.But for not too well-known software, and in the whole network application crawl, owing to whether artificial or web crawlers all can't judge an application as the mountain vallage application take simple standard, so this problem is more thorny.
See also Chinese invention patent: " Webpage search method and apparatus ", application number: CN201210548469.X, disclose a kind of Webpage search method and apparatus, in the browser searches hurdle, loaded the search engine classification information that presets and generate the search engine list of categories; In browser searches hurdle input frame, receive the search key word of input; Reception is to the selection information of the search engine classification in the described search engine list of categories; Load search engine tabulation corresponding to selected search engine classification; Reception is to the selection information of the search engine in the described search engine tabulation, and the described search of foundation is initiated searching request with key word to selected search engine.Use search key to form the search engine tabulation in this patent, do not differentiate in search procedure and confirm, the information that retrieves very easily produces the similar information that can't differentiate.
In view of defects, creator of the present invention has obtained this creation finally through long research and practice.
Summary of the invention
The object of the present invention is to provide a kind of mountain vallage of android application searches to use elimination method, in order to overcome above-mentioned technological deficiency.
For achieving the above object, the mountain vallage that the invention provides a kind of android application searches is used elimination method, and it may further comprise the steps:
Step a grasps qualified application by the reptile network;
Step b, judge the qualified application that grabs among the above-mentioned steps a whether with authentication database in the application that exists have identical bag name; If there is identical bag name in the application that exists in the qualified application that grabs and the authentication database, then jump to following steps d; If do not exist, then jump to following step c;
Step c, judge this qualified application that grabs whether with authentication database in the application of storing have same icon, if there is application different from the application bag name that grabs but that icon is identical in the authentication database, it can be judged as mountain vallage and use, then jump to following step e; If do not exist, then this qualified application belongs to new application, jumps to following step f;
Steps d, judge this qualified application that grabs whether with authentication database in this application have identical signature; If the application of storing in the authentication database is all identical with the application Bao Mingyu signature that grabs, it can be judged as legal copy, jump to following step f; If the determination result is NO, it is judged as mountain vallage uses, jump to following step e;
Step e rejects this application that grabs from network, jump to following step h;
Step f is added into legal application references tabulation with this application that grabs;
Step g, the legal application references tabulation with obtaining among the above-mentioned steps f is sent to front end and presents to the user after arrangement;
Step h finishes.
Better, the forming process of described authentication database is:
Step b1 sends authentication request with the legal copy application that hope is included into authentication database to authentication database;
Step b2, described authentication database use the legal copy of filing a request and authenticate;
Step b3 will use by the legal copy of above-mentioned steps b2 authentication and resolve, and obtain legal author's signature;
Step b4 obtains legal application icon;
Step b5 obtains legal the application and wraps name and be stored in the authentication signature storehouse from authenticate legal the application;
Step b6 signs sequence code that through hash function computing becomes long string for storage with legal author and relatively, the form of digital signature with above-mentioned long string sequence code is stored in the authentication signature storehouse;
The bag name that step b7 uses all legal copies is stored to the authentication signature storehouse;
Step b8, the icon that all legal copies are used is stored to the application icon storehouse;
Step b9, the application icon that is stored to described application icon storehouse through above-mentioned steps b8 forms described application icon storehouse;
Step b10, process above-mentioned steps b7 is stored to the authentication signature in described authentication signature storehouse and the legal copy bag name of storage forms described authentication signature storehouse;
Step b11, described authentication signature storehouse and application icon storehouse form described authentication database.
Better, the process of icon contrast is among the described step c:
There is not identical bag name in the application that exists among the step c1, the application that grabs and authentication database;
Step c2 obtains the application icon that grabs;
Step c3, the application icon that above-mentioned steps c2 is grabbed is sent to the application icon storehouse and detects;
Step c4 detects the icon in all application icon storehouses; If have icon identical from the application icon that grabs, that the bag name is different in the authentication database, then jump to step c5; If do not exist, then jump to step c6;
Step c5 jumps to above-mentioned steps e;
Step c6 jumps to above-mentioned steps f.
Better, the process of signature comparison is in the described steps d:
There is identical bag name in the application that exists in the steps d 1, the application that searches out and authentication database;
Steps d 2 grasps the signature of this application that grabs;
Steps d 3 is sent to the censorship of authentication signature storehouse with the signing messages that described steps d 1 is obtained;
Steps d 4, the identical corresponding signature of bag name in the authentication database that in the authentication signature storehouse, detects among the above-mentioned steps d2 of location;
Steps d 5, whether the signature that detects 3 censorships of described steps d is identical with the authentication signature of location in the described steps d 4; If identical, then jump to following steps d 6; If different, then jump to following steps d 7;
Steps d 6 jumps to above-mentioned steps e;
Steps d 7 jumps to above-mentioned steps f.
Better, among the above-mentioned steps a, input keyword by the user at front end, the keyword that the network based user of described reptile inputs is to searching in the network-wide basis, and the android that crawl meets the keyword condition uses and forms preliminary tabulation.
Better, the process that among the above-mentioned steps c icon in all application icon storehouses is compared adopts the method for template matches to compare, and its process is:
Step c11 is with the icon unified size of the icon in the authentication database with the application that grabs;
Step c12, the average color of the icon of the icon in the more described authentication database and the application that grabs, if average color difference then jumps to following step c13 less than a preset value k (k>0), otherwise, jump to above-mentioned steps e;
Step c13, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of the multiply operation of standard relevant matches 1If, R 1Greater than a predetermined threshold value K 1(K 1〉=0), then carries out following step c14; If not, then jump to above-mentioned steps e;
Step c14, the icon of the icon in the more described authentication database and the application that grabs calculates matching degree R based on the template matches to the multiply operation of the relative value of average of standard relevant matches 2If, R 2Greater than a predetermined threshold value K 2(K 2〉=0), then carries out following step c15; If not, then jump to above-mentioned steps e;
Step c15, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of standard difference of two squares coupling 3If, R 3Greater than a predetermined threshold value K 3(K 3〉=0), then jumps device above-mentioned steps f; If not, then jump to above-mentioned steps e.
Better, matching degree R among the above-mentioned steps c13 1, calculate according to following formula (1),
R 1 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) * I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 1 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs;
Matching degree R among the above-mentioned steps c14 2, calculate according to following formula (2),
R 2 ( x , y ) = Σ x ′ , y ′ ( T ′ ( x ′ , y ′ ) * I ′ ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ′ ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ′ ( x + x ′ , y + y ′ ) 2 - - - ( 2 )
Wherein, T ' and I ' are defined by following formula (3), (4),
T′(x′,y′)=T(x′,y′)-1/(w·h)·∑ x″,y″T(x″,y″) (3)
I′(x+x′,y+y′)=I(x+x′,y+y′)-1/(w·h)·∑ x″,y″T(x+x″,y+y″) (4)
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; X "; y " the transverse and longitudinal coordinate figure of the truncated picture of the icon of the application that grabs of expression respectively, w represents the width of truncated picture, h represents the height of truncated picture, T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs;
Matching degree R among the above-mentioned steps c15 3, calculate according to following formula (5),
R 3 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) - I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 5 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs.
Better, described preset value k is 10 degree; Described threshold k 1Value is 0.99; Described threshold k 2Value is 0.95; Described threshold k 3Value is 0.01.
Better, described authentication database comprises an authentication signature storehouse and an application icon storehouse, the bag name in the described authentication signature storehouse and signature are corresponding one by one.
Better, the executive routine of the deterministic process of above-mentioned bag name, signature and icon is stored in the contrast device, and described contrast device obtains respectively bag name, signature, the icon information that treating in the reptile network grasped the application in application and the authentication database; And result transferred in the index data base, form described legal application references tabulation, after arrangement, be sent to front end.
Beneficial effect of the present invention is compared with the prior art: android of the present invention uses the mountain vallage of crawl and uses elimination method, the application of needs crawl is successively wrapped name respectively at the application in the authentication database, signature, the comparison of icon, can differentiate effectively that the application that grabs belongs to the mountain vallage application of legal copy being used modification bag name, what perhaps grab is applied as brand-new application, the application that perhaps grabs belong to inherit original bag name to legal copy application carry out mountain vallage, perhaps exist application identical with the application bag name that grabs in the authentication database, the multiple situation that the mountain vallage of signing different is used, through three kinds of different way of contrast, effectively reject mountain vallage and use; In deterministic process, it is with reference to a preformed authentication database, and this authentication database comprises application icon storehouse and authentication signature storehouse, and described icon authentication and signature authentication can be carried out in order.
Description of drawings
Fig. 1 is the process flow diagram that the mountain vallage of android application searches of the present invention is used elimination method the first embodiment;
Fig. 2 is the process flow diagram that the mountain vallage of android application searches of the present invention is used the authentication database implementation procedure of elimination method;
Fig. 3 is the process flow diagram that the mountain vallage of android application searches of the present invention is used the icon contrast implementation method of elimination method;
The do mountain vallage of android application searches of the present invention of Fig. 4 is used the process flow diagram of icon template matches process in the elimination method;
Fig. 5 is the process flow diagram that the mountain vallage of android application searches of the present invention is used the signature comparison implementation method of elimination method.
Embodiment
Below in conjunction with accompanying drawing, be described in more detail with other technical characterictic and advantage the present invention is above-mentioned.
Embodiment one:
Android application searches mountain vallage of the present invention is used elimination method and can be realized according to the following steps:
See also shown in Figure 1ly, it uses the process flow diagram of elimination method the first embodiment for the mountain vallage of android application searches of the present invention, and this process is:
Step a101: grasp qualified application by the reptile network, be specially: the user inputs keyword at front end, and the reptile network grabs the android that meets the keyword condition and uses and form preliminary tabulation;
Step a102: judge the application grab whether with authentication database in the application that exists have identical bag name, to deliver to successively authentication database through the application in the formed tabulation of described step a101, the bag name that use in the full storehouse of Bao Mingyu of the application that grabs is compared, judge whether to exist identical bag name; If there is identical bag name in the application that exists in the application that grabs and the authentication database, then jump to step a104; If do not exist, then jump to step a103; Authentication database in this invention comprises an application icon storehouse and an authentication signature storehouse, and wherein, the bag name in the described authentication signature storehouse and signature are corresponding one by one.
Step a103: judge this application that grabs whether with authentication database in the application that exists have same icon, be specially, if do not have identical bag name through described step a102 judgement, then the icon of the application that grabs is further judged, if judged result is yes, there is application different from the application bag name that grabs but that icon is identical in the authentication authorization and accounting database, it can be judged as mountain vallage and uses, then jump to step a105; If do not exist, there is also different situation of, icon different from the application bag name that grabs in the authentication authorization and accounting database, belong to new application, then jump to step a106;
Step a104: judge this application that grabs whether with authentication database in this application have identical signature; If have identical bag name through described step 102 judgement, then the signature of the application that grabs is further judged, if judged result is yes, is existed in the authentication authorization and accounting database to use and sign all identical with the application Bao Mingyu that grabs, it can be judged as legal copy, jump to step a106;
If there is identical bag name in judgement through step a102, then the signature of the application that grabs is further judged, if the determination result is NO, and exist in the authentication database use identical from the application bag name that grabs, sign different, it can be judged as mountain vallage, jump to step a106.
Step a105: will be judged to be through above-mentioned steps a102, a103, a104 step that bag name is identical, signature is different, perhaps the bag name is different, icon is identical, and the application that then this is grabbed is rejected from network;
Step a106: will be judged to be through above-mentioned steps a102, a103, a104 step that bag name is identical, signature is identical, perhaps the bag name is different, icon is different, and the application that then this is grabbed is added into legal application references tabulation;
Step a107: the legal application references tabulation by above-mentioned steps a101, a102, a103, a104, a106 screening obtain is sent to front end and presents to the user after arrangement.
Use by the mountain vallage that above-mentioned steps a101, a102, a103, a104, a105 screening are rejected, will delete fully from application network, crawled engine does not grab again again.
See also shown in Figure 2ly, it uses the process flow diagram of the authentication database forming process of elimination method for the mountain vallage of android application searches of the present invention, and this process is:
Step a201: legal application request authentication; Be specially, the legal copy application of wishing to be included into authentication database is sent authentication request to authentication database;
Step a202: authentication database is used the legal copy of filing a request and is authenticated; Be specially, authentication database at first detects this application, and whether legal copy is used, and carries out respectively following step a203, a204, a205;
Step a203: obtain legal author's signature; Be specially, resolve this application after the described step 202 by the legal copy authentication, obtain legal author's signature;
Step a204: obtain legal application icon; Be specially, from obtaining legal application icon and be stored in the application icon storehouse the authentication application;
Step a205: obtain legal bag name; Be specially, from authenticate legal the application, obtain legal the application and wrap name and be stored in the authentication signature storehouse;
Step a206: become sequence code through the hash function computing; Be specially and obtain after the legal author of the application signature, legal author is signed, and computing becomes the sequence code of long string for storing and relatively, the form of digital signature with above-mentioned long string sequence code being stored in the authentication signature storehouse through hash function;
Step a207: be stored to the authentication signature storehouse; Be specially, the bag name that all legal copies are used is stored to the authentication signature storehouse;
Step a208: be stored to the application icon storehouse; Be specially, the icon that all legal copies are used is stored to the application icon storehouse;
Step a209: form the application icon storehouse; Be specially, the application icon that is stored to the application icon storehouse through step 208 forms the application icon storehouse;
Step a210: form the authentication signature storehouse; Be specially, be stored to the authentication signature in authentication signature storehouse and the legal copy bag name formation authentication signature storehouse of storage through step 207;
Step a211: form authentication database, be specially, authentication signature storehouse and application icon storehouse form authentication database.
Step a103: judge this application that grabs whether with authentication database in the application that exists have same icon, be specially, if do not have identical bag name through described step a102 judgement, then the icon of the application that grabs is further judged, if judged result is yes, there is application different from the application bag name that grabs but that icon is identical in the authentication authorization and accounting database, it can be judged as mountain vallage and uses, then jump to step a105; If do not exist, there is also different situation of, icon different from the application bag name that grabs in the authentication authorization and accounting database, belong to new application, then jump to step a106;
See also shown in Figure 3ly, it uses the process flow diagram of the icon contrast implementation method of elimination method for mountain vallage of android application searches of the present invention;
Step a300: there is not identical bag name in the application that exists in the application that grabs and the authentication database;
Step a301: obtain the application icon that grabs, be specially, if judged result for do not detect with authentication database in have the application of identical bag name, the application icon that then grabs;
Step a302: to the censorship of application icon storehouse, be specially, the application icon that described step a301 is grabbed is sent to the application icon storehouse and detects;
Step a303: image detection: template matches whether, be specially, icon in all application icon storehouses is detected, scope is all application icons in the application icon storehouse, use the method for template matches to detect in the present embodiment, the icon of all application icons in the authentication database and this crawl application is compared one by one; Be specially, if mate through step a303 testing result, then exist one to use and the application that grabs in the authentication database, there is the situation that icon is identical, the bag name is different, can assert, this application that grabs belongs to uses the mountain vallage application of revising the bag name to legal copy, and it is judged to be mountain vallage and jumps to step a304; If testing result is not mated, then existingly in this application that grabs and the authentication database use that the bag name is not identical, icon is not identical yet, belongs to brand-new application, do not belong to mountain vallage and jump to step a305;
Step a304: the application that then this is grabbed is rejected (with above-mentioned step a105) and is jumped to step a105 from network;
Step a305: the application that then this is grabbed is added into legal application references tabulation (with above-mentioned step a105).
Wherein, after described step a302, step a303 step, also can add the step of the application that grabs being carried out signature detection.
See also shown in Figure 4ly, it uses the process flow diagram of icon template matches process in the elimination method for the mountain vallage of android application searches of the present invention, and among the above-mentioned steps a303, the process that the described icon that grabs and the icon in the authentication database carry out template is:
Step a41 is with the icon unified size of the icon in the authentication database with the application that grabs; Its size is decided according to predefined numerical value;
Step a42, the average color of the icon of the icon in the more described authentication database and the application that grabs, if average color difference then jumps to following step a43 less than a preset value k (k>0), otherwise, jump to above-mentioned steps a304; In the present embodiment, this preset value k is 10 degree;
Step a43, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of the multiply operation of standard relevant matches 1If, R 1Greater than a predetermined threshold value K 1, then carry out following step a44; If not, then jump to step a46; This threshold k in the present embodiment 1(K 1〉=0) value is 0.99;
Above-mentioned calculating matching degree R 1Carry out according to following formula (1),
R 1 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) * I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 1 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, x ', y ' represents respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database, and T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs.
Step a44, the icon of the icon in the more described authentication database and the application that grabs calculates matching degree R based on the template matches to the multiply operation of the relative value of average of standard relevant matches 2If, R 2Greater than a predetermined threshold value K 2(K 2〉=0), then carries out following step a45; If not, then jump to step a46; This threshold k in the present embodiment 2Value is 0.95;
Above-mentioned calculating matching degree R 2Carry out according to following formula (2),
R 2 ( x , y ) = Σ x ′ , y ′ ( T ′ ( x ′ , y ′ ) * I ′ ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ′ ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ′ ( x + x ′ , y + y ′ ) 2 - - - ( 2 )
Wherein, T ' and I ' are defined by following formula (3), (4),
T′(x′,y′)=T(x′,y′)-1/(w·h)·∑ x″,y″T(x″,y″) (3)
I′(x+x′,y+y′)=I(x+x′,y+y′)-1/(w·h)·∑ x″,y″T(x+x″,y+y″) (4)
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; X "; y " the transverse and longitudinal coordinate figure of the truncated picture of the icon of the application that grabs of expression respectively, w represents the width of truncated picture, h represents the height of truncated picture, T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs.
Step a45, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of standard difference of two squares coupling 3If, R 3Greater than a predetermined threshold value K 3(K 3〉=0), then jumps device above-mentioned steps a305; If not, then jump to step a46; This threshold k in the present embodiment 3Value is 0.01;
Above-mentioned calculating matching degree R 3Carry out according to following formula (5),
R 3 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) - I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 5 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, x ', y ' represents respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database, and T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs.
Step a46 jumps to above-mentioned steps a304;
Step a47 jumps to above-mentioned steps a305.
After the described icon that grabs and the icon in the authentication database carry out above-mentioned template matches, can conclude then whether this application program that grabs is brand-new application program.
See also shown in Figure 5ly, it uses the process flow diagram of the signature comparison implementation method of elimination method for the mountain vallage of android application searches of the present invention.
Step a400: the application that grabs judges via authentication database, exist with authentication database in the application of institute's authentication store have identical bag name;
Step a401: if judged result for detect with authentication database in exist identical bag name to use, then grasp the signature of this application that grabs;
Step a402: the signing messages that described step 401 is obtained is sent to the censorship of authentication signature storehouse;
Step a403: the identical corresponding signature of bag name in the authentication database that in the authentication signature storehouse, detects in the positioning step 102;
Step a404: whether the signature that detects described step 402 censorship is identical with the authentication signature of location in the described step 403; If described step 402 testing result is different, then existing in the authentication database, authentication application has identical bag name and different signatures from the application that grabs, can assert, the application that grabs belongs to the original bag name of succession and legal copy is used the method for carrying out mountain vallage, because it can't copy original author's signature, so by this kind method it is identified, if testing result is identical for the bag name, signature is different, and jumps to step a405; If step 402 testing result is identical, have in the authentication database then that authentication application has identical bag name and signature with the application that grabs, then can judge the legal copy that is applied as that grabs, and jump to step a406;
Step a405: jump to following step a105;
Step a406: jump to following step a106;
Wherein, after above-mentioned steps a402, a403, a404, also can add the step of the application that grabs being carried out the icon detection.
In the present invention, the executive routine of the deterministic process of above-mentioned bag name, signature and icon is stored in the contrast device, and described contrast device obtains respectively bag name, signature, the icon information that treating in the reptile network grasped the application in application and the authentication database; And result transferred in the index data base, form described legal application references tabulation, after arrangement, be sent to front end.
The above only is preferred embodiment of the present invention, only is illustrative for invention, and nonrestrictive.Those skilled in the art is understood, and can carry out many changes to it in the spirit and scope that the invention claim limits, revise, even equivalence, but all will fall within the scope of protection of the present invention.

Claims (10)

1. the mountain vallage of an android application searches is used elimination method, it is characterized in that, it may further comprise the steps:
Step a grasps qualified application by the reptile network;
Step b, judge the qualified application that grabs among the above-mentioned steps a whether with authentication database in the application that exists have identical bag name; If there is identical bag name in the application that exists in the qualified application that grabs and the authentication database, then jump to following steps d; If do not exist, then jump to following step c;
Step c, judge this qualified application that grabs whether with authentication database in the application of storing have same icon, if there is application different from the application bag name that grabs but that icon is identical in the authentication database, it can be judged as mountain vallage and use, then jump to following step e; If do not exist, then this qualified application belongs to new application, jumps to following step f;
Steps d, judge this qualified application that grabs whether with authentication database in this application have identical signature; If the application of storing in the authentication database is all identical with the application Bao Mingyu signature that grabs, it can be judged as legal copy, jump to following step f; If the determination result is NO, it is judged as mountain vallage uses, jump to following step e;
Step e rejects this application that grabs from network, jump to following step h;
Step f is added into legal application references tabulation with this application that grabs;
Step g, the legal application references tabulation with obtaining among the above-mentioned steps f is sent to front end and presents to the user after arrangement;
Step h finishes.
2. the mountain vallage of android application searches according to claim 1 is used elimination method, it is characterized in that, the forming process of described authentication database is:
Step b1 sends authentication request with the legal copy application that hope is included into authentication database to authentication database;
Step b2, described authentication database use the legal copy of filing a request and authenticate;
Step b3 will use by the legal copy of above-mentioned steps b2 authentication and resolve, and obtain legal author's signature;
Step b4 obtains legal application icon;
Step b5 obtains legal the application and wraps name and be stored in the authentication signature storehouse from authenticate legal the application;
Step b6 signs sequence code that through hash function computing becomes long string for storage with legal author and relatively, the form of digital signature with above-mentioned long string sequence code is stored in the authentication signature storehouse;
The bag name that step b7 uses all legal copies is stored to the authentication signature storehouse;
Step b8, the icon that all legal copies are used is stored to the application icon storehouse;
Step b9, the application icon that is stored to described application icon storehouse through above-mentioned steps b8 forms described application icon storehouse;
Step b10, process above-mentioned steps b7 is stored to the authentication signature in described authentication signature storehouse and the legal copy bag name of storage forms described authentication signature storehouse;
Step b11, described authentication signature storehouse and application icon storehouse form described authentication database.
3. the mountain vallage of android application searches according to claim 2 is used elimination method, it is characterized in that, the process of icon contrast is among the described step c:
There is not identical bag name in the application that exists among the step c1, the application that grabs and authentication database;
Step c2 obtains the application icon that grabs;
Step c3, the application icon that above-mentioned steps c2 is grabbed is sent to the application icon storehouse and detects;
Step c4 detects the icon in all application icon storehouses; If have icon identical from the application icon that grabs, that the bag name is different in the authentication database, then jump to step c5; If do not exist, then jump to step c6;
Step c5 jumps to above-mentioned steps e;
Step c6 jumps to above-mentioned steps f.
According to claim 2 or the mountain vallage of 3 described android application searches use elimination method, it is characterized in that, the process of signature comparison is in the described steps d:
There is identical bag name in the application that exists in the steps d 1, the application that searches out and authentication database;
Steps d 2 grasps the signature of this application that grabs;
Steps d 3 is sent to the censorship of authentication signature storehouse with the signing messages that described steps d 1 is obtained;
Steps d 4, the identical corresponding signature of bag name in the authentication database that in the authentication signature storehouse, detects among the above-mentioned steps d2 of location;
Steps d 5, whether the signature that detects 3 censorships of described steps d is identical with the authentication signature of location in the described steps d 4; If identical, then jump to following steps d 6; If different, then jump to following steps d 7;
Steps d 6 jumps to above-mentioned steps e;
Steps d 7 jumps to above-mentioned steps f.
5. the mountain vallage of android application searches according to claim 1 and 2 is used delet method, it is characterized in that, among the above-mentioned steps a, input keyword by the user at front end, the keyword that the network based user of described reptile inputs is to searching in the network-wide basis, and the android that crawl meets the keyword condition uses and form preliminary tabulation.
6. the mountain vallage of android application searches according to claim 1 is used delet method, it is characterized in that, the process that among the above-mentioned steps c icon in all application icon storehouses is compared adopts the method for template matches to compare, and its process is:
Step c11 is with the icon unified size of the icon in the authentication database with the application that grabs;
Step c12, the average color of the icon of the icon in the more described authentication database and the application that grabs, if average color difference then jumps to following step c13 less than a preset value k (k>0), otherwise, jump to above-mentioned steps e;
Step c13, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of the multiply operation of standard relevant matches 1If, R 1Greater than a predetermined threshold value K 1(K 1〉=0), then carries out following step c14; If not, then jump to above-mentioned steps e;
Step c14, the icon of the icon in the more described authentication database and the application that grabs calculates matching degree R based on the template matches to the multiply operation of the relative value of average of standard relevant matches 2If, R 2Greater than a predetermined threshold value K 2(K 2〉=0), then carries out following step c15; If not, then jump to above-mentioned steps e;
Step c15, the icon of the icon in the more described authentication database and the application that grabs calculate matching degree R based on the template matches of standard difference of two squares coupling 3If, R 3Greater than a predetermined threshold value K 3(K 3〉=0), then jumps device above-mentioned steps f; If not, then jump to above-mentioned steps e.
7. the mountain vallage of android application searches according to claim 6 is used delet method, it is characterized in that matching degree R among the above-mentioned steps c13 1, calculate according to following formula (1),
R 1 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) * I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 1 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs;
Matching degree R among the above-mentioned steps c14 2, calculate according to following formula (2),
R 2 ( x , y ) = Σ x ′ , y ′ ( T ′ ( x ′ , y ′ ) * I ′ ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ′ ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ′ ( x + x ′ , y + y ′ ) 2 - - - ( 2 )
Wherein, T ' and I ' are defined by following formula (3), (4),
T′(x′,y′)=T(x′,y′)-1/(w·h)·∑ x″,y″T(x″,y″) (3)
I′(x+x′,y+y′)=I(x+x′,y+y′)-1/(w·h)·∑ x″,y″T(x+x″,y+y″) (4)
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; X "; y " the transverse and longitudinal coordinate figure of the truncated picture of the icon of the application that grabs of expression respectively, w represents the width of truncated picture, h represents the height of truncated picture, T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs;
Matching degree R among the above-mentioned steps c15 3, calculate according to following formula (5),
R 3 ( x , y ) = Σ x ′ , y ′ ( T ( x ′ , y ′ ) - I ( x + x ′ , y + y ′ ) ) Σ x ′ , y ′ T ( x ′ , y ′ ) 2 * Σ x ′ , y ′ I ( x + x ′ , y + y ′ ) 2 - - - ( 5 )
In the formula, x, y represent respectively the transverse and longitudinal coordinate figure of the icon of the application that grabs, and x ', y ' represent respectively the transverse and longitudinal coordinate figure of the icon in the described authentication database; T represents the pixel computing of the icon in the authentication database, and I represents the pixel computing of the icon of the application that grabs.
8. the mountain vallage of android application searches according to claim 6 is used elimination method, it is characterized in that, described preset value k is 10 degree; Described threshold k 1Value is 0.99; Described threshold k 2Value is 0.95; Described threshold k 3Value is 0.01.
9. the mountain vallage of android application searches according to claim 1 and 2 is used elimination method, it is characterized in that, described authentication database comprises an authentication signature storehouse and an application icon storehouse, and the bag name in the described authentication signature storehouse and signature are corresponding one by one.
10. the mountain vallage of android application searches according to claim 1 and 2 is used elimination method, it is characterized in that, the executive routine of the deterministic process of above-mentioned bag name, signature and icon is stored in the contrast device, and described contrast device obtains respectively bag name, signature, the icon information that treating in the reptile network grasped the application in application and the authentication database; And result transferred in the index data base, form described legal application references tabulation, after arrangement, be sent to front end.
CN201310224721.6A 2013-06-07 2013-06-07 A kind of android application searches mountain vallage application elimination method based on icon contrast Active CN103324697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310224721.6A CN103324697B (en) 2013-06-07 2013-06-07 A kind of android application searches mountain vallage application elimination method based on icon contrast

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310224721.6A CN103324697B (en) 2013-06-07 2013-06-07 A kind of android application searches mountain vallage application elimination method based on icon contrast

Publications (2)

Publication Number Publication Date
CN103324697A true CN103324697A (en) 2013-09-25
CN103324697B CN103324697B (en) 2016-08-24

Family

ID=49193440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310224721.6A Active CN103324697B (en) 2013-06-07 2013-06-07 A kind of android application searches mountain vallage application elimination method based on icon contrast

Country Status (1)

Country Link
CN (1) CN103324697B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133832A (en) * 2014-05-15 2014-11-05 腾讯科技(深圳)有限公司 Pirate application identification method and device
CN104298522A (en) * 2014-09-22 2015-01-21 联想(北京)有限公司 Information processing method and first electronic device
CN104462879A (en) * 2014-11-28 2015-03-25 北京奇虎科技有限公司 Root-free running control method and device of application program
CN105574186A (en) * 2015-12-21 2016-05-11 广州爱九游信息技术有限公司 Application matching method and application matching device
CN105825084A (en) * 2015-01-06 2016-08-03 阿里巴巴集团控股有限公司 Method for matching detection of object having images
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN107220527A (en) * 2017-04-18 2017-09-29 努比亚技术有限公司 One kind application discriminating method and application management equipment
CN108920909A (en) * 2018-06-30 2018-11-30 平安科技(深圳)有限公司 Counterfeit mobile applications method of discrimination and system
CN109726294A (en) * 2018-12-04 2019-05-07 北京奇艺世纪科技有限公司 A kind of App entity alignment schemes, device and electronic equipment
CN110704104A (en) * 2019-10-14 2020-01-17 北京智游网安科技有限公司 Application counterfeit detection method, intelligent terminal and storage medium
CN112149101A (en) * 2019-06-28 2020-12-29 北京智明星通科技股份有限公司 False game APP identification method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009069959A (en) * 2007-09-11 2009-04-02 Hitachi Information Systems Ltd Software management system, method, and program
CN102222199A (en) * 2011-06-03 2011-10-19 奇智软件(北京)有限公司 Method and system for identifying identification of application program
CN102254113A (en) * 2011-06-27 2011-11-23 深圳市安之天信息技术有限公司 Method and system for detecting and intercepting malicious code of mobile terminal
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009069959A (en) * 2007-09-11 2009-04-02 Hitachi Information Systems Ltd Software management system, method, and program
CN102222199A (en) * 2011-06-03 2011-10-19 奇智软件(北京)有限公司 Method and system for identifying identification of application program
CN102254113A (en) * 2011-06-27 2011-11-23 深圳市安之天信息技术有限公司 Method and system for detecting and intercepting malicious code of mobile terminal
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104133832B (en) * 2014-05-15 2016-07-13 腾讯科技(深圳)有限公司 The recognition methods of pirate application and device
CN104133832A (en) * 2014-05-15 2014-11-05 腾讯科技(深圳)有限公司 Pirate application identification method and device
CN104298522A (en) * 2014-09-22 2015-01-21 联想(北京)有限公司 Information processing method and first electronic device
CN104298522B (en) * 2014-09-22 2018-08-31 联想(北京)有限公司 A kind of information processing method and the first electronic equipment
CN104462879B (en) * 2014-11-28 2018-04-17 北京奇虎科技有限公司 Application program exempts from Root progress control methods and device
CN104462879A (en) * 2014-11-28 2015-03-25 北京奇虎科技有限公司 Root-free running control method and device of application program
CN105825084A (en) * 2015-01-06 2016-08-03 阿里巴巴集团控股有限公司 Method for matching detection of object having images
CN105825084B (en) * 2015-01-06 2019-10-18 阿里巴巴集团控股有限公司 Method for carrying out matching detection to the object with image
CN105989251B (en) * 2015-02-12 2019-03-29 卓望数码技术(深圳)有限公司 A kind of piracy Android application discriminating method and pirate Android application discrimination system
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system
CN105574186A (en) * 2015-12-21 2016-05-11 广州爱九游信息技术有限公司 Application matching method and application matching device
CN105574186B (en) * 2015-12-21 2019-02-15 广州爱九游信息技术有限公司 Using matching process and device
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
US11188635B2 (en) 2016-05-24 2021-11-30 Tencent Technology (Shenzhen) Company Limited File authentication method and apparatus
CN107220527A (en) * 2017-04-18 2017-09-29 努比亚技术有限公司 One kind application discriminating method and application management equipment
CN108920909A (en) * 2018-06-30 2018-11-30 平安科技(深圳)有限公司 Counterfeit mobile applications method of discrimination and system
WO2020000752A1 (en) * 2018-06-30 2020-01-02 平安科技(深圳)有限公司 Counterfeit mobile application program determination method and system
CN108920909B (en) * 2018-06-30 2022-04-15 平安科技(深圳)有限公司 Counterfeit mobile application program discrimination method and system
CN109726294A (en) * 2018-12-04 2019-05-07 北京奇艺世纪科技有限公司 A kind of App entity alignment schemes, device and electronic equipment
CN112149101A (en) * 2019-06-28 2020-12-29 北京智明星通科技股份有限公司 False game APP identification method and system
CN110704104A (en) * 2019-10-14 2020-01-17 北京智游网安科技有限公司 Application counterfeit detection method, intelligent terminal and storage medium
CN110704104B (en) * 2019-10-14 2023-10-03 北京智游网安科技有限公司 Application counterfeiting detection method, intelligent terminal and storage medium

Also Published As

Publication number Publication date
CN103324697B (en) 2016-08-24

Similar Documents

Publication Publication Date Title
CN103324697A (en) Method for removing copycatting applications in android application search and based on icon contrast
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
CN106022079B (en) A kind of unlocked by fingerprint method and terminal
KR101556599B1 (en) Pattern Inputting Apparatus and Method, and Recording Medium Using the Same
CN104065715B (en) A kind of method and cloud platform of the resource-sharing based on cloud platform
CN108985064B (en) Method and device for identifying malicious document
CN107104973A (en) The method of calibration and device of user behavior
CN107113183A (en) The controlled shared system and method for big data
CN105024987B (en) A kind of monitoring method and device of web business diaries
CN109376078A (en) Test method, terminal device and the medium of mobile application
CN110688643A (en) Processing method for platform identity identification and authority authentication
CN109800575B (en) Security detection method for Android application program
CN106682906A (en) Risk identification and business processing method and device
CN104346550A (en) Information processing method and electronic equipment
CN106650454A (en) SQL injection attack detection method and apparatus
US9378358B2 (en) Password management system
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
Buriro et al. SWIPEGAN: swiping data augmentation using generative adversarial networks for smartphone user authentication
CN110493229A (en) Service request processing method, apparatus and system
US20170004026A1 (en) Monitoring method
CN112671724B (en) Terminal security detection analysis method, device, equipment and readable storage medium
CN109214179A (en) A kind of program module safety detection method and device
CN109002441A (en) Determination method, the exception of Apply Names similarity apply detection method and system
CN114417425B (en) Document security preview and tracing method based on OAuth
CN109413048A (en) Software approach, electronic equipment and program product are extorted based on the detection of file type honey jar

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant