CN104133832A - Pirate application identification method and device - Google Patents

Pirate application identification method and device Download PDF

Info

Publication number
CN104133832A
CN104133832A CN201410204709.3A CN201410204709A CN104133832A CN 104133832 A CN104133832 A CN 104133832A CN 201410204709 A CN201410204709 A CN 201410204709A CN 104133832 A CN104133832 A CN 104133832A
Authority
CN
China
Prior art keywords
application
applications
similarity
name index
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410204709.3A
Other languages
Chinese (zh)
Other versions
CN104133832B (en
Inventor
尹华彬
周畅
宁合军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201410204709.3A priority Critical patent/CN104133832B/en
Publication of CN104133832A publication Critical patent/CN104133832A/en
Application granted granted Critical
Publication of CN104133832B publication Critical patent/CN104133832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a pirate application identification method and device, and belongs to the technical field of information processing. The method comprises the following steps: obtaining a first name index of a first application, obtaining a second application matched with the first name index in a prestored application set, wherein the application set is accumulated by legal copy applications or pirate applications identified when pirate application identification is carried out before; if at least one second application is obtained, matching the first application with each second application one by one; and according to a matching result, carrying out the pirate application identification of the first application. The second application matched with the name index of the first application in the prestored application set is obtained, the first application and each second application are matched one by one, the pirate application identification is carried out according to the matching result, so that the amount of the second applications matched with the first application one by one is reduced, identification time is shortened, and identification efficiency is improved.

Description

Recognition methods and the device of pirate application
Technical field
The present invention relates to technical field of information processing, particularly a kind of recognition methods and device of pirate application.
Background technology
Outstanding application tends to have a large amount of users, can realize and outstanding legal copy application is carried out to piracy a large number of users being had with the lower legal application of cost of development acquisition, therefore, emerges in an endless stream for the piracy of legal copy application.Piracy application is identified, can be protected the intellecture property of legal application to be inviolable, ensure the legitimate interests of legal application.
At present, the recognition methods of pirate application is: artificial cognition.The related personnel of pirate application identification is getting after application, this application is mated one by one with the application in pre-stored set of applications, wherein, pre-stored set of applications is to be formed by the legal copy application of carrying out before identifying in the process of pirate application identification and pirate application accumulation.If do not match the application in set of applications, then the developer of legal copy application by this application correspondence whether identify this application be pirate application; If match the application in set of applications, whether be pirate application according to this application of application identification matching.
Realizing in process of the present invention, inventor finds that said method at least exists following shortcoming:
Because the quantity of applying in the pre-stored set of applications of said method is very big, and artificial matching capacity is limited, therefore, the time that said method mates between application and set of applications is longer, matching accuracy rate is lower simultaneously, make the recognition time of pirate application longer, recognition efficiency is lower.
Summary of the invention
In order to solve the problem of prior art, the embodiment of the present invention provides a kind of recognition methods and device of pirate application.Described technical scheme is as follows:
On the one hand, provide a kind of recognition methods of pirate application, described method comprises:
Obtain the first name index of the first application, and obtain in pre-stored set of applications the second application matching with described the first name index, described set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
If described second is applied as at least one, described the first application is mated one by one with each second application, according to matching result, described the first application is carried out to pirate application identification.
On the other hand, provide a kind of recognition device of pirate application, described device comprises:
The first acquisition module, for obtaining the first name index of the first application;
The second acquisition module, the second application matching for obtaining the first name index that pre-stored set of applications and described the first acquisition module get, described set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
Matching module, for get when described the second acquisition module second while being applied as at least one, described the first application second is applied and is mated one by one with each;
Identification module, carries out pirate application identification for the matching result obtaining according to described matching module to described the first application.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
Brief description of the drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing of required use during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is a kind of pirate recognition methods process flow diagram of applying that the embodiment of the present invention one provides;
Fig. 2 is a kind of pirate recognition methods process flow diagram of applying that the embodiment of the present invention two provides;
Fig. 3 is the pirate recognition device structural representation of applying of the first that the embodiment of the present invention three provides;
Fig. 4 is the structural representation of a kind of the second acquisition module of providing of the embodiment of the present invention three;
Fig. 5 is the pirate recognition device structural representation of applying of the second that the embodiment of the present invention three provides;
Fig. 6 is a kind of structural representation that obtains submodule that the embodiment of the present invention three provides;
Fig. 7 is the structural representation of a kind of acquiring unit of providing of the embodiment of the present invention three;
Fig. 8 is the third pirate recognition device structural representation of applying that the embodiment of the present invention three provides;
Fig. 9 is the 4th kind of pirate recognition device structural representation of applying that the embodiment of the present invention three provides;
Figure 10 is the structural representation of a kind of terminal of providing of the embodiment of the present invention four.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
Because the recognition methods of at present pirate application need to be mated the first application with the each application in pre-stored set of applications one by one, and number of applications in pre-stored set of applications is very big, make time of mating between the first application and set of applications longer, matching accuracy rate is lower, cause the recognition time of pirate application longer, recognition efficiency is lower.In order to reduce the quantity of the application of mating one by one with the first application, shorten recognition time, improve recognition efficiency, the present embodiment provides a kind of recognition methods of pirate application, and the recognition methods of this piracy application is applied to a kind of terminal, and in this terminal, operation has the recognition device of pirate application.The device of the recognition device of this piracy application as described in following embodiment tri-.
Embodiment mono-
In conjunction with above-mentioned implementation environment, the present embodiment provides a kind of recognition methods of pirate application, and referring to Fig. 1, the method flow that the present embodiment provides is specific as follows:
101: the first name index of obtaining the first application, and obtain in pre-stored set of applications the second application matching with the first name index, set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
Alternatively, obtain the second application matching with the first name index in pre-stored set of applications, comprising:
Obtain the second name index of each application in pre-stored set of applications, and calculate the first similarity of the first name index and each the second name index;
From all the first similarities, filter out the first similarity that is greater than the first predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out.
Alternatively, before obtaining the second name index of each application in pre-stored set of applications, also comprise:
Obtain the title of each application in pre-stored set of applications, and determine and store the second name index of each application according to the title of each application.
Alternatively, obtain the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out, comprising:
Obtain the first application bag size of the first application, and obtain the second application bag size of the application in set of applications corresponding to the first similarity of filtering out;
Calculate the second similarity of the first application bag size and each the second application bag size;
From all the second similarities, filter out the second similarity that is greater than the second predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out.
Alternatively, obtain the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out, comprising:
Obtain the first icon fingerprint of the first application, and obtain the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out;
Calculate the third phase of the first icon fingerprint and each the second icon fingerprint like degree;
Seemingly degree, filter out the third phase that is greater than the 3rd predetermined threshold value like degree from all third phases;
The application that the third phase filtering out is seemingly spent in corresponding set of applications is defined as the second application matching with the first name index.
Alternatively, before obtaining the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out, also comprise:
Obtain the icon of each application in pre-stored set of applications, and determine and store the second icon fingerprint of each application according to the icon of each application.
102: if second be applied as at least one, the first application is mated one by one with each second application, according to matching result, the first application is carried out to pirate application identification.
Alternatively, after the first application being carried out to pirate application identification according to matching result, also comprise:
The first application is added to set of applications, will add the set of applications of the first application as the set of applications of upgrading, and the set of applications of storage update.
The method that the present embodiment provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
A kind of pirate recognition methods of applying providing in order more clearly to set forth above-described embodiment, in conjunction with content and the implementation environment of above-described embodiment, taking following embodiment bis-as example, a kind of recognition methods of pirate application is elaborated, refer to following embodiment bis-:
Embodiment bis-
The present embodiment provides a kind of recognition methods of pirate application, and for convenience of explanation, the present embodiment is applied as application A with first, and its name is called " chat tool " for example, and the method that the present embodiment is provided at length illustrates.Referring to Fig. 2, the method flow that the present embodiment provides is specific as follows:
201: obtain and store set of applications;
Wherein, set of applications be according to before the legal copy application or the pirate application accumulation that identify while carrying out pirate application identification form.
Concrete, the legal copy application accumulation identifying when carrying out pirate application identification before forms legal set of applications; Or the piracy application accumulation identifying when carrying out pirate application identification before forms pirate set of applications.
It should be noted that, carry out the present embodiment provide method time, without all perform step 201 at every turn, while applying for the first time the recognition methods of the piracy application that the present embodiment provides, carry out after this step storage set of applications, follow-up while carrying out pirate application identification, the set of applications that can directly utilize step 201 to store, thus continue to carry out following step.But after the pirate or legal application that the method providing by the present embodiment identification makes new advances, can re-execute step 201, so that the application identifying is added to set of applications, obtain the set of applications of renewal, and the set of applications of storage update.Or, after execution step 201 storage set of applications, every Preset Time, re-execute step 201, add set of applications with all application that the method providing by the present embodiment in this Preset Time section is identified, obtain the set of applications of renewal, and the set of applications of storage update.Wherein, Preset Time can be random time length, and the present embodiment does not limit the occurrence of Preset Time, and the present embodiment does not re-execute step 201 equally actual conditions to triggering limits.
In addition, the recognition time that carries out pirate application for the method that provides of application the present embodiment is provided, can be after execution step 201 obtains set of applications, each application in set of applications is carried out to pre-service, directly to utilize the pre-service result of each application in set of applications to carry out follow-up pirate application identification process.
The present embodiment does not limit each application in set of applications is carried out to pretreated concrete contents processing.For example: obtain the title of each application in set of applications, and determine and store the second name index of each application according to the title of each application.Again for example: obtain the icon of each application in pre-stored set of applications, and determine and store the second icon fingerprint of each application according to the icon of each application.
The present embodiment does not limit the concrete grammar of determining according to the title of each application and store the second name index of each application.For example: the Apply Names that obtains each application, each Apply Names is carried out to word segmentation processing, obtain the name index of each Apply Names, and the name index of each application is stored in LUCENCE index by LUCENCE (full-text search engine kit).
The present embodiment does not limit the concrete grammar of determining according to the icon of each application and store the second icon fingerprint of each application.For example: obtain the icon of each application, each icon is normalized, obtain the icon fingerprint of each icon after treatment, and store the icon fingerprint of each icon.
For the step that each icon is normalized, when concrete enforcement, can be normalized the color mode of each icon, or other parameters of each icon are normalized, the present embodiment does not limit the particular content being normalized.
For the step of icon fingerprint that obtains each icon after treatment, while specifically enforcement, the icon fingerprint of acquisition can be histogram, or other fingerprints, and the present embodiment does not limit the particular content of icon fingerprint.
202: the first name index of obtaining the first application;
The present embodiment does not limit the concrete grammar of the first name index of obtaining the first application.For example: obtain the Apply Names of the first application, this Apply Names is carried out to word segmentation processing, the first name index of the title that is applied.
For example, the title " chat tool " of application A is carried out to word segmentation processing, obtain the first name index and be: chat, instrument and chat tool.
203: obtain the second application matching with the first name index in pre-stored set of applications;
The present embodiment does not limit the concrete grammar that obtains the second application matching with the first name index in pre-stored set of applications.For example: obtain the second name index of each application in pre-stored set of applications, and calculate the first similarity of the first name index and each the second name index; From all the first similarities, filter out the first similarity that is greater than the first predetermined threshold value; Obtain the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out.
For the step of obtaining the second name index of each application in pre-stored set of applications, if each application in set of applications is carried out to pre-service in step 201, and pretreated content comprises: determine and store the second name index of each application, can directly obtain the second name index of each application of storage.
If each application in set of applications is not carried out to pre-service in step 201, or, in step 201, each application in set of applications is carried out to pre-service, but pretreated content does not comprise: second name index of determining and storing each application, obtain the title of each application in set of applications, and determine the second name index of each application according to the title of each application.
For the step of the first similarity of calculating the first name index and each the second name index, the present embodiment does not specifically limit.For example: the first similarity that obtains the first name index and each the second name index by maximum editing distance algorithm.
Comprise 5 application with pre-stored set of applications, be respectively application B1, application B2, application B3, application B4 and application B5 are example, if by maximum editing distance algorithm be applied A with application B1 the first similarity 1 be 99%, application A is 94% with the first similarity 2 of application B2, application A is 91% with the first similarity 3 of application B3, application A is 95% with the first similarity 4 of application B4, application A is 59% with the first similarity 5 of application B5, and the first predetermined threshold value is 90%, from all the first similarities, filter out the first similarity that is greater than 90%, i.e. the first similarity 1, the first similarity 2, the first similarity 3 and the first similarity 4.
Certainly, the number of applications that pre-stored set of applications comprises can also be other quantity, the title of the application that set of applications comprises can also be other titles, the value of the first similarity can also be other values, the title of the first similarity can also be other titles, the first predetermined threshold value can also be other values, and occurrence, the concrete title of the first similarity and the occurrence of the first predetermined threshold value of the concrete quantity of the application that the present embodiment does not comprise pre-stored set of applications, concrete title, the first similarity limit.
For the step of obtaining the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out, the present embodiment is not done concrete restriction.For example: directly the application in set of applications corresponding the first similarity filtering out is defined as to the second application of matching with the first name index.
Taking the first similarity of filtering out as the first similarity 1, the first similarity 2, the first similarity 3 and the first similarity 4 are as example, directly the application B1 in the set of applications of the first similarity 1, the first similarity 2, the first similarity 3 and the first similarity 4 correspondences that filter out, application B2, application B3 and application B4 are defined as to the second application matching with the first name index.
Except the above-mentioned mode that directly application in set of applications corresponding the first similarity filtering out is defined as to the second application matching with the first name index, in order further to improve identification accuracy, and then reduce with first and apply the quantity of second application of mating one by one, can also obtain the second application matching with the first name index by following four steps.
Step 1: obtain the first application bag size of the first application, and obtain the second application bag size of the application in set of applications corresponding to the first similarity of filtering out;
If each application in set of applications is carried out to pre-service in step 201, and pretreated content comprises: determine and store the second application bag size of each application, can directly obtain the second application bag size of the application in set of applications corresponding to first similarity filtering out of storage.
If each application in set of applications is not carried out to pre-service in step 201, or, in step 201, each application in set of applications is carried out to pre-service, but pretreated content does not comprise: the second application bag size of determining and storing each application, obtain the application bag of the application correspondence in set of applications corresponding to the first similarity of filtering out, determine the second application bag size of the application in set of applications corresponding to the first similarity of filtering out.
Step 2: the second similarity of calculating the first application bag size and each the second application bag size;
The present embodiment does not limit with the concrete grammar of the second similarity of each the second application bag size calculating the first application bag size, include but not limited to using the first application bag size and the first preset value and as the first numerical value, the big or small business that the first numerical value and the second application are wrapped is as the second similarity.For example: taking the first application bag size as 3M (million), the first preset value is 1M, the second application bag size for 5M be example, using 3M and 1M with 4M as the first numerical value, using the business of 4M and 5M 90% as the second similarity.
Certainly, the first application bag size or the second application bag size can also be other sizes, and the present embodiment concrete size that the concrete size to the first application bag or the second application are not wrapped limits.The first preset value can also be other values, and the present embodiment does not limit the occurrence of the first preset value.
Alternatively, calculating the first application bag is big or small can also include but not limited to amassing as second value the size of the second application bag and the second preset value with each second mode of applying the second similarity of bag size, using the first application bag size and the first preset value and second value and as third value, the big or small business that third value and the second application are wrapped is as the second similarity.For example: taking the first application bag size as 3M, the first preset value is 1M, the second preset value is 1%, the second application bag size for 50M be example, be second value by the long-pending of 50M and 1% as 0.5M, using 3M and 1M and 0.5M with 4.5M as third value, using the business of 4.5M and 50M 9% as the second similarity.
Certainly, the second preset value can also be other values, and the present embodiment does not limit the occurrence of the second preset value.
It should be noted that, pirate application usually adds the content such as advertisement or virus in the application bag of legal copy application, and for the second similarity that makes to obtain more meets the big or small actual conditions of pirate application bag, the first preset value is the arbitrary value between 1M to 3M.The value of the second preset value is relevant to the size of the second application bag, and the size of the second application bag is larger, and the second preset value is larger.
In addition, step 2 in the specific implementation, the the second similarity difference obtaining due to different calculation methods, and pirate application usually adds the content such as advertisement or virus in the application bag of legal copy application, for the second similarity that makes to obtain more meets the big or small actual conditions of pirate application bag, can according to the second application bag size select by using the first application bag size and the first preset value and as the first numerical value, the big or small business that the first numerical value and the second application are wrapped obtains the second similarity as the method for the second similarity.Or, select by amassing as second value the size of the second application bag and the second preset value, using the first application bag size and the first preset value and second value and as third value, the big or small business that third value and the second application are wrapped obtains the second similarity as the method for the second similarity.
Concrete, if the second application bag size is greater than the 3rd preset value, select by amassing as second value the size of the second application bag and the second preset value, using the first application bag size and the first preset value and second value and as third value, the big or small business that third value and the second application are wrapped obtains the second similarity as the method for the second similarity.
If the second application bag size is not more than the 3rd predetermined threshold value, select by using the first application bag size and the first preset value and as the first numerical value, the big or small business that the first numerical value and the second application are wrapped obtains the second similarity as the method for the second similarity.
Taking the 3rd predetermined threshold value as 30M is as example, if the second application bag size is greater than 30M for 50M, select by amassing as second value the size of the second application bag and the second preset value, using the first application bag size and the first preset value and second value and as third value, the big or small business that third value and the second application are wrapped obtains the second similarity as the method for the second similarity.If the second application bag size is not more than 30M for 5M, select by using the first application bag size and the first preset value and as the first numerical value, the first numerical value and second is applied to the big or small business who wraps and obtains the second similarity as the method for the second similarity.
Certainly, the 3rd threshold value can also be set as other numerical value according to actual conditions, and the present embodiment does not limit the occurrence of the 3rd threshold value.
Step 3: filter out the second similarity that is greater than the second predetermined threshold value from all the second similarities;
Comprise 4 application with set of applications corresponding to the first similarity filtering out, be respectively application B1, application B2, application B3 and application B4 are example, if be applied in step 2, A is 98% with the second similarity 1 of application B1, application A is 93% with the second similarity 2 of application B2, application A is 92% with the second similarity 3 of application B3, application A is 85% with the second similarity 4 of application B4, and the second predetermined threshold value is 90%, from all the second similarities, filter out the second similarity that is greater than 90%, i.e. the second similarity 1, the second similarity 2 and the second similarity 3.
Certainly, the number of applications that set of applications corresponding to the first similarity filtering out comprises can also be other quantity, the value of the second similarity can also be other values, the title of the second similarity can also be other titles, the second predetermined threshold value can also be other values, and the concrete quantity of the application that the present embodiment does not comprise set of applications corresponding to the first similarity filtering out, the occurrence of the second similarity, the concrete title of the second similarity and the occurrence of the second predetermined threshold value limit.
Step 4: obtain the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out.
The present embodiment does not limit the concrete mode of obtaining the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out.For example: directly the application in set of applications corresponding the second similarity filtering out is defined as to the second application of matching with the first name index.
Taking the second similarity of filtering out as the second similarity 1, the second similarity 2 and the second similarity 3 are as example, directly the application B1 in the set of applications of the second similarity 1, the second similarity 2 and the second similarity 3 correspondences that filter out, application B2 and application B3 are defined as to the second application matching with the first name index.
Except the above-mentioned mode that directly application in set of applications corresponding the second similarity filtering out is defined as to the second application matching with the first name index, apply the quantity of second application of mating one by one in order more to reduce with first, can also obtain as follows the second application matching with the first name index: obtain the first icon fingerprint of the first application, and obtain the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out; Calculate the third phase of the first icon fingerprint and each the second icon fingerprint like degree; Seemingly degree, filter out the third phase that is greater than the 3rd predetermined threshold value like degree from all third phases; The application that the third phase filtering out is seemingly spent in corresponding set of applications is defined as the second application matching with the first name index.
For the step of the second icon fingerprint of obtaining the application in set of applications corresponding to the second similarity of filtering out, if each application in set of applications is carried out to pre-service in step 201, and pretreated content comprises: determine and store the second icon fingerprint of each application, can directly obtain the second icon fingerprint of the application in set of applications corresponding to second similarity filtering out of storage.
If each application in set of applications is not carried out to pre-service in step 201, or, in step 201, each application in set of applications is carried out to pre-service, but pretreated content does not comprise: the second icon fingerprint of determining and storing each application, obtain the icon of the application in set of applications corresponding to the second similarity of filtering out, determine the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out.
For seemingly filtering out the third phase that is greater than the 3rd predetermined threshold value like degree degree from all third phases; The third phase filtering out is seemingly spent to application in corresponding set of applications and is defined as the specific implementation of the step of the second application matching with the first name index, comprise 3 application with set of applications corresponding to the second similarity filtering out, being respectively application B1, application B2 and applying B3 is that example describes.
If it is 97% that application A seemingly spends 1 with the third phase of application B1, it is 92% that application A seemingly spends 2 with the third phase of application B2, it is 82% that application A seemingly spends 3 with the third phase of application B3, and the 3rd predetermined threshold value is 90%, be greater than 90% third phase like degree from all third phases like filtering out degree, third phase seemingly spend 1 and third phase seemingly spend 2.And by the third phase filtering out seemingly spend 1 and third phase the application B1 and the application B2 that seemingly spend in the set of applications of 2 correspondences be defined as the second application matching with the first name index.
Certainly, the number of applications that set of applications corresponding to the second similarity filtering out comprises can also be other quantity, third phase can also be other values like the value of degree, third phase can also be other titles like the title of degree, the 3rd predetermined threshold value can also be other values, and concrete quantity, the third phase of the application that the present embodiment does not comprise set of applications corresponding to the second similarity filtering out limit like the concrete title of degree and the occurrence of the 3rd predetermined threshold value like occurrence, the third phase of degree.
It should be noted that, because the set of applications obtaining in step 201 is legal set of applications or pirate set of applications.Step 202 and step 203 in the specific implementation, are also for legal set of applications or pirate set of applications execution step 202 and step 203, to obtain the second application matching with the first name index in legal copy set or pirate set of applications.
204: if second be applied as at least one, the first application is mated one by one with each second application, according to matching result, the first application is carried out to pirate application identification.
In the specific implementation, application in the second application or the pirate set being applied as in legal set matching due to the first name index of obtaining after execution step 202 and step 203, if after execution step 202 and step 203, second application being applied as in legal set matching with the first name index of obtaining, the first application is mated one by one with each second application, if the first application for mating, determines that first is applied as legal application with the matching result of a certain the second application.If the first application is and does not mate with the matching result of all the second application, whether the developer who applies by the legal copy of the first application correspondence identifies the first application is pirate application.
Second be applied as application B1 in legal set and application B2 as example taking what match with the first name index, application A mated one by one with application B1 and application B2, if application A with the matching result of application B1 for mating, definite A of application is that legal copy is applied.
Certainly, the second quantity that is applied as the application in legal set matching with the first name index can also be other quantity, and the present embodiment does not limit the second concrete quantity that is applied as the application in legal set matching with the first name index.
If after execution step 202 and step 203, second application being applied as in pirate set matching with the first name index of obtaining, the first application is mated one by one with each second application, if the first application for mating, determines that first is applied as pirate application with the matching result of a certain the second application.If the first application is and does not mate with the matching result of all the second application, whether the developer who applies by the legal copy of the first application correspondence identifies the first application is pirate application.
Second be applied as application C1 in pirate set and application C2 as example taking what match with the first name index, application A mated one by one with application C1 and application C2, if application A with the matching result of application C1 for mating, definite A of application is that piracy is applied.
Certainly, the second quantity that is applied as the application in pirate set matching with the first name index can also be other quantity, and the present embodiment does not limit the second concrete quantity that is applied as the application in pirate set matching with the first name index.
The method that the present embodiment provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
Embodiment tri-
The present embodiment provides a kind of recognition device of pirate application, and this device is for the recognition methods of the piracy application carrying out above-described embodiment one or embodiment bis-and provide, and referring to Fig. 3, this device comprises:
The first acquisition module 301, for obtaining the first name index of the first application;
The second acquisition module 302, the second application matching for obtaining the first name index that pre-stored set of applications and the first acquisition module 301 get, set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
Matching module 303, for get when the second acquisition module 302 second while being applied as at least one, the first application is mated one by one with each second application;
Identification module 304, carries out pirate application identification for the matching result obtaining according to matching module 303 to the first application.
Referring to Fig. 4, the second acquisition module 302, comprising:
Obtain submodule 3021, for obtaining the second name index of pre-stored each application of set of applications;
Calculating sub module 3022, for calculating the first name index and the first similarity of obtaining each the second name index that submodule 3021 gets;
Screening submodule 3023, filters out for all the first similarities that obtain from calculating sub module 3022 the first similarity that is greater than the first predetermined threshold value;
Obtain submodule 3024, for obtaining according to the application of set of applications corresponding to the first similarity of filtering out of screening submodule 3023 the second application matching with the first name index.
Referring to Fig. 5, this device, also comprises:
The 3rd acquisition module 305, for obtaining the title of each application of pre-stored set of applications;
The first memory module 306, determines and stores the second name index of each application for the title of each application of getting according to the 3rd acquisition module 305.
Referring to Fig. 6, obtain submodule 3024, comprising:
The first acquiring unit 30241, for obtaining the first application bag size of the first application;
Second acquisition unit 30242, for obtaining the second application bag size of application of set of applications corresponding to the first similarity of filtering out;
Computing unit 30243, for calculating the second similarity of each the second application bag size that the first application bag size that the first acquiring unit 30241 gets and second acquisition unit 30242 get;
Screening unit 30244, filters out for all the second similarities that obtain from computing unit 30243 the second similarity that is greater than the second predetermined threshold value;
Acquiring unit 30245, for obtaining according to the application of set of applications corresponding to the second similarity of filtering out of screening unit 30244 the second application matching with the first name index.
Referring to Fig. 7, acquiring unit 30245, comprising:
First obtains subelement 302451, for obtaining the first icon fingerprint of the first application;
Second obtains subelement 302452, for obtaining the second icon fingerprint of application of set of applications corresponding to the second similarity of filtering out;
Computation subunit 302453, obtains third phase that the first icon fingerprint and second that subelement 302451 gets obtains each the second icon fingerprint that subelement 302452 gets like degree for calculating first;
Screening subelement 302454, filters out the third phase that is greater than the 3rd predetermined threshold value like degree for all third phases that obtain from computation subunit 302453 like degree;
Determine subelement 302455, the application of seemingly spending corresponding set of applications for the third phase that screening subelement 302455 is filtered out is defined as the second application matching with the first name index.
Referring to Fig. 8, this device, also comprises:
The 4th acquisition module 307, for obtaining the icon of each application of pre-stored set of applications;
The second memory module 308, determines and stores the second icon fingerprint of each application for the icon of each application of getting according to the 4th acquisition module 307.
Referring to Fig. 9, this device, also comprises:
Add module 309, for the first application is added to set of applications;
The 3rd memory module 310, for adding the set of applications of the first application as the set of applications of upgrading, the set of applications of storage update.
The device that the present embodiment provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
Embodiment tetra-
Referring to Figure 10, the present embodiment provides a kind of terminal, Figure 10 has shown the related terminal structure schematic diagram with touch-sensitive surface of the embodiment of the present invention, the recognition methods that this terminal can be applied for the piracy of implementing to provide in above-described embodiment one or embodiment bis-.Specifically:
Terminal 1000 can comprise RF (Radio Frequency, radio frequency) circuit 110, the storer 120 that includes one or more computer-readable recording mediums, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, transport module 170, include one or one parts such as processor 180 and power supply 190 of processing above core.It will be understood by those skilled in the art that the not restriction of structure paired terminal of the terminal structure shown in Figure 10, can comprise the parts more more or less than diagram, or combine some parts, or different parts are arranged.Wherein:
RF circuit 110 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, especially, after the downlink information of base station is received, transfer to more than one or one processor 180 to process; In addition, send to base station by relating to up data.Conventionally, RF circuit 110 includes but not limited to antenna, at least one amplifier, tuner, one or more oscillator, subscriber identity module (SIM) card, transceiver, coupling mechanism, LNA (Low Noise Amplifier, low noise amplifier), diplexer etc.In addition, RF circuit 110 can also be by radio communication and network and other devices communicatings.Described radio communication can be used arbitrary communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc.
Storer 120 can be used for storing software program and module, as the corresponding software program of recognition device and the module of pirate application in embodiment tri-, processor 180 is stored in software program and the module of storer 120 by operation, thereby carry out various function application and data processing, as realize pirate application identification etc.Storer 120 can mainly comprise storage program district and storage data field, wherein, and the application program (such as sound-playing function, image player function etc.) that storage program district can storage operation system, at least one function is required etc.; The data (such as voice data, phone directory etc.) that create according to the use of terminal 1000 etc. can be stored in storage data field.In addition, storer 120 can comprise high-speed random access memory, can also comprise nonvolatile memory, for example at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, storer 120 can also comprise Memory Controller, so that processor 180 and the access of input block 130 to storer 120 to be provided.
Input block 130 can be used for receiving numeral or the character information of input, and generation is inputted with user arranges and function control is relevant keyboard, mouse, control lever, optics or trace ball signal.Particularly, input block 130 can comprise touch-sensitive surperficial 131 and other input equipments 132.Touch-sensitive surperficial 131, also referred to as touch display screen or Trackpad, can collect user or near touch operation (using any applicable object or near the operations of annex on touch-sensitive surperficial 131 or touch-sensitive surperficial 131 such as finger, stylus such as user) thereon, and drive corresponding linked set according to predefined formula.Optionally, touch-sensitive surperficial 131 can comprise touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus detects user's touch orientation, and detects the signal that touch operation brings, and sends signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and converts it to contact coordinate, then gives processor 180, and the order that energy receiving processor 180 is sent is also carried out.In addition, can adopt the polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave to realize touch-sensitive surperficial 131.Except touch-sensitive surperficial 131, input block 130 can also comprise other input equipments 132.Particularly, other input equipments 132 can include but not limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, control lever etc.
Display unit 140 can be used for showing the information inputted by user or the various graphical user interface of the information that offers user and terminal 1000, and these graphical user interface can be made up of figure, text, icon, video and its combination in any.Display unit 140 can comprise display panel 141, optionally, can adopt the form such as LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) to configure display panel 141.Further, touch-sensitive surperficial 131 can cover display panel 141, when touch-sensitive surperficial 131 detect thereon or near touch operation after, send processor 180 to determine the type of touch event, corresponding vision output is provided according to the type of touch event with preprocessor 180 on display panel 141.Although in Figure 10, touch-sensitive surperficial 131 with display panel 141 be as two independently parts realize input and input function, in certain embodiments, can by touch-sensitive surperficial 131 and display panel 141 integrated and realize input and output function.
Terminal 1000 also can comprise at least one sensor 150, such as optical sensor, motion sensor and other sensors.Particularly, optical sensor can comprise ambient light sensor and proximity transducer, and wherein, ambient light sensor can regulate according to the light and shade of ambient light the brightness of display panel 141, proximity transducer can, in the time that terminal 1000 moves in one's ear, cut out display panel 141 and/or backlight.As the one of motion sensor, Gravity accelerometer can detect the size of the acceleration that (is generally three axles) in all directions, when static, can detect size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as passometer, knock) of mobile phone attitude etc.; As for also other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor of terminal 1000, do not repeat them here.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the audio interface between user and terminal 1000.Voicefrequency circuit 160 can, by the electric signal after the voice data conversion receiving, be transferred to loudspeaker 161, is converted to voice signal output by loudspeaker 161; On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160, be converted to voice data, after again voice data output processor 180 being processed, through RF circuit 110 to send to such as another terminal, or export voice data to storer 120 so as further process.Voicefrequency circuit 160 also may comprise earphone jack, so that communicating by letter of peripheral hardware earphone and terminal 1000 to be provided.
Terminal 1000 by transport module 170 can help that user sends and receive e-mail, browsing page and access streaming video etc., it provides wireless or wired broadband internet access for user.Although Figure 10 shows transport module 170, be understandable that, it does not belong to must forming of terminal 1000, completely can be as required in the essential scope that does not change invention and omit.
Processor 180 is control centers of terminal 1000, utilize various interface and circuit to link the various piece of whole mobile phone, by moving or carry out the software program and/or the module that are stored in storer 120, and call the data that are stored in storer 120, carry out various functions and the deal with data of terminal 1000, thereby mobile phone is carried out to integral monitoring.Optionally, processor 180 can comprise one or more processing cores; Preferably, processor 180 can integrated application processor and modem processor, and wherein, application processor is mainly processed operating system, user interface and application program etc., and modem processor is mainly processed radio communication.Be understandable that, above-mentioned modem processor also can not be integrated in processor 180.
Terminal 1000 also comprises the power supply 190 (such as battery) to all parts power supply, preferably, power supply can be connected with processor 180 logics by power-supply management system, thereby realizes the functions such as management charging, electric discharge and power managed by power-supply management system.Power supply 190 can also comprise the random component such as one or more direct current or AC power, recharging system, power failure detection circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal 1000 can also comprise camera, bluetooth module etc., does not repeat them here.Specifically in the present embodiment, the display unit of terminal is touch-screen display, terminal also includes storer, and one or more than one program, one of them or more than one program are stored in storer, and are configured to be carried out and stated more than one or one routine package containing for carrying out the instruction of following operation by more than one or one processor:
Obtain the first name index of the first application, and obtain in pre-stored set of applications the second application matching with the first name index, set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
If second is applied as at least one, the first application is mated one by one with each second application, according to matching result, the first application is carried out to pirate application identification.
Supposing above-mentioned is the possible embodiment of the first,, in the possible embodiment of the first embodiment possible as the second basic and that provide, in the storer of terminal, also comprises the instruction for carrying out following operation:
Obtain the second name index of each application in pre-stored set of applications, and calculate the first similarity of the first name index and each the second name index;
From all the first similarities, filter out the first similarity that is greater than the first predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out.
In the third the possible embodiment providing as basis at the possible embodiment of the second, in the storer of terminal, also comprise the instruction for carrying out following operation:
Obtain the title of each application in pre-stored set of applications, and determine and store the second name index of each application according to the title of each application.
In the 4th kind of possible embodiment providing as basis at the possible embodiment of the second, in the storer of terminal, also comprise the instruction for carrying out following operation:
Obtain the first application bag size of the first application, and obtain the second application bag size of the application in set of applications corresponding to the first similarity of filtering out;
Calculate the second similarity of the first application bag size and each the second application bag size;
From all the second similarities, filter out the second similarity that is greater than the second predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out.
In the 5th kind of possible embodiment providing as basis at the 4th kind of possible embodiment, in the storer of terminal, also comprise the instruction for carrying out following operation:
Obtain the first icon fingerprint of the first application, and obtain the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out;
Calculate the third phase of the first icon fingerprint and each the second icon fingerprint like degree;
Seemingly degree, filter out the third phase that is greater than the 3rd predetermined threshold value like degree from all third phases;
The application that the third phase filtering out is seemingly spent in corresponding set of applications is defined as the second application matching with the first name index.
In the 6th kind of possible embodiment providing as basis at the 5th kind of possible embodiment, in the storer of terminal, also comprise the instruction for carrying out following operation:
Obtain the icon of each application in pre-stored set of applications, and determine and store the second icon fingerprint of each application according to the icon of each application.
In the 7th kind of possible embodiment providing as basis at the possible embodiment of the first, in the storer of terminal, also comprise the instruction for carrying out following operation:
The first application is added to set of applications, will add the set of applications of the first application as the set of applications of upgrading, and the set of applications of storage update.
In sum, the terminal that the present embodiment provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
Embodiment five
The embodiment of the present invention provides a kind of computer-readable recording medium, and this computer-readable recording medium can be the computer-readable recording medium comprising in the storer in above-described embodiment four; Also can be individualism, be unkitted the computer-readable recording medium of allocating in terminal.Described computer-readable recording medium stores more than one or one program, and described more than one or one program is used for carrying out the method that shows view by one or more than one processor, and described method comprises:
Obtain the first name index of the first application, and obtain in pre-stored set of applications the second application matching with the first name index, set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
If second is applied as at least one, the first application is mated one by one with each second application, according to matching result, the first application is carried out to pirate application identification.
Suppose that above-mentioned is the possible embodiment of the first, in the possible embodiment of the first embodiment possible as the second basic and that provide, the step of the second application matching with the first name index in pre-stored set of applications is obtained in execution, comprising:
Obtain the second name index of each application in pre-stored set of applications, and calculate the first similarity of the first name index and each the second name index;
From all the first similarities, filter out the first similarity that is greater than the first predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out.
In the third the possible embodiment providing as basis at the possible embodiment of the second, execution also comprises before obtaining the step of the second name index of each application in pre-stored set of applications:
Obtain the title of each application in pre-stored set of applications, and determine and store the second name index of each application according to the title of each application.
In the 4th kind of possible embodiment providing as basis at the possible embodiment of the second, carry out the step of obtaining the second application matching with the first name index according to the application in set of applications corresponding to the first similarity filtering out, comprising:
Obtain the first application bag size of the first application, and obtain the second application bag size of the application in set of applications corresponding to the first similarity of filtering out;
Calculate the second similarity of the first application bag size and each the second application bag size;
From all the second similarities, filter out the second similarity that is greater than the second predetermined threshold value;
Obtain the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out.
In the 5th kind of possible embodiment providing as basis at the 4th kind of possible embodiment, carry out the step of obtaining the second application matching with the first name index according to the application in set of applications corresponding to the second similarity filtering out, comprising:
Obtain the first icon fingerprint of the first application, and obtain the second icon fingerprint of the application in set of applications corresponding to the second similarity of filtering out;
Calculate the third phase of the first icon fingerprint and each the second icon fingerprint like degree;
Seemingly degree, filter out the third phase that is greater than the 3rd predetermined threshold value like degree from all third phases;
The application that the third phase filtering out is seemingly spent in corresponding set of applications is defined as the second application matching with the first name index.
At the 5th kind of possible embodiment as basis and in the 6th kind of possible embodiment providing, before carrying out the step of the second icon fingerprint that obtains the application in set of applications corresponding to the second similarity of filtering out, also comprise:
Obtain the icon of each application in pre-stored set of applications, and determine and store the second icon fingerprint of each application according to the icon of each application.
In the 7th kind of possible embodiment providing as basis at the possible embodiment of the first, execution also comprises after the first application being carried out to the step of pirate application identification according to matching result:
The first application is added to set of applications, will add the set of applications of the first application as the set of applications of upgrading, and the set of applications of storage update.
The computer-readable recording medium that the embodiment of the present invention provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
Embodiment six
A kind of graphical user interface is provided in the embodiment of the present invention, described graphical user interface is used in the terminal that above-described embodiment four provides, and described terminal comprises touch-screen display, storer and for carrying out one or more than one processor of one or more than one program; Described graphical user interface comprises:
Obtain the first name index of the first application, and obtain in pre-stored set of applications the second application matching with the first name index, set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
If second is applied as at least one, the first application is mated one by one with each second application, according to matching result, the first application is carried out to pirate application identification.
The graphical user interface that the embodiment of the present invention provides, by obtaining the second application matching with the name index of the first application in pre-stored set of applications; The first application is mated one by one with each second application, according to matching result, application is carried out to pirate application identification, reduced the quantity of second application of mating one by one with the first application, shortened recognition time, and improved recognition efficiency.
It should be noted that: the recognition device of the piracy application that above-described embodiment provides is in the time realizing pirate application identification, only be illustrated with the division of above-mentioned each functional module, in practical application, can above-mentioned functions be distributed and completed by different functional modules as required, the inner structure that is about to the recognition device of pirate application is divided into different functional modules, to complete all or part of function described above.In addition, the recognition device of the piracy application that above-described embodiment provides belongs to same design with the recognition methods embodiment of pirate application, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step that realizes above-described embodiment can complete by hardware, also can carry out the hardware that instruction is relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be ROM (read-only memory), disk or CD etc.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any amendment of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (14)

1. a recognition methods for pirate application, is characterized in that, described method comprises:
Obtain the first name index of the first application, and obtain in pre-stored set of applications the second application matching with described the first name index, described set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
If described second is applied as at least one, described the first application is mated one by one with each second application, according to matching result, described the first application is carried out to pirate application identification.
2. method according to claim 1, is characterized in that, described in obtain in pre-stored set of applications the second application matching with described the first name index, comprising:
Obtain the second name index of each application in pre-stored set of applications, and calculate the first similarity of described the first name index and each the second name index;
From all the first similarities, filter out the first similarity that is greater than the first predetermined threshold value;
Obtain the second application matching with described the first name index according to the application in described set of applications corresponding to the first similarity filtering out.
3. method according to claim 2, is characterized in that, described in obtain the second name index of each application in pre-stored set of applications before, also comprise:
Obtain the title of each application in pre-stored set of applications, and determine and store the second name index of each application according to the title of each application.
4. method according to claim 2, is characterized in that, the second application matching with described the first name index is obtained in the application in described set of applications corresponding to the first similarity that described basis filters out, comprising:
Obtain the first application bag size of described the first application, and obtain the second application bag size of the application in described set of applications corresponding to the first similarity of filtering out;
Calculate the second similarity of described the first application bag size and each the second application bag size;
From all the second similarities, filter out the second similarity that is greater than the second predetermined threshold value;
Obtain the second application matching with described the first name index according to the application in described set of applications corresponding to the second similarity filtering out.
5. method according to claim 4, is characterized in that, the second application matching with described the first name index is obtained in the application in described set of applications corresponding to the second similarity that described basis filters out, comprising:
Obtain the first icon fingerprint of described the first application, and obtain the second icon fingerprint of the application in described set of applications corresponding to the second similarity of filtering out;
Calculate the third phase of described the first icon fingerprint and each the second icon fingerprint like degree;
Seemingly degree, filter out the third phase that is greater than the 3rd predetermined threshold value like degree from all third phases;
The third phase filtering out is defined as to the second application matching with described the first name index like the application in described set of applications corresponding to degree.
6. method according to claim 5, is characterized in that, described in obtain the second icon fingerprint of the application in described set of applications corresponding to the second similarity of filtering out before, also comprise:
Obtain the icon of each application in pre-stored set of applications, and determine and store the second icon fingerprint of each application according to the icon of each application.
7. method according to claim 1, is characterized in that, described according to matching result to described first application carry out pirate application identification after, also comprise:
Described the first application is added to described set of applications, will add the set of applications of described the first application as the set of applications of upgrading, and store the set of applications of described renewal.
8. a recognition device for pirate application, is characterized in that, described device comprises:
The first acquisition module, for obtaining the first name index of the first application;
The second acquisition module, the second application matching for obtaining the first name index that pre-stored set of applications and described the first acquisition module get, described set of applications is that the legal copy application or the pirate application accumulation that identify when carrying out pirate application identification before form;
Matching module, for get when described the second acquisition module second while being applied as at least one, described the first application second is applied and is mated one by one with each;
Identification module, carries out pirate application identification for the matching result obtaining according to described matching module to described the first application.
9. device according to claim 8, is characterized in that, described the second acquisition module, comprising:
Obtain submodule, for obtaining the second name index of pre-stored each application of set of applications;
Calculating sub module, for calculate described the first name index with described in obtain the first similarity of each the second name index that submodule gets;
Screening submodule, filters out for all the first similarities that obtain from described calculating sub module the first similarity that is greater than the first predetermined threshold value;
Obtain submodule, obtain the second application matching with described the first name index for the application of described set of applications corresponding to the first similarity of filtering out according to described screening submodule.
10. device according to claim 9, is characterized in that, described device, also comprises:
The 3rd acquisition module, for obtaining the title of each application of pre-stored set of applications;
The first memory module, determines and stores the second name index of each application for the title of each application of getting according to described the 3rd acquisition module.
11. devices according to claim 9, is characterized in that, described in obtain submodule, comprising:
The first acquiring unit, for obtaining the first application bag size of described the first application;
Second acquisition unit, for obtaining the second application bag size of application of described set of applications corresponding to the first similarity of filtering out;
Computing unit, for calculating the second similarity of each the second application bag size that the first application bag size that described the first acquiring unit gets and described second acquisition unit get;
Screening unit, filters out for all the second similarities that obtain from described computing unit the second similarity that is greater than the second predetermined threshold value;
Acquiring unit, obtains the second application matching with described the first name index for the application of described set of applications corresponding to the second similarity of selecting according to described screening sieve unit.
12. devices according to claim 11, is characterized in that, described acquiring unit, comprising:
First obtains subelement, for obtaining the first icon fingerprint of described the first application;
Second obtains subelement, for obtaining the second icon fingerprint of application of described set of applications corresponding to the second similarity of filtering out;
Computation subunit, obtains third phase that the first icon fingerprint and described second that subelement gets obtains each the second icon fingerprint that subelement gets like degree for calculating described first;
Screening subelement, filters out the third phase that is greater than the 3rd predetermined threshold value like degree for all third phases that obtain from described computation subunit like degree;
Determine subelement, be defined as for the third phase that described screening subelement is filtered out the second application matching with described the first name index like the application of described set of applications corresponding to degree.
13. devices according to claim 12, is characterized in that, described device, also comprises:
The 4th acquisition module, for obtaining the icon of each application of pre-stored set of applications;
The second memory module, determines and stores the second icon fingerprint of each application for the icon of each application of getting according to described the 4th acquisition module.
14. devices according to claim 8, is characterized in that, described device, also comprises:
Add module, for described the first application is added to described set of applications;
The 3rd memory module, for using adding the set of applications of described the first application as the set of applications of upgrading, stores the set of applications of described renewal.
CN201410204709.3A 2014-05-15 2014-05-15 The recognition methods of pirate application and device Active CN104133832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410204709.3A CN104133832B (en) 2014-05-15 2014-05-15 The recognition methods of pirate application and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410204709.3A CN104133832B (en) 2014-05-15 2014-05-15 The recognition methods of pirate application and device

Publications (2)

Publication Number Publication Date
CN104133832A true CN104133832A (en) 2014-11-05
CN104133832B CN104133832B (en) 2016-07-13

Family

ID=51806510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410204709.3A Active CN104133832B (en) 2014-05-15 2014-05-15 The recognition methods of pirate application and device

Country Status (1)

Country Link
CN (1) CN104133832B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426706A (en) * 2015-11-20 2016-03-23 北京奇虎科技有限公司 Pirate application detection method, device and system
CN105488361A (en) * 2015-11-20 2016-04-13 北京奇虎科技有限公司 Pirate application detection method, device and system
CN105653920A (en) * 2015-09-18 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Antenna tuning method, apparatus and mobile device
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system
CN106293779A (en) * 2015-05-11 2017-01-04 广州爱九游信息技术有限公司 A kind of method and device identifying application installation kit
CN106599623A (en) * 2016-12-09 2017-04-26 江苏通付盾科技有限公司 Method and device for calculating application similarity
CN107368712A (en) * 2017-07-28 2017-11-21 北京深思数盾科技股份有限公司 The guard method of software and system
CN107423581A (en) * 2017-07-31 2017-12-01 北京深思数盾科技股份有限公司 The guard method of software and device
CN108229131A (en) * 2016-12-14 2018-06-29 ***通信集团设计院有限公司 Counterfeit APP recognition methods and device
CN108920909A (en) * 2018-06-30 2018-11-30 平安科技(深圳)有限公司 Counterfeit mobile applications method of discrimination and system
CN112149101A (en) * 2019-06-28 2020-12-29 北京智明星通科技股份有限公司 False game APP identification method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324697A (en) * 2013-06-07 2013-09-25 北京掌汇天下科技有限公司 Method for removing copycatting applications in android application search and based on icon contrast
CN103441848A (en) * 2013-08-16 2013-12-11 广东欧珀移动通信有限公司 Application authentication method and system of mobile terminal
US20140041037A1 (en) * 2012-08-02 2014-02-06 Google Inc. Detecting pirated applications

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140041037A1 (en) * 2012-08-02 2014-02-06 Google Inc. Detecting pirated applications
CN103324697A (en) * 2013-06-07 2013-09-25 北京掌汇天下科技有限公司 Method for removing copycatting applications in android application search and based on icon contrast
CN103441848A (en) * 2013-08-16 2013-12-11 广东欧珀移动通信有限公司 Application authentication method and system of mobile terminal

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989251B (en) * 2015-02-12 2019-03-29 卓望数码技术(深圳)有限公司 A kind of piracy Android application discriminating method and pirate Android application discrimination system
CN105989251A (en) * 2015-02-12 2016-10-05 卓望数码技术(深圳)有限公司 Piratic android application discrimination method and piratic android application discrimination system
CN106293779B (en) * 2015-05-11 2019-11-08 广州爱九游信息技术有限公司 A kind of method and device identifying application installation package
CN106293779A (en) * 2015-05-11 2017-01-04 广州爱九游信息技术有限公司 A kind of method and device identifying application installation kit
CN105653920A (en) * 2015-09-18 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Antenna tuning method, apparatus and mobile device
CN105426706B (en) * 2015-11-20 2018-06-15 北京奇虎科技有限公司 Piracy applies detection method and device, system
CN105488361A (en) * 2015-11-20 2016-04-13 北京奇虎科技有限公司 Pirate application detection method, device and system
CN105426706A (en) * 2015-11-20 2016-03-23 北京奇虎科技有限公司 Pirate application detection method, device and system
CN105488361B (en) * 2015-11-20 2018-09-25 北京奇虎科技有限公司 Piracy applies detection method and device, system
CN106599623A (en) * 2016-12-09 2017-04-26 江苏通付盾科技有限公司 Method and device for calculating application similarity
CN106599623B (en) * 2016-12-09 2019-10-18 江苏通付盾科技有限公司 A kind of application similarity calculating method and device
CN108229131A (en) * 2016-12-14 2018-06-29 ***通信集团设计院有限公司 Counterfeit APP recognition methods and device
CN107368712B (en) * 2017-07-28 2018-12-25 北京深思数盾科技股份有限公司 The guard method and system of software
CN107368712A (en) * 2017-07-28 2017-11-21 北京深思数盾科技股份有限公司 The guard method of software and system
CN107423581B (en) * 2017-07-31 2019-04-12 北京深思数盾科技股份有限公司 The guard method of software and device
CN107423581A (en) * 2017-07-31 2017-12-01 北京深思数盾科技股份有限公司 The guard method of software and device
CN108920909A (en) * 2018-06-30 2018-11-30 平安科技(深圳)有限公司 Counterfeit mobile applications method of discrimination and system
CN108920909B (en) * 2018-06-30 2022-04-15 平安科技(深圳)有限公司 Counterfeit mobile application program discrimination method and system
CN112149101A (en) * 2019-06-28 2020-12-29 北京智明星通科技股份有限公司 False game APP identification method and system

Also Published As

Publication number Publication date
CN104133832B (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN104133832B (en) The recognition methods of pirate application and device
CN104967679A (en) Information recommendation system, method and device
CN103632165A (en) Picture processing method, device and terminal equipment
CN104978115A (en) Content display method and device
CN103942113A (en) System restarting reason detection method, device and terminal equipment
CN104636047A (en) Method and device for operating objects in list and touch screen terminal
CN104281394A (en) Method and device for intelligently selecting words
CN104142868A (en) Connection establishment method and device
CN103455330A (en) Application program management method, terminal, equipment and system
CN104820665A (en) Method, terminal and server for exhibiting recommendation information
CN104239343A (en) User input information processing method and device
CN104252341A (en) Method and device for resurfacing application program and client side device of application program
CN104157007A (en) Video processing method and apparatus
CN104134043B (en) Content is hidden, separates method, device and the terminal hidden
CN104717341A (en) Message prompting method and terminal
CN103631625B (en) A kind of method of data acquisition, user terminal, server and system
CN103945241A (en) Streaming data statistical method, system and related device
CN104618223A (en) Information recommendation management method, device and system
CN103631580A (en) Method and device for generating theme icon
CN103678502A (en) Information collection method and device
CN104735132A (en) Information inquiry method, servers and terminal
CN105530239A (en) Multimedia data obtaining method and device
CN104104656A (en) Account retrieving method and device
CN104063400A (en) Data search method and data search device
CN103383701A (en) Information retrieving method, device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant