CN115408667A - Method and system for detecting infringement of application program content - Google Patents

Method and system for detecting infringement of application program content Download PDF

Info

Publication number
CN115408667A
CN115408667A CN202211071054.8A CN202211071054A CN115408667A CN 115408667 A CN115408667 A CN 115408667A CN 202211071054 A CN202211071054 A CN 202211071054A CN 115408667 A CN115408667 A CN 115408667A
Authority
CN
China
Prior art keywords
content
application program
target page
infringement
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211071054.8A
Other languages
Chinese (zh)
Inventor
杨群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211071054.8A priority Critical patent/CN115408667A/en
Publication of CN115408667A publication Critical patent/CN115408667A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the specification discloses an infringement detection method and system for application program content. The method comprises the following steps: acquiring an executable file for accessing a target application program according to a preset operation path; inputting the executable file into equipment provided with the target application program, so that the target application program jumps to a target page; extracting first content information in the target page, and recording the process of jumping to the target page to obtain a record file; determining whether there is an infringement risk based on the first content information; when it is determined that an infringement risk exists, electronic evidence is generated and saved, the electronic evidence including the record file.

Description

Method and system for detecting infringement of application program content
Technical Field
The present disclosure relates to the field of information technologies, and in particular, to a method and a system for detecting infringement of application content.
Background
The application program can display rich and colorful contents such as characters, pictures, audio, video and multimedia contents to a user, but the problem of content infringement cannot be ignored. Currently, it is desirable to provide a method for detecting piracy in application content.
Disclosure of Invention
One embodiment of the present specification provides a method for detecting infringement of application program content. The method comprises the following steps: acquiring an executable file for accessing a target application program according to a preset operation path; inputting the executable file into equipment provided with the target application program, so that the target application program jumps to a target page; extracting first content information in the target page, and recording the process of jumping to the target page to obtain a record file; determining whether there is an infringement risk based on the first content information; when it is determined that an infringement risk exists, electronic evidence is generated and saved, the electronic evidence including the record file.
One embodiment of the present specification provides an infringement detection system for application content. The system comprises an acquisition module, an input module, an extraction module, a recording module, a determination module and a certificate storage module. Wherein: the acquisition module is used for acquiring an executable file for accessing the target application program according to a preset operation path; the input module is used for inputting the executable file into the equipment provided with the target application program so as to enable the target application program to jump to a target page; the extraction module is used for extracting first content information in the target page; the recording module is used for recording the process of jumping to the target page to obtain a recording file; the determining module is used for determining whether an infringement risk exists based on the first content information; the evidence storage module is used for generating and storing electronic evidence when the infringement risk is determined to exist, and the electronic evidence comprises the record file.
One of the embodiments of the present specification provides an apparatus for detecting piracy of application contents, which includes a processor and a storage device, where the storage device is used for storing instructions. Wherein the processor, when executing the instructions, implements the method for detecting piracy of application contents according to any of the embodiments of the present specification.
Drawings
The present description will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals refer to like structures, wherein:
FIG. 1 is an exemplary block diagram of a method for piracy detection of application content in accordance with some embodiments of the present description;
FIG. 2 is an exemplary flow diagram of a method for piracy detection of application content in accordance with some embodiments of the present description;
FIG. 3 is a schematic view of a page shown in accordance with some embodiments of the present description;
fig. 4 is a schematic diagram of a blockchain presence verification system in accordance with some embodiments of the present disclosure.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, without inventive effort, the present description can also be applied to other similar contexts on the basis of these drawings. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification, the terms "a", "an" and/or "the" are not intended to be inclusive of the singular, but rather are intended to be inclusive of the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flowcharts are used in this specification to illustrate the operations performed by the system according to embodiments of the present specification. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
The application program can display rich and colorful contents such as characters, pictures, audio, video and multimedia contents to the user, but the infringement problem of the contents cannot be ignored. In view of this, the embodiments of the present disclosure provide an infringement detection method and system for application content, which can extract application content and identify infringement risk, and can store relevant electronic evidence to facilitate the infringement investigation of a benefit party. Wherein, the stakeholder may refer to an original content platform, an original author, a copyright holder, a natural person, a legal person, and so on.
It should be noted that the content infringement mentioned in the present specification may refer to various types of infringement, and the infringement rights include, but are not limited to, copyright, portrait right, copyright, trademark right, trade secret right, and privacy right.
FIG. 1 is an exemplary block diagram of a method for piracy detection of application content in accordance with some embodiments of the present description. As shown in fig. 1, the system 100 may include an acquisition module 110, an input module 120, an extraction module 130, a recording module 140, a determination module 150, and a credentialing module 160.
The obtaining module 110 may be configured to obtain an executable file for accessing the target application according to a preset operation path.
Input module 120 may be configured to input the executable file into a device on which the target application is installed to cause the target application to jump to a target page.
The extraction module 130 may be configured to extract the first content information in the target page.
The recording module 140 may be configured to record a process of jumping to the target page to obtain a record file.
The determination module 150 may be configured to determine whether there is an infringement risk based on the first content information.
The credentialing module 160 can be configured to: when it is determined that an infringement risk exists, electronic evidence is generated and saved. The electronic evidence includes the record file.
For more details on the system 100 and its modules, reference may be made to fig. 2 and its associated description.
It should be understood that the system and its modules shown in FIG. 1 may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided, for example, on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules in this specification may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It should be noted that the above description of the system and its modules is for convenience of description only and should not limit the present disclosure to the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, in some embodiments, the obtaining module 110 and the inputting module 120 may be different modules in a system, or may be a module that implements the functions of the two modules. For another example, in some embodiments, the determining module 150 and the evidence storing module 160 may be two modules or may be combined into one module. Such variations are within the scope of the present disclosure.
FIG. 2 is an exemplary flow diagram of a method for piracy detection of application content in accordance with some embodiments of the present description. In some embodiments, the process 200 may be performed by the system 100 shown in FIG. 1. As shown in fig. 2, the process 200 may include the following steps.
Step 210, obtaining an executable file for accessing the target application program according to a preset operation path. In some embodiments, step 210 may be performed by acquisition module 110.
An operation path may refer to a set that includes one or more operations. It will be understood that when an operation path comprises multiple operations, the operation path will also specify the order of execution of the operations. In some embodiments, the preset operation path may include one or more of the following operations: clicking a designated link, sliding up, sliding down, long pressing, turning pages, and zooming. Wherein the specified link may comprise a hyperlink or a shortcut. A hyperlink may point to a particular web page and, upon clicking on the hyperlink, the web page to which it points may be accessed, and the hyperlink may be in text form. The shortcut may be directed to a specific application (e.g., the target application) and the application to which it is directed may be accessed upon clicking on the shortcut.
It should be understood that, on the premise of determining the starting page (the page before the executable file is run) and the target page of the target application program, the operation path corresponding to the executable file may be set arbitrarily. By way of example only, as shown in the top half of FIG. 3, the operating system has 3 user desktops containing shortcut icons for applications and/or other content (e.g., date, time), the shortcut icons being illustrated by rounded boxes. The desktop 0 is a startup desktop (a desktop automatically displayed after startup), the desktop 1 is located on the left side of the desktop 0 (the desktop 1 can be accessed by performing a rightward page turning operation such as a right sliding operation on the desktop 0), and the desktop 2 is located on the right side of the desktop 0 (the desktop 2 can be accessed by performing a leftward page turning operation such as a left sliding operation on the desktop 0). The target application (XX video in the figure) is located on the desktop 2, as shown in the lower half of fig. 3, a graphical user interface of the target application provides a plurality of video tags (such as movies, dramas, animations, documentaries) for selection, and the target application can jump to a corresponding page after a user selects a certain tag, and can jump to a page dedicated to playing movies (hereinafter referred to as "movie area") after the user clicks a movie tag. When it is determined that the starting page is the desktop 0 and the target page of the target application is the special point movie region, the operation path corresponding to the executable file may be "slide left → click on the shortcut icon of" XX video → click on the movie tag ".
It will be appreciated that some of the operational paths may be simpler or more complex than those illustrated. For example, the target page may be a top page (a page automatically displayed after a program is opened) of the target application, and the top page may show a preview screen of recommended content, so that the operation path may be set until a shortcut of the target application is clicked. For another example, the target page may be a long page, which supports reaching different parts (regions) of the page through a slide-up and/or slide-down operation and preferentially displays the top region, and when the content information to be extracted (i.e., the first content information in step 230) is located at the bottom of the page, a subsequent operation of clicking a tag corresponding to the target page in the operation path (displaying the top region of the target page after clicking the tag) may include a slide-down operation.
An executable file may refer to a file that may be loaded for execution by an operating system. Taking a Windows system as an example, the executable file may include specific types of files such as an exe file, an sys file, an com file, a bat file, and the like.
In some embodiments, the executable file may include a script (script). A script may refer to an executable file written according to a certain format using a particular description language (which may be referred to as a scripting language). A scripting language, also called extension language or dynamic language, is a programming language that can be used to control applications, the scripts being usually saved in a textual form, such as in the ASCII (American Standard Code for Information exchange) specification, and only interpreted or compiled when it is called.
In still other embodiments, the executable file may include other types of code that may be interpreted or compiled, such as a macro, which may refer to a series of sub-instructions organized together as separate instructions.
Step 220, inputting the executable file into the device installed with the target application program, so that the target application program jumps to a target page. In some embodiments, step 220 may be performed by input module 120.
After the executable file is obtained, the device can run the executable file, so that the user operation is simulated to enable the target application program to jump to a target page. It can be understood that the process of running the executable file is the process of accessing to the target page according to the preset operation path.
In some embodiments, the device may include various types of devices, such as a smartphone, a tablet, a desktop computer, a laptop computer, a smart television, a smart car machine, and so on.
In some embodiments, the device may be a physical device.
In some embodiments, the device may also be a virtual device. Through virtualization technology, multiple logical devices (i.e., virtual devices) can be virtualized on one physical device. For example, multiple logical computers (i.e., virtual computers) may be virtualized on one computer. As another example, multiple logical handsets (i.e., virtual handsets) may be virtualized on one computer. It is understood that the virtual device can be similar to or even indistinguishable in software functionality from the same type of physical device, e.g., the virtual phone can communicate, install, and run APP (Application), record video, etc. as the physical phone. When batch infringement detection is carried out, a plurality of executable files can be obtained and respectively input into a plurality of virtual mobile phones, and in each virtual mobile phone, the executable files can be used for accessing a target application program according to a preset operation path. The target application programs/target pages corresponding to different executable files may be the same or different. Furthermore, a plurality of detection processes corresponding to the plurality of executable files one to one may be executed in parallel. For each executable file, the detection process may include steps 220 through 260. By means of virtualization technology and parallelization processing, low-cost and efficient batch infringement detection can be achieved.
Step 230, extracting the first content information in the target page. In some embodiments, step 230 may be performed by extraction module 130.
In some embodiments, the first content information may include the page content itself, such as pictures, video, text, audio, and so forth. In some embodiments, the first content information may include characteristic information of the page content, such as an encoding of the content, a hash value of the content, an image texture characteristic, an audio characteristic, and the like. That is, after the content is obtained from the target page, the content may be further processed, such as encoding, hash value calculation, feature extraction, and the like, to obtain feature information of the content. Taking a video as an example, after the video is obtained (e.g., downloaded) from the target page, the key frames of the video may be extracted, and feature extraction is performed on each key frame to obtain a corresponding feature vector, so as to obtain feature information (including feature vectors corresponding to each key frame) of the video. It should be noted that the present specification does not specifically limit the algorithms/models related to feature extraction, such as the video key frame extraction algorithm and the feature extraction model.
In some embodiments, content may be obtained from a specified area of the target page to extract the first content information. When the first content information is feature information, the first content information may include feature information of content in a specified area in the target page, and the content in the specified area may be in a video, voice, picture, or text form. Specifically, the specified area may be determined by a coordinate range and/or a feature point coordinate, for example, by coordinates of four vertices of the rectangular area, or coordinates of specified vertices and size information (length and width, or aspect ratio and diagonal length).
In still other embodiments, content may be obtained from the target page in other ways to extract the first content information. For example, the target page may contain a download link (identifiable) for the content, and after the download link is identified from the target page, the content in the target page may be downloaded according to the download link.
And 240, recording the process of jumping to the target page to obtain a record file. In some embodiments, step 240 may be performed by the recording module 140.
Referring to the subsequent steps, once it is determined that there is a risk of infringement, the record file may be one of the basic components of the electronic proof.
In some embodiments, the process of jumping to the target page may be recorded in a video recording manner, so as to obtain the record file. For example, the recording file may be obtained by calling a screen recording function of the device in which the target application is installed. As another example, a recording device (e.g., a camera) external to the device in which the target application is installed may be called to obtain the recording file.
In still other embodiments, the process of jumping to the target page may be recorded in other manners to obtain the record file. For example, the log file may be obtained based on a work log of a device of the target application, where the work log may include a work log of an operating system and/or a work log of the target application.
Step 250, determining whether there is infringement risk based on the first content information. In some embodiments, step 250 may be performed by determination module 150.
As mentioned above, the first content information may include the page content itself or the characteristic information of the page content, and for convenience of description, the page content is referred to as the content to be detected. It is understood that whether the content to be detected has an infringement risk or not can be determined based on the first content information.
In some embodiments, the content to be detected is content in a designated area in the target page, and correspondingly, the first content information may be respectively compared with second content information of one or more protected works (such as copyrighted works) to determine whether the content to be detected has an infringement risk based on a comparison result. In some embodiments, the comparison may refer to calculating a distance between two feature vectors. For example, when the content to be detected is a picture (hereinafter, referred to as a picture to be detected), a distance between the picture to be detected and a feature vector of each copyrighted picture in the feature library (which may also be referred to as a similarity between the picture to be detected and the copyrighted picture) may be calculated, and when the similarity between the picture to be detected and any copyrighted picture in the feature library is smaller than a set threshold, it may be determined that the picture to be detected has an infringement risk. In some embodiments, the comparison may refer to an alignment to confirm whether the two are the same. For example, the hash value of the content to be detected may be compared with second content information of one or more protected works (e.g., copyrighted works), and when the hash value of the content to be detected is equal to the hash value of any protected work, it may be determined that the picture to be detected has an infringement risk.
When it is determined that there is an infringement risk, electronic evidence is generated and saved, the electronic evidence including the record file, step 260. In some embodiments, step 260 may be performed by the credentialing module 160.
The electronic evidence is stored to facilitate the infringement pursuit, and in practical application, the electronic evidence can be submitted to an internet court on line.
In some embodiments, the electronic evidence may also include other components, for example, the electronic evidence may also include at least one of the following information: at least a portion of the executable file, the first content information, the second content information, an electronic signature, and a trusted timestamp.
The executable file may be completely added to the electronic evidence, or a key portion may be intercepted and added to the electronic evidence, for example, an executable file portion corresponding to an operation path after the operation of the target application program may be started and added to the electronic evidence.
The electronic signature is used to prove the source of the electronic evidence, specifically, an evidence generator may use a local private key to sign (encrypt) the electronic evidence to obtain the electronic signature, and accordingly, an authenticator (e.g., a court of law) may use a public key of the evidence generator to verify (decrypt) the electronic signature to verify the source of the electronic evidence.
The trusted timestamp may indicate a time of generation of the electronic evidence or a time of presentation of content of a specified region in the target page. The credible timestamp provider is combined with the credible timestamp service center to operate according to related standards and regulations, and a national legal time service organization is responsible for time service and timekeeping of standard time, so that the reliability of a time source is guaranteed and maintained, and real-time monitoring is carried out.
In some embodiments, the electronic evidence may be saved in a centralized database.
In still other embodiments, the electronic evidence may be saved to a decentralized database, for example, the electronic evidence may be uploaded to a blockchain attestation system to prevent tampering with the electronic evidence.
The blockchain warranty system may be constructed based on blockchain techniques. Fig. 4 is a schematic diagram of a blockchain presence verification system in accordance with some embodiments of the present disclosure. As shown in fig. 4, the blockchain credentialing system 400 can include a blockchain client 410 (client 410 for short) and a blockchain network 420. The blockchain network 420 may include a plurality of blockchain nodes, such as node 420-1, node 420-2, node 420-3. The device performing the process 200, such as a physical device running a plurality of virtual devices installed with target applications, may be added to the blockchain presence system 400 as a blockchain client 410 or a blockchain node 420. In some embodiments, the device performing the process 200 may initiate a credentialing transaction (transaction for short) as the blockchain client 410 or the blockchain node 420, and write the electronic evidence into the blockchain data.
It should be noted that the above description of the flow is for illustration and description only and does not limit the scope of the application of the present specification. Various modifications and alterations to the flow may occur to those skilled in the art, given the benefit of this description. However, such modifications and variations are intended to be within the scope of the present description.
The beneficial effects that may be brought by the embodiments of the present description include, but are not limited to: (1) Automatic and batched infringement detection aiming at the content of the application program can be realized; (2) The user operation is simulated through the executable file, so that legal risks are avoided; (3) Efficient infringement detection can be realized through virtualization technology and parallelization processing; (4) The electronic evidence is stored through the block chain, so that the evidence can be conveniently obtained and can be prevented from being falsified. It is to be noted that different embodiments may produce different advantages, and in different embodiments, the advantages that may be produced may be any one or combination of the above, or any other advantages that may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the embodiments herein. Various modifications, improvements and adaptations to the embodiments described herein may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the embodiments of the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the specification. Reference to "one embodiment," "an embodiment," and/or "some embodiments" means a feature, structure, or characteristic described in connection with at least one embodiment of the specification. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the embodiments of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of embodiments of the present description may be carried out entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the embodiments of the present specification may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on a baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for operation of various portions of the embodiments of the present description may be written in any one or more programming languages, including an object oriented programming language such as Java, scala, smalltalk, eiffel, JADE, emerald, C + +, C #, VB.NET, python, and the like, a conventional programming language such as C, visualBasic, fortran2003, perl, COBOL2002, PHP, ABAP, a dynamic programming language such as Python, ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or processing device. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
In addition, unless explicitly stated in the claims, the order of processing elements and sequences, use of numbers and letters, or use of other names in the embodiments of the present specification are not intended to limit the order of the processes and methods in the embodiments of the present specification. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing processing device or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more embodiments of the invention. This method of disclosure, however, is not intended to imply that more features are required than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into the specification. Except where the application history document is inconsistent or conflicting with the present specification, and except where the document(s) (current or later added to the application) claim(s) the broadest scope of the application is restricted. It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of the present specification shall control if they are inconsistent or inconsistent with the statements and/or uses of the present specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are possible within the scope of the embodiments of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (10)

1. A method for detecting infringement of application program content comprises the following steps:
acquiring an executable file for accessing a target application program according to a preset operation path;
inputting the executable file into equipment provided with the target application program, so that the target application program jumps to a target page;
extracting first content information in the target page, and recording the process of jumping to the target page to obtain a record file;
determining whether there is an infringement risk based on the first content information;
when it is determined that an infringement risk exists, electronic evidence is generated and saved, the electronic evidence including the record file.
2. The method of claim 1, wherein the device comprises a virtual handset.
3. The method of claim 1, wherein the preset operation path comprises one or more of: clicking a designated link, sliding up, sliding down, long pressing, turning pages, and zooming.
4. The method of claim 1, wherein the first content information includes characteristic information of contents of a designated area in the target page, the contents of the designated area being in a video, voice, picture or text form.
5. The method of claim 1 or 4, wherein the determining whether there is an infringement risk based on the first content information comprises:
and respectively comparing the first content information with second content information of one or more protected works to determine whether the content of a specified area in the target page is at infringement risk or not based on the comparison result.
6. The method of claim 1, wherein the electronic evidence further comprises at least one of the following information: at least a portion of the executable file, the first content information, an electronic signature, and a trusted timestamp; wherein the electronic signature is used to prove a source of the electronic evidence, and the trusted timestamp indicates a generation time of the electronic evidence or a presentation time of content of a specified region in the target page.
7. The method of claim 1, wherein recording the process of moving to the target page to obtain a record file comprises:
and recording the process of jumping to the target page in a video recording mode to obtain the recording file.
8. The method of claim 1, wherein said saving electronic evidence comprises:
and uploading the electronic evidence to a block chain deposit system.
9. A system for detecting infringement of application program content comprises an acquisition module, an input module, an extraction module, a recording module, a determination module and a evidence storage module;
the acquisition module is used for acquiring an executable file for accessing the target application program according to a preset operation path;
the input module is used for inputting the executable file into the equipment provided with the target application program so as to enable the target application program to jump to a target page;
the extraction module is used for extracting first content information in the target page;
the recording module is used for recording the process of jumping to the target page to obtain a recording file;
the determining module is used for determining whether an infringement risk exists based on the first content information;
the evidence storage module is used for generating and storing electronic evidence when determining that the infringement risk exists, wherein the electronic evidence comprises the record file.
10. An infringement detection apparatus for application content, comprising a processor and a storage device for storing instructions, wherein the processor executes the instructions to implement the infringement detection method for application content according to any one of claims 1 to 8.
CN202211071054.8A 2022-09-02 2022-09-02 Method and system for detecting infringement of application program content Pending CN115408667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211071054.8A CN115408667A (en) 2022-09-02 2022-09-02 Method and system for detecting infringement of application program content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211071054.8A CN115408667A (en) 2022-09-02 2022-09-02 Method and system for detecting infringement of application program content

Publications (1)

Publication Number Publication Date
CN115408667A true CN115408667A (en) 2022-11-29

Family

ID=84163792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211071054.8A Pending CN115408667A (en) 2022-09-02 2022-09-02 Method and system for detecting infringement of application program content

Country Status (1)

Country Link
CN (1) CN115408667A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116542818A (en) * 2023-07-06 2023-08-04 图林科技(深圳)有限公司 Trademark monitoring and analyzing method based on big data technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116542818A (en) * 2023-07-06 2023-08-04 图林科技(深圳)有限公司 Trademark monitoring and analyzing method based on big data technology

Similar Documents

Publication Publication Date Title
US9098710B2 (en) Setting default security features for use with web applications and extensions
US9762598B1 (en) Automatic dynamic vetting of browser extensions and web applications
US20180276396A1 (en) System and method of controlling access to content using an accessibility api
US9607145B2 (en) Automated vulnerability and error scanner for mobile applications
US10289397B2 (en) Silent installation of software with dependencies
US20130212682A1 (en) Automatic discovery of system integrity exposures in system code
US20130036196A1 (en) Method and system for publishing template-based content
CN111737692B (en) Application program risk detection method and device, equipment and storage medium
WO2019144550A1 (en) Data entry optimizing method and device, computer device, and storage medium
US20220229764A1 (en) Automated test replay with sensitive information obfuscation
US9021596B2 (en) Correcting workflow security vulnerabilities via static analysis and virtual patching
US9495332B2 (en) Detection and repositioning of pop-up dialogs
CN115408667A (en) Method and system for detecting infringement of application program content
CN106484779B (en) File operation method and device
CN112632547A (en) Data processing method and related device
WO2018205392A1 (en) Control response area display control method, electronic apparatus, and storage medium
CN110597496B (en) Method and device for acquiring bytecode file of application program
CN111783119A (en) Form data security control method and device, electronic equipment and storage medium
CN108021317B (en) Method and device for screen editing
US10162488B1 (en) Browser-based media scan
US10503929B2 (en) Visually configurable privacy enforcement
US9965744B1 (en) Automatic dynamic vetting of browser extensions and web applications
US11546430B2 (en) Secure remote workspace
Sun et al. ZoomP3: Privacy-Preserving Publishing of Online Video Conference Recordings
CN112905260A (en) Application starting method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination