CN108416212A - Method for identifying application program and device - Google Patents

Method for identifying application program and device Download PDF

Info

Publication number
CN108416212A
CN108416212A CN201810172762.8A CN201810172762A CN108416212A CN 108416212 A CN108416212 A CN 108416212A CN 201810172762 A CN201810172762 A CN 201810172762A CN 108416212 A CN108416212 A CN 108416212A
Authority
CN
China
Prior art keywords
application program
icon
identified
application
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810172762.8A
Other languages
Chinese (zh)
Inventor
雷经纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810172762.8A priority Critical patent/CN108416212A/en
Publication of CN108416212A publication Critical patent/CN108416212A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • User Interface Of Digital Computer (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention proposes a kind of method for identifying application program and device, wherein method includes:Obtain the icon of application program to be identified, the icon for treating recognition application carries out feature extraction, to obtain the icon characteristics of application program to be identified, according to the icon characteristics of the icon characteristics of application program to be identified and trusted application, determine the icon similarity between application program and trusted application to be identified, according to icon similarity, identify whether application program to be identified is in the presence of abnormal application program.According to the icon similarity between application program to be identified and trusted application, to identify whether program to be identified is in the presence of abnormal application program, it solves in the related technology using the title of application program come recognition application, so that there is abnormal application program is easy to the technical problem for causing the accuracy of identification relatively low around identification.

Description

Method for identifying application program and device
Technical field
The present invention relates to technical field of mobile terminals more particularly to a kind of method for identifying application program and device.
Background technology
With the development of mobile Internet and popularizing for mobile terminal device, more and more users begin to use mobile whole The application program installed in end equipment is surfed the Internet, and is brought great convenience to people’s lives.But there are also illegal point Son, counterfeit official's application program, fascination user carry out wrong download, and user then may because of the application program that is mounted with to palm off, Privacy leakage, property loss etc. are caused, or even mobile terminal is made to catch virus.
In the related technology, for the identification of application program, using by comparing application program and official to be downloaded Whether application software title is identical to determine whether being but this method in the presence of abnormal application program, it is easy to quilt The developer of malice gets around, and the accuracy of identification is poor.
Invention content
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, the present invention proposes a kind of method for identifying application program, to realize through application program to be identified and credible answer With the icon similarity between program, identify whether application program to be identified is to improve presence in the presence of abnormal application program The accuracy of abnormal application program identification.
The present invention proposes a kind of application program identification device.
The present invention proposes a kind of procedure identification system.
The present invention proposes a kind of computer equipment.
The present invention proposes a kind of computer readable storage medium.
One aspect of the present invention embodiment proposes a kind of method for identifying application program, including:
Obtain the icon of application program to be identified;
Feature extraction is carried out to the icon of the application program to be identified, to obtain the icon of the application program to be identified Feature;
According to the icon characteristics of the icon characteristics and trusted application of the application program to be identified, wait knowing described in determination Other icon similarity between application program and trusted application;
According to the icon similarity, identify whether the application program to be identified is in the presence of abnormal application program.
In the method for identifying application program of the embodiment of the present invention, the icon of application program to be identified is obtained, is answered to be identified Feature extraction is carried out with the icon of program, to obtain the icon characteristics of application program to be identified, according to application program to be identified The icon characteristics of icon characteristics and trusted application determine the icon phase between application program to be identified and trusted application Like degree, according to icon similarity, identify whether application program to be identified is in the presence of abnormal application program.According to application to be identified Icon similarity between program and trusted application, come identify program to be identified whether be in the presence of abnormal application program, Solve in the related technology using the title of application program come recognition application so that there are abnormal application program be easy to around Identification is crossed, the technical problem for causing the accuracy of identification relatively low.
Another aspect of the invention embodiment proposes a kind of application program identification device, including:
Acquisition module, the icon for obtaining application program to be identified;
Extraction module carries out feature extraction for the icon to the application program to be identified, described to be identified to obtain The icon characteristics of application program;
Determining module, for special according to the icon characteristics of the application program to be identified and the icon of trusted application Sign, determines the icon similarity between the application program to be identified and trusted application;
Identification module, for according to the icon similarity, identifying whether the application program to be identified is that there are exceptions Application program.
In the application program identification device of the embodiment of the present invention, acquisition module is used to obtain the figure of application program to be identified Mark, the icon that extraction module is used to treat recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature, determining module are used for according to the icon characteristics of application program to be identified and the icon characteristics of trusted application, and determination waits for Icon similarity between recognition application and trusted application, identification module are used for according to icon similarity, and identification waits for Whether recognition application is in the presence of abnormal application program.According to the figure between application program to be identified and trusted application Similarity is marked, to identify whether program to be identified is to solve to use application program in the related technology in the presence of abnormal application program Title carry out recognition application so that there are abnormal application program be easy to around identification, cause identification accuracy compared with Low technical problem.
Another aspect of the invention embodiment proposes a kind of application program identification system, the system comprises:First program Module and the second program module;
First program module, the icon for obtaining application program to be identified, the icon for treating recognition application carry out Feature extraction to obtain the icon characteristics of application program to be identified, and reads the icon characteristics of trusted application, to the second journey Sequence module is called, with the icon similarity between determination application program to be identified and trusted application, according to icon phase Like degree, identify whether application program to be identified is in the presence of abnormal application program.
Second program module, for when the first program module is called, determining application program to be identified and trusted application journey Icon similarity between sequence.
In the application program identification system of the embodiment of the present invention, the first program module is for obtaining application program to be identified Icon, the icon for treating recognition application carry out feature extraction, to obtain the icon characteristics of application program to be identified, and read The icon characteristics of trusted application are called the second program module, with determination application program to be identified and trusted application Icon similarity between program identifies whether application program to be identified is in the presence of abnormal application journey according to icon similarity Sequence, the second program module are used for when the first program module is called, determine between application program and trusted application to be identified Icon similarity.According to the icon similarity between application program to be identified and trusted application, to identify journey to be identified Whether sequence is to solve, in the related technology using the title of application program come recognition application, to make in the presence of abnormal application program It obtains and is easy to the technical problem for causing the accuracy identified relatively low around identification in the presence of abnormal application program.
Another aspect of the invention embodiment proposes a kind of computer equipment, including:It memory, processor and is stored in On reservoir and the computer program that can run on a processor, when the processor executes described program, such as above-mentioned implementation is realized Method for identifying application program described in example.
Another aspect of the invention embodiment proposes a kind of computer readable storage medium, is stored thereon with computer journey Sequence realizes the method for identifying application program as described in above-described embodiment when said program is executed by a processor.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description Obviously, or practice through the invention is recognized.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein:
Fig. 1 shows the embodiment of the method for identifying application program that can be applied to the application or application program identification device Exemplary system architecture 100;
A kind of flow diagram for method for identifying application program that Fig. 2 is provided by the embodiment of the present invention;
The flow diagram for another method for identifying application program that Fig. 3 is provided by the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of application program identification device provided in an embodiment of the present invention;
The structural schematic diagram for another application program identification device that Fig. 5 is provided by the embodiment of the present invention;
A kind of structural schematic diagram for application program identification system that Fig. 6 is provided by the embodiment of the present invention;And
The structural schematic diagram for another application program identification system that Fig. 7 is provided by the embodiment of the present invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
It is to be judged by the filename of application program to be directed to the recognition methods of application program in the related technology, to be identified Application program and believable application program whether be identical application program, to judge application program to be identified whether be In the presence of abnormal application program, and this recognition methods, it is easy to the developer for being stored in abnormal application program bypasses, and causes The relatively low problem of the accuracy of identification.
For this purpose, the embodiment of the present application proposes a kind of recognition methods of application program, pass through determination application program to be identified The similar programs of icon between believable application program, to judge whether application program to be identified is in the presence of abnormal application Program, with deep impression because the icon of application program is for user, the developer of malice is in order to keep user not noticeable, nothing Method carries out icon larger change, to be identified by the icon of application program, improves in the presence of abnormal application The accuracy of procedure identification.
Fig. 1 shows the embodiment of the method for identifying application program that can be applied to the application or application program identification device Exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include user terminal 1011,1012,1013, network 102 and server 103.Wherein, network 102 between user terminal 1011,1012,1013 and server 103 provide communication link Jie Matter.Network 102 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be interacted by network 102 with server 103 using user terminal 1011,1012,1013, with receive or Send message etc..Various client applications can be installed, such as news category is applied, searched on user terminal 1011,1012,1013 Rope class application etc..
User terminal 1011,1012,1013 can be the various electronic equipments for having loud speaker and supporting information exchange, Including but not limited to smartwatch, smart mobile phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 103 can run the server of application market, such as provide user terminal 1011,1012,1013 The background server that application program is downloaded.Background server according to the request of user terminal, can carry out application program inquiry, It downloads and updates.
It should be noted that the method for identifying application program that the embodiment of the present application is provided is generally by each user terminal 1011, it 1012,1013 executes.
It should be understood that the number of the user terminal, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of user terminal, network and server.
Below with reference to the accompanying drawings the method for identifying application program and device of the embodiment of the present invention are described.
A kind of flow diagram for method for identifying application program that Fig. 2 is provided by the embodiment of the present invention.
As shown in Fig. 2, this approach includes the following steps:
Step 101, the icon of application program to be identified is obtained.
Specifically, the installation kit decompression of recognition application, the program running configuration file obtained to decompression are treated It carries out decompiling and, according to the store path of icon, reads the icon of application program to be identified to obtain the store path of icon.
Step 102, the icon for treating recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature.
Specifically, the icon for treating recognition application carries out feature extraction, and the icon for obtaining application program to be identified is special Perceptual hash (hash) algorithm (phash) can be used as a kind of possible realization method in sign, and extraction obtains icon characteristics, often The phash features of a icon are all one 64 01 character strings.
Step 103, according to the icon characteristics of the icon characteristics of application program to be identified and trusted application, determination waits knowing Other icon similarity between application program and trusted application.
Wherein, trusted application is usually what official issued, safe and reliable application program.
Specifically, the icon characteristics for traversing each trusted application described in presetting database, are traversed with acquisition The icon characteristics of trusted application, according to the icon characteristics of application program to be identified, with the trusted application that traverses Icon characteristics, the icon similarity between determining application program to be identified and each trusted application for traversing.
It should be noted that the icon characteristics of application program to be identified, the icon characteristics with trusted application, use Identical feature extraction algorithm carries out feature extraction and obtains.
Step 104, according to icon similarity, identify whether application program to be identified is in the presence of abnormal application program.
Wherein, include two kinds of situations there are abnormal application program, one is counterfeit application programs, and one is include disease The malicious application of poison.
Specifically, if traversing, there are the icon similarities between trusted application and application program to be identified to be more than threshold It is worth similarity, then the icon of application program to be identified is similar to the trusted application icon traversed in presetting database, really Fixed application program to be identified is in the presence of abnormal application program;If the trusted application traversed and application program to be identified it Between icon similarity be less than threshold similarity, then the trusted application journey in the icon and presetting database of application program to be identified The icon of sequence is dissimilar, determines that application program to be identified is trusted application.
It should be noted that application program to be identified and trusted application belong to different application developers.
In the method for identifying application program of the embodiment of the present invention, the icon of application program to be identified is obtained, according to be identified The icon of application program, the icon for treating recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature determines application program to be identified according to the icon characteristics of the icon characteristics of application program to be identified and trusted application Icon similarity between trusted application identifies whether application program to be identified is that there are different according to icon similarity Normal application program.According to the icon similarity between application program to be identified and trusted application, to identify journey to be identified Whether sequence is to solve, in the related technology using the title of application program come recognition application, to make in the presence of abnormal application program It obtains and is easy to the technical problem for causing the accuracy identified relatively low around identification in the presence of abnormal application program.
During being monitored to there is abnormal application program, inventor has found, usually there is abnormal application journey Icon is designed as similar to trusted application by sequence, and the disguise as trusted application is downloaded with confusing user.It is based on This, inventors herein proposes and is carried out in the presence of abnormal application program identification according to icon similarity.Above described embodiment describes lead to The icon for obtaining application program to be identified is crossed, is determined between the icon of application program to be identified and the icon of trusted application Icon similarity, and when application program to be identified being determined and the trusted application icon phase that traverses by icon similarity Like after, it can determine that the application program to be identified be the application program in the presence of exception, it is accurate in order to ensure identification in the present embodiment Degree, the certificate of trusted application for further obtaining application program to be identified and traversing, by the comparison of certificate into one Step determines whether application program to be identified is to improve the accuracy rate of identification in the presence of abnormal application program.
For this purpose, on the basis of the above embodiments, the embodiment of the present application proposes alternatively possible application program identification Method, the flow diagram for another method for identifying application program that Fig. 3 is provided by the embodiment of the present invention, as shown in figure 3, should Method may include steps of:
Step 201, according to the trusted application downloaded in advance, presetting database is generated.
Specifically, according to the believable application program downloaded in advance, presetting database is generated, the presetting database is for remembering Carry the certificate of each trusted application and/or the relevant information of icon, wherein the relevant information of icon includes icon characteristics.
Step 202, the icon and certificate of application program to be identified are obtained.
Specifically, the installation kit decompression of recognition application, the program running configuration file obtained to decompression are treated It carries out decompiling and, according to the store path of icon, reads the icon of application program to be identified to obtain the store path of icon.
The certificate of recognition application is treated, the tool that can undertake to perform work within a time limit and according to specifications by resource is read out.For example, in Android system, profit With the resource job contract tool (Android Asset Packaging Tool, AAPT) of Android, you can read the card of application program Book.
It should be noted that in step 201 in presetting database the icon of trusted application and feature acquisition modes, It is identical with the acquisition modes of feature with the icon of application program to be identified.
Step 203, the icon for treating recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature.
As a kind of possible realization method, perceptual hash (hash) algorithm (phash) can be used, extraction obtains icon spy Sign, the phash features of each icon are one 64 01 character strings.
Step 204, according to the icon characteristics of application program to be identified, each trusted application described in presetting database is traversed The icon characteristics of program, to obtain the icon similarity between application program to be identified and each trusted application.
Specifically, the icon characteristics of the trusted application to traversing are read out, and to obtain the first character string, are treated The icon characteristics of recognition application are read out, to obtain the second character string, by the icon characteristics as trusted application The first character string be compared with the second character string of the icon characteristics as application program to be identified, to obtain the first character The string digit different from position value is corresponded in the second character string determines the value of icon similarity according to digit.
It should be noted that digit has inverse relationship with icon similarity, that is to say, that the first character string and the second word Correspond to that value different digit in position is more, then the icon similarity the lower in symbol string, that is, the trusted application traversed with wait for Recognition application is more dissimilar;First character string from that value different digit in position is corresponded in the second character string is fewer, then icon Similarity is higher, that is, the trusted application traversed is more similar to application program to be identified.
Step 205, for each obtained icon similarity, judge whether icon similarity is more than threshold similarity, If so, executing step 206, otherwise, step 209 is executed.
Specifically, according to preset threshold similarity, each the icon similarity and threshold similarity that will be obtained Compare, judge whether icon similarity is more than threshold similarity, and if it exists, then application program to be identified and traverse this is credible Icon between application program is more similar, then the application program to be identified is determined to have abnormal application program, needs into one Step compares the certificate of application program to confirm whether the application program to be identified is in the presence of abnormal application program.If traversed After presetting database, obtained icon similarity is all not more than threshold similarity, it is determined that application program to be identified is believable Application program.
For example, the value of the icon similarity between application program A to be identified and trusted application B is 8, if threshold value phase It is 5 like degree, then icon similarity is more than threshold similarity, then illustrates between application program A and trusted application B to be identified Icon is similar, and application program A to be identified is the application program for having abnormal for trusted application B, is needed into one Step is verified whether by certificate comparison as abnormal application program.
Step 206, the certificate of the trusted application traversed is read from presetting database.
Specifically, the certificate of application program to be identified is read, and reads the trusted application traversed from presetting database The certificate of program, certificate is compared.It should be noted that the certificate of application program is unique, certificate, which is used to indicate, answers Use program developer.
Step 207, the certificate of the certificate for judging the trusted application traversed and application program to be identified whether not phase Together, if it is not the same, otherwise executing step 208 returns to step 204, continue to traverse presetting database.
Specifically, the certificate of the trusted application traversed and the certificate of application program to be identified are compared, as one Kind possible realization method, certificate can extract as character string, by the corresponding character string of the certificate of the trusted application traversed Character string corresponding with the certificate of application program to be identified is compared, if the certificate of the trusted application traversed with wait knowing The result that the certificate of other application program compares is to differ, then the application program to be identified is identified as in the presence of abnormal application journey Sequence;If the comparison result of certificate is identical, which continues to identify, to presetting database Continue to traverse, that is, return and execute above-mentioned step 204-207, with other trusted applications for being traversed in database into Row compares, until terminating to all trusted applications traversal in database.
Step 208, traversal presetting database being terminated, judging application program to be identified to there is the application program of exception.
Specifically, if the comparison result of certificate is difference, the application program to be identified is judged to there is the application of exception Program terminates ergodic data library.
Step 209, identify that application program to be identified is believable application program.
Specifically, if in step 205, the trusted application in presetting database, obtained all icon phases are traversed It is less than threshold similarity like degree, then can be determined that the application program to be identified is believable application program.
Step 210, according to the application program to be identified for being identified as trusted application, presetting database is updated.
Specifically, it will be identified as the application program to be identified of trusted application, in update to presetting database, increased pre- If the data in data, the data that follow-up application program to be identified can compare are improved, the accuracy of application program identification is improved.
In order to more clearly illustrate the recognition methods of aforementioned another application program, it is with Android operation system below Explanation is further explained in example, the recognition methods to aforementioned applications program.
Specifically, in Android operation system, the installation kit of shielded official's trusted application is chosen Installation kit is decompressed to obtain the configuration file of program operation, and carries out decompiling by (AndroidPackage, apk), obtains icon Store path, according to store path read trusted application icon, obtain the relevant information of icon, and extract icon spy Sign, as a kind of possible realization method, using perceptual hash (hash) algorithm (phash), extraction obtains icon characteristics, each The phash features of icon are all one 64 01 character strings.In turn, the certificate of trusted application is obtained, can specifically be called The aapt tools that Google (google) provides obtain the certificate of trusted application, according to the certificate of preset trusted application Presetting database is generated with icon characteristics, such as:
apk1:Phash1, cert1
apk2:Phash2, cert2
······
Wherein, apk represents application program, phash representative icon features, and cert represents certificate, subsequent number 1,2, only For distinguishing different application programs, icon characteristics and certificate.
Application program to be identified is obtained, the icon characteristics and certificate of application program to be identified are extracted according to above-mentioned method, It can indicate as follows:
apk_x:Phash_x, cert_x,
Wherein, the representation of " _ x " is for identifying application program to be identified, the subsequent x of underscore, as transformable Number can be 1,2,3 etc., for distinguishing different application programs to be identified and its icon characteristics and certificate.
According to application program apk_x to be identified, preset database is traversed, is obtained successively believable in presetting database Application program:Take presetting database the first row record apk1, calculate application program to be identified icon characteristics phash_x and can Believe that the icon similarity of the icon characteristics phash_1 of application program is sim_x_1, by icon similarity sim_x_1 and preset Threshold similarity compares, if sim_x_1>Threshold similarity, the then icon of application program to be identified and the trusted application traversed The icon of program is similar, the application program that application program to be identified is abnormal is identified, if sim_x_1<Threshold similarity, then icon Dissmilarity identifies that application program to be identified is trusted application.
The similar trusted application of icon traversed is obtained, erroneous judgement in order to prevent improves the accuracy of identification, needs The certificate that further obtain the certificate and application program to be identified of the trusted application traversed, should by what is traversed The certificate of trusted application and the certificate of application program to be identified are compared, if certificate is different, terminate traversal present count According to library, identify that the application program to be identified is in the presence of abnormal application program;If certificate is identical, continue to traverse preset data Trusted application in library continues to compare.
After the completion of presetting database traverses, record judgement is as a result, will be identified as, in the presence of abnormal application program, passing through hair Go out information warning, user is reminded not install, with to cause damages.And the trusted application of identification is updated to preset data In library, increase data volume to be compared in database, improves the accuracy subsequently identified.
Similarly, the method for the present embodiment can be also used for other operating systems, such as the ISO systems of apple, for this For field technology personnel, the characteristics of according to other operating systems, it is only necessary to which certain steps in above-described embodiment are carried out letter Single replacement, you can be applied to other operating systems.Therefore, the method for identifying application program of the present embodiment is applied Operating system, the present embodiment are not limited to Android operation system.
In the method for identifying application program of the embodiment of the present invention, the icon of application program to be identified is obtained, extraction module is used Feature extraction is carried out in the icon for treating recognition application, to obtain the icon characteristics of application program to be identified, according to waiting knowing The icon of other application program determines the icon similarity between application program and trusted application to be identified, according to icon phase Like degree, identify whether application program to be identified is in the presence of abnormal application program.According to application program to be identified and trusted application Icon similarity between program, to identify whether program to be identified is to improve the standard of identification in the presence of abnormal application program Exactness.Meanwhile in order to further increase the accuracy of identification, it can also obtain when icon similarity is more than threshold value and apply journey The certificate of sequence, whether the certificate for further comparing application program to be identified and target program is identical, if certificate is different, identification should Application program to be identified is in the presence of abnormal application program, so that the recognition accuracy that there is abnormal application program increases Add, avoid erroneous judgement, user satisfaction is high.In order to realize that above-described embodiment, the present invention also propose a kind of application program identification Device.
Fig. 4 is a kind of structural schematic diagram of application program identification device provided in an embodiment of the present invention.
As shown in figure 4, the device includes:Acquisition module 31, extraction module 32, determining module 33 and identification module 34.
Acquisition module 31, the icon for obtaining application program to be identified.
Extraction module 32, the icon for treating recognition application carry out feature extraction, to be identified using journey to obtain The icon characteristics of sequence.
Determining module 33 is used for according to the icon characteristics of application program to be identified and the icon characteristics of trusted application, Determine the icon similarity between application program and trusted application to be identified.
Identification module 34, for according to icon similarity, identifying whether application program to be identified is in the presence of abnormal application Program.
It should be noted that the aforementioned device that the embodiment is also applied for the explanation of embodiment of the method, herein not It repeats again.
In the application program identification device of the embodiment of the present invention, acquisition module is used to obtain the figure of application program to be identified Mark, the icon that extraction module is used to treat recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature, determining module are used for according to the icon characteristics of application program to be identified and the icon characteristics of trusted application, and determination waits for Icon similarity between recognition application and trusted application, identification module are used for according to icon similarity, and identification waits for Whether recognition application is in the presence of abnormal application program.According to the figure between application program to be identified and trusted application Similarity is marked, to identify whether program to be identified is to solve to use application program in the related technology in the presence of abnormal application program Title carry out recognition application so that there are abnormal application program be easy to around identification, cause identification accuracy compared with Low technical problem.
Based on above-described embodiment, the embodiment of the present invention additionally provides a kind of possible realization side of application program identification device Formula, the structural schematic diagram for another application program identification device that Fig. 5 is provided by the embodiment of the present invention, in a upper embodiment On the basis of, as shown in figure 5, the device further includes:Generation module 35 and update module 36.
Generation module 35, for according to the trusted application downloaded in advance, generating presetting database, presetting database is used In the relevant information for the certificate and/or icon for recording each trusted application, wherein relevant information includes icon characteristics.
Update module 36, for when judge application program to be identified for trusted application when, apply journey according to be identified Sequence updates presetting database.
As a kind of possible realization method, determining module 33 can also include:Traversal Unit 331, determination unit 332, Reading unit 333 and judging unit 334.
Traversal Unit 331, for traversing presetting database, to obtain the icon characteristics of the trusted application traversed, Wherein, the icon characteristics of trusted application are to the icon of trusted application using the icon with application program to be identified The identical feature extraction algorithm of feature carries out feature extraction and obtains.
Determination unit 332, for according to the icon characteristics of application program to be identified, with the trusted application that traverses Icon characteristics determine the icon similarity between application program to be identified and the trusted application traversed.
Reading unit 333, for when icon similarity is more than threshold similarity, being traversed from presetting database reading The certificate of trusted application, wherein certificate is used to indicate application developer.
Judging unit 334, the certificate of the certificate of the trusted application for judging to traverse and application program to be identified It is whether identical;If the certificate of the trusted application traversed and the certificate of application program to be identified differ, it is pre- to terminate traversal If database;If the certificate of the trusted application traversed is identical as the certificate of application program to be identified, it is default to continue traversal Database.
As a kind of possible realization method, determination unit 332 is specifically used for:
The icon characteristics of trusted application to traversing are read out, and to obtain the first character string, are answered to be identified It is read out with the icon characteristics of program, to obtain the second character string, compares the first character string and the second character string, to obtain pair The digit for answering a value different determines icon similarity according to digit, wherein digit has inverse relationship with icon similarity.
As a kind of possible realization method, acquisition module 31 is specifically used for:
The installation kit decompression of recognition application is treated, it is counter to the obtained program running configuration file of decompression to be compiled It translates, to obtain icon store path, according to icon store path, reads the icon of application program to be identified.
It should be noted that the aforementioned device that the embodiment is also applied for the explanation of embodiment of the method, herein not It repeats again.
In the application program identification device of the embodiment of the present invention, acquisition module is used to obtain the figure of application program to be identified Mark, the icon that extraction module is used to treat recognition application carries out feature extraction, to obtain the icon of application program to be identified Feature, determining module are used for according to the icon characteristics of application program to be identified and the icon characteristics of trusted application, and determination waits for Icon similarity between recognition application and trusted application, identification module are used for according to icon similarity, and identification waits for Whether recognition application is in the presence of abnormal application program.According to the figure between application program to be identified and trusted application Similarity is marked, to identify whether program to be identified is to improve the accuracy of identification in the presence of abnormal application program.Meanwhile being The accuracy of identification is further increased, the certificate of application program can also be obtained, into one when icon similarity is more than threshold value Step compares application program to be identified and whether the certificate of target program is identical, if certificate is different, identifies that this is to be identified using journey Sequence is, so that the recognition accuracy that there is abnormal application program increases, to avoid erroneous judgement in the presence of abnormal application program Disconnected, user satisfaction is high.
Based on above-described embodiment, the invention also provides a kind of identifying system of application program, which is to before execution State what the program of method was divided according to function module, a kind of application program that Fig. 6 is provided by the embodiment of the present invention The structural schematic diagram of identifying system, as shown in fig. 6, the system includes:First program module 51 and the second program module 52.
First program module 51, the icon for obtaining application program to be identified, treat the icon of recognition application into Row feature extraction to obtain the icon characteristics of application program to be identified, and reads the icon characteristics of trusted application, to second Program module 52 is called, with the icon similarity between determination application program to be identified and trusted application, according to figure Similarity is marked, identifies whether application program to be identified is in the presence of abnormal application program.
Second program module 52, for when the first program module 51 is called, determining that application program to be identified is answered with credible With the icon similarity between program.
In the application program identification system of the embodiment of the present invention, the first program module is for obtaining application program to be identified Icon carries out feature extraction to the icon of the application program to be identified, special with the icon for obtaining the application program to be identified Sign, and reads the icon characteristics of trusted application, is called to the second program module, with determination application program to be identified with Icon similarity between trusted application identifies whether application program to be identified is that there are exceptions according to icon similarity Application program, the second program module determines application program and trusted application to be identified for when the first program module is called Icon similarity between program.According to the icon similarity between application program to be identified and trusted application, to identify Whether program to be identified is in the presence of abnormal application program, and solution identifies application using the title of application program in the related technology Program so that there are the technical problems that abnormal application program is easy to cause the accuracy of identification relatively low around identification.
Based on above-described embodiment, the embodiment of the present invention also proposed alternatively possible application program identification system, and Fig. 7 is The structural schematic diagram for another application program identification system that the embodiment of the present invention is provided, on the basis of a upper embodiment, As shown in fig. 7, the system can also include:Third program module 53 and the 4th program module 54.
As a kind of possible realization method, the first program module 51 is specifically used for each credible in traversal presetting database Application program and the second program module 52 of calling determine the icon phase of the trusted application and application program to be identified that traverse Third program module 53 is called, when the icon similarity that the second mould program block is determined is more than threshold similarity to sentence like degree Whether the certificate of the disconnected trusted application traversed is identical as the certificate of application program to be identified;If third program module 53 is true Surely the certificate of the trusted application traversed and the certificate of application program to be identified differ, and identify that application program to be identified is In the presence of abnormal application program;If third program module 53 determines the certificate of the trusted application traversed and application to be identified The certificate of program is identical, continues to traverse presetting database.
Third program module 53, the card of certificate and application program to be identified for comparing the trusted application traversed Whether book is identical.
4th program module 54, for according to the trusted application downloaded in advance, generating presetting database, wherein pre- If database is used to record the certificate of each trusted application and/or the relevant information of icon, relevant information includes icon characteristics.
In order to further clearly illustrate the step of modules execute in above system embodiment, the present embodiment also proposes Another method for identifying application program, this method are executed by each model in system, are specifically comprised the following steps:
Step 701, the 4th program module chooses official believable application program, be downloaded, and according to downloading in advance Trusted application generates presetting database, the certificate of each trusted application and/or the phase of icon has been recorded in the database Close information, wherein the relevant information of icon includes icon characteristics.
Step 702, the first program module obtains the icon of application program to be identified, and traverses each credible in presetting database Application program reads the icon characteristics of trusted application.
Step 703, the first program module call the second program module, with by the second program module determine traverse can Believe the icon similarity between application program and application program to be identified.
Step 704, if the icon similarity that the second program module is determined is more than threshold similarity, the first program module Obtain the certificate of trusted application traversed from presetting database, a step third program module of going forward side by side, to pass through the Three program modules are more than icon similarity the card of the certificate and application program to be identified of the trusted application of threshold similarity Book is compared.
Step 705, if the certificate of the trusted application traversed and the certificate of application program to be identified differ, know The application program to be identified is not the application program in the presence of exception, and exports result.
Step 706, if the certificate of the trusted application traversed is identical as the certificate of application program to be identified, first Program module continues to traverse the remaining trusted application in presetting database, re-executes step 702- steps 705, until the One program module has traversed all credible application programs in presetting database, and exports last result.
Step 707, if application program to be identified is finally identified as trusted application, the 4th program module is credible by this In application program update to data.
In the application program identification system of the embodiment of the present application, the 4th program module generates preset trusted application Database, the first program module traverse each trusted application in presetting database and the determination of the second program module are called to traverse Trusted application and application program to be identified icon similarity, when the icon similarity that the second program module is determined is big When threshold similarity, third program module is called, to compare the destination application that icon similarity is more than threshold similarity Certificate it is whether identical as the certificate of application program to be identified, if it is different, be identified as in the presence of abnormal application program, if identical, Then the first program module continues to traverse presetting database, continues to compare.By first compare application program to be identified with it is credible The icon similarity of application program marks the trusted application to be answered for target when icon similarity is more than threshold similarity With program, and whether the certificate for further comparing application program to be identified and destination application is identical, avoids erroneous judgement, carries The high accuracy of application program identification, the satisfaction of user are high.
In order to realize that above-described embodiment, the embodiment of the present invention also proposed a kind of computer equipment, including:Memory, place The computer program managed device and storage on a memory and can run on a processor, when the processor executes described program, Realize the method for identifying application program as described in above method embodiment.
In order to realize that above-described embodiment, the embodiment of the present invention also proposed a kind of computer readable storage medium, deposit thereon Computer program is contained, when said program is executed by a processor, realizes that the application program as described in above method embodiment is known Other method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (system of such as computer based system including processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicating, propagating or passing Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage Or firmware is realized.Such as, if realized in another embodiment with hardware, following skill well known in the art can be used Any one of art or their combination are realized:With for data-signal realize logic function logic gates from Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the present invention System, those skilled in the art can be changed above-described embodiment, change, replace and become within the scope of the invention Type.

Claims (12)

1. a kind of method for identifying application program, which is characterized in that the described method comprises the following steps:
Obtain the icon of application program to be identified;
Feature extraction is carried out to the icon of the application program to be identified, it is special with the icon for obtaining the application program to be identified Sign;
According to the icon characteristics of the icon characteristics and trusted application of the application program to be identified, described to be identified answer is determined With the icon similarity between program and trusted application;
According to the icon similarity, identify whether the application program to be identified is in the presence of abnormal application program.
2. method for identifying application program according to claim 1, which is characterized in that described according to described to be identified using journey The icon characteristics of sequence and the icon characteristics of trusted application determine between the application program to be identified and trusted application Icon similarity, including:
Presetting database is traversed, to obtain the icon characteristics of the trusted application traversed;Wherein, the trusted application Icon characteristics, be to the icon of the trusted application using identical with the icon characteristics of application program to be identified Feature extraction algorithm carries out feature extraction and obtains;
According to the icon characteristics of the application program to be identified, the icon characteristics with the trusted application traversed determine institute State the icon similarity between application program to be identified and the trusted application traversed.
3. method for identifying application program according to claim 2, which is characterized in that described according to described to be identified using journey The icon characteristics of sequence, the icon characteristics with the trusted application traversed determine the application program to be identified and traverse Trusted application between icon similarity after, further include:
When the icon similarity is more than threshold similarity, the trusted application traversed is read from the presetting database Certificate;The certificate is used to indicate application developer;
Judge whether the certificate of the trusted application traversed is identical as the certificate of the application program to be identified;
If the certificate of the trusted application traversed and the certificate of the application program to be identified differ, terminate described in traversal Presetting database;
If the certificate of the trusted application traversed is identical as the certificate of application program to be identified, continue to traverse described pre- If database.
4. method for identifying application program according to claim 2, which is characterized in that described according to described to be identified using journey The icon characteristics of sequence, the icon characteristics with the trusted application traversed determine the application program to be identified and traverse Trusted application between icon similarity, including:
The icon characteristics of trusted application to traversing are read out, to obtain the first character string;
The icon characteristics of the application program to be identified are read out, to obtain the second character string;
Compare first character string and second character string, to obtain the different digit of corresponding position value;
According to the digit, the icon similarity is determined;The digit has inverse relationship with the icon similarity.
5. method for identifying application program according to claim 1, which is characterized in that the acquisition application program to be identified Icon, including:
Installation kit decompression to the application program to be identified;
Decompiling is carried out to the program running configuration file that decompression obtains, to obtain icon store path;
According to the icon store path, the icon of the application program to be identified is read.
6. according to claim 1-5 any one of them method for identifying application program, which is characterized in that the method further includes:
According to the trusted application downloaded in advance, presetting database is generated, the presetting database is for recording each credible answer With the certificate of program and/or the relevant information of icon;The relevant information includes icon characteristics;
When judge the application program to be identified for trusted application when, according to pre- described in the application program update to be identified If database.
7. a kind of application program identification device, which is characterized in that described device includes:
Acquisition module, the icon for obtaining application program to be identified;
Extraction module carries out feature extraction, to obtain the application to be identified for the icon to the application program to be identified The icon characteristics of program;
Determining module is used for the icon characteristics of the icon characteristics and trusted application according to the application program to be identified, really Fixed icon similarity between the application program to be identified and trusted application;
Identification module, for according to the icon similarity, identifying whether the application program to be identified is to be answered in the presence of abnormal Use program.
8. a kind of application program identification system, which is characterized in that the system comprises:First program module and the second program mould Block;
First program module, the icon for obtaining application program to be identified, to the icon of the application program to be identified Feature extraction is carried out, to obtain the icon characteristics of the application program to be identified, and reads the icon characteristics of trusted application, Second program module is called, with the figure between the determination application program to be identified and the trusted application Mark similarity;According to the icon similarity, identify whether the application program to be identified is in the presence of abnormal application program;
Second program module determines the application program to be identified and can for when first program module is called Believe the icon similarity between application program.
9. application program identification system according to claim 8, which is characterized in that the system also includes:Third program Module;
First program module specifically for each trusted application in traversal presetting database and calls second program Module determines the icon similarity of the trusted application and the application program to be identified that traverse, when the second program mould When the icon similarity that block is determined is more than threshold similarity, the third program module is called, it is credible to judge to traverse Whether the certificate of application program is identical as the certificate of the application program to be identified;If the third program module determination traverses Trusted application certificate and the certificate of the application program to be identified differ, identify that the application program to be identified is In the presence of abnormal application program;If the third program module determines that the certificate of the trusted application traversed waits knowing with described The certificate of other application program is identical, continues to traverse the presetting database;
The third program module, the certificate for comparing the trusted application traversed and the application program to be identified Whether certificate is identical.
10. application program identification system according to claim 8, which is characterized in that the system further includes:
4th program module, for according to the trusted application downloaded in advance, generating presetting database, the presetting database The relevant information of certificate and/or icon for recording each trusted application;The relevant information includes icon characteristics.
11. a kind of computer equipment, which is characterized in that including:Memory, processor and storage on a memory and can handled The computer program run on device when the processor executes described program, realizes answering as described in any in claim 1-6 With procedure identification method.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method for identifying application program as described in any in claim 1-6 is realized when execution.
CN201810172762.8A 2018-03-01 2018-03-01 Method for identifying application program and device Pending CN108416212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810172762.8A CN108416212A (en) 2018-03-01 2018-03-01 Method for identifying application program and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810172762.8A CN108416212A (en) 2018-03-01 2018-03-01 Method for identifying application program and device

Publications (1)

Publication Number Publication Date
CN108416212A true CN108416212A (en) 2018-08-17

Family

ID=63129904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810172762.8A Pending CN108416212A (en) 2018-03-01 2018-03-01 Method for identifying application program and device

Country Status (1)

Country Link
CN (1) CN108416212A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109726294A (en) * 2018-12-04 2019-05-07 北京奇艺世纪科技有限公司 A kind of App entity alignment schemes, device and electronic equipment
CN110413871A (en) * 2018-12-18 2019-11-05 腾讯科技(深圳)有限公司 Using recommended method, device and electronic equipment
CN110929256A (en) * 2019-11-20 2020-03-27 秒针信息技术有限公司 Method and device for identifying abnormal access equipment
CN112016606A (en) * 2020-08-20 2020-12-01 恒安嘉新(北京)科技股份公司 Detection method, device and equipment for application program APP and storage medium
CN112016580A (en) * 2019-05-31 2020-12-01 北京百度网讯科技有限公司 Application program name identification method and device and terminal
CN112329851A (en) * 2020-11-05 2021-02-05 腾讯科技(深圳)有限公司 Icon detection method and device and computer readable storage medium
CN112905191A (en) * 2019-11-19 2021-06-04 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer readable storage medium and computer equipment
CN113343238A (en) * 2021-06-25 2021-09-03 Oppo广东移动通信有限公司 Application program identification method, device, storage medium and terminal
CN114237144A (en) * 2021-11-22 2022-03-25 上海交通大学宁波人工智能研究院 Embedded PLC (programmable logic controller) safe and credible system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825084A (en) * 2015-01-06 2016-08-03 阿里巴巴集团控股有限公司 Method for matching detection of object having images
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN106372509A (en) * 2016-09-30 2017-02-01 北京奇虎科技有限公司 Method and device for searching and killing unknown suspicious application
US20170257361A1 (en) * 2016-03-03 2017-09-07 F-Secure Corporation Authenticating or Controlling Software Application on End User Device
CN107220325A (en) * 2017-05-22 2017-09-29 华中科技大学 A kind of similar icon search methods of APP based on convolutional neural networks and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825084A (en) * 2015-01-06 2016-08-03 阿里巴巴集团控股有限公司 Method for matching detection of object having images
US20170257361A1 (en) * 2016-03-03 2017-09-07 F-Secure Corporation Authenticating or Controlling Software Application on End User Device
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN106372509A (en) * 2016-09-30 2017-02-01 北京奇虎科技有限公司 Method and device for searching and killing unknown suspicious application
CN107220325A (en) * 2017-05-22 2017-09-29 华中科技大学 A kind of similar icon search methods of APP based on convolutional neural networks and system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109726294A (en) * 2018-12-04 2019-05-07 北京奇艺世纪科技有限公司 A kind of App entity alignment schemes, device and electronic equipment
CN110413871A (en) * 2018-12-18 2019-11-05 腾讯科技(深圳)有限公司 Using recommended method, device and electronic equipment
CN112016580A (en) * 2019-05-31 2020-12-01 北京百度网讯科技有限公司 Application program name identification method and device and terminal
CN112016580B (en) * 2019-05-31 2023-07-25 北京百度网讯科技有限公司 Application program name identification method, device and terminal
CN112905191A (en) * 2019-11-19 2021-06-04 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer readable storage medium and computer equipment
CN112905191B (en) * 2019-11-19 2023-11-07 腾讯科技(深圳)有限公司 Data processing method, device, computer readable storage medium and computer equipment
CN110929256A (en) * 2019-11-20 2020-03-27 秒针信息技术有限公司 Method and device for identifying abnormal access equipment
CN112016606A (en) * 2020-08-20 2020-12-01 恒安嘉新(北京)科技股份公司 Detection method, device and equipment for application program APP and storage medium
CN112329851A (en) * 2020-11-05 2021-02-05 腾讯科技(深圳)有限公司 Icon detection method and device and computer readable storage medium
CN112329851B (en) * 2020-11-05 2024-08-06 腾讯科技(深圳)有限公司 Icon detection method and device and computer readable storage medium
CN113343238A (en) * 2021-06-25 2021-09-03 Oppo广东移动通信有限公司 Application program identification method, device, storage medium and terminal
CN114237144A (en) * 2021-11-22 2022-03-25 上海交通大学宁波人工智能研究院 Embedded PLC (programmable logic controller) safe and credible system and method
CN114237144B (en) * 2021-11-22 2024-04-02 上海交通大学宁波人工智能研究院 System and method for PLC security and credibility based on embedded type

Similar Documents

Publication Publication Date Title
CN108416212A (en) Method for identifying application program and device
CN104954353B (en) The method of calibration and device of APK file bag
US10216510B2 (en) Silent upgrade of software with dependencies
CN109359468A (en) Leak detection method, device and equipment
CN111737692B (en) Application program risk detection method and device, equipment and storage medium
CN108446572B (en) Privacy authority management method based on service granularity
CN110532107B (en) Interface calling method, device, computer equipment and storage medium
CN109446753A (en) Detect method, apparatus, computer equipment and the storage medium of pirate application program
TW201642156A (en) Page jumps based on text hiding
CN107172070A (en) Resource access processing method and device
CN107203372A (en) Control shows method and device
CN106030527B (en) By the system and method for application notification user available for download
CN105653949A (en) Malicious program detection method and device
CN106055375A (en) Application program installation method and device
CN113961919A (en) Malicious software detection method and device
CN108616361B (en) Method and device for identifying uniqueness of equipment
CN114064732A (en) Method and system for generating unique identifier of equipment
CN109361806A (en) Black number storage method, black number mark method, system and device
CN115659340B (en) Counterfeit applet identification method and device, storage medium and electronic equipment
KR101461051B1 (en) Method for detecting malignant code through web function analysis, and recording medium thereof
US10839066B1 (en) Distinguishing human from machine input using an animation
CN108319868A (en) Guard method, device, storage medium and the terminal device of picture access
CN106599637A (en) Method and device for inputting verification code into verification interface
CN109345063B (en) Data processing method and device for wind control system and storage medium
CN106845266A (en) A kind of information processing method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination