Method and system for identifying whether an application is genuine by means of digital watermarks
First Claim
1. A method for identifying whether an application is genuine by means of digital watermarks, characterized in that the method comprises:
- acquiring an executable file of an application to be identified and extracting a first digital watermark from the executable file;
using a decompiling-then-compiling algorithm on the executable file so as to generate a first compilation file having a same file format as that of the executable file, and extracting a second digital watermark from the first compilation file;
wherein, the second digital watermark and the first digital watermark belong to the same type of digital watermarks;
using another decompiling-then-compiling algorithm that is different with the decompiling-then-compiling algorithm on the executable file so as to generate a second compilation file having a same file format as that of the executable file, and extracting a third digital watermark from the second compilation file;
wherein, the third digital watermark and the first digital watermark belong to the same type of digital watermarks; and
in the another decompiling-then-compiling algorithm, the format of the file generated after decompiling is identical with that of a corresponding file generated during compiling and generating the executable file of a genuine application corresponding to the application to be identified;
acquiring similarity between the first digital watermark and the second digital watermark and similarity between the first digital watermark and the third digital watermark;
comparing the similarity between the first digital watermark and the second digital watermark with the similarity between the first digital watermark and the third digital watermark; and
if the similarity between the first digital watermark and the third digital watermark is higher than the similarity between the first digital watermark and the second digital watermark, determining that the application to be identified is genuine, otherwise, determining that the application to be identified is pirated.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present application disclose a method and system for identifying whether an application is genuine by means of digital watermarks, which can conveniently determine whether an application is genuine. The method comprises: extracting a first digital watermark from an executable file of an application to be identified; using two decompiling-then-compiling algorithms on the executable file so as to generate, respectively, a first compilation file and a second compilation file having a same file format as that of the executable file, and extracting, respectively, a second digital watermark and a third digital watermark from the first compilation file and the second compilation file; acquiring, respectively, similarity between the first digital watermark and the second digital watermark and similarity between the first digital watermark and the third digital watermark; and if the similarity between the first digital watermark and the third digital watermark is higher than the similarity between the first digital watermark and the second digital watermark, determining that the application to be identified is genuine, otherwise, determining that the application to be identified is pirated. The present application is applicable to a scenario for identifying whether an application is genuine.
-
Citations
20 Claims
-
1. A method for identifying whether an application is genuine by means of digital watermarks, characterized in that the method comprises:
-
acquiring an executable file of an application to be identified and extracting a first digital watermark from the executable file; using a decompiling-then-compiling algorithm on the executable file so as to generate a first compilation file having a same file format as that of the executable file, and extracting a second digital watermark from the first compilation file;
wherein, the second digital watermark and the first digital watermark belong to the same type of digital watermarks;using another decompiling-then-compiling algorithm that is different with the decompiling-then-compiling algorithm on the executable file so as to generate a second compilation file having a same file format as that of the executable file, and extracting a third digital watermark from the second compilation file;
wherein, the third digital watermark and the first digital watermark belong to the same type of digital watermarks; and
in the another decompiling-then-compiling algorithm, the format of the file generated after decompiling is identical with that of a corresponding file generated during compiling and generating the executable file of a genuine application corresponding to the application to be identified;acquiring similarity between the first digital watermark and the second digital watermark and similarity between the first digital watermark and the third digital watermark; comparing the similarity between the first digital watermark and the second digital watermark with the similarity between the first digital watermark and the third digital watermark; and if the similarity between the first digital watermark and the third digital watermark is higher than the similarity between the first digital watermark and the second digital watermark, determining that the application to be identified is genuine, otherwise, determining that the application to be identified is pirated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An electronic device for identifying whether an application is genuine by means of digital watermarks, characterized in that the electronic device comprises:
-
a processor, a memory, communication interfaces and communication bus; the processor, the memory and the communication interfaces connecting to and communicating with each other by the communication bus; the memory storing executable program codes; the processor executing a program corresponding to the executable program codes stored in the memory by reading the executable program codes to perform the steps of; extracting a first digital watermark from an executable file of an application to be identified; using a decompiling-then-compiling algorithm on the executable file so as to generate a first compilation file having a same file format as that of the executable file, and extracting a second digital watermark from the first compilation file;
wherein, the second digital watermark and the first digital watermark belong to the same type of digital watermarks;using another decompiling-then-compiling algorithm that is different with the decompiling-then-compiling algorithm on the executable file so as to generate a second compilation file having a same file format as that of the executable file, and extracting a third digital watermark from the second compilation file;
wherein, the third digital watermark and the first digital watermark belong to the same type of digital watermarks; and
in the another decompiling-then-compiling algorithm, the format of the file generated after decompiling is identical with that of a corresponding file generated during compiling and generating the executable file of a genuine application corresponding to the application to be identified;acquiring similarity between the first digital watermark and the second digital watermark and similarity between the first digital watermark and the third digital watermark; comparing the similarity between the first digital watermark and the second digital watermark with the similarity between the first digital watermark and the third digital watermark; and if the similarity between the first digital watermark and the third digital watermark is higher than the similarity between the first digital watermark and the second digital watermark, determining that the application to be identified is genuine, otherwise, determining that the application to be identified is pirated. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification