COMPARING APPLICATIONS AND ASSESSING DIFFERENCES
First Claim
Patent Images
1. A method for identifying counterfeit mobile application programs comprising:
- measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,if the degree of similarity is within a threshold degree of similarity;
comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs,identifying at least one difference between the first and second mobile application programs, andbased on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs.
8 Assignments
0 Petitions
Accused Products
Abstract
An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.
-
Citations
27 Claims
-
1. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,if the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
analyzing, at a server, a first mobile application program; generating a first assessment of the first mobile application program; correlating a second mobile application program with the first mobile application program using a correlation criterion; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method for reducing the examining of entries in an ordered set by stopping the examining after determining that a threshold number of application programs corresponding to entries in the ordered set have been previously retrieved, the method comprising:
-
examining a first entry in an ordered set that identifies application programs available from a source of application programs, wherein entries in the ordered set correspond to the application programs available from the source; determining that an application program corresponding to the first entry has been previously retrieved; upon determining that the application program corresponding to the first entry has been previously retrieved, updating an overlap counter variable; comparing the updated overlap counter variable with a threshold overlap value; and based on the comparison, examining a second entry in the ordered set, the second entry next in the order to the first entry, to determine whether an application program corresponding to the second entry has been retrieved, or determining that application programs corresponding to remaining entries in the ordered set have been previously retrieved and not examining the remaining entries. - View Dependent Claims (25, 26, 27)
-
Specification