Application spam detector
First Claim
1. A method for performing an application search, the method comprising:
- receiving, by a processing device, a search query from a remote device;
determining, by the processing device, a consideration set of applications based on the search query, the consideration set indicating one or more applications corresponding to the search query;
for each application indicated in the consideration set;
determining, by the processing device, a number of source objects published by a developer of the application;
for each source object, determining, by the processing device, a number of feedback units attributed to the source object;
determining, by the processing device, whether the application is potential spam by;
determining whether the number of source objects exceeds a source object threshold; and
when the number of source objects exceeds the source object threshold, determining i) whether at least a minimum percentage of the source objects have less than a first threshold of feedback units attributed thereto, and ii) whether all of the source objects have less than a second threshold of feedback units attributed thereto, the second threshold of feedback units being greater than the first threshold of feedback units, wherein the application is identified as potential spam when at least the minimum percentage of the source objects have less than the first threshold of feedback units attributed thereto and all of the source objects have less than the second threshold of feedback units attributed thereto;
when the application is determined to be potential spam, applying, by the processing device, a penalty to the application;
generating, by the processing device, search results based on the consideration set and any penalties applied to the one or more applications indicated in the consideration set, the search results indicating one or more of the applications indicated in the consideration set; and
providing, by the processing device, the search results.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for performing an application search. The method includes receiving a search query from a remote device and determining a consideration set of applications based on the search query. The consideration set indicates one or more applications corresponding to the search query. For each application indicated in the consideration set, the method includes determining whether the application is a potential spam application based on one or more developer features indicating features associated with a developer of the application. When the application is determined to be a potential spam application, the method includes applying a penalty to the application. The method further includes generating search results based on the consideration set and any penalties applied to the one or more application indicated in the consideration set and providing the search results. The search results indicate one or more of the applications indicated in the consideration set.
-
Citations
16 Claims
-
1. A method for performing an application search, the method comprising:
-
receiving, by a processing device, a search query from a remote device; determining, by the processing device, a consideration set of applications based on the search query, the consideration set indicating one or more applications corresponding to the search query; for each application indicated in the consideration set; determining, by the processing device, a number of source objects published by a developer of the application; for each source object, determining, by the processing device, a number of feedback units attributed to the source object; determining, by the processing device, whether the application is potential spam by; determining whether the number of source objects exceeds a source object threshold; and when the number of source objects exceeds the source object threshold, determining i) whether at least a minimum percentage of the source objects have less than a first threshold of feedback units attributed thereto, and ii) whether all of the source objects have less than a second threshold of feedback units attributed thereto, the second threshold of feedback units being greater than the first threshold of feedback units, wherein the application is identified as potential spam when at least the minimum percentage of the source objects have less than the first threshold of feedback units attributed thereto and all of the source objects have less than the second threshold of feedback units attributed thereto; when the application is determined to be potential spam, applying, by the processing device, a penalty to the application; generating, by the processing device, search results based on the consideration set and any penalties applied to the one or more applications indicated in the consideration set, the search results indicating one or more of the applications indicated in the consideration set; and providing, by the processing device, the search results. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A search engine for performing an application search, the search engine comprising:
-
a storage device; a processing device that executes computer readable instructions, the computer readable instructions, when executed by the processing device, causing the processing device to; receive a search query from a remote device; determine a consideration set of applications based on the search query, the consideration set indicating one or more applications corresponding to the search query; for each application indicated in the consideration set; determine a number of source objects published by a developer of the application; for each source object, determine a number of feedback units attributed to the source object; determine whether the application is potential spam by; determining whether the number of source objects exceeds a source object threshold; and when the number of source objects exceeds the source object threshold, determining i) whether at least a minimum percentage of the source objects have less than a first threshold of feedback units attributed thereto, and ii) whether all of the source objects have less than a second threshold of feedback units attributed thereto, the second threshold being greater than the first threshold, wherein the application is identified as potential spam when at least the minimum percentage of the source objects have less than the first threshold of feedback units attributed thereto and all of the source objects have less than the second threshold of feedback units attributed thereto; when the application is determined to be potential spam, apply a penalty to the application; and generate search results based on the consideration set and any penalties applied to the one or more applications indicated in the consideration set, the search results indicating one or more of the applications indicated in the consideration set; and provide the search results. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification