Comparing applications and assessing differences
First Claim
Patent Images
1. A method for identifying counterfeit mobile application programs comprising:
- measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,when the degree of similarity is within a threshold degree of similarity;
comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs,identifying at least one difference between the first and second mobile application programs, andbased on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs, wherein the determining that one of the first or second mobile application programs is a counterfeit comprises determining that the first mobile application program is the counterfeit of the second mobile application program based on the at least one identified difference being a price of the first mobile application program is less than a price of the second mobile application program.
7 Assignments
0 Petitions
Accused Products
Abstract
An analysis including a comparison is performed of first and second applications and a determination is made regarding whether the first is a counterfeit version of the second application, or vice-versa. Based on the analysis and comparison, and based on an assessment of the first application, an assessment of the second application may be generated.
158 Citations
20 Claims
-
1. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,when the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs, wherein the determining that one of the first or second mobile application programs is a counterfeit comprises determining that the first mobile application program is the counterfeit of the second mobile application program based on the at least one identified difference being a price of the first mobile application program is less than a price of the second mobile application program.
-
-
2. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,when the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs, wherein the first mobile application program is from a first source of mobile application programs, the second mobile application program is from a second source of mobile application programs, different from the first source, and the method further comprises; designating one of the first or second sources as being an official source for mobile application programs; when the one official source for mobile application programs is the first source, determining that the second mobile application program is the counterfeit of the first application program; and when the one official source for mobile application programs is the second source, determining that the first mobile application program is the counterfeit of the second mobile application program. - View Dependent Claims (3, 4)
-
-
5. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program, the measuring further including detecting code similarity between the first mobile application program and the second mobile application program; and when the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application. - View Dependent Claims (6, 8, 10)
-
-
7. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,when the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs, wherein the identified at least one difference comprises the first and second mobile application programs having different package names, the first and second mobile application programs having been signed with different code-signing certificates, the first and second mobile application programs having different requested permissions, the first and second mobile application programs having different digital rights management (DRM) protection, the first and second mobile application programs having different publisher names, the first and second mobile application programs having different account identifiers issued by an ad network, or the first and second mobile application programs having different behavior.
-
-
9. A method for identifying counterfeit mobile application programs comprising:
-
measuring, at a server, a degree of similarity, the measuring including comparing first metadata describing a first mobile application program and second metadata describing a second mobile application program; and
,when the degree of similarity is within a threshold degree of similarity; comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs, identifying at least one difference between the first and second mobile application programs, and based on the identified at least one difference, and the degree of similarity being within the threshold degree of similarity, determining that one of the first or second mobile application programs is a counterfeit of the other first or second mobile application programs, wherein the step of comparing the first mobile application program with the second mobile application program to identify differences between the first and second mobile application programs comprises at least one of; comparing an application binary of the first mobile application program with an application binary of the second mobile application program, or comparing data extracted from the application binary of the first mobile application program with data extracted from the application binary of the second mobile application program.
-
-
11. A method comprising:
-
downloading, over a network by a server, a first mobile application program from a first source of mobile application programs; downloading, over the network by the server, a second mobile application program from a second source of mobile application programs, different from the first source; analyzing, at the server, the first mobile application program; generating a first assessment of the first mobile application program; correlating the second mobile application program with the first mobile application program using a correlation criterion; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program. - View Dependent Claims (12)
-
-
13. A method comprising:
-
analyzing, at a server, a first mobile application program; generating a first assessment of the first mobile application program; correlating a second mobile application program with the first mobile application program using a correlation criterion and using a code similarity algorithm; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program. - View Dependent Claims (14, 15, 17, 18)
-
-
16. A method comprising:
-
analyzing, at a server, a first mobile application program; generating a first assessment of the first mobile application program; correlating a second mobile application program with the first mobile application program using a correlation criterion; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program, wherein the step of generating a second assessment comprises; comparing application code of the first and second mobile application programs; and comparing digital rights management (DRM) protection of the first and second mobile application programs, wherein the second assessment includes a determination that the application code of the first and second mobile application programs is the same, and a determination that the DRM protection of the first and second mobile application programs is different.
-
-
19. A method comprising:
-
analyzing, at a server, a first mobile application program; generating a first assessment of the first mobile application program; correlating a second mobile application program with the first mobile application program using a correlation criterion; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program, wherein the second assessment comprises a determination that a third party has repackaged the first application program with tampered contents into the second mobile application program.
-
-
20. A method comprising:
-
analyzing, at a server, a first mobile application program; generating a first assessment of the first mobile application program; correlating a second mobile application program with the first mobile application program using a correlation criterion; and based on the first assessment of the first mobile application program and the correlation of the second mobile application program with the first mobile application program, generating a second assessment of the second mobile application program, wherein the second assessment comprises a determination that the second mobile application program is produced by the same author as the first mobile application program, and the first assessment comprises a determination that the first mobile application program is malicious.
-
Specification