![]() AUDIT OF MOBILE APPLICATIONS
专利摘要:
A method of auditing tags launched in a target mobile application, which comprises analyzing (410) a network communication generated by a target mobile application to determine whether an identifiable tag signature is present in the communication network. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. Based on a detected beacon signature, the method may further include determining (420) that a particular beacon has triggered. In addition, the method may include recording (430) information associated with the particular tag. 公开号:FR3025964A3 申请号:FR1551248 申请日:2015-02-16 公开日:2016-03-18 发明作者:Robert K Seolas;John Pestana;Tyler Broadbent;Alan Martin Feuerlein 申请人:ObservePoint LLC; IPC主号:
专利说明:
[0001] BACKGROUND OF THE INVENTION 1. Field of the Invention This invention relates to systems, methods and packages relating to the analysis of mobile applications. 2. Background and technology concerned Mobile devices, such as tablet computers and smartphones, have experienced explosive market growth and penetration in recent years. In conjunction with this growth, the mobile application market has also grown considerably. Mobile apps can range from simple games to complex productivity software. In many cases, regardless of the type of mobile application, the mobile application communicates over the Internet to various servers. Servers can be used to store user-created content, provide additional features, allow a developer to track software and user behavior, or provide other similar services. [0002] An example of a mobile application is that of a newspaper that can create a dedicated mobile application to access content on its web page. For example, a newspaper can create a mobile application that behaves like a web portal on its standard web page. By using the mobile application, a user can easily navigate the contents of the log. In some conventional systems, the mobile application can provide a user experience very similar to the user experience provided by a universal mobile web browser. In a manner similar to web pages accessed by web browsers on a conventional computer, the content viewable by the mobile application may include various codes, sometimes referred to as "tags", which are configured to execute (ie say, "trigger") when the content is viewed. In at least one conventional form, a tag is a hidden element within a web page that causes some action on a web page when it is triggered. In particular, according to at least one embodiment, a tag is a code that a web page owner can place inside a web page, and which allows the owner of the web page to track information about visitors who download and execute the particular code. [0003] For example, a tag may include a transparent GIF or a spy pixel, which is placed within the code of a web page. Said transparent GIF or the spy pixel may be stored on a separate server of said web page. The tag is triggered when the browser requests the transparent GIF or the spy pixel from the separate server. When the separate server receives the browser request, the server can collect various analytics data about the requester. [0004] Once executed, a tag can collect information such as the origin of the visitor (for example, the web page or the search engine), the keywords used to find the web page, if a particular advertisement 3025964 3 has directed a visitor to the page, and other associated data. In many situations, a web page can include multiple tags of various origins. For example, a particular web page may contain a Google Analytics tag, a Facebook tag, a page counter tag, a weather beacon, and other common tags. According to at least one embodiment, a beacon can only include a particular call to an external advertisement server. As mobile apps become more prevalent and more and more users access content on the web through 15 custom mobile apps, content providers also increasingly want ensure that the various tags embedded in their web content work properly in mobile applications. In many cases, large amounts of money spent on advertising depend on tags that correctly track visitors to a website. However, the audit of mobile applications presents several specific challenges. For example, because of the immense diversity of mobile applications, it is more difficult to create a "standard" test environment. In addition, many organizations are creating a mobile version of their web content, so that the audits of their content on the conventional web do not necessarily correlate with the audits of their mobile content. [0005] Accordingly, there are a number of problems in the art that are specific to the auditing of content on the web that is accessed by mobile applications. [0006] BRIEF SUMMARY OF THE INVENTION Embodiments of the present invention provide systems, methods, and software packages configured to audit tags placed within mobile applications. According to at least one embodiment, a network communication from a particular mobile application goes through an audit server. The audit server can then determine tags that have fired in a particular mobile application. In addition, according to at least one embodiment of the auditing system, the mobile application can be run on a desktop computer in an application interface layer. The application interface layer may comprise an emulator, a simulator or a similar layer. The application interface layer can detect tags that have fired inside the mobile application. After auditing a mobile application, the audit system can generate a report to a relevant user. [0007] For example, at least one embodiment of the present invention comprises a method of a mobile auditing application auditing tags launched in a target mobile application. The method includes intercepting, with the mobile auditing application, a network communication. Network communication can come from the target mobile application. In addition, both the mobile audit application and the target mobile application can both be installed on the mobile device. The method may further include analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. Based on a detected beacon signature, the method may further include determining that a particular beacon has triggered. [0008] In addition, the method may include recording information associated with the particular tag. At least one embodiment of the present invention includes an additional method of the mobile auditing application auditing tags launched in a target mobile application. The method includes directing, via a proxy server, network communication, the network communication from a target mobile application installed on a mobile device. The method may further include analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. Based on a detected beacon signature, the method may further include determining that a particular beacon has triggered. In addition, the method may include recording information associated with the particular tag. [0009] In addition, at least one embodiment of the present invention includes a method of a mobile auditing application auditing tags launched in a target mobile application. The method includes interception, using the application interface layer, of a network communication. Network communication can come from the target mobile application. The application interface layer can be installed on a desktop computer. The target mobile application can be installed inside the application interface layer. In addition, the target mobile application may behave as if it were installed on a mobile device. The method may further include analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. Based on a detected beacon signature, the method may further include determining that a particular beacon has triggered. [0010] In addition, the method may include recording information associated with the particular tag. Additional features and advantages of exemplary embodiments of the invention will be set forth in the following description, and will be apparent in part from the description, or may be taught by practicing such modes. examples given by way of example. The features and advantages of such embodiments can be realized and obtained by means of the instruments and combinations indicated in particular in the appended claims. These and other features will become more clearly apparent from the following description and appended claims, or may be taught by practicing such exemplary embodiments as will be presented hereinafter . [0011] BRIEF DESCRIPTION OF THE DRAWINGS In describing how the aforementioned and other advantages and features of the invention may be obtained, a more specific description, briefly described above, will be given with reference to specific embodiments thereof which are illustrated in the accompanying drawings. It should be borne in mind that since these drawings illustrate only typical embodiments of the invention and therefore should not be construed as limiting its scope, the invention will be described and explained with additional specificity and details. the accompanying drawings in which: Figure 1 illustrates an overall block diagram of a system for use according to one or more embodiments of the present invention; Figure 2 illustrates an overall block diagram of another system for use according to one or more embodiments of the present invention; Figure 3 illustrates an exemplary user interface for reporting an audit according to one embodiment of the present invention; Figure 4 illustrates a flowchart of a mobile application auditing method according to an embodiment of the present invention; Figure 5 illustrates a flow diagram of another mobile application audit method according to one embodiment of the present invention; and Figure 6 illustrates a flow diagram of yet another mobile application audit method according to one embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Embodiments of the present invention extend to systems, methods, and software packages configured to audit tags placed within mobile applications. According to at least one embodiment, a network communication from a particular mobile application goes through an audit server. The audit server can then determine which tags have fired within the particular mobile application. In addition, according to at least one embodiment of the auditing system, the mobile application can be run on a desktop computer within an application interface layer. The application interface layer may include an emulator, a simulator, or a similar layer. The application interface layer can detect the tags that are triggered within the mobile application. After auditing a mobile application, the audit system can generate a report to a relevant user. [0012] Accordingly, the embodiments of the present invention provide improvements in the technical field of mobile computer software audit. For example, the embodiments of the present invention may provide a mobile software developer with a system, not previously available, for auditing mobile software applications for correct triggering of the tags. In addition, various embodiments of the present invention provide flexible systems for auditing a mobile software application when the software is run on the mobile platform or within a desktop emulator or simulator. [0013] Those skilled in the art will appreciate the advantage of the embodiments of the present invention. In particular, in an increasingly interconnected digital world, the ability to verify that the tags are triggering properly can have significant impacts on product development and yields. For example, a significant portion of web content is supported by payments associated with an advertisement. To properly track the number of visitors, and the associated advertising costs, the tags must be configured correctly so that they can be triggered. If content is provided by dedicated applications, and the tags do not fire, a significant portion of the ad revenue may be lost. [0014] For example, Figure 1 illustrates an overall block diagram of a system for use in one or more embodiments of the present invention. In particular, Figure 1 shows a mobile device 120 that includes at least one mobile application 100. The at least one mobile application 100 can be configured to access web content from a particular content provider. For example, the at least one mobile application 100 may include a portal to a particular news site. Thus, the mobile application can allow a user to access web content from the news provider. In addition, the mobile device 100 may also be in communication with various servers 130, 150 through network connections 140, 142. According to at least one embodiment, the mobile device 120 may also include an audit application. mobile 125 which is also installed on the mobile device 120. The mobile auditing application 125 may be configured to intercept network communications that originate from the at least one mobile application 100 ("target mobile application"). The mobile auditing application 125 can intercept the network communications of the target mobile application 100 through a variety of different techniques. For example, the mobile auditing application 125 may include an application layer positioned between the target mobile application 100 and the hardware of the mobile device 120. In this configuration, the mobile auditing application 125 may intercept network communications originating from the target mobile application 100 when generated by the application 100. [0015] In addition, in at least one embodiment, the mobile auditing application 125 can detect an indication of user input within the target mobile application 100. In addition, the application of mobile auditing application 125 can detect an indication of user input within the target mobile application 100. Mobile audit 125 may further determine that a tag trigger is expected in response to the detected user input. For example, the mobile auditing application 125 may detect an indication from the user executing a video within the target mobile application 100. The video executed may be associated with an expected tag. Therefore, the mobile auditing application 125 may send a notification to an auditing server 150 to monitor the expected beacon. In at least one embodiment, the mobile auditing application 125 may operate independently of an auditing server 150. For example, the mobile auditing application 125 may intercept and analyze network communications all from the Mobile device 120. Thus, the disclosure regarding the audit server 150 provided above can be fully applied to functions performed by the mobile auditing application 125 within the mobile device 120. Alternatively, the mobile auditing application 125 may configure settings on the mobile device 120 so that the mobile device 120 communicates through a proxy server (e.g., an audit server 150). In at least one embodiment, a mobile audit application is not required, and a user may instead manually adjust the settings of the mobile device 120 to communicate through the proxy server. In the above cases, a network communication 160 from the target mobile application 100 is sent over a network connection 140 to an audit server 150 (i.e. proxy server). The audit server 150 may analyze the network communication 160 to search for the desired tag attributes. Before or after the analysis of the network communication 160, the audit server 150 can transfer the network communication 164 to the web server 130, initially targeted, via a network connection 144. The web server 130 can then send back a content of its web memory 135 to the target mobile application 100 either through a network connection 144 and the audit server 150 or through a direct network connection 142 (network communication 162) to the device mobile communication 120. [0016] To return to the audit server 150, when the audit server 150 receives a network communication 160 from the target mobile application 100, the listener 152 analyzes the network communication 160 to determine whether the network communication 160 includes an indication of a tag trigger. In at least one embodiment, the listener 152 identifies tags within the network communication 160 using tag signatures. Tag signatures may include various attributes that are associated with tag groups, tag types, and specific tags. For example, a particular tag may include specific elements within its associated URL. For example, the listener 152 may detect particular portions of text within the URL, or it may detect the server to which the URL is directed. One of these pieces of information can help identify a particular tag. [0017] The tag database 156 may include a directory of various tag signatures. Based on the tag database 156, the listener 152 may parse a network communication 160 and identify a variety of tag signatures. In at least one embodiment, a user may download new tag signatures to the tag database 156. In addition, a user may be able to select specific tags that the listener 152 must identify. When the listener 152 analyzes a network communication 160, the report module 154 may generate reports based on the detected tags. According to at least one embodiment, the report module 154 can also know the expected tag triggers. The information associated with the expected tag triggers can be provided by a developer of the target mobile application 100, by an associated advertiser, or by another associated party. By using the expected tag triggering information, the report module 154 can also report expected tags that have not triggered. The report module 154 may provide its report through the mobile auditing application 125, through another application installed on an external system, or by any other means among a number of number of means for receiving a report. [0018] In at least one embodiment, the report module 154 may provide a summary of the detected tag signatures and / or a detailed account of all tag information. For example, a summary may include the tags identified, tags that were expected to be triggered, and a brief overview of information about each tag. In contrast, the detailed report may include specific required URLs, unclassified tags, times tagged, information that the tags contained, tags associated with variables, and other similar information. [0019] Referring now to Figure 2, Figure 2 illustrates an overall block diagram of another system for use in one or more embodiments of the present invention. In particular, Figure 2 shows a desktop computer that executes an application interface layer 210. The application interface layer 210 may include an emulator or simulator configured to substantially replicate the function of a device. For example, the application interface layer 210 may be capable of running mobile applications 100 that are configured to execute on mobile devices 120. Therefore, in at least one embodiment, a user can execute a target mobile application 100 within the application interface layer 210 on a desktop computer 200. As used herein, a desktop computer 200 may include a laptop, a computer tablet, a server, a workstation, a host computer, or any other computer capable of executing an application interface layer 210 as disclosed herein. In at least one embodiment, when a user executes a target mobile application 100 within the application interface layer 210, the application interface layer 210 may intercept network communications 235. which are generated by the target mobile application 100. The intercepted network communications 235 may either be analyzed by the application interface layer 210 or transferred to an audit server 150 for analysis as disclosed above. . In either case, the network communications 235 are finally transferred to the desired web server 220 through a network connection 230. Thus, either an audit server 150 or an application interface layer 210 may identify tags that are associated with the network traffic of a target mobile application 100. [0020] Allowing a developer to audit a target mobile application 100 within an application interface layer 210 may have several advantages. For example, an application interface layer 210 allows a developer to test a code as it is being written to the desktop computer 200. Thus, a developer would not need to develop and compile everything. first a base code, transmit the base code to a mobile device 120, execute the base code 25 on the mobile device 120, examine the audit report, and then make the necessary adjustments to the base code. Instead, the application interface layer 210 allows one user at a time to develop and test the code on the same platform 200. [0021] In addition, an application interface layer 210 may also be useful because of its ability to easily collect an input and an output generated by the target mobile application 100. Due to the fact that the Application interface 200 knows the entire target mobile application 100, the application interface layer 210 can identify an expected tag trigger and detected tag triggers substantially in real time. For example, the application interface layer 210 may identify that the target mobile application 100 accesses a particular web page on a particular web site. The application interface layer 210 may access, within a database in memory either on the desktop computer 200 or on a remote storage device, particular tags that are associated with the application. inside the particular website. The application interface layer 210 can then identify the inputs that are provided to the target mobile application 100, and determine the expected tags based on the identified entries. As disclosed above, the application interface layer 210 and / or the audit server 150 can then determine the expected tags that have triggered, the tags could not be triggered, the tags that are triggered incorrectly, and tags that fired unexpectedly. [0022] Similar to the methods disclosed above, tags can be identified using tag signatures. The identification can be done at the desktop 200 or at an external audit server 150. In both cases, a report can be generated (for example, by the audit server 150 ), which provides information about the tags. The report can include a summary of detected tags, expected tags, and tag type. In addition, a detailed report can provide specific information about the tags, the times they were triggered, the information they contained, and other similar information. For example, Figure 3 illustrates an exemplary user interface for reporting an audit according to an embodiment of the present invention. In particular, Figure 3 represents an audit report 300 which includes a summary of an audit. The audit report 300 represents an indication of the target application 310. In addition, the audit report 300 includes an indication of the web content 320 that was required by the target mobile application. Associated with each page of required web content 320, the audit report may also include an indication of a number of expected tags and the number of tags actually detected. [0023] According to at least one embodiment, additional information may be available in a detailed report. For example, the detailed report may include information about the specific tags that have triggered, the required URLs, the tag timeline, and other related information in a similar manner. Accordingly, Figures 1-3 and corresponding text illustrate or otherwise describe one or more components, modules and / or auditing mechanisms of the mobile applications. In particular, according to at least one embodiment, the present invention can audit a mobile application by using an external server through which network communications are redirected. In addition, according to at least one embodiment of the present invention, the mobile applications may be locally audited either on a mobile device or within an application interface layer on a desktop computer. It will be appreciated that the embodiments of the present invention may also be described in terms of flowcharts comprising one or more actions to achieve a particular result. For example, Figures 4-6 and corresponding text describe actions in a mobile application auditing method. The actions of Figures 4-6 are described hereinafter with reference to the elements shown in Figures 1-3. [0024] For example, Figure 4 shows that a method of auditing mobile applications may include an action 400 of intercepting a communication. Action 400 may include interception of network communication by means of a mobile audit application. The network communication can come from the target mobile application. In addition, the mobile audit application and the target mobile application can both be installed on the mobile device. For example, in Figure 1, the target mobile application 100 may generate a network communication 160. The network communication 160 may be intercepted by the mobile audit application 125. Figure 4 shows that the method may also include a action 410 of communication analysis. [0025] Action 410 may include analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. For example, in Figure 1, the mobile auditing application 125 may analyze the network communication 160. In particular, the mobile auditing application 125 either analyzes the network communication 160 locally on the mobile device 120 or sends the network communication to the audit server 150, where the listener 152 can identify various attributes relating to the network communication 160. [0026] In addition, Figure 4 shows that the method may comprise an action 420 for determining that a beacon has triggered. Action 420 may include, based on a detected beacon signature, the determination that a particular beacon has triggered. For example, in Figure 1, the mobile auditing application 125 can identify various attributes relating to the network communication 160. The mobile auditing application 125 can compare these attributes to tag signatures stored in a database Accessible to the mobile audit application 125. Based on this comparison, the mobile auditing application 125 may determine that a particular tag has triggered. [0027] Figure 4 also shows that the method may comprise an information recording action 430. Action 430 includes recording information associated with the particular tag. For example, Figure 3 shows a summary report that can be generated by the mobile auditing application 125. In a further or alternative embodiment, Figure 5 shows that a method of auditing the applications of the applications of the application Mobile can include a 500-action orientation of a network communication through a proxy server. Action 500 may include the orientation of a network communication through a proxy server. Network communication can come from a target mobile application installed on a mobile device. For example, in Figure 1, the network communication 160 is redirected from the web server 130 so that it first goes through the audit server 150. The audit server 150 can analyze the network communication In particular, the listening module 152 can identify various attributes relating to the network communication 160. [0028] Figure 5 shows that the method may also include an action 510 for analyzing the communication. Action 510 may include analyzing the network communication to determine whether an identifiable tag signature is present in the network communication. [0029] An identifiable tag signature may include one or more attributes that are associated with triggering a tag. For example, in FIG. 1, the auditing server 150 can analyze the network communication 160 by means of the listener module 152. In particular, the listener module 152 can identify various attributes relating to the network communication 160. Furthermore, Figure 5 shows that the method may comprise an action 520 for determining that a tag 30 has triggered. Action 520 may include, based on a detected tag signature, the determination that a particular tag has triggered. For example, in Figure 1, the listener 152 may identify various attributes relating to the network communication 160. The listener 152 may compare these attributes to tag signatures stored in the tag database 156. Based on this comparison, the audit server 150 may determine that a particular tag has triggered. Figure 5 also shows that the method may include an information recording action 530. [0030] Action 530 includes recording information associated with the particular tag. For example, Figure 3 shows a summary report that the report module of Figure 1 can generate. [0031] In yet another alternative or alternative embodiment, Figure 6 illustrates that a mobile application auditing method may comprise an action 600 for intercepting a communication. Action 600 may include interception of a network communication by means of an application interface layer. Network communication can come from the target mobile application. In addition, the application interface layer may be installed on a desktop computer, and the target mobile application may be installed within the application interface layer. For example, in Figure 2, the target mobile application 100 may generate a network communication 160. The network communication 160 may be intercepted by the application interface layer 210, which is installed on the desktop computer 200 The application interface layer 210 may include a simulator, an emulator, or a similar application configured to execute mobile applications. [0032] Figure 6 shows that the method may also include an action 610 for analyzing the communication. Action 610 may include analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication. An identifiable tag signature may include one or more attributes that are associated with triggering a tag. For example, in Figure 2, the application interface layer 210 may analyze the network communication 235. In particular, the application interface layer 210 analyzes the network communication 235 locally on the desktop computer 200 . [0033] In addition, Figure 6 shows that the method may comprise an action 620 for determining that a beacon has triggered. Action 620 may include, based on a detected tag signature, the determination that a particular tag has triggered. [0034] For example, in Figure 2, the application interface layer 210 may identify various attributes relating to the network communication 160. The application interface layer 210 may then compare these attributes to tag signatures stored in a network. A database accessible to the application interface layer 210. Based on this comparison, the application interface layer 210 may determine that a particular tag has triggered. [0035] Figure 6 also shows that the method may include an information recording action 630. Action 630 includes recording information associated with the particular tag. For example, Figure 3025964 233 represents a summary report that can be generated by the mobile auditing application 125. Therefore, one or more embodiments of the present invention allow a user to audit tags. associated with mobile applications. In addition, according to various embodiments, a user is capable of auditing mobile applications using a variety of different systems and configurations. [0036] Embodiments of the present invention provide important improvements in the technical field of tag auditing. For example, the embodiments of the present invention allow tags triggered by a mobile application to be scanned - which was not possible before in the domain. In addition, the embodiments of the present invention improve the performance of a computer system by enabling an automated audit system to ensure that the tags are triggered efficiently and correctly. [0037] Although the object has been described in a language specific to structural features and / or methodological actions, it should be borne in mind that the object defined in the appended claims is not necessarily limited to features or actions described above, or to the order of the actions described above. The features and actions described are rather disclosed in the form of exemplary embodiments of the claims. [0038] Embodiments of the present invention may include or utilize a dedicated or universal computer system that includes computer hardware, such as one or more processors and a system memory, as discussed in more detail below. . Embodiments within the scope of the present invention also include physical media and other computer readable media for conveying or storing computer executable instructions and / or data structures. Such computer readable media may be any available media accessible by a universal or dedicated computer system. Computer readable media that stores instructions and / or computer executable data structures are computer storage media. Computer readable media that convey instructions and / or computer executable data structures are transmission media. Thus, by way of nonlimiting example, the embodiments of the invention may comprise at least two kinds of different computer readable media: computer storage media and transmission media. Computer storage media are physical storage media that store instructions and / or data structures executable by computer. Physical storage media include computer hardware, such as RAM, ROM, EEPROM, integrated circuit ("SSD") disks, flash memory, phase change memory ("PCM"), an optical disk storage device, a magnetic disk storage device or other magnetic storage device, or any other hardware storage device which can be used to store a program code in the form of instructions 3025964 or computer executable data structures, which is accessible and can be executed by a universal or dedicated computer system for implementing the disclosed functionality of the invention. [0039] The transmission media may comprise a network and / or data links that may be used to convey program code in the form of computer executable instructions or data structures that are accessible by a computer system. universal or specialized. A "network" is defined as one or more data links that allow the transport of electronic data between computer systems and / or modules and / or other electronic devices. When the information is transferred or provided over a network or other communication connection (wired, wireless, or a combination of wired or wireless hard-wired connections) to a computer system, the computer system may view the connection as a medium of transmission. Combinations of the above elements should also be included as part of the computer readable media. [0040] Furthermore, once the various computer system components are achieved, the program code in the form of computer executable instructions or data structures can be automatically transferred from the transmission media to storage media. computer (or vice versa). For example, computer-executable data instructions or structures received over a network or data link may be stored temporarily in a RAM of a network interface module (e.g., a network interface controller). "NIC") then possibly be transferred to a computer system RAM and / or less volatile computer storage media at a computer system. Thus, it should be borne in mind that computer storage media may be included in computer system components that also use (or even primarily) transmission media. The computer executable instructions include, for example, instructions and data which, when executed by one or more processors, instruct a universal computer system, a dedicated computer system, or a specialized processing device to perform a particular task. certain function or group of functions. The computer executable instructions may be, for example, binary instructions, intermediate format instructions such as assembly language, or even source code. Those skilled in the art will have in mind that the invention can be practiced in networked computing environments with many types of computer system configurations, including personal computers, desktops, laptops, message processors, portable devices, multiprocessor systems, microprocessor-based or programmable consumer electronic products, networked PCs, minicomputers, mainframes, mobile phones, PDAs 3025964 27 (wizards personal digital tablets), tablets, pagers, routers, switches, and the like. The invention can also be practiced in distributed systems environments where the local and remote computer systems, which are connected (by wired data links, wireless data links, or by a combination of data links wired and wireless) through a network, both perform tasks. Thus, in a distributed system environment, a computer system may be comprised of a plurality of computer systems. In a distributed systems environment, the program modules can be located in both local and remote storage storage devices. Those skilled in the art will also be aware that the invention can be practiced in a cloud computing environment. Cloud computing environments may be distributed, although this is not required. When distributed, cloud computing environments can be distributed internationally within an organization and / or have components that are owned by multiple organizations. In this specification and the following claims, the term "cloud computing" is defined as a template for allowing network access on demand to a shared group of configurable computing resources (e.g., networks, servers, storage device, applications and services). The definition of the term "cloud computing" is not limited to any of the many other advantages that can be obtained from such a model when properly deployed. A cloud computing model may be composed of various features, such as on-demand self-service, wide network access, pooling of resources, fast resiliency, measured service, and the like. A cloud computing model may also be in the form of various service models such as, for example, Software as a Service ("SaaS"), Platform as a Service ("PaaS"), and Infrastructure as a service. Service ("IaaS"). The cloud computing model can also be deployed using different deployment models such as a private cloud, a community cloud, a public cloud, a hybrid cloud, and so on. Some embodiments, such as a cloud computing environment, may include a system that includes one or more hosts that are each capable of running one or more virtual machines. During the operation, the virtual machines emulate a functional computer system, supporting an operating system and perhaps also one or more other applications. In some embodiments, each host includes a hypervisor that emulates virtual resources for the virtual machines using physical resources that are abstract from the point of view of the virtual machines. The hypervisor also provides proper isolation between the virtual machines. Thus, from the point of view of any given virtual machine, the hypervisor gives the illusion that the virtual machine interfaces with a physical resource, even if the virtual machine only interfaces with the appearance ( for example, a virtual resource) of a physical resource. Examples of physical resources include processing capacity, memory, disk space, network bandwidth, media drives, and so on. The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments should be considered in all respects only as illustrative and non-restrictive modes. The scope of the invention is thus taught by the appended claims rather than by the foregoing description. All changes considered to fall within the scope of the claims and as being equivalent thereto fall within their scope.
权利要求:
Claims (20) [0001] CLAIMS1 -Process of a mobile auditing application auditing tags launched in a target mobile application, the method being implemented in a computerized environment comprising a mobile device (120) and a mobile auditing application (125) in communication with a network, the method comprising the steps of: intercepting, using the mobile audit application (125), a network communication: the network communication from the target mobile application, and the application of mobile audit (125) and the target mobile application (100) both being installed on the mobile device (120); analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication, an identifiable beacon signature comprising one or more attributes that are associated with triggering a beacon; based on a detected tag signature, determining that a particular tag has triggered; and record information associated with the particular tag. [0002] The method of claim 1, wherein the target mobile application is configured to allow a user to navigate specific web pages. [0003] The method of claim 1, further comprising displaying a summary of the recorded information. 3025964 31 [0004] The method of claim 3, wherein the summary of the recorded information includes a display of expected tags and detected tags. 5 [0005] The method of claim 1, wherein determining that an identifiable tag signature is present in the network communication comprises: analyzing a URL associated with the network communication; and determining that the URL includes a portion of text that is associated with the particular tag. [0006] The method of claim 1, wherein determining that an identifiable beacon signature is present in the network communication comprises: analyzing a destination of the network communication; and determining that the destination is associated with the particular tag. [0007] A method of an auditing system auditing beacons initiated in a mobile application, the method being implemented in a computerized environment comprising an auditing system and a mobile application in communication with a network, the method comprising actions of: directing, through a proxy server (150), network communication, the network communication from a target mobile application installed on a mobile device; analyzing the network communication to determine whether an identifiable beacon signature is present in the network communication, an identifiable beacon signature comprising one or more attributes that are associated with triggering a beacon; based on a detected beacon signature, determining that a particular beacon has triggered; and save the information associated with the particular tag. 10 [0008] The method of claim 7, wherein a mobile auditing application, which is installed on the mobile device, automatically configures the mobile device so that the target mobile application communicates with the proxy server. [0009] The method of claim 7, further comprising: receiving an indication of a user input; determining an expected tag based on the user input; and comparing the particular tag with the expected tag. [0010] The method of claim 9, further comprising displaying a summary of the recorded information. [0011] 11. The method of claim 10, wherein the summary of the recorded information comprises a display of the expected tags and detected tags. 3025964 33 [0012] The method of claim 7, wherein determining that an identifiable tag signature is present in the network communication comprises: analyzing a URL associated with the network communication; and determining that the URL includes a portion of text that is associated with the particular tag. 10 [0013] The method of claim 7, wherein determining that an identifiable beacon signature is present in the network communication comprises: analyzing a destination of the network communication; and determining that the destination is associated with the particular tag. [0014] 14 - Application interface layer method auditing tags launched in a target mobile application, the method being implemented in a computerized environment comprising an application interface layer (210) and a mobile application target in communication with a network, the method comprising the steps of: intercepting (600) network communication (235) using the application interface layer: network communication from the mobile application target, the application interface layer being installed on a desktop computer (200), the target mobile application being installed in the application interface layer, and the target mobile application behaving as if it was installed on a mobile device; analyzing (610) the network communication to determine whether an identifiable beacon signature is present in the network communication, an identifiable beacon signature comprising one or more attributes that are associated with triggering a beacon; based on a detected beacon signature, determining (620) that a particular beacon has been triggered; and save (630) the information associated with the particular tag. [0015] The method of claim 14, wherein the application interface layer comprises a mobile device simulator. [0016] The method as claimed in claim 14, wherein the application interface layer comprises a mobile device emulator. [0017] The method of claim 14, wherein the application interface layer captures user input. 25 [0018] The method of claim 17, further comprising: determining an expected beacon based on the user input; and comparing the particular tag with the expected tag. 3025964 [0019] The method of claim 18, further comprising displaying a summary of the recorded information. 5 [0020] The method of claim 19, wherein the summary of the recorded information includes an indication of the expected beacon and the particular beacon.
类似技术:
公开号 | 公开日 | 专利标题 FR3025964A3|2016-03-18|AUDIT OF MOBILE APPLICATIONS US10623418B2|2020-04-14|Internet of Things security appliance US20170013070A1|2017-01-12|Systems and methods for web to mobile app correlation US9547626B2|2017-01-17|Systems, methods, and media for managing ambient adaptability of web applications and web services FR3025909A3|2016-03-18|VIDEO AUDIT ON THE WEB US9936330B2|2018-04-03|Methods for exchanging data amongst mobile applications using superlinks TW201441829A|2014-11-01|Client side page processing US9215245B1|2015-12-15|Exploration system and method for analyzing behavior of binary executable programs US11171982B2|2021-11-09|Optimizing ingestion of structured security information into graph databases for security analytics US9208235B1|2015-12-08|Systems and methods for profiling web applications US9819633B2|2017-11-14|Systems and methods for categorizing messages US20180329799A1|2018-11-15|Analyzing analytic element network traffic US10997063B1|2021-05-04|System testing from production transactions US9361168B1|2016-06-07|Accessing resources across a network boundary US10592399B2|2020-03-17|Testing web applications using clusters US11048620B2|2021-06-29|Distributed system test device US10212170B1|2019-02-19|User authentication using client-side browse history US10291492B2|2019-05-14|Systems and methods for discovering sources of online content Al-Ahmad et al.2013|Mobile cloud computing testing review Neyaz et al.2020|Security, privacy and steganographic analysis of FaceApp and TikTok US9712520B1|2017-07-18|User authentication using client-side browse history US9646104B1|2017-05-09|User tracking based on client-side browse history US20190236269A1|2019-08-01|Detecting third party software elements US11151025B1|2021-10-19|Generating software test plans based at least in part on monitored traffic of a production application US10290022B1|2019-05-14|Targeting content based on user characteristics
同族专利:
公开号 | 公开日 US20160080918A1|2016-03-17| GB2546207A|2017-07-12| FR3025964B3|2016-10-14| GB2546207B|2021-02-10| GB201705935D0|2017-05-31| WO2016039782A1|2016-03-17| US9357366B2|2016-05-31|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6792458B1|1999-10-04|2004-09-14|Urchin Software Corporation|System and method for monitoring and analyzing internet traffic| US7610289B2|2000-10-04|2009-10-27|Google Inc.|System and method for monitoring and analyzing internet traffic| US20030208594A1|2002-05-06|2003-11-06|Urchin Software Corporation.|System and method for tracking unique visitors to a website| US7698416B2|2005-01-25|2010-04-13|Cisco Technology, Inc.|Application layer message-based server failover management by a network element| US7353034B2|2005-04-04|2008-04-01|X One, Inc.|Location sharing and tracking using mobile phones or other wireless devices| US8458467B2|2005-06-21|2013-06-04|Cisco Technology, Inc.|Method and apparatus for adaptive application message payload content transformation in a network infrastructure element| US7653633B2|2005-11-12|2010-01-26|Logrhythm, Inc.|Log collection, structuring and processing| WO2008052059A2|2006-10-25|2008-05-02|Gomez, Inc.|Methods and apparatus for real user monitoring| US8429243B1|2007-12-13|2013-04-23|Google Inc.|Web analytics event tracking system| US20090287713A1|2008-05-16|2009-11-19|Tealium, Inc.|Systems and methods for measuring online public relation and social media metrics using link scanning technology| US8238540B1|2008-09-08|2012-08-07|RingRevenue, Inc.|Methods and systems for processing and managing telephonic communications using ring pools| US8589790B2|2008-11-02|2013-11-19|Observepoint Llc|Rule-based validation of websites| US20130290480A1|2010-01-11|2013-10-31|Ensighten, Inc.|Use of Method Overrides for Dynamically Changing Visible Page Content| US8996986B2|2010-01-11|2015-03-31|Ensighten, Inc.|Enhanced delivery of content and program instructions| WO2011123564A2|2010-03-31|2011-10-06|Mediamath, Inc.|Systems and methods for integration of a demand side platform| US9003552B2|2010-12-30|2015-04-07|Ensighten, Inc.|Online privacy management| WO2012092487A1|2010-12-30|2012-07-05|Ensighten, Inc.|Online privacy management| US9165308B2|2011-09-20|2015-10-20|TagMan Inc.|System and method for loading of web page assets| CA2865267A1|2012-02-21|2013-08-29|Ensighten, Inc.|Graphical overlay related to data mining and analytics| US20130297778A1|2012-05-02|2013-11-07|Google Inc.|System for centralized analytics tracking via server-side sessionization| US9203905B1|2012-08-27|2015-12-01|Google Inc.|Sessionization of visitor activity| US9317490B2|2012-09-19|2016-04-19|TagMan Inc.|Systems and methods for 3-tier tag container architecture| WO2014116542A1|2013-01-22|2014-07-31|Tealium Inc.|Activation of dormant features in native applications| US20150066587A1|2013-08-30|2015-03-05|Tealium Inc.|Content site visitor processing system| US8805946B1|2013-08-30|2014-08-12|Tealium Inc.|System and method for combining content site visitor profiles| US9081789B2|2013-10-28|2015-07-14|Tealium Inc.|System for prefetching digital tags| WO2015069659A1|2013-11-05|2015-05-14|Tealium Inc.|Universal visitor identification system| US9288256B2|2014-04-11|2016-03-15|Ensighten, Inc.|URL prefetching| US8997081B1|2014-09-18|2015-03-31|Ensighten, Inc.|Analytics for mobile applications| US9219787B1|2014-11-26|2015-12-22|Ensighten, Inc.|Stateless cookie operations server|US9361631B2|2010-01-06|2016-06-07|Ghostery, Inc.|Managing and monitoring digital advertising| US10291492B2|2012-08-15|2019-05-14|Evidon, Inc.|Systems and methods for discovering sources of online content| AU2016249910A1|2015-04-11|2017-10-26|Evidon, Inc.|Methods, apparatus, and systems for providing notice of digital tracking technologies in mobile apps on mobile devices, and for recording user consent in connection with same| WO2017078705A1|2015-11-04|2017-05-11|Observepoint, Inc.|Automatic execution of objects in a user interface| US10360133B2|2016-02-04|2019-07-23|Observepoint Inc.|Analyzing analytic element network traffic| US10826802B2|2016-02-09|2020-11-03|Observepoint, Inc.|Managing network communication protocols| US11011186B2|2019-06-30|2021-05-18|Paypal, Inc.|Mobile emulator determination using sound detection|
法律状态:
2016-01-08| PLFP| Fee payment|Year of fee payment: 2 | 2016-06-24| TP| Transmission of property|Owner name: OBSERVEPOINT, INC., US Effective date: 20160524 | 2017-01-12| PLFP| Fee payment|Year of fee payment: 3 | 2018-01-11| PLFP| Fee payment|Year of fee payment: 4 | 2020-02-25| PLFP| Fee payment|Year of fee payment: 6 | 2021-02-23| PLFP| Fee payment|Year of fee payment: 7 | 2022-02-23| PLFP| Fee payment|Year of fee payment: 8 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US14/485,539|US9357366B2|2014-09-12|2014-09-12|Auditing of mobile applications| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|