CN107025390A - The reinforcement means and device of software installation bag - Google Patents
The reinforcement means and device of software installation bag Download PDFInfo
- Publication number
- CN107025390A CN107025390A CN201710281949.7A CN201710281949A CN107025390A CN 107025390 A CN107025390 A CN 107025390A CN 201710281949 A CN201710281949 A CN 201710281949A CN 107025390 A CN107025390 A CN 107025390A
- Authority
- CN
- China
- Prior art keywords
- file
- software installation
- installation bag
- reinforced
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000002787 reinforcement Effects 0.000 title claims abstract description 15
- 238000000034 method Methods 0.000 claims abstract description 37
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 18
- 230000004048 modification Effects 0.000 claims description 6
- 230000003014 reinforcing effect Effects 0.000 abstract description 30
- 238000003860 storage Methods 0.000 description 18
- 230000006870 function Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000006872 improvement Effects 0.000 description 7
- 238000009434 installation Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the present application discloses a kind of reinforcement means and device of software installation bag, and this method includes:File to be encrypted is generated based on all source code files in software installation bag to be reinforced;File to be encrypted is encrypted based on default AES;File after successfully encrypting is stored into software installation bag to be reinforced;And in software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.The embodiment of the present application can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize the reinforcing for the software installation bag for treating reinforcing, so as to increase the difficulty of the source code in malicious attack identification software installation kit, the security of Mobile solution is improved.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of reinforcement means and device of software installation bag.
Background technology
With the fast development of Mobile solution, the Mobile solution based on Android system is also more and more.Android system is to open
The operating system put, can provide more facility for the exploitation of Mobile solution, but also can be the evil for Mobile solution simultaneously
Meaning attack provides facility.
Specifically, the software installation bag of the Mobile solution based on Android system can be the installation kit based on java language,
And java language is easier to by the code after decompiling, and decompiling to a certain extent close to the source generation in corresponding installation kit
Code, the code after decompiling is relatively easy to be read, therefore, the logic of the Mobile solution based on Android system, for example, and opposite end
Communication modes, enciphering and deciphering algorithm and key, and soft keyboard technology realize etc., be easier to be exposed.
As shown in the above, the security of the Mobile solution based on Android system is poor.
The content of the invention
The purpose of the embodiment of the present application is to provide a kind of reinforcement means and device of software installation bag, and peace is based on to improve
The security of the Mobile solution of tall and erect system.
In order to solve the above technical problems, what the embodiment of the present application was realized in:
The embodiment of the present application provides a kind of reinforcement means of software installation bag, and methods described includes:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, generated and decrypted based on decipherment algorithm corresponding with default AES
File.
The embodiment of the present application provides a kind of bracing means of software installation bag, and described device includes:
First generation module, for be encrypted based on all source code files generation in software installation bag to be reinforced
File;
Encrypting module, for the file to be encrypted to be encrypted based on default AES;
Memory module, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module, in the software installation bag to be reinforced, based on corresponding with default AES
Decipherment algorithm generation decryption file.
The technical scheme provided from above the embodiment of the present application, the embodiment of the present application can be based on software to be reinforced
Institute's source code in installation kit generates file to be encrypted, it is then possible to based on default AES to file to be encrypted
It is encrypted, after encrypting successfully, the file after encryption can be stored into software installation bag to be reinforced, and to be reinforced
In software installation bag, based on decipherment algorithm corresponding with default AES generation decryption file.
The embodiment of the present application can be by treating reinforcing software installation bag in institute source code carry out shell adding encryption come
The reinforcing for the software installation bag for treating reinforcing is realized, so as to increase the source code in malicious attack identification software installation kit
Difficulty, improves the security of Mobile solution.Meanwhile, the embodiment of the present application can also generate corresponding decryption file to realize to depositing
The decryption for having encrypted file into software installation bag to be reinforced is stored up, so that the source code in software kit to be reinforced can
To be read and be handled by normal virtual machine.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments described in application, for those of ordinary skill in the art, are not paying the premise of creative labor
Under, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of embodiment of the reinforcement means of software installation bag of the application;
Fig. 2 is the embodiment of the reinforcement means of another software installation bag of the application;
Fig. 3 is a kind of embodiment of the bracing means of software installation bag of the application;
Fig. 4 is the embodiment of the bracing means of another software installation bag of the application;
Fig. 5 is a kind of embodiment of the ruggedized equipment of software installation bag of the application.
Embodiment
The embodiment of the present application provides a kind of reinforcement means and device of software installation bag.
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation
Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common
The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection
Scope.
Embodiment one
As shown in figure 1, the application provides a kind of embodiment of the reinforcement means of software installation bag, Android is based on to improve
The security of the Mobile solution of system.The embodiment of the present application can be by treating reinforcing software installation bag in institute's source code
Carry out shell adding encryption to realize the reinforcing for the software installation bag for treating reinforcing, installed so as to increase malicious attack identification software
The difficulty of source code in bag, improves the security of Mobile solution.This method specifically includes following steps:
In step S101:Text to be encrypted is generated based on all source code files in software installation bag to be reinforced
Part.
In the present embodiment, software installation bag to be reinforced can include the software installation bag based on Android system, except base
In outside the software installation bag of Android system, software installation bag to be reinforced can include or not include based on other operating systems
Software kit, the present embodiment is without limitation.
In the present embodiment, it can be generated based on all source code files in software installation bag to be reinforced to be encrypted
File.
Specifically, all source code files can be obtained from software installation bag to be reinforced, then, to all sources
Code file is compiled and packed.Wherein, during packing, all source codes can be packed into be encrypted
In file, to realize the shell adding of institute's source code in the software installation bag for treating reinforcing.
In one example, the file format of file to be encrypted can be .dex forms, and specifically, the file to be encrypted can
Think class.dex files.
In step s 102:File to be encrypted is encrypted based on default AES.
In the present embodiment, can with predetermined encryption algorithm, wherein, the default AES can for acquiescence encryption calculate
Method, or the customized AES of related technical staff;Can be existing AES, or based on existing
Combined ciphering algorithm that some AESs are obtained etc., the present embodiment is without limitation.
In the present embodiment, file to be encrypted can be encrypted based on default AES, wherein it is possible to be
Symmetric cryptography, or asymmetric cryptosystem, the present embodiment is without limitation.
In step s 103:File after successfully encrypting is stored into software installation bag to be reinforced.
In the present embodiment, after the encryption to file to be encrypted is completed, the file after encryption can be stored to be added
Solid software installation bag in.Wherein, successfully encrypt after file file format can with the file before encryption, i.e., it is to be encrypted
File, file format differ.
In one example, the file format of file to be encrypted can be .dex forms, be carried out to the file to be encrypted
After encryption, the file format of the file after obtained successful encryption can be .jar forms.
In one example, file to be encrypted can be class.dex files, be encrypted to the file to be encrypted
Afterwards, the file after the successful encryption obtained can be assets/bangcle_classes.jar files.
In step S104:In software installation bag to be reinforced, calculated based on decryption corresponding with default AES
Method generation decryption file.
In the present embodiment, it is necessary to which explanation, step S103 can be before step S104, can also be in step S104
Afterwards, can also simultaneously it be performed with step S104, the present embodiment is without limitation.
In the present embodiment, after the encryption to file to be encrypted is completed, it can be based on corresponding with default AES
Decipherment algorithm generation decryption file.
In the present embodiment, decryption file file format can with the file before encryption, i.e., file to be encrypted, text
Part form is identical, if for example, the file format of file to be encrypted is .dex forms, the file format of decryption file can also
For .dex forms.
In the present embodiment, the file format not phase that the file format of decryption file can be with the file after successfully encrypting
Together, if for example, the file format of the file after successfully encrypting is .jar forms, the file format of decryption file can not be
.jar form.
In one example, if file before encryption, i.e., file to be encrypted is class.dex files, then decrypts file
Can also be class.dex files.
In the present embodiment, it can be generated based on decipherment algorithm corresponding with AES and the file after successfully encryption
Corresponding decryption file, so that virtual machine can be obtained and handled based on the decryption file in software installation bag to be reinforced
Institute's source code.
In one example, all source codes can be obtained from software installation bag to be reinforced, and to all sources
Code is compiled, packed, wherein, during packing, all source codes can be packed into file to be encrypted,
Wherein, the file to be encrypted can be class.dex files.The file to be encrypted is added based on default AES
After close, assets/bangcle_classes.jar files can be obtained, it is then possible to by assets/bangcle_
Classes.jar files are preserved in software installation bag to be reinforced.File to be encrypted is carried out based on default AES
After encryption, it can be generated and decrypted based on decipherment algorithm corresponding with default AES in software installation bag to be reinforced
File, wherein, the decryption file can be class.dex files.When normal virtual machine, for example, Dalvik virtual machine, is obtained
This can be obtained wait after the software installation reinforced based on decryption file class.dex files in the file after successfully encrypting
File before encryption, then, Dalvik virtual machine can obtain from the file before encryption and perform all source codes.
The application provides a kind of embodiment of the reinforcement means of software installation bag, in the present embodiment, can be based on to be added
Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES
Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and
In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize
The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit
Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating
The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just
Normal virtual machine reads and handled.
Embodiment two
As shown in Fig. 2 the application provides the embodiment of the reinforcement means of another software installation bag, peace is based on to improve
The security of the Mobile solution of tall and erect system.The embodiment of the present application can pass through the program entry for the software installation bag for treating reinforcing
Modification, to improve the handlability of software installation bag to be reinforced.This method specifically includes following steps:
In step s 201:Text to be encrypted is generated based on all source code files in software installation bag to be reinforced
Part.
In step S202:File to be encrypted is encrypted based on default AES.
In step S203:File after successfully encrypting is stored into software installation bag to be reinforced.
In step S204:In software installation bag to be reinforced, calculated based on decryption corresponding with default AES
Method generation decryption file.
Because step S201 to step S204 content is described in detail in a upper embodiment, therefore the present embodiment is no longer gone to live in the household of one's in-laws on getting married herein
State.
In step S205:The program entry of software installation bag to be reinforced is changed, so that decryption file is prior to successfully adding
File after close is performed by virtual machine.
In the present embodiment, in software installation bag to be reinforced, calculated based on decryption corresponding with default AES
After method generation decryption file, the program entry of the software installation bag to be reinforced can be changed, so that the decryption file can be first
File after successfully encrypting is performed by virtual machine.Wherein, the file after this is successfully encrypted can be the base in a upper embodiment
File to be encrypted is encrypted obtained file in default AES, and file to be encrypted can be upper one
The file based on all source code files generation in the software installation bag to be reinforced mentioned in embodiment.
If the program entry of software installation bag not reinforced to this is modified, when virtual machine, to handle this to be reinforced
During software installation bag, it is possible to first handle the file after successfully encryption, post processing decryption file, because virtual machine is not being decrypted
In the case of file, it is impossible to successful execution successfully encrypt after file, therefore, the virtual machine software installation bag to be reinforced to this
Treatment effeciency can be reduced, now, and the handlability of the software installation bag to be reinforced is poor.
If the program entry of the software installation bag to be reinforced to this is modified so that it is to be reinforced soft that virtual machine handles this
During part installation kit, first processing decryption file post-processes the file after successfully encryption, then text of the virtual machine after successfully encryption is handled
, can be based on decryption file come the processing of the file after realizing to successfully encrypting during part.It is to be reinforced to this so as to improve
The treatment effeciency of software installation bag, now, the handlability of the software installation bag to be reinforced are preferable.
The application provides the embodiment of the reinforcement means of another software installation bag, in the present embodiment, can be based on treating
Institute's source code in the software installation bag of reinforcing generates file to be encrypted, it is then possible to be based on default AES pair
File to be encrypted is encrypted, after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and
In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file, Yi Jixiu
Change the program entry of software installation bag to be reinforced, so that the file after decrypting file prior to successfully encrypting is performed by virtual machine.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize
The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit
Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can pass through the program entry for the software installation bag for treating reinforcing
Modification, to improve the handlability of software installation bag to be reinforced.It is real that the present embodiment can also generate corresponding decryption file
Now to storing the decryption for having encrypted file into software installation bag to be reinforced, so that the source in software kit to be reinforced
Code can be read and be handled by normal virtual machine.
Embodiment three
The reinforcement means of the software installation bag provided above for the embodiment of the present application, based on same thinking, the application is real
Apply example and a kind of bracing means of software installation bag is also provided, as shown in Figure 3:
The bracing means of the software installation bag includes:First generation module 310, encrypting module 320, memory module 330
And second generation module 340, wherein:
First generation module 310, for be added based on all source code files generation in software installation bag to be reinforced
Close file;
Encrypting module 320, for the file to be encrypted to be encrypted based on default AES;
Memory module 330, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module 340, in the software installation bag to be reinforced, based on default AES pair
The decipherment algorithm generation decryption file answered.
In the embodiment of the present application, described device can also include (as shown in Figure 4):
Modified module 350, the program entry for changing the software installation bag to be reinforced, so that the decryption file
Performed prior to the file after the successfully encryption by virtual machine.
In the embodiment of the present application, the file format of the decryption file is identical with the file format of the file to be encrypted,
It is different from the file format of the file after the successfully encryption.
In the embodiment of the present application, the software installation bag to be reinforced includes the software installation bag based on Android system.
In the embodiment of the present application, the file format of the decryption file is dex forms, the file after the successfully encryption
File format is .jar forms.
The application provides a kind of embodiment of the bracing means of software installation bag, in the present embodiment, can be based on to be added
Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES
Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and
In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize
The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit
Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating
The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just
Normal virtual machine reads and handled.
Example IV
Based on same thinking, the embodiment of the present application also provides a kind of embodiment of the ruggedized equipment of software installation bag, such as
Shown in Fig. 5.
The terminal for reinforcing software installation bag that the ruggedized equipment of the software installation bag can provide for above-described embodiment
Equipment or server etc..
The ruggedized equipment of software installation bag can be produced than larger difference because of configuration or performance difference, can include one
Or more than one processor 501 and memory 502, can be stored with memory 502 one or more storage applications
Program or data.Wherein, memory 502 can be of short duration storage or persistently storage.The application program for being stored in memory 502 can
So that including one or more modules (diagram is not shown), each module can include in the ruggedized equipment of software installation bag
Series of computation machine executable instruction.Further, processor 501 could be arranged to communicate with memory 502, in software
The series of computation machine executable instruction in memory 502 is performed on the ruggedized equipment of installation kit.The reinforcing of software installation bag is set
It is standby to include one or more power supplys 503, one or more wired or wireless network interfaces 504, one or
More than one input/output interface 505, one or more keyboards 506.
Specifically in the present embodiment, the ruggedized equipment of software installation bag includes memory, and one or more
Program, one of them or more than one program storage is in memory, and one or more than one program can include
One or more modules, and can include can to the series of computation machine in the ruggedized equipment of software installation bag for each module
Execute instruction, and be configured to by one or more than one computing device this or more than one program bag containing being used for
Carry out following computer executable instructions:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, generated and decrypted based on decipherment algorithm corresponding with default AES
File.
Alternatively, computer executable instructions when executed, can also make the processor:
The program entry of the modification software installation bag to be reinforced, so that the decryption file is successfully encrypted prior to described
File afterwards is performed by virtual machine.
Optionally, it is described decryption file file format it is identical with the file format of the file to be encrypted, with it is described into
The file format of file after work(encryption is different.
Optionally, the software installation bag to be reinforced includes the software installation bag based on Android system.
Optionally, the file format of the decryption file is dex forms, the file format of the file after the successfully encryption
For .jar forms.
The application provides a kind of embodiment of the ruggedized equipment of software installation bag, in the present embodiment, can be based on to be added
Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES
Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and
In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize
The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit
Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating
The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just
Normal virtual machine reads and handled.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So
And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make
Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should
This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device
Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller
Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited
Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with
Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic
Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it
The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded
For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity,
Or realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented
The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the application can be used in one or more computers for wherein including computer usable program code
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The application is the flow with reference to method, equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap
Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by
Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with
Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system
Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art
For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.
Claims (10)
1. a kind of reinforcement means of software installation bag, it is characterised in that methods described includes:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation solution ciphertext
Part.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
The program entry of the modification software installation bag to be reinforced, so that after the decryption file is prior to the successfully encryption
File is performed by virtual machine.
3. according to the method described in claim 1, it is characterised in that the file format and the ciphertext to be added of the decryption file
The file format of part is identical, different from the file format of the file after the successfully encryption.
4. according to any described method of claims 1 to 3, it is characterised in that the software installation bag to be reinforced includes base
In the software installation bag of Android system.
5. method according to claim 4, it is characterised in that the file format of the decryption file is dex forms, described
The file format of file after success encryption is .jar forms.
6. a kind of bracing means of software installation bag, it is characterised in that described device includes:
First generation module, for generating text to be encrypted based on all source code files in software installation bag to be reinforced
Part;
Encrypting module, for the file to be encrypted to be encrypted based on default AES;
Memory module, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module, in the software installation bag to be reinforced, based on solution corresponding with default AES
Close algorithm generation decryption file.
7. device according to claim 6, it is characterised in that described device also includes:
Modified module, the program entry for changing the software installation bag to be reinforced, so that the decryption file is prior to institute
The file after successfully encryption is stated to be performed by virtual machine.
8. device according to claim 6, it is characterised in that the file format of the decryption file and the ciphertext to be added
The file format of part is identical, different from the file format of the file after the successfully encryption.
9. according to any described device of claim 6 to 7, it is characterised in that the software installation bag to be reinforced includes base
In the software installation bag of Android system.
10. device according to claim 9, it is characterised in that the file format of the decryption file is dex forms, institute
The file format for stating the file after successfully encryption is .jar forms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710281949.7A CN107025390A (en) | 2017-04-26 | 2017-04-26 | The reinforcement means and device of software installation bag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710281949.7A CN107025390A (en) | 2017-04-26 | 2017-04-26 | The reinforcement means and device of software installation bag |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107025390A true CN107025390A (en) | 2017-08-08 |
Family
ID=59527712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710281949.7A Pending CN107025390A (en) | 2017-04-26 | 2017-04-26 | The reinforcement means and device of software installation bag |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107025390A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108076050A (en) * | 2017-11-15 | 2018-05-25 | 广州鑫燕网络科技有限公司 | A kind of method and system of ciphertext joint sealing formula protection JavaScript source codes |
CN109740311A (en) * | 2019-01-07 | 2019-05-10 | 广州小鹏汽车科技有限公司 | The safety encryption and device of Android application |
CN112100582A (en) * | 2020-09-22 | 2020-12-18 | 焦点教育科技有限公司 | Method for protecting software distribution security by applying strong symmetric encryption |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021321A (en) * | 2014-06-17 | 2014-09-03 | 北京奇虎科技有限公司 | Reinforcing protection method and device for software installation package |
-
2017
- 2017-04-26 CN CN201710281949.7A patent/CN107025390A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104021321A (en) * | 2014-06-17 | 2014-09-03 | 北京奇虎科技有限公司 | Reinforcing protection method and device for software installation package |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108076050A (en) * | 2017-11-15 | 2018-05-25 | 广州鑫燕网络科技有限公司 | A kind of method and system of ciphertext joint sealing formula protection JavaScript source codes |
CN108076050B (en) * | 2017-11-15 | 2020-06-30 | 广州鑫燕网络科技有限公司 | Method and system for protecting JavaScript source code in ciphertext sealing box mode |
CN109740311A (en) * | 2019-01-07 | 2019-05-10 | 广州小鹏汽车科技有限公司 | The safety encryption and device of Android application |
CN112100582A (en) * | 2020-09-22 | 2020-12-18 | 焦点教育科技有限公司 | Method for protecting software distribution security by applying strong symmetric encryption |
CN112100582B (en) * | 2020-09-22 | 2023-06-16 | 焦点教育科技有限公司 | Method for protecting software distribution safety by applying strong symmetric encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107122634A (en) | The method for reinforcing and protecting and device of software installation bag | |
CN107122632A (en) | The encryption method and device of software installation bag | |
CN108932297A (en) | A kind of data query, data sharing method, device and equipment | |
CN110033368A (en) | The method of secret protection is realized in block chain | |
US20140140512A1 (en) | Requested and allowed cryptographic operations comparison | |
CN110162981A (en) | Data processing method and device | |
CN107196989A (en) | A kind of processing method and processing device of service request | |
CN109886682A (en) | The method and node, storage medium that contract calls are realized in block chain | |
CN110020855A (en) | Method, the node, storage medium of secret protection are realized in block chain | |
CN110008735A (en) | The method and node, storage medium that contract calls are realized in block chain | |
US20150078550A1 (en) | Security processing unit with configurable access control | |
CN110033267A (en) | Method, node, system and the storage medium of secret protection are realized in block chain | |
CN108055132A (en) | The method, apparatus and equipment of a kind of service authorization | |
CN110008736A (en) | The method and node, storage medium of secret protection are realized in block chain | |
CN110032885A (en) | Method, node and the storage medium of secret protection are realized in block chain | |
CN110060054A (en) | Method, node, system and the storage medium of secret protection are realized in block chain | |
CN110020856A (en) | Method, node and the storage medium of three handed deal are realized in block chain | |
CN109347629A (en) | Key transmission method and system based on shared security application, storage medium, equipment | |
CN110245489A (en) | Receipt storage method, node and system based on plaintext log | |
CN107196907A (en) | A kind of guard method of Android SO files and device | |
CN107025390A (en) | The reinforcement means and device of software installation bag | |
CN110033266A (en) | Method, node and the storage medium of secret protection are realized in block chain | |
CN110008715A (en) | The method and node, storage medium of secret protection are realized in block chain | |
CN110264193A (en) | In conjunction with the receipt storage method and node of user type and type of transaction | |
CN110247895A (en) | In conjunction with the receipt storage method and node of code mark and event functions type |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor Applicant after: Beijing Bang Bang Safety Technology Co. Ltd. Address before: 100083 Xueyuan Road, Haidian District, Haidian District, Beijing, Haidian District, Beijing Applicant before: Yangpuweiye Technology Limited |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170808 |