CN107025390A - The reinforcement means and device of software installation bag - Google Patents

The reinforcement means and device of software installation bag Download PDF

Info

Publication number
CN107025390A
CN107025390A CN201710281949.7A CN201710281949A CN107025390A CN 107025390 A CN107025390 A CN 107025390A CN 201710281949 A CN201710281949 A CN 201710281949A CN 107025390 A CN107025390 A CN 107025390A
Authority
CN
China
Prior art keywords
file
software installation
installation bag
reinforced
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710281949.7A
Other languages
Chinese (zh)
Inventor
阚志刚
陈彪
程显龙
方宁
卢佐华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YANGPUWEIYE TECHNOLOGY Ltd
Original Assignee
YANGPUWEIYE TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YANGPUWEIYE TECHNOLOGY Ltd filed Critical YANGPUWEIYE TECHNOLOGY Ltd
Priority to CN201710281949.7A priority Critical patent/CN107025390A/en
Publication of CN107025390A publication Critical patent/CN107025390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the present application discloses a kind of reinforcement means and device of software installation bag, and this method includes:File to be encrypted is generated based on all source code files in software installation bag to be reinforced;File to be encrypted is encrypted based on default AES;File after successfully encrypting is stored into software installation bag to be reinforced;And in software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.The embodiment of the present application can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize the reinforcing for the software installation bag for treating reinforcing, so as to increase the difficulty of the source code in malicious attack identification software installation kit, the security of Mobile solution is improved.

Description

The reinforcement means and device of software installation bag
Technical field
The application is related to field of computer technology, more particularly to a kind of reinforcement means and device of software installation bag.
Background technology
With the fast development of Mobile solution, the Mobile solution based on Android system is also more and more.Android system is to open The operating system put, can provide more facility for the exploitation of Mobile solution, but also can be the evil for Mobile solution simultaneously Meaning attack provides facility.
Specifically, the software installation bag of the Mobile solution based on Android system can be the installation kit based on java language, And java language is easier to by the code after decompiling, and decompiling to a certain extent close to the source generation in corresponding installation kit Code, the code after decompiling is relatively easy to be read, therefore, the logic of the Mobile solution based on Android system, for example, and opposite end Communication modes, enciphering and deciphering algorithm and key, and soft keyboard technology realize etc., be easier to be exposed.
As shown in the above, the security of the Mobile solution based on Android system is poor.
The content of the invention
The purpose of the embodiment of the present application is to provide a kind of reinforcement means and device of software installation bag, and peace is based on to improve The security of the Mobile solution of tall and erect system.
In order to solve the above technical problems, what the embodiment of the present application was realized in:
The embodiment of the present application provides a kind of reinforcement means of software installation bag, and methods described includes:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, generated and decrypted based on decipherment algorithm corresponding with default AES File.
The embodiment of the present application provides a kind of bracing means of software installation bag, and described device includes:
First generation module, for be encrypted based on all source code files generation in software installation bag to be reinforced File;
Encrypting module, for the file to be encrypted to be encrypted based on default AES;
Memory module, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module, in the software installation bag to be reinforced, based on corresponding with default AES Decipherment algorithm generation decryption file.
The technical scheme provided from above the embodiment of the present application, the embodiment of the present application can be based on software to be reinforced Institute's source code in installation kit generates file to be encrypted, it is then possible to based on default AES to file to be encrypted It is encrypted, after encrypting successfully, the file after encryption can be stored into software installation bag to be reinforced, and to be reinforced In software installation bag, based on decipherment algorithm corresponding with default AES generation decryption file.
The embodiment of the present application can be by treating reinforcing software installation bag in institute source code carry out shell adding encryption come The reinforcing for the software installation bag for treating reinforcing is realized, so as to increase the source code in malicious attack identification software installation kit Difficulty, improves the security of Mobile solution.Meanwhile, the embodiment of the present application can also generate corresponding decryption file to realize to depositing The decryption for having encrypted file into software installation bag to be reinforced is stored up, so that the source code in software kit to be reinforced can To be read and be handled by normal virtual machine.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, are not paying the premise of creative labor Under, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of embodiment of the reinforcement means of software installation bag of the application;
Fig. 2 is the embodiment of the reinforcement means of another software installation bag of the application;
Fig. 3 is a kind of embodiment of the bracing means of software installation bag of the application;
Fig. 4 is the embodiment of the bracing means of another software installation bag of the application;
Fig. 5 is a kind of embodiment of the ruggedized equipment of software installation bag of the application.
Embodiment
The embodiment of the present application provides a kind of reinforcement means and device of software installation bag.
In order that those skilled in the art more fully understand the technical scheme in the application, it is real below in conjunction with the application The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described implementation Example only some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, this area is common The every other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection Scope.
Embodiment one
As shown in figure 1, the application provides a kind of embodiment of the reinforcement means of software installation bag, Android is based on to improve The security of the Mobile solution of system.The embodiment of the present application can be by treating reinforcing software installation bag in institute's source code Carry out shell adding encryption to realize the reinforcing for the software installation bag for treating reinforcing, installed so as to increase malicious attack identification software The difficulty of source code in bag, improves the security of Mobile solution.This method specifically includes following steps:
In step S101:Text to be encrypted is generated based on all source code files in software installation bag to be reinforced Part.
In the present embodiment, software installation bag to be reinforced can include the software installation bag based on Android system, except base In outside the software installation bag of Android system, software installation bag to be reinforced can include or not include based on other operating systems Software kit, the present embodiment is without limitation.
In the present embodiment, it can be generated based on all source code files in software installation bag to be reinforced to be encrypted File.
Specifically, all source code files can be obtained from software installation bag to be reinforced, then, to all sources Code file is compiled and packed.Wherein, during packing, all source codes can be packed into be encrypted In file, to realize the shell adding of institute's source code in the software installation bag for treating reinforcing.
In one example, the file format of file to be encrypted can be .dex forms, and specifically, the file to be encrypted can Think class.dex files.
In step s 102:File to be encrypted is encrypted based on default AES.
In the present embodiment, can with predetermined encryption algorithm, wherein, the default AES can for acquiescence encryption calculate Method, or the customized AES of related technical staff;Can be existing AES, or based on existing Combined ciphering algorithm that some AESs are obtained etc., the present embodiment is without limitation.
In the present embodiment, file to be encrypted can be encrypted based on default AES, wherein it is possible to be Symmetric cryptography, or asymmetric cryptosystem, the present embodiment is without limitation.
In step s 103:File after successfully encrypting is stored into software installation bag to be reinforced.
In the present embodiment, after the encryption to file to be encrypted is completed, the file after encryption can be stored to be added Solid software installation bag in.Wherein, successfully encrypt after file file format can with the file before encryption, i.e., it is to be encrypted File, file format differ.
In one example, the file format of file to be encrypted can be .dex forms, be carried out to the file to be encrypted After encryption, the file format of the file after obtained successful encryption can be .jar forms.
In one example, file to be encrypted can be class.dex files, be encrypted to the file to be encrypted Afterwards, the file after the successful encryption obtained can be assets/bangcle_classes.jar files.
In step S104:In software installation bag to be reinforced, calculated based on decryption corresponding with default AES Method generation decryption file.
In the present embodiment, it is necessary to which explanation, step S103 can be before step S104, can also be in step S104 Afterwards, can also simultaneously it be performed with step S104, the present embodiment is without limitation.
In the present embodiment, after the encryption to file to be encrypted is completed, it can be based on corresponding with default AES Decipherment algorithm generation decryption file.
In the present embodiment, decryption file file format can with the file before encryption, i.e., file to be encrypted, text Part form is identical, if for example, the file format of file to be encrypted is .dex forms, the file format of decryption file can also For .dex forms.
In the present embodiment, the file format not phase that the file format of decryption file can be with the file after successfully encrypting Together, if for example, the file format of the file after successfully encrypting is .jar forms, the file format of decryption file can not be .jar form.
In one example, if file before encryption, i.e., file to be encrypted is class.dex files, then decrypts file Can also be class.dex files.
In the present embodiment, it can be generated based on decipherment algorithm corresponding with AES and the file after successfully encryption Corresponding decryption file, so that virtual machine can be obtained and handled based on the decryption file in software installation bag to be reinforced Institute's source code.
In one example, all source codes can be obtained from software installation bag to be reinforced, and to all sources Code is compiled, packed, wherein, during packing, all source codes can be packed into file to be encrypted, Wherein, the file to be encrypted can be class.dex files.The file to be encrypted is added based on default AES After close, assets/bangcle_classes.jar files can be obtained, it is then possible to by assets/bangcle_ Classes.jar files are preserved in software installation bag to be reinforced.File to be encrypted is carried out based on default AES After encryption, it can be generated and decrypted based on decipherment algorithm corresponding with default AES in software installation bag to be reinforced File, wherein, the decryption file can be class.dex files.When normal virtual machine, for example, Dalvik virtual machine, is obtained This can be obtained wait after the software installation reinforced based on decryption file class.dex files in the file after successfully encrypting File before encryption, then, Dalvik virtual machine can obtain from the file before encryption and perform all source codes.
The application provides a kind of embodiment of the reinforcement means of software installation bag, in the present embodiment, can be based on to be added Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just Normal virtual machine reads and handled.
Embodiment two
As shown in Fig. 2 the application provides the embodiment of the reinforcement means of another software installation bag, peace is based on to improve The security of the Mobile solution of tall and erect system.The embodiment of the present application can pass through the program entry for the software installation bag for treating reinforcing Modification, to improve the handlability of software installation bag to be reinforced.This method specifically includes following steps:
In step s 201:Text to be encrypted is generated based on all source code files in software installation bag to be reinforced Part.
In step S202:File to be encrypted is encrypted based on default AES.
In step S203:File after successfully encrypting is stored into software installation bag to be reinforced.
In step S204:In software installation bag to be reinforced, calculated based on decryption corresponding with default AES Method generation decryption file.
Because step S201 to step S204 content is described in detail in a upper embodiment, therefore the present embodiment is no longer gone to live in the household of one's in-laws on getting married herein State.
In step S205:The program entry of software installation bag to be reinforced is changed, so that decryption file is prior to successfully adding File after close is performed by virtual machine.
In the present embodiment, in software installation bag to be reinforced, calculated based on decryption corresponding with default AES After method generation decryption file, the program entry of the software installation bag to be reinforced can be changed, so that the decryption file can be first File after successfully encrypting is performed by virtual machine.Wherein, the file after this is successfully encrypted can be the base in a upper embodiment File to be encrypted is encrypted obtained file in default AES, and file to be encrypted can be upper one The file based on all source code files generation in the software installation bag to be reinforced mentioned in embodiment.
If the program entry of software installation bag not reinforced to this is modified, when virtual machine, to handle this to be reinforced During software installation bag, it is possible to first handle the file after successfully encryption, post processing decryption file, because virtual machine is not being decrypted In the case of file, it is impossible to successful execution successfully encrypt after file, therefore, the virtual machine software installation bag to be reinforced to this Treatment effeciency can be reduced, now, and the handlability of the software installation bag to be reinforced is poor.
If the program entry of the software installation bag to be reinforced to this is modified so that it is to be reinforced soft that virtual machine handles this During part installation kit, first processing decryption file post-processes the file after successfully encryption, then text of the virtual machine after successfully encryption is handled , can be based on decryption file come the processing of the file after realizing to successfully encrypting during part.It is to be reinforced to this so as to improve The treatment effeciency of software installation bag, now, the handlability of the software installation bag to be reinforced are preferable.
The application provides the embodiment of the reinforcement means of another software installation bag, in the present embodiment, can be based on treating Institute's source code in the software installation bag of reinforcing generates file to be encrypted, it is then possible to be based on default AES pair File to be encrypted is encrypted, after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file, Yi Jixiu Change the program entry of software installation bag to be reinforced, so that the file after decrypting file prior to successfully encrypting is performed by virtual machine.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can pass through the program entry for the software installation bag for treating reinforcing Modification, to improve the handlability of software installation bag to be reinforced.It is real that the present embodiment can also generate corresponding decryption file Now to storing the decryption for having encrypted file into software installation bag to be reinforced, so that the source in software kit to be reinforced Code can be read and be handled by normal virtual machine.
Embodiment three
The reinforcement means of the software installation bag provided above for the embodiment of the present application, based on same thinking, the application is real Apply example and a kind of bracing means of software installation bag is also provided, as shown in Figure 3:
The bracing means of the software installation bag includes:First generation module 310, encrypting module 320, memory module 330 And second generation module 340, wherein:
First generation module 310, for be added based on all source code files generation in software installation bag to be reinforced Close file;
Encrypting module 320, for the file to be encrypted to be encrypted based on default AES;
Memory module 330, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module 340, in the software installation bag to be reinforced, based on default AES pair The decipherment algorithm generation decryption file answered.
In the embodiment of the present application, described device can also include (as shown in Figure 4):
Modified module 350, the program entry for changing the software installation bag to be reinforced, so that the decryption file Performed prior to the file after the successfully encryption by virtual machine.
In the embodiment of the present application, the file format of the decryption file is identical with the file format of the file to be encrypted, It is different from the file format of the file after the successfully encryption.
In the embodiment of the present application, the software installation bag to be reinforced includes the software installation bag based on Android system.
In the embodiment of the present application, the file format of the decryption file is dex forms, the file after the successfully encryption File format is .jar forms.
The application provides a kind of embodiment of the bracing means of software installation bag, in the present embodiment, can be based on to be added Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just Normal virtual machine reads and handled.
Example IV
Based on same thinking, the embodiment of the present application also provides a kind of embodiment of the ruggedized equipment of software installation bag, such as Shown in Fig. 5.
The terminal for reinforcing software installation bag that the ruggedized equipment of the software installation bag can provide for above-described embodiment Equipment or server etc..
The ruggedized equipment of software installation bag can be produced than larger difference because of configuration or performance difference, can include one Or more than one processor 501 and memory 502, can be stored with memory 502 one or more storage applications Program or data.Wherein, memory 502 can be of short duration storage or persistently storage.The application program for being stored in memory 502 can So that including one or more modules (diagram is not shown), each module can include in the ruggedized equipment of software installation bag Series of computation machine executable instruction.Further, processor 501 could be arranged to communicate with memory 502, in software The series of computation machine executable instruction in memory 502 is performed on the ruggedized equipment of installation kit.The reinforcing of software installation bag is set It is standby to include one or more power supplys 503, one or more wired or wireless network interfaces 504, one or More than one input/output interface 505, one or more keyboards 506.
Specifically in the present embodiment, the ruggedized equipment of software installation bag includes memory, and one or more Program, one of them or more than one program storage is in memory, and one or more than one program can include One or more modules, and can include can to the series of computation machine in the ruggedized equipment of software installation bag for each module Execute instruction, and be configured to by one or more than one computing device this or more than one program bag containing being used for Carry out following computer executable instructions:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, generated and decrypted based on decipherment algorithm corresponding with default AES File.
Alternatively, computer executable instructions when executed, can also make the processor:
The program entry of the modification software installation bag to be reinforced, so that the decryption file is successfully encrypted prior to described File afterwards is performed by virtual machine.
Optionally, it is described decryption file file format it is identical with the file format of the file to be encrypted, with it is described into The file format of file after work(encryption is different.
Optionally, the software installation bag to be reinforced includes the software installation bag based on Android system.
Optionally, the file format of the decryption file is dex forms, the file format of the file after the successfully encryption For .jar forms.
The application provides a kind of embodiment of the ruggedized equipment of software installation bag, in the present embodiment, can be based on to be added Solid software installation bag in institute source code generate file to be encrypted, it is then possible to be treated based on default AES Encryption file is encrypted, and after encrypting successfully, can store the file after encryption into software installation bag to be reinforced, and In software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation decryption file.
The present embodiment can be by treating reinforcing software installation bag in institute source code shell adding encryption is carried out to realize The reinforcing of the software installation bag of reinforcing is treated, so as to increase the difficulty of the source code in malicious attack identification software installation kit Degree, improves the security of Mobile solution.Meanwhile, the present embodiment can also generate corresponding decryption file to realize to storing to treating The decryption for having encrypted file in the software installation bag of reinforcing, so that the source code in software kit to be reinforced can be by just Normal virtual machine reads and handled.
In the 1990s, for a technology improvement can clearly distinguish be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (for the improvement of method flow).So And, with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make Special IC chip.Moreover, nowadays, substitution manually makes IC chip, and this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should This understands, it is only necessary to slightly programming in logic and be programmed into method flow in integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method flow can be just readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller includes but is not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with Pure computer readable program code mode is realized beyond controller, can be made completely by the way that method and step is carried out into programming in logic Obtain controller and come real in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions is regarded For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or unit that above-described embodiment is illustrated, can specifically be realized by computer chip or entity, Or realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the application can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is the flow with reference to method, equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of key elements are not only including those key elements, but also wrap Include other key elements being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Also there is other identical element in process, method, commodity or the equipment of element.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Remote processing devices connected by communication network perform task.In a distributed computing environment, program module can be with Positioned at including in the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.It is real especially for system Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of reinforcement means of software installation bag, it is characterised in that methods described includes:
File to be encrypted is generated based on all source code files in software installation bag to be reinforced;
The file to be encrypted is encrypted based on default AES;
File after successfully encrypting is stored into the software installation bag to be reinforced;And
In the software installation bag to be reinforced, based on decipherment algorithm corresponding with default AES generation solution ciphertext Part.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
The program entry of the modification software installation bag to be reinforced, so that after the decryption file is prior to the successfully encryption File is performed by virtual machine.
3. according to the method described in claim 1, it is characterised in that the file format and the ciphertext to be added of the decryption file The file format of part is identical, different from the file format of the file after the successfully encryption.
4. according to any described method of claims 1 to 3, it is characterised in that the software installation bag to be reinforced includes base In the software installation bag of Android system.
5. method according to claim 4, it is characterised in that the file format of the decryption file is dex forms, described The file format of file after success encryption is .jar forms.
6. a kind of bracing means of software installation bag, it is characterised in that described device includes:
First generation module, for generating text to be encrypted based on all source code files in software installation bag to be reinforced Part;
Encrypting module, for the file to be encrypted to be encrypted based on default AES;
Memory module, for the file after successfully encrypting to be stored into the software installation bag to be reinforced;
Second generation module, in the software installation bag to be reinforced, based on solution corresponding with default AES Close algorithm generation decryption file.
7. device according to claim 6, it is characterised in that described device also includes:
Modified module, the program entry for changing the software installation bag to be reinforced, so that the decryption file is prior to institute The file after successfully encryption is stated to be performed by virtual machine.
8. device according to claim 6, it is characterised in that the file format of the decryption file and the ciphertext to be added The file format of part is identical, different from the file format of the file after the successfully encryption.
9. according to any described device of claim 6 to 7, it is characterised in that the software installation bag to be reinforced includes base In the software installation bag of Android system.
10. device according to claim 9, it is characterised in that the file format of the decryption file is dex forms, institute The file format for stating the file after successfully encryption is .jar forms.
CN201710281949.7A 2017-04-26 2017-04-26 The reinforcement means and device of software installation bag Pending CN107025390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710281949.7A CN107025390A (en) 2017-04-26 2017-04-26 The reinforcement means and device of software installation bag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710281949.7A CN107025390A (en) 2017-04-26 2017-04-26 The reinforcement means and device of software installation bag

Publications (1)

Publication Number Publication Date
CN107025390A true CN107025390A (en) 2017-08-08

Family

ID=59527712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710281949.7A Pending CN107025390A (en) 2017-04-26 2017-04-26 The reinforcement means and device of software installation bag

Country Status (1)

Country Link
CN (1) CN107025390A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108076050A (en) * 2017-11-15 2018-05-25 广州鑫燕网络科技有限公司 A kind of method and system of ciphertext joint sealing formula protection JavaScript source codes
CN109740311A (en) * 2019-01-07 2019-05-10 广州小鹏汽车科技有限公司 The safety encryption and device of Android application
CN112100582A (en) * 2020-09-22 2020-12-18 焦点教育科技有限公司 Method for protecting software distribution security by applying strong symmetric encryption

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021321A (en) * 2014-06-17 2014-09-03 北京奇虎科技有限公司 Reinforcing protection method and device for software installation package

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021321A (en) * 2014-06-17 2014-09-03 北京奇虎科技有限公司 Reinforcing protection method and device for software installation package

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108076050A (en) * 2017-11-15 2018-05-25 广州鑫燕网络科技有限公司 A kind of method and system of ciphertext joint sealing formula protection JavaScript source codes
CN108076050B (en) * 2017-11-15 2020-06-30 广州鑫燕网络科技有限公司 Method and system for protecting JavaScript source code in ciphertext sealing box mode
CN109740311A (en) * 2019-01-07 2019-05-10 广州小鹏汽车科技有限公司 The safety encryption and device of Android application
CN112100582A (en) * 2020-09-22 2020-12-18 焦点教育科技有限公司 Method for protecting software distribution security by applying strong symmetric encryption
CN112100582B (en) * 2020-09-22 2023-06-16 焦点教育科技有限公司 Method for protecting software distribution safety by applying strong symmetric encryption

Similar Documents

Publication Publication Date Title
CN107122634A (en) The method for reinforcing and protecting and device of software installation bag
CN107122632A (en) The encryption method and device of software installation bag
CN108932297A (en) A kind of data query, data sharing method, device and equipment
CN110033368A (en) The method of secret protection is realized in block chain
US20140140512A1 (en) Requested and allowed cryptographic operations comparison
CN110162981A (en) Data processing method and device
CN107196989A (en) A kind of processing method and processing device of service request
CN109886682A (en) The method and node, storage medium that contract calls are realized in block chain
CN110020855A (en) Method, the node, storage medium of secret protection are realized in block chain
CN110008735A (en) The method and node, storage medium that contract calls are realized in block chain
US20150078550A1 (en) Security processing unit with configurable access control
CN110033267A (en) Method, node, system and the storage medium of secret protection are realized in block chain
CN108055132A (en) The method, apparatus and equipment of a kind of service authorization
CN110008736A (en) The method and node, storage medium of secret protection are realized in block chain
CN110032885A (en) Method, node and the storage medium of secret protection are realized in block chain
CN110060054A (en) Method, node, system and the storage medium of secret protection are realized in block chain
CN110020856A (en) Method, node and the storage medium of three handed deal are realized in block chain
CN109347629A (en) Key transmission method and system based on shared security application, storage medium, equipment
CN110245489A (en) Receipt storage method, node and system based on plaintext log
CN107196907A (en) A kind of guard method of Android SO files and device
CN107025390A (en) The reinforcement means and device of software installation bag
CN110033266A (en) Method, node and the storage medium of secret protection are realized in block chain
CN110008715A (en) The method and node, storage medium of secret protection are realized in block chain
CN110264193A (en) In conjunction with the receipt storage method and node of user type and type of transaction
CN110247895A (en) In conjunction with the receipt storage method and node of code mark and event functions type

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100083 Beijing, Haidian District Xueyuan Road 30 days building A 20 floor

Applicant after: Beijing Bang Bang Safety Technology Co. Ltd.

Address before: 100083 Xueyuan Road, Haidian District, Haidian District, Beijing, Haidian District, Beijing

Applicant before: Yangpuweiye Technology Limited

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170808