CN104281788A - Terminal application protecting method and device - Google Patents
Terminal application protecting method and device Download PDFInfo
- Publication number
- CN104281788A CN104281788A CN201310282680.6A CN201310282680A CN104281788A CN 104281788 A CN104281788 A CN 104281788A CN 201310282680 A CN201310282680 A CN 201310282680A CN 104281788 A CN104281788 A CN 104281788A
- Authority
- CN
- China
- Prior art keywords
- application
- module
- package name
- attribute
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000012795 verification Methods 0.000 claims description 27
- 238000004806 packaging method and process Methods 0.000 claims description 12
- 230000002159 abnormal effect Effects 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000013478 data encryption standard Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a terminal application protecting method. The method comprises the steps that the application attributes of a terminal application are encrypted; the main logic of the terminal application is achieved through a programming language, and a decryption algorithm is packaged; when an instruction for starting the terminal application is received, the encrypted application attributes are called, the encrypted application attributes are decrypted, the decrypted application attributes are checked, and after the application attributes pass the check, the main logic of the terminal application is called. The invention further discloses a terminal application protecting device. According to the scheme, the terminal application can be effectively prevented from being tampered, and malicious advertisement embedment is reduced.
Description
Technical Field
The invention relates to a terminal application protection technology, in particular to a method and a device for protecting a terminal application based on an open code platform.
Background
The application safety of the Android platform is widely suffered from the problems, due to the unsound auditing mechanism of the domestic Android application market and the decompilation characteristic of JAVA language, many domestic developers can modify the package name and the advertisement authentication information of the original terminal application by maliciously cracking and decompilating the original application, repackaging the terminal application and releasing the terminal application for illegal profit, the benefit damage to the original developers is very huge, and the enthusiasm of the original developers is seriously attacked. The Android security technology commonly used in China at present increases the code reading difficulty after decompilation by obfuscating source codes, but is difficult to play a role in preventing piracy in the domestic application market only by obfuscating codes.
At present, piracy mainly adopts the following modes:
for the application of advertisement authentication information in android manifest.xml files, a pirate can directly modify a plaintext to tamper advertisement authentication after decompiling and applying, and the application of the method is most unsafe and the piracy difficulty is extremely low;
for the condition that the advertisement authentication information is in the JAVA code, after class.dex files in an Android installation package (APK) installation file in the terminal application are decompiled through an assembler Smali, the authentication ID can be found and tampered by reading the pseudo code, and the threshold of the method is relatively higher. But can also be hacked.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for protecting a terminal application, which can effectively prevent the terminal application from being tampered, and reduce malicious advertisement embedding.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a protection method of terminal application, which comprises the following steps:
encrypting application attributes of the terminal application;
realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
and when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main logic of the terminal application when the verification is passed.
In the above solution, the application attribute includes an application package name,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
In the foregoing scheme, the decrypting the encrypted application attribute and verifying the decrypted application attribute includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
In the above scheme, the application attribute comprises a combination of an application package name and a digital signature,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name and a digital signature of terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute.
In the foregoing scheme, the decrypting the encrypted application attribute and verifying the decrypted application attribute includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
In the above scheme, the method further comprises: and returning abnormal information when the decrypted application attribute is not verified.
The invention also provides a protection device for terminal application, which comprises: the system comprises an encryption module, an editing and packaging module, a first calling module, a decryption module, a verification module and a second calling module; wherein,
the encryption module is used for encrypting the application attribute of the terminal application;
the editing and packaging module is used for realizing the main logic of the terminal application by using a programming language and packaging a decryption algorithm;
the first calling module is used for calling the encrypted application attribute and sending the encrypted application attribute to the decryption module when receiving an instruction for starting the main body logic of the terminal application;
the decryption module is used for decrypting the encrypted application attribute sent by the first calling module;
the verification module is used for verifying the decrypted application attribute and triggering the second calling module when the verification is passed;
and the second calling module is used for calling the terminal application main body logic.
In the above solution, the application attribute includes an application package name,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name of the terminal application and sending the application package name to the encryption module;
and the encryption module is used for encrypting the application packet name sent by the acquisition module into a byte array format from a character string format through an encryption algorithm.
In the above scheme, the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send an application package name in the string format to the verification module;
the verification module is further used for comparing the application package name in the character string format with the application package name of the terminal application stored in advance, and triggering a second calling module to call the main logic of the terminal application when the comparison is successful.
In the above scheme, the application attribute comprises a combination of an application package name and a digital signature,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name and the digital signature of the terminal application and sending the application package name and the digital signature to the encryption module;
the encryption module is further configured to combine the application package name and the digital signature sent by the acquisition module, and encrypt the application package name and digital signature combination from a character string format to a byte array format through an encryption algorithm.
In the above scheme, the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name and the digital signature in the string format to the verification module;
the verification module is further used for comparing the application package name and the digital signature in the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and triggering a second calling module when the comparison is successful.
In the above scheme, the verification module is further configured to return abnormal information when the decrypted application attribute fails to be verified.
The protection method and the device of the terminal application provided by the invention encrypt the application attribute of the terminal application; realizing the main body logic of the terminal application by using a logic layer programming language, and packaging a decryption algorithm; when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main body logic of the terminal application when the verification is passed, so that the application package name of the terminal application is taken as a protection target, and if a pirate tampers the terminal application, the terminal application cannot normally run if the application package name is modified; if the application package name is not modified, the application package name can be rejected by a corresponding auditing department when applied for market release, so that the terminal application can be effectively prevented from being tampered, and malicious advertisement embedding is reduced.
Drawings
Fig. 1 is a schematic flowchart of an embodiment of a protection method for a terminal application according to the present invention;
fig. 2 is a schematic structural diagram of a protection device for terminal application according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 is a schematic flowchart of an embodiment of a method for protecting a terminal application according to the present invention, as shown in fig. 1, including the following steps:
step 101: encrypting application attributes of the terminal application;
here, the application attribute of the terminal application is encrypted at a presentation layer, the presentation layer is a decompiled layer, and the presentation layer may be a JAVA layer in the present invention;
wherein the application attribute comprises an application package name or comprises an application package name and a digital signature combination.
The application attribute of the encryption terminal application specifically includes:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
Or, the application attribute of the encrypted terminal application specifically includes:
the method comprises the steps of obtaining an application package name and a digital signature of the terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute, so that the safety of the terminal application can be improved.
The method for combining the application package name and the digital signature is a permutation and combination of the application package name and the digital signature in a character string format, and includes but is not limited to the application package name + the digital signature;
wherein, the encrypted object includes but is not limited to the above application package name, or the combination of the application package name and the digital signature; other application attributes which can be used for identifying the terminal application can be encrypted, but the application package name is generally used as the application attribute for identifying the terminal application at present;
wherein, the Application package name and the digital signature can be obtained through an Application Programming Interface (API);
wherein the encryption algorithm includes, but is not limited to, the following encryption algorithms: packet Encryption Algorithm (TEA), Data Encryption Standard (DES) Algorithm, Triple Data Encryption Algorithm (3 DES), International Data Encryption Algorithm (IDEA), and other Encryption algorithms.
Step 102: realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
here, the logic layer uses logic programming language to realize the main logic of terminal application, and packages the decryption algorithm; the logic layer is a non-decompilable layer, and can be a C/C + + layer in the invention.
Here, the decryption algorithm of the encryption algorithm may be packaged in a file where a plurality of terminal application main body logics are located, so as to increase the difficulty of cracking;
the method for arranging and combining the application package name and the digital signature combination is also packaged in a file where the main logic of the terminal application is located;
wherein the terminal application body logic includes but is not limited to state machine logic in a game application, messaging logic in a WeChat application, and WEB page access logic in a Web (WEB) application;
specifically, a logic layer writes a main body logic of a terminal application through a Native Development Kit (NDK) in a C/C + + language to generate more than one dynamic link library (so) file, and encapsulates a decryption algorithm of an encryption algorithm in one dynamic link library file, or encapsulates the decryption algorithm in a plurality of dynamic link library files in a split manner, and stores the dynamic link library files in the logic layer.
Step 103: when an instruction for starting the terminal application is received, calling the encrypted application attribute;
specifically, when an instruction for starting the terminal application is received, the application attribute encrypted in the presentation layer is called to the logic layer;
the encrypted application attribute in the byte array format can be called to the logic layer by a JAVA Native Interface (JNI) method.
Step 104 to step 105: decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the terminal application main body logic when the verification is passed;
the decrypting the encrypted application attribute and verifying the decrypted application attribute specifically includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
Or, the decrypting the encrypted application attribute and verifying the decrypted application attribute specifically includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
Specifically, the encrypted application attribute may be decrypted by a byte array format into an application package name and digital signature combination in a string format through an encapsulated decryption algorithm, and the application package name and digital signature combination is restored to the application package name and digital signature by an encapsulated permutation and combination method.
The steps further include: and returning abnormal information when the decrypted application attribute is not verified.
Based on the above method, the present invention further provides an embodiment of a protection device for terminal application, and as shown in fig. 2, the protection device includes: the system comprises an encryption module 21, an editing and packaging module 22, a first calling module 23, a decryption module 24, a verification module 25 and a second calling module 26; wherein,
the encryption module 21 is configured to encrypt an application attribute of the terminal application;
the editing and packaging module 22 is configured to implement a terminal application main body logic by using a programming language, and package a decryption algorithm;
the first calling module 23 is configured to, when receiving an instruction to start the terminal application main body logic, call the encrypted application attribute, and send the encrypted application attribute to the decryption module 24;
the decryption module 24 is configured to decrypt the encrypted application attribute sent by the first calling module 23;
the verification module 25 is configured to verify the decrypted application attribute, and when the verification passes, trigger the second calling module 26;
the second calling module 26 is configured to call the terminal application main body logic.
The application attribute comprises an application package name or comprises an application package name and a digital signature combination.
The device further comprises an obtaining module 27, configured to obtain an application package name of the terminal application, and send the application package name to the encryption module 21;
the encryption module 21 is configured to encrypt the application package name sent by the obtaining module 27 from a character string format to a byte array format through an encryption algorithm, and use the application package name in the byte array format as an encrypted application attribute.
The decryption module 24 is further configured to decrypt the encrypted application attribute from a byte array format to a character string format through a decryption algorithm, and send the application packet name in the character string format to the verification module 25;
the checking module 25 is further configured to compare the application package name in the string format with an application package name of a terminal application stored in advance, and trigger the second calling module 26 to call the terminal application main body logic when the comparison is successful.
The obtaining module 27 is further configured to obtain an application package name and a digital signature of the terminal application, and send the application package name and the digital signature to the encryption module 21;
the encryption module 21 is further configured to combine the application package name and the digital signature sent by the obtaining module, encrypt the application package name and the digital signature combination from a character string format to a byte array format through an encryption algorithm, and use the application package name and the digital signature combination in the byte array format as an encrypted application attribute.
The decryption module 24 is further configured to decrypt the encrypted application attribute from a byte array format to a character string format through a decryption algorithm, and send the application package name and the digital signature in the character string format to the verification module 25;
the verification module 25 is further configured to compare the application package name and the digital signature in the string format with the application package name and the digital signature of the terminal application stored in advance, respectively, and trigger the second call module 26 when the comparison is successful.
The verification module 25 is further configured to return abnormal information when the decrypted application attribute fails to be verified.
The protection method of the terminal application in the embodiment of the invention can be stored in a computer readable storage medium if the protection method is realized in the form of a software functional module and is sold or used as an independent product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
Correspondingly, the embodiment of the invention also provides a computer storage medium, wherein a computer program is stored in the computer storage medium, and the computer program is used for executing the protection method of the terminal application of the embodiment of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.
Claims (12)
1. A method for protecting a terminal application, the method comprising:
encrypting application attributes of the terminal application;
realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
and when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main logic of the terminal application when the verification is passed.
2. The protection method according to claim 1, wherein the application attribute includes an application package name,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
3. The protection method according to claim 2, wherein the decrypting the encrypted application attribute and verifying the decrypted application attribute comprises:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
4. The protection method according to claim 1, wherein the application attribute comprises an application package name and digital signature combination,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name and a digital signature of terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute.
5. The protection method according to claim 4, wherein the decrypting the encrypted application attribute and verifying the decrypted application attribute comprises:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
6. The protection method according to any one of claims 1 to 5, characterized in that the method further comprises:
and returning abnormal information when the decrypted application attribute is not verified.
7. An apparatus for protecting an end application, the apparatus comprising: the system comprises an encryption module, an editing and packaging module, a first calling module, a decryption module, a verification module and a second calling module; wherein,
the encryption module is used for encrypting the application attribute of the terminal application;
the editing and packaging module is used for realizing the main logic of the terminal application by using a programming language and packaging a decryption algorithm;
the first calling module is used for calling the encrypted application attribute and sending the encrypted application attribute to the decryption module when receiving an instruction for starting the main body logic of the terminal application;
the decryption module is used for decrypting the encrypted application attribute sent by the first calling module;
the verification module is used for verifying the decrypted application attribute and triggering the second calling module when the verification is passed;
and the second calling module is used for calling the terminal application main body logic.
8. The protection device of claim 7, wherein the application attribute comprises an application package name,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name of the terminal application and sending the application package name to the encryption module;
and the encryption module is used for encrypting the application packet name sent by the acquisition module into a byte array format from a character string format through an encryption algorithm.
9. The protection device according to claim 8, wherein the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name in the string format to the verification module;
the verification module is further used for comparing the application package name in the character string format with the application package name of the terminal application stored in advance, and triggering a second calling module to call the main logic of the terminal application when the comparison is successful.
10. The protection device of claim 7, wherein the application attributes comprise an application package name and digital signature combination,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name and the digital signature of the terminal application and sending the application package name and the digital signature to the encryption module;
the encryption module is further configured to combine the application package name and the digital signature sent by the acquisition module, and encrypt the application package name and digital signature combination from a character string format to a byte array format through an encryption algorithm.
11. The protection device according to claim 10, wherein the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name and the digital signature in the string format to the verification module;
the verification module is further used for comparing the application package name and the digital signature in the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and triggering a second calling module when the comparison is successful.
12. The protection device according to any one of claims 7 to 11, wherein the verification module is further configured to return exception information when the decrypted application attribute fails to be verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310282680.6A CN104281788B (en) | 2013-07-05 | A kind of guard method of terminal applies and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310282680.6A CN104281788B (en) | 2013-07-05 | A kind of guard method of terminal applies and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104281788A true CN104281788A (en) | 2015-01-14 |
CN104281788B CN104281788B (en) | 2019-07-16 |
Family
ID=
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105354050A (en) * | 2015-09-30 | 2016-02-24 | 深圳市九洲电器有限公司 | Application software calling method for intelligent terminal |
CN105844150A (en) * | 2016-03-23 | 2016-08-10 | 青岛海信传媒网络技术有限公司 | Application program data protection method and device |
CN106022098A (en) * | 2016-05-10 | 2016-10-12 | 青岛海信传媒网络技术有限公司 | Signature verification method and device for application |
WO2017036048A1 (en) * | 2015-08-31 | 2017-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system updating method and system |
CN107992723A (en) * | 2017-11-29 | 2018-05-04 | 南京莱斯信息技术股份有限公司 | A kind of Java protection of source codes methods based on dynamic link library |
CN108683502A (en) * | 2018-03-30 | 2018-10-19 | 上海连尚网络科技有限公司 | A kind of digital signature authentication method, medium and equipment |
CN109902500A (en) * | 2019-03-11 | 2019-06-18 | 北京城市网邻信息技术有限公司 | A kind of method and system for realizing calling service data safety by chained library |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101571899A (en) * | 2009-06-04 | 2009-11-04 | 北京握奇数据系统有限公司 | Smart device software anti-theft version method and device |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101571899A (en) * | 2009-06-04 | 2009-11-04 | 北京握奇数据系统有限公司 | Smart device software anti-theft version method and device |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102779257A (en) * | 2012-06-28 | 2012-11-14 | 奇智软件(北京)有限公司 | Security detection method and system of Android application program |
Non-Patent Citations (1)
Title |
---|
房鑫鑫: "Android恶意软件实现及检测研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017036048A1 (en) * | 2015-08-31 | 2017-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system updating method and system |
CN105354050A (en) * | 2015-09-30 | 2016-02-24 | 深圳市九洲电器有限公司 | Application software calling method for intelligent terminal |
CN105354050B (en) * | 2015-09-30 | 2019-05-17 | 深圳市九洲电器有限公司 | A kind of application software call method of intelligent terminal |
CN105844150A (en) * | 2016-03-23 | 2016-08-10 | 青岛海信传媒网络技术有限公司 | Application program data protection method and device |
CN106022098A (en) * | 2016-05-10 | 2016-10-12 | 青岛海信传媒网络技术有限公司 | Signature verification method and device for application |
CN107992723A (en) * | 2017-11-29 | 2018-05-04 | 南京莱斯信息技术股份有限公司 | A kind of Java protection of source codes methods based on dynamic link library |
CN108683502A (en) * | 2018-03-30 | 2018-10-19 | 上海连尚网络科技有限公司 | A kind of digital signature authentication method, medium and equipment |
CN109902500A (en) * | 2019-03-11 | 2019-06-18 | 北京城市网邻信息技术有限公司 | A kind of method and system for realizing calling service data safety by chained library |
CN109902500B (en) * | 2019-03-11 | 2021-02-26 | 北京城市网邻信息技术有限公司 | Method and system for realizing service call data security through link library |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111709038B (en) | File encryption and decryption method, distributed storage system, device and storage medium | |
CN102087605B (en) | Android-based platform application installation control method and system | |
US20210294879A1 (en) | Securing executable code integrity using auto-derivative key | |
KR101471589B1 (en) | Method for Providing Security for Common Intermediate Language Program | |
KR101350390B1 (en) | A apparatus for code obfuscation and method thereof | |
CN104318135B (en) | A kind of Java code Safety actuality loading method based on credible performing environment | |
US8381307B2 (en) | Method for protecting a converted applet (CAP) file including encrypting the CAP file | |
KR100946042B1 (en) | Method and system for running tamper-resident applications and computer readable storage media | |
US20130151861A1 (en) | System and method to protect computer software from unauthorized use | |
CN107169324A (en) | A kind of Android application reinforcement means based on dynamic encryption and decryption | |
CN106650330A (en) | Android application software reinforcement protection method based on DexClassloader | |
CN102576391A (en) | Software license embedded in shell code | |
CN107092816B (en) | An Android application reinforcement method | |
US20150095653A1 (en) | Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package | |
Piao et al. | Server‐based code obfuscation scheme for APK tamper detection | |
KR101436536B1 (en) | File server, file transfer method thereof and file tamperproof system | |
CN101814124A (en) | Java-based method for enhancing software security | |
WO2016019790A1 (en) | Verification method, client, server and system for installation package | |
CN108133147A (en) | Guard method, equipment and the readable storage medium storing program for executing of executable code | |
CN102609284A (en) | Method for safely loading executable file | |
KR20130020861A (en) | Software modulation prevention method using own encryption | |
Rajba et al. | Data hiding using code obfuscation | |
KR101749209B1 (en) | Method and apparatus for hiding information of application, and method and apparatus for executing application | |
CN108923910B (en) | Mobile application APK tamper-proofing method | |
CN107257282A (en) | A kind of full bag encryption method of code based on RC4 algorithms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |