CN104281788A - Terminal application protecting method and device - Google Patents

Terminal application protecting method and device Download PDF

Info

Publication number
CN104281788A
CN104281788A CN201310282680.6A CN201310282680A CN104281788A CN 104281788 A CN104281788 A CN 104281788A CN 201310282680 A CN201310282680 A CN 201310282680A CN 104281788 A CN104281788 A CN 104281788A
Authority
CN
China
Prior art keywords
application
module
package name
attribute
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310282680.6A
Other languages
Chinese (zh)
Other versions
CN104281788B (en
Inventor
李峰
胥彪
喻帅
林野
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310282680.6A priority Critical patent/CN104281788B/en
Priority claimed from CN201310282680.6A external-priority patent/CN104281788B/en
Publication of CN104281788A publication Critical patent/CN104281788A/en
Application granted granted Critical
Publication of CN104281788B publication Critical patent/CN104281788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a terminal application protecting method. The method comprises the steps that the application attributes of a terminal application are encrypted; the main logic of the terminal application is achieved through a programming language, and a decryption algorithm is packaged; when an instruction for starting the terminal application is received, the encrypted application attributes are called, the encrypted application attributes are decrypted, the decrypted application attributes are checked, and after the application attributes pass the check, the main logic of the terminal application is called. The invention further discloses a terminal application protecting device. According to the scheme, the terminal application can be effectively prevented from being tampered, and malicious advertisement embedment is reduced.

Description

Protection method and device for terminal application
Technical Field
The invention relates to a terminal application protection technology, in particular to a method and a device for protecting a terminal application based on an open code platform.
Background
The application safety of the Android platform is widely suffered from the problems, due to the unsound auditing mechanism of the domestic Android application market and the decompilation characteristic of JAVA language, many domestic developers can modify the package name and the advertisement authentication information of the original terminal application by maliciously cracking and decompilating the original application, repackaging the terminal application and releasing the terminal application for illegal profit, the benefit damage to the original developers is very huge, and the enthusiasm of the original developers is seriously attacked. The Android security technology commonly used in China at present increases the code reading difficulty after decompilation by obfuscating source codes, but is difficult to play a role in preventing piracy in the domestic application market only by obfuscating codes.
At present, piracy mainly adopts the following modes:
for the application of advertisement authentication information in android manifest.xml files, a pirate can directly modify a plaintext to tamper advertisement authentication after decompiling and applying, and the application of the method is most unsafe and the piracy difficulty is extremely low;
for the condition that the advertisement authentication information is in the JAVA code, after class.dex files in an Android installation package (APK) installation file in the terminal application are decompiled through an assembler Smali, the authentication ID can be found and tampered by reading the pseudo code, and the threshold of the method is relatively higher. But can also be hacked.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for protecting a terminal application, which can effectively prevent the terminal application from being tampered, and reduce malicious advertisement embedding.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a protection method of terminal application, which comprises the following steps:
encrypting application attributes of the terminal application;
realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
and when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main logic of the terminal application when the verification is passed.
In the above solution, the application attribute includes an application package name,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
In the foregoing scheme, the decrypting the encrypted application attribute and verifying the decrypted application attribute includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
In the above scheme, the application attribute comprises a combination of an application package name and a digital signature,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name and a digital signature of terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute.
In the foregoing scheme, the decrypting the encrypted application attribute and verifying the decrypted application attribute includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
In the above scheme, the method further comprises: and returning abnormal information when the decrypted application attribute is not verified.
The invention also provides a protection device for terminal application, which comprises: the system comprises an encryption module, an editing and packaging module, a first calling module, a decryption module, a verification module and a second calling module; wherein,
the encryption module is used for encrypting the application attribute of the terminal application;
the editing and packaging module is used for realizing the main logic of the terminal application by using a programming language and packaging a decryption algorithm;
the first calling module is used for calling the encrypted application attribute and sending the encrypted application attribute to the decryption module when receiving an instruction for starting the main body logic of the terminal application;
the decryption module is used for decrypting the encrypted application attribute sent by the first calling module;
the verification module is used for verifying the decrypted application attribute and triggering the second calling module when the verification is passed;
and the second calling module is used for calling the terminal application main body logic.
In the above solution, the application attribute includes an application package name,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name of the terminal application and sending the application package name to the encryption module;
and the encryption module is used for encrypting the application packet name sent by the acquisition module into a byte array format from a character string format through an encryption algorithm.
In the above scheme, the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send an application package name in the string format to the verification module;
the verification module is further used for comparing the application package name in the character string format with the application package name of the terminal application stored in advance, and triggering a second calling module to call the main logic of the terminal application when the comparison is successful.
In the above scheme, the application attribute comprises a combination of an application package name and a digital signature,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name and the digital signature of the terminal application and sending the application package name and the digital signature to the encryption module;
the encryption module is further configured to combine the application package name and the digital signature sent by the acquisition module, and encrypt the application package name and digital signature combination from a character string format to a byte array format through an encryption algorithm.
In the above scheme, the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name and the digital signature in the string format to the verification module;
the verification module is further used for comparing the application package name and the digital signature in the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and triggering a second calling module when the comparison is successful.
In the above scheme, the verification module is further configured to return abnormal information when the decrypted application attribute fails to be verified.
The protection method and the device of the terminal application provided by the invention encrypt the application attribute of the terminal application; realizing the main body logic of the terminal application by using a logic layer programming language, and packaging a decryption algorithm; when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main body logic of the terminal application when the verification is passed, so that the application package name of the terminal application is taken as a protection target, and if a pirate tampers the terminal application, the terminal application cannot normally run if the application package name is modified; if the application package name is not modified, the application package name can be rejected by a corresponding auditing department when applied for market release, so that the terminal application can be effectively prevented from being tampered, and malicious advertisement embedding is reduced.
Drawings
Fig. 1 is a schematic flowchart of an embodiment of a protection method for a terminal application according to the present invention;
fig. 2 is a schematic structural diagram of a protection device for terminal application according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 is a schematic flowchart of an embodiment of a method for protecting a terminal application according to the present invention, as shown in fig. 1, including the following steps:
step 101: encrypting application attributes of the terminal application;
here, the application attribute of the terminal application is encrypted at a presentation layer, the presentation layer is a decompiled layer, and the presentation layer may be a JAVA layer in the present invention;
wherein the application attribute comprises an application package name or comprises an application package name and a digital signature combination.
The application attribute of the encryption terminal application specifically includes:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
Or, the application attribute of the encrypted terminal application specifically includes:
the method comprises the steps of obtaining an application package name and a digital signature of the terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute, so that the safety of the terminal application can be improved.
The method for combining the application package name and the digital signature is a permutation and combination of the application package name and the digital signature in a character string format, and includes but is not limited to the application package name + the digital signature;
wherein, the encrypted object includes but is not limited to the above application package name, or the combination of the application package name and the digital signature; other application attributes which can be used for identifying the terminal application can be encrypted, but the application package name is generally used as the application attribute for identifying the terminal application at present;
wherein, the Application package name and the digital signature can be obtained through an Application Programming Interface (API);
wherein the encryption algorithm includes, but is not limited to, the following encryption algorithms: packet Encryption Algorithm (TEA), Data Encryption Standard (DES) Algorithm, Triple Data Encryption Algorithm (3 DES), International Data Encryption Algorithm (IDEA), and other Encryption algorithms.
Step 102: realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
here, the logic layer uses logic programming language to realize the main logic of terminal application, and packages the decryption algorithm; the logic layer is a non-decompilable layer, and can be a C/C + + layer in the invention.
Here, the decryption algorithm of the encryption algorithm may be packaged in a file where a plurality of terminal application main body logics are located, so as to increase the difficulty of cracking;
the method for arranging and combining the application package name and the digital signature combination is also packaged in a file where the main logic of the terminal application is located;
wherein the terminal application body logic includes but is not limited to state machine logic in a game application, messaging logic in a WeChat application, and WEB page access logic in a Web (WEB) application;
specifically, a logic layer writes a main body logic of a terminal application through a Native Development Kit (NDK) in a C/C + + language to generate more than one dynamic link library (so) file, and encapsulates a decryption algorithm of an encryption algorithm in one dynamic link library file, or encapsulates the decryption algorithm in a plurality of dynamic link library files in a split manner, and stores the dynamic link library files in the logic layer.
Step 103: when an instruction for starting the terminal application is received, calling the encrypted application attribute;
specifically, when an instruction for starting the terminal application is received, the application attribute encrypted in the presentation layer is called to the logic layer;
the encrypted application attribute in the byte array format can be called to the logic layer by a JAVA Native Interface (JNI) method.
Step 104 to step 105: decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the terminal application main body logic when the verification is passed;
the decrypting the encrypted application attribute and verifying the decrypted application attribute specifically includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
Or, the decrypting the encrypted application attribute and verifying the decrypted application attribute specifically includes:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
Specifically, the encrypted application attribute may be decrypted by a byte array format into an application package name and digital signature combination in a string format through an encapsulated decryption algorithm, and the application package name and digital signature combination is restored to the application package name and digital signature by an encapsulated permutation and combination method.
The steps further include: and returning abnormal information when the decrypted application attribute is not verified.
Based on the above method, the present invention further provides an embodiment of a protection device for terminal application, and as shown in fig. 2, the protection device includes: the system comprises an encryption module 21, an editing and packaging module 22, a first calling module 23, a decryption module 24, a verification module 25 and a second calling module 26; wherein,
the encryption module 21 is configured to encrypt an application attribute of the terminal application;
the editing and packaging module 22 is configured to implement a terminal application main body logic by using a programming language, and package a decryption algorithm;
the first calling module 23 is configured to, when receiving an instruction to start the terminal application main body logic, call the encrypted application attribute, and send the encrypted application attribute to the decryption module 24;
the decryption module 24 is configured to decrypt the encrypted application attribute sent by the first calling module 23;
the verification module 25 is configured to verify the decrypted application attribute, and when the verification passes, trigger the second calling module 26;
the second calling module 26 is configured to call the terminal application main body logic.
The application attribute comprises an application package name or comprises an application package name and a digital signature combination.
The device further comprises an obtaining module 27, configured to obtain an application package name of the terminal application, and send the application package name to the encryption module 21;
the encryption module 21 is configured to encrypt the application package name sent by the obtaining module 27 from a character string format to a byte array format through an encryption algorithm, and use the application package name in the byte array format as an encrypted application attribute.
The decryption module 24 is further configured to decrypt the encrypted application attribute from a byte array format to a character string format through a decryption algorithm, and send the application packet name in the character string format to the verification module 25;
the checking module 25 is further configured to compare the application package name in the string format with an application package name of a terminal application stored in advance, and trigger the second calling module 26 to call the terminal application main body logic when the comparison is successful.
The obtaining module 27 is further configured to obtain an application package name and a digital signature of the terminal application, and send the application package name and the digital signature to the encryption module 21;
the encryption module 21 is further configured to combine the application package name and the digital signature sent by the obtaining module, encrypt the application package name and the digital signature combination from a character string format to a byte array format through an encryption algorithm, and use the application package name and the digital signature combination in the byte array format as an encrypted application attribute.
The decryption module 24 is further configured to decrypt the encrypted application attribute from a byte array format to a character string format through a decryption algorithm, and send the application package name and the digital signature in the character string format to the verification module 25;
the verification module 25 is further configured to compare the application package name and the digital signature in the string format with the application package name and the digital signature of the terminal application stored in advance, respectively, and trigger the second call module 26 when the comparison is successful.
The verification module 25 is further configured to return abnormal information when the decrypted application attribute fails to be verified.
The protection method of the terminal application in the embodiment of the invention can be stored in a computer readable storage medium if the protection method is realized in the form of a software functional module and is sold or used as an independent product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
Correspondingly, the embodiment of the invention also provides a computer storage medium, wherein a computer program is stored in the computer storage medium, and the computer program is used for executing the protection method of the terminal application of the embodiment of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, and improvement made within the spirit and scope of the present invention are included in the protection scope of the present invention.

Claims (12)

1. A method for protecting a terminal application, the method comprising:
encrypting application attributes of the terminal application;
realizing the main logic of the terminal application by using a programming language, and packaging a decryption algorithm;
and when an instruction for starting the terminal application is received, calling the encrypted application attribute, decrypting the encrypted application attribute, verifying the decrypted application attribute, and calling the main logic of the terminal application when the verification is passed.
2. The protection method according to claim 1, wherein the application attribute includes an application package name,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name of terminal application, encrypting the application package name into a byte array format from a character string format through an encryption algorithm, and taking the application package name in the byte array format as an encrypted application attribute.
3. The protection method according to claim 2, wherein the decrypting the encrypted application attribute and verifying the decrypted application attribute comprises:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application packet name of the character string format with the application packet name of the terminal application stored in advance, and if the comparison is successful, checking to pass.
4. The protection method according to claim 1, wherein the application attribute comprises an application package name and digital signature combination,
the application attribute of the encryption terminal application comprises:
the method comprises the steps of obtaining an application package name and a digital signature of terminal application, combining the application package name and the digital signature, encrypting the combination of the application package name and the digital signature into a byte array format from a character string format through an encryption algorithm, and using the combination of the application package name and the digital signature in the byte array format as an encrypted application attribute.
5. The protection method according to claim 4, wherein the decrypting the encrypted application attribute and verifying the decrypted application attribute comprises:
and decrypting the encrypted application attribute into a character string format from a byte array format through a decryption algorithm, comparing the application package name and the digital signature of the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and if the comparison is successful, checking to pass.
6. The protection method according to any one of claims 1 to 5, characterized in that the method further comprises:
and returning abnormal information when the decrypted application attribute is not verified.
7. An apparatus for protecting an end application, the apparatus comprising: the system comprises an encryption module, an editing and packaging module, a first calling module, a decryption module, a verification module and a second calling module; wherein,
the encryption module is used for encrypting the application attribute of the terminal application;
the editing and packaging module is used for realizing the main logic of the terminal application by using a programming language and packaging a decryption algorithm;
the first calling module is used for calling the encrypted application attribute and sending the encrypted application attribute to the decryption module when receiving an instruction for starting the main body logic of the terminal application;
the decryption module is used for decrypting the encrypted application attribute sent by the first calling module;
the verification module is used for verifying the decrypted application attribute and triggering the second calling module when the verification is passed;
and the second calling module is used for calling the terminal application main body logic.
8. The protection device of claim 7, wherein the application attribute comprises an application package name,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name of the terminal application and sending the application package name to the encryption module;
and the encryption module is used for encrypting the application packet name sent by the acquisition module into a byte array format from a character string format through an encryption algorithm.
9. The protection device according to claim 8, wherein the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name in the string format to the verification module;
the verification module is further used for comparing the application package name in the character string format with the application package name of the terminal application stored in advance, and triggering a second calling module to call the main logic of the terminal application when the comparison is successful.
10. The protection device of claim 7, wherein the application attributes comprise an application package name and digital signature combination,
the device also comprises an acquisition module, a data processing module and an encryption module, wherein the acquisition module is used for acquiring the application package name and the digital signature of the terminal application and sending the application package name and the digital signature to the encryption module;
the encryption module is further configured to combine the application package name and the digital signature sent by the acquisition module, and encrypt the application package name and digital signature combination from a character string format to a byte array format through an encryption algorithm.
11. The protection device according to claim 10, wherein the decryption module is further configured to decrypt the encrypted application attribute from a byte array format to a string format through a decryption algorithm, and send the application package name and the digital signature in the string format to the verification module;
the verification module is further used for comparing the application package name and the digital signature in the character string format with the application package name and the digital signature of the terminal application stored in advance respectively, and triggering a second calling module when the comparison is successful.
12. The protection device according to any one of claims 7 to 11, wherein the verification module is further configured to return exception information when the decrypted application attribute fails to be verified.
CN201310282680.6A 2013-07-05 A kind of guard method of terminal applies and device Active CN104281788B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310282680.6A CN104281788B (en) 2013-07-05 A kind of guard method of terminal applies and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310282680.6A CN104281788B (en) 2013-07-05 A kind of guard method of terminal applies and device

Publications (2)

Publication Number Publication Date
CN104281788A true CN104281788A (en) 2015-01-14
CN104281788B CN104281788B (en) 2019-07-16

Family

ID=

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105354050A (en) * 2015-09-30 2016-02-24 深圳市九洲电器有限公司 Application software calling method for intelligent terminal
CN105844150A (en) * 2016-03-23 2016-08-10 青岛海信传媒网络技术有限公司 Application program data protection method and device
CN106022098A (en) * 2016-05-10 2016-10-12 青岛海信传媒网络技术有限公司 Signature verification method and device for application
WO2017036048A1 (en) * 2015-08-31 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Terminal system updating method and system
CN107992723A (en) * 2017-11-29 2018-05-04 南京莱斯信息技术股份有限公司 A kind of Java protection of source codes methods based on dynamic link library
CN108683502A (en) * 2018-03-30 2018-10-19 上海连尚网络科技有限公司 A kind of digital signature authentication method, medium and equipment
CN109902500A (en) * 2019-03-11 2019-06-18 北京城市网邻信息技术有限公司 A kind of method and system for realizing calling service data safety by chained library

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571899A (en) * 2009-06-04 2009-11-04 北京握奇数据系统有限公司 Smart device software anti-theft version method and device
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571899A (en) * 2009-06-04 2009-11-04 北京握奇数据系统有限公司 Smart device software anti-theft version method and device
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
房鑫鑫: "Android恶意软件实现及检测研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017036048A1 (en) * 2015-08-31 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Terminal system updating method and system
CN105354050A (en) * 2015-09-30 2016-02-24 深圳市九洲电器有限公司 Application software calling method for intelligent terminal
CN105354050B (en) * 2015-09-30 2019-05-17 深圳市九洲电器有限公司 A kind of application software call method of intelligent terminal
CN105844150A (en) * 2016-03-23 2016-08-10 青岛海信传媒网络技术有限公司 Application program data protection method and device
CN106022098A (en) * 2016-05-10 2016-10-12 青岛海信传媒网络技术有限公司 Signature verification method and device for application
CN107992723A (en) * 2017-11-29 2018-05-04 南京莱斯信息技术股份有限公司 A kind of Java protection of source codes methods based on dynamic link library
CN108683502A (en) * 2018-03-30 2018-10-19 上海连尚网络科技有限公司 A kind of digital signature authentication method, medium and equipment
CN109902500A (en) * 2019-03-11 2019-06-18 北京城市网邻信息技术有限公司 A kind of method and system for realizing calling service data safety by chained library
CN109902500B (en) * 2019-03-11 2021-02-26 北京城市网邻信息技术有限公司 Method and system for realizing service call data security through link library

Similar Documents

Publication Publication Date Title
CN111709038B (en) File encryption and decryption method, distributed storage system, device and storage medium
CN102087605B (en) Android-based platform application installation control method and system
US20210294879A1 (en) Securing executable code integrity using auto-derivative key
KR101471589B1 (en) Method for Providing Security for Common Intermediate Language Program
KR101350390B1 (en) A apparatus for code obfuscation and method thereof
CN104318135B (en) A kind of Java code Safety actuality loading method based on credible performing environment
US8381307B2 (en) Method for protecting a converted applet (CAP) file including encrypting the CAP file
KR100946042B1 (en) Method and system for running tamper-resident applications and computer readable storage media
US20130151861A1 (en) System and method to protect computer software from unauthorized use
CN107169324A (en) A kind of Android application reinforcement means based on dynamic encryption and decryption
CN106650330A (en) Android application software reinforcement protection method based on DexClassloader
CN102576391A (en) Software license embedded in shell code
CN107092816B (en) An Android application reinforcement method
US20150095653A1 (en) Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package
Piao et al. Server‐based code obfuscation scheme for APK tamper detection
KR101436536B1 (en) File server, file transfer method thereof and file tamperproof system
CN101814124A (en) Java-based method for enhancing software security
WO2016019790A1 (en) Verification method, client, server and system for installation package
CN108133147A (en) Guard method, equipment and the readable storage medium storing program for executing of executable code
CN102609284A (en) Method for safely loading executable file
KR20130020861A (en) Software modulation prevention method using own encryption
Rajba et al. Data hiding using code obfuscation
KR101749209B1 (en) Method and apparatus for hiding information of application, and method and apparatus for executing application
CN108923910B (en) Mobile application APK tamper-proofing method
CN107257282A (en) A kind of full bag encryption method of code based on RC4 algorithms

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant