CN104298915A - Installation package tampering preventing method - Google Patents

Installation package tampering preventing method Download PDF

Info

Publication number
CN104298915A
CN104298915A CN201410548501.3A CN201410548501A CN104298915A CN 104298915 A CN104298915 A CN 104298915A CN 201410548501 A CN201410548501 A CN 201410548501A CN 104298915 A CN104298915 A CN 104298915A
Authority
CN
China
Prior art keywords
encryption
signature
application program
digital signature
installation kit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410548501.3A
Other languages
Chinese (zh)
Inventor
张伟
傅松林
胡瑞鑫
曾佳水
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meitu Technology Co Ltd
Original Assignee
Xiamen Meitu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meitu Technology Co Ltd filed Critical Xiamen Meitu Technology Co Ltd
Priority to CN201410548501.3A priority Critical patent/CN104298915A/en
Publication of CN104298915A publication Critical patent/CN104298915A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an installation package tampering preventing method. The method comprises obtaining the digital signatures of developers of an application, performing encryption to obtain original encrypted signatures, and integrating the original encrypted signatures into the application; when the application is started, automatically obtaining the digital signature of the application, performing encryption to obtain an application encrypted signature; comparing the consistency of the original encrypted signatures and the application encrypted signature and prompting a user to perform corresponding treatments. Therefore, the installation package tampering preventing method can automatically achieve detection of installation packages and timely prompt the user, thereby reducing malicious behaviors or security risks brought by malicious software, ensuring system security and reducing damage to the maximum degree.

Description

A kind of method preventing installation kit to be tampered
Technical field
The present invention relates to moving communicating field, particularly a kind of method preventing installation kit to be tampered.
Background technology
Present intelligent terminal is more and more universal, application software also gets more and more, when user needs downloading application software, usual meeting is downloaded in the third party market of intelligent terminal, because the supervision of Android application program is in the market not yet in place, in these third party markets, the security of application program detects and there is leak, the application program of user installation is caused to there is malicious act or security risk, such as: by mountain vallage or the mode malice such as to crack and bundle ad plug-in, or, in the unwitting situation of user, externally transmit the privacy information of client without permission, consume customer flow etc.Therefore need now a kind of method can effectively avoid user installation Malware, the malicious act that minimizing Malware brings or security risk, thus improve the security of system.
Summary of the invention
The present invention, for solving the problem, provides a kind of method that can effectively prevent installation kit to be tampered, thus avoids the flow consuming user, and improves the security of system.
For achieving the above object, the technical solution used in the present invention is:
Prevent the method that installation kit is tampered, it is characterized in that, comprise the following steps:
10. obtain the digital signature of application developer;
The digital signature of described developer is encrypted by 20., obtains original encryption signature;
Described original encryption signature is integrated in this application program by 30.;
The digital signature of this application program of automatic acquisition during 40. startup application program;
The digital signature of described application program is encrypted by 50., obtains program encryption signature;
Whether 60. comparison original encryption signatures sign consistent with program encryption, if inconsistent, then this application program is distorted by third party, and prompting user processes accordingly.
Preferably, obtain the digital signature of application developer in described step 10, after mainly acquisition application developer is registered in development platform, this development platform is provided to the unique signature digital certificate of developer.
Preferably, in described step 20, the digital signature of described developer is encrypted with described step 50 in the digital signature of described application program is encrypted, the encryption method of the two is identical.
Preferably, the encryption of described digital signature, is mainly encrypted the cryptographic hash of digital signature.
Preferably, in described step 60, whether comparison original encryption signature signs consistent with program encryption, and whether the cryptographic hash mainly after both comparisons encryption is identical.
Preferably, user in described step 60, is pointed out to process accordingly, mainly by forbidding that this application program uses all methods relevant to rate.
Preferably, in described step 60, point out user to process accordingly, mainly inform that its application program of installing of user is tampered by third party by ejecting prompting frame, and the download button of correct installation kit is provided.
The invention has the beneficial effects as follows:
A kind of method preventing installation kit to be tampered of the present invention, it is by obtaining the digital signature of application developer, and be encrypted obtain original encryption signature, and described original encryption signature is integrated in this application program, when starting application program, the digital signature of this application program of automatic acquisition, and be encrypted obtain program encryption signature, sign to the consistance that program encryption is signed finally by comparison original encryption and point out user to carry out corresponding process, thus automatically can carry out the detection of installation kit and notify user in time, the malicious act that minimizing Malware brings or security risk, ensure that the security of system, at utmost reduce infringement.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms a part of the present invention, and schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the general flow chart of a kind of method preventing installation kit to be tampered of the present invention.
Embodiment
In order to make technical matters to be solved by this invention, technical scheme and beneficial effect clearly, understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, a kind of method preventing installation kit to be tampered of the present invention, it comprises the following steps:
10. obtain the digital signature of application developer;
The digital signature of described developer is encrypted by 20., obtains original encryption signature;
Described original encryption signature is integrated in this application program by 30.;
The digital signature of this application program of automatic acquisition during 40. startup application program;
The digital signature of described application program is encrypted by 50., obtains program encryption signature;
Whether 60. comparison original encryption signatures sign consistent with program encryption, if inconsistent, then this application program is distorted by third party, and prompting user processes accordingly.
Obtain the digital signature of application developer in described step 10, after mainly acquisition application developer is registered in development platform, this development platform is provided to the unique signature digital certificate of developer, such as, in Android platform number of signature word certificate.
In described step 20, the digital signature of described developer is encrypted with described step 50 in the digital signature of described application program is encrypted, mainly the cryptographic hash of digital signature is encrypted, and the encryption method of the two is identical, and disclosed in this encryption method can be, also can be that developer is self-defining.In addition, the original encryption signature after encryption is integrated in this application program, can facilitate following and program encryption to sign and compare.
In described step 60, whether comparison original encryption signature signs consistent with program encryption, whether the cryptographic hash mainly after both comparisons encryption is identical, if identical, then represent that this application program is that normal installation kit is installed, if have inconsistent, then this application program is distorted by third party.If directly adopted here, the cryptographic hash of digital signature is compared, the person that is not then likely cracked revises, and be adjusted to the two unanimously, thus cause the insecurity of installation kit, therefore the present invention adopts comparison cryptographic hash, make can not be modified cryptographic hash in the transmitting procedure of installation kit between developer to user, really effectively ensure that the security of installation kit.
Further, if not identical, also prompting user processes accordingly further, such as: forbid that this application program uses all methods relevant to rate, comprise network communication, phone, note etc.; Or, inform that its application program of installing of user is tampered by third party by ejecting prompting frame, and the download button of correct installation kit is provided, when user clicks this button, then can start to download correct installation kit, fast very convenient, search correct installation kit voluntarily without the need to user, for user has saved the plenty of time.
A kind of method preventing installation kit to be tampered of the present invention, it utilizes the signature digital certificate authentication of installation kit to judge whether to be tampered, and original encryption signature is just integrated in application program when developing application by advance, and automatically detect this application program when being set in advance in application program launching and whether be tampered, if be tampered, all methods relevant to rate can be prohibitted the use and eject prompting frame prompting user and provide the button downloading correct installation kit to download for user, thus avoid the flow consuming user, reduce infringement.
Above-mentioned explanation illustrate and describes the preferred embodiments of the present invention, be to be understood that the present invention is not limited to the form disclosed by this paper, should not regard the eliminating to other embodiments as, and can be used for other combinations various, amendment and environment, and can in invention contemplated scope herein, changed by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change do not depart from the spirit and scope of the present invention, then all should in the protection domain of claims of the present invention.

Claims (7)

1. the method preventing installation kit to be tampered, is characterized in that, comprises the following steps:
10. obtain the digital signature of application developer;
The digital signature of described developer is encrypted by 20., obtains original encryption signature;
Described original encryption signature is integrated in this application program by 30.;
The digital signature of this application program of automatic acquisition during 40. startup application program;
The digital signature of described application program is encrypted by 50., obtains program encryption signature;
Whether 60. comparison original encryption signatures sign consistent with program encryption, if inconsistent, then this application program is distorted by third party, and prompting user processes accordingly.
2. a kind of method preventing installation kit to be tampered according to claim 1, it is characterized in that: the digital signature obtaining application developer in described step 10, after mainly acquisition application developer is registered in development platform, this development platform is provided to the unique signature digital certificate of developer.
3. a kind of method preventing installation kit to be tampered according to claim 1, it is characterized in that: in described step 20, the digital signature of described developer is encrypted with described step 50 in the digital signature of described application program is encrypted, the encryption method of the two is identical.
4. a kind of method preventing installation kit to be tampered according to claim 3, is characterized in that: the encryption of described digital signature, is mainly encrypted the cryptographic hash of digital signature.
5. a kind of method preventing installation kit to be tampered according to claim 4, is characterized in that: in described step 60, whether comparison original encryption signature signs consistent with program encryption, and whether the cryptographic hash mainly after both comparisons encryption is identical.
6. a kind of method preventing installation kit to be tampered according to claim 1, is characterized in that: point out user to process accordingly in described step 60, mainly by forbidding that this application program uses all methods relevant to rate.
7. a kind of method preventing installation kit to be tampered according to claim 1, it is characterized in that: in described step 60, point out user to process accordingly, mainly inform that its application program of installing of user is tampered by third party by ejecting prompting frame, and the download button of correct installation kit is provided.
CN201410548501.3A 2014-10-16 2014-10-16 Installation package tampering preventing method Pending CN104298915A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410548501.3A CN104298915A (en) 2014-10-16 2014-10-16 Installation package tampering preventing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410548501.3A CN104298915A (en) 2014-10-16 2014-10-16 Installation package tampering preventing method

Publications (1)

Publication Number Publication Date
CN104298915A true CN104298915A (en) 2015-01-21

Family

ID=52318638

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410548501.3A Pending CN104298915A (en) 2014-10-16 2014-10-16 Installation package tampering preventing method

Country Status (1)

Country Link
CN (1) CN104298915A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320545A (en) * 2015-11-27 2016-02-10 北京指掌易科技有限公司 Method and device for supporting application software to inspect certificate of third-party software
CN106230777A (en) * 2016-07-12 2016-12-14 珠海市魅族科技有限公司 A kind of method preventing file to be cracked and terminal
CN106778086A (en) * 2016-11-28 2017-05-31 北京小米移动软件有限公司 theme packet processing method and device
CN106971105A (en) * 2017-03-30 2017-07-21 电子科技大学 A kind of application program based on iOS meets with the defence method of flank attack
CN107092505A (en) * 2017-03-31 2017-08-25 努比亚技术有限公司 The erecting device and method of a kind of application program, storage medium, terminal
CN108363580A (en) * 2018-03-12 2018-08-03 平安普惠企业管理有限公司 Application program installation method, device, computer equipment and storage medium
CN110362967A (en) * 2019-07-15 2019-10-22 北京奇艺世纪科技有限公司 The anti-tamper detection method of application program, device, terminal device and storage medium
CN111274459A (en) * 2020-01-19 2020-06-12 福建天晴在线互动科技有限公司 Method and terminal for preventing re-signing of IPA installation package
CN111950035A (en) * 2020-06-18 2020-11-17 中国电力科学研究院有限公司 Method, system, equipment and storage medium for protecting integrity of apk file
CN112651031A (en) * 2020-12-14 2021-04-13 展讯半导体(成都)有限公司 Digital signature method, digital signature verification method, electronic device and storage medium
CN113761587A (en) * 2020-09-23 2021-12-07 北京沃东天骏信息技术有限公司 Method and device for signature verification
WO2022134419A1 (en) * 2020-12-23 2022-06-30 北京奇虎科技有限公司 Tamper detection method and apparatus for application program, device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN101605310A (en) * 2009-06-30 2009-12-16 厦门敏讯信息技术股份有限公司 A kind of method of mobile electronic signature
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN103577206A (en) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 Method and device for installing application software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175267A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Communication terminal and software detecting method and device
CN101605310A (en) * 2009-06-30 2009-12-16 厦门敏讯信息技术股份有限公司 A kind of method of mobile electronic signature
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN103577206A (en) * 2012-07-27 2014-02-12 北京三星通信技术研究有限公司 Method and device for installing application software

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320545A (en) * 2015-11-27 2016-02-10 北京指掌易科技有限公司 Method and device for supporting application software to inspect certificate of third-party software
CN105320545B (en) * 2015-11-27 2018-09-18 北京指掌易科技有限公司 A kind of method and apparatus for the certificate for supporting application software to check third party software
CN106230777A (en) * 2016-07-12 2016-12-14 珠海市魅族科技有限公司 A kind of method preventing file to be cracked and terminal
CN106778086B (en) * 2016-11-28 2019-11-29 北京小米移动软件有限公司 Theme packet processing method and device
CN106778086A (en) * 2016-11-28 2017-05-31 北京小米移动软件有限公司 theme packet processing method and device
CN106971105A (en) * 2017-03-30 2017-07-21 电子科技大学 A kind of application program based on iOS meets with the defence method of flank attack
CN106971105B (en) * 2017-03-30 2020-02-18 电子科技大学 IOS-based application program defense method against false face attack
CN107092505A (en) * 2017-03-31 2017-08-25 努比亚技术有限公司 The erecting device and method of a kind of application program, storage medium, terminal
CN108363580A (en) * 2018-03-12 2018-08-03 平安普惠企业管理有限公司 Application program installation method, device, computer equipment and storage medium
CN110362967A (en) * 2019-07-15 2019-10-22 北京奇艺世纪科技有限公司 The anti-tamper detection method of application program, device, terminal device and storage medium
CN111274459A (en) * 2020-01-19 2020-06-12 福建天晴在线互动科技有限公司 Method and terminal for preventing re-signing of IPA installation package
CN111274459B (en) * 2020-01-19 2022-08-09 福建天晴在线互动科技有限公司 Method and terminal for preventing re-signing of IPA installation package
CN111950035A (en) * 2020-06-18 2020-11-17 中国电力科学研究院有限公司 Method, system, equipment and storage medium for protecting integrity of apk file
CN113761587A (en) * 2020-09-23 2021-12-07 北京沃东天骏信息技术有限公司 Method and device for signature verification
CN112651031A (en) * 2020-12-14 2021-04-13 展讯半导体(成都)有限公司 Digital signature method, digital signature verification method, electronic device and storage medium
WO2022134419A1 (en) * 2020-12-23 2022-06-30 北京奇虎科技有限公司 Tamper detection method and apparatus for application program, device, and storage medium

Similar Documents

Publication Publication Date Title
CN104298915A (en) Installation package tampering preventing method
CN104573435A (en) Method for terminal authority management and terminal
KR101498820B1 (en) Method for Detecting Application Repackaging in Android
WO2015109668A1 (en) Application program management method, device, terminal, and computer storage medium
CN104751054A (en) Malicious program identification method and device and mobile terminal
CN105554091A (en) Method for guaranteeing security of source of web application in mobile terminal
US20160330030A1 (en) User Terminal For Detecting Forgery Of Application Program Based On Hash Value And Method Of Detecting Forgery Of Application Program Using The Same
CN104751049A (en) Application program installing method and mobile terminal
CN101399659B (en) Cipher key authentication method and device between user identification module and terminal
CN104123488A (en) Method and device for verifying application program
CN106789894A (en) Inter-network safety data transmission equipment and its implementation based on three CPU architectures
CN106897606A (en) A kind of brush machine means of defence and device
KR20160006925A (en) Apparatus and method for verifying application integrities
KR101642267B1 (en) System for preventing forgery of application and method therefor
CN115244896A (en) Identifying trusted service set identifiers for wireless networks
KR101566141B1 (en) User Terminal to Detect the Tampering of the Applications Using Signature Information and Method for Tamper Detection Using the Same
KR101518689B1 (en) User Terminal to Detect the Tampering of the Applications Using Core Code and Method for Tamper Detection Using the Same
CN104392168A (en) Application program verification method
WO2016173174A1 (en) Network locking data upgrading method and device
CN111181898A (en) Data security protection method based on background server and APP client
CN106446620B (en) Permission setting and processing method and device of WIFI module
CN102968588B (en) Intelligent terminal system
EP3221996A1 (en) Symmetric keying and chain of trust
CN105930730A (en) Terminal system security update method and apparatus in trusted execution environment
CN106599619A (en) Verification method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150121

WD01 Invention patent application deemed withdrawn after publication