CN104680039A - Data protection method and device of application installation package - Google Patents

Data protection method and device of application installation package Download PDF

Info

Publication number
CN104680039A
CN104680039A CN201310627721.0A CN201310627721A CN104680039A CN 104680039 A CN104680039 A CN 104680039A CN 201310627721 A CN201310627721 A CN 201310627721A CN 104680039 A CN104680039 A CN 104680039A
Authority
CN
China
Prior art keywords
application program
installation kit
program installation
encrypted
dynamic link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310627721.0A
Other languages
Chinese (zh)
Other versions
CN104680039B (en
Inventor
张立春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310627721.0A priority Critical patent/CN104680039B/en
Priority to PCT/CN2014/090843 priority patent/WO2015078295A1/en
Publication of CN104680039A publication Critical patent/CN104680039A/en
Application granted granted Critical
Publication of CN104680039B publication Critical patent/CN104680039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The invention applies to the technical field of software, and provides a data protection method and a data protection device of an application installation package. The data protection method of the application installation package includes: adding a dynamic linking library to the application installation package, wherein the dynamic linking library is used to decipher a character string after being encrypted; encrypting character strings in an executable file in the application installation package, and adding an invoking method used to invoke the dynamic linking library for the executable file so as to obtain a new executable file; modifying a configuration file in the application installation package so as to enable the new executable file to firstly load the dynamic linking library in running, and then invoke the dynamic linking library to decipher the encrypted character string in the application installation package during the running process, and completing installation of an application. The data protection method and the data protection device of the application installation package prevent the circumstance that data in the application installation package is directly leaked to a person who is not a developer of the application installation package from occurring before the application installation package is run, and effectively achieves data protection for the application installation package.

Description

A kind of data guard method of application program installation kit and device
Technical field
The invention belongs to software technology field, particularly relate to a kind of data guard method and device of application program installation kit.
Background technology
In today of the horizontal develop rapidly of mobile terminal software and hardware, the exploitation of application program for mobile terminal is also maked rapid progress, there is every day the application program of magnanimity to be added in electronic market, by mobile terminal accessing internet, downloading and installing these application programs can be realized whenever and wherever possible.
But, prior art is to the effective safeguard measure of the data deficiency in application program for mobile terminal installation kit, anyone can share channel by electronic market or other and get installation kit, extract the file in installation kit, resolve the critical data obtained in file, this just makes the rival of some application development team can pass easily through these critical datas of analysis and realizes details to some important technologies stolen in application program, or make some lawless persons obtain the important informations such as the server address of application program in communication process by analyzing these critical datas, carry out network attack, above-mentioned phenomenon all causes the interests loss of application development team.
Summary of the invention
The object of the embodiment of the present invention is the data guard method providing a kind of application program installation kit, solves the problem that the data in current application program for mobile terminal installation kit cannot be effectively protected.
The embodiment of the present invention is achieved in that a kind of data guard method of application program installation kit, comprising:
Added to by dynamic link library in described application program installation kit, described dynamic link library is used for the character string after to encryption and is decrypted;
Character string in executable file in described application program installation kit is encrypted, and is the call method of described executable file interpolation for calling described dynamic link library, obtain new executable file;
Revise the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
Another object of the embodiment of the present invention is the data protecting device providing a kind of application program installation kit, comprising:
Adding device, for being added to by dynamic link library in described application program installation kit, described dynamic link library is used for the character string after to encryption and is decrypted;
First amendment unit, for being encrypted the character string in the executable file in described application program installation kit, and being the call method of described executable file interpolation for calling described dynamic link library, obtaining new executable file;
Second amendment unit, for revising the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
In the embodiment of the present invention, before application program installation kit is externally issued, by being encrypted the data in installation kit, and in installation kit, add the dynamic link library being used for data decryption, make installation kit can call dynamic link library after operation and carry out data deciphering process, restore original data, complete installation.This programme data avoided in installation kit were directly revealed and are occurred to the situation of non-developer before installation kit runs, and have effectively achieved the data protection of application programs installation kit, had ensured the interests of application development team.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of the data guard method of the application program installation kit that the embodiment of the present invention provides;
Fig. 2 is the realization flow figure of the data guard method of the application program installation kit that another embodiment of the present invention provides;
Fig. 3 is the specific implementation process flow diagram of the data guard method S102 of the application program installation kit that the embodiment of the present invention provides;
Fig. 4 is the specific implementation process flow diagram of the data guard method S103 of the application program installation kit that the embodiment of the present invention provides;
Fig. 5 is the realization example figure that the data guard method of the application program installation kit that the embodiment of the present invention provides is installed about application program;
Fig. 6 is the structured flowchart of the data protecting device of the application program installation kit that the embodiment of the present invention provides.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
In the embodiment of the present invention, before application program installation kit is externally issued, by being encrypted the data in installation kit, and in installation kit, add the dynamic link library being used for data decryption, make installation kit can call dynamic link library after operation and carry out data deciphering process, restore original data, complete installation.This programme data avoided in installation kit were directly revealed and are occurred to the situation of non-developer before installation kit runs, and have effectively achieved the data protection of application programs installation kit, had ensured the interests of application development team.
Wherein, the application program installation kit described in the embodiment of the present invention, typically includes the required All Files used when application program being installed in terminal device in its bag, and these files normally compress set in installation kit.After installation kit to be downloaded or to copy on terminal device and is given and performs instruction, the All Files that installation kit can decompress wherein voluntarily, on the hard disk that All Files is wherein discharged into terminal device or internal memory, the executable file reruned wherein, perform edit the registry, amendment Operation system setting, create the operations such as shortcut, thus complete the installation of application program.Just because of installation kit once after being given execution instruction, on the hard disk that file wherein will inevitably be released to terminal device or internal memory, now, data in file there occurs amendment, not be stored in the raw data in installation kit file, if resolve data more at this moment, some important technologies being difficult to get application program realize details or important information, therefore, the rival of application development team or some lawless persons usually can before installation kit run, the mode of file is gone out by extracting directly from installation kit, resolution file is to get the raw data in installation kit.And the data guard method of the application program installation kit that the embodiment of the present invention provides and device, have been directed to application program installation kit data protection link before runtime just, prevent the data in installation kit from directly being revealed before installation kit runs.
It should be noted that, operation due to application program installation kit has been come by the executable file performed in installation kit, therefore, in embodiments of the present invention, the described installation kit that runs application is equal to described operation executable file, explains no longer one by one in subsequent embodiment.
It should be noted that, next all to be applicable to the application program installation kit of android system, the data guard method of the application program installation kit that the embodiment of the present invention provides and device are described in detail, it is contemplated that, principle is realized based on identical, the embodiment of the present invention also can apply in the data guard method of the application program installation kit that other can support the embodiment of the present invention to provide and the application program installation kit of device realization, such as, windows system, the application program installation kit of the Mobile operating system of linux system and other types, etc., in this citing that differs.
Fig. 1 shows the realization flow of the data guard method of the application program installation kit that the embodiment of the present invention provides, and details are as follows:
In S101, added to by dynamic link library in described application program installation kit, described dynamic link library is used for the character string after to encryption and is decrypted.
For the application program installation kit of android system, it is normally packaged into application program APMB package (application package file), i.e. APK installation kit, therefore, as one embodiment of the present of invention, as shown in Figure 2, before S101, described method also comprises:
In S201, judge whether described application program installation kit is compressed file form.
In S202, when described application program is compressed file form, application program installation kit described in decompress(ion).
Namely, for the installation kit existed with compressed file form, in the embodiment depicted in figure 2, can first according to normal decompression flow process, application programs installation kit decompresses, to obtain prerequisite installation file in installation kit that android system specifies.Usually, the executable file (.dex file) at the code place be compiled is contained in an APK installation kit, file resource (resources), certificate (certificates), with configuration file (manifest file), etc., these files all can obtain after decompression.
Obviously, for Develop Application System person, it also directly can get un-compressed application program installation kit, file in the un-compressed application program installation kit of extracting directly, or un-compressed application program installation kit is directly processed, now, before execution S101, then can not need to perform the decompression step described in Fig. 2 embodiment.
In the present embodiment, need dynamic link library (the Dynamic Link Library writing the character string after for enabling decryption of encrypted in advance, DLL), and the dynamic link library write is added in application program installation kit, wherein, the cryptographic algorithm of the decipherment algorithm needs comprised in dynamic link library and the encrypted characters string of its deciphering matches.
In the present embodiment, described dynamic link library is a storehouse comprising code and the data that simultaneously can be used by multiple program, and it is non-executable file also, and there is provided a kind of method, makes process can call the function not belonging to its executable code.In the present embodiment, the dynamic link library writing generation is added in application program installation kit, make executable file in installation kit in the process of implementation, the method in dynamic link library can be called when needing, to be decrypted the character string after encryption, concrete flow process will be described in detail in subsequent embodiment, not repeat them here.
In the present embodiment, the decrypted code comprised in dynamic link library can be write with Java language, and in order to ensure that the raw data in application program installation kit is not deciphered easily, the decrypted code comprised in dynamic link library can adopt the C Plus Plus of more bottom to write.
In S102, the character string in the executable file in described application program installation kit is encrypted, and is the call method of described executable file interpolation for calling described dynamic link library, obtain new executable file.
In S102, need the executable file in application programs installation kit to process, the string data comprised in the code in executable file is encrypted.For android system, the development specifications relevant according to it, the executable file in its APK installation kit is generally the file that file is called classes.dex.In the present embodiment, when being encrypted, without the need to being encrypted the whole codes in executable file, and only need encrypting string data wherein, such as, the string data of hard coded in code being encrypted.
In specific implementation, can by instruments such as baksmali, ApkTool, the code in classes.dex is become the text of smali grammer, now, the character string of the hard coded in smali will be shown in the following manner:
const-string v0,"QQPIM.ProductVersion"
const-string v0,"http://login.qq.com/do"
Wherein, character string " QQPIM.ProductVersion " and " http://login.qq.com/do " need the character string of the hard coded be encrypted just, normally comprise the important informations such as the version of application program, type, server address here.
In addition, as one embodiment of the present of invention, for the string data in executable file code, also can select neatly to be encrypted alphabet string wherein or partial character string.
In the present embodiment, the cryptographic algorithm of character string is not used in restriction the present invention at this, but cryptographic algorithm needs to match with the decipherment algorithm that comprises in the dynamic link library write.
As one embodiment of the present of invention, in order to improve the efficiency of deciphering character string, as shown in Figure 3, described in S102, the character string in the executable file in described application program installation kit being encrypted and being specially:
In S301, extract the character string in described executable file.
In S302, each described character string extracted is encrypted, obtains described encrypted characters string.
In S303, preset marking head for each described encrypted characters string adds.
Namely, in encryption process, for the character string of having encrypted, for this encrypted characters string adds the marking head preset, encryption has been through for indicating the character string that belongs to this marking head, like this, by arranging this default marking head, corresponding decryption method is write at dynamic link library, when calling dynamic link library and being encrypted the deciphering of character string, dynamic link library only needs to identify in code the character string that with the addition of default marking head, is decrypted and processes, which thereby enhance the decryption efficiency to encrypted characters string to this part character string.
In the present embodiment, while character string in executable file in described application program installation kit is encrypted, for executable file adds the call method for calling described dynamic link library, to make executable file can in the process of run time version, the method in dynamic link library is called when needing, to be decrypted the character string after encryption, concrete flow process will be described in detail in subsequent embodiment, not repeat them here.
Being encrypted the character string in the executable file in described application program installation kit, and for after executable file adds the call method for calling described dynamic link library, obtain new executable file.
In S103, revise the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
After S102 generates new executable file, also need to revise the configuration file in application program installation kit, to ensure that new executable file is when being run, first dynamic link library can be loaded, thus in operational process, when running into encrypted characters string, dynamic link library can be called encrypted characters string is decrypted, thus the raw data restored in executable file, complete application program and install.
Wherein, for android system, according to relevant development specifications, configuration file is the file that file is called AndroidManifest.xml, it is the configuration file for configuring application program installation kit information, the information of its configuration includes but not limited to application name, application version, interface assembly, authority information, log-on message, etc.
When the decrypted code comprised in dynamic link library adopts the C Plus Plus of more bottom to write, need to realize calling of dynamic link library by Java code, according to android system to the format description of AndroidManifest.xml file, as shown in Figure 4, S103 is specially:
In S401, locate the application node in described configuration file.
In S402, judge whether comprise name attribute in described application node.
In S403, when comprising described name attribute in described application node, in described name attribute, state java class information.
In S404, when not comprising described name attribute in described application node, create described name attribute, and state described java class information in described name attribute.
In the present embodiment, at the beginning of running, in installation kit dynamic data base is first loaded in order to allow the executable file in APK installation kit, need to navigate to name attribute in the application node of AndroidManifest.xml file, and a specific java class information is stated in name attribute, the operation entrance that this specific java class information is run in android system as installation kit, for making described new executable file when being run, the dynamic link library in installation kit first can be loaded.Therefore, in the embodiment shown in fig. 4, first the application node in configuration file is navigated to, and judge whether contain name attribute in this node, if this node comprises name attribute, then direct in this name attribute state a java class information, if this node does not comprise name attribute, then first create a name attribute, and state this java class information in this name attribute.
It should be noted that, in actual code implementation, need, in the java class (such as, com.example.MyApplication) pointed by the name attribute of application node, to add following code:
Static{
System.LoadLibrary(“xxx”);
}
Calling the dynamic link library of libxxx.so by name can be realized.
As one embodiment of the present of invention, after having carried out configuration file revising, by the cryptographic algorithm identical with encrypted characters string in executable file, the character string in configuration file can also be encrypted, to improve the security of data in application program installation kit further.And in the process of set up applications, executable file in installation kit is when needing the data called in configuration file, also can be decrypted the enciphered data in configuration file by calling dynamic data base, thus restore the raw data in configuration file.
In embodiments of the present invention, after completing the associative operation shown in Fig. 1 embodiment, namely can be assembled into new application program installation kit, new application program installation kit can call dynamic link library and carry out data deciphering process after operation, restore original data, complete installation.
As a realization example of the present invention, Fig. 5 shows the data convert process of data guard method when carrying out application program and installing of the application program installation kit that the embodiment of the present invention provides, and details are as follows:
In S501, run application installation kit.
In S502, perform the code in the application node in AndroidManifest file, load dynamic link library.
In S503, the installation process of executive utility.
In S504, judge whether the installation process of application program has met encrypted characters string, is perform S505, otherwise continue to perform S503.
In S505, call the decryption method in dynamic link library, encrypted characters string is decrypted, restore original character string, return and continue to perform S503.
Thus, enciphered data in application program installation kit needs to run and after the hard disk that All Files wherein is all discharged into terminal device or internal memory at application program installation kit, reduce in real time in whole installation process, if installation kit does not run, then cannot directly resolve to get raw data from the file that installation kit extracts, by such scheme, effectively ensure the data security of application program installation kit.
In the embodiment of the present invention, before application program installation kit is externally issued, by being encrypted the data in installation kit, and in installation kit, add the dynamic link library being used for data decryption, make installation kit can call dynamic link library after operation and carry out data deciphering process, restore original data, complete installation.This programme data avoided in installation kit were directly revealed and are occurred to the situation of non-developer before installation kit runs, and have effectively achieved the data protection of application programs installation kit, had ensured the interests of application development team.
Fig. 6 shows the structured flowchart of the data protecting device of the application program installation kit that the embodiment of the present invention provides, and this device is for running the data guard method of the application program installation kit described in Fig. 1 to Fig. 5 embodiment of the present invention.For convenience of explanation, illustrate only part related to the present embodiment.
With reference to Fig. 6, this device comprises:
Adding device 61, adds in described application program installation kit by dynamic link library, described dynamic link library is used for the character string after to encryption and is decrypted.
First amendment unit 62, is encrypted the character string in the executable file in described application program installation kit, and is the call method of described executable file interpolation for calling described dynamic link library, obtains new executable file.
Second amendment unit 63, revise the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
Alternatively, described device also comprises:
Judging unit, judges whether described application program installation kit is compressed file form.
Decompression units, when described application program is compressed file form, application program installation kit described in decompress(ion).
Alternatively, described first amendment unit 62 comprises:
Extract subelement, extract the character string in described executable file.
Encryption sub-unit operable, is encrypted each described character string extracted, and obtains described encrypted characters string.
Add subelement, preset marking head for each described encrypted characters string adds.
Described dynamic link library is used for being decrypted the described encrypted characters string comprising described default marking head.
Alternatively, described first amendment unit 62 specifically for:
All or part of character string in executable file in described application program installation kit is encrypted.
Alternatively, described second amendment unit 63 comprises:
Locator unit, locates the application node in described configuration file.
Judgment sub-unit, judges whether comprise name attribute in described application node.
First statement unit, when comprising described name attribute in described application node, states java class information in described name attribute.
Second statement unit, when not comprising described name attribute in described application node, creates described name attribute, and state described java class information in described name attribute.
Described java class information, for making described new executable file when being run, first loads described dynamic link library.
Alternatively, described device also comprises:
Ciphering unit, for being encrypted the character string in amended described configuration file.
In the embodiment of the present invention, before application program installation kit is externally issued, by being encrypted the data in installation kit, and in installation kit, add the dynamic link library being used for data decryption, make installation kit can call dynamic link library after operation and carry out data deciphering process, restore original data, complete installation.This programme data avoided in installation kit were directly revealed and are occurred to the situation of non-developer before installation kit runs, and have effectively achieved the data protection of application programs installation kit, had ensured the interests of application development team.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. a data guard method for application program installation kit, is characterized in that, comprising:
Added to by dynamic link library in described application program installation kit, described dynamic link library is used for the character string after to encryption and is decrypted;
Character string in executable file in described application program installation kit is encrypted, and is the call method of described executable file interpolation for calling described dynamic link library, obtain new executable file;
Revise the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
2. the method for claim 1, is characterized in that, described dynamic link library is added in described application program installation kit before, described method also comprises:
Judge whether described application program installation kit is compressed file form;
When described application program is compressed file form, application program installation kit described in decompress(ion).
3. the method for claim 1, is characterized in that, described being encrypted the character string in the executable file in described application program installation kit comprises:
Extract the character string in described executable file;
The each described character string extracted is encrypted, obtains described encrypted characters string;
Marking head is preset for each described encrypted characters string adds;
Described dynamic link library is used for being decrypted the described encrypted characters string comprising described default marking head.
4. the method for claim 1, is characterized in that, described being encrypted the character string in the executable file in described application program installation kit comprises:
All or part of character string in executable file in described application program installation kit is encrypted.
5. the method for claim 1, is characterized in that, the configuration file in the described application program installation kit of described amendment comprises:
Locate the application node in described configuration file;
Judge whether comprise name attribute in described application node;
When comprising described name attribute in described application node, in described name attribute, state java class information;
When not comprising described name attribute in described application node, create described name attribute, and state described java class information in described name attribute;
Described java class information, for making described new executable file when being run, first loads described dynamic link library.
6. the method for claim 1, is characterized in that, after the configuration file in the described application program installation kit of described amendment, described method also comprises:
Character string in amended described configuration file is encrypted.
7. a data protecting device for application program installation kit, is characterized in that, comprising:
Adding device, for being added to by dynamic link library in described application program installation kit, described dynamic link library is used for the character string after to encryption and is decrypted;
First amendment unit, for being encrypted the character string in the executable file in described application program installation kit, and being the call method of described executable file interpolation for calling described dynamic link library, obtaining new executable file;
Second amendment unit, for revising the configuration file in described application program installation kit, operationally described dynamic link library is first loaded to make described new executable file, to call described dynamic link library in operational process, the encrypted characters string in described application program installation kit is decrypted, completes application program and install.
8. device as claimed in claim 7, it is characterized in that, described device also comprises:
Judging unit, for judging whether described application program installation kit is compressed file form;
Decompression units is compressed file form for working as described application program, application program installation kit described in decompress(ion).
9. device as claimed in claim 7, is characterized in that, described first amendment unit comprises:
Extract subelement, for extracting the character string in described executable file;
Encryption sub-unit operable, for being encrypted each described character string extracted, obtains described encrypted characters string;
Add subelement, for presetting marking head for each described encrypted characters string adds;
Described dynamic link library is used for being decrypted the described encrypted characters string comprising described default marking head.
10. device as claimed in claim 7, is characterized in that, described first amendment unit specifically for:
All or part of character string in executable file in described application program installation kit is encrypted.
11. devices as claimed in claim 7, is characterized in that, described second amendment unit comprises:
Locator unit, for locating the application node in described configuration file;
Judgment sub-unit, for judging whether comprise name attribute in described application node;
First statement unit, for when comprising described name attribute in described application node, states java class information in described name attribute;
Second statement unit, for when not comprising described name attribute in described application node, creates described name attribute, and state described java class information in described name attribute;
Described java class information, for making described new executable file when being run, first loads described dynamic link library.
12. devices as claimed in claim 7, it is characterized in that, described device also comprises:
Ciphering unit, for being encrypted the character string in amended described configuration file.
CN201310627721.0A 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit Active CN104680039B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310627721.0A CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit
PCT/CN2014/090843 WO2015078295A1 (en) 2013-11-28 2014-11-11 Method and apparatus for protecting data of application installation packages

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310627721.0A CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit

Publications (2)

Publication Number Publication Date
CN104680039A true CN104680039A (en) 2015-06-03
CN104680039B CN104680039B (en) 2019-02-26

Family

ID=53198346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310627721.0A Active CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit

Country Status (2)

Country Link
CN (1) CN104680039B (en)
WO (1) WO2015078295A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426777A (en) * 2015-11-17 2016-03-23 中科创达软件股份有限公司 Dynamic-link library file encryption, decryption methods and devices
CN105512102A (en) * 2015-12-01 2016-04-20 北京交控科技股份有限公司 Data parse method and system
CN105930695A (en) * 2016-04-11 2016-09-07 江苏通付盾科技有限公司 Protection method and device for software development kit
CN106126290A (en) * 2016-06-27 2016-11-16 微梦创科网络科技(中国)有限公司 Application program optimization method, Apparatus and system
CN106326693A (en) * 2016-08-18 2017-01-11 广州优视网络科技有限公司 Obfuscation method and obfuscation device for application program code
CN106708571A (en) * 2016-12-13 2017-05-24 北京奇虎科技有限公司 Resource file loading method and device and source file reinforcing method and device
CN106845169A (en) * 2016-12-26 2017-06-13 北京握奇智能科技有限公司 A kind of Jar bags reinforcement means and system
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN107766096A (en) * 2016-08-19 2018-03-06 阿里巴巴集团控股有限公司 The generation method of application program installation kit, the operation method of application program and device
CN105068832B (en) * 2015-07-30 2018-06-01 北京奇虎科技有限公司 A kind of method and apparatus for generating executable file
CN110135131A (en) * 2019-05-13 2019-08-16 北京智游网安科技有限公司 A kind of encryption method of application program, storage medium and terminal device
CN111104648A (en) * 2018-10-29 2020-05-05 鸿合科技股份有限公司 Software processing method and device, application program and electronic equipment
CN111753330A (en) * 2020-06-18 2020-10-09 百度在线网络技术(北京)有限公司 Method, device and equipment for determining data leakage subject and readable storage medium
CN112214253A (en) * 2020-09-11 2021-01-12 拓尔思信息技术股份有限公司 Method and device for starting Java program, electronic device and nonvolatile storage medium
CN112486542A (en) * 2020-12-10 2021-03-12 卡斯柯信号有限公司 Configuration file generation and updating method and system based on dynamic link library

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102087605A (en) * 2011-01-28 2011-06-08 宇龙计算机通信科技(深圳)有限公司 Android-based platform application installation control method and system
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102346834A (en) * 2011-11-25 2012-02-08 武汉钢铁(集团)公司 Method for encrypting and protecting Java application software
CN103413076A (en) * 2013-08-27 2013-11-27 北京理工大学 Block protection method for Android application programs

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007063433A2 (en) * 2005-10-17 2007-06-07 Nxp B.V. Program executable image encryption
CN101256612B (en) * 2008-04-01 2010-11-03 北京飞天诚信科技有限公司 Program protection method and system based on .Net card
JP5948680B2 (en) * 2011-09-13 2016-07-06 パナソニックIpマネジメント株式会社 Content playback system, information processing terminal, media server, secure device and server / secure device
CN103413075B (en) * 2013-07-10 2016-05-04 北京深思数盾科技股份有限公司 A kind of method and apparatus of protecting JAVA executable program by virtual machine

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102087605A (en) * 2011-01-28 2011-06-08 宇龙计算机通信科技(深圳)有限公司 Android-based platform application installation control method and system
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102346834A (en) * 2011-11-25 2012-02-08 武汉钢铁(集团)公司 Method for encrypting and protecting Java application software
CN103413076A (en) * 2013-08-27 2013-11-27 北京理工大学 Block protection method for Android application programs

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105068832B (en) * 2015-07-30 2018-06-01 北京奇虎科技有限公司 A kind of method and apparatus for generating executable file
CN105426777A (en) * 2015-11-17 2016-03-23 中科创达软件股份有限公司 Dynamic-link library file encryption, decryption methods and devices
CN105426777B (en) * 2015-11-17 2018-09-21 中科创达软件股份有限公司 A kind of dynamic link library file encryption and decryption method and device
CN105512102A (en) * 2015-12-01 2016-04-20 北京交控科技股份有限公司 Data parse method and system
CN105930695A (en) * 2016-04-11 2016-09-07 江苏通付盾科技有限公司 Protection method and device for software development kit
CN105930695B (en) * 2016-04-11 2019-03-19 江苏通付盾科技有限公司 Protection method and device for software development kit
CN106126290A (en) * 2016-06-27 2016-11-16 微梦创科网络科技(中国)有限公司 Application program optimization method, Apparatus and system
CN106326693A (en) * 2016-08-18 2017-01-11 广州优视网络科技有限公司 Obfuscation method and obfuscation device for application program code
CN107766096A (en) * 2016-08-19 2018-03-06 阿里巴巴集团控股有限公司 The generation method of application program installation kit, the operation method of application program and device
CN106708571A (en) * 2016-12-13 2017-05-24 北京奇虎科技有限公司 Resource file loading method and device and source file reinforcing method and device
CN106845169A (en) * 2016-12-26 2017-06-13 北京握奇智能科技有限公司 A kind of Jar bags reinforcement means and system
CN106845169B (en) * 2016-12-26 2023-04-07 北京握奇智能科技有限公司 Jar package reinforcing method and system
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN111104648A (en) * 2018-10-29 2020-05-05 鸿合科技股份有限公司 Software processing method and device, application program and electronic equipment
CN110135131A (en) * 2019-05-13 2019-08-16 北京智游网安科技有限公司 A kind of encryption method of application program, storage medium and terminal device
CN111753330A (en) * 2020-06-18 2020-10-09 百度在线网络技术(北京)有限公司 Method, device and equipment for determining data leakage subject and readable storage medium
CN111753330B (en) * 2020-06-18 2023-08-29 百度在线网络技术(北京)有限公司 Determination method, apparatus, device and readable storage medium for data leakage main body
CN112214253A (en) * 2020-09-11 2021-01-12 拓尔思信息技术股份有限公司 Method and device for starting Java program, electronic device and nonvolatile storage medium
CN112214253B (en) * 2020-09-11 2024-02-02 拓尔思信息技术股份有限公司 Java program starting method and device, electronic device and nonvolatile storage medium
CN112486542A (en) * 2020-12-10 2021-03-12 卡斯柯信号有限公司 Configuration file generation and updating method and system based on dynamic link library

Also Published As

Publication number Publication date
CN104680039B (en) 2019-02-26
WO2015078295A1 (en) 2015-06-04

Similar Documents

Publication Publication Date Title
CN104680039A (en) Data protection method and device of application installation package
KR102217501B1 (en) Mobile device with trusted execution environment
US9934375B2 (en) Secured execution of a web application
JP6227772B2 (en) Method and apparatus for protecting a dynamic library
EP3038004A1 (en) Method for providing security for common intermediate language-based program
CN106415491B (en) Application protection method, server and terminal
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
CN104866739A (en) Application program encryption method and application program encryption system in Android system
CN105022936A (en) Class file encryption and decryption method and class file encryption and decryption device
CN104318135A (en) Java code safety dynamic loading method on basis of trusted execution environment
CN104199657A (en) Call method and device for open platform
CN109840400B (en) Apparatus and method for providing security and apparatus and method for performing security for universal intermediate language
CN108133147B (en) Method and device for protecting executable code and readable storage medium
Kim et al. Android Application Protection against Static Reverse Engineering based on Multidexing.
KR101734663B1 (en) Method for preventing reverse engineering of android application and apparatus for performing the method
CN112966227A (en) Code encryption and decryption method and device and storage medium
CN107871066B (en) Code compiling method and device based on android system
CN109992974B (en) Method and device for protecting byte code file of virtual machine and readable storage medium
Pan et al. Advertisement removal of Android applications by reverse engineering
CN112115430A (en) Apk reinforcement method, electronic equipment and storage medium
JP2013045277A (en) Program obfuscation method and remote debug system
CN104751026A (en) Software protection method and software application method of android system, and related devices
CN113420313A (en) Program safe operation and encryption method and device, equipment and medium thereof
CN117828555B (en) Low-cost Java source code protection method and device
Haoliang et al. The Design and Implementation on the Android Application Protection System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant