CN104680039B - A kind of data guard method and device of application program installation kit - Google Patents

A kind of data guard method and device of application program installation kit Download PDF

Info

Publication number
CN104680039B
CN104680039B CN201310627721.0A CN201310627721A CN104680039B CN 104680039 B CN104680039 B CN 104680039B CN 201310627721 A CN201310627721 A CN 201310627721A CN 104680039 B CN104680039 B CN 104680039B
Authority
CN
China
Prior art keywords
application program
installation kit
program installation
dynamic link
link library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310627721.0A
Other languages
Chinese (zh)
Other versions
CN104680039A (en
Inventor
张立春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310627721.0A priority Critical patent/CN104680039B/en
Priority to PCT/CN2014/090843 priority patent/WO2015078295A1/en
Publication of CN104680039A publication Critical patent/CN104680039A/en
Application granted granted Critical
Publication of CN104680039B publication Critical patent/CN104680039B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The present invention is suitable for software technology field, provides the data guard method and device of a kind of application program installation kit, comprising: dynamic link library is added in the application program installation kit, the dynamic link library is for being decrypted encrypted character string;Character string in executable file in the application program installation kit is encrypted, and adds the call method for calling the dynamic link library for the executable file, obtains new executable file;Modify the configuration file in the application program installation kit, so that the new executable file loads the dynamic link library first at runtime, to call the dynamic link library that the encrypted characters string in the application program installation kit is decrypted in the process of running, application program installation is completed.The case where being directly leaked to non-developer before installation kit operation the invention avoids the data in installation kit appearance, has effectively achieved the data protection to application program installation kit.

Description

A kind of data guard method and device of application program installation kit
Technical field
The invention belongs to software technology field more particularly to a kind of data guard methods and dress of application program installation kit It sets.
Background technique
In today of mobile terminal software and hardware level rapid development, the exploitation of application program for mobile terminal is also maked rapid progress, There is the application program of magnanimity to be added in electronic market daily, it, can be whenever and wherever possible by mobile terminal accessing internet Realize that the downloading to these application programs is installed in ground.
However, measure is effectively protected to the data deficiency in application program for mobile terminal installation kit in the prior art, it is any People can get installation kit by electronic market or other sharing channels, extract the file in installation kit, parsing obtains Critical data in file, this rival for allowing for some application development team can be easily by analyzing this A little critical datas realize details to steal some important technologies in application program, or make some criminals by dividing These critical datas are analysed to obtain the important informations such as server address of the application program in communication process, carry out network attack, Above-mentioned phenomenon causes the interests loss of application development team.
Summary of the invention
A kind of data guard method for being designed to provide application program installation kit of the embodiment of the present invention solves to move at present The problem of data in dynamic end application installation kit are unable to get effective protection.
The embodiments of the present invention are implemented as follows, a kind of data guard method of application program installation kit, comprising:
Dynamic link library is added in the application program installation kit, the dynamic link library is used for encrypted word Symbol string is decrypted;
Character string in executable file in the application program installation kit is encrypted, and is the executable text Part adds the call method for calling the dynamic link library, obtains new executable file;
The configuration file in the application program installation kit is modified, so that the new executable file is at runtime first The dynamic link library is loaded, to call the dynamic link library to adding in the application program installation kit in the process of running Close character string is decrypted, and completes application program installation.
The another object of the embodiment of the present invention is to provide a kind of data protecting device of application program installation kit, comprising:
Adding unit, for dynamic link library to be added in the application program installation kit, the dynamic link library is used It is decrypted in encrypted character string;
First modification unit, for adding to the character string in the executable file in the application program installation kit It is close, and the call method for calling the dynamic link library is added for the executable file, obtain new executable file;
Second modification unit, for modifying the configuration file in the application program installation kit, so that described new holds Style of writing part loads the dynamic link library first at runtime, to call the dynamic link library to answer described in the process of running It is decrypted with the encrypted characters string in program installation kit, completes application program installation.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install The data protection of packet has ensured the interests of application development team.
Detailed description of the invention
Fig. 1 is the implementation flow chart of the data guard method of application program installation kit provided in an embodiment of the present invention;
Fig. 2 be another embodiment of the present invention provides application program installation kit data guard method implementation flow chart;
Fig. 3 is the specific implementation flow of the data guard method S102 of application program installation kit provided in an embodiment of the present invention Figure;
Fig. 4 is the specific implementation flow of the data guard method S103 of application program installation kit provided in an embodiment of the present invention Figure;
Fig. 5 is that the data guard method of application program installation kit provided in an embodiment of the present invention is installed about application program Implementation example figure;
Fig. 6 is the structural block diagram of the data protecting device of application program installation kit provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install The data protection of packet has ensured the interests of application development team.
Wherein, application program installation kit described in the embodiment of the present invention is typically included and installs application program in packet The required All Files used when into terminal device, and these files are usually to compress in set to installation kit.When After installation kit is downloaded or is copied on terminal device and is given and execute instruction, installation kit can voluntarily decompress institute therein There is file, All Files therein are discharged on the hard disk or memory of terminal device, rerun executable file therein, The operations such as modification registration table, the setting of modification system, creation shortcut are executed, to complete the installation of application program.Exactly by After installation kit has once been given and has executed instruction, file therein will necessarily be released to the hard disk or interior of terminal device It deposits, at this point, the data in file have occurred that modification, the initial data being not stored in installation package file, if herein When data are parsed again, some important technologies for being difficult to get application program realize details or important information, therefore, The rival of application development team or some criminals would generally be before installation kit operations, by from installation kit In directly extract the mode of file, resolution file is to get the initial data in installation kit.And the embodiment of the present invention provides Application program installation kit data guard method and device, exactly have been directed to the data of application program installation kit before runtime Link of protection prevents the data in installation kit from directly being revealed before installation kit operation.
It should be noted that due to the operation of application program installation kit be by execute installation kit in executable file come It completes, therefore, in embodiments of the present invention, the operation application program installation kit is equal to the operation executable file, It is no longer explained one by one in subsequent embodiment.
It should be noted that next for being suitable for the application program installation kit of android system, to the present invention The data guard method and device for the application program installation kit that embodiment provides are described in detail, it is contemplated that being based on Identical realization principle, the embodiment of the present invention, which also can operate with other, can support application program provided in an embodiment of the present invention to pacify Fill packet data guard method and device realize application program installation kit in, for example, windows system, linux system and Application program installation kit of other kinds of Mobile operating system, etc., herein a different citing.
Fig. 1 shows the implementation process of the data guard method of application program installation kit provided in an embodiment of the present invention, in detail It states as follows:
In S101, dynamic link library is added in the application program installation kit, the dynamic link library for pair Encrypted character string is decrypted.
It is usually to be packaged into application program APMB package for the application program installation kit of android system (application package file), i.e. APK installation kit, therefore, as an embodiment of the present invention, as shown in Fig. 2, Before S101, the method also includes:
In S201, judge whether the application program installation kit is compressed file form.
In S202, when the application program be compressed file form, decompress the application program installation kit.
That is, for installation kit existing in the form of compressed file, it in the embodiment depicted in figure 2, can be first according to normal solution Compression processing process unzips it application program installation kit, necessary to obtain institute in installation kit as defined in android system The installation file having.In general, executable file (the .dex text where containing the code being compiled in an APK installation kit Part), file resource (resources), certificate (certificates) and configuration file (manifest file), etc., this A little files can obtain after decompression.
For the developer of application program, it can also be directly obtained un-compressed application program peace Dress packet, directly extracts the file in un-compressed application program installation kit, or to un-compressed application program installation kit It is directly handled, at this point, can then not need to execute decompression step described in Fig. 2 embodiment before executing S101.
In the present embodiment, need to write the dynamic link library (Dynamic for decrypting encrypted character string in advance Link Library, DLL), and the dynamic link library for writing completion is added in application program installation kit, wherein dynamic chain Connecing the decipherment algorithm for including in library needs the Encryption Algorithm for the encrypted characters string decrypted with it to match.
In the present embodiment, the dynamic link library is one comprising can be by multiple programs while the code used and data Library, and non-executable file, but provide a method allows process to call the letter for being not belonging to its executable code Number.In the present embodiment, the dynamic link library for writing generation is added in application program installation kit so that in installation kit can It executes file in the process of implementation, the method in dynamic link library can be called when needed, to encrypted word Symbol string is decrypted, and specific process will be described in detail in subsequent embodiment, and details are not described herein.
In the present embodiment, the decrypted code for including in dynamic link library can be write with Java language, and in order to protect Initial data in card application program installation kit is not decrypted easily, and the decrypted code for including in dynamic link library can be using more It is write for the C Plus Plus of bottom.
In S102, the character string in the executable file in the application program installation kit is encrypted, and is institute It states executable file and adds call method for calling the dynamic link library, obtain new executable file.
In S102, need to handle the executable file in application program installation kit, it will be in executable file The string data for including in code is encrypted.For android system, according to its relevant development specifications, Executable file in its APK installation kit is usually the file of the entitled classes.dex of file.In the present embodiment, added When close processing, without encrypting to whole codes in executable file, and string data therein need to be only encrypted, example Such as, the string data of hard coded in code is encrypted.
In the concrete realization, the code in classes.dex can be become by tools such as baksmali, ApkTool The text file of smali grammer, at this point, the character string of the hard coded in smali will be shown as follows:
const-string v0,"QQPIM.ProductVersion"
const-string v0,"http://login.qq.com/do"
Wherein, character string " QQPIM.ProductVersion " and " http://login.qq.com/do " exactly need into The character string of the hard coded of row encryption, normally comprises the important letter such as version, type, server address of application program here Breath.
In addition, as an embodiment of the present invention, it, can also spirit for the string data in executable file code It selects to encrypt alphabet string therein or partial character string livingly.
In the present embodiment, the Encryption Algorithm of character string is not used in the restriction present invention herein, but Encryption Algorithm is needed and compiled The decipherment algorithm for including in the dynamic link library write matches.
As an embodiment of the present invention, in order to improve the efficiency for decrypting character string, as shown in figure 3, described in S102 Character string in executable file in the application program installation kit is encrypted specifically:
In S301, the character string in the executable file is extracted.
In S302, is encrypted to the character string each of is extracted, obtain the encrypted characters string.
In S303, default marking head is added for each encrypted characters string.
That is, for the character string that encryption is completed, adding preset mark in encryption process for the encrypted characters string Head belongs to the character string of the marking head and have passed through encryption, in this way, by arranging the default mark for indicating Head writes corresponding decryption method in dynamic link library, when calling dynamic link library to carry out the decryption of encrypted characters string, dynamic Chained library only needs to identify the character string for being added to default marking head in code, this partial character string is decrypted i.e. Can, which thereby enhance the decryption efficiency to encrypted characters string.
In the present embodiment, the character string in the executable file in the application program installation kit is encrypted same When, the call method for calling the dynamic link library is added for executable file, so that executable file can held During line code, the method in dynamic link library is called when needed, to solve to encrypted character string Close, specific process will be described in detail in subsequent embodiment, and details are not described herein.
It is encrypted to the character string in the executable file in the application program installation kit, and is executable file After adding the call method for calling the dynamic link library, new executable file has been obtained.
In S103, the configuration file in the application program installation kit is modified, so that the new executable file exists The dynamic link library is loaded when operation, first to call the dynamic link library to pacify the application program in the process of running Encrypted characters string in dress packet is decrypted, and completes application program installation.
After generating new executable file in S102, it is also necessary to the configuration file in application program installation kit is modified, To guarantee that new executable file when being run, can load dynamic link library first, thus in the process of running, when encountering When encrypted characters string, it can call dynamic link library that encrypted characters string is decrypted, to restore in executable file Initial data completes application program installation.
Wherein, for android system, according to relevant development specifications, configuration file is that file is entitled The file of AndroidManifest.xml is the configuration file for configuring application program installation package informatin, the letter of configuration Breath includes but is not limited to application name, application version, interface assembly, authority information, starting information, etc..
When the decrypted code for including in dynamic link library using the C Plus Plus of more bottom to write when, need by Java Code realizes the calling of dynamic link library, says to the format of AndroidManifest.xml file according to android system It is bright, as shown in figure 4, S103 specifically:
In S401, the application node in the configuration file is positioned.
In S402, whether judge in the application node comprising name attribute.
In S403, when in the application node including the name attribute, the sound in the name attribute Bright java class information.
In S404, when not including the name attribute in the application node, creates the name and belong to Property, and the java class information is stated in the name attribute.
In the present embodiment, in order to allow the executable file in APK installation kit to load in installation kit first at the beginning of operation Dynamic data base, need to navigate to name attribute in the application node of AndroidManifest.xml file, And a specific java class information is stated in name attribute, the specific java class information is as installation kit in Android The operation entrance run in system can load installation for making the new executable file when being run first Dynamic link library in packet.Therefore, in the embodiment shown in fig. 4, the application section in configuration file is navigated to first Point, and judge name attribute whether is contained in the node, if the node includes name attribute, directly in the name attribute It states a java class information, if the node does not include name attribute, first creates a name attribute, and in the name attribute Middle statement java class information.
It should be noted that needing the name attribute in application node signified in actual code implementation procedure To java class (for example, com.example.MyApplication) in, add following code:
Static{
System.LoadLibrary(“xxx”);
}
It can realize the calling of the dynamic link library to entitled libxxx.so.
As an embodiment of the present invention, after being modified to configuration file, can also by with it is executable The identical Encryption Algorithm of encrypted characters string in file, encrypts the character string in configuration file, to further increase application The safety of data in program installation kit.And during application program is installed, the executable file in installation kit is needing When calling the data in configuration file, the encryption data in configuration file can also be carried out by calling dynamic data base Decryption, to restore the initial data in configuration file.
In embodiments of the present invention, after completing relevant operation shown in Fig. 1 embodiment, it can be assembled into new answer With program installation kit, new application program installation kit can call dynamic link library to carry out data deciphering processing after operation, Original data are restored, installation is completed.
As an implementation example of the invention, Fig. 5 shows application program installation kit provided in an embodiment of the present invention Data convert process of the data guard method when carrying out application program installation, details are as follows:
In S501, application program installation kit is run.
In S502, the code in the application node in AndroidManifest file, load dynamic are executed Chained library.
In S503, the installation process of executing application.
In S504, judge whether the installation process of application program has met encrypted characters string, is to execute S505, otherwise Continue to execute S503.
In S505, the decryption method in dynamic link library is called, encrypted characters string is decrypted, original word is restored Symbol string, return continue to execute S503.
The encryption data in application program installation kit needs to run in application program installation kit and will be therein all as a result, File is discharged into after the hard disk or memory of terminal device, is restored in real time in whole installation process, if installation Packet is not run, then is directly to be analyzed and acquired by initial data from the file that installation kit extracts, through the above scheme, has The data safety of application program installation kit is ensured to effect.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install The data protection of packet has ensured the interests of application development team.
Fig. 6 shows the structural block diagram of the data protecting device of application program installation kit provided in an embodiment of the present invention, should Device is used to run the data guard method of application program installation kit described in Fig. 1 of the present invention to Fig. 5 embodiment.For the ease of saying Bright, only the parts related to this embodiment are shown.
Referring to Fig. 6, which includes:
Dynamic link library is added in the application program installation kit by adding unit 61, and the dynamic link library is used for Encrypted character string is decrypted.
First modification unit 62, encrypts the character string in the executable file in the application program installation kit, And the call method for calling the dynamic link library is added for the executable file, obtain new executable file.
Second modification unit 63, modifies the configuration file in the application program installation kit, so that described new can be performed File loads the dynamic link library first at runtime, to call the dynamic link library to the application in the process of running Encrypted characters string in program installation kit is decrypted, and completes application program installation.
Optionally, described device further include:
Judging unit judges whether the application program installation kit is compressed file form.
Decompression units, when the application program be compressed file form, decompress the application program installation kit.
Optionally, the first modification unit 62 includes:
Subelement is extracted, the character string in the executable file is extracted.
Encryption sub-unit operable encrypts to the character string each of is extracted, obtains the encrypted characters string.
Subelement is added, adds default marking head for each encrypted characters string.
The dynamic link library is for being decrypted the encrypted characters string comprising the default marking head.
Optionally, the first modification unit 62 is specifically used for:
All or part of character string in executable file in the application program installation kit is encrypted.
Optionally, the second modification unit 63 includes:
Locator unit positions the application node in the configuration file.
Whether judgment sub-unit judges in the application node comprising name attribute.
First statement unit, when in the application node including the name attribute, in the name attribute Middle statement java class information.
Second statement unit creates the name when not including the name attribute in the application node Attribute, and the java class information is stated in the name attribute.
The java class information loads the dynamic link for making the new executable file when being run first Library.
Optionally, described device further include:
Encryption unit, for being encrypted to the character string in the modified configuration file.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install The data protection of packet has ensured the interests of application development team.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (6)

1. a kind of data guard method of application program installation kit characterized by comprising
Judge whether application program installation kit is compressed file form;When the application program installation kit is compressed file form When, decompress the application program installation kit, obtain executable file where the code that the application program installation kit is compiled, File resource, certificate and configuration file;
Dynamic link library is added in the application program installation kit, so that the executable text in the application program installation kit Part in the process of implementation, can call the method in the dynamic link library, to encrypted character when needed String is decrypted;
String data in code in executable file in the application program installation kit is encrypted, and is described Executable file adds the call method for calling the dynamic link library, obtains new executable file;
Wherein, the string data in the code in the executable file in the application program installation kit encrypts It include: the character string extracted in the executable file;It is encrypted to the character string each of is extracted, obtains encrypted word Symbol string;Default marking head is added for each encrypted characters string;According to the default marking head, in the dynamic link library Corresponding decryption method is write, the dynamic link library is used to carry out the encrypted characters string comprising the default marking head Decryption;
The starting information in the configuration file in the application program installation kit is modified, so that the new executable file is being transported The dynamic link library is loaded when row, first to call the dynamic link library to install the application program in the process of running Encrypted characters string in packet is decrypted, and completes application program installation;
Character string in the modified configuration file is encrypted.
2. the method as described in claim 1, which is characterized in that the executable file in the application program installation kit In character string carry out encryption include:
Extract all or part of character string in the executable file in the application program installation kit, to described whole or Partial character string is encrypted.
3. the method as described in claim 1, which is characterized in that the configuration file in the modification application program installation kit Include:
Position the application node in the configuration file;
Whether judge in the application node comprising name attribute;
When in the application node including the name attribute, java class information is stated in the name attribute;
When not including the name attribute in the application node, the name attribute is created, and in the name The java class information is stated in attribute;
The java class information loads the dynamic link library for making the new executable file when being run first.
4. a kind of data protecting device of application program installation kit characterized by comprising
Judging unit, for judging whether the application program installation kit is compressed file form;
Decompression units, for decompressing the application program installation kit when the application program installation kit is compressed file form, Obtain executable file, file resource, certificate and the configuration file where the code that the application program installation kit is compiled;
Adding unit, for dynamic link library to be added in the application program installation kit, so that the application program is installed Executable file in packet in the process of implementation, can call the method in the dynamic link library when needed, with Encrypted character string is decrypted;
First modification unit, for the string data in the code in the executable file in the application program installation kit It is encrypted, and adds the call method for calling the dynamic link library for the executable file, obtain new hold Style of writing part;
Wherein, the first modification unit includes: extraction subelement, for extracting the character string in the executable file;Add Close subelement obtains encrypted characters string for encrypting to each of extracting the character string;Subelement is added, is used for Default marking head is added for each encrypted characters string;According to the default marking head, write in the dynamic link library Corresponding decryption method, the dynamic link library is for solving the encrypted characters string comprising the default marking head It is close;
Second modification unit, for modifying the starting information in the configuration file in the application program installation kit, so that described New executable file loads the dynamic link library first at runtime, to call the dynamic link library in the process of running Encrypted characters string in the application program installation kit is decrypted, application program installation is completed;
Encryption unit, for being encrypted to the character string in the modified configuration file.
5. device as claimed in claim 4, which is characterized in that the first modification unit is specifically used for:
Extract all or part of character string in the executable file in the application program installation kit, to described whole or Partial character string is encrypted.
6. device as claimed in claim 4, which is characterized in that described second, which modifies unit, includes:
Locator unit, for positioning the application node in the configuration file;
Judgment sub-unit, for whether judging in the application node comprising name attribute;
First statement unit, is used for when in the application node including the name attribute, in the name attribute Middle statement java class information;
Second statement unit, for creating the name when not including the name attribute in the application node Attribute, and the java class information is stated in the name attribute;
The java class information loads the dynamic link library for making the new executable file when being run first.
CN201310627721.0A 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit Active CN104680039B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310627721.0A CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit
PCT/CN2014/090843 WO2015078295A1 (en) 2013-11-28 2014-11-11 Method and apparatus for protecting data of application installation packages

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310627721.0A CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit

Publications (2)

Publication Number Publication Date
CN104680039A CN104680039A (en) 2015-06-03
CN104680039B true CN104680039B (en) 2019-02-26

Family

ID=53198346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310627721.0A Active CN104680039B (en) 2013-11-28 2013-11-28 A kind of data guard method and device of application program installation kit

Country Status (2)

Country Link
CN (1) CN104680039B (en)
WO (1) WO2015078295A1 (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105068832B (en) * 2015-07-30 2018-06-01 北京奇虎科技有限公司 A kind of method and apparatus for generating executable file
CN105426777B (en) * 2015-11-17 2018-09-21 中科创达软件股份有限公司 A kind of dynamic link library file encryption and decryption method and device
CN105512102A (en) * 2015-12-01 2016-04-20 北京交控科技股份有限公司 Data parse method and system
CN105930695B (en) * 2016-04-11 2019-03-19 江苏通付盾科技有限公司 Protection method and device for software development kit
CN106126290B (en) * 2016-06-27 2019-08-13 微梦创科网络科技(中国)有限公司 Application program optimization method, apparatus and system
CN106326693A (en) * 2016-08-18 2017-01-11 广州优视网络科技有限公司 Obfuscation method and obfuscation device for application program code
CN107766096A (en) * 2016-08-19 2018-03-06 阿里巴巴集团控股有限公司 The generation method of application program installation kit, the operation method of application program and device
CN106708571A (en) * 2016-12-13 2017-05-24 北京奇虎科技有限公司 Resource file loading method and device and source file reinforcing method and device
CN106845169B (en) * 2016-12-26 2023-04-07 北京握奇智能科技有限公司 Jar package reinforcing method and system
CN107122632A (en) * 2017-04-26 2017-09-01 北京洋浦伟业科技发展有限公司 The encryption method and device of software installation bag
CN111104648B (en) * 2018-10-29 2024-06-18 鸿合科技股份有限公司 Software processing method and device, storage medium and electronic equipment
CN110135131B (en) * 2019-05-13 2021-04-06 北京智游网安科技有限公司 Encryption method of application program, storage medium and terminal equipment
CN111813460B (en) * 2020-06-01 2024-08-23 北京百卓网络技术有限公司 Access method, device, equipment and storage medium for application program matched files
CN111753330B (en) * 2020-06-18 2023-08-29 百度在线网络技术(北京)有限公司 Determination method, apparatus, device and readable storage medium for data leakage main body
CN112214253B (en) * 2020-09-11 2024-02-02 拓尔思信息技术股份有限公司 Java program starting method and device, electronic device and nonvolatile storage medium
CN112486542A (en) * 2020-12-10 2021-03-12 卡斯柯信号有限公司 Configuration file generation and updating method and system based on dynamic link library
CN118445773B (en) * 2024-04-24 2024-09-27 中国航发贵州黎阳航空动力有限公司 Method for encrypting and running NX post-processing program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102087605A (en) * 2011-01-28 2011-06-08 宇龙计算机通信科技(深圳)有限公司 Android-based platform application installation control method and system
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102346834A (en) * 2011-11-25 2012-02-08 武汉钢铁(集团)公司 Method for encrypting and protecting Java application software
CN103413076A (en) * 2013-08-27 2013-11-27 北京理工大学 Block protection method for Android application programs

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009512087A (en) * 2005-10-17 2009-03-19 エヌエックスピー ビー ヴィ Encrypting program executable images
CN101256612B (en) * 2008-04-01 2010-11-03 北京飞天诚信科技有限公司 Program protection method and system based on .Net card
CN103140856B (en) * 2011-09-13 2016-02-17 松下电器产业株式会社 Content regeneration system, the information processing terminal, media server, safety device and server security device
CN103413075B (en) * 2013-07-10 2016-05-04 北京深思数盾科技股份有限公司 A kind of method and apparatus of protecting JAVA executable program by virtual machine

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102087605A (en) * 2011-01-28 2011-06-08 宇龙计算机通信科技(深圳)有限公司 Android-based platform application installation control method and system
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102346834A (en) * 2011-11-25 2012-02-08 武汉钢铁(集团)公司 Method for encrypting and protecting Java application software
CN103413076A (en) * 2013-08-27 2013-11-27 北京理工大学 Block protection method for Android application programs

Also Published As

Publication number Publication date
CN104680039A (en) 2015-06-03
WO2015078295A1 (en) 2015-06-04

Similar Documents

Publication Publication Date Title
CN104680039B (en) A kind of data guard method and device of application program installation kit
EP3038004A1 (en) Method for providing security for common intermediate language-based program
EP2962193B1 (en) Compiler based obfuscation
CN105683990B (en) Method and apparatus for protecting dynamic base
US11263311B2 (en) Securing virtual-machine software applications
US8090959B2 (en) Method and apparatus for protecting .net programs
CN107908392B (en) Data acquisition kit customization method and device, terminal and storage medium
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
JP2019505887A (en) Mobile device with reliable execution environment
KR101623096B1 (en) Apparatus and method for managing apk file in a android platform
CN108399319B (en) Source code protection method, application server and computer readable storage medium
CN107273723B (en) So file shell adding-based Android platform application software protection method
CN106415491B (en) Application protection method, server and terminal
CN107077540B (en) Method and system for providing cloud-based application security services
CN104866739A (en) Application program encryption method and application program encryption system in Android system
CN108133147B (en) Method and device for protecting executable code and readable storage medium
CN107871066B (en) Code compiling method and device based on android system
US10867017B2 (en) Apparatus and method of providing security and apparatus and method of executing security for common intermediate language
KR101734663B1 (en) Method for preventing reverse engineering of android application and apparatus for performing the method
CN110472425A (en) Unity plug-in unit encryption method based on Mono, storage medium
Pan et al. Advertisement removal of Android applications by reverse engineering
KR101667774B1 (en) Apparatus and Method of Providing Security for Script Program
CN112115430A (en) Apk reinforcement method, electronic equipment and storage medium
KR20180028666A (en) Method and apparatus for preventing reverse engineering
JP6215468B2 (en) Program protector

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant