CN104680039B - A kind of data guard method and device of application program installation kit - Google Patents
A kind of data guard method and device of application program installation kit Download PDFInfo
- Publication number
- CN104680039B CN104680039B CN201310627721.0A CN201310627721A CN104680039B CN 104680039 B CN104680039 B CN 104680039B CN 201310627721 A CN201310627721 A CN 201310627721A CN 104680039 B CN104680039 B CN 104680039B
- Authority
- CN
- China
- Prior art keywords
- application program
- installation kit
- program installation
- dynamic link
- link library
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 238000012986 modification Methods 0.000 claims description 16
- 230000004048 modification Effects 0.000 claims description 16
- 239000000284 extract Substances 0.000 claims description 6
- 230000006837 decompression Effects 0.000 claims description 4
- 108010001267 Protein Subunits Proteins 0.000 claims 1
- 238000000605 extraction Methods 0.000 claims 1
- 238000009434 installation Methods 0.000 abstract description 57
- 238000011161 development Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 7
- 238000011900 installation process Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 102000006479 Heterogeneous-Nuclear Ribonucleoproteins Human genes 0.000 description 1
- 108010019372 Heterogeneous-Nuclear Ribonucleoproteins Proteins 0.000 description 1
- 230000006854 communication Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
The present invention is suitable for software technology field, provides the data guard method and device of a kind of application program installation kit, comprising: dynamic link library is added in the application program installation kit, the dynamic link library is for being decrypted encrypted character string;Character string in executable file in the application program installation kit is encrypted, and adds the call method for calling the dynamic link library for the executable file, obtains new executable file;Modify the configuration file in the application program installation kit, so that the new executable file loads the dynamic link library first at runtime, to call the dynamic link library that the encrypted characters string in the application program installation kit is decrypted in the process of running, application program installation is completed.The case where being directly leaked to non-developer before installation kit operation the invention avoids the data in installation kit appearance, has effectively achieved the data protection to application program installation kit.
Description
Technical field
The invention belongs to software technology field more particularly to a kind of data guard methods and dress of application program installation kit
It sets.
Background technique
In today of mobile terminal software and hardware level rapid development, the exploitation of application program for mobile terminal is also maked rapid progress,
There is the application program of magnanimity to be added in electronic market daily, it, can be whenever and wherever possible by mobile terminal accessing internet
Realize that the downloading to these application programs is installed in ground.
However, measure is effectively protected to the data deficiency in application program for mobile terminal installation kit in the prior art, it is any
People can get installation kit by electronic market or other sharing channels, extract the file in installation kit, parsing obtains
Critical data in file, this rival for allowing for some application development team can be easily by analyzing this
A little critical datas realize details to steal some important technologies in application program, or make some criminals by dividing
These critical datas are analysed to obtain the important informations such as server address of the application program in communication process, carry out network attack,
Above-mentioned phenomenon causes the interests loss of application development team.
Summary of the invention
A kind of data guard method for being designed to provide application program installation kit of the embodiment of the present invention solves to move at present
The problem of data in dynamic end application installation kit are unable to get effective protection.
The embodiments of the present invention are implemented as follows, a kind of data guard method of application program installation kit, comprising:
Dynamic link library is added in the application program installation kit, the dynamic link library is used for encrypted word
Symbol string is decrypted;
Character string in executable file in the application program installation kit is encrypted, and is the executable text
Part adds the call method for calling the dynamic link library, obtains new executable file;
The configuration file in the application program installation kit is modified, so that the new executable file is at runtime first
The dynamic link library is loaded, to call the dynamic link library to adding in the application program installation kit in the process of running
Close character string is decrypted, and completes application program installation.
The another object of the embodiment of the present invention is to provide a kind of data protecting device of application program installation kit, comprising:
Adding unit, for dynamic link library to be added in the application program installation kit, the dynamic link library is used
It is decrypted in encrypted character string;
First modification unit, for adding to the character string in the executable file in the application program installation kit
It is close, and the call method for calling the dynamic link library is added for the executable file, obtain new executable file;
Second modification unit, for modifying the configuration file in the application program installation kit, so that described new holds
Style of writing part loads the dynamic link library first at runtime, to call the dynamic link library to answer described in the process of running
It is decrypted with the encrypted characters string in program installation kit, completes application program installation.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit
Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation
It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit
Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install
The data protection of packet has ensured the interests of application development team.
Detailed description of the invention
Fig. 1 is the implementation flow chart of the data guard method of application program installation kit provided in an embodiment of the present invention;
Fig. 2 be another embodiment of the present invention provides application program installation kit data guard method implementation flow chart;
Fig. 3 is the specific implementation flow of the data guard method S102 of application program installation kit provided in an embodiment of the present invention
Figure;
Fig. 4 is the specific implementation flow of the data guard method S103 of application program installation kit provided in an embodiment of the present invention
Figure;
Fig. 5 is that the data guard method of application program installation kit provided in an embodiment of the present invention is installed about application program
Implementation example figure;
Fig. 6 is the structural block diagram of the data protecting device of application program installation kit provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit
Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation
It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit
Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install
The data protection of packet has ensured the interests of application development team.
Wherein, application program installation kit described in the embodiment of the present invention is typically included and installs application program in packet
The required All Files used when into terminal device, and these files are usually to compress in set to installation kit.When
After installation kit is downloaded or is copied on terminal device and is given and execute instruction, installation kit can voluntarily decompress institute therein
There is file, All Files therein are discharged on the hard disk or memory of terminal device, rerun executable file therein,
The operations such as modification registration table, the setting of modification system, creation shortcut are executed, to complete the installation of application program.Exactly by
After installation kit has once been given and has executed instruction, file therein will necessarily be released to the hard disk or interior of terminal device
It deposits, at this point, the data in file have occurred that modification, the initial data being not stored in installation package file, if herein
When data are parsed again, some important technologies for being difficult to get application program realize details or important information, therefore,
The rival of application development team or some criminals would generally be before installation kit operations, by from installation kit
In directly extract the mode of file, resolution file is to get the initial data in installation kit.And the embodiment of the present invention provides
Application program installation kit data guard method and device, exactly have been directed to the data of application program installation kit before runtime
Link of protection prevents the data in installation kit from directly being revealed before installation kit operation.
It should be noted that due to the operation of application program installation kit be by execute installation kit in executable file come
It completes, therefore, in embodiments of the present invention, the operation application program installation kit is equal to the operation executable file,
It is no longer explained one by one in subsequent embodiment.
It should be noted that next for being suitable for the application program installation kit of android system, to the present invention
The data guard method and device for the application program installation kit that embodiment provides are described in detail, it is contemplated that being based on
Identical realization principle, the embodiment of the present invention, which also can operate with other, can support application program provided in an embodiment of the present invention to pacify
Fill packet data guard method and device realize application program installation kit in, for example, windows system, linux system and
Application program installation kit of other kinds of Mobile operating system, etc., herein a different citing.
Fig. 1 shows the implementation process of the data guard method of application program installation kit provided in an embodiment of the present invention, in detail
It states as follows:
In S101, dynamic link library is added in the application program installation kit, the dynamic link library for pair
Encrypted character string is decrypted.
It is usually to be packaged into application program APMB package for the application program installation kit of android system
(application package file), i.e. APK installation kit, therefore, as an embodiment of the present invention, as shown in Fig. 2,
Before S101, the method also includes:
In S201, judge whether the application program installation kit is compressed file form.
In S202, when the application program be compressed file form, decompress the application program installation kit.
That is, for installation kit existing in the form of compressed file, it in the embodiment depicted in figure 2, can be first according to normal solution
Compression processing process unzips it application program installation kit, necessary to obtain institute in installation kit as defined in android system
The installation file having.In general, executable file (the .dex text where containing the code being compiled in an APK installation kit
Part), file resource (resources), certificate (certificates) and configuration file (manifest file), etc., this
A little files can obtain after decompression.
For the developer of application program, it can also be directly obtained un-compressed application program peace
Dress packet, directly extracts the file in un-compressed application program installation kit, or to un-compressed application program installation kit
It is directly handled, at this point, can then not need to execute decompression step described in Fig. 2 embodiment before executing S101.
In the present embodiment, need to write the dynamic link library (Dynamic for decrypting encrypted character string in advance
Link Library, DLL), and the dynamic link library for writing completion is added in application program installation kit, wherein dynamic chain
Connecing the decipherment algorithm for including in library needs the Encryption Algorithm for the encrypted characters string decrypted with it to match.
In the present embodiment, the dynamic link library is one comprising can be by multiple programs while the code used and data
Library, and non-executable file, but provide a method allows process to call the letter for being not belonging to its executable code
Number.In the present embodiment, the dynamic link library for writing generation is added in application program installation kit so that in installation kit can
It executes file in the process of implementation, the method in dynamic link library can be called when needed, to encrypted word
Symbol string is decrypted, and specific process will be described in detail in subsequent embodiment, and details are not described herein.
In the present embodiment, the decrypted code for including in dynamic link library can be write with Java language, and in order to protect
Initial data in card application program installation kit is not decrypted easily, and the decrypted code for including in dynamic link library can be using more
It is write for the C Plus Plus of bottom.
In S102, the character string in the executable file in the application program installation kit is encrypted, and is institute
It states executable file and adds call method for calling the dynamic link library, obtain new executable file.
In S102, need to handle the executable file in application program installation kit, it will be in executable file
The string data for including in code is encrypted.For android system, according to its relevant development specifications,
Executable file in its APK installation kit is usually the file of the entitled classes.dex of file.In the present embodiment, added
When close processing, without encrypting to whole codes in executable file, and string data therein need to be only encrypted, example
Such as, the string data of hard coded in code is encrypted.
In the concrete realization, the code in classes.dex can be become by tools such as baksmali, ApkTool
The text file of smali grammer, at this point, the character string of the hard coded in smali will be shown as follows:
const-string v0,"QQPIM.ProductVersion"
const-string v0,"http://login.qq.com/do"
Wherein, character string " QQPIM.ProductVersion " and " http://login.qq.com/do " exactly need into
The character string of the hard coded of row encryption, normally comprises the important letter such as version, type, server address of application program here
Breath.
In addition, as an embodiment of the present invention, it, can also spirit for the string data in executable file code
It selects to encrypt alphabet string therein or partial character string livingly.
In the present embodiment, the Encryption Algorithm of character string is not used in the restriction present invention herein, but Encryption Algorithm is needed and compiled
The decipherment algorithm for including in the dynamic link library write matches.
As an embodiment of the present invention, in order to improve the efficiency for decrypting character string, as shown in figure 3, described in S102
Character string in executable file in the application program installation kit is encrypted specifically:
In S301, the character string in the executable file is extracted.
In S302, is encrypted to the character string each of is extracted, obtain the encrypted characters string.
In S303, default marking head is added for each encrypted characters string.
That is, for the character string that encryption is completed, adding preset mark in encryption process for the encrypted characters string
Head belongs to the character string of the marking head and have passed through encryption, in this way, by arranging the default mark for indicating
Head writes corresponding decryption method in dynamic link library, when calling dynamic link library to carry out the decryption of encrypted characters string, dynamic
Chained library only needs to identify the character string for being added to default marking head in code, this partial character string is decrypted i.e.
Can, which thereby enhance the decryption efficiency to encrypted characters string.
In the present embodiment, the character string in the executable file in the application program installation kit is encrypted same
When, the call method for calling the dynamic link library is added for executable file, so that executable file can held
During line code, the method in dynamic link library is called when needed, to solve to encrypted character string
Close, specific process will be described in detail in subsequent embodiment, and details are not described herein.
It is encrypted to the character string in the executable file in the application program installation kit, and is executable file
After adding the call method for calling the dynamic link library, new executable file has been obtained.
In S103, the configuration file in the application program installation kit is modified, so that the new executable file exists
The dynamic link library is loaded when operation, first to call the dynamic link library to pacify the application program in the process of running
Encrypted characters string in dress packet is decrypted, and completes application program installation.
After generating new executable file in S102, it is also necessary to the configuration file in application program installation kit is modified,
To guarantee that new executable file when being run, can load dynamic link library first, thus in the process of running, when encountering
When encrypted characters string, it can call dynamic link library that encrypted characters string is decrypted, to restore in executable file
Initial data completes application program installation.
Wherein, for android system, according to relevant development specifications, configuration file is that file is entitled
The file of AndroidManifest.xml is the configuration file for configuring application program installation package informatin, the letter of configuration
Breath includes but is not limited to application name, application version, interface assembly, authority information, starting information, etc..
When the decrypted code for including in dynamic link library using the C Plus Plus of more bottom to write when, need by Java
Code realizes the calling of dynamic link library, says to the format of AndroidManifest.xml file according to android system
It is bright, as shown in figure 4, S103 specifically:
In S401, the application node in the configuration file is positioned.
In S402, whether judge in the application node comprising name attribute.
In S403, when in the application node including the name attribute, the sound in the name attribute
Bright java class information.
In S404, when not including the name attribute in the application node, creates the name and belong to
Property, and the java class information is stated in the name attribute.
In the present embodiment, in order to allow the executable file in APK installation kit to load in installation kit first at the beginning of operation
Dynamic data base, need to navigate to name attribute in the application node of AndroidManifest.xml file,
And a specific java class information is stated in name attribute, the specific java class information is as installation kit in Android
The operation entrance run in system can load installation for making the new executable file when being run first
Dynamic link library in packet.Therefore, in the embodiment shown in fig. 4, the application section in configuration file is navigated to first
Point, and judge name attribute whether is contained in the node, if the node includes name attribute, directly in the name attribute
It states a java class information, if the node does not include name attribute, first creates a name attribute, and in the name attribute
Middle statement java class information.
It should be noted that needing the name attribute in application node signified in actual code implementation procedure
To java class (for example, com.example.MyApplication) in, add following code:
Static{
System.LoadLibrary(“xxx”);
}
It can realize the calling of the dynamic link library to entitled libxxx.so.
As an embodiment of the present invention, after being modified to configuration file, can also by with it is executable
The identical Encryption Algorithm of encrypted characters string in file, encrypts the character string in configuration file, to further increase application
The safety of data in program installation kit.And during application program is installed, the executable file in installation kit is needing
When calling the data in configuration file, the encryption data in configuration file can also be carried out by calling dynamic data base
Decryption, to restore the initial data in configuration file.
In embodiments of the present invention, after completing relevant operation shown in Fig. 1 embodiment, it can be assembled into new answer
With program installation kit, new application program installation kit can call dynamic link library to carry out data deciphering processing after operation,
Original data are restored, installation is completed.
As an implementation example of the invention, Fig. 5 shows application program installation kit provided in an embodiment of the present invention
Data convert process of the data guard method when carrying out application program installation, details are as follows:
In S501, application program installation kit is run.
In S502, the code in the application node in AndroidManifest file, load dynamic are executed
Chained library.
In S503, the installation process of executing application.
In S504, judge whether the installation process of application program has met encrypted characters string, is to execute S505, otherwise
Continue to execute S503.
In S505, the decryption method in dynamic link library is called, encrypted characters string is decrypted, original word is restored
Symbol string, return continue to execute S503.
The encryption data in application program installation kit needs to run in application program installation kit and will be therein all as a result,
File is discharged into after the hard disk or memory of terminal device, is restored in real time in whole installation process, if installation
Packet is not run, then is directly to be analyzed and acquired by initial data from the file that installation kit extracts, through the above scheme, has
The data safety of application program installation kit is ensured to effect.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit
Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation
It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit
Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install
The data protection of packet has ensured the interests of application development team.
Fig. 6 shows the structural block diagram of the data protecting device of application program installation kit provided in an embodiment of the present invention, should
Device is used to run the data guard method of application program installation kit described in Fig. 1 of the present invention to Fig. 5 embodiment.For the ease of saying
Bright, only the parts related to this embodiment are shown.
Referring to Fig. 6, which includes:
Dynamic link library is added in the application program installation kit by adding unit 61, and the dynamic link library is used for
Encrypted character string is decrypted.
First modification unit 62, encrypts the character string in the executable file in the application program installation kit,
And the call method for calling the dynamic link library is added for the executable file, obtain new executable file.
Second modification unit 63, modifies the configuration file in the application program installation kit, so that described new can be performed
File loads the dynamic link library first at runtime, to call the dynamic link library to the application in the process of running
Encrypted characters string in program installation kit is decrypted, and completes application program installation.
Optionally, described device further include:
Judging unit judges whether the application program installation kit is compressed file form.
Decompression units, when the application program be compressed file form, decompress the application program installation kit.
Optionally, the first modification unit 62 includes:
Subelement is extracted, the character string in the executable file is extracted.
Encryption sub-unit operable encrypts to the character string each of is extracted, obtains the encrypted characters string.
Subelement is added, adds default marking head for each encrypted characters string.
The dynamic link library is for being decrypted the encrypted characters string comprising the default marking head.
Optionally, the first modification unit 62 is specifically used for:
All or part of character string in executable file in the application program installation kit is encrypted.
Optionally, the second modification unit 63 includes:
Locator unit positions the application node in the configuration file.
Whether judgment sub-unit judges in the application node comprising name attribute.
First statement unit, when in the application node including the name attribute, in the name attribute
Middle statement java class information.
Second statement unit creates the name when not including the name attribute in the application node
Attribute, and the java class information is stated in the name attribute.
The java class information loads the dynamic link for making the new executable file when being run first
Library.
Optionally, described device further include:
Encryption unit, for being encrypted to the character string in the modified configuration file.
In the embodiment of the present invention, before application program installation kit is externally issued, by being carried out to the data in installation kit
Encryption, and addition is used for the dynamic link library of ciphertext data in installation kit, so that installation kit can after operation
It calls dynamic link library to carry out data deciphering processing, restores original data, complete installation.This programme avoids in installation kit
Data installation kit operation before be directly leaked to non-developer the case where appearance, have effectively achieved to application program install
The data protection of packet has ensured the interests of application development team.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (6)
1. a kind of data guard method of application program installation kit characterized by comprising
Judge whether application program installation kit is compressed file form;When the application program installation kit is compressed file form
When, decompress the application program installation kit, obtain executable file where the code that the application program installation kit is compiled,
File resource, certificate and configuration file;
Dynamic link library is added in the application program installation kit, so that the executable text in the application program installation kit
Part in the process of implementation, can call the method in the dynamic link library, to encrypted character when needed
String is decrypted;
String data in code in executable file in the application program installation kit is encrypted, and is described
Executable file adds the call method for calling the dynamic link library, obtains new executable file;
Wherein, the string data in the code in the executable file in the application program installation kit encrypts
It include: the character string extracted in the executable file;It is encrypted to the character string each of is extracted, obtains encrypted word
Symbol string;Default marking head is added for each encrypted characters string;According to the default marking head, in the dynamic link library
Corresponding decryption method is write, the dynamic link library is used to carry out the encrypted characters string comprising the default marking head
Decryption;
The starting information in the configuration file in the application program installation kit is modified, so that the new executable file is being transported
The dynamic link library is loaded when row, first to call the dynamic link library to install the application program in the process of running
Encrypted characters string in packet is decrypted, and completes application program installation;
Character string in the modified configuration file is encrypted.
2. the method as described in claim 1, which is characterized in that the executable file in the application program installation kit
In character string carry out encryption include:
Extract all or part of character string in the executable file in the application program installation kit, to described whole or
Partial character string is encrypted.
3. the method as described in claim 1, which is characterized in that the configuration file in the modification application program installation kit
Include:
Position the application node in the configuration file;
Whether judge in the application node comprising name attribute;
When in the application node including the name attribute, java class information is stated in the name attribute;
When not including the name attribute in the application node, the name attribute is created, and in the name
The java class information is stated in attribute;
The java class information loads the dynamic link library for making the new executable file when being run first.
4. a kind of data protecting device of application program installation kit characterized by comprising
Judging unit, for judging whether the application program installation kit is compressed file form;
Decompression units, for decompressing the application program installation kit when the application program installation kit is compressed file form,
Obtain executable file, file resource, certificate and the configuration file where the code that the application program installation kit is compiled;
Adding unit, for dynamic link library to be added in the application program installation kit, so that the application program is installed
Executable file in packet in the process of implementation, can call the method in the dynamic link library when needed, with
Encrypted character string is decrypted;
First modification unit, for the string data in the code in the executable file in the application program installation kit
It is encrypted, and adds the call method for calling the dynamic link library for the executable file, obtain new hold
Style of writing part;
Wherein, the first modification unit includes: extraction subelement, for extracting the character string in the executable file;Add
Close subelement obtains encrypted characters string for encrypting to each of extracting the character string;Subelement is added, is used for
Default marking head is added for each encrypted characters string;According to the default marking head, write in the dynamic link library
Corresponding decryption method, the dynamic link library is for solving the encrypted characters string comprising the default marking head
It is close;
Second modification unit, for modifying the starting information in the configuration file in the application program installation kit, so that described
New executable file loads the dynamic link library first at runtime, to call the dynamic link library in the process of running
Encrypted characters string in the application program installation kit is decrypted, application program installation is completed;
Encryption unit, for being encrypted to the character string in the modified configuration file.
5. device as claimed in claim 4, which is characterized in that the first modification unit is specifically used for:
Extract all or part of character string in the executable file in the application program installation kit, to described whole or
Partial character string is encrypted.
6. device as claimed in claim 4, which is characterized in that described second, which modifies unit, includes:
Locator unit, for positioning the application node in the configuration file;
Judgment sub-unit, for whether judging in the application node comprising name attribute;
First statement unit, is used for when in the application node including the name attribute, in the name attribute
Middle statement java class information;
Second statement unit, for creating the name when not including the name attribute in the application node
Attribute, and the java class information is stated in the name attribute;
The java class information loads the dynamic link library for making the new executable file when being run first.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310627721.0A CN104680039B (en) | 2013-11-28 | 2013-11-28 | A kind of data guard method and device of application program installation kit |
PCT/CN2014/090843 WO2015078295A1 (en) | 2013-11-28 | 2014-11-11 | Method and apparatus for protecting data of application installation packages |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310627721.0A CN104680039B (en) | 2013-11-28 | 2013-11-28 | A kind of data guard method and device of application program installation kit |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104680039A CN104680039A (en) | 2015-06-03 |
CN104680039B true CN104680039B (en) | 2019-02-26 |
Family
ID=53198346
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310627721.0A Active CN104680039B (en) | 2013-11-28 | 2013-11-28 | A kind of data guard method and device of application program installation kit |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104680039B (en) |
WO (1) | WO2015078295A1 (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105068832B (en) * | 2015-07-30 | 2018-06-01 | 北京奇虎科技有限公司 | A kind of method and apparatus for generating executable file |
CN105426777B (en) * | 2015-11-17 | 2018-09-21 | 中科创达软件股份有限公司 | A kind of dynamic link library file encryption and decryption method and device |
CN105512102A (en) * | 2015-12-01 | 2016-04-20 | 北京交控科技股份有限公司 | Data parse method and system |
CN105930695B (en) * | 2016-04-11 | 2019-03-19 | 江苏通付盾科技有限公司 | Protection method and device for software development kit |
CN106126290B (en) * | 2016-06-27 | 2019-08-13 | 微梦创科网络科技(中国)有限公司 | Application program optimization method, apparatus and system |
CN106326693A (en) * | 2016-08-18 | 2017-01-11 | 广州优视网络科技有限公司 | Obfuscation method and obfuscation device for application program code |
CN107766096A (en) * | 2016-08-19 | 2018-03-06 | 阿里巴巴集团控股有限公司 | The generation method of application program installation kit, the operation method of application program and device |
CN106708571A (en) * | 2016-12-13 | 2017-05-24 | 北京奇虎科技有限公司 | Resource file loading method and device and source file reinforcing method and device |
CN106845169B (en) * | 2016-12-26 | 2023-04-07 | 北京握奇智能科技有限公司 | Jar package reinforcing method and system |
CN107122632A (en) * | 2017-04-26 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | The encryption method and device of software installation bag |
CN111104648B (en) * | 2018-10-29 | 2024-06-18 | 鸿合科技股份有限公司 | Software processing method and device, storage medium and electronic equipment |
CN110135131B (en) * | 2019-05-13 | 2021-04-06 | 北京智游网安科技有限公司 | Encryption method of application program, storage medium and terminal equipment |
CN111813460B (en) * | 2020-06-01 | 2024-08-23 | 北京百卓网络技术有限公司 | Access method, device, equipment and storage medium for application program matched files |
CN111753330B (en) * | 2020-06-18 | 2023-08-29 | 百度在线网络技术(北京)有限公司 | Determination method, apparatus, device and readable storage medium for data leakage main body |
CN112214253B (en) * | 2020-09-11 | 2024-02-02 | 拓尔思信息技术股份有限公司 | Java program starting method and device, electronic device and nonvolatile storage medium |
CN112486542A (en) * | 2020-12-10 | 2021-03-12 | 卡斯柯信号有限公司 | Configuration file generation and updating method and system based on dynamic link library |
CN118445773B (en) * | 2024-04-24 | 2024-09-27 | 中国航发贵州黎阳航空动力有限公司 | Method for encrypting and running NX post-processing program |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102087605A (en) * | 2011-01-28 | 2011-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Android-based platform application installation control method and system |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102346834A (en) * | 2011-11-25 | 2012-02-08 | 武汉钢铁(集团)公司 | Method for encrypting and protecting Java application software |
CN103413076A (en) * | 2013-08-27 | 2013-11-27 | 北京理工大学 | Block protection method for Android application programs |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009512087A (en) * | 2005-10-17 | 2009-03-19 | エヌエックスピー ビー ヴィ | Encrypting program executable images |
CN101256612B (en) * | 2008-04-01 | 2010-11-03 | 北京飞天诚信科技有限公司 | Program protection method and system based on .Net card |
CN103140856B (en) * | 2011-09-13 | 2016-02-17 | 松下电器产业株式会社 | Content regeneration system, the information processing terminal, media server, safety device and server security device |
CN103413075B (en) * | 2013-07-10 | 2016-05-04 | 北京深思数盾科技股份有限公司 | A kind of method and apparatus of protecting JAVA executable program by virtual machine |
-
2013
- 2013-11-28 CN CN201310627721.0A patent/CN104680039B/en active Active
-
2014
- 2014-11-11 WO PCT/CN2014/090843 patent/WO2015078295A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102087605A (en) * | 2011-01-28 | 2011-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Android-based platform application installation control method and system |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102346834A (en) * | 2011-11-25 | 2012-02-08 | 武汉钢铁(集团)公司 | Method for encrypting and protecting Java application software |
CN103413076A (en) * | 2013-08-27 | 2013-11-27 | 北京理工大学 | Block protection method for Android application programs |
Also Published As
Publication number | Publication date |
---|---|
CN104680039A (en) | 2015-06-03 |
WO2015078295A1 (en) | 2015-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104680039B (en) | A kind of data guard method and device of application program installation kit | |
EP3038004A1 (en) | Method for providing security for common intermediate language-based program | |
EP2962193B1 (en) | Compiler based obfuscation | |
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
US11263311B2 (en) | Securing virtual-machine software applications | |
US8090959B2 (en) | Method and apparatus for protecting .net programs | |
CN107908392B (en) | Data acquisition kit customization method and device, terminal and storage medium | |
CN106203006A (en) | Android application reinforcement means based on dex Yu so file Dynamic Execution | |
JP2019505887A (en) | Mobile device with reliable execution environment | |
KR101623096B1 (en) | Apparatus and method for managing apk file in a android platform | |
CN108399319B (en) | Source code protection method, application server and computer readable storage medium | |
CN107273723B (en) | So file shell adding-based Android platform application software protection method | |
CN106415491B (en) | Application protection method, server and terminal | |
CN107077540B (en) | Method and system for providing cloud-based application security services | |
CN104866739A (en) | Application program encryption method and application program encryption system in Android system | |
CN108133147B (en) | Method and device for protecting executable code and readable storage medium | |
CN107871066B (en) | Code compiling method and device based on android system | |
US10867017B2 (en) | Apparatus and method of providing security and apparatus and method of executing security for common intermediate language | |
KR101734663B1 (en) | Method for preventing reverse engineering of android application and apparatus for performing the method | |
CN110472425A (en) | Unity plug-in unit encryption method based on Mono, storage medium | |
Pan et al. | Advertisement removal of Android applications by reverse engineering | |
KR101667774B1 (en) | Apparatus and Method of Providing Security for Script Program | |
CN112115430A (en) | Apk reinforcement method, electronic equipment and storage medium | |
KR20180028666A (en) | Method and apparatus for preventing reverse engineering | |
JP6215468B2 (en) | Program protector |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |