CN106293852A - A kind of method and apparatus of the resource file reinforcing installation kit - Google Patents
A kind of method and apparatus of the resource file reinforcing installation kit Download PDFInfo
- Publication number
- CN106293852A CN106293852A CN201610698034.1A CN201610698034A CN106293852A CN 106293852 A CN106293852 A CN 106293852A CN 201610698034 A CN201610698034 A CN 201610698034A CN 106293852 A CN106293852 A CN 106293852A
- Authority
- CN
- China
- Prior art keywords
- resource file
- resource
- installation kit
- decryption program
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The method and apparatus that the invention discloses a kind of resource file reinforcing installation kit, the method comprise the steps that the resource file extracting installation kit, is encrypted the resource file extracted, and replaces the former resource file in described installation kit with the resource file after encryption;Generate resource decryption program to be inserted in described installation kit.This technical scheme is only for the resource file in installation kit; do not affect the alternative document in installation kit; and the effective protection to resource file can be realized; even if installation kit is unpacked; it also is difficult to resource file therein is cracked, meets the demand that developer carries out for resource file protecting.
Description
Technical field
The present invention relates to information security field, particularly to the method and apparatus of a kind of resource file reinforcing installation kit.
Background technology
Apply the form often through installation kit to be issued on intelligent terminal, user install.If installation kit is not
Reinforced process, it is easy to through processing after being depacketized, it is achieved the amendment to installation kit, this is that developer is not intended to see
's.
In prior art, reinforcing often by the integral reinforcing to installation kit or to holding in installation kit of installation kit
Style of writing part carries out reinforcing and realizes, but, the ample resources file in installation kit is also that many developers wish protection, lack
A kind of few method preferably resource file of installation kit reinforced.
Summary of the invention
In view of the above problems, it is proposed that the present invention in case provide one overcome the problems referred to above or at least in part solve on
The method and apparatus stating the resource file reinforcing installation kit of problem.
According to one aspect of the present invention, it is provided that a kind of method of resource file reinforcing installation kit, including:
Extract the resource file of installation kit, the resource file extracted is encrypted, replace with the resource file after encryption
Former resource file in described installation kit;
Generate resource decryption program to be inserted in described installation kit.
Alternatively, the method farther includes:
After described installation kit is mounted, when starting corresponding application, described resource decryption program actively load every time
Resource file after described encryption, and by described resource decryption program, the resource file after described encryption is decrypted, obtain
Resource file after deciphering.
Alternatively, described actively loaded the resource file after described encryption by described resource decryption program, and by described money
Resource file after described encryption is decrypted and includes by source decryption program:
Whether the correlation function being monitored read/write resource file by the hook program in described resource decryption program is called;
The resource literary composition after described encryption is loaded by the API loading resource file of described decryption program reflection calling system
Part;
When the correlation function monitoring read/write resource file is called, intercept the relevant letter of this read/write resource file
Number, described resource decryption program the decryption logic himself comprised inserts in the correlation function of this read/write resource file;By
Resource file after described encryption is decrypted by described decryption logic, the resource file after being deciphered.
Alternatively, the API loading resource file of described decryption program reflection calling system after loading described encryption
Resource file includes:
Called the addAssetPath method of AssetManager apoplexy due to endogenous wind by the reflection of described decryption program, load described encryption
After resource file.
Alternatively, the method farther includes:
Return the result of the API loading resource file of calling system.
Alternatively, the resource file of described extraction installation kit, the resource file extracted is encrypted and includes:
Extract the assets catalogue of installation kit, and this catalogue is carried out overall encryption.
Alternatively, described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is stated, after described installation kit is mounted, when starting corresponding application, in this application every time
Application apoplexy due to endogenous wind call described resource decryption program.
Alternatively, described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is increased shell;
Generate resource decryption program to be inserted in described shell.
According to another aspect of the present invention, it is provided that the device of a kind of resource file reinforcing installation kit, including:
Ciphering unit, is suitable to extract the resource file of installation kit, is encrypted the resource file extracted, after encryption
Resource file replaces the former resource file in described installation kit;Generate resource decryption program to be inserted in described installation kit.
Alternatively, after described installation kit is mounted, when starting corresponding application, by described resource decryption program master every time
Resource file after the described encryption of dynamic loading, and by described resource decryption program, the resource file after described encryption is solved
Close, after being deciphered resource file.
Alternatively, described actively loaded the resource file after described encryption by described resource decryption program, and by described money
Resource file after described encryption is decrypted and includes by source decryption program:
Whether the correlation function being monitored read/write resource file by the hook program in described resource decryption program is called;
The resource literary composition after described encryption is loaded by the API loading resource file of described decryption program reflection calling system
Part;
When the correlation function monitoring read/write resource file is called, intercept the relevant letter of this read/write resource file
Number, described resource decryption program the decryption logic himself comprised inserts in the correlation function of this read/write resource file;By
Resource file after described encryption is decrypted by described decryption logic, the resource file after being deciphered.
Alternatively, the API loading resource file of described decryption program reflection calling system after loading described encryption
Resource file includes:
Called the addAssetPath method of AssetManager apoplexy due to endogenous wind by the reflection of described decryption program, load described encryption
After resource file.
Alternatively, this device farther includes:
Return the result of the API loading resource file of calling system.
Alternatively, described ciphering unit, be suitable to extract the assets catalogue of installation kit, and this catalogue is carried out entirety add
Close.
Alternatively, described ciphering unit, be suitable to state in described installation kit, after described installation kit is mounted, every time
When starting corresponding application, the Application apoplexy due to endogenous wind in this application calls described resource decryption program.
Alternatively, described ciphering unit, be suitable to described installation kit is increased shell;Generate resource decryption program and be inserted into institute
State in shell.
From the foregoing, technical scheme, from installation kit, extract resource file and be encrypted, use
Original replaced by the file managed, and generate with encrypt after resource decryption program corresponding to resource file be inserted into installation kit
In, it is achieved thereby that to the reinforcing of resource file in installation kit.This technical scheme only for the resource file in installation kit, not shadow
Ring the alternative document in installation kit, and the effective protection to resource file can be realized, even if installation kit is unpacked, also
It is difficult to resource file therein is cracked, meets the demand that developer carries out for resource file protecting.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow above and other objects of the present invention, the feature and advantage can
Become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.In the accompanying drawings:
Fig. 1 shows the flow process of a kind of method of resource file reinforcing installation kit
Figure;
Fig. 2 shows that the structure of the device of a kind of resource file reinforcing installation kit is shown
It is intended to.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows the disclosure
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should be by embodiments set forth here
Limited.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure
Complete conveys to those skilled in the art.
Fig. 1 shows the flow process of a kind of method of resource file reinforcing installation kit
Figure, as it is shown in figure 1, the method includes:
Step S110, extracts the resource file of installation kit, is encrypted the resource file extracted, by the resource after encryption
The former resource file in installation kit replaced by file.
The kind of resource file is a lot, such as picture file, HTML (HyperText Markup Language, hypertext
Markup language) file, CSS (Cascading Style Sheets, CSS) file etc. be made without compiling processing
File, these files can be loaded to call and realize corresponding function in application running.As a example by game application,
Wherein the pinup picture of certain button is the picture with " Back " printed words, owing to this game application does not issues Chinese version, in this trip
In the case of resource file is not reinforced by play application, unwarranted technical staff can be by solving installation kit
Bag, utilizing " Back " in picture Processing Technique amendment picture is " return ", replaces original with amended file and realizes
Chinesizing to former game application processes.The most without authorization should to game but the publisher of game application is not intended to see
Amendment, thus without tolerate such behavior occur, in the present embodiment, by resource file is encrypted,
Even if installation is unpacked process, the resource file after encryption also can only be got, it is achieved that the protection to resource file.
Step S120, generates resource decryption program and is inserted in installation kit.
Visible, the method shown in Fig. 1, from installation kit, extract resource file and be encrypted, with the literary composition processed
Part replaces original, and generates and be inserted in installation kit with resource decryption program corresponding to resource file after encryption, thus reality
Show the reinforcing of resource file in installation kit.This technical scheme, only for the resource file in installation kit, does not affect installation kit
In alternative document, and the effective protection to resource file can be realized, even if installation kit is unpacked, it is also difficult to it
In resource file crack, meet the demand that developer carries out protecting for resource file.
In one embodiment of the invention, the method shown in Fig. 1 farther includes: after installation kit is mounted, every time
When starting corresponding application, resource decryption program actively load the resource file after encryption, and by resource decryption program to adding
Resource file after close is decrypted, the resource file after being deciphered.
When not being encrypted resource file, after starting corresponding application, resource file at once will be by system
Being loaded in internal memory, owing to resource file having been carried out encryption in the present invention, the resource file after these encryptions is cannot
It is used directly, the most in the present embodiment, before resource file is not by system loads to internal memory, has resource decryption program
Actively load the resource file after encryption, and in loading procedure, realize the dynamic deciphering to resource file.Owing to this is decrypted
Journey is dynamic, therefore by being difficulty with cracking to the static analysis of installation kit, further increases resource file
Safety.
In one embodiment of the invention, in said method, resource decryption program actively load the resource after encryption
File, and by resource decryption program, the resource file after encryption is decrypted and includes: by the hook journey in resource decryption program
Whether the correlation function of sequence monitoring read/write resource file is called;Loading resource file by decryption program reflection calling system
API load encryption after resource file;When the correlation function monitoring read/write resource file is called, intercept this read/write
The correlation function of resource file, resource decryption program the decryption logic himself comprised inserts this read/write resource file
In correlation function;By decryption logic, the resource file after encryption is decrypted, the resource file after being deciphered.
Achieve in the present embodiment by resource decryption program the loading of resource file after encryption and deciphering.System exists
When loading resource file, the correlation function of read/write resource file can be used, whether monitor these functions the most in the present embodiment
Called, also it is achieved that the monitoring to system loads resource file.After application starts, resource decryption program reflects tune immediately
The resource file after encryption is loaded, owing to calling the resource literary composition after this API loads encryption with the API loading resource file of system
Part will call the correlation function of read/write resource file, and these functions have been monitored by hook program, it is possible at this
A little functions insert the decryption logic that resource decryption program is comprised so that these functions are when loading the resource file after encrypting
Can dynamically decipher these files, the resource file after deciphering is loaded in internal memory the most at last.
In one embodiment of the invention, installation kit is Android installation kit, and corresponding application operates on Android system.
Then in said method, the API loading resource file of decryption program reflection calling system load the resource bundle after encryption
Include: called the addAssetPath method of AssetManager apoplexy due to endogenous wind by decryption program reflection, load the resource file after encryption.
After completing the operation loading and deciphering, return the result of the API loading resource file of calling system further so that application
Its function can be realized with the corresponding resource file of normal call.
Still as a example by Android installation kit, in said method, extract the resource file of installation kit, to the resource file extracted
It is encrypted and includes: extract the assets catalogue of installation kit, and this catalogue is carried out overall encryption.Resource in Android installation kit
File leaves under assets catalogue, can load the All Files under this catalogue when application starts.In the present embodiment to this
Catalogue has carried out overall encryption, correspondingly, also can carry out the deciphering of entirety when loading, and accelerates deciphering speed the most not shadow
Ring the safety of resource file.
Addressing above, resource file can preferentially be loaded when application starts, and is just added if resource file is not decrypted
Carry, the function of application can be caused correctly to realize, serious in the case of be likely to result in application crashes, it is therefore desirable to ensureing should
It is the resource file through deciphering with the resource file called in running.Shown below is two kinds of examples, both examples
By making resource decryption program preferentially start when application runs, resource file loaded and deciphers, it is achieved that will solve
Close resource file is loaded into the effect in internal memory.
Example one: state in installation kit, after installation kit is mounted, when starting corresponding application, in this application every time
Application apoplexy due to endogenous wind call resource decryption program.The method is applicable to Android installation kit.
Example two: installation kit is increased shell;Generate resource decryption program to be inserted in shell.Due to shell early than
The startup of application itself, it is ensured that resource file can be loaded before application call resource file by resource decryption program
And deciphering.
In addition to this it is possible to after the resource file after encryption is loaded into internal memory, then it is decrypted, adjust in application
When using resource file, the address of the resource file after it returns deciphering, etc..
Fig. 2 shows that the structure of the device of a kind of resource file reinforcing installation kit is shown
It is intended to, as in figure 2 it is shown, the device 200 reinforcing the resource file of installation kit includes:
Ciphering unit 210, is suitable to extract the resource file of installation kit, is encrypted, the resource file extracted with encryption
After resource file replace the former resource file in installation kit;Generate resource decryption program to be inserted in installation kit.
Visible, the device shown in Fig. 2, extracts resource file from installation kit and is encrypted, with the literary composition processed
Part replaces original, and generates and be inserted in installation kit with resource decryption program corresponding to resource file after encryption, thus reality
Show the reinforcing of resource file in installation kit.This technical scheme, only for the resource file in installation kit, does not affect installation kit
In alternative document, and the effective protection to resource file can be realized, even if installation kit is unpacked, it is also difficult to it
In resource file crack, meet the demand that developer carries out protecting for resource file.
In one embodiment of the invention, in the device shown in Fig. 2, after installation kit is mounted, start correspondence every time
Application time, resource decryption program actively load the resource file after encryption, and by resource decryption program to the money after encryption
Source file is decrypted, the resource file after being deciphered.
In one embodiment of the invention, in said apparatus, resource decryption program actively load the resource after encryption
File, and by resource decryption program, the resource file after encryption is decrypted and includes: by the hook journey in resource decryption program
Whether the correlation function of sequence monitoring read/write resource file is called;Loading resource file by decryption program reflection calling system
API load encryption after resource file;When the correlation function monitoring read/write resource file is called, intercept this read/write
The correlation function of resource file, resource decryption program the decryption logic himself comprised inserts this read/write resource file
In correlation function;By decryption logic, the resource file after encryption is decrypted, the resource file after being deciphered.
In one embodiment of the invention, in said apparatus, by the loading resource literary composition of decryption program reflection calling system
Resource file after the API of part loads encryption includes: called AssetManager apoplexy due to endogenous wind by decryption program reflection
AddAssetPath method, loads the resource file after encryption.
In one embodiment of the invention, said apparatus farther includes: return the loading resource file of calling system
The result of API.
In one embodiment of the invention, in said apparatus, ciphering unit 210, be suitable to extract the assets of installation kit
Catalogue, and this catalogue is carried out overall encryption.
In one embodiment of the invention, in said apparatus, ciphering unit 210, be suitable to state in installation kit, work as peace
After dress is coated installation, when starting corresponding application, the Application apoplexy due to endogenous wind in this application calls resource decryption program every time.
In one embodiment of the invention, in said apparatus, ciphering unit 210, be suitable to installation kit is increased shell;Raw
Resource decryption program is become to be inserted in shell.
It should be noted that the detailed description of the invention of above-mentioned each device embodiment and aforementioned corresponding method embodiment is concrete
Embodiment, does not repeats them here.
In sum, technical scheme, from installation kit, extract resource file and be encrypted, with process
Original replaced by the file crossed, and generate with encrypt after resource decryption program corresponding to resource file be inserted in installation kit,
It is achieved thereby that to the reinforcing of resource file in installation kit.Wherein resource decryption program is inserted in the shell of installation kit,
Or after installation kit is mounted, when starting corresponding application, the Application apoplexy due to endogenous wind in this application calls resource solution every time
Close program, it is ensured that the resource decryption program preferential operation in application start-up course, such that it is able to replaced by resource decryption program
Resource file loading procedure for system self, it is achieved that the deciphering in resource file loading procedure, so that after Xie Mi
Resource file can be employed normal call, it is ensured that the stable operation of application.This technical scheme is only in installation kit
Resource file, does not affect the alternative document in installation kit, and can realize the effective protection to resource file, even if to installation
Bag unpacks, it is also difficult to crack resource file therein, meets what developer carried out protecting for resource file
Demand.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit protection scope of the present invention.All
Any modification, equivalent substitution and improvement etc. made within the spirit and principles in the present invention, are all contained in protection scope of the present invention
In.
It should be understood that
Algorithm and display are not intrinsic to any certain computer, virtual bench or miscellaneous equipment relevant provided herein.
Various fexible units can also be used together with based on teaching in this.As described above, construct required by this kind of device
Structure be apparent from.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various
Programming language realizes the content of invention described herein, and the description done language-specific above is to disclose this
Bright preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of not having these details.In some instances, it is not shown specifically known method, structure
And technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that one or more in order to simplify that the disclosure helping understands in each inventive aspect, exist
Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.But, the method for the disclosure should not be construed to reflect an intention that i.e. required guarantor
The application claims feature more more than the feature being expressly recited in each claim protected.More precisely, as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
The claims following detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each claim itself
All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment adaptively
Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list
Unit or assembly are combined into a module or unit or assembly, and can put them in addition multiple submodule or subelement or
Sub-component.In addition at least some in such feature and/or process or unit excludes each other, can use any
Combine all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed appoint
Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can be carried out generation by providing identical, equivalent or the alternative features of similar purpose
Replace.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments
Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in the present invention's
Within the scope of and form different embodiments.Such as, in the following claims, embodiment required for protection appoint
One of meaning can mode use in any combination.
The all parts embodiment of the present invention can realize with hardware, or to run on one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that and can use in practice
Microprocessor or digital signal processor (DSP) realize the resource file reinforcing installation kit according to embodiments of the present invention
The some or all functions of the some or all parts in device.The present invention is also implemented as being retouched here for execution
Part or all equipment of the method stated or device program (such as, computer program and computer program).
The program of such present invention of realization can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from internet website and obtain, or on carrier signal provide, or with any its
He provides form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " and does not excludes the presence of not
Arrange element in the claims or step.Word "a" or "an" before being positioned at element does not excludes the presence of multiple such
Element.The present invention and can come real by means of including the hardware of some different elements by means of properly programmed computer
Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch
Specifically embody.Word first, second and third use do not indicate that any order.These word explanations can be run after fame
Claim.
Embodiment of the invention discloses that A1, a kind of method of resource file reinforcing installation kit, wherein, the method bag
Include:
Extract the resource file of installation kit, the resource file extracted is encrypted, replace with the resource file after encryption
Former resource file in described installation kit;
Generate resource decryption program to be inserted in described installation kit.
A2, method as described in A1, wherein, the method farther includes:
After described installation kit is mounted, when starting corresponding application, described resource decryption program actively load every time
Resource file after described encryption, and by described resource decryption program, the resource file after described encryption is decrypted, obtain
Resource file after deciphering.
A3, method as described in A2, wherein, described actively loaded the resource after described encryption by described resource decryption program
File, and by described resource decryption program the resource file after described encryption is decrypted and includes:
Whether the correlation function being monitored read/write resource file by the hook program in described resource decryption program is called;
The resource literary composition after described encryption is loaded by the API loading resource file of described decryption program reflection calling system
Part;
When the correlation function monitoring read/write resource file is called, intercept the relevant letter of this read/write resource file
Number, described resource decryption program the decryption logic himself comprised inserts in the correlation function of this read/write resource file;By
Resource file after described encryption is decrypted by described decryption logic, the resource file after being deciphered.
A4, method as described in A3, wherein, by the API loading resource file of described decryption program reflection calling system
Load the resource file after described encryption to include:
Called the addAssetPath method of AssetManager apoplexy due to endogenous wind by the reflection of described decryption program, load described encryption
After resource file.
A5, method as described in A3, wherein, the method farther includes:
Return the result of the API loading resource file of calling system.
A6, method as described in A1, wherein, the resource file of described extraction installation kit, the resource file extracted is carried out
Encryption includes:
Extract the assets catalogue of installation kit, and this catalogue is carried out overall encryption.
A7, method as described in A1, wherein, described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is stated, after described installation kit is mounted, when starting corresponding application, in this application every time
Application apoplexy due to endogenous wind call described resource decryption program.
A8, method as described in A1, wherein, described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is increased shell;
Generate resource decryption program to be inserted in described shell.
Embodiments of the invention also disclose B9, the device of a kind of resource file reinforcing installation kit, wherein, this device bag
Include:
Ciphering unit, is suitable to extract the resource file of installation kit, is encrypted the resource file extracted, after encryption
Resource file replaces the former resource file in described installation kit;Generate resource decryption program to be inserted in described installation kit.
B10, device as described in B9, wherein,
After described installation kit is mounted, when starting corresponding application, described resource decryption program actively load every time
Resource file after described encryption, and by described resource decryption program, the resource file after described encryption is decrypted, obtain
Resource file after deciphering.
B11, device as described in B10, wherein, described actively loaded the money after described encryption by described resource decryption program
Source file, and by described resource decryption program the resource file after described encryption is decrypted and includes:
Whether the correlation function being monitored read/write resource file by the hook program in described resource decryption program is called;
The resource literary composition after described encryption is loaded by the API loading resource file of described decryption program reflection calling system
Part;
When the correlation function monitoring read/write resource file is called, intercept the relevant letter of this read/write resource file
Number, described resource decryption program the decryption logic himself comprised inserts in the correlation function of this read/write resource file;By
Resource file after described encryption is decrypted by described decryption logic, the resource file after being deciphered.
B12, device as described in B11, wherein, by the resource file that loads of described decryption program reflection calling system
Resource file after API loads described encryption includes:
Called the addAssetPath method of AssetManager apoplexy due to endogenous wind by the reflection of described decryption program, load described encryption
After resource file.
B13, device as described in B11, wherein, this device farther includes:
Return the result of the API loading resource file of calling system.
B14, device as described in B9, wherein,
Described ciphering unit, is suitable to extract the assets catalogue of installation kit, and this catalogue carries out overall encryption.
B15, device as described in B9, wherein,
Described ciphering unit, is suitable to state in described installation kit, after described installation kit is mounted, starts correspondence every time
Application time, the Application apoplexy due to endogenous wind in this application calls described resource decryption program.
B16, device as described in B9, wherein,
Described ciphering unit, is suitable to described installation kit is increased shell;Generate resource decryption program and be inserted into described shell
In.
Claims (10)
1. the method reinforcing the resource file of installation kit, wherein, the method includes:
Extract the resource file of installation kit, the resource file extracted is encrypted, replace described with the resource file after encryption
Former resource file in installation kit;
Generate resource decryption program to be inserted in described installation kit.
The most the method for claim 1, wherein the method farther includes:
After described installation kit is mounted, when starting corresponding application, described resource decryption program actively load described every time
Resource file after encryption, and by described resource decryption program, the resource file after described encryption is decrypted, deciphered
After resource file.
3. method as claimed in claim 2, wherein, described is actively loaded the money after described encryption by described resource decryption program
Source file, and by described resource decryption program the resource file after described encryption is decrypted and includes:
Whether the correlation function being monitored read/write resource file by the hook program in described resource decryption program is called;
The resource file after described encryption is loaded by the API loading resource file of described decryption program reflection calling system;
When the correlation function monitoring read/write resource file is called, intercept the correlation function of this read/write resource file, by
The decryption logic that himself is comprised by described resource decryption program inserts in the correlation function of this read/write resource file;By described
Resource file after described encryption is decrypted by decryption logic, the resource file after being deciphered.
4. method as claimed in claim 3, wherein, by the loading resource file of described decryption program reflection calling system
Resource file after API loads described encryption includes:
The addAssetPath method of AssetManager apoplexy due to endogenous wind is called, after loading described encryption by the reflection of described decryption program
Resource file.
5. method as claimed in claim 3, wherein, the method farther includes:
Return the result of the API loading resource file of calling system.
The resource file of the most described extraction installation kit, enters the resource file extracted
Row encryption includes:
Extract the assets catalogue of installation kit, and this catalogue is carried out overall encryption.
The most described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is stated, after described installation kit is mounted, when starting corresponding application, in this application every time
Application apoplexy due to endogenous wind calls described resource decryption program.
The most described generation resource decryption program is inserted into described installation kit and includes:
Described installation kit is increased shell;
Generate resource decryption program to be inserted in described shell.
9. reinforcing a device for the resource file of installation kit, wherein, this device includes:
Ciphering unit, is suitable to extract the resource file of installation kit, is encrypted the resource file extracted, by the resource after encryption
The former resource file in described installation kit replaced by file;Generate resource decryption program to be inserted in described installation kit.
10. device as claimed in claim 9, wherein,
After described installation kit is mounted, when starting corresponding application, described resource decryption program actively load described every time
Resource file after encryption, and by described resource decryption program, the resource file after described encryption is decrypted, deciphered
After resource file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610698034.1A CN106293852A (en) | 2016-08-19 | 2016-08-19 | A kind of method and apparatus of the resource file reinforcing installation kit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610698034.1A CN106293852A (en) | 2016-08-19 | 2016-08-19 | A kind of method and apparatus of the resource file reinforcing installation kit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106293852A true CN106293852A (en) | 2017-01-04 |
Family
ID=57661826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610698034.1A Pending CN106293852A (en) | 2016-08-19 | 2016-08-19 | A kind of method and apparatus of the resource file reinforcing installation kit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106293852A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122632A (en) * | 2017-04-26 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | The encryption method and device of software installation bag |
CN109657488A (en) * | 2019-02-26 | 2019-04-19 | 北京智游网安科技有限公司 | A kind of resource file cipher processing method, intelligent terminal and storage medium |
CN109871704A (en) * | 2019-03-19 | 2019-06-11 | 北京智游网安科技有限公司 | Android resource file means of defence, equipment and storage medium based on Hook |
WO2020103057A1 (en) * | 2018-11-21 | 2020-05-28 | 深圳市欢太科技有限公司 | Data processing method, apparatus, electronic device and storage medium |
CN111782230A (en) * | 2020-07-07 | 2020-10-16 | 联想(北京)有限公司 | Program installation control method and device and electronic equipment |
CN112052464A (en) * | 2020-08-21 | 2020-12-08 | 北京智游网安科技有限公司 | Method for performing virtualization protection on resource file, intelligent terminal and storage medium |
CN114297589A (en) * | 2021-12-28 | 2022-04-08 | 北京深思数盾科技股份有限公司 | Resource protection method and device and resource reading method and device for application program |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104392181A (en) * | 2014-11-18 | 2015-03-04 | 北京奇虎科技有限公司 | SO file protection method and device and android installation package reinforcement method and system |
CN105608391A (en) * | 2015-12-17 | 2016-05-25 | 北京奇虎科技有限公司 | Multi-ELF (Executable and Linkable Format)-file protection method and system |
-
2016
- 2016-08-19 CN CN201610698034.1A patent/CN106293852A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104392181A (en) * | 2014-11-18 | 2015-03-04 | 北京奇虎科技有限公司 | SO file protection method and device and android installation package reinforcement method and system |
CN105608391A (en) * | 2015-12-17 | 2016-05-25 | 北京奇虎科技有限公司 | Multi-ELF (Executable and Linkable Format)-file protection method and system |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107122632A (en) * | 2017-04-26 | 2017-09-01 | 北京洋浦伟业科技发展有限公司 | The encryption method and device of software installation bag |
WO2020103057A1 (en) * | 2018-11-21 | 2020-05-28 | 深圳市欢太科技有限公司 | Data processing method, apparatus, electronic device and storage medium |
CN112823336A (en) * | 2018-11-21 | 2021-05-18 | 深圳市欢太科技有限公司 | Data processing method, data processing device, electronic equipment and storage medium |
CN109657488A (en) * | 2019-02-26 | 2019-04-19 | 北京智游网安科技有限公司 | A kind of resource file cipher processing method, intelligent terminal and storage medium |
CN109657488B (en) * | 2019-02-26 | 2021-09-28 | 北京智游网安科技有限公司 | Resource file encryption processing method, intelligent terminal and storage medium |
CN109871704A (en) * | 2019-03-19 | 2019-06-11 | 北京智游网安科技有限公司 | Android resource file means of defence, equipment and storage medium based on Hook |
CN111782230A (en) * | 2020-07-07 | 2020-10-16 | 联想(北京)有限公司 | Program installation control method and device and electronic equipment |
CN111782230B (en) * | 2020-07-07 | 2022-05-31 | 联想(北京)有限公司 | Program installation control method and device and electronic equipment |
CN112052464A (en) * | 2020-08-21 | 2020-12-08 | 北京智游网安科技有限公司 | Method for performing virtualization protection on resource file, intelligent terminal and storage medium |
CN112052464B (en) * | 2020-08-21 | 2024-03-22 | 北京智游网安科技有限公司 | Method for carrying out virtualization protection on resource file, intelligent terminal and storage medium |
CN114297589A (en) * | 2021-12-28 | 2022-04-08 | 北京深思数盾科技股份有限公司 | Resource protection method and device and resource reading method and device for application program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106293852A (en) | A kind of method and apparatus of the resource file reinforcing installation kit | |
CN105068932B (en) | A kind of detection method of Android application programs shell adding | |
CN104462959B (en) | A kind of method for reinforcing and protecting, server and the system of Android application | |
CN102760219B (en) | A kind of Android platform software protection system, method and apparatus | |
US20180260199A1 (en) | Method and apparatus for intermediate representation of applications | |
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
CN106295370A (en) | A kind of method and apparatus of the dynamic link library (DLL) file reinforcing installation kit | |
CN104318135B (en) | A kind of Java code Safety actuality loading method based on credible performing environment | |
CN103460217B (en) | For the protection of method and the device thereof of application program | |
CN104680039B (en) | A kind of data guard method and device of application program installation kit | |
CN106203006A (en) | Android application reinforcement means based on dex Yu so file Dynamic Execution | |
CN104392181A (en) | SO file protection method and device and android installation package reinforcement method and system | |
CN111143869B (en) | Application package processing method and device, electronic equipment and storage medium | |
CN106708571A (en) | Resource file loading method and device and source file reinforcing method and device | |
EP3127034A1 (en) | Software protection | |
US9762385B1 (en) | Protection of program code of apps of mobile computing devices | |
CN107430650B (en) | Securing computer programs against reverse engineering | |
US11907941B2 (en) | Anonymization of data fields in transactions | |
CN104866739A (en) | Application program encryption method and application program encryption system in Android system | |
CN104615933B (en) | The method and apparatus that the method for anti-software decompilation, counnter attack composing software start | |
Wang et al. | Running language interpreters inside SGX: A lightweight, legacy-compatible script code hardening approach | |
Löw | Overview of meltdown and spectre patches and their impacts | |
US20170185784A1 (en) | Point-wise protection of application using runtime agent | |
CN104965701B (en) | Obtain the method and device of application message | |
El-Harake et al. | Blocking advertisements on android devices using monitoring techniques |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |