CN106845167A - The reinforcement means and device of a kind of APK, and dynamic loading method and device - Google Patents

The reinforcement means and device of a kind of APK, and dynamic loading method and device Download PDF

Info

Publication number
CN106845167A
CN106845167A CN201611139477.3A CN201611139477A CN106845167A CN 106845167 A CN106845167 A CN 106845167A CN 201611139477 A CN201611139477 A CN 201611139477A CN 106845167 A CN106845167 A CN 106845167A
Authority
CN
China
Prior art keywords
apk
data
former
classes
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611139477.3A
Other languages
Chinese (zh)
Inventor
刘敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611139477.3A priority Critical patent/CN106845167A/en
Publication of CN106845167A publication Critical patent/CN106845167A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The reinforcement means and device and dynamic loading method and device of a kind of APK file are disclosed in the embodiment of the present invention.The reinforcement means includes:Obtain and need former data to be protected in former APK to be reinforced, the former data are encrypted, obtain encryption data;Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in the predeterminated position of the target APK with document form.The reinforcement means and device and dynamic loading method and device provided in the embodiment of the present invention, it is stored in target APK by that will be hidden to encryption data necessary to operation APK, the storage that improve APK encryption datas is disguised, the difficulty of APK decompilings is increased, the security of APK file is dramatically improve.

Description

The reinforcement means and device of a kind of APK, and dynamic loading method and device
Technical field
The present invention relates to terminal applies security technology area, the reinforcement means and device, Yi Jidong of more particularly to a kind of APK State loading method and device.
Background technology
APK (Android Package) is Android Android installation kits, is the application program in Android operation system Installation file, this applies installation file by installation file strapping tool according to multiple file generateds, and the file for generating APK is typically adopted Write with java programming languages, user by the APK file generated by installation file strapping tool upload to Android simulator or Being performed in the user equipment of Android operation system to install.
Growing with Android mobile terminal platform, third party application is emerged in multitude, to the piracy applied Bag phenomenon is increasingly serious with beating again.Because Android platform is developed using Java language, the code in APK is caused to be easy to anti- Compiling, by decompiling APK file, enters analysis, modification or the insertion of line code, then signature is packaged as new APK texts again Part, to reach the purpose of the original behavior of reprogramming, the tampering of APK seriously compromise application developers interests and Enthusiasm, and technology is distorted using APK, by adding malicious code so that Android user faces privacy leakage and property is damaged The danger of mistake, has had a strong impact on the application safety of user.Therefore, reinforcement protection of the developers for Android program code Also increasingly pay close attention to.
In the reinforcement means of existing Android software installation bag APK, some of APK significant datas are encrypted, will added Ciphertext data is stored under resource storing directory res catalogues or under extra resource catalogue assets catalogues with document form, program To perform go in implementation procedure and find this encryption under correspondence catalogue and file and load, so that the operation of complete APK file, but this kind The location mode of encryption data is disguised poor, is easily found, and the risk for causing APK to be cracked is still larger.
The content of the invention
For defect present in prior art, the purpose of the embodiment of the present invention is to provide one kind to overcome above-mentioned asking Topic or the reinforcement means of a kind of APK that at least can partly solve the above problems and device and dynamic loading method and Device.
To achieve the above object, a kind of reinforcement means of APK file is provided in one embodiment of the present of invention, it is described to add Solid method includes:
A kind of reinforcement means of APK file, it is characterised in that including:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in document form The predeterminated position of the target APK.
Preferably, reinforcement means as described above, the predeterminated position is in the classes.dex files of target APK Position.
Preferably, reinforcement means as described above, the predeterminated position is the text of the classes.dex files of target APK Part head and/or N number of specified location of data field, N >=1.
Preferably, reinforcement means as described above, the N=1, the specified location is the head or tail of the data field Portion.
Preferably, reinforcement means as described above, the N=2;The encryption data includes the first encryption data and second Encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK Position in file is second specified location.
Preferably, reinforcement means as described above, first specified location is the head of the data field, described second Specified location is the afterbody of the data field.
Preferably, reinforcement means as described above, during the former data are the non-classes.dex files in former APK Data;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target APK。
Preferably, reinforcement means as described above, if the predeterminated position is in the classes.dex files of target APK Position, it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate mesh Mark APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked Signature, generation target APK.
Preferably, reinforcement means as described above, the former data are the data in the classes.dex files of former APK;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again Packing signature, generation target APK.
A kind of bracing means of APK file is additionally provided in one embodiment of the invention, and the device includes:
Encryption data generation module, need former data to be protected in former APK to be reinforced, by the former data for obtaining It is encrypted, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption Data are stored in the predeterminated position of the target APK with document form.
In one embodiment of the invention, a kind of dynamic loading method of reinforcing APK is additionally provided, wherein, it is described to add Gu APK is the target APK generated using the reinforcement means of any of the above-described APK file, the dynamic loading method includes:
Decompress the target APK;
According to storage location of the encryption data in target APK, the encryption data is extracted, and encryption data is solved It is close to obtain former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex of target APK File carries out dynamic load.
Preferably, dynamic loading method as described above, if the former data are the classes.dex files in former APK In data, it is described according to encryption data in the storage location of target APK, extract the encryption data, also include:Obtain encryption The original position information of the former data corresponding to data;
The target APK according to after the former data and decompression, by dex Classloaders to target APK's Classes.dex files carry out dynamic load, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
Preferably, dynamic loading method as described above, it is described by dex Classloaders to the complete of target APK Classes.dex files carry out dynamic load, including:
After the complete classes.dex files Central Plains data are loaded into memory headroom, delete described complete Described former data in classes.dex files.
In one embodiment of the invention, a kind of dynamic loading device of reinforcing APK, the dynamic load are additionally provided Device includes:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption number According to, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders pair The classes.dex files of target APK carry out dynamic load.
Preferably, dynamic loading device as described above, if the former data are the classes.dex files in former APK In data, the former data extraction module be additionally operable to obtain encryption data corresponding to former data original position information;
The APK dlm (dynamic loading module)s include:
The former data for the original position-information according to the former data, are put back into the by complete dex acquiring units Correspondence position in three classes.dex files, obtains the complete classes.dex files of target APK;
Dex dynamic load units, for the entering to the complete classes.dex files of target APK by dex Classloaders Mobile state is loaded.
Preferably, dynamic loading device as described above, the dex dynamic loads unit also includes:
Former data delete subelement, and internal memory is loaded into for the former data in the complete classes.dex files After in space, the described former data in the complete classes.dex files are deleted.
The beneficial effects of the present invention are:The reinforcement means and device and dynamic of the APK provided in the embodiment of the present invention Loading method and device, after it will run the indispensable former data encryption treatment of APK, hide and are stored in target APK texts In predeterminated position in part, when APK runs, the storage location of file according to encryption data in target APK finds described The encryption data of predetermined position, to complete the whole dynamic load operating process of APK, provided in the embodiment of the present invention Method and apparatus, the storage that improve encryption data is disguised, increased the difficulty of decompiling, dramatically improves The security of APK file.In another embodiment of the invention, the reinforcement means generation target that load operating the present embodiment is provided During APK, if former data are loaded into internal memory, the former data can also be deleted after loading is complete, further avoided Former data are stolen, and improve APK decompiling difficulty.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing The accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, accompanying drawing is only limitted to show the purpose of preferred embodiment, and is not considered as limitation of the invention, and For those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the reinforcement means of the APK file in one embodiment of the invention;
Fig. 2 is the structural representation of the dex files of the former APK in one embodiment of the invention;
Fig. 3 is the structural representation of the dex files of the target APK in one embodiment of the present of invention;
Fig. 4 is a kind of structural representation of the bracing means of the APK file in one embodiment of the present of invention;
Fig. 5 is the structural representation of the target APK generation modules in one embodiment of the present of invention;
Fig. 6 is the structural representation of the target APK generation modules in one embodiment of the present of invention;
Fig. 7 is a kind of schematic flow sheet of the dynamic loading method of the reinforcing APK in one embodiment of the present of invention;
Fig. 8 is a kind of structural representation of the dynamic loading device of the reinforcing APK in one embodiment of the present of invention;
Fig. 9 is the structural representation of the APK dlm (dynamic loading module)s in one embodiment of the present of invention;
Figure 10 is the structural representation of the APK dlm (dynamic loading module)s in one embodiment of the present of invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiments of the invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, the scope of protection of the invention is belonged to.
Fig. 1 shows a kind of schematic flow sheet of the reinforcement means of the APK file provided in one embodiment of the present of invention, As can be seen from Figure, the method can mainly include following steps:
Step S110:Obtain and need former data to be protected in former APK to be reinforced;
Step S120:The former data are encrypted, encryption data is obtained;
Step S130:Consolidation process is carried out to the former APK, target APK is generated, the encryption data is deposited with document form It is stored in the predeterminated position of the target APK.
For convenience, in embodiments of the invention, APK to be reinforced is designated as former APK, former APK is reinforced The APK generated after treatment is designated as target APK.
The reinforcement means provided in the present embodiment, it is first determined need the former data protected, the former number According to referring to indispensable data for being run to APK, that is, essential data during decompiling APK.Specific choosing Which data is selected as former data, can be determined according to actual needs, can be relevant with the classes.dex files of former APK Data, or the data unrelated with the classes.dex files of former APK.For example, in practical operation, developer people Member can identify the content for intentionally getting protection by explaining, when APK reinforcings are carried out, you can to determine according to explaining Data to be protected is needed in original APK.
Determine after needing former data to be protected, decompiling treatment is carried out by former APK, extract former data.By original Data are encrypted, and when obtaining encryption data, can as needed select a kind of arbitrary cipher mode.Obtain encrypting number According to rear, according to encryption data, consolidation process is carried out to former APK file, obtain target APK, make encryption data final with file shape Formula is stored in the predeterminated position of the target APK.
The reinforcement means that the present embodiment is provided, is stored and target APK by will run the essential file encryptions of APK Predeterminated position in, the storage that improve encryption data is disguised, increased the difficulty of decompiling, improves the peace of APK file Quan Xing.
In one embodiment of the invention, the predeterminated position is the position in the classes.dex files of target APK Put.
In one embodiment of the invention, the predeterminated position is the file header of the classes.dex files of target APK Header and/or N number of specified location of data field, N >=1.
That is, the final encryption data present in the classes.dex files of target APK can be one or Multiple, the number N of specified location is determined that specifically choosing several and which position can be according to reality by the number of encryption data Need to determine.
In one embodiment of the invention, the N=1, now, the specified location can be target APK's The head of the data field of classes.dex files, that is, the classes.dex files of target APK file header header Afterbody.
In one embodiment of the invention, the N=2, i.e., described specified location includes the first specified location and second Specified location, now, the encryption data includes the first encryption data and the second encryption data, and the first encryption data is in target Position in the classes.dex files of APK is first specified location, and the second encryption data is target APK's Position in classes.dex files is second specified location.First specified location and the second specified location can be with roots Factually border it needs to be determined that.
In one embodiment of the invention, first specified location is the head of the data field, and described second refers to Positioning is set to the afterbody of the data field.
Wherein, first encryption data and the second encryption data can be respectively to needing two to be protected in former APK Divided data is encrypted obtains respectively, i.e., identified to need the former data to include the first former data and the second former data; Can be to APK in protection in need former data be encrypted after the encryption data that obtains reprocess Arrive, i.e. the first encryption data and the second encryption data can be directly to being obtained after former data encryption, it is also possible to encryption data Reprocessed, specifically how to process to be set according to actual needs.Likewise, can also be the encryption data Can be with multiple, now specified location also corresponds to multiple.
In one embodiment of the invention, the former data are the number in the non-classes.dex files in former APK According to that is, former data are unrelated with the data in the dex files of original APK, for example, former data can be the program global configuration of former APK Run in indispensable data or data cube computation library directory lib when APK runs in file AndroidManifest.xml During operation indispensable data, or when APK runs required some key informations used or other with The application program of APK runs relevant data.
It is described right in step S130 when the data in the non-classes.dex files during the former data are former APK The former APK carries out consolidation process, generates target APK, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target APK。
In one embodiment of the invention, if the predeterminated position is the position in the classes.dex files of target APK Put, then it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate target APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked Signature, generation target APK.
In the present embodiment, because former data are the data unrelated with the classes.dex of former APK, therefore, encryption data exists Position in the classes.dex files of target APK be corresponding in the classes.dex files of original APK, will encryption After data are added to the classes.dex files of former APK, for the classes.dex files after addition encryption data, it is only necessary to Its File header information is recalculated and updated again, and the new classes.dex files that then will be obtained replace the former dex of original APK File, and repack signature, generation target APK with other files in addition to former data of former APK.
Wherein, the required File header information for recalculating and updating and encryption data store target APK position It is relevant, if for example, encryption data with file store target APK dex files file header header afterbody, if now plus Ciphertext data file then needs the File header information for updating to include the total length of dex files as a part for file header Filesize and file header size headersize, if now data file encryption needs more as a part for data field Information in new file header then each offset address off fields in total length filesize and file header including dex files Information etc.;If encryption data is stored in the afterbody of the data field of dex files with file, the information in the file header for updating is needed Then include the total length filesize of dex files.The target APK generated using the reinforcement means in the present embodiment, its Classes.dex files are a described classes.dex files.
For example, in one embodiment of the invention, Fig. 2 shows a structure for the classes.dex files of original APK Schematic diagram, including file header header and data field (ellipsis part) two large divisions, the classes.dex files of former APK Total length is fileSize, and file header size is headerSize, it is assumed that predeterminated position is encryption data depositing in target APK Storage space be set to the file header header of the classes.dex files of target APK afterbody (in figure data size/off positions it Afterwards), then the structural representation of the classes.dex files of target APK as shown in Figure 3, wherein, extra data are encryption Data, encryption data is located at the afterbody of the file header header of the classes.dex files of target APK, and the position is with original APK's Position in classes.dex files is identical, now, the total length of the dex files in file header header after renewal It is the fileSize+extraSize (length of encryption data) of former APK, file header size is headerSize+extraSize, Dex files after renewal are replaced the former dex files of original APK, is carried out again with other files in addition to former data in former APK Packing signature, completes the generation of target APK.
It should be noted that the English field information in Fig. 2 and Fig. 3 is the general information of Android dex files, to ability It is clearly, no longer to illustrate one by one herein for field technique personnel.
In one embodiment of the invention, the former data are the data in the classes.dex files of former APK, this When, it is described that consolidation process is carried out to the former APK in step S130, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again Packing signature, generation target APK.
In the present embodiment, because former data are the data in dex files, in order to ensure that follow-up APK file can normally add Carrying row, needs to restore the dex files of completion first in load operating, accordingly, it would be desirable to record the confidence in situ of former data Breath.The target APK generated using the reinforcement means provided in the present embodiment, its classes.dex file is the described 3rd Classes.dex files.
In the present embodiment, in a schematic diagram for the dex files of original APK shown in Fig. 2, it is necessary to protection data I.e. former data are a part of data therein, specifically which part data, can be selected as needed, can be file headers The data in the data field not shown in data and/or Fig. 2 in header.For example, it is assumed that the former data are in Fig. 2 Data (data of ellipsis part, the function generation in the classes.dex files of former APK in the whole data field of dex files Code), by the partial data encrypt after, it is assumed that it is determined that encryption data position for target APK classes.dex files number It is the afterbody of file header header according to the head in area, then adds the original position-information of encryption data and its corresponding former data To the lower section of the datasize/off positions shown in Fig. 2, and the data field in the dex files of former APK is deleted, after updating modification Dex files File header information, then the dex files after renewal are replaced the former dex of original APK, with former APK except dex is literary Other parts outside part are signed packing again, obtain target APK, when APK is run, then first in the number of dex files Encryption data is extracted according to the lower section that area's head is datasize/off, then decryption obtains the data of data field, and according to original position Confidence breath is added to data zone position, obtains complete dex files.
The reinforcement means of the APK provided in the embodiment of the present invention, is entered by will run the indispensable former data of APK After row encryption, encryption data is hidden in the specified location being stored in target APK file, when APK runs, exist first The specified location in target APK finds encryption data, to complete the whole load operating process of APK.Using the reinforcing Method, the storage that improve encryption data is disguised, increased the difficulty of decompiling, dramatically improves APK file Security.
In one embodiment of the invention, a kind of bracing means of APK file is additionally provided, as shown in figure 4, described add It is fixedly mounted with and puts including encryption data generation module 110 and target APK generation modules 120.Wherein:
Encryption data generation module 110, need former data to be protected in former APK to be reinforced, by the original for obtaining Data are encrypted, and obtain encryption data;
Target APK generation modules 120, for carrying out consolidation process to the former APK, generate target APK, wherein, it is described Encryption data is stored in the predeterminated position of the target APK with document form.
Using the bracing means provided in the present embodiment, the APK application programs under Android can be carried out at reinforcing Reason, is hidden in the predeterminated position of target APK after making former data encryption necessary to operation APK with document form, can effectively be advised The decompiling of the reverse instruments of Android is kept away, increases the difficulty of decompiling, improve the security of target APK.
In one embodiment of the invention, the predeterminated position can be in the classes.dex files of target APK Position.
In one embodiment of the invention, the file header of the classes.dex files for being preset as target APK and/ Or N number of specified location of data field, N >=1.In actual applications, specifically chosen several specified locations and specific selecting file Where head or data field can be selected according to actual needs.
In one embodiment of the invention, the N=1, the specified location is the head or afterbody of the data field.
In one embodiment of the invention, the N=2, i.e., described specified location includes the first specified location and second Specified location, corresponding, the encryption data includes the first encryption data and the second encryption data, now, the first encryption data Position in the classes.dex files of target APK is first specified location, and the second encryption data is target APK's Position in classes.dex files is second specified location.
In one embodiment of the invention, first specified location is the head i.e. dex files of the data field The afterbody of file header header, second specified location is the afterbody of the data field.
In one embodiment of the invention, the former data can be the number in the non-classes.dex files of original APK According to.Now, the target APK generation modules 120 can include that the first encryption data inserts unit 121 and first object APK lifes Into unit 122, as shown in Figure 5.Wherein:
First encryption data inserts unit 121, and the predeterminated position according to encryption data in target APK will be encrypted Data are added to the correspondence position in former APK;
First object APK generation units 122, for other texts in the former APK after by addition in addition to the former data Part carries out repacking signature, generation target APK.
In one embodiment of the invention, if the predeterminated position is the position in the classes.dex files of target APK Put, the first object APK generation units 122 include that target dex generates subelement and target APK generation subelements.Wherein:
Target dex generates subelement, for recalculating and updates the former APK after addition encryption data The File header information of classes.dex files, the classes.dex files after being updated;
Target APK generates subelement, for by a classes.dex files and original APK in addition to the former data Other files repack signature, generation target APK.
In one embodiment of the invention, the former data can be the number in the classes.dex files of original APK According to;Now, the target APK generation modules 120 include original position recording unit 123, the second encryption data insertion unit 124, Former data delete unit 125, target dex generation units 126 and the second target APK generation units 127, as shown in Figure 6.Wherein:
Original position recording unit 123, for recording in situ confidence of the former data in the classes.dex files of former APK Breath;
Second encryption data inserts unit 124, for the predeterminated position according to encryption data in target APK, will Encryption data and the original position information are added to the correspondence position in former APK;
Former data delete unit 125, for the described former data in the classes.dex files for deleting former APK, obtain the Two classes.dex files;
Target dex generation units 126, for recalculating and update the File header information of the 2nd classes.dex files, Obtain the 3rd classes.dex files;
Second target APK generation units 127, for by the 3rd classes.dex files and original APK except it Other files outside classes.dex files carry out repacking signature, generation target APK.
In one embodiment of the invention, a kind of dynamic loading method of reinforcing APK is additionally provided, wherein, it is described to add Gu APK is the target APK, Fig. 7 generated using the reinforcement means of APK in any of the above-described embodiment or bracing means shows this hair A kind of flow chart of the dynamic loading method of the reinforcing APK in bright one embodiment, the dynamic loading method includes following step Suddenly:
Step S710:Decompress the target APK;
Step S720:According to encryption data in the storage location of target APK, the encryption data is extracted, and to encryption Data are decrypted and obtain former data;
Step S730:According to the target APK after the former data and decompression, by dex Classloaders to target APK's Classes.dex files carry out dynamic load.
Loading method provided in the present embodiment, decompresses target APK first, and APK file refers to the compression of zip forms Bag, apk after simply suffix name is changed therefore, it can be obtained by decompression the catalogue file of APK file, and basis adds after decompression Storage location (predeterminated position i.e. hereinbefore) of the ciphertext data in target APK, you can extraction obtains the encryption data, Treatment is decrypted to encryption data and obtains corresponding former data.The manner of decryption of the decryption processing is to be generated with encryption data The cipher mode of Shi Caiyong is corresponding.After decryption obtains former data, just can be led to according to the target APK after former data and decompression The classes.dex files for crossing the dex Classloader DexClassLoader classes completion target APK of Android API offers add Carrying row.Wherein, specific load operating step has all differences according to the difference of former data.
In one embodiment of the invention, if the former data are the data in the non-classes.dex files of former APK When, encryption data is extracted from dex, after decryption encryption data obtains former data, just with reference to former data and the dex of target APK The operation of file other data completion APK.According to the difference of former data, former data participate in also different, example the step of APK runs Such as, it is assumed that former data are the dynamic base .so files of former APK, then dex Classloaders DexClassLoader classes are loading dex's During, it is necessary to call the former data can to complete the loading of dex.
In one embodiment of the invention, if the former data are the number in the classes.dex files in former APK According to the storage location according to encryption data in target APK extracts the encryption data, also includes:Obtain encryption number According to the original position information of corresponding former data;Now, according to the target APK after the former data and decompression, added by dex classes Carry out dynamic load of the device to the classes.dex files of target APK is carried, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
Due to the data in dex files that former data are former APK, therefore, in order to the normal load for ensureing target APK is transported Row, it is necessary to restore the dex files of completion, then complete adding for dex files by dex Classloader DexClassLoader classes first Carry.
In one embodiment of invention, if the former data are the data in the classes.dex files in former APK, It is described by dex Classloaders to when the carrying out dynamic load of complete classes.dex files of target APK, when described complete After classes.dex files Central Plains data are loaded into memory headroom, the institute in the complete classes.dex files is deleted State former data.
In the present embodiment, because former data are the data in dex files, therefore can be loaded into memory headroom, work as original Data have been loaded and have stored to after memory headroom, are deleted from complete classes.dex files by by the former data, enter one Step avoids the instruments such as dexdump can steal the risk of former data from internal memory.
Corresponding to the dynamic loading method shown in Fig. 7, a kind of reinforcing is additionally provided in one embodiment of the invention The dynamic loading device of APK, as shown in figure 8, the dynamic loading device includes that target APK decompression modules 810, former data extract mould Block 820 and APK dlm (dynamic loading module)s 830.Wherein:
Target APK decompression modules 810, for decompressing the target APK;
Former data extraction module 820, for the storage location according to encryption data in target APK, extracts the encryption Data, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s 830, for according to the target APK after the former data and decompression, being loaded by dex classes Device carries out dynamic load to the classes.dex files of target APK.
In one embodiment of the invention, if the former data are the number in the classes.dex files in former APK According to the former data extraction module 820 is additionally operable to obtain the original position information of the former data corresponding to encryption data;Now, institute Stating APK dlm (dynamic loading module)s 830 includes complete dex acquiring units 831 and dex dynamic loads unit 832, as shown in Figure 9.Its In:
Complete dex acquiring units 831, for the original position-information according to the former data, the former data are put back to To the correspondence position in the 3rd classes.dex files, the complete classes.dex files of target APK are obtained;
Dex dynamic loads unit 832, for by dex Classloaders to the complete classes.dex files of target APK Carry out dynamic load.
In one embodiment of the invention, the dex dynamic loads unit 832 can also include that former data delete son list Unit 8321, as shown in Figure 10.Wherein:
The former data delete subelement 8321, are added for the former data in the complete classes.dex files After being downloaded in memory headroom, the described former data in the complete classes.dex files are deleted.
The reinforcement means and device and dynamic loading method and device of the APK file provided in the embodiment of the present invention, Suitable for numerous general or special purpose computing system environments and configuration, including but not limited to personal computer, server, hand Holding equipment or portable set, laptop device, the electronic equipment based on Android system etc..
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or deposited between operating In any this actual relation or order.And, term " including ", "comprising" or its any other variant be intended to Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Also there is other identical element in process, method, article or equipment including the key element.
Each embodiment in this specification is described by the way of correlation, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for device reality Apply for example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
One of ordinary skill in the art will appreciate that realizing that all or part of each several part in said apparatus implementation method can Realized with hardware, or realized with the software module run on one or more hardware, it is complete in method implementation method Portion or part steps can be by program to instruct the hardware of correlation to complete.It will be understood by those skilled in the art that this hair Bright described method and apparatus are not limited to the embodiment described in specific embodiment, and specific descriptions above are intended merely to solution The purpose of the present invention is released, the present invention is not intended to limit.Those skilled in the art's technology according to the present invention scheme draws other Implementation method, also belong to technological innovation scope of the invention, protection scope of the present invention is by claim and its equivalent Limit.
Embodiment of the invention discloses that:A1, a kind of reinforcement means of APK file, the method include:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in document form The predeterminated position of the target APK.
A2, the reinforcement means according to A1, the predeterminated position are the position in the classes.dex files of target APK Put.
A3, the reinforcement means according to A2, the predeterminated position are the file of the classes.dex files of target APK Head and/or N number of specified location of data field, N >=1.
A4, the reinforcement means according to A3, the N=1, the specified location is the head or tail of the data field Portion.
A5, the reinforcement means according to A3, the N=2;The encryption data includes that the first encryption data and second adds Ciphertext data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK Position in file is second specified location.
A6, the reinforcement means according to A5, first specified location are the head of the data field, and described second refers to Positioning is set to the afterbody of the data field
A7, the reinforcement means according to A1, the former data are the number in the non-classes.dex files in former APK According to;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, encryption data is added to the corresponding position in former APK Put;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generate target APK。
A8, the reinforcement means according to A7, if the predeterminated position is in the classes.dex files of target APK Position, it is described by addition after former APK in other files in addition to the former data carry out repacking signature, generate target APK, including:
Recalculate and update addition encryption data after former APK classes.dex files File header information, obtain A classes.dex files after renewal;
Other files in addition to the former data of first classes.dex files and original APK are repacked Signature, generation target APK.
A9, the reinforcement means according to A1, the former data are the data in the classes.dex files of former APK;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, encryption data and the original position information are added To the correspondence position in former APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex texts are obtained Part;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are carried out again Packing signature, generation target APK.
Disclosed in embodiments of the invention:B10, a kind of bracing means of APK file, including:
Encryption data generation module, need former data to be protected in former APK to be reinforced, by the former data for obtaining It is encrypted, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption Data are stored in the predeterminated position of the target APK with document form.
B11, the bracing means according to B10, the predeterminated position is in the classes.dex files of target APK Position.
B12, the bracing means according to B11, the predeterminated position are the text of the classes.dex files of target APK Part head and/or N number of specified location of data field, N >=1.
B13, the bracing means according to B12, the N=1, the specified location is the head or tail of the data field Portion.
B14, the bracing means according to B12, the N=2;The encryption data includes the first encryption data and second Encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK Position in file is second specified location.
B15, the bracing means according to B14, first specified location are the head of the data field, described second Specified location is the afterbody of the data field.
B16, the bracing means according to 10, the former data are the number in the non-classes.dex files in former APK According to;
The target APK generation modules include:
First encryption data inserts unit, for the predeterminated position according to encryption data in target APK, will encrypt Data are added to the correspondence position in former APK;
First object APK generation units, enter for other files in the former APK after by addition in addition to the former data Row repacks signature, generation target APK.
B17, the bracing means according to B16, if the predeterminated position is in the classes.dex files of target APK Position, the first object APK generation units include:
Target dex generates subelement, for recalculating and updates the former APK after addition encryption data The File header information of classes.dex files, the classes.dex files after being updated;
Target APK generates subelement, for by a classes.dex files and original APK in addition to the former data Other files repack signature, generation target APK.
B18, the bracing means according to B10, the former data are the data in the classes.dex files of former APK;
The target APK generation modules include:
Original position recording unit, for recording original position information of the former data in the classes.dex files of former APK;
Second encryption data inserts unit, for the predeterminated position according to encryption data in target APK, will encrypt Data and the original position information are added to the correspondence position in former APK;
Former data delete unit, for the described former data in the classes.dex files for deleting former APK, obtain second Classes.dex files;
Target dex generation units, for recalculating and update the File header information of the 2nd classes.dex files, obtain To the 3rd classes.dex files;
Second target APK generation units, for by the 3rd classes.dex files and original APK except its classes.dex Other files outside file carry out repacking signature, generation target APK.
Disclosed in embodiments of the invention:C19, a kind of dynamic loading method of reinforcing APK, the reinforcing APK are to adopt The target APK generated with the reinforcement means of any APK file in A1-A9, the dynamic loading method includes:
Decompress the target APK;
According to encryption data in the storage location of target APK, the encryption data is extracted, and encryption data is decrypted Obtain former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex of target APK File carries out dynamic load.
C20, the dynamic loading method according to C19, if the former data are the classes.dex files in former APK In data, it is described according to encryption data in the storage location of target APK, extract the encryption data, also include:Obtain encryption The original position information of the former data corresponding to data;
The target APK according to after the former data and decompression, by dex Classloaders to target APK's Classes.dex files carry out dynamic load, including:
According to the original position-information of the former data, the former data are put back into the 3rd classes.dex files Correspondence position, obtain the complete classes.dex files of target APK;
Dynamic load is carried out to the complete classes.dex files of target APK by dex Classloaders.
C21, the dynamic loading method according to C20, it is described by dex Classloaders to the complete of target APK Classes.dex files carry out dynamic load, including:
After former data in the complete classes.dex files are loaded into memory headroom, delete described complete Described former data in classes.dex files
Disclosed in embodiments of the invention:D22, a kind of dynamic loading device of reinforcing APK, including:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption number According to, and encryption data is decrypted obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders pair The classes.dex files of target APK carry out dynamic load.
D23, the dynamic loading device according to D22, if the former data are the classes.dex files in former APK In data, the former data extraction module be additionally operable to obtain encryption data corresponding to former data original position information;
The APK dlm (dynamic loading module)s include:
The former data for the original position-information according to the former data, are put back into the by complete dex acquiring units Correspondence position in three classes.dex files, obtains the complete classes.dex files of target APK;
Dex dynamic load units, for the entering to the complete classes.dex files of target APK by dex Classloaders Mobile state is loaded.
D24, the dynamic loading device according to D23, the dex dynamic loads unit include:
Former data delete subelement, and internal memory is loaded into for the former data in the complete classes.dex files After in space, the described former data in the complete classes.dex files are deleted.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technology Within, then the present invention is also intended to comprising these changes and modification.

Claims (10)

1. a kind of reinforcement means of APK file, it is characterised in that including:
Obtain and need former data to be protected in former APK to be reinforced;
The former data are encrypted, encryption data is obtained;
Consolidation process is carried out to the former APK, target APK is generated, wherein, the encryption data is stored in described with document form The predeterminated position of target APK.
2. reinforcement means according to claim 1, it is characterised in that the predeterminated position is target APK's Position in classes.dex files.
3. reinforcement means according to claim 2, it is characterised in that the predeterminated position is target APK's The file header of classes.dex files and/or N number of specified location of data field, N >=1.
4. reinforcement means according to claim 3, it is characterised in that:The N=1, the specified location is the data The head or afterbody in area.
5. reinforcement means according to claim 3, it is characterised in that the N=2;The encryption data includes that first adds Ciphertext data and the second encryption data;
The specified location includes the first specified location and the second specified location, and the first encryption data is target APK's Position in classes.dex files is first specified location, classes.dex of second encryption data in target APK Position in file is second specified location.
6. reinforcement means according to claim 1, it is characterised in that:The former data are non-in former APK Data in classes.dex files;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
The predeterminated position according to encryption data in target APK, the correspondence position in former APK is added to by encryption data;
Other files in former APK after by addition in addition to the former data carry out repacking signature, generation target APK.
7. reinforcement means according to claim 1, it is characterised in that the former data are the classes.dex texts of former APK Data in part;
It is described that consolidation process is carried out to the former APK, target APK is generated, including:
Original position information of the former data of record in the classes.dex files of former APK;
The predeterminated position according to encryption data in target APK, original is added to by encryption data and the original position information Correspondence position in APK;
The described former data in the classes.dex files of original APK are deleted, the 2nd classes.dex files are obtained;
The File header information of the 2nd classes.dex files is recalculated and updated, the 3rd classes.dex files are obtained;
Other files in addition to its classes.dex file of 3rd classes.dex files and original APK are repacked Signature, generation target APK.
8. a kind of bracing means of APK file, it is characterised in that including:
Encryption data generation module, need former data to be protected in former APK to be reinforced for being obtained, and the former data are carried out Encryption, obtains encryption data;
Target APK generation modules, for carrying out consolidation process to the former APK, generate target APK, wherein, the encryption data The predeterminated position of the target APK is stored in document form.
9. a kind of dynamic loading method of reinforcing APK, it is characterised in that the reinforcing APK is using any in claim 1-7 The target APK of the reinforcement means generation of APK file, the dynamic loading method includes:
Decompress the target APK;
According to storage location of the encryption data in target APK, the encryption data is extracted, and encryption data is decrypted To former data;
According to the target APK after the former data and decompression, by dex Classloaders to the classes.dex files of target APK Carry out dynamic load.
10. a kind of dynamic loading device of reinforcing APK, it is characterised in that including:
Target APK decompression modules, for decompressing the target APK;
Former data extraction module, for the storage location according to encryption data in target APK, extracts the encryption data, and Encryption data is decrypted and obtains former data;
APK dlm (dynamic loading module)s, for according to the target APK after the former data and decompression, by dex Classloaders to target The classes.dex files of APK carry out dynamic load.
CN201611139477.3A 2016-12-12 2016-12-12 The reinforcement means and device of a kind of APK, and dynamic loading method and device Pending CN106845167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611139477.3A CN106845167A (en) 2016-12-12 2016-12-12 The reinforcement means and device of a kind of APK, and dynamic loading method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611139477.3A CN106845167A (en) 2016-12-12 2016-12-12 The reinforcement means and device of a kind of APK, and dynamic loading method and device

Publications (1)

Publication Number Publication Date
CN106845167A true CN106845167A (en) 2017-06-13

Family

ID=59139916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611139477.3A Pending CN106845167A (en) 2016-12-12 2016-12-12 The reinforcement means and device of a kind of APK, and dynamic loading method and device

Country Status (1)

Country Link
CN (1) CN106845167A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480479A (en) * 2017-08-15 2017-12-15 北京奇虎科技有限公司 Reinforcement means and device, computing device, the computer-readable storage medium of application program
CN107820129A (en) * 2017-11-16 2018-03-20 四川长虹电器股份有限公司 A kind of automatic method for safeguarding smart machine application data bag
CN108090368A (en) * 2017-12-20 2018-05-29 北京小牛互联科技有限公司 The guard method of APK program files and system
CN108985017A (en) * 2018-09-26 2018-12-11 北京京东金融科技控股有限公司 The reinforcement means and device of application program
CN109086063A (en) * 2018-07-27 2018-12-25 中国联合网络通信集团有限公司 Oftware updating method, file encrypting method, device and storage medium
CN109409039A (en) * 2018-10-24 2019-03-01 北京奇虎科技有限公司 The method and device reinforced for the compression data packet comprising resource file
CN109598107A (en) * 2018-11-20 2019-04-09 江苏通付盾信息安全技术有限公司 A kind of code conversion method and device based on application installation package file
CN110427756A (en) * 2019-06-20 2019-11-08 中国人民解放军战略支援部队信息工程大学 Android malware detection method and device based on capsule network
CN110769008A (en) * 2019-11-05 2020-02-07 长沙豆芽文化科技有限公司 Data security protection method and device and service equipment
CN112084469A (en) * 2020-08-06 2020-12-15 华帝股份有限公司 Encryption method for preventing application program from being reverse engineered
CN112115496A (en) * 2020-09-27 2020-12-22 万兴科技集团股份有限公司 Data decryption mode identification method and device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN104317625A (en) * 2014-11-09 2015-01-28 刘鹏 Dynamic loading method for APK files
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480479B (en) * 2017-08-15 2020-08-07 北京奇虎科技有限公司 Application program reinforcing method and device, computing equipment and computer storage medium
CN107480479A (en) * 2017-08-15 2017-12-15 北京奇虎科技有限公司 Reinforcement means and device, computing device, the computer-readable storage medium of application program
CN107820129A (en) * 2017-11-16 2018-03-20 四川长虹电器股份有限公司 A kind of automatic method for safeguarding smart machine application data bag
CN108090368A (en) * 2017-12-20 2018-05-29 北京小牛互联科技有限公司 The guard method of APK program files and system
CN109086063A (en) * 2018-07-27 2018-12-25 中国联合网络通信集团有限公司 Oftware updating method, file encrypting method, device and storage medium
CN108985017A (en) * 2018-09-26 2018-12-11 北京京东金融科技控股有限公司 The reinforcement means and device of application program
CN109409039A (en) * 2018-10-24 2019-03-01 北京奇虎科技有限公司 The method and device reinforced for the compression data packet comprising resource file
CN109598107A (en) * 2018-11-20 2019-04-09 江苏通付盾信息安全技术有限公司 A kind of code conversion method and device based on application installation package file
CN109598107B (en) * 2018-11-20 2021-02-02 江苏通付盾信息安全技术有限公司 Code conversion method and device based on application installation package file
CN110427756A (en) * 2019-06-20 2019-11-08 中国人民解放军战略支援部队信息工程大学 Android malware detection method and device based on capsule network
CN110769008A (en) * 2019-11-05 2020-02-07 长沙豆芽文化科技有限公司 Data security protection method and device and service equipment
CN112084469A (en) * 2020-08-06 2020-12-15 华帝股份有限公司 Encryption method for preventing application program from being reverse engineered
CN112115496A (en) * 2020-09-27 2020-12-22 万兴科技集团股份有限公司 Data decryption mode identification method and device, computer equipment and storage medium
CN112115496B (en) * 2020-09-27 2024-04-12 万兴科技集团股份有限公司 Data decryption pattern recognition method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106845167A (en) The reinforcement means and device of a kind of APK, and dynamic loading method and device
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
CN106295255B (en) Application program reinforcing method and device
WO2016078130A1 (en) Dynamic loading method for preventing reverse of apk file
CN109871704B (en) Android resource file protection method, equipment and storage medium based on Hook
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
CN106663018A (en) Method to modify ANDROID application life cycle to control its execution in a containerized workspace environment
CN103530535A (en) Shell adding and removing method for Android platform application program protection
CN107070656B (en) Method and system for encrypting and decrypting so file in application program
CN103136458B (en) A kind of (SuSE) Linux OS dynamic base code protection method and device thereof
ES2746127T3 (en) On-demand code decryption integrity
CN104408337A (en) Reinforcement method for preventing reverse of APK (Android package) file
CN107291485B (en) Dynamic link library reinforcing method, operation method, reinforcing device and safety system
US9256756B2 (en) Method of encryption and decryption for shared library in open operating system
CN107040520B (en) Cloud computing data sharing system and method
CN106599629A (en) Strengthening method and apparatus for Android application program
CN104834835A (en) Universal digital rights protection method under Windows platform
CN110620657A (en) Webpage word processing method, system and device
Kim et al. Android Application Protection against Static Reverse Engineering based on Multidexing.
US20220360442A1 (en) On demand code decryption
CN105760721B (en) A kind of software reinforcement method and system
CN116235174A (en) Apparatus and method for performing encryption algorithm
US20230351050A1 (en) Method and apparatus for custom development of payment application, computer device, and storage medium
CN111291001A (en) Reading method and device of computer file, computer system and storage medium
CN113221077B (en) Class file encryption method and equipment based on spring container

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication