CN106845169A - A kind of Jar bags reinforcement means and system - Google Patents

A kind of Jar bags reinforcement means and system Download PDF

Info

Publication number
CN106845169A
CN106845169A CN201611221340.2A CN201611221340A CN106845169A CN 106845169 A CN106845169 A CN 106845169A CN 201611221340 A CN201611221340 A CN 201611221340A CN 106845169 A CN106845169 A CN 106845169A
Authority
CN
China
Prior art keywords
jar
key
packages
decryption
apmb packages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611221340.2A
Other languages
Chinese (zh)
Other versions
CN106845169B (en
Inventor
宫亚明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing WatchSmart Technologies Co Ltd
Original Assignee
Beijing WatchSmart Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchSmart Technologies Co Ltd filed Critical Beijing WatchSmart Technologies Co Ltd
Priority to CN201611221340.2A priority Critical patent/CN106845169B/en
Publication of CN106845169A publication Critical patent/CN106845169A/en
Application granted granted Critical
Publication of CN106845169B publication Critical patent/CN106845169B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing

Abstract

The present invention relates to a kind of Jar bags reinforcement means and system, methods described comprises the following steps:Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;Android projects decrypt Jar APMB packages using decryption dynamic base;Android projects call the Jar APMB packages after decryption;Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.The present invention is before Jar APMB packages are supplied to Android project uses, it is necessary to be first encrypted to it.It is supplied to Android projects to use the Jar APMB packages after encryption and the dynamic base for decrypting.Because the present invention includes removing file after the completion of cipher key-extraction, Jar packet encryptions, the decryption of Native dynamic bases and decryption; therefore improve the reverse difficulty of Jar bags; Jar APMB packages in protection Android, strengthen its security, reduce the risk that Jar bag source codes are inversely obtained.

Description

A kind of Jar bags reinforcement means and system
Technical field
The invention belongs to computer security technical field, and in particular to use Native in a kind of Android projects The reinforcement means and system of a kind of Jar bags of programming realization.
Background technology
Because Java is a kind of cross-platform programming language, its source code (.java files) be compiled into it is platform-independent Bytecode (.class files), then in run time dynamic linking.So, symbol table will be included in the class file after compiling, So that java applet is easy to by decompiling, thus the structure of procedures of observation with realize details.For needing to provide Jar The third party of (Java Archive, i.e. Java archive) bag, for protection intellectual property, it is necessary to be protected to Jar bags, increases non- Method user gets the difficulty to Java source code static analyses after Jar bags.
During to provide Jar bags in Android projects, source code is obtained, it is necessary to right in order to prevent Jar to be coated with conversed analysis Jar APMB packages carry out consolidation process.Present reinforcement means have obscured using Proguard instruments, DEX (Dalvik Executable, i.e. Dalvik executable files) protection, algorithm for encryption protection etc..
The patented technology application of this respect, such as Chinese invention patent of Application No. 201110288519.0 are had at present Application, discloses guard method and the system of a kind of Java source code.When first starts class and be called, the method includes following Step, wherein, first starts the startup class that class is java applet:Be decrypted for first ciphertext data by the first startup class, obtains Classloader;Be decrypted for second ciphertext data reading internal memory by Classloader, obtains the first kind, wherein, the first kind is Java The class of virtual machine operation, the entitled .class of its suffix;Second startup class is loaded into internal memory by Classloader, wherein, second starts Class starts class for the original in the jar bags of java applet;And the first kind is loaded into Java Virtual Machine by Classloader, so as to Java Virtual machine can call the main interface in the second startup class, run java applet.By the present invention, Java source code can be realized Protection so that Java source code is difficult to be disassembled.
However, in above-mentioned technology, having certain limitation for Android platform:Carried out using Proguard instruments Code obfuscation, code changes a part of class name, method name and variable name so that code is read after decompiling after obscuring Difficulty increases.But obscure and only increase reverse time cost, still suffer from by reverse successfully risk.On the other hand, mix Function of confusing has certain limitation, and some crucial class name, method name and variable names using limitation because that can not be obscured.And AES After encryption Jar APMB packages, to be needed to use when App calls Jar and carry out loading again after secret key decryption and call.The safety of this method Property depend on the security of key, if during key is stored in source code in the form of the character string, it is larger by reverse risk.Separately On the one hand, write using Java language in Android, the reverse difficulty of Java is small compared with C/C++, no matter encryption key is stored in It is calculated in source code or by algorithm, can all there is the risk for inversely being obtained.
The content of the invention
To solve the above problems, the present invention proposes a kind of use symmetric encipherment algorithm to the method for Jar packet encryptions and is File is removed after the completion of system, including the decryption of cipher key-extraction, Jar packet encryptions, Native dynamic bases and decryption, Jar bags are improve Reverse difficulty, Jar APMB packages in protection Android, strengthens its security, reduces what Jar bag source codes were inversely obtained Risk.
Specifically, according to an aspect of the invention, there is provided a kind of Jar bags reinforcement means, methods described includes as follows Step:
Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;
Android projects decrypt Jar APMB packages using decryption dynamic base;
Android projects call the Jar APMB packages after decryption;
Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.
Further, Jar bags reinforcement means as described above, the Jar packet encryptions are divided into three below step:
(1), the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
(2) key of symmetric encipherment algorithm, is extracted from the Jar APMB package heads of N byte using key-extraction algorithm;
(3) symmetric encipherment algorithm and described close, is used to the part in addition to preceding N byte of original Jar APMB packages Key is encrypted, and is then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
Further, Jar bags reinforcement means as described above, the key-extraction algorithm is the one kind or many in following three kinds Plant combination:The first, some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key; Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, these bytes are then carried out into logical AND, is patrolled Volume or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;The third, first calculates N The cryptographic Hash of the Jar APMB package heads of byte, then selects some bytes of the cryptographic Hash as one of key or key Point.
Further, Jar bags reinforcement means as described above, it is described using decryption dynamic base decrypt Jar APMB packages be divided into Lower three steps:
(1) the head N byte of new Jar APMB packages, is replicated as the head of Jar APMB packages after decryption;
(2), decruption key is extracted from the head of new Jar APMB packages using key-extraction algorithm;
(3), the part using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte is decrypted, with Head combination is Jar APMB packages after decryption.
Further, Jar bags reinforcement means as described above, the symmetric encipherment algorithm is the one kind in following algorithm: DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6。
According to another aspect of the present invention, present invention also offers a kind of Jar bags hardened system, the system is included such as Lower module:
Jar packet encryption modules, for encrypting Jar APMB packages;
Jar bag deciphering modules, for decrypting Jar APMB packages using decryption dynamic base;
Jar bag calling modules, for calling the Jar APMB packages after decryption;
File removing module, the DEX texts discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages Part.
Further, Jar bags hardened system as described above, the Jar packet encryptions module has following three unit:
First copied cells, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit, for being extracted from the Jar APMB package heads of N byte symmetrically using key-extraction algorithm The key of AES;
Encryption and assembled unit, are symmetrically added for the part in addition to preceding N byte to original Jar APMB packages using described Close algorithm and the key are encrypted, and are then new Jar bags text the part after encryption and the head combination of new Jar APMB packages Part.
Further, Jar bags hardened system as described above, the key-extraction algorithm is the one kind or many in following three kinds Plant combination:The first, some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key; Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, these bytes are then carried out into logical AND, is patrolled Volume or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;The third, first calculates N The cryptographic Hash of the Jar APMB package heads of byte, then selects some bytes of the cryptographic Hash as one of key or key Point.
Further, Jar bags hardened system as described above, the Jar bags deciphering module has following three unit:
Second copied cells, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption;
Decruption key extraction unit, for extracting decruption key from the head of new Jar APMB packages using key-extraction algorithm;
Decryption and assembled unit, for using symmetric encipherment algorithm and decruption key new Jar APMB packages remove preceding N byte it Outer part decryption, is Jar APMB packages after decryption with head combination.
Further, Jar bags hardened system as described above, the symmetric encipherment algorithm is the one kind in following algorithm: DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6。
Beneficial effects of the present invention are as follows:
In the present invention, by the way that Jar packet encryptions, the method using Native dynamic bases in Android projects decrypts Jar Bag, key extraction method and decryption method are realized by Native dynamic bases, so the security risk of Jar bags are transferred to In the safety of Native dynamic bases.Because Native dynamic bases are write using C/C++ language, reverse difficulty is better than Java languages Speech, on the other hand, currently to the Scheme of Strengthening comparative maturity of Native dynamic bases, can more improve the safety of Native dynamic bases Property, so as to improve the security of Jar bags.
In the present invention, use symmetric encipherment algorithm to Jar bag encryption and decryption, decryption efficiency will than rivest, shamir, adelman It is high.
In the present invention, head N byte is consistent before and after Jar packet encryptions, is encrypted rather than to whole Jar APMB packages, gives Conversed analysis increased fascination.
In the present invention, encryption and decryption key is extracted from Jar bags and obtained, and is reduced a key storage and is illegally used in code The risk that family is inversely read.
In the present invention, Android projects are called after completing the Jar bags after decrypting, and are deleted the Jar APMB packages and are therefrom released The DEX file of releasing, reduces the probability that Jar and DEX file after decryption are acquired.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
Fig. 1 is a kind of Jar bags reinforcement means flow chart of the invention;
Fig. 2 is Jar packet encryptions flow chart of the invention;
Fig. 3 is Jar packet encryptions principle schematic of the invention;
Fig. 4 is the flow chart of decryption Jar bags of the invention;
Fig. 5 is that Jar bags of the invention decrypt principle schematic;
Fig. 6 is the flow chart of use Jar bags of the invention;
Fig. 7 is a kind of module map of Jar bags hardened system of the invention;
Fig. 8 is the structure chart of Jar packet encryptions module of the invention;
Fig. 9 is the structure chart of Jar bags deciphering module of the invention;
Figure 10 is the Jar packet encryption principle schematics in another preferred embodiment of the invention.
Specific embodiment
The invention will be further described with reference to the accompanying drawings and detailed description.
Embodiment 1
In the present embodiment, it is necessary to be first encrypted to it before Jar APMB packages are supplied to Android project uses. Jar APMB packages after encryption and the dynamic base for decrypting are supplied to Android projects to use.
Specifically, as shown in figure 1, being a kind of Jar bags reinforcement means flow chart of the invention, methods described includes following step Suddenly:
S110, encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects.
As shown in Fig. 2 Jar packet encryptions are divided into three below step:
N byte before S111, replicating original Jar APMB packages (hereinafter referred to as raw.jar), as new Jar APMB packages (hereinafter referred to as Be new.jar) head.
S112, (hereinafter referred to as f) extract symmetric cryptography from the Jar APMB package heads of N byte using key-extraction algorithm Algorithm (hereinafter referred to as F, for next encryption Jar bag afterbodys, can be DES, 3DES, AES, SM4, Blowfish, IDEA, The symmetric encipherment algorithms such as RC4, RC5, RC6) key key.The key-extraction algorithm includes following three kinds combinations:The first, Some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key;Second, first from N words Some bytes are randomly choosed in the Jar APMB package heads of section, these bytes are then carried out into logical AND, logic or, and/or Hash Calculate, some bytes after selection treatment are used as key or a part for key;The third, first calculates the Jar bags text of N byte The cryptographic Hash of part head, then selects some bytes of the cryptographic Hash as key or a part for key.
Because Jar APMB packages are substantially zip files, its head has fixed character, for the key for ensureing to extract Security, the selection of N can not be too small, while being tried one's best when key-extraction algorithm is designed avoids some bytes of head.
S113, the afterbody (part in addition to preceding N byte) to raw.jar are encrypted using F, and encryption key is key. It is new.jar the head combination of the part after encryption and new.jar.New.jar texts after encryption are provided for Android projects Part.Fig. 3 is Jar packet encryptions principle schematic of the invention corresponding with above-mentioned encryption flow.
S120, Android project decrypt Jar APMB packages using decryption dynamic base.First by the C/C++ based on Native Language writes decryption dynamic base (referred to as lib.so).It is original that decryption method in lib.so is used for new.jar decryption raw.jar。
As shown in figure 4, the decryption step of lib.so is:
S121, duplication new.jar heads N byte are used as raw'.jar heads;
S122, key-extraction algorithm f is used to extract decruption key key from new.jar heads;
S123, using symmetric encipherment algorithm F new.jar afterbodys decrypt, with head combination be raw'.jar, raw'.jar As original Jar APMB packages.Fig. 5 is Jar bags decryption principle schematic of the invention corresponding with above-mentioned decryption flow.
S130, Android project call the Jar APMB packages after decryption.
S140, Android deletion of items decryption after Jar APMB packages and discharged from the Jar APMB packages DEX text Part.
, it is necessary to provide it two files of new.jar and lib.so when needing to use Jar bags in Android projects, As shown in fig. 6, being using the process of Jar bags:
S151, Android project load lib.so;
S152, call the decryption method of lib.so that new.jar is reduced to raw'.jar;
S153, Android project call the raw'.jar after decryption;
S154, Android project have been used after raw'.jar, delete raw'.jar and the DEX file for therefrom discharging.
According to another aspect of the present invention, as shown in fig. 7, being a kind of module of Jar bags hardened system 200 of the invention Figure, the system 200 includes such as lower module:
Jar packet encryptions module 210, for encrypting Jar APMB packages;
Jar bags deciphering module 220, for decrypting Jar APMB packages using decryption dynamic base;
Jar bags calling module 230, for calling the Jar APMB packages after decryption;
File removing module 240, the DEX discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages File.
As shown in figure 8, the Jar packet encryptions module 210 has following three unit:
First copied cells 211, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit 212, for being extracted from the Jar APMB package heads of N byte using key-extraction algorithm The key of symmetric encipherment algorithm;
Encryption and assembled unit 213, it is described right to be used for the part in addition to preceding N byte to original Jar APMB packages Claim AES and the key to be encrypted, with the head combination of new Jar APMB packages be then new Jar the part after encryption APMB package.
The key-extraction algorithm is the one kind in the following two kinds:The first, from the Jar APMB package heads of N byte with Machine selects some bytes as key or a part for key;Second, first selected at random from the Jar APMB package heads of N byte Select some bytes, then by these bytes carry out logical AND, logic or, and/or Hash calculation, selection treatment after some bytes As key or a part for key;The third, first calculates the cryptographic Hash of the Jar APMB package heads of N byte, then selects described Some bytes of cryptographic Hash are used as key or a part for key.
As shown in figure 9, the Jar bags deciphering module 220 has following three unit:
Second copied cells 221, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption Portion;
Decruption key extraction unit 222, it is close for extracting decryption from the head of new Jar APMB packages using key-extraction algorithm Key;
Decryption and assembled unit 223, for the portion using symmetric encipherment algorithm new Jar APMB packages in addition to preceding N byte Decompose close, be Jar APMB packages after decryption with head combination.
Person skilled in art should be understood that the symmetric encipherment algorithm mentioned in above example of the present invention should include DES (Data Encryption Standard, i.e. data encryption standards), 3DES, AES (Advanced Encryption Standard, i.e. Advanced Encryption Standard), SM4, Blowfish, IDEA, RC4, RC5, RC6 etc..
Jar packet headers are maintained in embodiment more than of the invention constant, Jar bag afterbodys are encrypted, but at this In another preferred embodiment of invention, as shown in Figure 10, it is also possible to keep a part or afterbody in the middle of Jar bags constant, encryption Other parts, encryption key is from keeping constant extracting section.
It will be understood by those skilled in the art that method and system of the present invention is not limited to institute in specific embodiment The embodiment stated, specific descriptions above are intended merely to the explanation purpose of the present invention, are not intended to limit the present invention.This area skill Art personnel's technology according to the present invention scheme draws other implementation methods, also belongs to technological innovation scope of the invention, this The protection domain of invention is limited by claim and its equivalent.

Claims (10)

1. a kind of Jar bags reinforcement means, methods described comprises the following steps:
Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;
Android projects decrypt Jar APMB packages using decryption dynamic base;
Android projects call the Jar APMB packages after decryption;
Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.
2. Jar bags reinforcement means as claimed in claim 1, it is characterised in that the Jar packet encryptions are divided into three below step Suddenly:
(1), the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
(2) key of symmetric encipherment algorithm, is extracted from the Jar APMB package heads of N byte using key-extraction algorithm;
(3), the part in addition to preceding N byte to original Jar APMB packages is entered using the symmetric encipherment algorithm and the key Row encryption, is then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
3. Jar bags reinforcement means as claimed in claim 2, it is characterised in that the key-extraction algorithm is in following three kinds One or more combination:The first, some bytes are randomly choosed as key or close from the Jar APMB package heads of N byte A part for key;Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, then enter these bytes Row logical AND, logic or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;3rd Kind, first calculate the cryptographic Hash of the Jar APMB package heads of N byte, then select some bytes of the cryptographic Hash as key or A part for key.
4. Jar bags reinforcement means as claimed in claim 1, it is characterised in that described to decrypt Jar bags using decryption dynamic base literary Part is divided into three below step:
(1) the head N byte of new Jar APMB packages, is replicated as the head of Jar APMB packages after decryption;
(2), decruption key is extracted from the head of new Jar APMB packages using key-extraction algorithm;
(3), the part using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte is decrypted, with head It is combined as Jar APMB packages after decryption.
5. the Jar bag reinforcement means as described in claim 2-4 any one, it is characterised in that the symmetric encipherment algorithm is One kind in following algorithm:DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6.
6. a kind of Jar bags hardened system, it is characterised in that the system includes such as lower module:
Jar packet encryption modules, for encrypting Jar APMB packages;
Jar bag deciphering modules, for decrypting Jar APMB packages using decryption dynamic base;
Jar bag calling modules, for calling the Jar APMB packages after decryption;
File removing module, the DEX file discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages.
7. Jar bags hardened system as claimed in claim 6, it is characterised in that the Jar packet encryptions module has following three Unit:
First copied cells, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit, for extracting symmetric cryptography from the Jar APMB package heads of N byte using key-extraction algorithm The key of algorithm;
Encryption and assembled unit, are calculated for the part in addition to preceding N byte to original Jar APMB packages using the symmetric cryptography Method and the key are encrypted, and are then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
8. Jar bags hardened system as claimed in claim 7, it is characterised in that the key-extraction algorithm is in following three kinds One or more combination:The first, some bytes are randomly choosed as key or close from the Jar APMB package heads of N byte A part for key;Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, then enter these bytes Row logical AND, logic or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;3rd Kind, first calculate the cryptographic Hash of the Jar APMB package heads of N byte, then select some bytes of the cryptographic Hash as key or A part for key.
9. Jar bags hardened system as claimed in claim 6, it is characterised in that the Jar bags deciphering module has following three Unit:
Second copied cells, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption;
Decruption key extraction unit, for extracting decruption key from the head of new Jar APMB packages using key-extraction algorithm;
Decryption and assembled unit, for using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte Part is decrypted, and is Jar APMB packages after decryption with head combination.
10. Jar bag hardened systems as described in claim 7-9 any one, it is characterised in that the symmetric encipherment algorithm is One kind in following algorithm:DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6.
CN201611221340.2A 2016-12-26 2016-12-26 Jar package reinforcing method and system Active CN106845169B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611221340.2A CN106845169B (en) 2016-12-26 2016-12-26 Jar package reinforcing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611221340.2A CN106845169B (en) 2016-12-26 2016-12-26 Jar package reinforcing method and system

Publications (2)

Publication Number Publication Date
CN106845169A true CN106845169A (en) 2017-06-13
CN106845169B CN106845169B (en) 2023-04-07

Family

ID=59136794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611221340.2A Active CN106845169B (en) 2016-12-26 2016-12-26 Jar package reinforcing method and system

Country Status (1)

Country Link
CN (1) CN106845169B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199645A (en) * 2020-10-16 2021-01-08 国能日新科技股份有限公司 Jar packet encryption method and device based on Springboot

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043932A (en) * 2010-12-31 2011-05-04 中国航空工业集团公司第六三一研究所 Method for preventing Java program from being decompiled
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN104680039A (en) * 2013-11-28 2015-06-03 腾讯科技(深圳)有限公司 Data protection method and device of application installation package
US20150186681A1 (en) * 2013-12-31 2015-07-02 Giga-Byte Technology Co., Ltd. Method of encryption and decryption for shared library in open operating system
CN105426777A (en) * 2015-11-17 2016-03-23 中科创达软件股份有限公司 Dynamic-link library file encryption, decryption methods and devices
CN105683990A (en) * 2013-10-10 2016-06-15 Inka安特沃客有限公司 Method and apparatus for protecting dynamic libraries
KR20160118920A (en) * 2015-04-04 2016-10-12 홍동철 Method of apk file protection, apk file protection system performing the same, and storage medium storing the same
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102043932A (en) * 2010-12-31 2011-05-04 中国航空工业集团公司第六三一研究所 Method for preventing Java program from being decompiled
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN105683990A (en) * 2013-10-10 2016-06-15 Inka安特沃客有限公司 Method and apparatus for protecting dynamic libraries
CN104680039A (en) * 2013-11-28 2015-06-03 腾讯科技(深圳)有限公司 Data protection method and device of application installation package
US20150186681A1 (en) * 2013-12-31 2015-07-02 Giga-Byte Technology Co., Ltd. Method of encryption and decryption for shared library in open operating system
KR20160118920A (en) * 2015-04-04 2016-10-12 홍동철 Method of apk file protection, apk file protection system performing the same, and storage medium storing the same
CN105426777A (en) * 2015-11-17 2016-03-23 中科创达软件股份有限公司 Dynamic-link library file encryption, decryption methods and devices
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199645A (en) * 2020-10-16 2021-01-08 国能日新科技股份有限公司 Jar packet encryption method and device based on Springboot

Also Published As

Publication number Publication date
CN106845169B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN104298932B (en) A kind of call method and device of SO files
CN102890758B (en) Method and system for protecting executable file
CN105426708B (en) A kind of reinforcement means of the application program of android system
US20160203087A1 (en) Method for providing security for common intermediate language-based program
US8412926B1 (en) Using file metadata for data obfuscation
CN104573528B (en) A kind of anti-copy Soc starting method and chip
CN104408337A (en) Reinforcement method for preventing reverse of APK (Android package) file
CN111191195A (en) Method and device for protecting APK
CN104268444A (en) Cloud OS Java source code protection method
CN103617401A (en) Method and device for protecting data files
CN101814124A (en) Java-based method for enhancing software security
JP6698774B2 (en) Security providing apparatus and method for common intermediate language, and security executing apparatus and method
CN107430650A (en) Computer program is protected to resist reverse-engineering
CN106778088A (en) Dynamic loading method based on Hook technologies
Kim et al. A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC
CN104200137A (en) Method for guaranteeing self-security of JAVA program
CN108133147A (en) Guard method, equipment and the readable storage medium storing program for executing of executable code
CN108537010A (en) AES (advanced encryption standard) algorithm-based Android application Native shell encryption method
Hur et al. Data acquisition methods using backup data decryption of Sony smartphones
US10110373B2 (en) System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient
CN107257282A (en) A kind of full bag encryption method of code based on RC4 algorithms
CN106845169A (en) A kind of Jar bags reinforcement means and system
CN101539979B (en) Method for controlling and protecting electronic document and device thereof
CN112667975A (en) Android system application software safety protection method based on hybrid reinforcement
CN106650342B (en) Jar package reinforcement method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant