CN106845169A - A kind of Jar bags reinforcement means and system - Google Patents
A kind of Jar bags reinforcement means and system Download PDFInfo
- Publication number
- CN106845169A CN106845169A CN201611221340.2A CN201611221340A CN106845169A CN 106845169 A CN106845169 A CN 106845169A CN 201611221340 A CN201611221340 A CN 201611221340A CN 106845169 A CN106845169 A CN 106845169A
- Authority
- CN
- China
- Prior art keywords
- jar
- key
- packages
- decryption
- apmb packages
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000002787 reinforcement Effects 0.000 title claims abstract description 17
- 238000000605 extraction Methods 0.000 claims abstract description 28
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000012217 deletion Methods 0.000 claims abstract description 7
- 230000037430 deletion Effects 0.000 claims abstract description 7
- 230000003362 replicative effect Effects 0.000 claims description 9
- 241001441724 Tetraodontidae Species 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000013478 data encryption standard Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 208000027534 Emotional disease Diseases 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000052 comparative effect Effects 0.000 description 1
- 238000007596 consolidation process Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
Abstract
The present invention relates to a kind of Jar bags reinforcement means and system, methods described comprises the following steps:Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;Android projects decrypt Jar APMB packages using decryption dynamic base;Android projects call the Jar APMB packages after decryption;Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.The present invention is before Jar APMB packages are supplied to Android project uses, it is necessary to be first encrypted to it.It is supplied to Android projects to use the Jar APMB packages after encryption and the dynamic base for decrypting.Because the present invention includes removing file after the completion of cipher key-extraction, Jar packet encryptions, the decryption of Native dynamic bases and decryption; therefore improve the reverse difficulty of Jar bags; Jar APMB packages in protection Android, strengthen its security, reduce the risk that Jar bag source codes are inversely obtained.
Description
Technical field
The invention belongs to computer security technical field, and in particular to use Native in a kind of Android projects
The reinforcement means and system of a kind of Jar bags of programming realization.
Background technology
Because Java is a kind of cross-platform programming language, its source code (.java files) be compiled into it is platform-independent
Bytecode (.class files), then in run time dynamic linking.So, symbol table will be included in the class file after compiling,
So that java applet is easy to by decompiling, thus the structure of procedures of observation with realize details.For needing to provide Jar
The third party of (Java Archive, i.e. Java archive) bag, for protection intellectual property, it is necessary to be protected to Jar bags, increases non-
Method user gets the difficulty to Java source code static analyses after Jar bags.
During to provide Jar bags in Android projects, source code is obtained, it is necessary to right in order to prevent Jar to be coated with conversed analysis
Jar APMB packages carry out consolidation process.Present reinforcement means have obscured using Proguard instruments, DEX (Dalvik
Executable, i.e. Dalvik executable files) protection, algorithm for encryption protection etc..
The patented technology application of this respect, such as Chinese invention patent of Application No. 201110288519.0 are had at present
Application, discloses guard method and the system of a kind of Java source code.When first starts class and be called, the method includes following
Step, wherein, first starts the startup class that class is java applet:Be decrypted for first ciphertext data by the first startup class, obtains
Classloader;Be decrypted for second ciphertext data reading internal memory by Classloader, obtains the first kind, wherein, the first kind is Java
The class of virtual machine operation, the entitled .class of its suffix;Second startup class is loaded into internal memory by Classloader, wherein, second starts
Class starts class for the original in the jar bags of java applet;And the first kind is loaded into Java Virtual Machine by Classloader, so as to Java
Virtual machine can call the main interface in the second startup class, run java applet.By the present invention, Java source code can be realized
Protection so that Java source code is difficult to be disassembled.
However, in above-mentioned technology, having certain limitation for Android platform:Carried out using Proguard instruments
Code obfuscation, code changes a part of class name, method name and variable name so that code is read after decompiling after obscuring
Difficulty increases.But obscure and only increase reverse time cost, still suffer from by reverse successfully risk.On the other hand, mix
Function of confusing has certain limitation, and some crucial class name, method name and variable names using limitation because that can not be obscured.And AES
After encryption Jar APMB packages, to be needed to use when App calls Jar and carry out loading again after secret key decryption and call.The safety of this method
Property depend on the security of key, if during key is stored in source code in the form of the character string, it is larger by reverse risk.Separately
On the one hand, write using Java language in Android, the reverse difficulty of Java is small compared with C/C++, no matter encryption key is stored in
It is calculated in source code or by algorithm, can all there is the risk for inversely being obtained.
The content of the invention
To solve the above problems, the present invention proposes a kind of use symmetric encipherment algorithm to the method for Jar packet encryptions and is
File is removed after the completion of system, including the decryption of cipher key-extraction, Jar packet encryptions, Native dynamic bases and decryption, Jar bags are improve
Reverse difficulty, Jar APMB packages in protection Android, strengthens its security, reduces what Jar bag source codes were inversely obtained
Risk.
Specifically, according to an aspect of the invention, there is provided a kind of Jar bags reinforcement means, methods described includes as follows
Step:
Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;
Android projects decrypt Jar APMB packages using decryption dynamic base;
Android projects call the Jar APMB packages after decryption;
Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.
Further, Jar bags reinforcement means as described above, the Jar packet encryptions are divided into three below step:
(1), the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
(2) key of symmetric encipherment algorithm, is extracted from the Jar APMB package heads of N byte using key-extraction algorithm;
(3) symmetric encipherment algorithm and described close, is used to the part in addition to preceding N byte of original Jar APMB packages
Key is encrypted, and is then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
Further, Jar bags reinforcement means as described above, the key-extraction algorithm is the one kind or many in following three kinds
Plant combination:The first, some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key;
Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, these bytes are then carried out into logical AND, is patrolled
Volume or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;The third, first calculates N
The cryptographic Hash of the Jar APMB package heads of byte, then selects some bytes of the cryptographic Hash as one of key or key
Point.
Further, Jar bags reinforcement means as described above, it is described using decryption dynamic base decrypt Jar APMB packages be divided into
Lower three steps:
(1) the head N byte of new Jar APMB packages, is replicated as the head of Jar APMB packages after decryption;
(2), decruption key is extracted from the head of new Jar APMB packages using key-extraction algorithm;
(3), the part using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte is decrypted, with
Head combination is Jar APMB packages after decryption.
Further, Jar bags reinforcement means as described above, the symmetric encipherment algorithm is the one kind in following algorithm:
DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6。
According to another aspect of the present invention, present invention also offers a kind of Jar bags hardened system, the system is included such as
Lower module:
Jar packet encryption modules, for encrypting Jar APMB packages;
Jar bag deciphering modules, for decrypting Jar APMB packages using decryption dynamic base;
Jar bag calling modules, for calling the Jar APMB packages after decryption;
File removing module, the DEX texts discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages
Part.
Further, Jar bags hardened system as described above, the Jar packet encryptions module has following three unit:
First copied cells, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit, for being extracted from the Jar APMB package heads of N byte symmetrically using key-extraction algorithm
The key of AES;
Encryption and assembled unit, are symmetrically added for the part in addition to preceding N byte to original Jar APMB packages using described
Close algorithm and the key are encrypted, and are then new Jar bags text the part after encryption and the head combination of new Jar APMB packages
Part.
Further, Jar bags hardened system as described above, the key-extraction algorithm is the one kind or many in following three kinds
Plant combination:The first, some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key;
Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, these bytes are then carried out into logical AND, is patrolled
Volume or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;The third, first calculates N
The cryptographic Hash of the Jar APMB package heads of byte, then selects some bytes of the cryptographic Hash as one of key or key
Point.
Further, Jar bags hardened system as described above, the Jar bags deciphering module has following three unit:
Second copied cells, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption;
Decruption key extraction unit, for extracting decruption key from the head of new Jar APMB packages using key-extraction algorithm;
Decryption and assembled unit, for using symmetric encipherment algorithm and decruption key new Jar APMB packages remove preceding N byte it
Outer part decryption, is Jar APMB packages after decryption with head combination.
Further, Jar bags hardened system as described above, the symmetric encipherment algorithm is the one kind in following algorithm:
DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6。
Beneficial effects of the present invention are as follows:
In the present invention, by the way that Jar packet encryptions, the method using Native dynamic bases in Android projects decrypts Jar
Bag, key extraction method and decryption method are realized by Native dynamic bases, so the security risk of Jar bags are transferred to
In the safety of Native dynamic bases.Because Native dynamic bases are write using C/C++ language, reverse difficulty is better than Java languages
Speech, on the other hand, currently to the Scheme of Strengthening comparative maturity of Native dynamic bases, can more improve the safety of Native dynamic bases
Property, so as to improve the security of Jar bags.
In the present invention, use symmetric encipherment algorithm to Jar bag encryption and decryption, decryption efficiency will than rivest, shamir, adelman
It is high.
In the present invention, head N byte is consistent before and after Jar packet encryptions, is encrypted rather than to whole Jar APMB packages, gives
Conversed analysis increased fascination.
In the present invention, encryption and decryption key is extracted from Jar bags and obtained, and is reduced a key storage and is illegally used in code
The risk that family is inversely read.
In the present invention, Android projects are called after completing the Jar bags after decrypting, and are deleted the Jar APMB packages and are therefrom released
The DEX file of releasing, reduces the probability that Jar and DEX file after decryption are acquired.
Described above is only the general introduction of technical solution of the present invention, in order to better understand technological means of the invention,
And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by specific embodiment of the invention.
Brief description of the drawings
Fig. 1 is a kind of Jar bags reinforcement means flow chart of the invention;
Fig. 2 is Jar packet encryptions flow chart of the invention;
Fig. 3 is Jar packet encryptions principle schematic of the invention;
Fig. 4 is the flow chart of decryption Jar bags of the invention;
Fig. 5 is that Jar bags of the invention decrypt principle schematic;
Fig. 6 is the flow chart of use Jar bags of the invention;
Fig. 7 is a kind of module map of Jar bags hardened system of the invention;
Fig. 8 is the structure chart of Jar packet encryptions module of the invention;
Fig. 9 is the structure chart of Jar bags deciphering module of the invention;
Figure 10 is the Jar packet encryption principle schematics in another preferred embodiment of the invention.
Specific embodiment
The invention will be further described with reference to the accompanying drawings and detailed description.
Embodiment 1
In the present embodiment, it is necessary to be first encrypted to it before Jar APMB packages are supplied to Android project uses.
Jar APMB packages after encryption and the dynamic base for decrypting are supplied to Android projects to use.
Specifically, as shown in figure 1, being a kind of Jar bags reinforcement means flow chart of the invention, methods described includes following step
Suddenly:
S110, encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects.
As shown in Fig. 2 Jar packet encryptions are divided into three below step:
N byte before S111, replicating original Jar APMB packages (hereinafter referred to as raw.jar), as new Jar APMB packages (hereinafter referred to as
Be new.jar) head.
S112, (hereinafter referred to as f) extract symmetric cryptography from the Jar APMB package heads of N byte using key-extraction algorithm
Algorithm (hereinafter referred to as F, for next encryption Jar bag afterbodys, can be DES, 3DES, AES, SM4, Blowfish, IDEA,
The symmetric encipherment algorithms such as RC4, RC5, RC6) key key.The key-extraction algorithm includes following three kinds combinations:The first,
Some bytes are randomly choosed from the Jar APMB package heads of N byte as key or a part for key;Second, first from N words
Some bytes are randomly choosed in the Jar APMB package heads of section, these bytes are then carried out into logical AND, logic or, and/or Hash
Calculate, some bytes after selection treatment are used as key or a part for key;The third, first calculates the Jar bags text of N byte
The cryptographic Hash of part head, then selects some bytes of the cryptographic Hash as key or a part for key.
Because Jar APMB packages are substantially zip files, its head has fixed character, for the key for ensureing to extract
Security, the selection of N can not be too small, while being tried one's best when key-extraction algorithm is designed avoids some bytes of head.
S113, the afterbody (part in addition to preceding N byte) to raw.jar are encrypted using F, and encryption key is key.
It is new.jar the head combination of the part after encryption and new.jar.New.jar texts after encryption are provided for Android projects
Part.Fig. 3 is Jar packet encryptions principle schematic of the invention corresponding with above-mentioned encryption flow.
S120, Android project decrypt Jar APMB packages using decryption dynamic base.First by the C/C++ based on Native
Language writes decryption dynamic base (referred to as lib.so).It is original that decryption method in lib.so is used for new.jar decryption
raw.jar。
As shown in figure 4, the decryption step of lib.so is:
S121, duplication new.jar heads N byte are used as raw'.jar heads;
S122, key-extraction algorithm f is used to extract decruption key key from new.jar heads;
S123, using symmetric encipherment algorithm F new.jar afterbodys decrypt, with head combination be raw'.jar, raw'.jar
As original Jar APMB packages.Fig. 5 is Jar bags decryption principle schematic of the invention corresponding with above-mentioned decryption flow.
S130, Android project call the Jar APMB packages after decryption.
S140, Android deletion of items decryption after Jar APMB packages and discharged from the Jar APMB packages DEX text
Part.
, it is necessary to provide it two files of new.jar and lib.so when needing to use Jar bags in Android projects,
As shown in fig. 6, being using the process of Jar bags:
S151, Android project load lib.so;
S152, call the decryption method of lib.so that new.jar is reduced to raw'.jar;
S153, Android project call the raw'.jar after decryption;
S154, Android project have been used after raw'.jar, delete raw'.jar and the DEX file for therefrom discharging.
According to another aspect of the present invention, as shown in fig. 7, being a kind of module of Jar bags hardened system 200 of the invention
Figure, the system 200 includes such as lower module:
Jar packet encryptions module 210, for encrypting Jar APMB packages;
Jar bags deciphering module 220, for decrypting Jar APMB packages using decryption dynamic base;
Jar bags calling module 230, for calling the Jar APMB packages after decryption;
File removing module 240, the DEX discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages
File.
As shown in figure 8, the Jar packet encryptions module 210 has following three unit:
First copied cells 211, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit 212, for being extracted from the Jar APMB package heads of N byte using key-extraction algorithm
The key of symmetric encipherment algorithm;
Encryption and assembled unit 213, it is described right to be used for the part in addition to preceding N byte to original Jar APMB packages
Claim AES and the key to be encrypted, with the head combination of new Jar APMB packages be then new Jar the part after encryption
APMB package.
The key-extraction algorithm is the one kind in the following two kinds:The first, from the Jar APMB package heads of N byte with
Machine selects some bytes as key or a part for key;Second, first selected at random from the Jar APMB package heads of N byte
Select some bytes, then by these bytes carry out logical AND, logic or, and/or Hash calculation, selection treatment after some bytes
As key or a part for key;The third, first calculates the cryptographic Hash of the Jar APMB package heads of N byte, then selects described
Some bytes of cryptographic Hash are used as key or a part for key.
As shown in figure 9, the Jar bags deciphering module 220 has following three unit:
Second copied cells 221, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption
Portion;
Decruption key extraction unit 222, it is close for extracting decryption from the head of new Jar APMB packages using key-extraction algorithm
Key;
Decryption and assembled unit 223, for the portion using symmetric encipherment algorithm new Jar APMB packages in addition to preceding N byte
Decompose close, be Jar APMB packages after decryption with head combination.
Person skilled in art should be understood that the symmetric encipherment algorithm mentioned in above example of the present invention should include
DES (Data Encryption Standard, i.e. data encryption standards), 3DES, AES (Advanced Encryption
Standard, i.e. Advanced Encryption Standard), SM4, Blowfish, IDEA, RC4, RC5, RC6 etc..
Jar packet headers are maintained in embodiment more than of the invention constant, Jar bag afterbodys are encrypted, but at this
In another preferred embodiment of invention, as shown in Figure 10, it is also possible to keep a part or afterbody in the middle of Jar bags constant, encryption
Other parts, encryption key is from keeping constant extracting section.
It will be understood by those skilled in the art that method and system of the present invention is not limited to institute in specific embodiment
The embodiment stated, specific descriptions above are intended merely to the explanation purpose of the present invention, are not intended to limit the present invention.This area skill
Art personnel's technology according to the present invention scheme draws other implementation methods, also belongs to technological innovation scope of the invention, this
The protection domain of invention is limited by claim and its equivalent.
Claims (10)
1. a kind of Jar bags reinforcement means, methods described comprises the following steps:
Encryption Jar APMB packages simultaneously provide the Jar bags after encryption and decryption dynamic base to Android projects;
Android projects decrypt Jar APMB packages using decryption dynamic base;
Android projects call the Jar APMB packages after decryption;
Jar APMB packages and the DEX file that is discharged from the Jar APMB packages after Android deletions of items decryption.
2. Jar bags reinforcement means as claimed in claim 1, it is characterised in that the Jar packet encryptions are divided into three below step
Suddenly:
(1), the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
(2) key of symmetric encipherment algorithm, is extracted from the Jar APMB package heads of N byte using key-extraction algorithm;
(3), the part in addition to preceding N byte to original Jar APMB packages is entered using the symmetric encipherment algorithm and the key
Row encryption, is then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
3. Jar bags reinforcement means as claimed in claim 2, it is characterised in that the key-extraction algorithm is in following three kinds
One or more combination:The first, some bytes are randomly choosed as key or close from the Jar APMB package heads of N byte
A part for key;Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, then enter these bytes
Row logical AND, logic or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;3rd
Kind, first calculate the cryptographic Hash of the Jar APMB package heads of N byte, then select some bytes of the cryptographic Hash as key or
A part for key.
4. Jar bags reinforcement means as claimed in claim 1, it is characterised in that described to decrypt Jar bags using decryption dynamic base literary
Part is divided into three below step:
(1) the head N byte of new Jar APMB packages, is replicated as the head of Jar APMB packages after decryption;
(2), decruption key is extracted from the head of new Jar APMB packages using key-extraction algorithm;
(3), the part using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte is decrypted, with head
It is combined as Jar APMB packages after decryption.
5. the Jar bag reinforcement means as described in claim 2-4 any one, it is characterised in that the symmetric encipherment algorithm is
One kind in following algorithm:DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6.
6. a kind of Jar bags hardened system, it is characterised in that the system includes such as lower module:
Jar packet encryption modules, for encrypting Jar APMB packages;
Jar bag deciphering modules, for decrypting Jar APMB packages using decryption dynamic base;
Jar bag calling modules, for calling the Jar APMB packages after decryption;
File removing module, the DEX file discharged for the Jar APMB packages after deletion decryption and from the Jar APMB packages.
7. Jar bags hardened system as claimed in claim 6, it is characterised in that the Jar packet encryptions module has following three
Unit:
First copied cells, for the preceding N byte of replicating original Jar APMB packages, as the head of new Jar APMB packages;
Encryption key extraction unit, for extracting symmetric cryptography from the Jar APMB package heads of N byte using key-extraction algorithm
The key of algorithm;
Encryption and assembled unit, are calculated for the part in addition to preceding N byte to original Jar APMB packages using the symmetric cryptography
Method and the key are encrypted, and are then new Jar APMB packages the head combination of the part after encryption and new Jar APMB packages.
8. Jar bags hardened system as claimed in claim 7, it is characterised in that the key-extraction algorithm is in following three kinds
One or more combination:The first, some bytes are randomly choosed as key or close from the Jar APMB package heads of N byte
A part for key;Second, some bytes first are randomly choosed from the Jar APMB package heads of N byte, then enter these bytes
Row logical AND, logic or, and/or Hash calculation, selection treatment after some bytes as key or a part for key;3rd
Kind, first calculate the cryptographic Hash of the Jar APMB package heads of N byte, then select some bytes of the cryptographic Hash as key or
A part for key.
9. Jar bags hardened system as claimed in claim 6, it is characterised in that the Jar bags deciphering module has following three
Unit:
Second copied cells, for replicating the head N byte of new Jar APMB packages as the head of Jar APMB packages after decryption;
Decruption key extraction unit, for extracting decruption key from the head of new Jar APMB packages using key-extraction algorithm;
Decryption and assembled unit, for using symmetric encipherment algorithm and decruption key new Jar APMB packages in addition to preceding N byte
Part is decrypted, and is Jar APMB packages after decryption with head combination.
10. Jar bag hardened systems as described in claim 7-9 any one, it is characterised in that the symmetric encipherment algorithm is
One kind in following algorithm:DES、3DES、AES、SM4、Blowfish、IDEA、RC4、RC5、RC6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611221340.2A CN106845169B (en) | 2016-12-26 | 2016-12-26 | Jar package reinforcing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611221340.2A CN106845169B (en) | 2016-12-26 | 2016-12-26 | Jar package reinforcing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106845169A true CN106845169A (en) | 2017-06-13 |
CN106845169B CN106845169B (en) | 2023-04-07 |
Family
ID=59136794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611221340.2A Active CN106845169B (en) | 2016-12-26 | 2016-12-26 | Jar package reinforcing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845169B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199645A (en) * | 2020-10-16 | 2021-01-08 | 国能日新科技股份有限公司 | Jar packet encryption method and device based on Springboot |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043932A (en) * | 2010-12-31 | 2011-05-04 | 中国航空工业集团公司第六三一研究所 | Method for preventing Java program from being decompiled |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN104680039A (en) * | 2013-11-28 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Data protection method and device of application installation package |
US20150186681A1 (en) * | 2013-12-31 | 2015-07-02 | Giga-Byte Technology Co., Ltd. | Method of encryption and decryption for shared library in open operating system |
CN105426777A (en) * | 2015-11-17 | 2016-03-23 | 中科创达软件股份有限公司 | Dynamic-link library file encryption, decryption methods and devices |
CN105683990A (en) * | 2013-10-10 | 2016-06-15 | Inka安特沃客有限公司 | Method and apparatus for protecting dynamic libraries |
KR20160118920A (en) * | 2015-04-04 | 2016-10-12 | 홍동철 | Method of apk file protection, apk file protection system performing the same, and storage medium storing the same |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
-
2016
- 2016-12-26 CN CN201611221340.2A patent/CN106845169B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043932A (en) * | 2010-12-31 | 2011-05-04 | 中国航空工业集团公司第六三一研究所 | Method for preventing Java program from being decompiled |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN105683990A (en) * | 2013-10-10 | 2016-06-15 | Inka安特沃客有限公司 | Method and apparatus for protecting dynamic libraries |
CN104680039A (en) * | 2013-11-28 | 2015-06-03 | 腾讯科技(深圳)有限公司 | Data protection method and device of application installation package |
US20150186681A1 (en) * | 2013-12-31 | 2015-07-02 | Giga-Byte Technology Co., Ltd. | Method of encryption and decryption for shared library in open operating system |
KR20160118920A (en) * | 2015-04-04 | 2016-10-12 | 홍동철 | Method of apk file protection, apk file protection system performing the same, and storage medium storing the same |
CN105426777A (en) * | 2015-11-17 | 2016-03-23 | 中科创达软件股份有限公司 | Dynamic-link library file encryption, decryption methods and devices |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199645A (en) * | 2020-10-16 | 2021-01-08 | 国能日新科技股份有限公司 | Jar packet encryption method and device based on Springboot |
Also Published As
Publication number | Publication date |
---|---|
CN106845169B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104298932B (en) | A kind of call method and device of SO files | |
CN102890758B (en) | Method and system for protecting executable file | |
CN105426708B (en) | A kind of reinforcement means of the application program of android system | |
US20160203087A1 (en) | Method for providing security for common intermediate language-based program | |
US8412926B1 (en) | Using file metadata for data obfuscation | |
CN104573528B (en) | A kind of anti-copy Soc starting method and chip | |
CN104408337A (en) | Reinforcement method for preventing reverse of APK (Android package) file | |
CN111191195A (en) | Method and device for protecting APK | |
CN104268444A (en) | Cloud OS Java source code protection method | |
CN103617401A (en) | Method and device for protecting data files | |
CN101814124A (en) | Java-based method for enhancing software security | |
JP6698774B2 (en) | Security providing apparatus and method for common intermediate language, and security executing apparatus and method | |
CN107430650A (en) | Computer program is protected to resist reverse-engineering | |
CN106778088A (en) | Dynamic loading method based on Hook technologies | |
Kim et al. | A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC | |
CN104200137A (en) | Method for guaranteeing self-security of JAVA program | |
CN108133147A (en) | Guard method, equipment and the readable storage medium storing program for executing of executable code | |
CN108537010A (en) | AES (advanced encryption standard) algorithm-based Android application Native shell encryption method | |
Hur et al. | Data acquisition methods using backup data decryption of Sony smartphones | |
US10110373B2 (en) | System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient | |
CN107257282A (en) | A kind of full bag encryption method of code based on RC4 algorithms | |
CN106845169A (en) | A kind of Jar bags reinforcement means and system | |
CN101539979B (en) | Method for controlling and protecting electronic document and device thereof | |
CN112667975A (en) | Android system application software safety protection method based on hybrid reinforcement | |
CN106650342B (en) | Jar package reinforcement method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |