CN107256349A - Dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing - Google Patents

Dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN107256349A
CN107256349A CN201710442081.4A CN201710442081A CN107256349A CN 107256349 A CN107256349 A CN 107256349A CN 201710442081 A CN201710442081 A CN 201710442081A CN 107256349 A CN107256349 A CN 107256349A
Authority
CN
China
Prior art keywords
application program
dynamic base
signature
recalls information
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710442081.4A
Other languages
Chinese (zh)
Other versions
CN107256349B (en
Inventor
李洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Original Assignee
Guangzhou Alibaba Literature Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Alibaba Literature Information Technology Co Ltd filed Critical Guangzhou Alibaba Literature Information Technology Co Ltd
Priority to CN201710442081.4A priority Critical patent/CN107256349B/en
Publication of CN107256349A publication Critical patent/CN107256349A/en
Application granted granted Critical
Publication of CN107256349B publication Critical patent/CN107256349B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/128Restricting unauthorised execution of programs involving web programs, i.e. using technology especially used in internet, generally interacting with a web browser, e.g. hypertext markup language [HTML], applets, java
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing, it is related to Internet technical field.Methods described includes:The recalls information for being used to call dynamic base that application program is sent is received, the recalls information is the information for loading the file in the dynamic base;Whether judgement calls the application program of the dynamic base legal;If the determination result is YES, then returned to the application program and agree to recalls information.The identity of application program to calling dynamic base judges, protects dynamic base not utilized by third party application, improves the security of dynamic base.

Description

Dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing
Technical field
The present invention relates to Internet technical field, in particular to dynamic base method for preventing fraudulent-using, device, electronic equipment And readable storage medium storing program for executing.
Background technology
With the development of internet and electronic equipment, such as smart mobile phone, many application programming have it is many with The dynamic link library that application program installation kit is together issued.Include core logic functions in these dynamic link libraries.Their quilts After application program is loaded into internal memory, then it is employed routine call execution.
But in actual use, the dynamic link library in application program installation kit can be adjusted by third party application With being unfavorable for the protection to product.
The content of the invention
In view of this, the embodiments of the invention provide dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage Medium, to solve the above problems.
To achieve these goals, the technical solution adopted by the present invention is as follows:
In a first aspect, a kind of dynamic base method for preventing fraudulent-using provided in an embodiment of the present invention, methods described includes:Receiving should The recalls information for being used to call dynamic base sent with program, the recalls information is the information for loading the file in dynamic base; Whether judgement calls the application program of the dynamic base legal;If the determination result is YES, then returned to the application program Agree to recalls information.
A kind of second aspect, dynamic base anti-theft apparatus provided in an embodiment of the present invention, described device includes:Receive single Member, the recalls information for being used to call dynamic base for receiving application program transmission, the recalls information is in loading dynamic base File information.First judging unit, for judging to call the application program of the dynamic base whether legal.Return Unit, during for being in judged result, returning to the application program and agreeing to recalls information.
The third aspect, a kind of electronic equipment provided in an embodiment of the present invention, the electronic equipment includes processor and storage Device, the memory is connected with the processor by bus, and the memory is used for storage program;The processor, is used for The program being stored in the memory is called by the bus, performed:What reception application program was sent is used to call dynamic The recalls information in storehouse, the recalls information is the information for loading the file in dynamic base;The institute of the dynamic base is called in judgement Whether legal state application program;If the determination result is YES, then returned to the application program and agree to recalls information.
Fourth aspect, the embodiment of the present invention provides a kind of readable storage medium storing program for executing, and the readable storage medium storing program for executing is stored with and had The executable non-volatile program code of processor, described program code makes the computing device following steps:Receive application The recalls information for calling dynamic base that program is sent, the recalls information is the information for loading the file in dynamic base;Sentence It is disconnected to call the application program of the dynamic base whether legal;If the determination result is YES, then returned to the application program Agree to recalls information.
Dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing that the embodiments of the present invention are provided, By dynamic base after the recalls information that application program is sent is received, the conjunction of the application program to calling its dynamic library file The mode that method is judged, realizes in the case that only application program is legal, successfully could call in dynamic link library File, so as to protect dynamic base not utilized by third party application, improve the security of dynamic base.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and match somebody with somebody Appended accompanying drawing is closed, is described in detail below.
Brief description of the drawings
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 shows the block diagram of electronic equipment provided in an embodiment of the present invention;
Fig. 2 shows the step flow chart for the dynamic base method for preventing fraudulent-using that first embodiment of the invention is provided;
Fig. 3 shows the step flow chart for the dynamic base method for preventing fraudulent-using that second embodiment of the invention is provided;
Fig. 4 shows the functional block diagram for the dynamic base anti-theft apparatus that third embodiment of the invention is provided.
Embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Generally exist The component of the embodiment of the present invention described and illustrated in accompanying drawing can be arranged and designed with a variety of configurations herein.Cause This, the detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit claimed invention below Scope, but be merely representative of the present invention selected embodiment.Based on embodiments of the invention, those skilled in the art are not having There is the every other embodiment obtained on the premise of making creative work, belong to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following accompanying drawing, therefore, once a certain item exists It is defined in one accompanying drawing, then it further need not be defined and explained in subsequent accompanying drawing.Meanwhile, in this hair In bright description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that indicating or implying relatively important Property.
Fig. 1 is referred to, Fig. 1 shows that one kind can be applied to dynamic base method for preventing fraudulent-using provided in an embodiment of the present invention, dress The structured flowchart for the electronic equipment 100 put.As a kind of embodiment, the electronic equipment can be PC (personal computer, PC), tablet personal computer, smart mobile phone, personal digital assistant (personal digital Assistant, PDA), the terminal such as wearable device.
As shown in figure 1, electronic equipment 100 includes memory 101, storage control 102, it is one or more (only to show in figure Go out one) processor 103, Peripheral Interface 104, radio-frequency module 105, display unit 106 etc..These components pass through one or many Bar communication bus/signal wire 107 is mutually communicated.
The dynamic base tamper-proof side that memory 101 can be used in storage software program and module, such as embodiment of the present invention Method and the corresponding programmed instruction/module of device, processor 103 by operation be stored in software program in memory 101 and Module, so that various function application and data processing are performed, such as dynamic base method for preventing fraudulent-using provided in an embodiment of the present invention.
Memory 101 may include high speed random access memory, may also include nonvolatile memory, such as one or more Magnetic storage device, flash memory or other non-volatile solid state memories.Processor 103 and other possible components are to depositing The access of reservoir 101 can be carried out under the control of storage control 102.
Various input/output devices are coupled to processor 103 and memory 101 by Peripheral Interface 104.In some realities Apply in example, Peripheral Interface 104, processor 103 and storage control 102 can be realized in one single chip.Some other In example, they can be realized by independent chip respectively.
Radio-frequency module 105 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that Communicated with communication network or other equipment.
Display module 106 provides a display interface between server 100 and user.Specifically, display module 106 Exported to user's display image, the content of these images output may include word, figure, video and its any combination.
It is appreciated that the structure shown in Fig. 1 be only signal, electronic equipment 100 may also include it is more more than shown in Fig. 1 or The less component of person, or with the configuration different from shown in Fig. 1.Each component shown in Fig. 1 can use hardware, software Or its combination is realized.
Include core logic functions in the state chained library that application program in usual electronic equipment can be configured.Dynamic chain Connect storehouse to be employed after program is loaded into internal memory, then be employed routine call execution.Such as application in android system So files of program etc.., can be with but existing dynamic link library can not only be called by the application program where itself By third-party application call, therefore it can be affected in terms of the security to dynamic link library.In order to change It is apt to the problem, the embodiments of the invention provide a kind of dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing.
First embodiment
Fig. 2 is referred to, the step flow chart of the dynamic base method for preventing fraudulent-using provided for first embodiment of the invention.Below Fig. 2 will be combined, the dynamic base method for preventing fraudulent-using that the present embodiment is provided will be described in detail.
Step S210, receives the recalls information for being used to call dynamic base that application program is sent, the recalls information is to add Carry the information of the file in dynamic base.
Because many application programs are based on performance and the factor such as cross-platform considers, included in the installation kit of application program There is dynamic base, dynamic base is used for the logic function for storing the core for performing application program.Wherein application program belongs to upper layer group Part, and dynamic base belongs to the lower layer components of application program.
Application program sends recalls information, dynamic base returns to knot in the file in needing loading dynamic base to dynamic base Fruit notifies that notifying application program, it is loading the file called in dynamic base.
As another embodiment, application program need load dynamic base in file when, can also to independently of The management program of dynamic base sends recalls information, and is notified from this management program to application program returning result.
Step S220, judges the file for whether having the application program to need in the dynamic base.
Dynamic base connect or independently of dynamic base management program receive application program transmission recalls information when, look into The file for whether having application program to need is looked in dynamic base.If so, then performing next step flow;If no, terminating flow.
Whether step S230, judgement calls the application program of the dynamic base legal.
Can be not only the application program tune where it by upper layer application due to the dynamic base in Android application programs With, it can also be called by third party application, and third party application can cause danger to calling for dynamic base to dynamic base Evil.Therefore, dynamic base method for preventing fraudulent-using provided in an embodiment of the present invention needs to carry out identity to the application program for calling dynamic base Checking, to examine the identity of application program whether legal.The identity of only application program is legal, and this application program could succeed Call dynamic base.
Step S240, if the determination result is YES, then returns to the application program and agrees to recalls information.
When dynamic base or management program independently of dynamic base judge to call the application program of dynamic base legal, to this Application program, which is returned, agrees to recalls information.As a kind of embodiment, dynamic base is returned " 0 " to application program, and journey is applied in expression Sequence calls success, can successfully load dynamic library file.
As a kind of embodiment, application program can call the calling interface of dynamic base, realize to dynamic library file Call.Specifically, application program calls the corresponding preset interface of dynamic base by calling interface so that the information in dynamic base It is loaded into internal memory, realizes and dynamic base is called.
When dynamic base or management program independently of dynamic base judge to call the application program of dynamic base illegal.Make For a kind of embodiment, dynamic base is returned " -1 " to application program, represents application call failure, it is impossible to successfully loaded dynamic State library file.
Dynamic library file method for preventing fraudulent-using provided in an embodiment of the present invention, needs to call dynamic library file in application program When, recalls information is sent to dynamic base or independently of the management program of dynamic base, dynamic base is tested when receiving recalls information Whether card calls the identity of the application program of dynamic base legal.Call this dynamic base application program it is legal when, dynamic base to Application program, which is returned, agrees to recalls information.In application call dynamic base, judge whether application program is legal, protection is dynamic State storehouse is not utilized by third party, improves the security of dynamic base.
Second embodiment
Fig. 3 is referred to, the step flow chart of the dynamic base method for preventing fraudulent-using provided for second embodiment of the invention.Second The dynamic base method for preventing fraudulent-using that embodiment is provided includes:
Step S310, receives the recalls information for calling dynamic base that application program is sent, and the recalls information is dynamic for loading The information of file in state storehouse.
Step S320, judges the file for whether having the application program to need in the dynamic base.
If the file for having the application program to need in dynamic base, performs next step.
Step S331, obtains the signature of the application program.
As a kind of embodiment, because application program belongs to upper component, dynamic base belongs to lower layer components, and lower floor Component can not directly obtain the object of upper component.Therefore dynamic base can not directly obtain the signature of application program, and then correspondingly Verified with the identity of program.
As a kind of embodiment, dynamic base is when receiving the recalls information of application program transmission, and acquisition is sent to The Context objects of the application program of recalls information.Information is obtained from the Context objects of application program to calling dynamic The identity of the application program in storehouse is verified.When obtaining the Context objects of application program, being obtained by reflection technology should With the Context objects of program.
Due to including the signature of the application program in the Context objects of application program, therefore dynamic base is being got After the Context objects of application program, the signature of the application program is obtained from Context objects.
Certainly, the signature can be present in the dynamic base in a variety of forms, as a kind of embodiment, using journey The signature of sequence is present in the inside of dynamic base in the form of character string.Therefore, dynamic base obtains the signature word of the application program Symbol string.
Step S332, by the valid application program prestored in the signature of the application program and the dynamic base Signature is matched, and judges whether the application program is legal.
If the match is successful, it is legal to judge;
If it fails to match, judge illegal.
After the signature in getting the Context objects of application program, the application is judged by the signature Whether the identity of program is legal.
The step for judging whether the application program comprising the signature is legal is specifically included:
By the signature of the application program got and the label of the valid application program prestored in the dynamic base Name is matched.
Due to the signature of application program being previously stored with dynamic base where valid application program i.e. dynamic base, dynamic Storehouse is after the signature for the application program for calling it is got, by the signature of the application program got and the conjunction prestored The signature of method application program is contrasted.
It is used as a kind of embodiment, because the signature of application program can exist with character string forms, what dynamic base was got The signature of application program is the signature character string of the application program, the label of the valid application program prestored in dynamic base The signature character string of entitled valid application program.Dynamic base is in matching, to the signature word of the valid application program prestored Symbol string is matched with the signature character string of the application program got.Certainly, in matching, signature character string can be ignored Capital and small letter.
When the match is successful, the application program of the sign comprising the signature is legal, judges that the application program is closed Method;When matching unsuccessful, the application program of the sign comprising the signature is illegal, judges that the application program does not conform to Method.
Step S340, if the determination result is YES, then returns to the application program and agrees to recalls information.
When the signature character string of the application program of acquisition and the valid application procedure match success prestored, characterize and adjust It is legal with the application program of dynamic base.Dynamic base is returned to the application program agrees to recalls information.As a kind of embodiment, Dynamic base is returned " 0 " to application program, is represented application call success, can successfully be loaded dynamic library file.
When the signature character string of the application program of acquisition and the valid application procedure match prestored fail, characterize and adjust It is illegal with the application program of dynamic base.As a kind of embodiment, dynamic base is returned " -1 " to application program, represents application Routine call fails, it is impossible to successfully load dynamic library file.
In embodiment two, step S310, S320 and S340 and a kind of step S210, S220 of embodiment and S240 is identical.Embodiment refers to embodiment one, repeats no more here.
3rd embodiment
Fig. 4 is referred to, the structured flowchart of the dynamic base anti-theft apparatus 300 provided for third embodiment of the invention.It is described Dynamic base anti-theft apparatus 300 includes:
Receiving unit 310, the recalls information for being used to call dynamic base for receiving application program transmission is described to call Information is the information for loading the file in dynamic base.
Second judging unit 320, for the file for judging whether to there is the application program to need in the dynamic base.
First judging unit 330, during for being in the second judging unit judged result, the dynamic base is called in judgement The application program it is whether legal.
Wherein, the first judging unit 330 includes:
First acquisition unit 331, the signature for obtaining the application program.
As a kind of embodiment, the first acquisition unit 331 includes:
Second acquisition unit 3311, the Context objects for obtaining the application program for calling the dynamic base.
Second acquisition unit also includes second and obtains subelement, and second, which obtains subelement, is used to obtain by reflection technology Call the Context objects of the application program of the dynamic base.
3rd acquiring unit 3312, for obtaining described answer from the Context objects of the application program got With the signature of program.
Matching unit 332, for by the application program got signature with prestored in the dynamic base it is legal The signature of application program is matched.If the match is successful, the application program comprising the signature is characterized legal.If matching Failure, characterizes the application program comprising the signature illegal.
Returning unit 340, the judged result for the first judging unit is when being, to return and agree to the application program Recalls information.
The dynamic base anti-theft apparatus that the embodiments of the present invention are provided, needs to call dynamic library file in application program When, recalls information is sent to dynamic library file or independently of the management program of dynamic base, dynamic base is receiving recalls information When, the signature character string of application program is obtained, the signature character string for the valid application program that dynamic base is prestored is with obtaining To the signature character string of application program matched, call the identity of its application program whether legal to verify. During with success, show to call the application program of this dynamic base legal, dynamic base is returned to application program agrees to recalls information. During application call dynamic base, judge whether application program is legal, protect dynamic base not utilized by third party, improve dynamic The security in state storehouse.The specific implementation process of dynamic base anti-theft apparatus provided in an embodiment of the present invention may refer to above-mentioned side Method embodiment, this is no longer going to repeat them.
In the present embodiment, each module can be that now, above-mentioned each module can be stored in user by software code realization In the memory 101 of terminal 100.Each module can equally be realized by hardware such as IC chip above.
In summary, dynamic base method for preventing fraudulent-using provided in an embodiment of the present invention, device, electronic equipment and readable storage Medium, when application program needs to call dynamic library file, recalls information is sent to dynamic library file, dynamic library file is connecing When receiving recalls information, the signature character string of application program, the signature for the valid application program that dynamic base is prestored are obtained Character string is matched with the signature character string of the application program got, and the identity for calling its application program with checking is It is no legal.When the match is successful, show to call the application program of this dynamic base legal, dynamic base is returned to application program to be agreed to Recalls information.In application call dynamic base, judge whether application program is legal, protect dynamic base not by third party's profit With improving the security of dynamic base.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part Illustrate referring to the part of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can also lead to Other modes are crossed to realize.Device embodiment described above is only schematical, for example, the flow chart in accompanying drawing and Block diagram shows the system in the cards of the device of multiple embodiments according to the present invention, method and computer program product Framework, function and operation.At this point, each square frame in flow chart or block diagram can represent a module, program segment or A part for code a, part for the module, program segment or code is used to realize defined logic work(comprising one or more The executable instruction of energy.It should also be noted that in some implementations as replacement, the function of being marked in square frame also may be used With with different from the order marked in accompanying drawing generation.For example, two continuous square frames can essentially be held substantially in parallel OK, they can also be performed in the opposite order sometimes, and this is depending on involved function.It is also noted that block diagram and/ Or the combination of each square frame in flow chart and the square frame in block diagram and/or flow chart, function as defined in execution can be used Or the special hardware based system of action is realized, or can be with the combination of specialized hardware and computer instruction come reality It is existing.
In addition, each functional module in each embodiment of the invention can integrate to form an independent portion Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized using in the form of software function module and is used as independent production marketing or in use, can To be stored in a computer read/write memory medium.Based on it is such understand, technical scheme substantially or Say that the part of the part contributed to prior art or the technical scheme can be embodied in the form of software product, The computer software product is stored in a storage medium, including some instructions are make it that a computer equipment (can To be personal computer, server, or network equipment etc.) perform whole or the portion of each embodiment methods described of the invention Step by step.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), Random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with store program codes Medium.It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation make a distinction with another entity or operation, and not necessarily require or imply between these entities or operation There is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant are intended to Cover including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", not Also there is other identical element in the process including the key element, method, article or equipment in exclusion.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made is any Modification, equivalent substitution, improvement etc., should be included in the scope of the protection.It should be noted that:Similar label and word Mother represents similar terms in following accompanying drawing, therefore, once it is defined in a certain Xiang Yi accompanying drawing, then in subsequent accompanying drawing In it further need not be defined and explained.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, and appoints What those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should It is included within the scope of the present invention.Therefore, protection scope of the present invention should it is described using scope of the claims as It is accurate.

Claims (12)

1. a kind of dynamic base method for preventing fraudulent-using, it is characterised in that methods described includes:
The recalls information for being used to call dynamic base that application program is sent is received, the recalls information is in the loading dynamic base File information;
Whether judgement calls the application program of the dynamic base legal;
If the determination result is YES, then returned to the application program and agree to recalls information.
2. according to the method described in claim 1, it is characterised in that the application program for judging to call the dynamic base Whether legal step, including:
Obtain the signature of the application program;
The signature of valid application program by the signature of the application program with being prestored in the dynamic base is matched;
If the match is successful, it is legal to judge;
If it fails to match, judge illegal.
3. method according to claim 2, it is characterised in that the step of obtaining the signature of the application program, including:
Obtain the Context objects for the application program for calling the dynamic base;
The signature of the application program is obtained from the Context objects of the application program got.
4. method according to claim 3, it is characterised in that the application program of the dynamic base is called in the acquisition Context objects the step of, including:
The Context objects for the application program for calling the dynamic base are obtained by reflection technology.
5. according to the method described in claim 1, it is characterised in that the application program for judging to call the dynamic base Whether before legal step, methods described also includes:
Judge the file for whether thering is the application program to need in the dynamic base;
If the determination result is YES, then perform and judge to call the whether legal step of the application program of the dynamic base.
6. a kind of dynamic base anti-theft apparatus, it is characterised in that described device includes:
Receiving unit, the recalls information for being used to call dynamic base for receiving application program transmission, the recalls information is to add Carry the information of the file in dynamic base;
First judging unit, for judging to call the application program of the dynamic base whether legal;
Returning unit, during for being in judged result, returning to the application program and agreeing to recalls information.
7. device according to claim 6, it is characterised in that first judging unit includes:
First acquisition unit, the signature for obtaining the application program;
Matching unit, for the valid application program that will be prestored in the signature of the application program got and the dynamic base Signature matched;
If the match is successful, it is legal to judge;
If it fails to match, judge illegal.
8. device according to claim 7, it is characterised in that the first acquisition unit includes:
Second acquisition unit, the Context objects for obtaining the application program for calling the dynamic base;
3rd acquiring unit, for obtaining the application program from the Context objects of the application program got Signature.
9. device according to claim 8, it is characterised in that the second acquisition unit includes:
Second obtains subelement, the Context for obtaining the application program for calling the dynamic base by reflection technology Object.
10. device according to claim 6, it is characterised in that described device also includes:
Second judging unit, for the file for judging whether to there is the application program to need in the dynamic base.
11. a kind of electronic equipment, it is characterised in that the electronic equipment includes processor and memory, the memory and institute State processor to connect by bus, the memory is used for storage program;The processor, is deposited for being called by the bus The program in the memory is stored up, following steps are performed:
The recalls information for being used to call dynamic base that application program is sent is received, the recalls information is in the loading dynamic base File information;
Whether judgement calls the application program of the dynamic base legal;
If the determination result is YES, then returned to the application program and agree to recalls information.
12. a kind of readable storage medium storing program for executing, it is characterised in that the readable storage medium storing program for executing be stored with processor can perform it is non- Volatile program code, described program code makes the computing device following steps:
The recalls information for being used to call dynamic base that application program is sent is received, the recalls information is in the loading dynamic base File information;
Whether judgement calls the application program of the dynamic base legal;
If the determination result is YES, then returned to the application program and agree to recalls information.
CN201710442081.4A 2017-06-13 2017-06-13 Method and device for preventing dynamic library from being stolen, electronic equipment and readable storage medium Expired - Fee Related CN107256349B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710442081.4A CN107256349B (en) 2017-06-13 2017-06-13 Method and device for preventing dynamic library from being stolen, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710442081.4A CN107256349B (en) 2017-06-13 2017-06-13 Method and device for preventing dynamic library from being stolen, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN107256349A true CN107256349A (en) 2017-10-17
CN107256349B CN107256349B (en) 2020-02-28

Family

ID=60023984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710442081.4A Expired - Fee Related CN107256349B (en) 2017-06-13 2017-06-13 Method and device for preventing dynamic library from being stolen, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN107256349B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109597662A (en) * 2018-11-08 2019-04-09 百度在线网络技术(北京)有限公司 The call method, device and electronic equipment in non-public library in mobile terminal
CN109995534A (en) * 2017-12-29 2019-07-09 北京京东尚科信息技术有限公司 The method and apparatus that a kind of pair of application program carries out safety certification
CN109992934A (en) * 2019-04-10 2019-07-09 苏州浪潮智能科技有限公司 A kind of response method, device, equipment and medium
WO2019210471A1 (en) * 2018-05-02 2019-11-07 无锡盈达聚力科技有限公司 Data invoking method and data invoking apparatus
CN111310131A (en) * 2020-01-19 2020-06-19 Oppo广东移动通信有限公司 so library call processing method and device, electronic device and storage medium
CN111859415A (en) * 2020-06-18 2020-10-30 上海艾麒信息科技有限公司 Neural network model encryption system and method
CN113536242A (en) * 2021-07-09 2021-10-22 深圳市元征未来汽车技术有限公司 Dynamic library calling method and device, terminal equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020033838A1 (en) * 2000-05-15 2002-03-21 Scott Krueger Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program
US20050021971A1 (en) * 2003-07-23 2005-01-27 Microsoft Corporation Application identification and license enforcement
US20110030045A1 (en) * 2009-05-01 2011-02-03 Peter David Beauregard Methods and Systems for Controlling Access to Resources and Privileges Per Process
CN103198244A (en) * 2013-03-26 2013-07-10 北京深思数盾科技有限公司 Method for protecting dynamic linking library (DLL)
CN104268468A (en) * 2014-09-25 2015-01-07 福建升腾资讯有限公司 Protecting method and system of dynamic link library of Android system
CN104462956A (en) * 2013-09-23 2015-03-25 安一恒通(北京)科技有限公司 Method and device for acquiring control power of operating system
CN105653948A (en) * 2014-11-14 2016-06-08 腾讯数码(深圳)有限公司 Method and device for preventing malicious operation
CN106169046A (en) * 2016-07-04 2016-11-30 北京金山安全软件有限公司 Method and device for preventing message hook injection and terminal equipment
CN106971098A (en) * 2016-10-11 2017-07-21 阿里巴巴集团控股有限公司 A kind of anti-method and its device for beating again bag

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020033838A1 (en) * 2000-05-15 2002-03-21 Scott Krueger Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program
US20050021971A1 (en) * 2003-07-23 2005-01-27 Microsoft Corporation Application identification and license enforcement
US20110030045A1 (en) * 2009-05-01 2011-02-03 Peter David Beauregard Methods and Systems for Controlling Access to Resources and Privileges Per Process
CN103198244A (en) * 2013-03-26 2013-07-10 北京深思数盾科技有限公司 Method for protecting dynamic linking library (DLL)
CN104462956A (en) * 2013-09-23 2015-03-25 安一恒通(北京)科技有限公司 Method and device for acquiring control power of operating system
CN104268468A (en) * 2014-09-25 2015-01-07 福建升腾资讯有限公司 Protecting method and system of dynamic link library of Android system
CN105653948A (en) * 2014-11-14 2016-06-08 腾讯数码(深圳)有限公司 Method and device for preventing malicious operation
CN106169046A (en) * 2016-07-04 2016-11-30 北京金山安全软件有限公司 Method and device for preventing message hook injection and terminal equipment
CN106971098A (en) * 2016-10-11 2017-07-21 阿里巴巴集团控股有限公司 A kind of anti-method and its device for beating again bag

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995534A (en) * 2017-12-29 2019-07-09 北京京东尚科信息技术有限公司 The method and apparatus that a kind of pair of application program carries out safety certification
CN109995534B (en) * 2017-12-29 2022-04-26 北京京东尚科信息技术有限公司 Method and device for carrying out security authentication on application program
WO2019210471A1 (en) * 2018-05-02 2019-11-07 无锡盈达聚力科技有限公司 Data invoking method and data invoking apparatus
CN109597662A (en) * 2018-11-08 2019-04-09 百度在线网络技术(北京)有限公司 The call method, device and electronic equipment in non-public library in mobile terminal
CN109597662B (en) * 2018-11-08 2021-07-27 百度在线网络技术(北京)有限公司 Method and device for calling non-public library in mobile terminal and electronic equipment
CN109992934A (en) * 2019-04-10 2019-07-09 苏州浪潮智能科技有限公司 A kind of response method, device, equipment and medium
CN111310131A (en) * 2020-01-19 2020-06-19 Oppo广东移动通信有限公司 so library call processing method and device, electronic device and storage medium
CN111310131B (en) * 2020-01-19 2022-11-04 Oppo广东移动通信有限公司 so library call processing method and device, electronic device and storage medium
CN111859415A (en) * 2020-06-18 2020-10-30 上海艾麒信息科技有限公司 Neural network model encryption system and method
CN113536242A (en) * 2021-07-09 2021-10-22 深圳市元征未来汽车技术有限公司 Dynamic library calling method and device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN107256349B (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN107256349A (en) Dynamic base method for preventing fraudulent-using, device, electronic equipment and readable storage medium storing program for executing
CN108200008A (en) The recognition methods and device that abnormal data accesses
CN105101122A (en) Verification code inputting method and device
CN111933225B (en) Drug classification method and device, terminal equipment and storage medium
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium
CN112631803A (en) Intelligent contract calling method, device, server and storage medium for block chain
CN109191635A (en) Objective method, apparatus and storage medium are sentenced based on face recognition technology
CN110163481A (en) Electronic device, user's air control auditing system test method and storage medium
CN107577502B (en) Terminal and fingerprint module compatibility method and storage device thereof
CN108134765A (en) verification method and verification system
CN112433935A (en) Test method, test device, electronic equipment and storage medium
CN110751486B (en) Intelligent contract replay proof method, system, electronic equipment and storage medium
CN104125234A (en) Method and system for dynamic image security verification
CN117197857A (en) Face counterfeiting attack detection and face recognition method, device and equipment
CN107203373A (en) Acquisition methods, method of testing and the acquisition device of interface control, test device
CN109857450A (en) A kind of verification service orchestration method and device
CN107145375A (en) Kernel loads method, device, system, user terminal and storage medium
CN115712917A (en) Desensitization method and device for sensitive data, electronic equipment and storage medium
CN112631694B (en) API (application program interface) encapsulation calling method and system
CN106161338A (en) For verifying the method and device of user identity
CN106201930A (en) A kind of device port determines device, terminal and method
CN111526253B (en) Call control method, device, computer equipment and storage medium
CN112788017A (en) Safety verification method, device, equipment and medium
CN112637830B (en) Terminal retrieving method and device and network equipment
CN117251385B (en) method and device for acquiring mock data, terminal equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200602

Address after: 310051 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Alibaba (China) Co.,Ltd.

Address before: 510627 Guangdong city of Guangzhou province Whampoa Tianhe District Road No. 163 Xiping Yun Lu Yun Ping radio square B tower 13 floor 03 unit self

Patentee before: GUANGZHOU ALIBABA LITERATURE INFORMATION TECHNOLOGY Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200228

Termination date: 20200613