CN107908962A - Self checking method applied to Android intelligent terminal - Google Patents
Self checking method applied to Android intelligent terminal Download PDFInfo
- Publication number
- CN107908962A CN107908962A CN201711269490.5A CN201711269490A CN107908962A CN 107908962 A CN107908962 A CN 107908962A CN 201711269490 A CN201711269490 A CN 201711269490A CN 107908962 A CN107908962 A CN 107908962A
- Authority
- CN
- China
- Prior art keywords
- android
- hash
- application program
- database
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
The invention discloses a kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:101st, after Android mobile phone application program is installed or updated, to the data encryption of application program of mobile phone All Files and backup, database is then entered;102nd, first by each program in mobile phone All Files Hash, obtain Hash summary;103rd, the Hash data by public key encryption are found in database, it is decrypted, 104, contrast is decrypted in Hash result before, determines that application program is modified if inconsistent, do not allow to open in systems, do not limit user if consistent and use.The present invention can be avoided program from being changed, made the use of application program safer with real-time implementation application program self-test, more reliable, prevent to be modified data and file using the potential risk brought.
Description
Technical field
The present invention relates to the technical field of intelligent terminal, more particularly to a kind of System self-test side of Android intelligent terminal
Method.
Background technology
Android mobile phone application program is signed unlike the application program of iPhone by trusted sources, and Google is signed certainly using developer
Name.So need to be customized frame source code, after mounting, during self-test, under each installation directory of application program after installation
Dynamic link library file, Android can operating file, Android dress APMB package verification.When application program is run, Android can operating file
Can change, application loading before to each installation directory of application program under dynamic link library file, Android can operating file, Android dress
APMB package is verified.POS machine safety requirements is higher, in order to meet Unionpay's standard, it is necessary to carry out applying self-test to POS machine, prevents
There is security risk.
As patent application 201410291357.X discloses the safe verification method and device of a kind of Android application program.Peace
The safe verification method of tall and erect application program includes:Step 1, public affairs are extracted from the Android application program installation file after signature
Key is saved in service incoming end, which is denoted as the first public key;Step 2,
During Android application program of signing initialization, service incoming end obtains the public key of the Android application program of having signed, this has been signed
The public key of Android application program is denoted as the second public key;Step 3, services incoming end by the second public key compared with the first public key,
Whether safely to judge to have signed Android application program according to comparative result.The safe verification method of Android application program of the present invention and
Device, effectively prevents criminal to go the behavior of malicious attack platform by copying APK identity, effectively prevents from maliciously being usurped
The security risk that the android application programs corrected one's mistakes are brought, enhances the security of platform.Although that realization of the patent application
Safety certification, but it needs to be verified by key, and POS machine cannot be directed to and carry out safe self-test, it is difficult to meet Unionpay
Safety standard.
The content of the invention
For shortcoming present in above-mentioned technology, the present invention provide it is a kind of applied to Android intelligent terminal from
Detecting method, this method can real-time implementation application program self-test, make the use of application program safer, it is more reliable, prevent to be repaiied
Changed data and file using the potential risk brought.
To achieve the above object, the present invention is realized in.
A kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:
101st, Android mobile phone application program installation or renewal after, to the data encryption of application program of mobile phone All Files with it is standby
Part, then enter database;
When the 102nd, starting shooting, first by each program, All Files by SHA256 Hash, obtains Hash in mobile phone
Summary;
103rd, the Hash data by public key encryption are found in database, is decrypted with private key, while to the application
Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file
SHA-256 secure hash is carried out,
104th, Hash is made a summary and encrypted by RSA public key encryption algorithms in database, Hash knot before
Contrast is decrypted in fruit, carries out one-time detection to all application program of mobile phone, carries out examination;
And be compared Hash result, determine that application program is modified if inconsistent, do not permit in systems
Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use, detect application program of mobile phone file in real time
With data whether by external world's modification.
Thus, the self checking method realized by the present invention, the use of the application of Android device is safer, more reliable, Du
Be modified absolutely data and file using the potential risk brought.
Specifically, in step 101, after application installation or renewal, can be found according to mount message involved by installation application
And catalogue, to dynamic link library file under catalogue, Android can operating file, the Android after Android dress APMB package and optimization can transport
Part of composing a piece of writing carries out SHA-256 secure hash, and is saved in after the data are encrypted with the public key of rivest, shamir, adelman
Database.
In step 102, when application start when, find the Hash data by public key encryption in database, with private key into
Row decryption, while can operating file, Android dress APMB package and optimization to dynamic link library file under catalogue where the application, Android
Android afterwards can operating file carry out SHA-256 secure hash, with database private key decryption after Hash result carry out
Compare, determine that application program is modified if inconsistent, do not allow to open in systems, and eject prompting frame and inform use
Family, does not limit user if consistent and uses
Further, after system boot activation system services, in systems by having installed using bag name information one by one time
Go through, and searched into database, find the Hash data by public key encryption, be decrypted with private key, while to the application
Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file
Carry out SHA-256 secure hash, with private key decryption after Hash data compared with, confirm installation after application whether by
Modification, if detection has different using Hash data, this application is modified, in system all applications do not allow to make
With, and prompt user.
The self checking method that the present invention is realized, can be avoided program from being changed, is made application with real-time implementation application program self-test
The use of program is safer, more reliable, prevent to be modified data and file using the potential risk brought.
Brief description of the drawings
Fig. 1 is that self-test flow chart is applied in the start installation that the present invention is realized.
Fig. 2 is that backup flow chart is applied in the installation that the present invention is realized.
Fig. 3 is that the application program that the present invention is realized uses self-test flow chart.
Embodiment
In order to more clearly state the present invention, the present invention is further described below in conjunction with the accompanying drawings.
Refering to Figure 1, the self checking method applied to Android intelligent terminal realized for the present invention, program peace
After dress or renewal, first to the data encryption of application program of mobile phone All Files and backup, then enter database;This method is started shooting
The flow of self-test includes the following steps:
S1, beginning;
S2, all application programs for obtaining system in Android mobile phone;
S3, the name query data storehouse for being directed to each application program respectively;
If carried out in next step there are corresponding application program in database, if there is no corresponding in database
Application program, then verify not by prompting user, exiting the program.
S4, according to apk file directorys carry out serializing summary to file;
By each program, All Files by SHA256 Hash, obtains Hash summary in mobile phone.
S5, Hash summary private key in database is decrypted, and serializing after decrypt is made a summary;
The Hash data by public key encryption are found in database, are decrypted with private key, while to where the application
Dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out
SHA-256 secure hash.
The 2 serializing summaries obtained above S6, comparison in S4 and S5 steps;
By Hash summary with encrypted by RSA public key encryption algorithms in database, Hash result before into
Row decryption contrast, Hash result is compared, and is determined that application program is modified if inconsistent, is not permitted in systems
Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use, detect application program of mobile phone file in real time
With data whether by external world's modification.
S7, carry out one-time detection to all application program of mobile phone, carries out examination.
After system boot activation system services, traveled through one by one using bag name information by having installed in systems, and arrive
Searched in database, find the Hash data by public key encryption, be decrypted with private key, while to catalogue where the application
Lower dynamic link library file, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-
256 secure hash, compared with the Hash data after private key decryption, confirm whether the application after installation is changed, such as
Fruit detection has to be modified using Hash data difference, then this application, and all applications do not allow to use in system, and carry
Show user.
Thus, the self checking method realized by the present invention, the use of the application of Android device is safer, more reliable, Du
Be modified absolutely data and file using the potential risk brought.
With reference to shown in Fig. 2, specifically, in step 101, after application installation or renewal, it can be found according to mount message
Involved catalogue is applied in installation, and to dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization
Android afterwards can operating file carry out SHA-256 secure hash, and the data are carried out with the public key of rivest, shamir, adelman
Database is saved in after encryption.Method is as follows:
First, install or update apk, then carrying out file conductance to All Files under installation directory enters in SHA-256, obtains
Make a summary to serializing;Obtained serializing summary is encrypted with public key again, and is saved in database.
With reference to shown in Fig. 3, application program is in use, self-test flow is as follows:
Application program is opened, when application program launching, phase is first searched by application data bag name in the database
The application program answered, if do not found, not by terminating program;
If it is found, then further carrying out serializing summary to file according to apk file directorys, and will find by public affairs
The encrypted Hash data of key, are decrypted with private key, while to dynamic link library file under catalogue where the application, Android can
Operating file, Android after Android dress APMB package and optimization can operating file carry out SHA-256 secure hash, and in database
Hash result after private key decryption is compared, and is determined that application program is modified if inconsistent, is not permitted in systems
Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use.
The self checking method that the present invention is realized, can be avoided program from being changed, is made application with real-time implementation application program self-test
The use of program is safer, more reliable, prevent to be modified data and file using the potential risk brought.
Disclosed above is only several specific embodiments of the present invention, but the present invention is not limited to this, any ability
What the technical staff in domain can think change should all fall into protection scope of the present invention.
Claims (4)
1. a kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:
101st, after Android mobile phone application program is installed or updated, to the data encryption of application program of mobile phone All Files with backing up,
Then database is entered;
When the 102nd, starting shooting, first by each program, All Files by SHA256 Hash, obtains Hash summary in mobile phone;
103rd, the Hash data by public key encryption are found in database, is decrypted with private key, while to where the application
Dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out
SHA-256 secure hash,
104th, Hash is made a summary with encrypted by RSA public key encryption algorithms in database, Hash result before into
Row decryption contrast, determines that application program is modified if inconsistent, does not allow to open in systems, and ejects prompting frame announcement
Know user, do not limit user if consistent and use, detect application program of mobile phone file in real time and whether data are changed by the external world.
2. the self checking method according to claim 1 applied to Android intelligent terminal, it is characterised in that in step 101,
After application installation or renewal, installation can be found according to mount message and applies involved catalogue, to dynamic link library under catalogue
File, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash
Change, and database is saved in after the data are encrypted with the public key of rivest, shamir, adelman.
3. the self checking method according to claim 2 applied to Android intelligent terminal, it is characterised in that in step 102,
When application starts, the Hash data by public key encryption are found in database, are decrypted with private key, while to the application
Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file
SHA-256 secure hash is carried out, it is true if inconsistent compared with the Hash result after private key decryption in database
Determine application program to be modified, do not allow to open in systems, and eject prompting frame and inform user, use is not limited if consistent
Family uses.
4. the self checking method according to claim 3 applied to Android intelligent terminal, it is characterised in that work as system boot
After activation system service, traveled through one by one using bag name information by having installed in systems, and searched into database, find through
The Hash data of public key encryption are crossed, are decrypted with private key, while to dynamic link library file under catalogue where the application, peace
Zhuo can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash, with private key
Hash data after decryption are compared, and confirm whether the application after installation is changed, if detection has using Hash number
According to difference, then this application is modified, and all applications do not allow to use in system, and prompt user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711269490.5A CN107908962A (en) | 2017-12-05 | 2017-12-05 | Self checking method applied to Android intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711269490.5A CN107908962A (en) | 2017-12-05 | 2017-12-05 | Self checking method applied to Android intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107908962A true CN107908962A (en) | 2018-04-13 |
Family
ID=61854376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711269490.5A Pending CN107908962A (en) | 2017-12-05 | 2017-12-05 | Self checking method applied to Android intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107908962A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108600256A (en) * | 2018-05-08 | 2018-09-28 | 山东浪潮通软信息科技有限公司 | A kind of Information Exchange System and method |
CN110096869A (en) * | 2019-05-08 | 2019-08-06 | 苏州浪潮智能科技有限公司 | BIOS loads signing certificate method, system, equipment and computer media |
CN110879811A (en) * | 2019-11-18 | 2020-03-13 | 山东浪潮通软信息科技有限公司 | Implementation method for carrying out data and program consistency self-check during operation |
WO2021098293A1 (en) * | 2019-11-18 | 2021-05-27 | 许继集团有限公司 | Database security protection method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462965A (en) * | 2014-11-14 | 2015-03-25 | 华为技术有限公司 | Method for verifying integrity of application program and network device |
CN104573490A (en) * | 2013-10-29 | 2015-04-29 | 桂林电子科技大学 | Method for protecting installed software on Android platform |
CN106355081A (en) * | 2016-09-07 | 2017-01-25 | 深圳市新国都支付技术有限公司 | Android program start verification method and device |
KR20170096440A (en) * | 2016-02-16 | 2017-08-24 | 한국인터넷진흥원 | Method and apparatus for analysing simility of detecting malignant app |
-
2017
- 2017-12-05 CN CN201711269490.5A patent/CN107908962A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573490A (en) * | 2013-10-29 | 2015-04-29 | 桂林电子科技大学 | Method for protecting installed software on Android platform |
CN104462965A (en) * | 2014-11-14 | 2015-03-25 | 华为技术有限公司 | Method for verifying integrity of application program and network device |
KR20170096440A (en) * | 2016-02-16 | 2017-08-24 | 한국인터넷진흥원 | Method and apparatus for analysing simility of detecting malignant app |
CN106355081A (en) * | 2016-09-07 | 2017-01-25 | 深圳市新国都支付技术有限公司 | Android program start verification method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108600256A (en) * | 2018-05-08 | 2018-09-28 | 山东浪潮通软信息科技有限公司 | A kind of Information Exchange System and method |
CN110096869A (en) * | 2019-05-08 | 2019-08-06 | 苏州浪潮智能科技有限公司 | BIOS loads signing certificate method, system, equipment and computer media |
CN110879811A (en) * | 2019-11-18 | 2020-03-13 | 山东浪潮通软信息科技有限公司 | Implementation method for carrying out data and program consistency self-check during operation |
WO2021098293A1 (en) * | 2019-11-18 | 2021-05-27 | 许继集团有限公司 | Database security protection method and device |
CN110879811B (en) * | 2019-11-18 | 2023-05-23 | 浪潮通用软件有限公司 | Implementation method for carrying out data and program consistency self-check during running |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3387813B1 (en) | Mobile device having trusted execution environment | |
US9281949B2 (en) | Device using secure processing zone to establish trust for digital rights management | |
US9935773B2 (en) | Trusted platform module certification and attestation utilizing an anonymous key system | |
CN103843303B (en) | The management control method and device of virtual machine, system | |
JP4912879B2 (en) | Security protection method for access to protected resources of processor | |
CN107908962A (en) | Self checking method applied to Android intelligent terminal | |
KR20070084326A (en) | Updating configuration parameters in a mobile terminal | |
CN109218260B (en) | Trusted environment-based authentication protection system and method | |
WO2016019790A1 (en) | Verification method, client, server and system for installation package | |
WO2014036021A1 (en) | Secure device service enrollment | |
KR20120044914A (en) | Methods and apparatus for storage and execution of access control clients | |
CN110401538B (en) | Data encryption method, system and terminal | |
CN104680061A (en) | Method and system for verifying code signing during startup of application in Android environment | |
CN102833745B (en) | Method, communication equipment and communication system that a kind of software security is upgraded | |
CN104751049A (en) | Application program installing method and mobile terminal | |
CN108958768A (en) | A kind of GPU firmware update, device, equipment and computer readable storage medium | |
WO2014206171A1 (en) | Public key cryptography processing method, device and system | |
JP6387908B2 (en) | Authentication system | |
US20190080079A1 (en) | Method and device for verifying security of application | |
KR101642267B1 (en) | System for preventing forgery of application and method therefor | |
CN110837643B (en) | Activation method and device of trusted execution environment | |
JP6343928B2 (en) | Portable terminal, authentication system, authentication method, and authentication program | |
KR20180052479A (en) | System for updating firm ware of wire and wireless access point using signature chain, wire and wireless access point and method thereof | |
KR101906484B1 (en) | Method for application security and system for executing the method | |
CN111061495A (en) | Application installation method, terminal device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180413 |