CN107908962A - Self checking method applied to Android intelligent terminal - Google Patents

Self checking method applied to Android intelligent terminal Download PDF

Info

Publication number
CN107908962A
CN107908962A CN201711269490.5A CN201711269490A CN107908962A CN 107908962 A CN107908962 A CN 107908962A CN 201711269490 A CN201711269490 A CN 201711269490A CN 107908962 A CN107908962 A CN 107908962A
Authority
CN
China
Prior art keywords
android
hash
application program
database
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711269490.5A
Other languages
Chinese (zh)
Inventor
何俊伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ding Zhi Link Communications Inc
Original Assignee
Shenzhen Ding Zhi Link Communications Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ding Zhi Link Communications Inc filed Critical Shenzhen Ding Zhi Link Communications Inc
Priority to CN201711269490.5A priority Critical patent/CN107908962A/en
Publication of CN107908962A publication Critical patent/CN107908962A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The invention discloses a kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:101st, after Android mobile phone application program is installed or updated, to the data encryption of application program of mobile phone All Files and backup, database is then entered;102nd, first by each program in mobile phone All Files Hash, obtain Hash summary;103rd, the Hash data by public key encryption are found in database, it is decrypted, 104, contrast is decrypted in Hash result before, determines that application program is modified if inconsistent, do not allow to open in systems, do not limit user if consistent and use.The present invention can be avoided program from being changed, made the use of application program safer with real-time implementation application program self-test, more reliable, prevent to be modified data and file using the potential risk brought.

Description

Self checking method applied to Android intelligent terminal
Technical field
The present invention relates to the technical field of intelligent terminal, more particularly to a kind of System self-test side of Android intelligent terminal Method.
Background technology
Android mobile phone application program is signed unlike the application program of iPhone by trusted sources, and Google is signed certainly using developer Name.So need to be customized frame source code, after mounting, during self-test, under each installation directory of application program after installation Dynamic link library file, Android can operating file, Android dress APMB package verification.When application program is run, Android can operating file Can change, application loading before to each installation directory of application program under dynamic link library file, Android can operating file, Android dress APMB package is verified.POS machine safety requirements is higher, in order to meet Unionpay's standard, it is necessary to carry out applying self-test to POS machine, prevents There is security risk.
As patent application 201410291357.X discloses the safe verification method and device of a kind of Android application program.Peace The safe verification method of tall and erect application program includes:Step 1, public affairs are extracted from the Android application program installation file after signature Key is saved in service incoming end, which is denoted as the first public key;Step 2, During Android application program of signing initialization, service incoming end obtains the public key of the Android application program of having signed, this has been signed The public key of Android application program is denoted as the second public key;Step 3, services incoming end by the second public key compared with the first public key, Whether safely to judge to have signed Android application program according to comparative result.The safe verification method of Android application program of the present invention and Device, effectively prevents criminal to go the behavior of malicious attack platform by copying APK identity, effectively prevents from maliciously being usurped The security risk that the android application programs corrected one's mistakes are brought, enhances the security of platform.Although that realization of the patent application Safety certification, but it needs to be verified by key, and POS machine cannot be directed to and carry out safe self-test, it is difficult to meet Unionpay Safety standard.
The content of the invention
For shortcoming present in above-mentioned technology, the present invention provide it is a kind of applied to Android intelligent terminal from Detecting method, this method can real-time implementation application program self-test, make the use of application program safer, it is more reliable, prevent to be repaiied Changed data and file using the potential risk brought.
To achieve the above object, the present invention is realized in.
A kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:
101st, Android mobile phone application program installation or renewal after, to the data encryption of application program of mobile phone All Files with it is standby Part, then enter database;
When the 102nd, starting shooting, first by each program, All Files by SHA256 Hash, obtains Hash in mobile phone Summary;
103rd, the Hash data by public key encryption are found in database, is decrypted with private key, while to the application Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file SHA-256 secure hash is carried out,
104th, Hash is made a summary and encrypted by RSA public key encryption algorithms in database, Hash knot before Contrast is decrypted in fruit, carries out one-time detection to all application program of mobile phone, carries out examination;
And be compared Hash result, determine that application program is modified if inconsistent, do not permit in systems Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use, detect application program of mobile phone file in real time With data whether by external world's modification.
Thus, the self checking method realized by the present invention, the use of the application of Android device is safer, more reliable, Du Be modified absolutely data and file using the potential risk brought.
Specifically, in step 101, after application installation or renewal, can be found according to mount message involved by installation application And catalogue, to dynamic link library file under catalogue, Android can operating file, the Android after Android dress APMB package and optimization can transport Part of composing a piece of writing carries out SHA-256 secure hash, and is saved in after the data are encrypted with the public key of rivest, shamir, adelman Database.
In step 102, when application start when, find the Hash data by public key encryption in database, with private key into Row decryption, while can operating file, Android dress APMB package and optimization to dynamic link library file under catalogue where the application, Android Android afterwards can operating file carry out SHA-256 secure hash, with database private key decryption after Hash result carry out Compare, determine that application program is modified if inconsistent, do not allow to open in systems, and eject prompting frame and inform use Family, does not limit user if consistent and uses
Further, after system boot activation system services, in systems by having installed using bag name information one by one time Go through, and searched into database, find the Hash data by public key encryption, be decrypted with private key, while to the application Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file Carry out SHA-256 secure hash, with private key decryption after Hash data compared with, confirm installation after application whether by Modification, if detection has different using Hash data, this application is modified, in system all applications do not allow to make With, and prompt user.
The self checking method that the present invention is realized, can be avoided program from being changed, is made application with real-time implementation application program self-test The use of program is safer, more reliable, prevent to be modified data and file using the potential risk brought.
Brief description of the drawings
Fig. 1 is that self-test flow chart is applied in the start installation that the present invention is realized.
Fig. 2 is that backup flow chart is applied in the installation that the present invention is realized.
Fig. 3 is that the application program that the present invention is realized uses self-test flow chart.
Embodiment
In order to more clearly state the present invention, the present invention is further described below in conjunction with the accompanying drawings.
Refering to Figure 1, the self checking method applied to Android intelligent terminal realized for the present invention, program peace After dress or renewal, first to the data encryption of application program of mobile phone All Files and backup, then enter database;This method is started shooting The flow of self-test includes the following steps:
S1, beginning;
S2, all application programs for obtaining system in Android mobile phone;
S3, the name query data storehouse for being directed to each application program respectively;
If carried out in next step there are corresponding application program in database, if there is no corresponding in database Application program, then verify not by prompting user, exiting the program.
S4, according to apk file directorys carry out serializing summary to file;
By each program, All Files by SHA256 Hash, obtains Hash summary in mobile phone.
S5, Hash summary private key in database is decrypted, and serializing after decrypt is made a summary;
The Hash data by public key encryption are found in database, are decrypted with private key, while to where the application Dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash.
The 2 serializing summaries obtained above S6, comparison in S4 and S5 steps;
By Hash summary with encrypted by RSA public key encryption algorithms in database, Hash result before into Row decryption contrast, Hash result is compared, and is determined that application program is modified if inconsistent, is not permitted in systems Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use, detect application program of mobile phone file in real time With data whether by external world's modification.
S7, carry out one-time detection to all application program of mobile phone, carries out examination.
After system boot activation system services, traveled through one by one using bag name information by having installed in systems, and arrive Searched in database, find the Hash data by public key encryption, be decrypted with private key, while to catalogue where the application Lower dynamic link library file, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA- 256 secure hash, compared with the Hash data after private key decryption, confirm whether the application after installation is changed, such as Fruit detection has to be modified using Hash data difference, then this application, and all applications do not allow to use in system, and carry Show user.
Thus, the self checking method realized by the present invention, the use of the application of Android device is safer, more reliable, Du Be modified absolutely data and file using the potential risk brought.
With reference to shown in Fig. 2, specifically, in step 101, after application installation or renewal, it can be found according to mount message Involved catalogue is applied in installation, and to dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization Android afterwards can operating file carry out SHA-256 secure hash, and the data are carried out with the public key of rivest, shamir, adelman Database is saved in after encryption.Method is as follows:
First, install or update apk, then carrying out file conductance to All Files under installation directory enters in SHA-256, obtains Make a summary to serializing;Obtained serializing summary is encrypted with public key again, and is saved in database.
With reference to shown in Fig. 3, application program is in use, self-test flow is as follows:
Application program is opened, when application program launching, phase is first searched by application data bag name in the database The application program answered, if do not found, not by terminating program;
If it is found, then further carrying out serializing summary to file according to apk file directorys, and will find by public affairs The encrypted Hash data of key, are decrypted with private key, while to dynamic link library file under catalogue where the application, Android can Operating file, Android after Android dress APMB package and optimization can operating file carry out SHA-256 secure hash, and in database Hash result after private key decryption is compared, and is determined that application program is modified if inconsistent, is not permitted in systems Perhaps open, and eject prompting frame and inform user, do not limit user if consistent and use.
The self checking method that the present invention is realized, can be avoided program from being changed, is made application with real-time implementation application program self-test The use of program is safer, more reliable, prevent to be modified data and file using the potential risk brought.
Disclosed above is only several specific embodiments of the present invention, but the present invention is not limited to this, any ability What the technical staff in domain can think change should all fall into protection scope of the present invention.

Claims (4)

1. a kind of self checking method applied to Android intelligent terminal, it is characterised in that this method comprises the following steps:
101st, after Android mobile phone application program is installed or updated, to the data encryption of application program of mobile phone All Files with backing up, Then database is entered;
When the 102nd, starting shooting, first by each program, All Files by SHA256 Hash, obtains Hash summary in mobile phone;
103rd, the Hash data by public key encryption are found in database, is decrypted with private key, while to where the application Dynamic link library file under catalogue, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash,
104th, Hash is made a summary with encrypted by RSA public key encryption algorithms in database, Hash result before into Row decryption contrast, determines that application program is modified if inconsistent, does not allow to open in systems, and ejects prompting frame announcement Know user, do not limit user if consistent and use, detect application program of mobile phone file in real time and whether data are changed by the external world.
2. the self checking method according to claim 1 applied to Android intelligent terminal, it is characterised in that in step 101, After application installation or renewal, installation can be found according to mount message and applies involved catalogue, to dynamic link library under catalogue File, Android can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash Change, and database is saved in after the data are encrypted with the public key of rivest, shamir, adelman.
3. the self checking method according to claim 2 applied to Android intelligent terminal, it is characterised in that in step 102, When application starts, the Hash data by public key encryption are found in database, are decrypted with private key, while to the application Dynamic link library file under the catalogue of place, Android can operating file, Android dress APMB package and optimization after Android can operating file SHA-256 secure hash is carried out, it is true if inconsistent compared with the Hash result after private key decryption in database Determine application program to be modified, do not allow to open in systems, and eject prompting frame and inform user, use is not limited if consistent Family uses.
4. the self checking method according to claim 3 applied to Android intelligent terminal, it is characterised in that work as system boot After activation system service, traveled through one by one using bag name information by having installed in systems, and searched into database, find through The Hash data of public key encryption are crossed, are decrypted with private key, while to dynamic link library file under catalogue where the application, peace Zhuo can operating file, Android dress APMB package and optimization after Android can operating file carry out SHA-256 secure hash, with private key Hash data after decryption are compared, and confirm whether the application after installation is changed, if detection has using Hash number According to difference, then this application is modified, and all applications do not allow to use in system, and prompt user.
CN201711269490.5A 2017-12-05 2017-12-05 Self checking method applied to Android intelligent terminal Pending CN107908962A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711269490.5A CN107908962A (en) 2017-12-05 2017-12-05 Self checking method applied to Android intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711269490.5A CN107908962A (en) 2017-12-05 2017-12-05 Self checking method applied to Android intelligent terminal

Publications (1)

Publication Number Publication Date
CN107908962A true CN107908962A (en) 2018-04-13

Family

ID=61854376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711269490.5A Pending CN107908962A (en) 2017-12-05 2017-12-05 Self checking method applied to Android intelligent terminal

Country Status (1)

Country Link
CN (1) CN107908962A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600256A (en) * 2018-05-08 2018-09-28 山东浪潮通软信息科技有限公司 A kind of Information Exchange System and method
CN110096869A (en) * 2019-05-08 2019-08-06 苏州浪潮智能科技有限公司 BIOS loads signing certificate method, system, equipment and computer media
CN110879811A (en) * 2019-11-18 2020-03-13 山东浪潮通软信息科技有限公司 Implementation method for carrying out data and program consistency self-check during operation
WO2021098293A1 (en) * 2019-11-18 2021-05-27 许继集团有限公司 Database security protection method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device
KR20170096440A (en) * 2016-02-16 2017-08-24 한국인터넷진흥원 Method and apparatus for analysing simility of detecting malignant app

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573490A (en) * 2013-10-29 2015-04-29 桂林电子科技大学 Method for protecting installed software on Android platform
CN104462965A (en) * 2014-11-14 2015-03-25 华为技术有限公司 Method for verifying integrity of application program and network device
KR20170096440A (en) * 2016-02-16 2017-08-24 한국인터넷진흥원 Method and apparatus for analysing simility of detecting malignant app
CN106355081A (en) * 2016-09-07 2017-01-25 深圳市新国都支付技术有限公司 Android program start verification method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600256A (en) * 2018-05-08 2018-09-28 山东浪潮通软信息科技有限公司 A kind of Information Exchange System and method
CN110096869A (en) * 2019-05-08 2019-08-06 苏州浪潮智能科技有限公司 BIOS loads signing certificate method, system, equipment and computer media
CN110879811A (en) * 2019-11-18 2020-03-13 山东浪潮通软信息科技有限公司 Implementation method for carrying out data and program consistency self-check during operation
WO2021098293A1 (en) * 2019-11-18 2021-05-27 许继集团有限公司 Database security protection method and device
CN110879811B (en) * 2019-11-18 2023-05-23 浪潮通用软件有限公司 Implementation method for carrying out data and program consistency self-check during running

Similar Documents

Publication Publication Date Title
EP3387813B1 (en) Mobile device having trusted execution environment
US9281949B2 (en) Device using secure processing zone to establish trust for digital rights management
US9935773B2 (en) Trusted platform module certification and attestation utilizing an anonymous key system
CN103843303B (en) The management control method and device of virtual machine, system
JP4912879B2 (en) Security protection method for access to protected resources of processor
CN107908962A (en) Self checking method applied to Android intelligent terminal
KR20070084326A (en) Updating configuration parameters in a mobile terminal
CN109218260B (en) Trusted environment-based authentication protection system and method
WO2016019790A1 (en) Verification method, client, server and system for installation package
WO2014036021A1 (en) Secure device service enrollment
KR20120044914A (en) Methods and apparatus for storage and execution of access control clients
CN110401538B (en) Data encryption method, system and terminal
CN104680061A (en) Method and system for verifying code signing during startup of application in Android environment
CN102833745B (en) Method, communication equipment and communication system that a kind of software security is upgraded
CN104751049A (en) Application program installing method and mobile terminal
CN108958768A (en) A kind of GPU firmware update, device, equipment and computer readable storage medium
WO2014206171A1 (en) Public key cryptography processing method, device and system
JP6387908B2 (en) Authentication system
US20190080079A1 (en) Method and device for verifying security of application
KR101642267B1 (en) System for preventing forgery of application and method therefor
CN110837643B (en) Activation method and device of trusted execution environment
JP6343928B2 (en) Portable terminal, authentication system, authentication method, and authentication program
KR20180052479A (en) System for updating firm ware of wire and wireless access point using signature chain, wire and wireless access point and method thereof
KR101906484B1 (en) Method for application security and system for executing the method
CN111061495A (en) Application installation method, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180413