CN108319823A - A kind of Android APP signature binding method and device - Google Patents
A kind of Android APP signature binding method and device Download PDFInfo
- Publication number
- CN108319823A CN108319823A CN201810107514.5A CN201810107514A CN108319823A CN 108319823 A CN108319823 A CN 108319823A CN 201810107514 A CN201810107514 A CN 201810107514A CN 108319823 A CN108319823 A CN 108319823A
- Authority
- CN
- China
- Prior art keywords
- app
- signature
- digital signature
- digital
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 102000006479 Heterogeneous-Nuclear Ribonucleoproteins Human genes 0.000 claims description 43
- 108010019372 Heterogeneous-Nuclear Ribonucleoproteins Proteins 0.000 claims description 43
- 241001269238 Data Species 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
The invention discloses a kind of Android APP signature binding methods, including:Software APP is had by oneself correct digital signature informations with it to bind;When starting the APP every time, the digital signature identification program write by C language is called by the Java layer identification codes in the APP, obtains Contemporary Digital signed data;The digital signature information of the Contemporary Digital signed data and binding is compared;Judging the APP signatures according to comparing result, whether certification is successful.The invention also discloses a kind of Android APP signature binding devices.The present invention can improve the difficulty that signature is cracked, and effectively improve the safety of APP.
Description
Technical field
The present invention relates to safety, signature authentication technical field more particularly to a kind of Android APP signature binding method and dresses
It sets.
Background technology
In software App exploitation overall situation, there is reverse-engineerings and safe direction.If the App of decompiling exploitation, then add
Upper new signature recompilates, so that it may issue the App as one.Therefore it improves and has the safety of App by oneself as therein one
Item important technology.
In the prior art, signature authentication is realized by the way that own digital signature is added in the java layer identification codes in App.
When App is cracked by illegal developer and rejoins new signature, the number of the java layer identification code automatic decisions App in App
It signs whether consistent with the own signature of addition, to have the function that App is had in protection by oneself.But the safety of Java layer identification codes
Property it is not high, illegal developer is easy to find the own digital signature data for being added to App by decompiling, to being carried out to it
Signature authentication is realized in modification.
Invention content
The present invention is directed to problems of the prior art, provides a kind of Android APP signature binding method and device, energy
Enough difficulty for improving signature and being cracked, effectively improve the safety of APP, prevent the digital signature of modification App.
The technical solution that the present invention is proposed with regard to above-mentioned technical problem is as follows:
On the one hand, the present invention provides a kind of Android APP signatures binding method, including:
Software APP is had by oneself correct digital signature informations with it to bind;
When starting the APP every time, the digital signature write by C language is called by the Java layer identification codes in the APP
Authentication procedure obtains Contemporary Digital signed data;
The digital signature information of the Contemporary Digital signed data and binding is compared;
Judging the APP signatures according to comparing result, whether certification is successful.
Further, described to judge whether certification successfully, specifically includes the APP signatures according to comparing result:
If the Contemporary Digital signed data is consistent with the digital signature information of binding, judge that the APP signatures are recognized
It demonstrate,proves successfully, continues to run with the APP;
If the Contemporary Digital signed data and the digital signature information of binding are inconsistent, judge that the APP signatures are recognized
Card failure, the APP out of service.
Further, described to bind software APP and its own correct digital signature information, it specifically includes:
The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains number
Signing messages binds the APP and the digital signature information.
Further, described that the digital signature data of the APP is put into C language code by Java layer identification codes, it obtains
Digital signature information is obtained, is specifically included:
The package informatin for specifying packet name is obtained by package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data of the signature array is obtained, and the digital signature data is put into C language generation
In code, the digital signature information is obtained.
Further, the operation method of the digital signature identification program write by C language includes:
Obtain the package manager of the APP;
The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
On the other hand, the present invention provides a kind of Android APP signatures binding device, including:
Binding module is bound for having software APP by oneself correct digital signature informations with it;
Calling module when for starting the APP every time, being called by the Java layer identification codes in the APP and being compiled by C language
The digital signature identification program write obtains Contemporary Digital signed data;
Contrast module, for comparing the digital signature information of the Contemporary Digital signed data and binding;And
Judgment module is run, whether certification is successful for judging the APP signatures according to comparing result.
Further, the operation judgment module specifically includes:
Unit is continued to run with, is used for when the Contemporary Digital signed data is consistent with the digital signature information of binding,
Judge the APP signature authentications success, continues to run with the APP;And
Unit out of service is used for when the digital signature information of the Contemporary Digital signed data and binding is inconsistent,
Judge the APP signature authentications failure, the APP out of service.
Further, the binding module is specifically used for:
The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains number
Signing messages binds the APP and the digital signature information.
Further, the binding module specifically includes:
Package informatin acquiring unit, for obtaining the package informatin for specifying packet name by package manager;The package informatin includes label
Name;
Signature array acquiring unit obtains signature array for passing through the package informatin;And
Information acquisition unit, the first digit signed data for obtaining the signature array, and the number is signed
Name data are put into C language code, obtain the digital signature information.
Further, the operation method of the digital signature identification program write by C language includes:
Obtain the package manager of the APP;
The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
The advantageous effect that technical solution provided in an embodiment of the present invention is brought is:
When starting APP every time, the digital signature identification program write by C language is called by Java layer identification codes, is obtained
Contemporary Digital signed data realizes the certification signed to APP to be compared with pre-stored digital signature information, improves
The difficulty that signature is cracked improves safety, APP is preferably protected not pretended to be illegally.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is the flow diagram for the Android APP signature binding methods that the embodiment of the present invention one provides;
Fig. 2 is the idiographic flow schematic diagram for the Android APP signature binding methods that the embodiment of the present invention one provides;
Fig. 3 is the structural schematic diagram of Android APP signatures binding device provided by Embodiment 2 of the present invention.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
Embodiment one
An embodiment of the present invention provides a kind of Android APP signature binding methods, and referring to Fig. 1, this method includes:
S1, software APP and its own correct digital signature information are bound;
S2, it when starting the APP every time, is called by the Java layer identification codes in the APP and is signed by the number that C language is write
Name authentication procedure, obtains Contemporary Digital signed data;
S3, the digital signature information of the Contemporary Digital signed data and binding is compared;
S4, judging the APP signatures according to comparing result, whether certification is successful.
It should be noted that the C language code of signature related (i.e. digital signature identification program) is beaten by universal method
It is bundled into .so library files:L iblocSDK7.so, and establish JNI call relations (Java layer identification codes call C language code must lead to
Cross the method for calling of JNI).
When starting APP every time, the Java layer identification codes in APP call the digital signature program in C language by JNI
VerifySign (), you can obtain Contemporary Digital signed data s ign, by Contemporary Digital signed data sign with prestore
Digital signature information SIGN compared:
Int result=strcmp (sign, SIGN).
The memory of C language is discharged using DeleteLocalRef methods, and judges that result is returned the result, if returning to 0,
Then indicate that signature is consistent, otherwise, it means that signature is inconsistent.This implementation column is by the way of the libraries so so that reverse-engineering teacher is only
Binary data or compilation formula language counter can be translated, to effectively improve the difficulty that cracks of signature, improves APP safety
Property, preferably protect APP not pretended to be illegally.
Further, in step s3, it is described according to comparing result judge APP signature whether certification success, specifically
Including:
If the Contemporary Digital signed data is consistent with the digital signature information of binding, judge that the APP signatures are recognized
It demonstrate,proves successfully, APP described in normal operation;
If the Contemporary Digital signed data and the digital signature information of binding are inconsistent, judge that the APP signatures are recognized
Card failure, the APP out of service.
It should be noted that if signature is consistent, then normal operation APP is called conversely, then APP is out of service and is killed journey
Sequence Java code:
android.os.Process.killProcess(android.os.Process.myPid())。
Further, described to bind software APP and its own correct digital signature information, it specifically includes:
The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains number
Signing messages binds the APP and the digital signature information.
Further, described that the digital signature data of the APP is put into C language code by Java layer identification codes, it obtains
Digital signature information is obtained, is specifically included:
The package informatin for specifying packet name is obtained by package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data of the signature array is obtained, and the digital signature data is put into C language generation
In code, the digital signature information is obtained.
Specifically, the correct digital signature datas of APP are put into C language code by Java:
(1) package informatin for specifying packet name to include signature is obtained by package manager
PackageInfopackageInfo=
context.getPackageManager().getPackageInfo(context.getPackageName(),
PackageManager.GET_SIGNATURES);
(2) signature array is obtained by the package informatin of return
Signature [] signatures=packageInfo.signature;
(3) according to the digital signature data for returning to signature array acquisition first
Digital signature data=signatures [0] .toCharsString ();
(4) it is put into C language code
Static const char*SIGN=" digital signature information ".
Further, the operation method of the digital signature identification program write by C language includes:
Obtain the package manager of the APP;
The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
Specifically, digital signature authentication method is shown a C language:
(1) application of APP is obtained
Jobject application=NULL;
Jclass activity_thread_clz=env->FindClass("android/app/
ActivityThread");
JmethodID currentApplication=env->GetStaticMethodID(activity_thread_
clz,"currentApplication","()Landroid/app/Application;");
Jobjectapplication=
env->CallStaticObjectMethod(activity_thread_clz,currentApplication);
(2) package manager is obtained by the application of APP
Jclass context_clz=env->GetObjectClass(applicat ion);
JmethodID getPackageManager=
env->GetMethodID(context_clz,"getPackageManager",
"()Landroid/content/pm/PackageManager;");
Jobject package_manager=
env->CallObjectMethod(application,getPackageManager);
(3) it is obtained by package manager and specifies packet name packet
(4) by package manager and packet name, the package informatin containing signature is obtained
Jobject package_info=
env->CallObjectMethod(package_manager,getPackageInfo,package_nam e,
64);
Jclass package_info_clz=env->GetObjectClass(package_info);
(5) signature array is obtained by the package informatin of return
(6) according to the data signature data for returning to signature array acquisition first
Jobject s ignature0=env->GetObjectArrayElement(s ignatures_array,0);
Jclass s ignature_clz=
env->GetObjectClass(s ignature0);
JmethodID toCharsString=
env->GetMethodID(s ignature_clz,
"toCharsString","()Ljava/lang/String;");
Jstring s ignature_str=
(jstring)(env->Cal lObjectMethod(s ignature0,toCharsString));
Const char*s ign=env->GetStringUTFChars(s ignature_str,NULL);Wherein, s
Ign is Contemporary Digital signed data.
It is the idiographic flow schematic diagram of Android APP signatures binding method provided in an embodiment of the present invention referring to Fig. 2, it is described
Android APP signature binding method includes:
S201, correct digital signature data SIGN is had by oneself by JAVA Code obtainings.
S202, digital signature data SIGN is put into C language code.
S203, C language method is write, to obtain the digital signature data s ing of APP and be compared with SIGN.
S204, C language code is packaged into the libraries SO, and writes JNI calling.
S205, when APP starts every time, call C language method, judge whether the digital signature of APK consistent, if so,
Step S206 is executed, if it is not, thening follow the steps S207.
S206, normal operation.
S207, terminate application.
The embodiment of the present invention is called by Java layer identification codes and is recognized by the digital signature that C language is write when starting APP every time
Program is demonstrate,proved, Contemporary Digital signed data is obtained, to be compared with pre-stored digital signature information, realizes and signs to APP
Certification, improve the difficulty that is cracked of signature, improve safety, APP is preferably protected not pretended to be illegally.
Embodiment two
An embodiment of the present invention provides a kind of Android APP signature binding devices, can realize above-mentioned Android APP signatures binding
All flows of method, referring to Fig. 3, the Android APP signatures binding device includes:
Binding module 1 is bound for having software APP by oneself correct digital signature informations with it;
Calling module 2 when for starting the APP every time, is called by the Java layer identification codes in the APP by C language
The digital signature identification program write obtains Contemporary Digital signed data;
Contrast module 3, for comparing the digital signature information of the Contemporary Digital signed data and binding;With
And
Judgment module 4 is run, whether certification is successful for judging the APP signatures according to comparing result.
Further, the operation judgment module specifically includes:
Unit is continued to run with, is used for when the Contemporary Digital signed data is consistent with the digital signature information of binding,
Judge the APP signature authentications success, continues to run with the APP;And
Unit out of service is used for when the digital signature information of the Contemporary Digital signed data and binding is inconsistent,
Judge the APP signature authentications failure, the APP out of service.
Further, the binding module is specifically used for:
The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains number
Signing messages binds the APP and the digital signature information.
Further, the binding module specifically includes:
Package informatin acquiring unit, for obtaining the package informatin for specifying packet name by package manager;The package informatin includes label
Name;
Signature array acquiring unit obtains signature array for passing through the package informatin;And
Information acquisition unit, the first digit signed data for obtaining the signature array, and the number is signed
Name data are put into C language code, obtain the digital signature information.
Further, the operation method of the digital signature identification program write by C language includes:
Obtain the package manager of the APP;
The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;
Signature array is obtained by the package informatin;
The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
The embodiment of the present invention is called by Java layer identification codes and is recognized by the digital signature that C language is write when starting APP every time
Program is demonstrate,proved, Contemporary Digital signed data is obtained, to be compared with pre-stored digital signature information, realizes and signs to APP
Certification, improve the difficulty that is cracked of signature, improve safety, APP is preferably protected not pretended to be illegally.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (10)
- The binding method 1. a kind of Android APP signs, which is characterized in that including:Software APP is had by oneself correct digital signature informations with it to bind;When starting the APP every time, the digital signature identification write by C language is called by the Java layer identification codes in the APP Program obtains Contemporary Digital signed data;The digital signature information of the Contemporary Digital signed data and binding is compared;Judging the APP signatures according to comparing result, whether certification is successful.
- The binding method 2. Android APP as described in claim 1 signs, which is characterized in that described that institute is judged according to comparing result Stating APP signatures, whether certification is successful, specifically includes:If the Contemporary Digital signed data is consistent with the digital signature information of binding, judge the APP signature authentications at Work(continues to run with the APP;If the Contemporary Digital signed data and the digital signature information of binding are inconsistent, judge that the APP signature authentications lose It loses, the APP out of service.
- The binding method 3. Android APP as described in claim 1 signs, which is characterized in that described that software APP is own just with it True digital signature information is bound, and is specifically included:The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains digital signature Information binds the APP and the digital signature information.
- The binding method 4. Android APP as claimed in claim 3 signs, which is characterized in that it is described by Java layer identification codes by institute The digital signature data for stating APP is put into C language code, is obtained digital signature information, is specifically included:The package informatin for specifying packet name is obtained by package manager;The package informatin includes signature;Signature array is obtained by the package informatin;The first digit signed data of the signature array is obtained, and the digital signature data is put into C language code, Obtain the digital signature information.
- The binding method 5. Android APP as described in claim 1 signs, which is characterized in that described to be signed by the number that C language is write Name authentication procedure operation method include:Obtain the package manager of the APP;The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;Signature array is obtained by the package informatin;The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
- The binding device 6. a kind of Android APP signs, which is characterized in that including:Binding module is bound for having software APP by oneself correct digital signature informations with it;Calling module when for starting the APP every time, is write by the Java layer identification codes calling in the APP by C language Digital signature identification program obtains Contemporary Digital signed data;Contrast module, for comparing the digital signature information of the Contemporary Digital signed data and binding;AndJudgment module is run, whether certification is successful for judging the APP signatures according to comparing result.
- The binding device 7. Android APP as claimed in claim 6 signs, which is characterized in that the operation judgment module specifically wraps It includes:Unit is continued to run with, for when the Contemporary Digital signed data is consistent with the digital signature information of binding, judging The APP signature authentications success, continues to run with the APP;AndUnit out of service, for when the digital signature information of the Contemporary Digital signed data and binding is inconsistent, judging The APP signature authentications failure, the APP out of service.
- The binding device 8. Android APP as claimed in claim 6 signs, which is characterized in that the binding module is specifically used for:The APP is had by oneself correct digital signature datas by Java layer identification codes to be put into C language code, obtains digital signature Information binds the APP and the digital signature information.
- The binding device 9. Android APP as claimed in claim 8 signs, which is characterized in that the binding module specifically includes:Package informatin acquiring unit, for obtaining the package informatin for specifying packet name by package manager;The package informatin includes signature;Signature array acquiring unit obtains signature array for passing through the package informatin;AndInformation acquisition unit, the first digit signed data for obtaining the signature array, and by the digital signature number According to being put into C language code, the digital signature information is obtained.
- The binding device 10. Android APP as claimed in claim 6 signs, which is characterized in that the number write by C language The operation method of signature authentication program includes:Obtain the package manager of the APP;The package informatin for specifying packet name is obtained by the package manager;The package informatin includes signature;Signature array is obtained by the package informatin;The first digit signed data for obtaining the signature array, as Contemporary Digital signed data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810107514.5A CN108319823A (en) | 2018-02-02 | 2018-02-02 | A kind of Android APP signature binding method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810107514.5A CN108319823A (en) | 2018-02-02 | 2018-02-02 | A kind of Android APP signature binding method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108319823A true CN108319823A (en) | 2018-07-24 |
Family
ID=62903121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810107514.5A Pending CN108319823A (en) | 2018-02-02 | 2018-02-02 | A kind of Android APP signature binding method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108319823A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109313678A (en) * | 2018-09-05 | 2019-02-05 | 福建联迪商用设备有限公司 | A kind of method and terminal for calling API |
CN110162488A (en) * | 2018-11-15 | 2019-08-23 | 深圳乐信软件技术有限公司 | Buffer consistency method of calibration, device, server and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013196123A (en) * | 2012-03-16 | 2013-09-30 | Ntt Data Corp | Package generation device, package generation method, and program |
CN103888252A (en) * | 2012-12-19 | 2014-06-25 | 深圳市华营数字商业有限公司 | UID, PID, and APPID-based control application access permission method |
CN103902887A (en) * | 2012-12-24 | 2014-07-02 | 珠海市君天电子科技有限公司 | Method and device for identifying file source through signature |
CN104199654A (en) * | 2014-08-27 | 2014-12-10 | 百度在线网络技术(北京)有限公司 | Open platform calling method and device |
CN106529222A (en) * | 2016-12-09 | 2017-03-22 | 北京智游网安科技有限公司 | Protection method and protection system for preventing secondary packaging and cracking of application program |
-
2018
- 2018-02-02 CN CN201810107514.5A patent/CN108319823A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2013196123A (en) * | 2012-03-16 | 2013-09-30 | Ntt Data Corp | Package generation device, package generation method, and program |
CN103888252A (en) * | 2012-12-19 | 2014-06-25 | 深圳市华营数字商业有限公司 | UID, PID, and APPID-based control application access permission method |
CN103902887A (en) * | 2012-12-24 | 2014-07-02 | 珠海市君天电子科技有限公司 | Method and device for identifying file source through signature |
CN104199654A (en) * | 2014-08-27 | 2014-12-10 | 百度在线网络技术(北京)有限公司 | Open platform calling method and device |
CN106529222A (en) * | 2016-12-09 | 2017-03-22 | 北京智游网安科技有限公司 | Protection method and protection system for preventing secondary packaging and cracking of application program |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109313678A (en) * | 2018-09-05 | 2019-02-05 | 福建联迪商用设备有限公司 | A kind of method and terminal for calling API |
CN109313678B (en) * | 2018-09-05 | 2021-11-09 | 福建联迪商用设备有限公司 | API calling method and terminal |
CN110162488A (en) * | 2018-11-15 | 2019-08-23 | 深圳乐信软件技术有限公司 | Buffer consistency method of calibration, device, server and storage medium |
CN110162488B (en) * | 2018-11-15 | 2022-02-11 | 深圳乐信软件技术有限公司 | Cache consistency checking method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106778103B (en) | Reinforcement method, system and decryption method for preventing reverse cracking of android application program | |
CN101908119B (en) | Method and device for processing dynamic link library (DLL) file | |
KR101503785B1 (en) | Method And Apparatus For Protecting Dynamic Library | |
CN103744686B (en) | Control method and the system of installation is applied in intelligent terminal | |
CN108399329B (en) | Method for improving security of trusted application program | |
US20100012732A1 (en) | Installing a patch in a smart card module | |
WO2011114655A1 (en) | Information processing device, virtual machine generation method, and application software distribution system | |
CN106529218B (en) | Application verification method and device | |
CN103975338A (en) | Method of generating, from an initial package file comprising an application to be secured and an initial configuration file, a package file for securing the application, and associated computer program product and computing device | |
CN107220547B (en) | Terminal equipment and starting method thereof | |
CN108763951B (en) | Data protection method and device | |
EP1783580A1 (en) | Java applet, jar file creating method, jar file creating program, and jar file creating device | |
CN103065072A (en) | Method and device to improve Java software jailbreak difficulty and copyright verification method | |
CN104200153A (en) | Start verification method and system | |
US20180129794A1 (en) | Method for Protecting Dex File from Decompilation in Android System | |
CN108733379A (en) | The Android application reinforcement means that mapping is obscured is detached based on DEX bytecodes | |
CN104199654A (en) | Open platform calling method and device | |
CN108319823A (en) | A kind of Android APP signature binding method and device | |
CN108595950A (en) | A kind of safe Enhancement Methods of SGX of combination remote authentication | |
CN114385189B (en) | Function address space layout randomization method for deep embedded system | |
US20190205528A1 (en) | Automated software application verification system | |
CN101888627B (en) | Mobile terminal and system data protection method thereof | |
CN110414218B (en) | Kernel detection method and device, electronic equipment and storage medium | |
CN112559980B (en) | Applet runtime capable of embedding a plurality of random APP | |
CN112134905A (en) | Android system based signature method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 510635 Room 2301-2341, 23 South Tower, 28 Longkou Hengjie, Tianhe District, Guangzhou City, Guangdong Province Applicant after: Bee Assistant Co., Ltd. Address before: 510635 Room 2301-2341, 23 South Tower, 28 Longkou Hengjie, Tianhe District, Guangzhou City, Guangdong Province Applicant before: Guangdong bee assistant network technology Limited by Share Ltd |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180724 |