CN108363580A - Application program installation method, device, computer equipment and storage medium - Google Patents

Application program installation method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108363580A
CN108363580A CN201810199683.6A CN201810199683A CN108363580A CN 108363580 A CN108363580 A CN 108363580A CN 201810199683 A CN201810199683 A CN 201810199683A CN 108363580 A CN108363580 A CN 108363580A
Authority
CN
China
Prior art keywords
application program
cryptographic hash
encrypted
compiling packet
compiling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810199683.6A
Other languages
Chinese (zh)
Inventor
魏文杰
谭利民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201810199683.6A priority Critical patent/CN108363580A/en
Publication of CN108363580A publication Critical patent/CN108363580A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves a kind of application program installation method, device, computer equipment and storage mediums.The method includes:When the installation instruction for receiving application program, the signing messages of application program is obtained;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;The second cryptographic Hash of application program is obtained, the second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second cryptographic Hash;When the first cryptographic Hash is identical as the second cryptographic Hash, then it is decrypted according to the second preset algorithm encrypted compiling packet corresponding to application program;Application program is installed according to the compiling packet after decryption.The key message of application program can be avoided to be changed using this method, improve applications security.

Description

Application program installation method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, are set more particularly to a kind of application program installation method, device, computer Standby and storage medium.
Background technology
With the development of modern network technology, the terminals such as mobile phone, computer have played in we live increasingly heavier The effect wanted, the thing followed are extensive exploitation and the use of application program.
When application program is installed to terminal, the attack being subjected to also gradually is increasing, therefore the peace of application program installation Full sex chromosome mosaicism starts to attract attention.The installation method of legacy application is mainly by increasing password authentification or to applying journey The file of sequence increases modification to increase the difficulty of attack, but the installation method of these application programs is easier to be cracked, in terminal On use application program still there are many security risks.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of application journey that can improve applications security Sequence installation method, device, computer equipment and storage medium.
A kind of application program installation method, the method includes:
When the installation instruction for receiving application program, the signing messages of the application program is obtained;
Corresponding first cryptographic Hash of the signing messages is calculated according to the first preset algorithm;
Obtain the second cryptographic Hash of the application program, the data type of second cryptographic Hash and first cryptographic Hash It is identical, first cryptographic Hash and second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, then according to the second preset algorithm to the application program Corresponding encrypted compiling packet is decrypted;
The application program is installed according to the compiling packet after decryption.
In one embodiment, it is described according to the second preset algorithm it is corresponding to the application program it is encrypted compiling wrap into Row decryption, including:
Obtain the storage address of the corresponding encrypted compiling packet of the application program;
The header file of the encrypted compiling packet is read according to the storage address, and from the header file described in extraction The storage information of encryption data in encrypted compiling packet;
The encryption data is obtained according to the storage information and the storage address;
The encryption data is decrypted by second preset algorithm.
In one embodiment, after the compiling packet according to after decryption installs the application program, further include:
When the application program is run, then the preset function in mounted compiling packet is obtained;
Record the input time of the input data of the preset function, and obtain the preset function response data it is defeated Go out the time;
Calculate the difference of the input time and the output time;
When the difference is more than preset value, then the information of the application program operation exception is returned.
In one embodiment, first cryptographic Hash further includes with after second cryptographic Hash:
When first cryptographic Hash and the second cryptographic Hash difference, then stop that the application program is installed.
In one embodiment, it is described according to the second preset algorithm it is corresponding to the application program it is encrypted compiling wrap into After row decryption, further include:
When to the encrypted compiling packet decryption failure, stop that the application program is installed.
A kind of application program encryption device, described device include:
Starting module, for when the installation instruction for receiving application program, obtaining the encrypted compiling of the application program The signing messages of packet;
Encrypted signature module, for calculating corresponding first cryptographic Hash of the signing messages according to the first preset algorithm;
Authentication module, the second cryptographic Hash for obtaining the application program, second cryptographic Hash are breathed out with described first The data type of uncommon value is identical, first cryptographic Hash and second cryptographic Hash;
Deciphering module, it is identical as second cryptographic Hash for working as first cryptographic Hash, then according to the second preset algorithm Encrypted compiling packet is corresponded to the application program to be decrypted;
Module is installed, for installing the application program according to the compiling packet after decryption.
In one embodiment, the deciphering module, including:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of the application program;
Extraction unit, the header file for reading the encrypted compiling packet according to the storage address, and from the head The storage information of encryption data in the encrypted compiling packet is extracted in file;
Reading unit, for obtaining the encryption data according to the storage information and the storage address;
Decryption unit, for the encryption data to be decrypted by second preset algorithm.
In one embodiment, described device further includes:
Preset function acquisition module, it is pre- in mounted compiling packet for when the application program is run, then getting If function;
Timing module, the input time of the input data for recording the preset function, and obtain the preset function Corresponding data output time;Calculate the difference of the input time and the output time;
Abnormal monitoring module, for when the difference is more than preset value, then returning to the application program operation exception Information.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of method described in any one of the above embodiments is realized when row.
Above application program installation method, device, computer equipment and storage medium, when terminal installs application program, Priori states the signing messages of the encryption compiling packet of application program, then after the compiling packet of application program encryption is decrypted, just fair This application program is installed in terminal perhaps.By the verification of signing messages, application program is prevented to be tampered in a pre-installation, and corresponded to It is encrypted with the compiling packet of program, when the application is installed, only to encrypted compiling packet successful decryption, can be allowed Application program is installed in the operation in terminal, and the key message of application program is avoided to be changed, and by two kinds of cipher modes, carries High applications security.
Description of the drawings
Fig. 1 is the application scenario diagram of application program installation method in one embodiment;
Fig. 2 is the flow diagram of application program installation method in one embodiment;
Fig. 3 is the flow diagram of the step S208 in Fig. 2 in one embodiment;
Fig. 4 is the structure diagram of application program mounting device in one embodiment;
Fig. 5 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Application program installation method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, eventually End is communicated by network with server.The installation kit that terminal obtains application program from server is installed, when terminal connects After receiving the installation instruction that user starts to install this application program, the signing messages of this application program is first verified, then will be applied Encrypted compiling packet is decrypted in program installation kit, after successful decryption, this application program is just allowed to be installed in terminal; By this application program installation method, the safety of application program is improved.Wherein, terminal can be, but not limited to be various individuals Computer, laptop, smart mobile phone, tablet computer and portable wearable device, server can use independent service The server cluster of device either multiple servers composition is realized.
In one embodiment, as shown in Fig. 2, providing a kind of application program installation method, it is applied to Fig. 1 in this way In terminal for illustrate, include the following steps:
S202 obtains the signing messages of application program when the installation instruction for receiving application program.
Wherein, installation instruction is the instruction for starting to install application program in terminal;When the peace of terminal downloads application program After dress packet, it can send a notification message and prompt the user whether to start that this application program is installed, start to install if user confirms, Terminal receives installation instruction input by user.
Signing messages is the verification information for preventing application program by secondary installing;It is packaged into installation kit in application program Later, each file in installation kit is handled by signing messages, when file is replaced or is distorted, this A.L.S. Breath can be changed, and ensure integrality of this installation kit in transmission process with this;Signing messages can pass through Keytool (Java The management tool of data certificate) and the tools such as Jarsigner (Java sign and calibration tool) generate.
Specifically, it after terminal has downloaded the installation kit of application program from server or other websites, sends a notification message It prompts the user whether to start to install this application program, user, which confirms, to be started to install, and after terminal receives installation instruction, obtains this application The signing messages of program.
S204, according to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information.
Wherein, the first preset algorithm is the Encryption Algorithm for signing messages to be changed into the first cryptographic Hash;First is default Algorithm can be Hash (Hash) method, such as md5 algorithms (Message Digest Algorithm Message Digest Algorithm 5) Or SHA (Secure Hash Algorithm Secure Hash Algorithm) etc..Hash algorithm, that is, hash function is a kind of one-way cipher System, only ciphering process, without decrypting process.
First cryptographic Hash is signing messages of the terminal according to application program when server is packaged, by the first pre- imputation The secret value that method is encrypted;The md5 values of signing messages when such as application program is packaged.
Specifically, when the signing messages of terminal-pair application program is verified, due to the signature of application program installation kit Information is encrypted frequently with hash algorithm, so terminal should first obtain signing messages when application program is packaged, then leads to It crosses the first preset algorithm this signing messages is encrypted and the first cryptographic Hash is calculated.
S206 obtains the second cryptographic Hash of application program, and the second cryptographic Hash is identical as the data type of the first cryptographic Hash, than Compared with the first cryptographic Hash and the second cryptographic Hash.
Wherein, the second cryptographic Hash be the application program downloaded in terminal installation kit in be encrypted after signing messages, Second cryptographic Hash is calculated in the server, and downloads to terminal with the installation kit of application program, second Hash Value is used for and the first cryptographic Hash is compared, and judges whether the installation kit of this application program is changed, and data type should be with First cryptographic Hash is consistent, and when the first cryptographic Hash is md5 values, the second cryptographic Hash is also md5 values, i.e., calculates second in the server The algorithm of cryptographic Hash needs identical as the algorithm for calculating the first cryptographic Hash in the terminal.
Specifically, by the installation for the application program downloaded in the first cryptographic Hash and terminal that are calculated in step S204 The second obtained cryptographic Hash after signing messages is encrypted in packet compares, and the signing messages verification of application program is carried out, when the When one cryptographic Hash is identical as the second cryptographic Hash, then prove that the content in the installation kit of application program is not repaiied after being packaged Change, then the signing messages of this application program is verified.
S208, it is when the first cryptographic Hash is identical as the second cryptographic Hash, then corresponding to application program according to the second preset algorithm Encrypted compiling packet is decrypted.
Wherein, the second preset algorithm is for calculating the decryption that corresponding encrypted compiling packet is decrypted in application program Method;Second preset algorithm is corresponding with the Encryption Algorithm that the partial document in application program installation kit is encrypted in server; The operation that the installation kit of application program is encrypted and decrypted in symmetric key may be used in the two.
Compiling packet is the dynamic link library file of application program, as (so is shared to the .so files in Android system The abbreviation of object, and so library files indicate the dynamic base of client layer).
Specifically, server is when being packaged application program, to prevent application program to be tampered in transmission process Or attack, the key file in application program installation kit can be encrypted;The installation kit of terminal downloads application program it Afterwards, if desired this application program is installed, needed to this application after the encryption file decryption in application program installation kit, could be run Program.
S210 installs application program according to the compiling packet after decryption.
Specifically, when terminal according to the second preset algorithm to encrypted compiling packet successful decryption in application program after, eventually End can start the normal mounting of application program.
Above application program installation method, terminal install application program when, priori state application program encryption compiling packet Signing messages, then to application program encryption compiling packet be decrypted after, just permission this application program is installed in terminal.It is logical The verification for crossing signing messages, prevents application program to be tampered in a pre-installation, and the compiling packet of application program is encrypted, and is pacifying When filling application program, only to encrypted compiling packet successful decryption, application program can be allowed to be installed in the behaviour in terminal Make, avoids the key message of application program from being changed, by two kinds of cipher modes, improve applications security.
In one embodiment, Fig. 3 is referred to, the step S208 in above application program installation method is default according to second Algorithm encrypted compiling packet corresponding to application program is decrypted, and may include:
S302 obtains the storage address of the corresponding encrypted compiling packet of application program.
Specifically, the process that encrypted compiling packet is decrypted is corresponded to application program according to the second preset algorithm in terminal In, terminal first needs to search out storage address of the installation kit in terminal of the application program of download, then in this storage address The storage address of encrypted compiling packet is found, the operation that encrypted compiling packet could be decrypted.
S304, the header file of encrypted compiling packet is read according to storage address, and encrypted compiling is extracted from header file The storage information of encryption data in packet.
Wherein, the header file for compiling packet is the storage location and storage mode for recording each function in compiling packet Catalogue file, as (Executable and Linking Format are one to the header file ELF in .so library files in Android system The format of kind obj ect file) etc..
Encryption data is the related data by Encryption Algorithm processing in encrypted compiling packet, as handled in .so library files Terminal and network or the function of other equipment interaction data.
Storage information is look for the information of the storage location of encryption data in the terminal in compiling packet;Such as encryption data When to compile the partial function in wrapping, then it can be position offset and function of the encrypted function in compiling is wrapped to store information The information such as name.
Specifically, it after terminal obtains the storage address that encrypted compiling is wrapped, needs to find encryption number in this storage address It is decrypted, which could be added according to corresponding part, and to the encryption data in the compiling packet of server for encrypting Ciphertext data is decrypted.The method of the address of searching encryption data can be in storage address:First in encrypted compiling packet The header file that compiling packet is found in storage address stores the inclined of the function name and storage location of function in compiling packet in header file Shifting amount etc. stores information, then extracts the storage information of encryption data in the encrypted compiling packet in header file.
S306 obtains encryption data according to storage information and storage address.
Wherein, encryption data be server be used for protect compiling packet in data be not tampered in message transmitting procedure and It is encrypted the data after operation;Encryption data is mainly the partial function compiled in packet, and such as a certain application program is main For online payment, then server can be to needing to call payment data interactive module in the encryption compiling packet of this application program Function is encrypted.
Specifically, terminal finds encryption data according to the storage information extracted in step S304 in storage address, then Execute the operation of next step.
S308 is decrypted encryption data by the second preset algorithm.
Specifically, server is when being packaged this application program, for the volume of the reinforcement application program in transmission process Packet is translated, according to certain encryption rule, i.e. partial data is encrypted in the second preset algorithm, generates encryption function;Terminal from After server downloads the installation kit of this application program, in being wrapped to compiling according to decryption corresponding with the encryption rule of server rule Encryption data be decrypted.
In above-described embodiment, the operation that the partial data in the compiling packet of application program is encrypted by server, It prevents compiling packet from being changed in message transmitting procedure, strengthens stability of the application program in transmission process so that installation Application program in terminal is safer.
In one embodiment, the step S210 in above application program installation method is installed according to the compiling packet after decryption After application program, may include:When application program is run, then the preset function in mounted compiling packet is obtained;Record The input time of the input data of preset function, and obtain the output time of the response data of preset function;Calculate input time With the difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
Wherein, preset function is that the function of debugging mode whether is in for monitoring application program;Preset function can be Preset function can be time () function or clock () function etc..
Specifically, the time difference in lower section of code of normal condition between the time and request time of the return value of function compared with It is small, it is possible to can to reflect that the inlet setting timing of the function of running state of programs is detected in part.When returning for this function When time difference between the response time (above-mentioned output time) and request time (above-mentioned input time) of returning value is larger, using journey Sequence may be tampered, have tampered with either application program be in the debugging stage so as to cause the calculating mistake of function or Delay, such as function only need to call a parameter originally, and after being tampered, in order to obtain multiple parameters, then allocating time is elongated, Difference so as to cause input time and output time becomes larger or application program is in debugging stage, artificial returning response number According to the difference so as to cause input time and output time becomes larger.The entrance of terminal monitoring Key Functions, and calculate in crucial letter The time difference of the corresponding return value of number inlet request data;When the time difference being more than preset value, abnormal data is returned;Into One step, it is larger when the time difference between the time and request time of the return value of Key Functions, for example reach a second rank, then may be used To regard as being to carry out debugging routine, terminal returns to the information of application program operation exception, reminds user's current application program There may be debugged risk, user can be according to this application program of the information deletion of this application program operation exception or scanning Antivirus.
In above-described embodiment, by monitoring the time difference of the corresponding return value of preset function inlet request data, It prevents from being tampered in application program operational process, passes through the application journey in anti-debugging step and above-described embodiment in this embodiment Sequence installation method can be effectively protected the safety that application program is run in terminal.
In one embodiment, the step S206 in above application program installation method, compares the first cryptographic Hash and second After cryptographic Hash, can also include:When the first cryptographic Hash is different from the second cryptographic Hash, then stop that application program is installed.
Specifically, when the first cryptographic Hash and the second cryptographic Hash difference, then the content in the installation kit of application program is in quilt It may be changed after packing or the installation kit of this application program may be by secondary packing, then the signing messages of application program is tested The logical failure of card, exits the erection schedule of application program.
Optionally, after the logical failure of signing messages verification of application program, terminal can export the mistake of an authentication failed Information, to just in this application program install failure of the user reminding of operating terminal, it may be possible to due to the installation kit of this application program It is changed, dangerous information, prompts user that can re-download the installation kit of this application program.
In above-described embodiment, when by signing messages authentication failed, the erection schedule of this application program is exited, prevents from answering With program be tampered or secondary packing after, time application program is installed still in terminal, improves and application program is installed in terminal Safety.
In one embodiment, the step S208 in above application program installation method is corresponded to according to the second preset algorithm After being decrypted with the corresponding encrypted compiling packet of program, can also include:When wrapping decryption failure to encrypted compiling, stop Application program is installed.
Specifically, when the encrypted compiling packet decryption failure of terminal-pair, terminal can not run the content in compiling packet, to This application program can not be installed in terminal, terminal stops installing the process of this application program.
Optionally, after terminal stops installation application program, the information of an install failure is exported, reminds user because can not be right The install failure of application program is decrypted and caused to encrypted compiling packet.User can not decrypt encrypted according to this information investigation The reason of compiling packet, such as terminal do not decrypt corresponding key.
In above-described embodiment, when terminal can not decrypt compiling packet, the erection schedule of application program is exited, is prevented in terminal When can not decrypt compiling packet, the application program of installation can not normal use, cause wrong installation.
In one embodiment, using the terminal of Android system after the installation kit for downloading application program, output notice disappears Breath prompts the user whether to start to install this application program, after the installation instruction for receiving user, starts to install this application in terminal Program, first use JNI_onLoad methods (it is a kind of based in JNI call methods hereinafter, got in program by java Foregoing information method) in obtain APK (Android installation kits) signing messages, obtain signature need by reflect call Java (a kind of compiler language) interface that Android frame provides, the signing messages of acquisition pass through the first preset algorithm calculate the signature again The md5 values (one 128 condition codes that prime information obtain after mathematic(al) manipulation according to md5 algorithms) of information, with packing The md5 values of signing messages used are compared, if identical, application program can register JNI methods (Java Native A kind of Java programming interface of Interface, a part for JAVA platforms allow the code that Java code and other language are write to carry out Interaction), execute the operation of next step;Otherwise JNI methods are not registered, and such application program, which just exits, this time to be installed, and reminds use Family install failure.Wherein, lower layer's journey that the upper layer frame tune mainly write using java in Android system is shown a C language Sequence, when JNI methods can not be registered, then this application program can not use.
After application program can register JNI methods, application program execute by default decryption rule in so files The step of encrypted operation function is decrypted, concrete operations are:Find the initial address of so files in memory;Pass through so texts Part head gets Phdr fields;(program header element is directed toward in so file headers from Phdr Field Inquiry to PT_DYNAMIC .dynamic field saves the required essential information of dynamic linker in dynamic fields, is a structural array, can To regard as " file header " of ELF files under dynamic link) after, obtain the p_vaddr fields and p_filesz in PT_DYNAMIC Field (information such as offset and size of function);File type is obtained further according to p_vaddr fields and p_filesz fields, after It is continuous that the deviant and size of Dynamic fields are obtained according to file type, in the .so library files of application program installation kit Corresponding encryption function is inquired, all encryption functions are all subjected to corresponding decryption oprerations according to the second preset algorithm, from And .so library files are decrypted and are completed, this application program is installed further according to the .so library files after decryption;When terminal executes above-mentioned solution When close operation failure, then the erection schedule of this application program is exited, and sent a notification message, reminds user since peace can not be decrypted Dress packet, to the install failure of this application program.
This application program is installed in terminal, and after being run to it, adds in the entrance of the Key Functions of this application program One timing function time (), the time difference between the time and request time that count the return value of Key Functions, when this timing When the time difference of the acquisition of function is larger, then the information of application program operation exception is exported, reminds user application may be just It is being tampered, user is needed to investigate this situation.
In above-described embodiment, when installing application program in Android system terminal, pass through the signing messages to application program The anti-debugging monitoring of verification, the encryption of .so library files with corresponding decryption oprerations and to application program, ensure that application program can With the healthily installation and operation in terminal.
In addition, in above-described embodiment, executed through default decryption rule to encrypted in .so files with application program The step of operation function is decrypted is corresponding, and server needs before the installation kit for sending this application program to .so files In respective function operation is encrypted, detailed step is as follows:
By ELF file format solution so files;Resolution file head first obtains e_phoff fields, e_phentsize fields With the information of the fields such as e_phnum fields (position of representation program head table and quantity);According in the structure on program head P_type fields (file type) obtain the deviant and size of Dynamic fields;Traversal Dynamic fields find dynsym words Section (field for preventing function name), dynstr fields (field for being loaded with character string information), hash section fields The size of offset and .dynstr in (Hash table in ELF);According to the method name of function, the first corresponding Hash is calculated Value, according to the first cryptographic Hash, finds the caching of subscript hash%nbuckets (Hash hash);According to the value in caching, read The Elf32_Sym symbols (a kind of information type in ELF) of manipulative indexing in dynsym fields;From Elf32_Sym symbols St_name indexes (field name) find the corresponding character string in .dynstr fields, by the character string and function name found into Row compares.If differing, the Hash of method operation (is executed using the chain type in Java according to chain [hash%nbuckets] Hash) next Elf32_Sym symbols are looked for, until finding or this executes chain termination.Basis is pre- after finding respective function If encryption rule be encrypted.
Above-described embodiment describes after downloading application program installation kit in the terminal of Android system, first verifies the label of APK Name information, then decrypts the encryption data in .so library files, application program could be installed in terminal, and pass through timing letter Number time () prevents program to be tampered after mounting, by the above method, improves and installs application in the terminal of Android system The safety of program.
It should be understood that although each step in the flow chart of Fig. 2 to Fig. 3 is shown successively according to the instruction of arrow, But these steps are not the inevitable sequence indicated according to arrow to be executed successively.Unless expressly state otherwise herein, these There is no stringent sequences to limit for the execution of step, these steps can execute in other order.Moreover, in Fig. 2 to Fig. 3 At least part step may include that either these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps One moment executed completion, but can execute at different times, and the execution in these sub-steps or stage sequence is also not necessarily Be carry out successively, but can with other steps either the sub-step of other steps or at least part in stage in turn or Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of application program mounting device, including:Starting module 100, Encrypted signature module 200 and authentication module 300, deciphering module 400 and installation module 500, wherein:
Starting module 100, for when the installation instruction for receiving application program, obtaining the signing messages of application program.
Encrypted signature module 200, for according to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information.
Authentication module 300, the second cryptographic Hash for obtaining application program, the data of the second cryptographic Hash and the first cryptographic Hash Type is identical, compares the first cryptographic Hash and the second cryptographic Hash;
Deciphering module 400, it is identical as the second cryptographic Hash for working as the first cryptographic Hash, then according to the second preset algorithm to application The corresponding encrypted compiling packet of program is decrypted.
Module 500 is installed, for installing application program according to the compiling packet after decryption.
In one embodiment, the deciphering module 400 in above application program mounting device may include:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of application program.
Extraction unit, the header file for reading encrypted compiling packet according to storage address, and extraction adds from header file The storage information of encryption data in close compiling packet.
Reading unit, for obtaining encryption data according to storage information and storage address.
Decryption unit is decrypted encryption data for passing through the second preset algorithm.
In one embodiment, can also include in above application program mounting device:
Preset function acquisition module, for when application program is run, then obtaining the default letter in mounted compiling packet Number.
Timing module, the input time of the input data for recording preset function, and obtain the respective counts of preset function According to output time;Calculate the difference of input time and output time.
Abnormal monitoring module, for when difference is more than preset value, then returning to the information of application program operation exception.
In one embodiment, above application program mounting device can also include:
First stopping modular, for when the first cryptographic Hash is with the second cryptographic Hash difference, then stopping installing application program.
In one embodiment, above application program mounting device can also include:
Second stopping modular, for when decryption failure is wrapped in encrypted compiling, stopping installation application program.
Specific about application program mounting device limits the limit that may refer to above for application program installation method Fixed, details are not described herein.Modules in above application program mounting device can fully or partially through software, hardware and its It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 5.The computer equipment includes the processor connected by system bus, memory, network interface, display Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with Realize a kind of application program installation method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 5, is only tied with the relevant part of application scheme The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor realize following steps when executing computer program:When the installation instruction for receiving application program, obtain Take the signing messages of application program;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;It obtains and applies journey Second cryptographic Hash of sequence, the second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second Hash Value;When the first cryptographic Hash is identical as the second cryptographic Hash, then according to the encrypted compiling corresponding to application program of the second preset algorithm Packet is decrypted;Application program is installed according to the compiling packet after decryption.
In one embodiment, processor execute computer program when realize according to the second preset algorithm to application program Corresponding encrypted compiling packet is decrypted, and may include:Obtain the storage address of the corresponding encrypted compiling packet of application program; Read the header file of encrypted compiling packet according to storage address, and from extracting encryption data in encrypted compiling packet in header file Store information;Encryption data is obtained according to storage information and storage address;Encryption data is carried out by the second preset algorithm Decryption.
In one embodiment, that is realized when processor execution computer program installs application according to the compiling packet after decryption After program, can also include:When application program is run, then the preset function in mounted compiling packet is obtained;Record is pre- If the input time of the input data of function, and obtain the output time of the response data of preset function;Calculate input time with The difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
In one embodiment, processor executes the first cryptographic Hash of comparison and the second cryptographic Hash realized when computer program Later, can also include:When the first cryptographic Hash and the second cryptographic Hash difference, then stop that application program is installed.
In one embodiment, processor execute computer program when realize according to the second preset algorithm to application program pair After the encrypted compiling packet answered is decrypted, can also include:When decryption failure is wrapped in encrypted compiling, stop installation application Program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:When the installation instruction for receiving application program, the label of application program are obtained Name information;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;The second cryptographic Hash of application program is obtained, Second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second cryptographic Hash;When the first cryptographic Hash It is identical as the second cryptographic Hash, then it is decrypted according to the second preset algorithm encrypted compiling packet corresponding to application program;According to Compiling packet after decryption installs application program.
In one embodiment, realized when computer program is executed by processor according to the second preset algorithm to applying journey The corresponding encrypted compiling packet of sequence is decrypted, and may include:Obtain the storage of the corresponding encrypted compiling packet of application program Location;The header file of encrypted compiling packet is read according to storage address, and encrypts number from being extracted in header file in encrypted compiling packet According to storage information;Encryption data is obtained according to storage information and storage address;By the second preset algorithm to encryption data It is decrypted.
In one embodiment, that is realized when computer program is executed by processor answers according to the compiling packet installation after decryption After program, can also include:When application program is run, then the preset function in mounted compiling packet is obtained;Record The input time of the input data of preset function, and obtain the output time of the response data of preset function;Calculate input time With the difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
In one embodiment, the first cryptographic Hash of comparison realized when computer program is executed by processor and the second Hash After value, can also include:When the first cryptographic Hash and the second cryptographic Hash difference, then stop that application program is installed.
In one embodiment, realized when computer program is executed by processor according to the second preset algorithm to application program After corresponding encrypted compiling packet is decrypted, can also include:When decryption failure is wrapped in encrypted compiling, stops installation and answer Use program.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Instruct relevant hardware to complete by computer program, computer program can be stored in a non-volatile computer readable It takes in storage medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, this Shen Any reference to memory, storage, database or other media used in each embodiment please provided, may each comprise Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield is all considered to be the range of this specification record.
Above example only expresses the several embodiments of the application, the description thereof is more specific and detailed, but can not Therefore it is construed as limiting the scope of the patent.It should be pointed out that for those of ordinary skill in the art, Under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection domain of the application. Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of application program installation method, the method includes:
When the installation instruction for receiving application program, the signing messages of the application program is obtained;
Corresponding first cryptographic Hash of the signing messages is calculated according to the first preset algorithm;
Obtain the second cryptographic Hash of the application program, the data type phase of second cryptographic Hash and first cryptographic Hash Together, first cryptographic Hash and second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, then the application program is corresponded to according to the second preset algorithm Encrypted compiling packet be decrypted;
The application program is installed according to the compiling packet after decryption.
2. according to the method described in claim 1, it is characterized in that, it is described according to the second preset algorithm to the application program pair The encrypted compiling packet answered is decrypted, including:
Obtain the storage address of the corresponding encrypted compiling packet of the application program;
The header file of the encrypted compiling packet is read according to the storage address, and the encryption is extracted from the header file Compiling packet in encryption data storage information;
The encryption data is obtained according to the storage information and the storage address;
The encryption data is decrypted by second preset algorithm.
3. method according to claim 1 or 2, which is characterized in that answered described in the compiling packet installation according to after decryption After program, further include:
When the application program is run, then the preset function in mounted compiling packet is obtained;
When recording the input time of the input data of the preset function, and obtaining the output of response data of the preset function Between;
Calculate the difference of the input time and the output time;
When the difference is more than preset value, then the information of the application program operation exception is returned.
4. according to the method described in claim 1, it is characterized in that, first cryptographic Hash and second Hash After value, further include:
When first cryptographic Hash and the second cryptographic Hash difference, then stop that the application program is installed.
5. according to the method described in claim 1, it is characterized in that, it is described according to the second preset algorithm to the application program pair After the encrypted compiling packet answered is decrypted, further include:
When to the encrypted compiling packet decryption failure, stop that the application program is installed.
6. a kind of application program encryption device, which is characterized in that described device includes:
Starting module, for when the installation instruction for receiving application program, obtaining the encrypted compiling packet of the application program Signing messages;
Encrypted signature module, for calculating corresponding first cryptographic Hash of the signing messages according to the first preset algorithm;
Authentication module, the second cryptographic Hash for obtaining the application program, second cryptographic Hash and first cryptographic Hash Data type it is identical, first cryptographic Hash and second cryptographic Hash;
Deciphering module, it is identical as second cryptographic Hash for working as first cryptographic Hash, then according to the second preset algorithm to institute The corresponding encrypted compiling packet of application program is stated to be decrypted;
Module is installed, for installing the application program according to the compiling packet after decryption.
7. device according to claim 6, which is characterized in that the deciphering module includes:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of the application program;
Extraction unit, the header file for reading the encrypted compiling packet according to the storage address, and from the header file The storage information of encryption data in the middle extraction encrypted compiling packet;
Reading unit, for obtaining the encryption data according to the storage information and the storage address;
Decryption unit, for the corresponding encryption data of the application program to be decrypted by second preset algorithm.
8. the device described according to claim 6 or 7, which is characterized in that described device further includes:
Preset function acquisition module, for when the application program is run, then obtaining the default letter in mounted compiling packet Number;
Timing module, the input time of the input data for recording the preset function, and obtain the phase of the preset function Answer the output time of data;Calculate the difference of the input time and the output time;
Abnormal monitoring module, for when the difference is more than preset value, then returning to the information of the application program operation exception.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In when the processor executes the computer program the step of any one of realization claim 1 to 5 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claim 1 to 5 is realized when being executed by processor.
CN201810199683.6A 2018-03-12 2018-03-12 Application program installation method, device, computer equipment and storage medium Pending CN108363580A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810199683.6A CN108363580A (en) 2018-03-12 2018-03-12 Application program installation method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810199683.6A CN108363580A (en) 2018-03-12 2018-03-12 Application program installation method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108363580A true CN108363580A (en) 2018-08-03

Family

ID=63004050

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810199683.6A Pending CN108363580A (en) 2018-03-12 2018-03-12 Application program installation method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108363580A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109240713A (en) * 2018-08-27 2019-01-18 郑州云海信息技术有限公司 Drive the encryption method of installation procedure, the installation method and device of driver
CN109408074A (en) * 2018-09-26 2019-03-01 平安普惠企业管理有限公司 Installation method, device, computer equipment and the storage medium of application program
CN109413200A (en) * 2018-11-26 2019-03-01 Oppo(重庆)智能科技有限公司 A kind of method, client, MES and electronic equipment that resource imports
CN109460236A (en) * 2018-10-19 2019-03-12 中国银行股份有限公司 Program version building and inspection method and system
CN109688158A (en) * 2019-01-23 2019-04-26 平安科技(深圳)有限公司 Finance executes chain authentication method, electronic device and storage medium
CN109756340A (en) * 2018-12-03 2019-05-14 深圳市新国都支付技术有限公司 A kind of number sign test method, apparatus and storage medium
CN109918870A (en) * 2019-02-22 2019-06-21 武汉大学 Program code based on Beidou subnanosecond grade high-precision time service executes Time delay measurement device and method
CN109918948A (en) * 2019-01-23 2019-06-21 西安邮电大学 APK integrity checking method, computer program based on national secret algorithm SM3
CN110502268A (en) * 2019-08-29 2019-11-26 恩亿科(北京)数据科技有限公司 Application program update method, apparatus, server and storage medium
CN110764782A (en) * 2019-10-31 2020-02-07 贵阳动视云科技有限公司 Software protection method and device
CN110955450A (en) * 2019-12-16 2020-04-03 北京智游网安科技有限公司 Application package file attribution statistical method, system and storage medium
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
CN112434322A (en) * 2020-12-03 2021-03-02 深圳市欢太科技有限公司 Data encryption method and device, computer equipment and computer readable storage medium
CN112596784A (en) * 2020-12-28 2021-04-02 青岛海尔科技有限公司 Iterative version deployment method and device
CN113132421A (en) * 2019-12-30 2021-07-16 Oppo广东移动通信有限公司 File detection method, device, terminal and storage medium
CN114218534A (en) * 2021-12-14 2022-03-22 平安国际智慧城市科技股份有限公司 Off-line package checking method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
CN1755648A (en) * 2004-09-30 2006-04-05 微软公司 Method, system, and apparatus for identifying unresponsive portions of a computer program
CN101320416A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Method and system for detecting debugging mode of software
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN104298915A (en) * 2014-10-16 2015-01-21 厦门美图之家科技有限公司 Installation package tampering preventing method
EP2988470A1 (en) * 2014-08-22 2016-02-24 Apple Inc. Automatic purposed-application creation
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution
CN107241688A (en) * 2017-06-14 2017-10-10 北京小米移动软件有限公司 Signature, verification method, device and the storage medium of application installation package

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
CN1755648A (en) * 2004-09-30 2006-04-05 微软公司 Method, system, and apparatus for identifying unresponsive portions of a computer program
CN101320416A (en) * 2008-05-20 2008-12-10 北京深思洛克数据保护中心 Method and system for detecting debugging mode of software
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
EP2988470A1 (en) * 2014-08-22 2016-02-24 Apple Inc. Automatic purposed-application creation
CN104298915A (en) * 2014-10-16 2015-01-21 厦门美图之家科技有限公司 Installation package tampering preventing method
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution
CN107241688A (en) * 2017-06-14 2017-10-10 北京小米移动软件有限公司 Signature, verification method, device and the storage medium of application installation package

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
巫志文,李炜: "基于Android平台的软件加固方案的设计与实现", 《电信工程技术与标准化》 *
韩子诺,刘嘉勇: "基于Android平台的SO加固技术研究", 《现代计算机》 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109240713A (en) * 2018-08-27 2019-01-18 郑州云海信息技术有限公司 Drive the encryption method of installation procedure, the installation method and device of driver
CN109408074A (en) * 2018-09-26 2019-03-01 平安普惠企业管理有限公司 Installation method, device, computer equipment and the storage medium of application program
CN109460236A (en) * 2018-10-19 2019-03-12 中国银行股份有限公司 Program version building and inspection method and system
CN109460236B (en) * 2018-10-19 2021-12-07 中国银行股份有限公司 Program version construction and checking method and system
CN109413200B (en) * 2018-11-26 2021-04-23 Oppo(重庆)智能科技有限公司 Resource import method, client, MES and electronic equipment
CN109413200A (en) * 2018-11-26 2019-03-01 Oppo(重庆)智能科技有限公司 A kind of method, client, MES and electronic equipment that resource imports
CN109756340A (en) * 2018-12-03 2019-05-14 深圳市新国都支付技术有限公司 A kind of number sign test method, apparatus and storage medium
CN109688158A (en) * 2019-01-23 2019-04-26 平安科技(深圳)有限公司 Finance executes chain authentication method, electronic device and storage medium
CN109918948A (en) * 2019-01-23 2019-06-21 西安邮电大学 APK integrity checking method, computer program based on national secret algorithm SM3
CN109688158B (en) * 2019-01-23 2022-07-08 平安科技(深圳)有限公司 Financial execution chain authentication method, electronic device and storage medium
CN109918870A (en) * 2019-02-22 2019-06-21 武汉大学 Program code based on Beidou subnanosecond grade high-precision time service executes Time delay measurement device and method
CN110502268A (en) * 2019-08-29 2019-11-26 恩亿科(北京)数据科技有限公司 Application program update method, apparatus, server and storage medium
CN110764782A (en) * 2019-10-31 2020-02-07 贵阳动视云科技有限公司 Software protection method and device
CN110955450B (en) * 2019-12-16 2023-09-29 北京智游网安科技有限公司 Attribution statistical method, system and storage medium of application package file
CN110955450A (en) * 2019-12-16 2020-04-03 北京智游网安科技有限公司 Application package file attribution statistical method, system and storage medium
CN113132421A (en) * 2019-12-30 2021-07-16 Oppo广东移动通信有限公司 File detection method, device, terminal and storage medium
CN113132421B (en) * 2019-12-30 2022-11-04 Oppo广东移动通信有限公司 File detection method, device, terminal and storage medium
CN112003704A (en) * 2020-07-31 2020-11-27 中科扶云(杭州)科技有限公司 Electronic evidence processing method and device and computer equipment
CN112434322A (en) * 2020-12-03 2021-03-02 深圳市欢太科技有限公司 Data encryption method and device, computer equipment and computer readable storage medium
CN112434322B (en) * 2020-12-03 2024-05-07 深圳市欢太科技有限公司 Data encryption method, device, computer equipment and computer readable storage medium
CN112596784A (en) * 2020-12-28 2021-04-02 青岛海尔科技有限公司 Iterative version deployment method and device
CN112596784B (en) * 2020-12-28 2023-11-28 青岛海尔科技有限公司 Iterative version deployment method and device
CN114218534A (en) * 2021-12-14 2022-03-22 平安国际智慧城市科技股份有限公司 Off-line package checking method, device, equipment and storage medium
CN114218534B (en) * 2021-12-14 2024-07-09 平安国际智慧城市科技股份有限公司 Method, device, equipment and storage medium for checking offline package

Similar Documents

Publication Publication Date Title
CN108363580A (en) Application program installation method, device, computer equipment and storage medium
EP3387813B1 (en) Mobile device having trusted execution environment
CN108810894B (en) Terminal authorization method, device, computer equipment and storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110968844B (en) Software authorization method in off-line state, server and readable storage medium
CN110278115B (en) Hot update method and device
US9054865B2 (en) Cryptographic system and methodology for securing software cryptography
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
US20150095653A1 (en) Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package
US10148440B2 (en) Binary code authentication
CN111159658B (en) Byte code processing method, system, device, computer equipment and storage medium
CN111404682A (en) Android environment key segmentation processing method and device
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN116662941B (en) Information encryption method, device, computer equipment and storage medium
CN109240723B (en) Application program updating method, system, computer device and storage medium
CN114896621B (en) Application service acquisition method, encryption method, device and computer equipment
CN110147655A (en) The security protection system and method for application program
CN109829285A (en) A kind of digital signature method, device, equipment and storage medium
US11061998B2 (en) Apparatus and method for providing security and apparatus and method for executing security to protect code of shared object
CN114297679B (en) Method for encrypted transmission and upgrading of mirror image
CN114928551B (en) System configuration method, device and storage medium
CN113760294A (en) Application software encryption deployment method and system
Rawat et al. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing
CN109558743A (en) Data guard method, device, computer equipment and the storage medium of mobile terminal
CN117874721A (en) JAR package decompilation prevention method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180803