CN108363580A - Application program installation method, device, computer equipment and storage medium - Google Patents
Application program installation method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108363580A CN108363580A CN201810199683.6A CN201810199683A CN108363580A CN 108363580 A CN108363580 A CN 108363580A CN 201810199683 A CN201810199683 A CN 201810199683A CN 108363580 A CN108363580 A CN 108363580A
- Authority
- CN
- China
- Prior art keywords
- application program
- cryptographic hash
- encrypted
- compiling packet
- compiling
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of application program installation method, device, computer equipment and storage mediums.The method includes:When the installation instruction for receiving application program, the signing messages of application program is obtained;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;The second cryptographic Hash of application program is obtained, the second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second cryptographic Hash;When the first cryptographic Hash is identical as the second cryptographic Hash, then it is decrypted according to the second preset algorithm encrypted compiling packet corresponding to application program;Application program is installed according to the compiling packet after decryption.The key message of application program can be avoided to be changed using this method, improve applications security.
Description
Technical field
This application involves field of computer technology, are set more particularly to a kind of application program installation method, device, computer
Standby and storage medium.
Background technology
With the development of modern network technology, the terminals such as mobile phone, computer have played in we live increasingly heavier
The effect wanted, the thing followed are extensive exploitation and the use of application program.
When application program is installed to terminal, the attack being subjected to also gradually is increasing, therefore the peace of application program installation
Full sex chromosome mosaicism starts to attract attention.The installation method of legacy application is mainly by increasing password authentification or to applying journey
The file of sequence increases modification to increase the difficulty of attack, but the installation method of these application programs is easier to be cracked, in terminal
On use application program still there are many security risks.
Invention content
Based on this, it is necessary in view of the above technical problems, provide a kind of application journey that can improve applications security
Sequence installation method, device, computer equipment and storage medium.
A kind of application program installation method, the method includes:
When the installation instruction for receiving application program, the signing messages of the application program is obtained;
Corresponding first cryptographic Hash of the signing messages is calculated according to the first preset algorithm;
Obtain the second cryptographic Hash of the application program, the data type of second cryptographic Hash and first cryptographic Hash
It is identical, first cryptographic Hash and second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, then according to the second preset algorithm to the application program
Corresponding encrypted compiling packet is decrypted;
The application program is installed according to the compiling packet after decryption.
In one embodiment, it is described according to the second preset algorithm it is corresponding to the application program it is encrypted compiling wrap into
Row decryption, including:
Obtain the storage address of the corresponding encrypted compiling packet of the application program;
The header file of the encrypted compiling packet is read according to the storage address, and from the header file described in extraction
The storage information of encryption data in encrypted compiling packet;
The encryption data is obtained according to the storage information and the storage address;
The encryption data is decrypted by second preset algorithm.
In one embodiment, after the compiling packet according to after decryption installs the application program, further include:
When the application program is run, then the preset function in mounted compiling packet is obtained;
Record the input time of the input data of the preset function, and obtain the preset function response data it is defeated
Go out the time;
Calculate the difference of the input time and the output time;
When the difference is more than preset value, then the information of the application program operation exception is returned.
In one embodiment, first cryptographic Hash further includes with after second cryptographic Hash:
When first cryptographic Hash and the second cryptographic Hash difference, then stop that the application program is installed.
In one embodiment, it is described according to the second preset algorithm it is corresponding to the application program it is encrypted compiling wrap into
After row decryption, further include:
When to the encrypted compiling packet decryption failure, stop that the application program is installed.
A kind of application program encryption device, described device include:
Starting module, for when the installation instruction for receiving application program, obtaining the encrypted compiling of the application program
The signing messages of packet;
Encrypted signature module, for calculating corresponding first cryptographic Hash of the signing messages according to the first preset algorithm;
Authentication module, the second cryptographic Hash for obtaining the application program, second cryptographic Hash are breathed out with described first
The data type of uncommon value is identical, first cryptographic Hash and second cryptographic Hash;
Deciphering module, it is identical as second cryptographic Hash for working as first cryptographic Hash, then according to the second preset algorithm
Encrypted compiling packet is corresponded to the application program to be decrypted;
Module is installed, for installing the application program according to the compiling packet after decryption.
In one embodiment, the deciphering module, including:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of the application program;
Extraction unit, the header file for reading the encrypted compiling packet according to the storage address, and from the head
The storage information of encryption data in the encrypted compiling packet is extracted in file;
Reading unit, for obtaining the encryption data according to the storage information and the storage address;
Decryption unit, for the encryption data to be decrypted by second preset algorithm.
In one embodiment, described device further includes:
Preset function acquisition module, it is pre- in mounted compiling packet for when the application program is run, then getting
If function;
Timing module, the input time of the input data for recording the preset function, and obtain the preset function
Corresponding data output time;Calculate the difference of the input time and the output time;
Abnormal monitoring module, for when the difference is more than preset value, then returning to the application program operation exception
Information.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of method described in any one of the above embodiments is realized when row.
Above application program installation method, device, computer equipment and storage medium, when terminal installs application program,
Priori states the signing messages of the encryption compiling packet of application program, then after the compiling packet of application program encryption is decrypted, just fair
This application program is installed in terminal perhaps.By the verification of signing messages, application program is prevented to be tampered in a pre-installation, and corresponded to
It is encrypted with the compiling packet of program, when the application is installed, only to encrypted compiling packet successful decryption, can be allowed
Application program is installed in the operation in terminal, and the key message of application program is avoided to be changed, and by two kinds of cipher modes, carries
High applications security.
Description of the drawings
Fig. 1 is the application scenario diagram of application program installation method in one embodiment;
Fig. 2 is the flow diagram of application program installation method in one embodiment;
Fig. 3 is the flow diagram of the step S208 in Fig. 2 in one embodiment;
Fig. 4 is the structure diagram of application program mounting device in one embodiment;
Fig. 5 is the internal structure chart of one embodiment Computer equipment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Application program installation method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, eventually
End is communicated by network with server.The installation kit that terminal obtains application program from server is installed, when terminal connects
After receiving the installation instruction that user starts to install this application program, the signing messages of this application program is first verified, then will be applied
Encrypted compiling packet is decrypted in program installation kit, after successful decryption, this application program is just allowed to be installed in terminal;
By this application program installation method, the safety of application program is improved.Wherein, terminal can be, but not limited to be various individuals
Computer, laptop, smart mobile phone, tablet computer and portable wearable device, server can use independent service
The server cluster of device either multiple servers composition is realized.
In one embodiment, as shown in Fig. 2, providing a kind of application program installation method, it is applied to Fig. 1 in this way
In terminal for illustrate, include the following steps:
S202 obtains the signing messages of application program when the installation instruction for receiving application program.
Wherein, installation instruction is the instruction for starting to install application program in terminal;When the peace of terminal downloads application program
After dress packet, it can send a notification message and prompt the user whether to start that this application program is installed, start to install if user confirms,
Terminal receives installation instruction input by user.
Signing messages is the verification information for preventing application program by secondary installing;It is packaged into installation kit in application program
Later, each file in installation kit is handled by signing messages, when file is replaced or is distorted, this A.L.S.
Breath can be changed, and ensure integrality of this installation kit in transmission process with this;Signing messages can pass through Keytool (Java
The management tool of data certificate) and the tools such as Jarsigner (Java sign and calibration tool) generate.
Specifically, it after terminal has downloaded the installation kit of application program from server or other websites, sends a notification message
It prompts the user whether to start to install this application program, user, which confirms, to be started to install, and after terminal receives installation instruction, obtains this application
The signing messages of program.
S204, according to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information.
Wherein, the first preset algorithm is the Encryption Algorithm for signing messages to be changed into the first cryptographic Hash;First is default
Algorithm can be Hash (Hash) method, such as md5 algorithms (Message Digest Algorithm Message Digest Algorithm 5)
Or SHA (Secure Hash Algorithm Secure Hash Algorithm) etc..Hash algorithm, that is, hash function is a kind of one-way cipher
System, only ciphering process, without decrypting process.
First cryptographic Hash is signing messages of the terminal according to application program when server is packaged, by the first pre- imputation
The secret value that method is encrypted;The md5 values of signing messages when such as application program is packaged.
Specifically, when the signing messages of terminal-pair application program is verified, due to the signature of application program installation kit
Information is encrypted frequently with hash algorithm, so terminal should first obtain signing messages when application program is packaged, then leads to
It crosses the first preset algorithm this signing messages is encrypted and the first cryptographic Hash is calculated.
S206 obtains the second cryptographic Hash of application program, and the second cryptographic Hash is identical as the data type of the first cryptographic Hash, than
Compared with the first cryptographic Hash and the second cryptographic Hash.
Wherein, the second cryptographic Hash be the application program downloaded in terminal installation kit in be encrypted after signing messages,
Second cryptographic Hash is calculated in the server, and downloads to terminal with the installation kit of application program, second Hash
Value is used for and the first cryptographic Hash is compared, and judges whether the installation kit of this application program is changed, and data type should be with
First cryptographic Hash is consistent, and when the first cryptographic Hash is md5 values, the second cryptographic Hash is also md5 values, i.e., calculates second in the server
The algorithm of cryptographic Hash needs identical as the algorithm for calculating the first cryptographic Hash in the terminal.
Specifically, by the installation for the application program downloaded in the first cryptographic Hash and terminal that are calculated in step S204
The second obtained cryptographic Hash after signing messages is encrypted in packet compares, and the signing messages verification of application program is carried out, when the
When one cryptographic Hash is identical as the second cryptographic Hash, then prove that the content in the installation kit of application program is not repaiied after being packaged
Change, then the signing messages of this application program is verified.
S208, it is when the first cryptographic Hash is identical as the second cryptographic Hash, then corresponding to application program according to the second preset algorithm
Encrypted compiling packet is decrypted.
Wherein, the second preset algorithm is for calculating the decryption that corresponding encrypted compiling packet is decrypted in application program
Method;Second preset algorithm is corresponding with the Encryption Algorithm that the partial document in application program installation kit is encrypted in server;
The operation that the installation kit of application program is encrypted and decrypted in symmetric key may be used in the two.
Compiling packet is the dynamic link library file of application program, as (so is shared to the .so files in Android system
The abbreviation of object, and so library files indicate the dynamic base of client layer).
Specifically, server is when being packaged application program, to prevent application program to be tampered in transmission process
Or attack, the key file in application program installation kit can be encrypted;The installation kit of terminal downloads application program it
Afterwards, if desired this application program is installed, needed to this application after the encryption file decryption in application program installation kit, could be run
Program.
S210 installs application program according to the compiling packet after decryption.
Specifically, when terminal according to the second preset algorithm to encrypted compiling packet successful decryption in application program after, eventually
End can start the normal mounting of application program.
Above application program installation method, terminal install application program when, priori state application program encryption compiling packet
Signing messages, then to application program encryption compiling packet be decrypted after, just permission this application program is installed in terminal.It is logical
The verification for crossing signing messages, prevents application program to be tampered in a pre-installation, and the compiling packet of application program is encrypted, and is pacifying
When filling application program, only to encrypted compiling packet successful decryption, application program can be allowed to be installed in the behaviour in terminal
Make, avoids the key message of application program from being changed, by two kinds of cipher modes, improve applications security.
In one embodiment, Fig. 3 is referred to, the step S208 in above application program installation method is default according to second
Algorithm encrypted compiling packet corresponding to application program is decrypted, and may include:
S302 obtains the storage address of the corresponding encrypted compiling packet of application program.
Specifically, the process that encrypted compiling packet is decrypted is corresponded to application program according to the second preset algorithm in terminal
In, terminal first needs to search out storage address of the installation kit in terminal of the application program of download, then in this storage address
The storage address of encrypted compiling packet is found, the operation that encrypted compiling packet could be decrypted.
S304, the header file of encrypted compiling packet is read according to storage address, and encrypted compiling is extracted from header file
The storage information of encryption data in packet.
Wherein, the header file for compiling packet is the storage location and storage mode for recording each function in compiling packet
Catalogue file, as (Executable and Linking Format are one to the header file ELF in .so library files in Android system
The format of kind obj ect file) etc..
Encryption data is the related data by Encryption Algorithm processing in encrypted compiling packet, as handled in .so library files
Terminal and network or the function of other equipment interaction data.
Storage information is look for the information of the storage location of encryption data in the terminal in compiling packet;Such as encryption data
When to compile the partial function in wrapping, then it can be position offset and function of the encrypted function in compiling is wrapped to store information
The information such as name.
Specifically, it after terminal obtains the storage address that encrypted compiling is wrapped, needs to find encryption number in this storage address
It is decrypted, which could be added according to corresponding part, and to the encryption data in the compiling packet of server for encrypting
Ciphertext data is decrypted.The method of the address of searching encryption data can be in storage address:First in encrypted compiling packet
The header file that compiling packet is found in storage address stores the inclined of the function name and storage location of function in compiling packet in header file
Shifting amount etc. stores information, then extracts the storage information of encryption data in the encrypted compiling packet in header file.
S306 obtains encryption data according to storage information and storage address.
Wherein, encryption data be server be used for protect compiling packet in data be not tampered in message transmitting procedure and
It is encrypted the data after operation;Encryption data is mainly the partial function compiled in packet, and such as a certain application program is main
For online payment, then server can be to needing to call payment data interactive module in the encryption compiling packet of this application program
Function is encrypted.
Specifically, terminal finds encryption data according to the storage information extracted in step S304 in storage address, then
Execute the operation of next step.
S308 is decrypted encryption data by the second preset algorithm.
Specifically, server is when being packaged this application program, for the volume of the reinforcement application program in transmission process
Packet is translated, according to certain encryption rule, i.e. partial data is encrypted in the second preset algorithm, generates encryption function;Terminal from
After server downloads the installation kit of this application program, in being wrapped to compiling according to decryption corresponding with the encryption rule of server rule
Encryption data be decrypted.
In above-described embodiment, the operation that the partial data in the compiling packet of application program is encrypted by server,
It prevents compiling packet from being changed in message transmitting procedure, strengthens stability of the application program in transmission process so that installation
Application program in terminal is safer.
In one embodiment, the step S210 in above application program installation method is installed according to the compiling packet after decryption
After application program, may include:When application program is run, then the preset function in mounted compiling packet is obtained;Record
The input time of the input data of preset function, and obtain the output time of the response data of preset function;Calculate input time
With the difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
Wherein, preset function is that the function of debugging mode whether is in for monitoring application program;Preset function can be
Preset function can be time () function or clock () function etc..
Specifically, the time difference in lower section of code of normal condition between the time and request time of the return value of function compared with
It is small, it is possible to can to reflect that the inlet setting timing of the function of running state of programs is detected in part.When returning for this function
When time difference between the response time (above-mentioned output time) and request time (above-mentioned input time) of returning value is larger, using journey
Sequence may be tampered, have tampered with either application program be in the debugging stage so as to cause the calculating mistake of function or
Delay, such as function only need to call a parameter originally, and after being tampered, in order to obtain multiple parameters, then allocating time is elongated,
Difference so as to cause input time and output time becomes larger or application program is in debugging stage, artificial returning response number
According to the difference so as to cause input time and output time becomes larger.The entrance of terminal monitoring Key Functions, and calculate in crucial letter
The time difference of the corresponding return value of number inlet request data;When the time difference being more than preset value, abnormal data is returned;Into
One step, it is larger when the time difference between the time and request time of the return value of Key Functions, for example reach a second rank, then may be used
To regard as being to carry out debugging routine, terminal returns to the information of application program operation exception, reminds user's current application program
There may be debugged risk, user can be according to this application program of the information deletion of this application program operation exception or scanning
Antivirus.
In above-described embodiment, by monitoring the time difference of the corresponding return value of preset function inlet request data,
It prevents from being tampered in application program operational process, passes through the application journey in anti-debugging step and above-described embodiment in this embodiment
Sequence installation method can be effectively protected the safety that application program is run in terminal.
In one embodiment, the step S206 in above application program installation method, compares the first cryptographic Hash and second
After cryptographic Hash, can also include:When the first cryptographic Hash is different from the second cryptographic Hash, then stop that application program is installed.
Specifically, when the first cryptographic Hash and the second cryptographic Hash difference, then the content in the installation kit of application program is in quilt
It may be changed after packing or the installation kit of this application program may be by secondary packing, then the signing messages of application program is tested
The logical failure of card, exits the erection schedule of application program.
Optionally, after the logical failure of signing messages verification of application program, terminal can export the mistake of an authentication failed
Information, to just in this application program install failure of the user reminding of operating terminal, it may be possible to due to the installation kit of this application program
It is changed, dangerous information, prompts user that can re-download the installation kit of this application program.
In above-described embodiment, when by signing messages authentication failed, the erection schedule of this application program is exited, prevents from answering
With program be tampered or secondary packing after, time application program is installed still in terminal, improves and application program is installed in terminal
Safety.
In one embodiment, the step S208 in above application program installation method is corresponded to according to the second preset algorithm
After being decrypted with the corresponding encrypted compiling packet of program, can also include:When wrapping decryption failure to encrypted compiling, stop
Application program is installed.
Specifically, when the encrypted compiling packet decryption failure of terminal-pair, terminal can not run the content in compiling packet, to
This application program can not be installed in terminal, terminal stops installing the process of this application program.
Optionally, after terminal stops installation application program, the information of an install failure is exported, reminds user because can not be right
The install failure of application program is decrypted and caused to encrypted compiling packet.User can not decrypt encrypted according to this information investigation
The reason of compiling packet, such as terminal do not decrypt corresponding key.
In above-described embodiment, when terminal can not decrypt compiling packet, the erection schedule of application program is exited, is prevented in terminal
When can not decrypt compiling packet, the application program of installation can not normal use, cause wrong installation.
In one embodiment, using the terminal of Android system after the installation kit for downloading application program, output notice disappears
Breath prompts the user whether to start to install this application program, after the installation instruction for receiving user, starts to install this application in terminal
Program, first use JNI_onLoad methods (it is a kind of based in JNI call methods hereinafter, got in program by java
Foregoing information method) in obtain APK (Android installation kits) signing messages, obtain signature need by reflect call
Java (a kind of compiler language) interface that Android frame provides, the signing messages of acquisition pass through the first preset algorithm calculate the signature again
The md5 values (one 128 condition codes that prime information obtain after mathematic(al) manipulation according to md5 algorithms) of information, with packing
The md5 values of signing messages used are compared, if identical, application program can register JNI methods (Java Native
A kind of Java programming interface of Interface, a part for JAVA platforms allow the code that Java code and other language are write to carry out
Interaction), execute the operation of next step;Otherwise JNI methods are not registered, and such application program, which just exits, this time to be installed, and reminds use
Family install failure.Wherein, lower layer's journey that the upper layer frame tune mainly write using java in Android system is shown a C language
Sequence, when JNI methods can not be registered, then this application program can not use.
After application program can register JNI methods, application program execute by default decryption rule in so files
The step of encrypted operation function is decrypted, concrete operations are:Find the initial address of so files in memory;Pass through so texts
Part head gets Phdr fields;(program header element is directed toward in so file headers from Phdr Field Inquiry to PT_DYNAMIC
.dynamic field saves the required essential information of dynamic linker in dynamic fields, is a structural array, can
To regard as " file header " of ELF files under dynamic link) after, obtain the p_vaddr fields and p_filesz in PT_DYNAMIC
Field (information such as offset and size of function);File type is obtained further according to p_vaddr fields and p_filesz fields, after
It is continuous that the deviant and size of Dynamic fields are obtained according to file type, in the .so library files of application program installation kit
Corresponding encryption function is inquired, all encryption functions are all subjected to corresponding decryption oprerations according to the second preset algorithm, from
And .so library files are decrypted and are completed, this application program is installed further according to the .so library files after decryption;When terminal executes above-mentioned solution
When close operation failure, then the erection schedule of this application program is exited, and sent a notification message, reminds user since peace can not be decrypted
Dress packet, to the install failure of this application program.
This application program is installed in terminal, and after being run to it, adds in the entrance of the Key Functions of this application program
One timing function time (), the time difference between the time and request time that count the return value of Key Functions, when this timing
When the time difference of the acquisition of function is larger, then the information of application program operation exception is exported, reminds user application may be just
It is being tampered, user is needed to investigate this situation.
In above-described embodiment, when installing application program in Android system terminal, pass through the signing messages to application program
The anti-debugging monitoring of verification, the encryption of .so library files with corresponding decryption oprerations and to application program, ensure that application program can
With the healthily installation and operation in terminal.
In addition, in above-described embodiment, executed through default decryption rule to encrypted in .so files with application program
The step of operation function is decrypted is corresponding, and server needs before the installation kit for sending this application program to .so files
In respective function operation is encrypted, detailed step is as follows:
By ELF file format solution so files;Resolution file head first obtains e_phoff fields, e_phentsize fields
With the information of the fields such as e_phnum fields (position of representation program head table and quantity);According in the structure on program head
P_type fields (file type) obtain the deviant and size of Dynamic fields;Traversal Dynamic fields find dynsym words
Section (field for preventing function name), dynstr fields (field for being loaded with character string information), hash section fields
The size of offset and .dynstr in (Hash table in ELF);According to the method name of function, the first corresponding Hash is calculated
Value, according to the first cryptographic Hash, finds the caching of subscript hash%nbuckets (Hash hash);According to the value in caching, read
The Elf32_Sym symbols (a kind of information type in ELF) of manipulative indexing in dynsym fields;From Elf32_Sym symbols
St_name indexes (field name) find the corresponding character string in .dynstr fields, by the character string and function name found into
Row compares.If differing, the Hash of method operation (is executed using the chain type in Java according to chain [hash%nbuckets]
Hash) next Elf32_Sym symbols are looked for, until finding or this executes chain termination.Basis is pre- after finding respective function
If encryption rule be encrypted.
Above-described embodiment describes after downloading application program installation kit in the terminal of Android system, first verifies the label of APK
Name information, then decrypts the encryption data in .so library files, application program could be installed in terminal, and pass through timing letter
Number time () prevents program to be tampered after mounting, by the above method, improves and installs application in the terminal of Android system
The safety of program.
It should be understood that although each step in the flow chart of Fig. 2 to Fig. 3 is shown successively according to the instruction of arrow,
But these steps are not the inevitable sequence indicated according to arrow to be executed successively.Unless expressly state otherwise herein, these
There is no stringent sequences to limit for the execution of step, these steps can execute in other order.Moreover, in Fig. 2 to Fig. 3
At least part step may include that either these sub-steps of multiple stages or stage are not necessarily same to multiple sub-steps
One moment executed completion, but can execute at different times, and the execution in these sub-steps or stage sequence is also not necessarily
Be carry out successively, but can with other steps either the sub-step of other steps or at least part in stage in turn or
Alternately execute.
In one embodiment, as shown in figure 4, providing a kind of application program mounting device, including:Starting module 100,
Encrypted signature module 200 and authentication module 300, deciphering module 400 and installation module 500, wherein:
Starting module 100, for when the installation instruction for receiving application program, obtaining the signing messages of application program.
Encrypted signature module 200, for according to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information.
Authentication module 300, the second cryptographic Hash for obtaining application program, the data of the second cryptographic Hash and the first cryptographic Hash
Type is identical, compares the first cryptographic Hash and the second cryptographic Hash;
Deciphering module 400, it is identical as the second cryptographic Hash for working as the first cryptographic Hash, then according to the second preset algorithm to application
The corresponding encrypted compiling packet of program is decrypted.
Module 500 is installed, for installing application program according to the compiling packet after decryption.
In one embodiment, the deciphering module 400 in above application program mounting device may include:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of application program.
Extraction unit, the header file for reading encrypted compiling packet according to storage address, and extraction adds from header file
The storage information of encryption data in close compiling packet.
Reading unit, for obtaining encryption data according to storage information and storage address.
Decryption unit is decrypted encryption data for passing through the second preset algorithm.
In one embodiment, can also include in above application program mounting device:
Preset function acquisition module, for when application program is run, then obtaining the default letter in mounted compiling packet
Number.
Timing module, the input time of the input data for recording preset function, and obtain the respective counts of preset function
According to output time;Calculate the difference of input time and output time.
Abnormal monitoring module, for when difference is more than preset value, then returning to the information of application program operation exception.
In one embodiment, above application program mounting device can also include:
First stopping modular, for when the first cryptographic Hash is with the second cryptographic Hash difference, then stopping installing application program.
In one embodiment, above application program mounting device can also include:
Second stopping modular, for when decryption failure is wrapped in encrypted compiling, stopping installation application program.
Specific about application program mounting device limits the limit that may refer to above for application program installation method
Fixed, details are not described herein.Modules in above application program mounting device can fully or partially through software, hardware and its
It combines to realize.Above-mentioned each module can be embedded in or in the form of hardware independently of in the processor in computer equipment, can also
It is stored in a software form in the memory in computer equipment, in order to which processor calls the above modules of execution corresponding
Operation.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 5.The computer equipment includes the processor connected by system bus, memory, network interface, display
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate by network connection with external terminal.When the computer program is executed by processor with
Realize a kind of application program installation method.The display screen of the computer equipment can be that liquid crystal display or electric ink are shown
Screen, the input unit of the computer equipment can be the touch layer covered on display screen, can also be on computer equipment shell
Button, trace ball or the Trackpad of setting can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 5, is only tied with the relevant part of application scheme
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
May include either combining certain components than more or fewer components as shown in the figure or being arranged with different components
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor realize following steps when executing computer program:When the installation instruction for receiving application program, obtain
Take the signing messages of application program;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;It obtains and applies journey
Second cryptographic Hash of sequence, the second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second Hash
Value;When the first cryptographic Hash is identical as the second cryptographic Hash, then according to the encrypted compiling corresponding to application program of the second preset algorithm
Packet is decrypted;Application program is installed according to the compiling packet after decryption.
In one embodiment, processor execute computer program when realize according to the second preset algorithm to application program
Corresponding encrypted compiling packet is decrypted, and may include:Obtain the storage address of the corresponding encrypted compiling packet of application program;
Read the header file of encrypted compiling packet according to storage address, and from extracting encryption data in encrypted compiling packet in header file
Store information;Encryption data is obtained according to storage information and storage address;Encryption data is carried out by the second preset algorithm
Decryption.
In one embodiment, that is realized when processor execution computer program installs application according to the compiling packet after decryption
After program, can also include:When application program is run, then the preset function in mounted compiling packet is obtained;Record is pre-
If the input time of the input data of function, and obtain the output time of the response data of preset function;Calculate input time with
The difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
In one embodiment, processor executes the first cryptographic Hash of comparison and the second cryptographic Hash realized when computer program
Later, can also include:When the first cryptographic Hash and the second cryptographic Hash difference, then stop that application program is installed.
In one embodiment, processor execute computer program when realize according to the second preset algorithm to application program pair
After the encrypted compiling packet answered is decrypted, can also include:When decryption failure is wrapped in encrypted compiling, stop installation application
Program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:When the installation instruction for receiving application program, the label of application program are obtained
Name information;According to corresponding first cryptographic Hash of the first preset algorithm calculate the signature information;The second cryptographic Hash of application program is obtained,
Second cryptographic Hash is identical as the data type of the first cryptographic Hash, compares the first cryptographic Hash and the second cryptographic Hash;When the first cryptographic Hash
It is identical as the second cryptographic Hash, then it is decrypted according to the second preset algorithm encrypted compiling packet corresponding to application program;According to
Compiling packet after decryption installs application program.
In one embodiment, realized when computer program is executed by processor according to the second preset algorithm to applying journey
The corresponding encrypted compiling packet of sequence is decrypted, and may include:Obtain the storage of the corresponding encrypted compiling packet of application program
Location;The header file of encrypted compiling packet is read according to storage address, and encrypts number from being extracted in header file in encrypted compiling packet
According to storage information;Encryption data is obtained according to storage information and storage address;By the second preset algorithm to encryption data
It is decrypted.
In one embodiment, that is realized when computer program is executed by processor answers according to the compiling packet installation after decryption
After program, can also include:When application program is run, then the preset function in mounted compiling packet is obtained;Record
The input time of the input data of preset function, and obtain the output time of the response data of preset function;Calculate input time
With the difference of output time;When difference is more than preset value, then the information of application program operation exception is returned.
In one embodiment, the first cryptographic Hash of comparison realized when computer program is executed by processor and the second Hash
After value, can also include:When the first cryptographic Hash and the second cryptographic Hash difference, then stop that application program is installed.
In one embodiment, realized when computer program is executed by processor according to the second preset algorithm to application program
After corresponding encrypted compiling packet is decrypted, can also include:When decryption failure is wrapped in encrypted compiling, stops installation and answer
Use program.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Instruct relevant hardware to complete by computer program, computer program can be stored in a non-volatile computer readable
It takes in storage medium, the computer program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, this Shen
Any reference to memory, storage, database or other media used in each embodiment please provided, may each comprise
Non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above example can be combined arbitrarily, to keep description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield is all considered to be the range of this specification record.
Above example only expresses the several embodiments of the application, the description thereof is more specific and detailed, but can not
Therefore it is construed as limiting the scope of the patent.It should be pointed out that for those of ordinary skill in the art,
Under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the protection domain of the application.
Therefore, the protection domain of the application patent should be determined by the appended claims.
Claims (10)
1. a kind of application program installation method, the method includes:
When the installation instruction for receiving application program, the signing messages of the application program is obtained;
Corresponding first cryptographic Hash of the signing messages is calculated according to the first preset algorithm;
Obtain the second cryptographic Hash of the application program, the data type phase of second cryptographic Hash and first cryptographic Hash
Together, first cryptographic Hash and second cryptographic Hash;
When first cryptographic Hash is identical as second cryptographic Hash, then the application program is corresponded to according to the second preset algorithm
Encrypted compiling packet be decrypted;
The application program is installed according to the compiling packet after decryption.
2. according to the method described in claim 1, it is characterized in that, it is described according to the second preset algorithm to the application program pair
The encrypted compiling packet answered is decrypted, including:
Obtain the storage address of the corresponding encrypted compiling packet of the application program;
The header file of the encrypted compiling packet is read according to the storage address, and the encryption is extracted from the header file
Compiling packet in encryption data storage information;
The encryption data is obtained according to the storage information and the storage address;
The encryption data is decrypted by second preset algorithm.
3. method according to claim 1 or 2, which is characterized in that answered described in the compiling packet installation according to after decryption
After program, further include:
When the application program is run, then the preset function in mounted compiling packet is obtained;
When recording the input time of the input data of the preset function, and obtaining the output of response data of the preset function
Between;
Calculate the difference of the input time and the output time;
When the difference is more than preset value, then the information of the application program operation exception is returned.
4. according to the method described in claim 1, it is characterized in that, first cryptographic Hash and second Hash
After value, further include:
When first cryptographic Hash and the second cryptographic Hash difference, then stop that the application program is installed.
5. according to the method described in claim 1, it is characterized in that, it is described according to the second preset algorithm to the application program pair
After the encrypted compiling packet answered is decrypted, further include:
When to the encrypted compiling packet decryption failure, stop that the application program is installed.
6. a kind of application program encryption device, which is characterized in that described device includes:
Starting module, for when the installation instruction for receiving application program, obtaining the encrypted compiling packet of the application program
Signing messages;
Encrypted signature module, for calculating corresponding first cryptographic Hash of the signing messages according to the first preset algorithm;
Authentication module, the second cryptographic Hash for obtaining the application program, second cryptographic Hash and first cryptographic Hash
Data type it is identical, first cryptographic Hash and second cryptographic Hash;
Deciphering module, it is identical as second cryptographic Hash for working as first cryptographic Hash, then according to the second preset algorithm to institute
The corresponding encrypted compiling packet of application program is stated to be decrypted;
Module is installed, for installing the application program according to the compiling packet after decryption.
7. device according to claim 6, which is characterized in that the deciphering module includes:
Positioning unit, the storage address for obtaining the corresponding encrypted compiling packet of the application program;
Extraction unit, the header file for reading the encrypted compiling packet according to the storage address, and from the header file
The storage information of encryption data in the middle extraction encrypted compiling packet;
Reading unit, for obtaining the encryption data according to the storage information and the storage address;
Decryption unit, for the corresponding encryption data of the application program to be decrypted by second preset algorithm.
8. the device described according to claim 6 or 7, which is characterized in that described device further includes:
Preset function acquisition module, for when the application program is run, then obtaining the default letter in mounted compiling packet
Number;
Timing module, the input time of the input data for recording the preset function, and obtain the phase of the preset function
Answer the output time of data;Calculate the difference of the input time and the output time;
Abnormal monitoring module, for when the difference is more than preset value, then returning to the information of the application program operation exception.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In when the processor executes the computer program the step of any one of realization claim 1 to 5 the method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claim 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810199683.6A CN108363580A (en) | 2018-03-12 | 2018-03-12 | Application program installation method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810199683.6A CN108363580A (en) | 2018-03-12 | 2018-03-12 | Application program installation method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108363580A true CN108363580A (en) | 2018-08-03 |
Family
ID=63004050
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810199683.6A Pending CN108363580A (en) | 2018-03-12 | 2018-03-12 | Application program installation method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108363580A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240713A (en) * | 2018-08-27 | 2019-01-18 | 郑州云海信息技术有限公司 | Drive the encryption method of installation procedure, the installation method and device of driver |
CN109408074A (en) * | 2018-09-26 | 2019-03-01 | 平安普惠企业管理有限公司 | Installation method, device, computer equipment and the storage medium of application program |
CN109413200A (en) * | 2018-11-26 | 2019-03-01 | Oppo(重庆)智能科技有限公司 | A kind of method, client, MES and electronic equipment that resource imports |
CN109460236A (en) * | 2018-10-19 | 2019-03-12 | 中国银行股份有限公司 | Program version building and inspection method and system |
CN109688158A (en) * | 2019-01-23 | 2019-04-26 | 平安科技(深圳)有限公司 | Finance executes chain authentication method, electronic device and storage medium |
CN109756340A (en) * | 2018-12-03 | 2019-05-14 | 深圳市新国都支付技术有限公司 | A kind of number sign test method, apparatus and storage medium |
CN109918870A (en) * | 2019-02-22 | 2019-06-21 | 武汉大学 | Program code based on Beidou subnanosecond grade high-precision time service executes Time delay measurement device and method |
CN109918948A (en) * | 2019-01-23 | 2019-06-21 | 西安邮电大学 | APK integrity checking method, computer program based on national secret algorithm SM3 |
CN110502268A (en) * | 2019-08-29 | 2019-11-26 | 恩亿科(北京)数据科技有限公司 | Application program update method, apparatus, server and storage medium |
CN110764782A (en) * | 2019-10-31 | 2020-02-07 | 贵阳动视云科技有限公司 | Software protection method and device |
CN110955450A (en) * | 2019-12-16 | 2020-04-03 | 北京智游网安科技有限公司 | Application package file attribution statistical method, system and storage medium |
CN112003704A (en) * | 2020-07-31 | 2020-11-27 | 中科扶云(杭州)科技有限公司 | Electronic evidence processing method and device and computer equipment |
CN112434322A (en) * | 2020-12-03 | 2021-03-02 | 深圳市欢太科技有限公司 | Data encryption method and device, computer equipment and computer readable storage medium |
CN112596784A (en) * | 2020-12-28 | 2021-04-02 | 青岛海尔科技有限公司 | Iterative version deployment method and device |
CN113132421A (en) * | 2019-12-30 | 2021-07-16 | Oppo广东移动通信有限公司 | File detection method, device, terminal and storage medium |
CN114218534A (en) * | 2021-12-14 | 2022-03-22 | 平安国际智慧城市科技股份有限公司 | Off-line package checking method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
CN1755648A (en) * | 2004-09-30 | 2006-04-05 | 微软公司 | Method, system, and apparatus for identifying unresponsive portions of a computer program |
CN101320416A (en) * | 2008-05-20 | 2008-12-10 | 北京深思洛克数据保护中心 | Method and system for detecting debugging mode of software |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN104298915A (en) * | 2014-10-16 | 2015-01-21 | 厦门美图之家科技有限公司 | Installation package tampering preventing method |
EP2988470A1 (en) * | 2014-08-22 | 2016-02-24 | Apple Inc. | Automatic purposed-application creation |
CN106055602A (en) * | 2016-05-24 | 2016-10-26 | 腾讯科技(深圳)有限公司 | File verification method and apparatus |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
CN107241688A (en) * | 2017-06-14 | 2017-10-10 | 北京小米移动软件有限公司 | Signature, verification method, device and the storage medium of application installation package |
-
2018
- 2018-03-12 CN CN201810199683.6A patent/CN108363580A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
CN1755648A (en) * | 2004-09-30 | 2006-04-05 | 微软公司 | Method, system, and apparatus for identifying unresponsive portions of a computer program |
CN101320416A (en) * | 2008-05-20 | 2008-12-10 | 北京深思洛克数据保护中心 | Method and system for detecting debugging mode of software |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
EP2988470A1 (en) * | 2014-08-22 | 2016-02-24 | Apple Inc. | Automatic purposed-application creation |
CN104298915A (en) * | 2014-10-16 | 2015-01-21 | 厦门美图之家科技有限公司 | Installation package tampering preventing method |
CN106055602A (en) * | 2016-05-24 | 2016-10-26 | 腾讯科技(深圳)有限公司 | File verification method and apparatus |
CN106203006A (en) * | 2016-08-31 | 2016-12-07 | 北京鼎源科技有限公司 | Android application reinforcement means based on dex Yu so file Dynamic Execution |
CN107241688A (en) * | 2017-06-14 | 2017-10-10 | 北京小米移动软件有限公司 | Signature, verification method, device and the storage medium of application installation package |
Non-Patent Citations (2)
Title |
---|
巫志文,李炜: "基于Android平台的软件加固方案的设计与实现", 《电信工程技术与标准化》 * |
韩子诺,刘嘉勇: "基于Android平台的SO加固技术研究", 《现代计算机》 * |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240713A (en) * | 2018-08-27 | 2019-01-18 | 郑州云海信息技术有限公司 | Drive the encryption method of installation procedure, the installation method and device of driver |
CN109408074A (en) * | 2018-09-26 | 2019-03-01 | 平安普惠企业管理有限公司 | Installation method, device, computer equipment and the storage medium of application program |
CN109460236A (en) * | 2018-10-19 | 2019-03-12 | 中国银行股份有限公司 | Program version building and inspection method and system |
CN109460236B (en) * | 2018-10-19 | 2021-12-07 | 中国银行股份有限公司 | Program version construction and checking method and system |
CN109413200B (en) * | 2018-11-26 | 2021-04-23 | Oppo(重庆)智能科技有限公司 | Resource import method, client, MES and electronic equipment |
CN109413200A (en) * | 2018-11-26 | 2019-03-01 | Oppo(重庆)智能科技有限公司 | A kind of method, client, MES and electronic equipment that resource imports |
CN109756340A (en) * | 2018-12-03 | 2019-05-14 | 深圳市新国都支付技术有限公司 | A kind of number sign test method, apparatus and storage medium |
CN109688158A (en) * | 2019-01-23 | 2019-04-26 | 平安科技(深圳)有限公司 | Finance executes chain authentication method, electronic device and storage medium |
CN109918948A (en) * | 2019-01-23 | 2019-06-21 | 西安邮电大学 | APK integrity checking method, computer program based on national secret algorithm SM3 |
CN109688158B (en) * | 2019-01-23 | 2022-07-08 | 平安科技(深圳)有限公司 | Financial execution chain authentication method, electronic device and storage medium |
CN109918870A (en) * | 2019-02-22 | 2019-06-21 | 武汉大学 | Program code based on Beidou subnanosecond grade high-precision time service executes Time delay measurement device and method |
CN110502268A (en) * | 2019-08-29 | 2019-11-26 | 恩亿科(北京)数据科技有限公司 | Application program update method, apparatus, server and storage medium |
CN110764782A (en) * | 2019-10-31 | 2020-02-07 | 贵阳动视云科技有限公司 | Software protection method and device |
CN110955450B (en) * | 2019-12-16 | 2023-09-29 | 北京智游网安科技有限公司 | Attribution statistical method, system and storage medium of application package file |
CN110955450A (en) * | 2019-12-16 | 2020-04-03 | 北京智游网安科技有限公司 | Application package file attribution statistical method, system and storage medium |
CN113132421A (en) * | 2019-12-30 | 2021-07-16 | Oppo广东移动通信有限公司 | File detection method, device, terminal and storage medium |
CN113132421B (en) * | 2019-12-30 | 2022-11-04 | Oppo广东移动通信有限公司 | File detection method, device, terminal and storage medium |
CN112003704A (en) * | 2020-07-31 | 2020-11-27 | 中科扶云(杭州)科技有限公司 | Electronic evidence processing method and device and computer equipment |
CN112434322A (en) * | 2020-12-03 | 2021-03-02 | 深圳市欢太科技有限公司 | Data encryption method and device, computer equipment and computer readable storage medium |
CN112434322B (en) * | 2020-12-03 | 2024-05-07 | 深圳市欢太科技有限公司 | Data encryption method, device, computer equipment and computer readable storage medium |
CN112596784A (en) * | 2020-12-28 | 2021-04-02 | 青岛海尔科技有限公司 | Iterative version deployment method and device |
CN112596784B (en) * | 2020-12-28 | 2023-11-28 | 青岛海尔科技有限公司 | Iterative version deployment method and device |
CN114218534A (en) * | 2021-12-14 | 2022-03-22 | 平安国际智慧城市科技股份有限公司 | Off-line package checking method, device, equipment and storage medium |
CN114218534B (en) * | 2021-12-14 | 2024-07-09 | 平安国际智慧城市科技股份有限公司 | Method, device, equipment and storage medium for checking offline package |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108363580A (en) | Application program installation method, device, computer equipment and storage medium | |
EP3387813B1 (en) | Mobile device having trusted execution environment | |
CN108810894B (en) | Terminal authorization method, device, computer equipment and storage medium | |
CN110365670B (en) | Blacklist sharing method and device, computer equipment and storage medium | |
CN110968844B (en) | Software authorization method in off-line state, server and readable storage medium | |
CN110278115B (en) | Hot update method and device | |
US9054865B2 (en) | Cryptographic system and methodology for securing software cryptography | |
CN111143869B (en) | Application package processing method and device, electronic equipment and storage medium | |
US20150095653A1 (en) | Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package | |
US10148440B2 (en) | Binary code authentication | |
CN111159658B (en) | Byte code processing method, system, device, computer equipment and storage medium | |
CN111404682A (en) | Android environment key segmentation processing method and device | |
CN112800393B (en) | Authorization authentication method, software development kit generation method, device and electronic equipment | |
CN116662941B (en) | Information encryption method, device, computer equipment and storage medium | |
CN109240723B (en) | Application program updating method, system, computer device and storage medium | |
CN114896621B (en) | Application service acquisition method, encryption method, device and computer equipment | |
CN110147655A (en) | The security protection system and method for application program | |
CN109829285A (en) | A kind of digital signature method, device, equipment and storage medium | |
US11061998B2 (en) | Apparatus and method for providing security and apparatus and method for executing security to protect code of shared object | |
CN114297679B (en) | Method for encrypted transmission and upgrading of mirror image | |
CN114928551B (en) | System configuration method, device and storage medium | |
CN113760294A (en) | Application software encryption deployment method and system | |
Rawat et al. | Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing | |
CN109558743A (en) | Data guard method, device, computer equipment and the storage medium of mobile terminal | |
CN117874721A (en) | JAR package decompilation prevention method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180803 |