CN109255245A - A kind of local cryptographic key protection method, apparatus and system - Google Patents
A kind of local cryptographic key protection method, apparatus and system Download PDFInfo
- Publication number
- CN109255245A CN109255245A CN201810914611.5A CN201810914611A CN109255245A CN 109255245 A CN109255245 A CN 109255245A CN 201810914611 A CN201810914611 A CN 201810914611A CN 109255245 A CN109255245 A CN 109255245A
- Authority
- CN
- China
- Prior art keywords
- key
- android
- outer layer
- function
- reorganization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application discloses a kind of local cryptographic key protection method, apparatus and system, by being stored in so file after finishing writing the key of Android application program, after receiving request of the outer layer Android function by program interface call so file of Android application program, reorganization is carried out to the key, again using the key after reorganization as subsidiary return value, it is back to the outer layer Android function, substantially increase the difficulty that decompiling personnel obtain code key built in APP by decompiling, it is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.
Description
Technical field
This application involves field of information security technology more particularly to a kind of local cryptographic key protection methods, apparatus and system.
Background technique
It is carried out to the application (English: Application, abbreviation APP) under Android (English: Android) operating system
The process of research and development is often directly written in final code key in local code, has both facilitated the encryption and decryption of data in this way
Storage and the real-time encrypted transmission information with server-side are also convenient for the management to encryption code key.But it at the same time, also brings along
One extremely hazardous problem, some of the staff both to have mastered a skill can get source code by the decompiling of code, to find
The plaintext code key of most critical;And the data and server-side generated by using code key encryption do trial connection, once connection
Success, then the data of server-side will be obtained by the personnel, to cause immeasurable loss.
With the continuous development of computer technology, using related art method, the APP under Android operation system is held
Row decompiling operation becomes increasingly easy to obtain the source code of APP.And there is no effectively to local code key by most of APP
Relevant protection is done, gets source code after by malice decompiling, the most important key information of the APP can be obtained, thus
Lead to the leakage of information.
How effectively the plaintext code key inside APP to be protected as a result, becomes urgent problem to be solved in the industry.
Summary of the invention
This application provides a kind of local cryptographic key protection methods, apparatus and system, are easy with solving local key by malice
Source code is got after decompiling, leads to the leakage problem of information.
In a first aspect, the application provides a kind of local cryptographic key protection method, which is characterized in that the described method includes:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described
It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
With reference to first aspect, the first in first aspect can receive outer layer Android function and pass through Android in realization mode
After the request of program interface call so file of application program, the method also includes:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key
Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer
Layer Android function returns to null value.
With reference to first aspect the first can realize mode, in second of achievable mode of first aspect, to described
Key carries out reorganization
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
With reference to first aspect, the third in first aspect can be in realization mode, and the key is to be write based on C language
The key arrived.
Second aspect, the application provide a kind of local key protectors, and described device includes:
Receiving unit, for receiving outer layer Android function asking by program interface call so file of Android application program
It asks, wherein include the key of the Android application program in so file;
Recomposition unit, for carrying out reorganization to the key;
Return unit, for being back to the outer layer Android function using the key after reorganization as subsidiary return value.
In conjunction with second aspect, the first in second aspect can be in realization mode, described device further include:
Acquiring unit, for passing through program interface call so file of Android application program receiving outer layer Android function
After request, the corresponding packet name of outer layer Android function is obtained;
Judging unit, for judging that the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is
It is no consistent;
Recomposition unit, if being also used to the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function
Unanimously, reorganization is carried out to the key, using the key after reorganization as subsidiary return value, is back to the outer layer
Android function;
The return unit, if being also used to Android application program described in the corresponding Bao Mingyu of the outer layer Android function
Packet name is inconsistent, returns to null value to the outer layer Android function.
The first in conjunction with second aspect can realize mode, described heavy in second of achievable mode of second aspect
Organizing unit includes:
Generation unit, for generating random number based on random number generator;
Extraction unit, for according to the random number, extracting corresponding position in the character string for forming the key respectively
Character;
Assembled unit, the key for being combined to obtain by the character after reorganization.
In conjunction with second aspect, the third in second aspect can be in realization mode, and the key is to be write based on C language
The key arrived.
The third aspect, the application provide a kind of local cryptographic key protection system, and the system comprises processors, and for depositing
Store up the memory of processor-executable instruction;
Wherein, the processor is configured to:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described
It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
In conjunction with the third aspect, the first in the third aspect can receive outer layer Android function and pass through Android in realization mode
After the request of program interface call so file of application program, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key
Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer
Layer Android function returns to null value.
In conjunction with the third aspect, in second of achievable mode of the third aspect, reorganization packet is carried out to the key
It includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
From the above technical scheme, a kind of local cryptographic key protection method, apparatus and system provided by the present application, pass through by
The key of Android application program is stored in so file after finishing writing, receiving programming of the outer layer Android function by Android application program
After interface calls the request of so file, reorganization is carried out to the key, then using the key after reorganization as incidentally returning
Value is returned, the outer layer Android function is back to, decompiling personnel is substantially increased by decompiling and obtains code key built in APP
Difficulty, is effectively protected the built-in code key of APP to a certain extent, to realize the guarantor to the relevant significant data of APP
Shield.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below
Singly introduce, it should be apparent that, for those of ordinary skills, without any creative labor,
It is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the first embodiment of local cryptographic key protection method provided by the present application.
Fig. 2 is a kind of flow chart of the second embodiment of local cryptographic key protection method provided by the present application.
Fig. 3 is a kind of flow chart of the 3rd embodiment of local cryptographic key protection method provided by the present application.
Fig. 4 is a kind of structural block diagram of the first embodiment of local key protectors provided by the present application.
Fig. 5 is a kind of structural block diagram of the second embodiment of local key protectors provided by the present application.
Fig. 6 is a kind of structural block diagram of the 3rd embodiment of local key protectors provided by the present application.
Fig. 7 is a kind of schematic diagram of the embodiment of local cryptographic key protection system provided by the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.Below in conjunction with attached drawing,
The technical scheme provided by various embodiments of the present application will be described in detail.
Referring to Fig. 1, for a kind of first embodiment of local cryptographic key protection method provided by the present application, the method packet
It includes:
Step 101, the request that outer layer Android function passes through program interface call so file of Android application program is received,
In, it include the key of the Android application program in so file.
Specifically, in the present embodiment, the key is the key write based on C language.So file is under Linux
Program function library, i.e., compiled can be that can not pass through decompiling for code and data that other programs use, so file
Source code is got, therefore can play the role of protecting the key of Android application program.
Step 102, reorganization is carried out to the key.
Specifically, in order to which increase key cracks difficulty, reorganization can be carried out to the key, thus in outer layer Android
When function obtains key, play a protective role to key.
Step 103, using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
From the above technical scheme, the first embodiment of the local cryptographic key protection method of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, reorganization is carried out to the key, then using the key after reorganization as subsidiary return value, return
It is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling,
It is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.
Referring to Fig. 2, for a kind of second embodiment of local cryptographic key protection method provided by the present application, with first embodiment
The difference is that receive outer layer Android function by the request of program interface call so file of Android application program it
Afterwards, the method also includes:
Step 201, the corresponding packet name of outer layer Android function is obtained.
Specifically, packet name (English: Package name) is the unique identification for judging an App in android system,
Different App can have same name, but its packet name cannot be identical.Therefore, APP is beaten again by third party in order to prevent
To obtain key, the present embodiment first obtains the corresponding packet name of outer layer Android function and tests so as to subsequent to packet name packet.It obtains
The method of packet name can realize according to the prior art, in the present embodiment without limitation.
Step 202, judge Android application program described in the corresponding Bao Mingyu of the outer layer Android function packet name whether one
It causes.
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, step 102 is held,
Reorganization and step 103 are carried out to the key, using the key after reorganization as subsidiary return value, are back to institute
State outer layer Android function.
Step 203, if the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent,
Null value is returned to the outer layer Android function.
From the above technical scheme, the second embodiment of the local cryptographic key protection method of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified
Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function
The packet name of application program is consistent, carries out reorganization to key, using the key after reorganization as subsidiary return value, is back to
Outer layer Android function, if the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is inconsistent, outer layers Android
Function returns to null value, avoids APP by third party and beats again packet to obtain the risk of key, has further protected the built-in of APP
Code key, to realize the protection to the relevant significant data of APP.
Referring to Fig. 3, for a kind of 3rd embodiment of local cryptographic key protection method provided by the present application, in second embodiment
On the basis of, reorganization is carried out to the key and is specifically included:
Step 301, random number is generated based on random number generator.
Specifically, in order to which increase key cracks difficulty, reorganization can be carried out to the key based on random number, thus
When digging layer Android function acquisition key, play a protective role to key.
Step 302, according to the random number, the character of corresponding position in the character string for forming the key is extracted respectively.
Step 303, the character is combined to obtain the key after reorganization.
Specifically, in so file, code key can be divided into the character string composition of multiple particular number of bits, can be according to random number
Word extract symbol go here and there in corresponding position character, for example take primary " a " in character string " adfs ", the in character string " dsda "
The 4th " w ", reassembles into " asw " code key in two " s " and character string " rerw ", so that increase key cracks difficulty
Degree.
From the above technical scheme, the 3rd embodiment of the local cryptographic key protection method of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified
Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function
The packet name of application program is consistent, carries out reorganization to key, reorganization is specifically extracted in symbol string using according to random digit
The character of corresponding position, the key after the character to be combined to obtain reorganization are back to outer as subsidiary return value
Layer Android function, increase key cracks difficulty, has further protected the built-in code key of APP, to realize to APP correlation
Significant data protection.
Referring to Fig. 4, for a kind of first embodiment of local key protectors provided by the present application, described device packet
It includes:
Receiving unit 401 passes through program interface call so file of Android application program for receiving outer layer Android function
Request, wherein include the key of the Android application program in so file, wherein the key is to be compiled based on C language
The key write.
Recomposition unit 402, for carrying out reorganization to the key.
Return unit 403, for being back to the outer layer Android letter using the key after reorganization as subsidiary return value
Number.
From the above technical scheme, the first embodiment of the local key protectors of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, reorganization is carried out to the key, then using the key after reorganization as subsidiary return value, return
It is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling,
It is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.
Referring to Fig. 5, being protected for a kind of second embodiment of local key protectors provided by the present application with local key
The first embodiment of protection unit the difference is that, described device further include:
Acquiring unit 501, for receiving program interface call so text of the outer layer Android function by Android application program
After the request of part, the corresponding packet name of outer layer Android function is obtained.
Judging unit 502, for judging the packet of Android application program described in the corresponding Bao Mingyu of the outer layer Android function
Whether name is consistent.
Recomposition unit 402, if being also used to Android application program described in the corresponding Bao Mingyu of the outer layer Android function
Packet name is consistent, carries out reorganization to the key, using the key after reorganization as subsidiary return value, is back to described
Outer layer Android function.
The return unit 403, if being also used to Android application journey described in the corresponding Bao Mingyu of the outer layer Android function
The packet name of sequence is inconsistent, returns to null value to the outer layer Android function.
From the above technical scheme, the second embodiment of the local key protectors of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified
Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function
The packet name of application program is consistent, carries out reorganization to key, using the key after reorganization as subsidiary return value, is back to
Outer layer Android function, if the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is inconsistent, outer layers Android
Function returns to null value, avoids APP by third party and beats again packet to obtain the risk of key, has further protected the built-in of APP
Code key, to realize the protection to the relevant significant data of APP.
Referring to Fig. 6, being protected for a kind of 3rd embodiment of local key protectors provided by the present application in local key
On the basis of the second embodiment of protection unit, the recomposition unit 402 includes:
Generation unit 601, for generating random number based on random number generator.
Extraction unit 602, for extracting corresponding position in the character string for forming the key respectively according to the random number
Character.
Assembled unit 603, the key for being combined to obtain by the character after reorganization.
From the above technical scheme, the 3rd embodiment of the local key protectors of the application, by answering Android
It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program
After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified
Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function
The packet name of application program is consistent, carries out reorganization to key, reorganization is specifically extracted in symbol string using according to random digit
The character of corresponding position, the key after the character to be combined to obtain reorganization are back to outer as subsidiary return value
Layer Android function, increase key cracks difficulty, has further protected the built-in code key of APP, to realize to APP correlation
Significant data protection.
Referring to Fig. 7, the system comprises processing for a kind of embodiment of local cryptographic key protection system provided by the present application
Device 71, and the memory 72 for storage processor executable instruction.
Wherein, the processor 71 is configured as:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described
It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
Further, receive outer layer Android function by the request of program interface call so file of Android application program it
Afterwards, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key
Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer
Layer Android function returns to null value.
Further, carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
From the above technical scheme, a kind of local cryptographic key protection provided by the embodiments of the present application and system, by that will pacify
The key of tall and erect application program is stored in so file after finishing writing, connect receiving outer layer Android function by the programming of Android application program
After mouth calls the request of so file, reorganization is carried out to the key, then return using the key after reorganization as subsidiary
Value, is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling
Degree, is effectively protected the built-in code key of APP to a certain extent;Also, before carrying out reorganization to key, outer layer is obtained
The corresponding packet name of Android function judges whether the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is consistent, such as
The packet name of the corresponding Bao Mingyu Android application program of fruit outer layer Android function is consistent, reorganization is carried out to key, at recombination
Key after reason is back to outer layer Android function, if the corresponding Bao Mingyu Android of outer layer Android function as subsidiary return value
The packet name of application program is inconsistent, and outer layers Android function returns to null value, avoids APP by third party and beats again packet to obtain key
Risk;In addition, reorganization specifically using according to random digit extract symbol go here and there in corresponding position character, by the character into
Row combination obtains the key after reorganization as subsidiary return value, is back to outer layer Android function, increase key cracks difficulty
Degree, to realize the protection to the relevant significant data of APP.
In the specific implementation, the application also provides a kind of computer storage medium, wherein the computer storage medium can store
There is program, which may include some or all of in each embodiment of local cryptographic key protection method provided by the invention when executing
Step.The storage medium can for magnetic disk, CD, read-only memory (English: Read-Only Memory, referred to as:
ROM) or random access memory (English: Random Access Memory, referred to as: RAM) etc..
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software
The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or
Say that the part that contributes to existing technology can be embodied in the form of software products, which can deposit
Storage is in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that computer equipment (can be with
It is personal computer, server or the network equipment etc.) execute certain part institutes of each embodiment of the present invention or embodiment
The method stated.
Same and similar part may refer to each other between each embodiment in this specification.Especially for local key
For protective device and system embodiment, since it is substantially similar to the method embodiment, so be described relatively simple, it is related
Place is referring to the explanation in embodiment of the method.
Above-described the application embodiment does not constitute the restriction to the application protection scope.
Claims (11)
1. a kind of local cryptographic key protection method, which is characterized in that the described method includes:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein so text
It include the key of the Android application program in part;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
2. the method as described in claim 1, which is characterized in that receive programming of the outer layer Android function by Android application program
After interface calls the request of so file, the method also includes:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, the key is carried out
Reorganization is back to the outer layer Android function using the key after reorganization as subsidiary return value;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, pacify to the outer layer
Tall and erect function returns to null value.
3. method according to claim 2, which is characterized in that carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
4. the method as described in claim 1, which is characterized in that the key is the key write based on C language.
5. a kind of local key protectors, which is characterized in that described device includes:
Receiving unit, the request for passing through program interface call so file of Android application program for receiving outer layer Android function,
It wherein, include the key of the Android application program in so file;
Recomposition unit, for carrying out reorganization to the key;
Return unit, for being back to the outer layer Android function using the key after reorganization as subsidiary return value.
6. device as claimed in claim 5, which is characterized in that described device further include:
Acquiring unit, for the request in reception outer layer Android function by program interface call so file of Android application program
Afterwards, the corresponding packet name of outer layer Android function is obtained;
Judging unit, for judge Android application program described in the corresponding Bao Mingyu of the outer layer Android function packet name whether one
It causes;
Recomposition unit, if being also used to the Bao Mingyi of Android application program described in the corresponding Bao Mingyu of the outer layer Android function
It causes, reorganization is carried out to the key, using the key after reorganization as subsidiary return value, be back to the outer layer peace
Tall and erect function;
The return unit, if being also used to the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function
It is inconsistent, null value is returned to the outer layer Android function.
7. device as claimed in claim 6, which is characterized in that the recomposition unit includes:
Generation unit, for generating random number based on random number generator;
Extraction unit, for extracting the character of corresponding position in the character string for forming the key respectively according to the random number;
Assembled unit, the key for being combined to obtain by the character after reorganization.
8. device as claimed in claim 5, which is characterized in that the key is the key write based on C language.
9. a kind of local cryptographic key protection system, which is characterized in that the system comprises processors, and can for storage processor
The memory executed instruction;
Wherein, the processor is configured to:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein so text
It include the key of the Android application program in part;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
10. system as claimed in claim 9, which is characterized in that receive volume of the outer layer Android function by Android application program
After journey interface calls the request of so file, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, the key is carried out
Reorganization is back to the outer layer Android function using the key after reorganization as subsidiary return value;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, pacify to the outer layer
Tall and erect function returns to null value.
11. system as claimed in claim 10, which is characterized in that carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810914611.5A CN109255245A (en) | 2018-08-13 | 2018-08-13 | A kind of local cryptographic key protection method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810914611.5A CN109255245A (en) | 2018-08-13 | 2018-08-13 | A kind of local cryptographic key protection method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109255245A true CN109255245A (en) | 2019-01-22 |
Family
ID=65049234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810914611.5A Pending CN109255245A (en) | 2018-08-13 | 2018-08-13 | A kind of local cryptographic key protection method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109255245A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104668A (en) * | 2019-12-23 | 2020-05-05 | 江苏恒宝智能系统技术有限公司 | Implementation method and application of return value of security authentication function |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821098A (en) * | 2012-07-17 | 2012-12-12 | 暨南大学 | System and method for self-dissolving instant messaging under cloud environment |
CN103106372A (en) * | 2013-01-17 | 2013-05-15 | 上海交通大学 | Lightweight class privacy data encryption method and system for Android system |
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN105117635A (en) * | 2015-03-20 | 2015-12-02 | 北京凯锐立德科技有限公司 | Local data security protection system and method |
CN105472602A (en) * | 2014-08-19 | 2016-04-06 | 深圳市中兴微电子技术有限公司 | Encryption device and encryption method |
CN106411902A (en) * | 2016-09-30 | 2017-02-15 | 广东网金控股股份有限公司 | Data secure transmission method and system |
CN106598584A (en) * | 2016-12-08 | 2017-04-26 | 广州华多网络科技有限公司 | Resource file processing method, apparatus and system |
CN106792666A (en) * | 2016-12-23 | 2017-05-31 | 东软集团股份有限公司 | The method and device of network sensitive information in protection wireless network connection |
CN107070656A (en) * | 2017-03-31 | 2017-08-18 | 武汉斗鱼网络科技有限公司 | The encryption method of so files, decryption method and system in a kind of application program |
CN107196907A (en) * | 2017-03-31 | 2017-09-22 | 武汉斗鱼网络科技有限公司 | A kind of guard method of Android SO files and device |
CN107196760A (en) * | 2017-04-17 | 2017-09-22 | 徐智能 | Syndrome with adjustable reconstructs the sequential encryption method of key at random |
CN107273723A (en) * | 2017-07-07 | 2017-10-20 | 广东工业大学 | A kind of Android platform applied software protection method based on so file shell addings |
CN107330340A (en) * | 2017-06-19 | 2017-11-07 | 国家计算机网络与信息安全管理中心 | File encrypting method, equipment, file decryption method, equipment and storage medium |
-
2018
- 2018-08-13 CN CN201810914611.5A patent/CN109255245A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102821098A (en) * | 2012-07-17 | 2012-12-12 | 暨南大学 | System and method for self-dissolving instant messaging under cloud environment |
CN103106372A (en) * | 2013-01-17 | 2013-05-15 | 上海交通大学 | Lightweight class privacy data encryption method and system for Android system |
CN105472602A (en) * | 2014-08-19 | 2016-04-06 | 深圳市中兴微电子技术有限公司 | Encryption device and encryption method |
CN105117635A (en) * | 2015-03-20 | 2015-12-02 | 北京凯锐立德科技有限公司 | Local data security protection system and method |
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN106411902A (en) * | 2016-09-30 | 2017-02-15 | 广东网金控股股份有限公司 | Data secure transmission method and system |
CN106598584A (en) * | 2016-12-08 | 2017-04-26 | 广州华多网络科技有限公司 | Resource file processing method, apparatus and system |
CN106792666A (en) * | 2016-12-23 | 2017-05-31 | 东软集团股份有限公司 | The method and device of network sensitive information in protection wireless network connection |
CN107070656A (en) * | 2017-03-31 | 2017-08-18 | 武汉斗鱼网络科技有限公司 | The encryption method of so files, decryption method and system in a kind of application program |
CN107196907A (en) * | 2017-03-31 | 2017-09-22 | 武汉斗鱼网络科技有限公司 | A kind of guard method of Android SO files and device |
CN107196760A (en) * | 2017-04-17 | 2017-09-22 | 徐智能 | Syndrome with adjustable reconstructs the sequential encryption method of key at random |
CN107330340A (en) * | 2017-06-19 | 2017-11-07 | 国家计算机网络与信息安全管理中心 | File encrypting method, equipment, file decryption method, equipment and storage medium |
CN107273723A (en) * | 2017-07-07 | 2017-10-20 | 广东工业大学 | A kind of Android platform applied software protection method based on so file shell addings |
Non-Patent Citations (1)
Title |
---|
王元珍: "《80X86汇编语言程序设计》", 30 April 2005 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111104668A (en) * | 2019-12-23 | 2020-05-05 | 江苏恒宝智能系统技术有限公司 | Implementation method and application of return value of security authentication function |
CN111104668B (en) * | 2019-12-23 | 2022-03-01 | 恒宝股份有限公司 | Implementation method and application of return value of security authentication function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113240519B (en) | Intelligent contract management method and device based on block chain and electronic equipment | |
CN104680039B (en) | A kind of data guard method and device of application program installation kit | |
CN106506146A (en) | Based on the Transaction Information method of calibration of block chain technology, apparatus and system | |
US20160275019A1 (en) | Method and apparatus for protecting dynamic libraries | |
CN104866734B (en) | A kind of guard method of DEX file and device | |
CN110266682B (en) | Data encryption method and device, mobile terminal and decryption method | |
CN111191195A (en) | Method and device for protecting APK | |
CN109241484A (en) | A kind of sending method and equipment of the web data based on encryption technology | |
CN106599723A (en) | File encryption method and device, and file decryption method and device | |
CN107315586A (en) | Using the methods, devices and systems of packing | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN109190404A (en) | A kind of data desensitization system | |
CN105898054A (en) | Verification-based message display method and communication terminal | |
CN108134673A (en) | A kind of method and device for generating whitepack library file | |
CN108111622A (en) | A kind of method, apparatus and system for downloading whitepack library file | |
CN108304727A (en) | The method and apparatus of data processing | |
CN108777685A (en) | Method and apparatus for handling information | |
CN104915594B (en) | Application program operation method and device | |
CN109255245A (en) | A kind of local cryptographic key protection method, apparatus and system | |
CN108985040B (en) | Method and apparatus, storage medium and the processor logged in using cipher key | |
CN110287208A (en) | The method and apparatus of database field encryption, storage medium | |
CN107122656A (en) | It is a kind of that the outside method and apparatus debugged are prevented by Self-debugging | |
CN106909861A (en) | A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system | |
CN107509180A (en) | A kind of method, storage device and the mobile terminal of automatic Encrypted short message | |
CN106656492A (en) | Key migration method and device for TPM (Trusted Platform Module) chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190122 |