CN109858203A - A kind of safety protecting method, device and the storage medium of Android platform application - Google Patents

A kind of safety protecting method, device and the storage medium of Android platform application Download PDF

Info

Publication number
CN109858203A
CN109858203A CN201811572188.1A CN201811572188A CN109858203A CN 109858203 A CN109858203 A CN 109858203A CN 201811572188 A CN201811572188 A CN 201811572188A CN 109858203 A CN109858203 A CN 109858203A
Authority
CN
China
Prior art keywords
apk
file
decryption
encryption
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811572188.1A
Other languages
Chinese (zh)
Inventor
査耀华
黄剑
张磊
孙临泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201811572188.1A priority Critical patent/CN109858203A/en
Publication of CN109858203A publication Critical patent/CN109858203A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides safety protecting method, device and the storage mediums of a kind of application of Android platform.This method comprises: encrypting step, is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;Load step is installed after the encryption apk is decrypted in custom-built system load engine;Operating procedure runs the apk of the decryption of the installation in custom-built system runtime engine.The present invention obscures resource, and the dex file that will be encrypted respectively, so file, resource file etc. beat again packet and obtains encryption apk, so that safety is higher, improve the class of safety protection of application, and that issues is free of decrypted code using itself, decrypted code has write in the android system of customization, cracker wants to carry out cracking to source program and must carry out conversed analysis to the android system of the application of encryption and customization simultaneously, it considerably increases and cracks difficulty, simultaneously because program be decrypted by the android system customized rather than program itself from decrypt, improve the operational efficiency of application.

Description

A kind of safety protecting method, device and the storage medium of Android platform application
Technical field
The present invention relates to apply security technology area, especially a kind of safety protecting method, the dress of Android platform application It sets and storage medium.
Background technique
The safety protection technique of mainstream is more in android system at present, has signature check, obscures, anti-debug, application Anti- dump of shell adding, memory etc., these technologies can prevent reverse cracker from carrying out conversed analysis to application to a certain extent. Partial protection technology is described below, it is simply introduced.
Signature check, signature, which refers to signer, indicates the identity of oneself by new data that certain crypto-operation generates, Recipient can confirm signer by verifying digital signature.Android system requires all application programs to must have number Word signature, the application program of digital signature can not installed.Signature check technology refers to opening when program starts One section of code for being used to verify current application signing messages is added in dynamic code, and the signature of current application is detected in program operation It is whether consistent with signature when publication, if it is continuing to run, application is otherwise indicated by malicious modification, signature has occurred and that Change, the operation of direct terminator at this time.
Obscure introduction, aliasing strategy be each application must a kind of increased prevention policies, using obscure not only for Protection, also for the size for reducing application installation package, so it must a Xiang Gong to be added before being each application publication Energy.Present aliasing strategy is typically all to be divided into two kinds, and one is obscuring for code, and one is resource files to obscure.
It is to be quickly grown, safety higher one using extensively currently on the market using this method of shell adding using shell adding Kind guard technology.It is exactly to hide the code for needing the apk (source apk) encrypted in place of the core of this technology, keeps reverse personnel anti- Relevant code can not be directly obtained after compiling apk, to protect to the code of source apk.Using shell adding by generation upon generation of Development, up to the present developed out dex integrally encrypt, the encryption technologies such as dex method detaches, vmp.
These technologies can prevent from increasing the safety of code using maliciously being cracked to a certain extent.However Obscure lower with signature check safety, shell adding disadvantage is also that cannot be neglected, compatibility there is a problem of it is bigger, simultaneously Due to needing first to decrypt source program dex using itself before application operation or method restores, so operational efficiency is lower, Source application is decrypted simultaneously or the code of method reduction has also been stored in the apk of publication, cracker still can lead to Conversed analysis decrypted code is crossed to shell.
Summary of the invention
The present invention is directed to above-mentioned defect in the prior art, proposes following technical solution.
A kind of safety protecting method of Android platform application, this method comprises:
Encrypting step is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Load step is installed after the encryption apk is decrypted in load engine;
Operating procedure runs the apk of the decryption of the installation in runtime engine.
Further, the operation of the encrypting step includes: and carries out decompiling to the apk of acquisition to obtain the apk source document Part, traversal apk source file obtains res resource folder, and res resource folder is copied, right during copy The resource file in res resource folder after copy is renamed, and the res resource folder after being obscured is copying While the resource file copied is encrypted;It is obtained when traversing apk file after dex file and so file to dex text Part and so file are encrypted;The resource index table of the apk is revised as to refer to obscure the resource of rear res resource folder Concordance list;Beat again packet using encrypted dex file, so file and resource file and obtains encryption apk.
Further, the operation of the load step includes: that the path of apk to be mounted will be needed to be transferred to as parameter First erection schedule of the load engine, first erection schedule obtain apk by the path parameter;In the first installation Judge whether the apk is encryption apk in process, if it is, the dex after being decrypted is decrypted in the encryption apk File, so file and resource file, and decryption dex file, so file and resource file are beaten again into packet and generate decryption apk;First The path of the decryption apk is passed to the second erection schedule as parameter by erection schedule, and the second erection schedule is joined based on path Number obtains decryption apk and is installed.
Further, when the operation of the operating procedure includes: the apk after operation decryption, runtime engine detection is worked as Preceding system environments safety, judges whether current system is in root environment or debugging mode, if it is not, after decryption Apk brings into operation, the apk operation after otherwise stopping decryption.
Further, analysis unit is provided in the runtime engine for judging whether system environments is safe Property.
Further, the judgement decryption list for judging whether apk encrypts and decrypt apk is provided in the load engine Member.
Further, the encryption apk itself does not carry decrypted code.
The invention also provides a kind of safety device of Android platform application, which includes:
Encryption unit, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Loading unit, for being installed after the encryption apk is decrypted in load engine;
Running unit, the apk of the decryption for running the installation in runtime engine.
Further, the operation that the encryption unit executes includes: to carry out decompiling to the apk of acquisition to obtain the apk Source file, traversal apk source file obtains res resource folder, and res resource folder is copied, in the process of copy In the resource file in the res resource folder after copy is renamed, the res resource folder after being obscured, The resource file copied is encrypted while copy;It is right after dex file and so file to obtain when traversing apk file Dex file and so file are encrypted;The resource index table of the apk is revised as to refer to obscure rear res resource folder Resource index table;Beat again packet using encrypted dex file, so file and resource file and obtains encryption apk.
Further, the operation that the loading unit executes includes: that the path of apk to be mounted will be needed to pass as parameter It is handed to the first erection schedule of the load engine, first erection schedule obtains apk by the path parameter;First Judge whether the apk is encryption apk in erection schedule, if it is, after the encryption apk is decrypted being decrypted Dex file, so file and resource file, and decryption dex file, so file and resource file are beaten again into packet and generate decryption apk;The The path of the decryption apk is passed to the second erection schedule as parameter by one erection schedule, and the second erection schedule is based on path Parameter obtains decryption apk and is installed.
Further, when the operation that the running unit executes includes: the apk after operation decryption, runtime engine inspection Current system environment safety is surveyed, judges whether current system is in root environment or debugging mode, if it is not, after decryption Apk bring into operation, otherwise stop decryption after apk operation.
Further, analysis unit is provided in the runtime engine for judging whether system environments is safe Property.
Further, the judgement decryption list for judging whether apk encrypts and decrypt apk is provided in the load engine Member.
Further, the encryption apk itself does not carry decrypted code.
The invention also provides a kind of computer readable storage mediums, which is characterized in that is stored on the storage medium Computer program code executes above-mentioned any method when the computer program code is computer-executed.
Technical effect of the invention are as follows: in encryption method of the invention, resource is obscured, and to dex file, so text Part and resource file are encrypted respectively, then carry out the dex file of encryption, so file and the resource file to beat again packet obtaining again Apk is encrypted, so that the safety of encryption apk is higher, improves the class of safety protection of application, and that issues is free of using itself Decrypted code, decrypted code have write in the android system of oneself customization, and cracker wants crack to source program necessary Simultaneously to the android system while conversed analysis of the application of encryption and customization, considerably increases and crack difficulty, simultaneously because journey Sequence installation before be program is decrypted by the android system customized rather than program itself from decrypt, so improving The operational efficiency of application.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon.
Fig. 1 is a kind of flow chart of the safety protecting method of Android platform application of embodiment according to the present invention.
Fig. 2 is a kind of structure chart of the safety device of Android platform application of embodiment according to the present invention.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows a kind of safety protecting method of Android platform application of the invention, this method comprises:
Encrypting step S101 is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition.In order to improve application Safety encrypted to obtain encryption apk, encryption method after carrying out decompiling to the apk of acquisition in encrypting step S101 The existing encryption methods such as symmetrical, asymmetric can be used, to improve the class of safety protection of application.
Load step S102 is installed after the encryption apk is decrypted in load engine.
Engine is loaded, in order to behave encrypted application, in load step S102, by modifying Android System source code, the insertion load engine before the code of android system installation application executes.It is answered in load engine Decryption and installation.
Operating procedure S103 runs the apk of the decryption of the installation in runtime engine.
Runtime engine, cracker cracks application in order to prevent, in operating procedure S103, passes through modification Runtime engine is added before the code of android system operation application executes, in the operation in android system source code The detection that system environments safety is carried out in engine shuts down procedure operation if discovery current system is there are security risk.I.e. originally Load engine and runtime engine will be provided in android system in invention, so that android system used in the present invention is The android system of customization realizes the installation and operation of apk by load engine and runtime engine, improves the peace of apk operation Quan Xing.
In one embodiment of the method for the present invention, the operation of the encrypting step S101 includes: to carry out to the apk of acquisition Decompiling obtains the apk source file, and traversal apk source file obtains res resource folder, and res resource folder is copied Shellfish renames the resource file in the res resource folder after copy during copy, after being obscured Res resource folder encrypts the resource file copied while copy;Dex text is obtained when traversing apk file Dex file and so file are encrypted after part and so file;The resource index table of the apk is revised as after referring to obscure The resource index table of res resource folder;It carries out beating again packet using encrypted dex file, so file and resource file and obtain Encrypt apk.In this encryption method, resource is obscured, and dex file, so file and resource file are added respectively It is close, then the dex file of encryption, so file and resource file beat again packet again and obtains encryption apk, so that encryption apk Safety is higher, improves the class of safety protection of application, this is one of important inventive point of the invention.
In one embodiment of the method for the present invention, the operation of the load step S102 includes: need to apk to be mounted Path the first erection schedule of the load engine is transferred to as parameter, first erection schedule joined by the path Number obtains apk;Judge whether the apk is encryption apk in the first erection schedule, if it is, the encryption apk is carried out Dex file, so file and resource file after being decrypted, and decryption dex file, so file and resource file are beaten again Packet generates decryption apk;The path of the decryption apk is passed to the second erection schedule as parameter by the first erection schedule, and second Erection schedule is based on path parameter and obtains decryption apk and installed.
In square embodiment of the invention, it is provided in the load engine and judges whether apk encrypts and decrypt apk's Judge decryption unit, so that the encryption apk itself does not carry decrypted code, and during loading, using the first process into Row decryption, is installed using the second process, is free of decrypted code using itself by what this method was issued, decrypted code writes on In the android system of oneself customization, cracker wants to carry out cracking to source program must be simultaneously to the application of encryption and fixed The android system of system carries out conversed analysis, considerably increases and cracks difficulty, simultaneously because program is the Android by customizing System is decrypted rather than program itself is from decrypting, so operational efficiency is also above traditional shell adding mode, this is the present invention Important inventive point it is another.
In one embodiment of the method for the present invention, the operation of the operating procedure S103 includes: after operation decryption When apk, runtime engine detects current system environment safety, judges whether current system is in root environment or debugging mould Formula, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.Cracker will carry out application inverse Debugging mode is opened simultaneously to root system is required when analysis substantially, detection current system safety in this operating procedure S103 Property, if discovery system by root or opens debugging mode program out of service, this mode can prevent from system level Only application is cracked, and greatly improves the safety of application.
In order to detect current system environment safety, analysis unit is provided in the runtime engine, which sentences Disconnected unit for judge system environments whether safety.The analysis unit by judge system whether by root, be cracked, Determine whether system environments is safe by means such as decompilings.
With further reference to Fig. 2, as the realization to above-mentioned Fig. 1 shown device, this application provides a kind of Android platforms One embodiment of the safety device of application, the Installation practice is corresponding with Installation practice shown in FIG. 1, the device Specifically it may include in various electronic equipments.
Fig. 2 shows a kind of safety device of Android platform of the invention application, which includes:
Encryption unit 201, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition.It is answered to improve Safety is encrypted to obtain encryption apk, encryption dress in encryption unit 201 after carrying out decompiling to the apk of acquisition It sets and the existing encryption devices such as symmetrical, asymmetric can be used, to improve the class of safety protection of application.
Loading unit 202, for being installed after the encryption apk is decrypted in load engine.
Engine is loaded, in order to behave encrypted application, in loading unit S102, by modifying Android System source code, the insertion load engine before the code of android system installation application executes.It is answered in load engine Decryption and installation.
Running unit 203, the apk of the decryption for running the installation in runtime engine.
Runtime engine, cracker cracks application in order to prevent, in running unit S103, passes through modification Runtime engine is added before the code of android system operation application executes, in the operation in android system source code The detection that system environments safety is carried out in engine shuts down procedure operation if discovery current system is there are security risk.I.e. originally Load engine and runtime engine will be provided in android system in invention, so that android system used in the present invention is The android system of customization realizes the installation and operation of apk by load engine and runtime engine, improves the peace of apk operation Quan Xing.
In one embodiment of apparatus of the present invention, the operation that the encryption unit 201 executes includes: the apk to acquisition Carry out decompiling and obtain the apk source file, traversal apk source file obtains res resource folder, and by res resource folder into Row copy, renames the resource file in the res resource folder after copy during copy, after being obscured Res resource folder, copy while the resource file copied is encrypted;Dex is obtained when traversing apk file Dex file and so file are encrypted after file and so file;The resource index table of the apk is revised as referring to obscure The resource index table of res resource folder afterwards;Beat again wrapping using encrypted dex file, so file and resource file To encryption apk.In this encryption device, resource is obscured, and dex file, so file and resource file are carried out respectively Then the dex file of encryption, so file and resource file beat again packet again and obtain encryption apk by encryption, so that encryption apk Safety it is higher, improve the class of safety protection of application, this is one of important inventive point of the invention.
In one embodiment of apparatus of the present invention, the operation that the loading unit 202 executes includes: need to be to be mounted The path of apk is transferred to the first erection schedule of the load engine as parameter, and first erection schedule passes through the road Diameter parameter obtains apk;Judge whether the apk is encryption apk in the first erection schedule, if it is, by the encryption apk The dex file after being decrypted, so file and resource file is decrypted, and will decryption dex file, so file and resource file It beats again packet and generates decryption apk;The path of the decryption apk is passed to the second erection schedule as parameter by the first erection schedule, Second erection schedule is based on path parameter and obtains decryption apk and installed.
In square embodiment of the invention, it is provided in the load engine and judges whether apk encrypts and decrypt apk's Judge decryption unit, so that the encryption apk itself does not carry decrypted code, and during loading, using the first process into Row decryption, is installed using the second process, is free of decrypted code using itself by what the present apparatus was issued, decrypted code writes on In the android system of oneself customization, cracker wants to carry out cracking to source program must be simultaneously to the application of encryption and fixed The android system of system carries out conversed analysis, considerably increases and cracks difficulty, simultaneously because program is the Android by customizing System is decrypted rather than program itself is from decrypting, so operational efficiency is also above traditional shell adding mode, this is the present invention Important inventive point it is another.
In one embodiment of apparatus of the present invention, the operation that the running unit 202 executes includes: after operation decryption Apk when, runtime engine detect current system environment safety, judge current system whether be in root environment or debugging mould Formula, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.Cracker will carry out application inverse Debugging mode is opened simultaneously to root system is required when analysis substantially, detects current system safety in this operating procedure, if It was found that system is by root or opens debugging mode program out of service, this mode can prevent from applying from system level It is cracked, greatly improves the safety of application.
In order to detect current system environment safety, analysis unit is provided in the runtime engine, which sentences Disconnected unit for judge system environments whether safety.The analysis unit by judge system whether by root, be cracked, Determine whether system environments is safe by means such as decompilings.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part.
It should be noted last that: above embodiments only illustrate and not to limitation technical solution of the present invention, although reference Above-described embodiment describes the invention in detail, those skilled in the art should understand that: it still can be to this hair It is bright to be modified or replaced equivalently, it without departing from the spirit or scope of the invention, or any substitutions, should all It is included within the scope of the claims of the present invention.

Claims (15)

1. a kind of safety protecting method of Android platform application, which is characterized in that this method comprises:
Encrypting step is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Load step is installed after the encryption apk is decrypted in load engine;
Operating procedure runs the apk of the decryption of the installation in runtime engine.
2. the method according to claim 1, wherein the operation of the encrypting step includes:
Decompiling is carried out to the apk of acquisition and obtains the apk source file, traversal apk source file obtains res resource folder, and will Res resource folder is copied, and carries out weight to the resource file in the res resource folder after copy during copy Name, the res resource folder after being obscured encrypt the resource file copied while copy;It is traversing Dex file and so file are encrypted after obtaining dex file and so file when apk file;By the resource index table of the apk It is revised as referring to obscure the resource index table of rear res resource folder;Use encrypted dex file, so file and resource File beat again packet and obtains encryption apk.
3. according to the method described in claim 2, it is characterized in that, the operation of the load step includes:
The path of apk to be mounted will be needed to be transferred to first erection schedule for loading engine, first peace as parameter It puts into journey and apk is obtained by the path parameter;Judge whether the apk is encryption apk in the first erection schedule, if It is the dex file after being decrypted, so file and resource file then to be decrypted in the encryption apk, and will decryption dex text Part, so file and resource file beat again packet and generate decryption apk;First erection schedule is using the path of the decryption apk as parameter The second erection schedule is passed to, the second erection schedule is based on path parameter and obtains decryption apk and installed.
4. the method according to claim 1, wherein the operation of the operating procedure includes:
In the apk after operation is decrypted, runtime engine detects current system environment safety, judges whether current system is in Root environment or debugging mode, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.
5. according to the method described in claim 4, being used for it is characterized in that, being provided with analysis unit in the runtime engine Judge system environments whether safety.
6. according to the method described in claim 3, judging whether apk encrypts it is characterized in that, being provided in the load engine And the judgement decryption unit of decryption apk.
7. method according to claim 1-6, which is characterized in that the encryption apk itself does not carry decryption generation Code.
8. a kind of safety device of Android platform application, which is characterized in that the device includes:
Encryption unit, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Loading unit, for being installed after the encryption apk is decrypted in load engine;
Running unit, the apk of the decryption for running the installation in runtime engine.
9. device according to claim 8, which is characterized in that the operation that the encryption unit executes includes:
Decompiling is carried out to the apk of acquisition and obtains the apk source file, traversal apk source file obtains res resource folder, and will Res resource folder is copied, and carries out weight to the resource file in the res resource folder after copy during copy Name, the res resource folder after being obscured encrypt the resource file copied while copy;It is traversing Dex file and so file are encrypted after obtaining dex file and so file when apk file;By the resource index table of the apk It is revised as referring to obscure the resource index table of rear res resource folder;Use encrypted dex file, so file and resource File beat again packet and obtains encryption apk.
10. device according to claim 9, which is characterized in that the operation that the loading unit executes includes:
The path of apk to be mounted will be needed to be transferred to first erection schedule for loading engine, first peace as parameter It puts into journey and apk is obtained by the path parameter;Judge whether the apk is encryption apk in the first erection schedule, if It is the dex file after being decrypted, so file and resource file then to be decrypted in the encryption apk, and will decryption dex text Part, so file and resource file beat again packet and generate decryption apk;First erection schedule is using the path of the decryption apk as parameter The second erection schedule is passed to, the second erection schedule is based on path parameter and obtains decryption apk and installed.
11. device according to claim 8, which is characterized in that the operation that the running unit executes includes:
In the apk after operation is decrypted, runtime engine detects current system environment safety, judges whether current system is in Root environment or debugging mode, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.
12. device according to claim 11, which is characterized in that be provided with analysis unit use in the runtime engine In judge system environments whether safety.
13. device according to claim 10, which is characterized in that be provided in the load engine and judge whether apk adds Close and decryption apk judgement decryption unit.
14. according to the described in any item devices of claim 8-13, which is characterized in that the encryption apk itself does not carry decryption Code.
15. a kind of computer readable storage medium, which is characterized in that it is stored with computer program code on the storage medium, When the computer program code is computer-executed, perform claim requires any method of 1-7.
CN201811572188.1A 2018-12-21 2018-12-21 A kind of safety protecting method, device and the storage medium of Android platform application Pending CN109858203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811572188.1A CN109858203A (en) 2018-12-21 2018-12-21 A kind of safety protecting method, device and the storage medium of Android platform application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811572188.1A CN109858203A (en) 2018-12-21 2018-12-21 A kind of safety protecting method, device and the storage medium of Android platform application

Publications (1)

Publication Number Publication Date
CN109858203A true CN109858203A (en) 2019-06-07

Family

ID=66891788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811572188.1A Pending CN109858203A (en) 2018-12-21 2018-12-21 A kind of safety protecting method, device and the storage medium of Android platform application

Country Status (1)

Country Link
CN (1) CN109858203A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781462A (en) * 2019-10-10 2020-02-11 郑州阿帕斯科技有限公司 Resource confusion method and device
CN111049897A (en) * 2019-12-10 2020-04-21 北京百度网讯科技有限公司 Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package
CN111143789A (en) * 2019-12-05 2020-05-12 深圳市任子行科技开发有限公司 Method and device for confusing APK resource files
CN111191195A (en) * 2019-12-10 2020-05-22 航天信息股份有限公司 Method and device for protecting APK
CN112417484A (en) * 2020-11-26 2021-02-26 江苏通付盾信息安全技术有限公司 Resource file protection method and device, computer equipment and storage medium
CN113094664A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing android application program from being decompiled
CN113391119A (en) * 2021-06-15 2021-09-14 浙江东鸿电子股份有限公司 Multifunctional electric meter with built-in data encryption and encryption method thereof

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745141A (en) * 2013-12-02 2014-04-23 上海斐讯数据通信技术有限公司 Method for preventing application program in intelligent terminal android system from being decompiled
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
US20160335422A1 (en) * 2015-05-13 2016-11-17 SEWORKS, Inc. Apparatus and method for managing unity file in a mobile platform
CN106295255A (en) * 2015-05-27 2017-01-04 腾讯科技(深圳)有限公司 The reinforcement means of application program and device
US20170104787A1 (en) * 2015-10-09 2017-04-13 T-Mobile Usa, Inc. Logging encrypted data communications for qoe analysis
CN106709286A (en) * 2016-11-30 2017-05-24 江苏神州信源系统工程有限公司 Method for performing security reinforcement on apk resource package
CN106845171A (en) * 2017-01-20 2017-06-13 暨南大学 A kind of Android application codes protection mechanism discrimination method
CN107273723A (en) * 2017-07-07 2017-10-20 广东工业大学 A kind of Android platform applied software protection method based on so file shell addings
CN107609394A (en) * 2017-08-28 2018-01-19 上海移卓网络科技有限公司 Tamper resistant method, storage device and the device of Android installation kits
CN107820240A (en) * 2016-09-12 2018-03-20 山东量子科学技术研究院有限公司 Short message Encrypt and Decrypt method and Android operation system based on Android operation system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103745141A (en) * 2013-12-02 2014-04-23 上海斐讯数据通信技术有限公司 Method for preventing application program in intelligent terminal android system from being decompiled
CN104462959A (en) * 2014-12-04 2015-03-25 北京奇虎科技有限公司 Reinforcement protection method, sever and system for android app
US20160335422A1 (en) * 2015-05-13 2016-11-17 SEWORKS, Inc. Apparatus and method for managing unity file in a mobile platform
CN106295255A (en) * 2015-05-27 2017-01-04 腾讯科技(深圳)有限公司 The reinforcement means of application program and device
US20170104787A1 (en) * 2015-10-09 2017-04-13 T-Mobile Usa, Inc. Logging encrypted data communications for qoe analysis
CN107820240A (en) * 2016-09-12 2018-03-20 山东量子科学技术研究院有限公司 Short message Encrypt and Decrypt method and Android operation system based on Android operation system
CN106709286A (en) * 2016-11-30 2017-05-24 江苏神州信源系统工程有限公司 Method for performing security reinforcement on apk resource package
CN106845171A (en) * 2017-01-20 2017-06-13 暨南大学 A kind of Android application codes protection mechanism discrimination method
CN107273723A (en) * 2017-07-07 2017-10-20 广东工业大学 A kind of Android platform applied software protection method based on so file shell addings
CN107609394A (en) * 2017-08-28 2018-01-19 上海移卓网络科技有限公司 Tamper resistant method, storage device and the device of Android installation kits

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781462A (en) * 2019-10-10 2020-02-11 郑州阿帕斯科技有限公司 Resource confusion method and device
CN111143789A (en) * 2019-12-05 2020-05-12 深圳市任子行科技开发有限公司 Method and device for confusing APK resource files
CN111049897A (en) * 2019-12-10 2020-04-21 北京百度网讯科技有限公司 Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package
CN111191195A (en) * 2019-12-10 2020-05-22 航天信息股份有限公司 Method and device for protecting APK
CN111049897B (en) * 2019-12-10 2023-02-17 北京百度网讯科技有限公司 Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package
CN112417484A (en) * 2020-11-26 2021-02-26 江苏通付盾信息安全技术有限公司 Resource file protection method and device, computer equipment and storage medium
CN113094664A (en) * 2021-04-09 2021-07-09 每日互动股份有限公司 System for preventing android application program from being decompiled
CN113391119A (en) * 2021-06-15 2021-09-14 浙江东鸿电子股份有限公司 Multifunctional electric meter with built-in data encryption and encryption method thereof
CN113391119B (en) * 2021-06-15 2022-06-14 浙江东鸿电子股份有限公司 Multifunctional electric meter with built-in data encryption and encryption method thereof

Similar Documents

Publication Publication Date Title
CN109858203A (en) A kind of safety protecting method, device and the storage medium of Android platform application
Sufatrio et al. Securing android: a survey, taxonomy, and challenges
CN102760219B (en) A kind of Android platform software protection system, method and apparatus
KR100420569B1 (en) System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs
CN105683990B (en) Method and apparatus for protecting dynamic base
WO2017049800A1 (en) Method and apparatus for detecting loophole code in application
TWI530874B (en) Method and apparatus for generating application installation packages and running applications
WO2015192637A1 (en) Method and apparatus for reinforced protection of software installation package
CN106991298A (en) Access method, the authorization requests method and device of application program docking port
TW201721497A (en) Systems and methods for detection of malicious code in runtime generated code
CN106709286A (en) Method for performing security reinforcement on apk resource package
CN111191195A (en) Method and device for protecting APK
Lim et al. An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks.
WO2022078366A1 (en) Application protection method and apparatus, device and medium
CN107145781A (en) A kind of method and device that safety detection is carried out to application program
CN105825085B (en) The processing method and processing device of application program
Senanayake et al. Developing secured android applications by mitigating code vulnerabilities with machine learning
CN107368713B (en) Protect the method and security component of software
CN106888094B (en) A kind of endorsement method and server
CN104504310A (en) Method and device for software protection based on shell technology
CN106295263A (en) A kind of method and device realizing application reinforcing
CN109583191A (en) Cloud program control flow completeness protection method and device
CN107944233A (en) A kind of guard method of executable file and device
CN106254332A (en) Method, device and the server of a kind of safety desktop stream compression
Khan et al. A Comparative Analysis of Software Protection Schemes.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190607