CN109858203A - A kind of safety protecting method, device and the storage medium of Android platform application - Google Patents
A kind of safety protecting method, device and the storage medium of Android platform application Download PDFInfo
- Publication number
- CN109858203A CN109858203A CN201811572188.1A CN201811572188A CN109858203A CN 109858203 A CN109858203 A CN 109858203A CN 201811572188 A CN201811572188 A CN 201811572188A CN 109858203 A CN109858203 A CN 109858203A
- Authority
- CN
- China
- Prior art keywords
- apk
- file
- decryption
- encryption
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention provides safety protecting method, device and the storage mediums of a kind of application of Android platform.This method comprises: encrypting step, is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;Load step is installed after the encryption apk is decrypted in custom-built system load engine;Operating procedure runs the apk of the decryption of the installation in custom-built system runtime engine.The present invention obscures resource, and the dex file that will be encrypted respectively, so file, resource file etc. beat again packet and obtains encryption apk, so that safety is higher, improve the class of safety protection of application, and that issues is free of decrypted code using itself, decrypted code has write in the android system of customization, cracker wants to carry out cracking to source program and must carry out conversed analysis to the android system of the application of encryption and customization simultaneously, it considerably increases and cracks difficulty, simultaneously because program be decrypted by the android system customized rather than program itself from decrypt, improve the operational efficiency of application.
Description
Technical field
The present invention relates to apply security technology area, especially a kind of safety protecting method, the dress of Android platform application
It sets and storage medium.
Background technique
The safety protection technique of mainstream is more in android system at present, has signature check, obscures, anti-debug, application
Anti- dump of shell adding, memory etc., these technologies can prevent reverse cracker from carrying out conversed analysis to application to a certain extent.
Partial protection technology is described below, it is simply introduced.
Signature check, signature, which refers to signer, indicates the identity of oneself by new data that certain crypto-operation generates,
Recipient can confirm signer by verifying digital signature.Android system requires all application programs to must have number
Word signature, the application program of digital signature can not installed.Signature check technology refers to opening when program starts
One section of code for being used to verify current application signing messages is added in dynamic code, and the signature of current application is detected in program operation
It is whether consistent with signature when publication, if it is continuing to run, application is otherwise indicated by malicious modification, signature has occurred and that
Change, the operation of direct terminator at this time.
Obscure introduction, aliasing strategy be each application must a kind of increased prevention policies, using obscure not only for
Protection, also for the size for reducing application installation package, so it must a Xiang Gong to be added before being each application publication
Energy.Present aliasing strategy is typically all to be divided into two kinds, and one is obscuring for code, and one is resource files to obscure.
It is to be quickly grown, safety higher one using extensively currently on the market using this method of shell adding using shell adding
Kind guard technology.It is exactly to hide the code for needing the apk (source apk) encrypted in place of the core of this technology, keeps reverse personnel anti-
Relevant code can not be directly obtained after compiling apk, to protect to the code of source apk.Using shell adding by generation upon generation of
Development, up to the present developed out dex integrally encrypt, the encryption technologies such as dex method detaches, vmp.
These technologies can prevent from increasing the safety of code using maliciously being cracked to a certain extent.However
Obscure lower with signature check safety, shell adding disadvantage is also that cannot be neglected, compatibility there is a problem of it is bigger, simultaneously
Due to needing first to decrypt source program dex using itself before application operation or method restores, so operational efficiency is lower,
Source application is decrypted simultaneously or the code of method reduction has also been stored in the apk of publication, cracker still can lead to
Conversed analysis decrypted code is crossed to shell.
Summary of the invention
The present invention is directed to above-mentioned defect in the prior art, proposes following technical solution.
A kind of safety protecting method of Android platform application, this method comprises:
Encrypting step is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Load step is installed after the encryption apk is decrypted in load engine;
Operating procedure runs the apk of the decryption of the installation in runtime engine.
Further, the operation of the encrypting step includes: and carries out decompiling to the apk of acquisition to obtain the apk source document
Part, traversal apk source file obtains res resource folder, and res resource folder is copied, right during copy
The resource file in res resource folder after copy is renamed, and the res resource folder after being obscured is copying
While the resource file copied is encrypted;It is obtained when traversing apk file after dex file and so file to dex text
Part and so file are encrypted;The resource index table of the apk is revised as to refer to obscure the resource of rear res resource folder
Concordance list;Beat again packet using encrypted dex file, so file and resource file and obtains encryption apk.
Further, the operation of the load step includes: that the path of apk to be mounted will be needed to be transferred to as parameter
First erection schedule of the load engine, first erection schedule obtain apk by the path parameter;In the first installation
Judge whether the apk is encryption apk in process, if it is, the dex after being decrypted is decrypted in the encryption apk
File, so file and resource file, and decryption dex file, so file and resource file are beaten again into packet and generate decryption apk;First
The path of the decryption apk is passed to the second erection schedule as parameter by erection schedule, and the second erection schedule is joined based on path
Number obtains decryption apk and is installed.
Further, when the operation of the operating procedure includes: the apk after operation decryption, runtime engine detection is worked as
Preceding system environments safety, judges whether current system is in root environment or debugging mode, if it is not, after decryption
Apk brings into operation, the apk operation after otherwise stopping decryption.
Further, analysis unit is provided in the runtime engine for judging whether system environments is safe
Property.
Further, the judgement decryption list for judging whether apk encrypts and decrypt apk is provided in the load engine
Member.
Further, the encryption apk itself does not carry decrypted code.
The invention also provides a kind of safety device of Android platform application, which includes:
Encryption unit, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Loading unit, for being installed after the encryption apk is decrypted in load engine;
Running unit, the apk of the decryption for running the installation in runtime engine.
Further, the operation that the encryption unit executes includes: to carry out decompiling to the apk of acquisition to obtain the apk
Source file, traversal apk source file obtains res resource folder, and res resource folder is copied, in the process of copy
In the resource file in the res resource folder after copy is renamed, the res resource folder after being obscured,
The resource file copied is encrypted while copy;It is right after dex file and so file to obtain when traversing apk file
Dex file and so file are encrypted;The resource index table of the apk is revised as to refer to obscure rear res resource folder
Resource index table;Beat again packet using encrypted dex file, so file and resource file and obtains encryption apk.
Further, the operation that the loading unit executes includes: that the path of apk to be mounted will be needed to pass as parameter
It is handed to the first erection schedule of the load engine, first erection schedule obtains apk by the path parameter;First
Judge whether the apk is encryption apk in erection schedule, if it is, after the encryption apk is decrypted being decrypted
Dex file, so file and resource file, and decryption dex file, so file and resource file are beaten again into packet and generate decryption apk;The
The path of the decryption apk is passed to the second erection schedule as parameter by one erection schedule, and the second erection schedule is based on path
Parameter obtains decryption apk and is installed.
Further, when the operation that the running unit executes includes: the apk after operation decryption, runtime engine inspection
Current system environment safety is surveyed, judges whether current system is in root environment or debugging mode, if it is not, after decryption
Apk bring into operation, otherwise stop decryption after apk operation.
Further, analysis unit is provided in the runtime engine for judging whether system environments is safe
Property.
Further, the judgement decryption list for judging whether apk encrypts and decrypt apk is provided in the load engine
Member.
Further, the encryption apk itself does not carry decrypted code.
The invention also provides a kind of computer readable storage mediums, which is characterized in that is stored on the storage medium
Computer program code executes above-mentioned any method when the computer program code is computer-executed.
Technical effect of the invention are as follows: in encryption method of the invention, resource is obscured, and to dex file, so text
Part and resource file are encrypted respectively, then carry out the dex file of encryption, so file and the resource file to beat again packet obtaining again
Apk is encrypted, so that the safety of encryption apk is higher, improves the class of safety protection of application, and that issues is free of using itself
Decrypted code, decrypted code have write in the android system of oneself customization, and cracker wants crack to source program necessary
Simultaneously to the android system while conversed analysis of the application of encryption and customization, considerably increases and crack difficulty, simultaneously because journey
Sequence installation before be program is decrypted by the android system customized rather than program itself from decrypt, so improving
The operational efficiency of application.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon.
Fig. 1 is a kind of flow chart of the safety protecting method of Android platform application of embodiment according to the present invention.
Fig. 2 is a kind of structure chart of the safety device of Android platform application of embodiment according to the present invention.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 shows a kind of safety protecting method of Android platform application of the invention, this method comprises:
Encrypting step S101 is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition.In order to improve application
Safety encrypted to obtain encryption apk, encryption method after carrying out decompiling to the apk of acquisition in encrypting step S101
The existing encryption methods such as symmetrical, asymmetric can be used, to improve the class of safety protection of application.
Load step S102 is installed after the encryption apk is decrypted in load engine.
Engine is loaded, in order to behave encrypted application, in load step S102, by modifying Android
System source code, the insertion load engine before the code of android system installation application executes.It is answered in load engine
Decryption and installation.
Operating procedure S103 runs the apk of the decryption of the installation in runtime engine.
Runtime engine, cracker cracks application in order to prevent, in operating procedure S103, passes through modification
Runtime engine is added before the code of android system operation application executes, in the operation in android system source code
The detection that system environments safety is carried out in engine shuts down procedure operation if discovery current system is there are security risk.I.e. originally
Load engine and runtime engine will be provided in android system in invention, so that android system used in the present invention is
The android system of customization realizes the installation and operation of apk by load engine and runtime engine, improves the peace of apk operation
Quan Xing.
In one embodiment of the method for the present invention, the operation of the encrypting step S101 includes: to carry out to the apk of acquisition
Decompiling obtains the apk source file, and traversal apk source file obtains res resource folder, and res resource folder is copied
Shellfish renames the resource file in the res resource folder after copy during copy, after being obscured
Res resource folder encrypts the resource file copied while copy;Dex text is obtained when traversing apk file
Dex file and so file are encrypted after part and so file;The resource index table of the apk is revised as after referring to obscure
The resource index table of res resource folder;It carries out beating again packet using encrypted dex file, so file and resource file and obtain
Encrypt apk.In this encryption method, resource is obscured, and dex file, so file and resource file are added respectively
It is close, then the dex file of encryption, so file and resource file beat again packet again and obtains encryption apk, so that encryption apk
Safety is higher, improves the class of safety protection of application, this is one of important inventive point of the invention.
In one embodiment of the method for the present invention, the operation of the load step S102 includes: need to apk to be mounted
Path the first erection schedule of the load engine is transferred to as parameter, first erection schedule joined by the path
Number obtains apk;Judge whether the apk is encryption apk in the first erection schedule, if it is, the encryption apk is carried out
Dex file, so file and resource file after being decrypted, and decryption dex file, so file and resource file are beaten again
Packet generates decryption apk;The path of the decryption apk is passed to the second erection schedule as parameter by the first erection schedule, and second
Erection schedule is based on path parameter and obtains decryption apk and installed.
In square embodiment of the invention, it is provided in the load engine and judges whether apk encrypts and decrypt apk's
Judge decryption unit, so that the encryption apk itself does not carry decrypted code, and during loading, using the first process into
Row decryption, is installed using the second process, is free of decrypted code using itself by what this method was issued, decrypted code writes on
In the android system of oneself customization, cracker wants to carry out cracking to source program must be simultaneously to the application of encryption and fixed
The android system of system carries out conversed analysis, considerably increases and cracks difficulty, simultaneously because program is the Android by customizing
System is decrypted rather than program itself is from decrypting, so operational efficiency is also above traditional shell adding mode, this is the present invention
Important inventive point it is another.
In one embodiment of the method for the present invention, the operation of the operating procedure S103 includes: after operation decryption
When apk, runtime engine detects current system environment safety, judges whether current system is in root environment or debugging mould
Formula, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.Cracker will carry out application inverse
Debugging mode is opened simultaneously to root system is required when analysis substantially, detection current system safety in this operating procedure S103
Property, if discovery system by root or opens debugging mode program out of service, this mode can prevent from system level
Only application is cracked, and greatly improves the safety of application.
In order to detect current system environment safety, analysis unit is provided in the runtime engine, which sentences
Disconnected unit for judge system environments whether safety.The analysis unit by judge system whether by root, be cracked,
Determine whether system environments is safe by means such as decompilings.
With further reference to Fig. 2, as the realization to above-mentioned Fig. 1 shown device, this application provides a kind of Android platforms
One embodiment of the safety device of application, the Installation practice is corresponding with Installation practice shown in FIG. 1, the device
Specifically it may include in various electronic equipments.
Fig. 2 shows a kind of safety device of Android platform of the invention application, which includes:
Encryption unit 201, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition.It is answered to improve
Safety is encrypted to obtain encryption apk, encryption dress in encryption unit 201 after carrying out decompiling to the apk of acquisition
It sets and the existing encryption devices such as symmetrical, asymmetric can be used, to improve the class of safety protection of application.
Loading unit 202, for being installed after the encryption apk is decrypted in load engine.
Engine is loaded, in order to behave encrypted application, in loading unit S102, by modifying Android
System source code, the insertion load engine before the code of android system installation application executes.It is answered in load engine
Decryption and installation.
Running unit 203, the apk of the decryption for running the installation in runtime engine.
Runtime engine, cracker cracks application in order to prevent, in running unit S103, passes through modification
Runtime engine is added before the code of android system operation application executes, in the operation in android system source code
The detection that system environments safety is carried out in engine shuts down procedure operation if discovery current system is there are security risk.I.e. originally
Load engine and runtime engine will be provided in android system in invention, so that android system used in the present invention is
The android system of customization realizes the installation and operation of apk by load engine and runtime engine, improves the peace of apk operation
Quan Xing.
In one embodiment of apparatus of the present invention, the operation that the encryption unit 201 executes includes: the apk to acquisition
Carry out decompiling and obtain the apk source file, traversal apk source file obtains res resource folder, and by res resource folder into
Row copy, renames the resource file in the res resource folder after copy during copy, after being obscured
Res resource folder, copy while the resource file copied is encrypted;Dex is obtained when traversing apk file
Dex file and so file are encrypted after file and so file;The resource index table of the apk is revised as referring to obscure
The resource index table of res resource folder afterwards;Beat again wrapping using encrypted dex file, so file and resource file
To encryption apk.In this encryption device, resource is obscured, and dex file, so file and resource file are carried out respectively
Then the dex file of encryption, so file and resource file beat again packet again and obtain encryption apk by encryption, so that encryption apk
Safety it is higher, improve the class of safety protection of application, this is one of important inventive point of the invention.
In one embodiment of apparatus of the present invention, the operation that the loading unit 202 executes includes: need to be to be mounted
The path of apk is transferred to the first erection schedule of the load engine as parameter, and first erection schedule passes through the road
Diameter parameter obtains apk;Judge whether the apk is encryption apk in the first erection schedule, if it is, by the encryption apk
The dex file after being decrypted, so file and resource file is decrypted, and will decryption dex file, so file and resource file
It beats again packet and generates decryption apk;The path of the decryption apk is passed to the second erection schedule as parameter by the first erection schedule,
Second erection schedule is based on path parameter and obtains decryption apk and installed.
In square embodiment of the invention, it is provided in the load engine and judges whether apk encrypts and decrypt apk's
Judge decryption unit, so that the encryption apk itself does not carry decrypted code, and during loading, using the first process into
Row decryption, is installed using the second process, is free of decrypted code using itself by what the present apparatus was issued, decrypted code writes on
In the android system of oneself customization, cracker wants to carry out cracking to source program must be simultaneously to the application of encryption and fixed
The android system of system carries out conversed analysis, considerably increases and cracks difficulty, simultaneously because program is the Android by customizing
System is decrypted rather than program itself is from decrypting, so operational efficiency is also above traditional shell adding mode, this is the present invention
Important inventive point it is another.
In one embodiment of apparatus of the present invention, the operation that the running unit 202 executes includes: after operation decryption
Apk when, runtime engine detect current system environment safety, judge current system whether be in root environment or debugging mould
Formula, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.Cracker will carry out application inverse
Debugging mode is opened simultaneously to root system is required when analysis substantially, detects current system safety in this operating procedure, if
It was found that system is by root or opens debugging mode program out of service, this mode can prevent from applying from system level
It is cracked, greatly improves the safety of application.
In order to detect current system environment safety, analysis unit is provided in the runtime engine, which sentences
Disconnected unit for judge system environments whether safety.The analysis unit by judge system whether by root, be cracked,
Determine whether system environments is safe by means such as decompilings.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product
It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment
Method described in part.
It should be noted last that: above embodiments only illustrate and not to limitation technical solution of the present invention, although reference
Above-described embodiment describes the invention in detail, those skilled in the art should understand that: it still can be to this hair
It is bright to be modified or replaced equivalently, it without departing from the spirit or scope of the invention, or any substitutions, should all
It is included within the scope of the claims of the present invention.
Claims (15)
1. a kind of safety protecting method of Android platform application, which is characterized in that this method comprises:
Encrypting step is encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Load step is installed after the encryption apk is decrypted in load engine;
Operating procedure runs the apk of the decryption of the installation in runtime engine.
2. the method according to claim 1, wherein the operation of the encrypting step includes:
Decompiling is carried out to the apk of acquisition and obtains the apk source file, traversal apk source file obtains res resource folder, and will
Res resource folder is copied, and carries out weight to the resource file in the res resource folder after copy during copy
Name, the res resource folder after being obscured encrypt the resource file copied while copy;It is traversing
Dex file and so file are encrypted after obtaining dex file and so file when apk file;By the resource index table of the apk
It is revised as referring to obscure the resource index table of rear res resource folder;Use encrypted dex file, so file and resource
File beat again packet and obtains encryption apk.
3. according to the method described in claim 2, it is characterized in that, the operation of the load step includes:
The path of apk to be mounted will be needed to be transferred to first erection schedule for loading engine, first peace as parameter
It puts into journey and apk is obtained by the path parameter;Judge whether the apk is encryption apk in the first erection schedule, if
It is the dex file after being decrypted, so file and resource file then to be decrypted in the encryption apk, and will decryption dex text
Part, so file and resource file beat again packet and generate decryption apk;First erection schedule is using the path of the decryption apk as parameter
The second erection schedule is passed to, the second erection schedule is based on path parameter and obtains decryption apk and installed.
4. the method according to claim 1, wherein the operation of the operating procedure includes:
In the apk after operation is decrypted, runtime engine detects current system environment safety, judges whether current system is in
Root environment or debugging mode, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.
5. according to the method described in claim 4, being used for it is characterized in that, being provided with analysis unit in the runtime engine
Judge system environments whether safety.
6. according to the method described in claim 3, judging whether apk encrypts it is characterized in that, being provided in the load engine
And the judgement decryption unit of decryption apk.
7. method according to claim 1-6, which is characterized in that the encryption apk itself does not carry decryption generation
Code.
8. a kind of safety device of Android platform application, which is characterized in that the device includes:
Encryption unit, for being encrypted to obtain encryption apk after carrying out decompiling to the apk of acquisition;
Loading unit, for being installed after the encryption apk is decrypted in load engine;
Running unit, the apk of the decryption for running the installation in runtime engine.
9. device according to claim 8, which is characterized in that the operation that the encryption unit executes includes:
Decompiling is carried out to the apk of acquisition and obtains the apk source file, traversal apk source file obtains res resource folder, and will
Res resource folder is copied, and carries out weight to the resource file in the res resource folder after copy during copy
Name, the res resource folder after being obscured encrypt the resource file copied while copy;It is traversing
Dex file and so file are encrypted after obtaining dex file and so file when apk file;By the resource index table of the apk
It is revised as referring to obscure the resource index table of rear res resource folder;Use encrypted dex file, so file and resource
File beat again packet and obtains encryption apk.
10. device according to claim 9, which is characterized in that the operation that the loading unit executes includes:
The path of apk to be mounted will be needed to be transferred to first erection schedule for loading engine, first peace as parameter
It puts into journey and apk is obtained by the path parameter;Judge whether the apk is encryption apk in the first erection schedule, if
It is the dex file after being decrypted, so file and resource file then to be decrypted in the encryption apk, and will decryption dex text
Part, so file and resource file beat again packet and generate decryption apk;First erection schedule is using the path of the decryption apk as parameter
The second erection schedule is passed to, the second erection schedule is based on path parameter and obtains decryption apk and installed.
11. device according to claim 8, which is characterized in that the operation that the running unit executes includes:
In the apk after operation is decrypted, runtime engine detects current system environment safety, judges whether current system is in
Root environment or debugging mode, if it is not, the apk after decryption brings into operation, the apk operation after otherwise stopping decryption.
12. device according to claim 11, which is characterized in that be provided with analysis unit use in the runtime engine
In judge system environments whether safety.
13. device according to claim 10, which is characterized in that be provided in the load engine and judge whether apk adds
Close and decryption apk judgement decryption unit.
14. according to the described in any item devices of claim 8-13, which is characterized in that the encryption apk itself does not carry decryption
Code.
15. a kind of computer readable storage medium, which is characterized in that it is stored with computer program code on the storage medium,
When the computer program code is computer-executed, perform claim requires any method of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811572188.1A CN109858203A (en) | 2018-12-21 | 2018-12-21 | A kind of safety protecting method, device and the storage medium of Android platform application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811572188.1A CN109858203A (en) | 2018-12-21 | 2018-12-21 | A kind of safety protecting method, device and the storage medium of Android platform application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109858203A true CN109858203A (en) | 2019-06-07 |
Family
ID=66891788
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811572188.1A Pending CN109858203A (en) | 2018-12-21 | 2018-12-21 | A kind of safety protecting method, device and the storage medium of Android platform application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109858203A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110781462A (en) * | 2019-10-10 | 2020-02-11 | 郑州阿帕斯科技有限公司 | Resource confusion method and device |
CN111049897A (en) * | 2019-12-10 | 2020-04-21 | 北京百度网讯科技有限公司 | Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package |
CN111143789A (en) * | 2019-12-05 | 2020-05-12 | 深圳市任子行科技开发有限公司 | Method and device for confusing APK resource files |
CN111191195A (en) * | 2019-12-10 | 2020-05-22 | 航天信息股份有限公司 | Method and device for protecting APK |
CN112417484A (en) * | 2020-11-26 | 2021-02-26 | 江苏通付盾信息安全技术有限公司 | Resource file protection method and device, computer equipment and storage medium |
CN113094664A (en) * | 2021-04-09 | 2021-07-09 | 每日互动股份有限公司 | System for preventing android application program from being decompiled |
CN113391119A (en) * | 2021-06-15 | 2021-09-14 | 浙江东鸿电子股份有限公司 | Multifunctional electric meter with built-in data encryption and encryption method thereof |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745141A (en) * | 2013-12-02 | 2014-04-23 | 上海斐讯数据通信技术有限公司 | Method for preventing application program in intelligent terminal android system from being decompiled |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
US20160335422A1 (en) * | 2015-05-13 | 2016-11-17 | SEWORKS, Inc. | Apparatus and method for managing unity file in a mobile platform |
CN106295255A (en) * | 2015-05-27 | 2017-01-04 | 腾讯科技(深圳)有限公司 | The reinforcement means of application program and device |
US20170104787A1 (en) * | 2015-10-09 | 2017-04-13 | T-Mobile Usa, Inc. | Logging encrypted data communications for qoe analysis |
CN106709286A (en) * | 2016-11-30 | 2017-05-24 | 江苏神州信源系统工程有限公司 | Method for performing security reinforcement on apk resource package |
CN106845171A (en) * | 2017-01-20 | 2017-06-13 | 暨南大学 | A kind of Android application codes protection mechanism discrimination method |
CN107273723A (en) * | 2017-07-07 | 2017-10-20 | 广东工业大学 | A kind of Android platform applied software protection method based on so file shell addings |
CN107609394A (en) * | 2017-08-28 | 2018-01-19 | 上海移卓网络科技有限公司 | Tamper resistant method, storage device and the device of Android installation kits |
CN107820240A (en) * | 2016-09-12 | 2018-03-20 | 山东量子科学技术研究院有限公司 | Short message Encrypt and Decrypt method and Android operation system based on Android operation system |
-
2018
- 2018-12-21 CN CN201811572188.1A patent/CN109858203A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103745141A (en) * | 2013-12-02 | 2014-04-23 | 上海斐讯数据通信技术有限公司 | Method for preventing application program in intelligent terminal android system from being decompiled |
CN104462959A (en) * | 2014-12-04 | 2015-03-25 | 北京奇虎科技有限公司 | Reinforcement protection method, sever and system for android app |
US20160335422A1 (en) * | 2015-05-13 | 2016-11-17 | SEWORKS, Inc. | Apparatus and method for managing unity file in a mobile platform |
CN106295255A (en) * | 2015-05-27 | 2017-01-04 | 腾讯科技(深圳)有限公司 | The reinforcement means of application program and device |
US20170104787A1 (en) * | 2015-10-09 | 2017-04-13 | T-Mobile Usa, Inc. | Logging encrypted data communications for qoe analysis |
CN107820240A (en) * | 2016-09-12 | 2018-03-20 | 山东量子科学技术研究院有限公司 | Short message Encrypt and Decrypt method and Android operation system based on Android operation system |
CN106709286A (en) * | 2016-11-30 | 2017-05-24 | 江苏神州信源系统工程有限公司 | Method for performing security reinforcement on apk resource package |
CN106845171A (en) * | 2017-01-20 | 2017-06-13 | 暨南大学 | A kind of Android application codes protection mechanism discrimination method |
CN107273723A (en) * | 2017-07-07 | 2017-10-20 | 广东工业大学 | A kind of Android platform applied software protection method based on so file shell addings |
CN107609394A (en) * | 2017-08-28 | 2018-01-19 | 上海移卓网络科技有限公司 | Tamper resistant method, storage device and the device of Android installation kits |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110781462A (en) * | 2019-10-10 | 2020-02-11 | 郑州阿帕斯科技有限公司 | Resource confusion method and device |
CN111143789A (en) * | 2019-12-05 | 2020-05-12 | 深圳市任子行科技开发有限公司 | Method and device for confusing APK resource files |
CN111049897A (en) * | 2019-12-10 | 2020-04-21 | 北京百度网讯科技有限公司 | Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package |
CN111191195A (en) * | 2019-12-10 | 2020-05-22 | 航天信息股份有限公司 | Method and device for protecting APK |
CN111049897B (en) * | 2019-12-10 | 2023-02-17 | 北京百度网讯科技有限公司 | Method, device, equipment and medium for encrypted uploading and decrypted deployment of small program package |
CN112417484A (en) * | 2020-11-26 | 2021-02-26 | 江苏通付盾信息安全技术有限公司 | Resource file protection method and device, computer equipment and storage medium |
CN113094664A (en) * | 2021-04-09 | 2021-07-09 | 每日互动股份有限公司 | System for preventing android application program from being decompiled |
CN113391119A (en) * | 2021-06-15 | 2021-09-14 | 浙江东鸿电子股份有限公司 | Multifunctional electric meter with built-in data encryption and encryption method thereof |
CN113391119B (en) * | 2021-06-15 | 2022-06-14 | 浙江东鸿电子股份有限公司 | Multifunctional electric meter with built-in data encryption and encryption method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109858203A (en) | A kind of safety protecting method, device and the storage medium of Android platform application | |
Sufatrio et al. | Securing android: a survey, taxonomy, and challenges | |
CN102760219B (en) | A kind of Android platform software protection system, method and apparatus | |
KR100420569B1 (en) | System and method for generating trusted, architecture specific, compiled versions of architecture neutral programs | |
CN105683990B (en) | Method and apparatus for protecting dynamic base | |
WO2017049800A1 (en) | Method and apparatus for detecting loophole code in application | |
TWI530874B (en) | Method and apparatus for generating application installation packages and running applications | |
WO2015192637A1 (en) | Method and apparatus for reinforced protection of software installation package | |
CN106991298A (en) | Access method, the authorization requests method and device of application program docking port | |
TW201721497A (en) | Systems and methods for detection of malicious code in runtime generated code | |
CN106709286A (en) | Method for performing security reinforcement on apk resource package | |
CN111191195A (en) | Method and device for protecting APK | |
Lim et al. | An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. | |
WO2022078366A1 (en) | Application protection method and apparatus, device and medium | |
CN107145781A (en) | A kind of method and device that safety detection is carried out to application program | |
CN105825085B (en) | The processing method and processing device of application program | |
Senanayake et al. | Developing secured android applications by mitigating code vulnerabilities with machine learning | |
CN107368713B (en) | Protect the method and security component of software | |
CN106888094B (en) | A kind of endorsement method and server | |
CN104504310A (en) | Method and device for software protection based on shell technology | |
CN106295263A (en) | A kind of method and device realizing application reinforcing | |
CN109583191A (en) | Cloud program control flow completeness protection method and device | |
CN107944233A (en) | A kind of guard method of executable file and device | |
CN106254332A (en) | Method, device and the server of a kind of safety desktop stream compression | |
Khan et al. | A Comparative Analysis of Software Protection Schemes. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190607 |