CN110276173A - Dual system termi-nal with server prevents bis- packing operation methods of apk - Google Patents
Dual system termi-nal with server prevents bis- packing operation methods of apk Download PDFInfo
- Publication number
- CN110276173A CN110276173A CN201910526108.7A CN201910526108A CN110276173A CN 110276173 A CN110276173 A CN 110276173A CN 201910526108 A CN201910526108 A CN 201910526108A CN 110276173 A CN110276173 A CN 110276173A
- Authority
- CN
- China
- Prior art keywords
- apk
- dynamic base
- server
- value
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 230000009977 dual effect Effects 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 title claims abstract description 22
- 238000012856 packing Methods 0.000 title claims abstract description 22
- 230000002452 interceptive effect Effects 0.000 claims abstract description 15
- 230000000052 comparative effect Effects 0.000 claims abstract description 6
- 238000004891 communication Methods 0.000 claims description 9
- 238000005516 engineering process Methods 0.000 claims description 4
- 238000012795 verification Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 4
- 230000002787 reinforcement Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention, which discloses the dual system termi-nal with server, prevents bis- packing operation methods of apk, using the characteristic that correlation apk program md5 value can change after secondary packing, is embedded in dynamic base in apk program and disposes checking routine in first floor system;The md5 value of apk program is obtained by dynamic base when apk in interactive system starts and is transmitted on checking routine, md5 value is sent to server by checking routine, server makes comparisons the md5 value that dynamic base obtains apk program with the benchmark md5 value for corresponding to apk program on the server is prestored, and comparison result is sent to checking routine, checking routine is transferred to dynamic base again.Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.The present invention allows after apk decompiling, is unable to run.It is not easily disturbed and cracks the invention enables apk program.
Description
Technical field
The present invention relates to the dual system termi-nals with server to prevent bis- packing operation methods of apk.
Background technique
In the existing dual system termi-nal with Android, it can usually be integrated very with android as an interactive system
More apk software is analyzed after these apk softwares are often exported from terminal by people, then secondary packing, then
At product of the competition to after.
Summary of the invention
The purpose of the present invention is to provide the dual system termi-nals with server to prevent bis- packing operation methods of apk.
The technical solution adopted by the present invention is that:
Dual system termi-nal with server prevents bis- packing operation methods of apk, and dual system termi-nal is using Android system as interaction
As first floor system, first floor system connect with long-range server communication is located at for system and another system, and server is used for md5's
Verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom
Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school
Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this
Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
Further, the interactive system of the dual system termi-nal be Android system, first floor system be linux system or
Windows system.
Further, dynamic base and checking routine are communicated to connect by serial ports or USB port in step 2.
Further, the dynamic base in step 1 is to be renamed as the dynamic of .so using the executable program that c or c++ write
Library.
Further, the checking routine in step 2 is the executable program write using c or c++.
Further, dynamic base is first loaded onto memory automatically when apk program starts in step 3.
Further, in step 5 checking routine by md5 value that dynamic base is transmitted by being sent to clothes after the algorithm for encryption of agreement
Business device.
Further, place first is decrypted by the algorithm of agreement to the md5 value of encrypted dynamic base transmission in step 6
Reason.
The invention adopts the above technical scheme, utilizes the spy that correlation apk program md5 value can change after secondary packing
Property, dynamic base is embedded in apk program and disposes checking routine in first floor system;In turn, the apk in interactive system starts Shi Youdong
State library obtains the md5 value of apk program and is transmitted on the checking routine of first floor system, and checking routine is optional by received md5 value
It is sent to remote server after encryption, dynamic base is obtained the md5 value of apk program and the corresponding apk program prestored by server
Benchmark md5 value is made comparisons, and comparison result is sent to checking routine, and checking routine is transferred to dynamic base by serial ports or USB.
Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.This
Invention is by md5 value in server end, and server is long-range, and the process md5 value transmitted is encrypted, and is cracked more difficult.This
The interactive system of invention and the communication mode of first floor system are serial ports or usb connection, are the modes of wired credible connection, no
It, will not be by people's packet capturing by external interference.If the apk program in unauthorized terminal after decompiling and secondary packing, even if
It is mounted with also to be unable to run.Present to obscure tool and reinforcement tools are provided to that apk secondary be packaged, the present invention is to allow
After apk decompiling, it is unable to run.It is not easily disturbed and cracks the invention enables apk program.
Detailed description of the invention
The present invention is described in further details below in conjunction with the drawings and specific embodiments;
Fig. 1 is the flow diagram that the dual system termi-nal of the invention with server prevents apk bis- times packing operation methods.
Specific embodiment
As shown in Figure 1, the invention discloses the dual system termi-nals with server to prevent bis- packing operation methods of apk, it is double
System terminal is using Android system as interactive system and another system is as first floor system, first floor system and positioned at long-range service
Device communication connection, server be used for md5 verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom
Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school
Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this
Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
Further, the interactive system of the dual system termi-nal be Android system, first floor system be linux system or
Windows system.
Further, dynamic base and checking routine are communicated to connect by serial ports or USB port in step 2.
Further, the dynamic base in step 1 is to be renamed as the dynamic of .so using the executable program that c or c++ write
Library.
Further, the checking routine in step 2 is the executable program write using c or c++.
Further, dynamic base is first loaded onto memory automatically when apk program starts in step 3.
Further, in step 5 checking routine by md5 value that dynamic base is transmitted by being sent to clothes after the algorithm for encryption of agreement
Business device.
Further, place first is decrypted by the algorithm of agreement to the md5 value of encrypted dynamic base transmission in step 6
Reason.
The working principle of the invention is described in detail below:
With Android system when interactive system, when first floor system for the dual system termi-nal of linux system.
(1) the benchmark md5 that authorization will install apk program is put on some position of server.
(2) an executable program for verification is generated with programming language in advance, such as generating one with c/c++ can be performed
Program, the effect of the checking routine be first from liunx by the end android be transmitted through come apk md5 be transmitted to server end, sentence
Whether the md5 value of disconnected apk is modified, which is denoted as exe_A, and program exe_A is held on linux as checking routine
Row.
Communication equation has serial ports or usb, is denoted as an_exe_A, and the effect of this program is to increase the md5 value transmitting of apk
To exe_A,
(3) simultaneously utilize android jni technology, with c/c++ generate an executable program effect be and exe_A into
Row communication, communication equation have serial ports or usb, are denoted as an_exe_A, and the effect of an_exe_A program is to pass the md5 value of apk
It is incremented by exe_A.
(4) suffix name of an_exe_A is changed to .so so that it becomes a dynamic base, is denoted as a.so;Then by the dynamic
Library is put into the apk program of android, is compiled into apk program together;Dynamic base can be added automatically when the starting of apk program
It is downloaded in memory.Since the apk program that need to generally authorize is system apk, gives and can hold to a.so so apk program has permission
Capable permission so that the permission of dynamic base energy read-write system file.The other parts of apk program become the journey that can be executed
Sequence is behaved again.After a.so is behaved, first from interactive system program directory, i.e., read under/system/app/ catalogue
The md5 value of corresponding apk is taken, such as/system/app/tcm/tcm.apk, then the md5 value is passed to exe_A by a.so.
(5) exe_A will pass to server end after md5 value, after server receives md5 value, judge md5 value whether with put
Then md5 value one on the server to passing the result to exe_A again.
(5) after exe_A receives the judging result of server end, an_exe_A is passed to by way of serial ports or use,
If the result that an_exe_A is received is consistent, program is continued to run, it is different to just terminating program.
The invention adopts the above technical scheme, utilizes the spy that correlation apk program md5 value can change after secondary packing
Property, dynamic base is embedded in apk program and disposes checking routine in first floor system;In turn, the apk in interactive system starts Shi Youdong
State library obtains the md5 value of apk program and is transmitted on the checking routine of first floor system, and checking routine is optional by received md5 value
It is sent to remote server after encryption, dynamic base is obtained the md5 value of apk program and the corresponding apk program prestored by server
Benchmark md5 value is made comparisons, and comparison result is sent to checking routine, and checking routine is transferred to dynamic base by serial ports or USB.
Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.This
Invention is by md5 value in server end, and server is long-range, and the process md5 value transmitted is encrypted, and is cracked more difficult.This
The interactive system of invention and the communication mode of first floor system are serial ports or usb connection, are the modes of wired credible connection, no
It, will not be by people's packet capturing by external interference.If the apk program in unauthorized terminal after decompiling and secondary packing, even if
It is mounted with also to be unable to run.Present to obscure tool and reinforcement tools are provided to that apk secondary be packaged, the present invention is to allow
After apk decompiling, it is unable to run.It is not easily disturbed and cracks the invention enables apk program.
Claims (8)
1. the dual system termi-nal with server prevents bis- packing operation methods of apk, dual system termi-nal is using Android system as friendship
Mutual system and another system are used as first floor system, and first floor system is connect with positioned at long-range server communication, and server is for md5
Verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom
Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school
Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this
Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
2. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: the interactive system of the dual system termi-nal is Android system, and first floor system is linux system or Windows system.
3. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: dynamic base and checking routine pass through serial ports or USB port communication connection in step 2.
4. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: the dynamic base in step 1 is to be renamed as the dynamic base of .so using the executable program that c or c++ write.
5. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: the checking routine in step 2 is the executable program write using c or c++.
6. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: dynamic base is first loaded onto memory automatically when apk program starts in step 3.
7. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists
In: in step 5 checking routine by md5 value that dynamic base is transmitted by the algorithm for encryption of agreement after be sent to server.
8. the dual system termi-nal according to claim 7 with server prevents bis- packing operation methods of apk, feature exists
In: first the md5 value of encrypted dynamic base transmission is decrypted by the algorithm of agreement in step 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526108.7A CN110276173A (en) | 2019-06-18 | 2019-06-18 | Dual system termi-nal with server prevents bis- packing operation methods of apk |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910526108.7A CN110276173A (en) | 2019-06-18 | 2019-06-18 | Dual system termi-nal with server prevents bis- packing operation methods of apk |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110276173A true CN110276173A (en) | 2019-09-24 |
Family
ID=67960953
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910526108.7A Withdrawn CN110276173A (en) | 2019-06-18 | 2019-06-18 | Dual system termi-nal with server prevents bis- packing operation methods of apk |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110276173A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113496012A (en) * | 2020-04-03 | 2021-10-12 | 北京梆梆安全科技有限公司 | Secondary packaging detection method and device for application installation package |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016019790A1 (en) * | 2014-08-04 | 2016-02-11 | 优视科技有限公司 | Verification method, client, server and system for installation package |
CN106911502A (en) * | 2017-02-22 | 2017-06-30 | 烽火通信科技股份有限公司 | A kind of upgrade method and system of intelligent home gateway equipment |
CN106990993A (en) * | 2017-04-18 | 2017-07-28 | 北京元心科技有限公司 | Multi-system basic library file loading method and device |
CN109687974A (en) * | 2018-12-26 | 2019-04-26 | 努比亚技术有限公司 | APK verification method, device, mobile terminal and readable storage medium storing program for executing |
-
2019
- 2019-06-18 CN CN201910526108.7A patent/CN110276173A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016019790A1 (en) * | 2014-08-04 | 2016-02-11 | 优视科技有限公司 | Verification method, client, server and system for installation package |
CN106911502A (en) * | 2017-02-22 | 2017-06-30 | 烽火通信科技股份有限公司 | A kind of upgrade method and system of intelligent home gateway equipment |
CN106990993A (en) * | 2017-04-18 | 2017-07-28 | 北京元心科技有限公司 | Multi-system basic library file loading method and device |
CN109687974A (en) * | 2018-12-26 | 2019-04-26 | 努比亚技术有限公司 | APK verification method, device, mobile terminal and readable storage medium storing program for executing |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113496012A (en) * | 2020-04-03 | 2021-10-12 | 北京梆梆安全科技有限公司 | Secondary packaging detection method and device for application installation package |
CN113496012B (en) * | 2020-04-03 | 2023-11-03 | 北京梆梆安全科技有限公司 | Secondary packaging detection method and device for application installation package |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8205096B2 (en) | Software license embedded in shell code | |
US20160203087A1 (en) | Method for providing security for common intermediate language-based program | |
US8984272B2 (en) | Information processing apparatus, secure module, information processing method, and computer product | |
US9152773B2 (en) | Communication apparatus and secure module including function for disabling encrypted communication | |
CN103617401B (en) | Method and device for protecting data files | |
TWI541669B (en) | Detection systems and methods for static detection applications, and computer program products | |
KR20180093038A (en) | A mobile device with a trusted execution environment | |
CN107430650B (en) | Securing computer programs against reverse engineering | |
CN110333868B (en) | Method and system for generating installation packages of sub-applications | |
US20180373848A1 (en) | A build system with plugins for encryption of application components | |
EA012921B1 (en) | Method and device for protecting software from unauthorized use | |
CN105631312A (en) | Method and system for processing rogue programs | |
Velu | Mobile Application Penetration Testing | |
CN110276173A (en) | Dual system termi-nal with server prevents bis- packing operation methods of apk | |
TWI393006B (en) | Security system and method for code dump protection | |
CN110704814B (en) | Anti-copy method and device, and storage medium | |
WO2019178787A1 (en) | Chip access method, microchip, smart card, and debugging device | |
CN106657551A (en) | Method and system for preventing mobile terminal from being unlocked | |
CN110276174A (en) | Dual system termi-nal based on Android prevents bis- packing operation methods of apk | |
KR101711024B1 (en) | Method for accessing temper-proof device and apparatus enabling of the method | |
Ma et al. | Certified copy? Understanding security risks of Wi-Fi hotspot based Android data clone services | |
US20180121660A1 (en) | Apparatus and method for dynamic binary analysis on hardware board | |
CN110309655B (en) | Method and device for detecting safety in APP updating process | |
KR20200100565A (en) | Method and server for analyzing weak point through library injection | |
KR101711926B1 (en) | SoC having security features, and security method for SoC |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190924 |