CN110276173A - Dual system termi-nal with server prevents bis- packing operation methods of apk - Google Patents

Dual system termi-nal with server prevents bis- packing operation methods of apk Download PDF

Info

Publication number
CN110276173A
CN110276173A CN201910526108.7A CN201910526108A CN110276173A CN 110276173 A CN110276173 A CN 110276173A CN 201910526108 A CN201910526108 A CN 201910526108A CN 110276173 A CN110276173 A CN 110276173A
Authority
CN
China
Prior art keywords
apk
dynamic base
server
value
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910526108.7A
Other languages
Chinese (zh)
Inventor
冯振海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Institute Of Data Technology Co Ltd
Original Assignee
Fuzhou Institute Of Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Institute Of Data Technology Co Ltd filed Critical Fuzhou Institute Of Data Technology Co Ltd
Priority to CN201910526108.7A priority Critical patent/CN110276173A/en
Publication of CN110276173A publication Critical patent/CN110276173A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention, which discloses the dual system termi-nal with server, prevents bis- packing operation methods of apk, using the characteristic that correlation apk program md5 value can change after secondary packing, is embedded in dynamic base in apk program and disposes checking routine in first floor system;The md5 value of apk program is obtained by dynamic base when apk in interactive system starts and is transmitted on checking routine, md5 value is sent to server by checking routine, server makes comparisons the md5 value that dynamic base obtains apk program with the benchmark md5 value for corresponding to apk program on the server is prestored, and comparison result is sent to checking routine, checking routine is transferred to dynamic base again.Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.The present invention allows after apk decompiling, is unable to run.It is not easily disturbed and cracks the invention enables apk program.

Description

Dual system termi-nal with server prevents bis- packing operation methods of apk
Technical field
The present invention relates to the dual system termi-nals with server to prevent bis- packing operation methods of apk.
Background technique
In the existing dual system termi-nal with Android, it can usually be integrated very with android as an interactive system More apk software is analyzed after these apk softwares are often exported from terminal by people, then secondary packing, then At product of the competition to after.
Summary of the invention
The purpose of the present invention is to provide the dual system termi-nals with server to prevent bis- packing operation methods of apk.
The technical solution adopted by the present invention is that:
Dual system termi-nal with server prevents bis- packing operation methods of apk, and dual system termi-nal is using Android system as interaction As first floor system, first floor system connect with long-range server communication is located at for system and another system, and server is used for md5's Verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
Further, the interactive system of the dual system termi-nal be Android system, first floor system be linux system or Windows system.
Further, dynamic base and checking routine are communicated to connect by serial ports or USB port in step 2.
Further, the dynamic base in step 1 is to be renamed as the dynamic of .so using the executable program that c or c++ write Library.
Further, the checking routine in step 2 is the executable program write using c or c++.
Further, dynamic base is first loaded onto memory automatically when apk program starts in step 3.
Further, in step 5 checking routine by md5 value that dynamic base is transmitted by being sent to clothes after the algorithm for encryption of agreement Business device.
Further, place first is decrypted by the algorithm of agreement to the md5 value of encrypted dynamic base transmission in step 6 Reason.
The invention adopts the above technical scheme, utilizes the spy that correlation apk program md5 value can change after secondary packing Property, dynamic base is embedded in apk program and disposes checking routine in first floor system;In turn, the apk in interactive system starts Shi Youdong State library obtains the md5 value of apk program and is transmitted on the checking routine of first floor system, and checking routine is optional by received md5 value It is sent to remote server after encryption, dynamic base is obtained the md5 value of apk program and the corresponding apk program prestored by server Benchmark md5 value is made comparisons, and comparison result is sent to checking routine, and checking routine is transferred to dynamic base by serial ports or USB. Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.This Invention is by md5 value in server end, and server is long-range, and the process md5 value transmitted is encrypted, and is cracked more difficult.This The interactive system of invention and the communication mode of first floor system are serial ports or usb connection, are the modes of wired credible connection, no It, will not be by people's packet capturing by external interference.If the apk program in unauthorized terminal after decompiling and secondary packing, even if It is mounted with also to be unable to run.Present to obscure tool and reinforcement tools are provided to that apk secondary be packaged, the present invention is to allow After apk decompiling, it is unable to run.It is not easily disturbed and cracks the invention enables apk program.
Detailed description of the invention
The present invention is described in further details below in conjunction with the drawings and specific embodiments;
Fig. 1 is the flow diagram that the dual system termi-nal of the invention with server prevents apk bis- times packing operation methods.
Specific embodiment
As shown in Figure 1, the invention discloses the dual system termi-nals with server to prevent bis- packing operation methods of apk, it is double System terminal is using Android system as interactive system and another system is as first floor system, first floor system and positioned at long-range service Device communication connection, server be used for md5 verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
Further, the interactive system of the dual system termi-nal be Android system, first floor system be linux system or Windows system.
Further, dynamic base and checking routine are communicated to connect by serial ports or USB port in step 2.
Further, the dynamic base in step 1 is to be renamed as the dynamic of .so using the executable program that c or c++ write Library.
Further, the checking routine in step 2 is the executable program write using c or c++.
Further, dynamic base is first loaded onto memory automatically when apk program starts in step 3.
Further, in step 5 checking routine by md5 value that dynamic base is transmitted by being sent to clothes after the algorithm for encryption of agreement Business device.
Further, place first is decrypted by the algorithm of agreement to the md5 value of encrypted dynamic base transmission in step 6 Reason.
The working principle of the invention is described in detail below:
With Android system when interactive system, when first floor system for the dual system termi-nal of linux system.
(1) the benchmark md5 that authorization will install apk program is put on some position of server.
(2) an executable program for verification is generated with programming language in advance, such as generating one with c/c++ can be performed Program, the effect of the checking routine be first from liunx by the end android be transmitted through come apk md5 be transmitted to server end, sentence Whether the md5 value of disconnected apk is modified, which is denoted as exe_A, and program exe_A is held on linux as checking routine Row.
Communication equation has serial ports or usb, is denoted as an_exe_A, and the effect of this program is to increase the md5 value transmitting of apk To exe_A,
(3) simultaneously utilize android jni technology, with c/c++ generate an executable program effect be and exe_A into Row communication, communication equation have serial ports or usb, are denoted as an_exe_A, and the effect of an_exe_A program is to pass the md5 value of apk It is incremented by exe_A.
(4) suffix name of an_exe_A is changed to .so so that it becomes a dynamic base, is denoted as a.so;Then by the dynamic Library is put into the apk program of android, is compiled into apk program together;Dynamic base can be added automatically when the starting of apk program It is downloaded in memory.Since the apk program that need to generally authorize is system apk, gives and can hold to a.so so apk program has permission Capable permission so that the permission of dynamic base energy read-write system file.The other parts of apk program become the journey that can be executed Sequence is behaved again.After a.so is behaved, first from interactive system program directory, i.e., read under/system/app/ catalogue The md5 value of corresponding apk is taken, such as/system/app/tcm/tcm.apk, then the md5 value is passed to exe_A by a.so.
(5) exe_A will pass to server end after md5 value, after server receives md5 value, judge md5 value whether with put Then md5 value one on the server to passing the result to exe_A again.
(5) after exe_A receives the judging result of server end, an_exe_A is passed to by way of serial ports or use, If the result that an_exe_A is received is consistent, program is continued to run, it is different to just terminating program.
The invention adopts the above technical scheme, utilizes the spy that correlation apk program md5 value can change after secondary packing Property, dynamic base is embedded in apk program and disposes checking routine in first floor system;In turn, the apk in interactive system starts Shi Youdong State library obtains the md5 value of apk program and is transmitted on the checking routine of first floor system, and checking routine is optional by received md5 value It is sent to remote server after encryption, dynamic base is obtained the md5 value of apk program and the corresponding apk program prestored by server Benchmark md5 value is made comparisons, and comparison result is sent to checking routine, and checking routine is transferred to dynamic base by serial ports or USB. Dynamic base is handled based on comparative result, and when comparison result is inconsistent, then notice terminates the operation of the apk program.This Invention is by md5 value in server end, and server is long-range, and the process md5 value transmitted is encrypted, and is cracked more difficult.This The interactive system of invention and the communication mode of first floor system are serial ports or usb connection, are the modes of wired credible connection, no It, will not be by people's packet capturing by external interference.If the apk program in unauthorized terminal after decompiling and secondary packing, even if It is mounted with also to be unable to run.Present to obscure tool and reinforcement tools are provided to that apk secondary be packaged, the present invention is to allow After apk decompiling, it is unable to run.It is not easily disturbed and cracks the invention enables apk program.

Claims (8)

1. the dual system termi-nal with server prevents bis- packing operation methods of apk, dual system termi-nal is using Android system as friendship Mutual system and another system are used as first floor system, and first floor system is connect with positioned at long-range server communication, and server is for md5 Verification, it is characterised in that: method the following steps are included:
Step 1, a dynamic base is generated using the jni technology of Android, and the dynamic base is compiled into APK program,
Step 2, the benchmark md5 value for the apk program installed will be allowed to be put into the designated position of server in advance, while in bottom Checking routine is pre-installed in system, dynamic base is communicated with checking routine using wired mode;
Step 3, dynamic base obtains the md5 value of the APK under program directory in Android interactive system when apk program starts,
Step 4, the md5 value of the APK of reading is transmitted to the checking routine of first floor system by dynamic base;
Step 5, the md5 value that dynamic base is transmitted is sent to server by checking routine;
Step 6, whether the md5 value that server benchmark md5 value and dynamic base are transmitted is consistent, and comparison result is fed back to school Test program;
Step 7, comparison result is passed to dynamic base by wired mode by checking routine;
Step 8, dynamic base performs corresponding processing based on comparative result;When the value of md5 than it is more consistent when, then dynamic base allows this Apk program continues to run;Otherwise, dynamic base terminates the operation of the apk program.
2. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: the interactive system of the dual system termi-nal is Android system, and first floor system is linux system or Windows system.
3. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: dynamic base and checking routine pass through serial ports or USB port communication connection in step 2.
4. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: the dynamic base in step 1 is to be renamed as the dynamic base of .so using the executable program that c or c++ write.
5. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: the checking routine in step 2 is the executable program write using c or c++.
6. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: dynamic base is first loaded onto memory automatically when apk program starts in step 3.
7. the dual system termi-nal according to claim 1 with server prevents bis- packing operation methods of apk, feature exists In: in step 5 checking routine by md5 value that dynamic base is transmitted by the algorithm for encryption of agreement after be sent to server.
8. the dual system termi-nal according to claim 7 with server prevents bis- packing operation methods of apk, feature exists In: first the md5 value of encrypted dynamic base transmission is decrypted by the algorithm of agreement in step 6.
CN201910526108.7A 2019-06-18 2019-06-18 Dual system termi-nal with server prevents bis- packing operation methods of apk Withdrawn CN110276173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910526108.7A CN110276173A (en) 2019-06-18 2019-06-18 Dual system termi-nal with server prevents bis- packing operation methods of apk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910526108.7A CN110276173A (en) 2019-06-18 2019-06-18 Dual system termi-nal with server prevents bis- packing operation methods of apk

Publications (1)

Publication Number Publication Date
CN110276173A true CN110276173A (en) 2019-09-24

Family

ID=67960953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910526108.7A Withdrawn CN110276173A (en) 2019-06-18 2019-06-18 Dual system termi-nal with server prevents bis- packing operation methods of apk

Country Status (1)

Country Link
CN (1) CN110276173A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496012A (en) * 2020-04-03 2021-10-12 北京梆梆安全科技有限公司 Secondary packaging detection method and device for application installation package

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
CN106911502A (en) * 2017-02-22 2017-06-30 烽火通信科技股份有限公司 A kind of upgrade method and system of intelligent home gateway equipment
CN106990993A (en) * 2017-04-18 2017-07-28 北京元心科技有限公司 Multi-system basic library file loading method and device
CN109687974A (en) * 2018-12-26 2019-04-26 努比亚技术有限公司 APK verification method, device, mobile terminal and readable storage medium storing program for executing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016019790A1 (en) * 2014-08-04 2016-02-11 优视科技有限公司 Verification method, client, server and system for installation package
CN106911502A (en) * 2017-02-22 2017-06-30 烽火通信科技股份有限公司 A kind of upgrade method and system of intelligent home gateway equipment
CN106990993A (en) * 2017-04-18 2017-07-28 北京元心科技有限公司 Multi-system basic library file loading method and device
CN109687974A (en) * 2018-12-26 2019-04-26 努比亚技术有限公司 APK verification method, device, mobile terminal and readable storage medium storing program for executing

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113496012A (en) * 2020-04-03 2021-10-12 北京梆梆安全科技有限公司 Secondary packaging detection method and device for application installation package
CN113496012B (en) * 2020-04-03 2023-11-03 北京梆梆安全科技有限公司 Secondary packaging detection method and device for application installation package

Similar Documents

Publication Publication Date Title
US8205096B2 (en) Software license embedded in shell code
US20160203087A1 (en) Method for providing security for common intermediate language-based program
US8984272B2 (en) Information processing apparatus, secure module, information processing method, and computer product
US9152773B2 (en) Communication apparatus and secure module including function for disabling encrypted communication
CN103617401B (en) Method and device for protecting data files
TWI541669B (en) Detection systems and methods for static detection applications, and computer program products
KR20180093038A (en) A mobile device with a trusted execution environment
CN107430650B (en) Securing computer programs against reverse engineering
CN110333868B (en) Method and system for generating installation packages of sub-applications
US20180373848A1 (en) A build system with plugins for encryption of application components
EA012921B1 (en) Method and device for protecting software from unauthorized use
CN105631312A (en) Method and system for processing rogue programs
Velu Mobile Application Penetration Testing
CN110276173A (en) Dual system termi-nal with server prevents bis- packing operation methods of apk
TWI393006B (en) Security system and method for code dump protection
CN110704814B (en) Anti-copy method and device, and storage medium
WO2019178787A1 (en) Chip access method, microchip, smart card, and debugging device
CN106657551A (en) Method and system for preventing mobile terminal from being unlocked
CN110276174A (en) Dual system termi-nal based on Android prevents bis- packing operation methods of apk
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method
Ma et al. Certified copy? Understanding security risks of Wi-Fi hotspot based Android data clone services
US20180121660A1 (en) Apparatus and method for dynamic binary analysis on hardware board
CN110309655B (en) Method and device for detecting safety in APP updating process
KR20200100565A (en) Method and server for analyzing weak point through library injection
KR101711926B1 (en) SoC having security features, and security method for SoC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190924