CN110598402A - Operation security system based on android application - Google Patents
Operation security system based on android application Download PDFInfo
- Publication number
- CN110598402A CN110598402A CN201910847886.6A CN201910847886A CN110598402A CN 110598402 A CN110598402 A CN 110598402A CN 201910847886 A CN201910847886 A CN 201910847886A CN 110598402 A CN110598402 A CN 110598402A
- Authority
- CN
- China
- Prior art keywords
- application program
- instruction
- android application
- encryption
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses an android application-based operation security system which comprises an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit, wherein the application program encryption processing unit is used for encrypting an original file of an android application program and acquiring an encryption instruction of the original file encryption processing of the android application program. According to the android application program encryption method and device, the instruction array in the original file of the android application program is encrypted, so that the android application program can be operated only by analyzing and restoring the instruction array in the original file of the android application program through the encrypted instruction of the encrypted instruction array when the android application program is operated, the encrypted instruction is stored secretly, so that the android application program cannot be used by people except a user, the safety of the android application program operation data is improved, and other people are prevented from stealing or tampering the data.
Description
Technical Field
The invention relates to the technical field of application program operation safety protection, in particular to an operation secrecy system based on android application.
Background
Along with the rapid development of the mobile internet, the smart phone application is also developed along with the smart phone application, in the existing smart phone system, the android system plays a great role in the mobile phone system market due to open source characteristics, but the android application is reversely tampered, and other phenomena cause potential safety hazards to the privacy and property of a user, meanwhile, legal rights and interests of an android application developer can be violated, and the security of the android application also becomes an important part in the development of the android application.
At present, android application lacks measures for encrypting original files of the android application program when the application program runs, so that anyone can directly run the android application program, the secrecy effect of data of the android application program is influenced, the data of the android application program is easy to steal and tamper, meanwhile, the measures for detecting and running the original files are lacked when the application program runs, and the safety of running the android application program is caused to be compromised.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides an android application-based operation security system.
In order to achieve the purpose, the invention adopts the following technical scheme: an operation security system based on android application comprises an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encryption instruction analysis processing unit is used for acquiring the encryption instruction and decrypting and processing the original file of the android application program through the encryption instruction;
the application program running unit is used for running the android application program and detecting the application program.
As a further description of the above technical solution:
the application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction security processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
As a further description of the above technical solution:
the encryption instruction analysis acquisition module is used for analyzing the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
As a further description of the above technical solution:
the encryption instruction analysis processing unit comprises an encryption instruction acquisition module and an instruction array analysis processing module;
the encryption instruction acquisition module is used for inputting a password to open the instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
As a further description of the above technical solution:
the encryption instruction analysis processing unit also comprises an application program file optimization module;
the application program file optimization module is used for adjusting the byte order of all fields, aligning each field in the structure, verifying all classes in the DEX file, optimizing some specific classes and optimizing operation codes in the method.
As a further description of the above technical solution:
the application program running unit comprises an application program running module, an interrupt storage module, a data recovery module, a program running monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
As a further description of the above technical solution:
the interrupt storage module is used for automatically storing running data when the android application program is crashed or powered off during running;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
As a further description of the above technical solution:
the program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
As a further description of the above technical solution:
a working method of a security running system based on android application comprises the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: and obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and performing optimization processing on the android application program file.
S04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
As a further description of the above technical solution:
the android application original file in step S01 is a DEX file that can be executed on a platform, and the android application original file stores information of all class files of an application program of the android platform.
Advantageous effects
The invention provides an operation security system based on android application. The method has the following beneficial effects:
(1): this secret system of operation based on android application is through carrying out encryption processing to the instruction array in the original file of android application program for need carry out analysis reduction to the instruction array in the original file of android application program through the encrypted instruction of instruction array encryption processing when running android application program just can run android application program, thereby it can't be used by the people outside the user to make android application program through carrying out secret storage to encrypted instruction, thereby improve the security of android application program operating data, prevent that other people from stealing or falsifying data.
(2): this secret system of operation based on android application realizes detecting the original file of android application program, prevents to maliciously modify the android application program file and leads to the vulnerability to appear when the program is operated, and still realizes detecting the operation of android application program, prevents that some from binding the program additional operation, steals the data of android application program operation, further improves the security of android application program during operation, strengthens the operational security of android application.
Drawings
Fig. 1 is an overall schematic diagram of an android application-based security system provided in the present invention;
FIG. 2 is a system diagram of an application encryption unit according to the present invention;
FIG. 3 is a schematic diagram of a system architecture of an encryption command parsing unit according to the present invention;
fig. 4 is a schematic system structure diagram of an application program execution unit in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1-4, an android application-based security running system includes an application encryption processing unit, an encryption instruction parsing processing unit, and an application running unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encrypted instruction analysis processing unit is used for acquiring the encrypted instruction and decrypting and processing the original file of the android application program through the encrypted instruction;
the application program running unit is used for running the android application program and detecting the application program.
The application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction secret processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
and the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
The encryption instruction analysis acquisition module is used for analyzing the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
The encryption instruction analysis processing unit comprises an encryption instruction acquisition module and an instruction array analysis processing module;
the encryption instruction acquisition module is used for inputting a password to open an instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
The encryption instruction analysis processing unit also comprises an application program file optimization module;
the application program file optimization module is used for adjusting byte sequences of all fields, aligning each domain in the structure, verifying all classes in the DEX file, optimizing some specific classes, optimizing operation codes in the method, and improving the operation speed of the android application program file by optimizing the android application program file.
The application program running unit comprises an application program running module, an interrupt storage module, a data recovery module, a program running monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
The interrupt storage module is used for automatically storing the running data when the android application program is crashed or powered off during running;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
The data that the storage module stores the operation when interrupting android application program operation to android application program to with data transmission to the data recovery module, the data recovery module reads the data that the storage module of interruption transmitted when running android application program once more, and resumes the data that android application program operated, unexpected interrupt leads to data loss when preventing the user from using, perhaps need operate again.
The program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
A working method of a security running system based on android application comprises the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: and obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and performing optimization processing on the android application program file.
S04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
The android application original file in step S01 is a DEX file that can be executed on a platform, and the android application original file stores information of all class files of an application program of the android platform.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (10)
1. An operation security system based on android application is characterized by comprising an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encryption instruction analysis processing unit is used for acquiring the encryption instruction and decrypting and processing the original file of the android application program through the encryption instruction;
the application program running unit is used for running the android application program and detecting the application program.
2. The android application-based operation security system of claim 1, wherein the application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction security processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
3. The android application-based operation security system of claim 2, wherein the encryption instruction parsing and acquiring module is configured to parse the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
4. The android application-based operation security system of claim 1, wherein the encryption instruction parsing unit comprises an encryption instruction acquisition module and an instruction array parsing module;
the encryption instruction acquisition module is used for inputting a password to open the instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
5. The android application-based operation security system of claim 1, wherein the encryption instruction parsing unit further comprises an application program file optimization module;
the application program file optimization module is used for adjusting the byte order of all fields, aligning each field in the structure, verifying all classes in the DEX file, optimizing some specific classes and optimizing operation codes in the method.
6. The android application-based operation security system of claim 1, wherein the application program operation unit comprises an application program operation module, an interrupt storage module, a data recovery module, a program operation monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
7. The android application-based run security system of claim 6, wherein the interrupt storage module is configured to automatically store run data when a system crash or power failure occurs during the running of the android application program;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
8. The android application-based operation security system of claim 6, wherein the program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
9. A working method of a security running system based on android application is characterized by comprising the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and optimizing the android application program file;
s04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
10. The working method of the android application-based security system running system according to claim 9, wherein the android application original file in the step S01 is a DEX file executable on a platform, and the android application original file stores information of all class files of an application program of the android platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910847886.6A CN110598402A (en) | 2019-09-09 | 2019-09-09 | Operation security system based on android application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910847886.6A CN110598402A (en) | 2019-09-09 | 2019-09-09 | Operation security system based on android application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110598402A true CN110598402A (en) | 2019-12-20 |
Family
ID=68858095
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910847886.6A Pending CN110598402A (en) | 2019-09-09 | 2019-09-09 | Operation security system based on android application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110598402A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112188489A (en) * | 2020-09-25 | 2021-01-05 | 深圳星联天通科技有限公司 | Data processing method and device and computer storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102708322A (en) * | 2012-05-12 | 2012-10-03 | 北京深思洛克软件技术股份有限公司 | Method for protecting JAVA application programs in Android system |
CN103533172A (en) * | 2013-10-22 | 2014-01-22 | 陕西高新实业有限公司 | Method for storing and managing photo information of mobile phone |
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
US20160012233A1 (en) * | 2014-07-14 | 2016-01-14 | Lenovo (Singapore) Pte, Ltd. | Verifying integrity of backup file in a multiple operating system environment |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN106228041A (en) * | 2016-07-21 | 2016-12-14 | 北京理工大学 | A kind of for the precompiler code protection method of Android |
US20190081990A1 (en) * | 2017-09-08 | 2019-03-14 | Salesforce.Com, Inc. | Intercepting calls for encryption handling in persistent access multi-key systems |
-
2019
- 2019-09-09 CN CN201910847886.6A patent/CN110598402A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
CN102708322A (en) * | 2012-05-12 | 2012-10-03 | 北京深思洛克软件技术股份有限公司 | Method for protecting JAVA application programs in Android system |
CN103533172A (en) * | 2013-10-22 | 2014-01-22 | 陕西高新实业有限公司 | Method for storing and managing photo information of mobile phone |
CN103793663A (en) * | 2013-12-26 | 2014-05-14 | 北京奇虎科技有限公司 | Folder locking and unlocking methods and folder locking and unlocking devices |
US20160012233A1 (en) * | 2014-07-14 | 2016-01-14 | Lenovo (Singapore) Pte, Ltd. | Verifying integrity of backup file in a multiple operating system environment |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN106228041A (en) * | 2016-07-21 | 2016-12-14 | 北京理工大学 | A kind of for the precompiler code protection method of Android |
US20190081990A1 (en) * | 2017-09-08 | 2019-03-14 | Salesforce.Com, Inc. | Intercepting calls for encryption handling in persistent access multi-key systems |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112188489A (en) * | 2020-09-25 | 2021-01-05 | 深圳星联天通科技有限公司 | Data processing method and device and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169324A (en) | A kind of Android application reinforcement means based on dynamic encryption and decryption | |
US7930743B2 (en) | Information processing system, information processing method, information processing program, computer readable medium and computer data signal | |
Li et al. | Android malware forensics: Reconstruction of malicious events | |
CN104484607A (en) | Universal method and universal system for performing safety testing on Android application programs | |
CN110351281B (en) | Universal data frame analysis method, device and equipment | |
CN102831346B (en) | A kind of file protecting system carries out the method for file encryption-decryption | |
CN112131595B (en) | Safe access method and device for SQLite database file | |
CN111159757A (en) | File encryption method, file decryption method and corresponding devices | |
CN105930728B (en) | A kind of application checking method and device | |
Park et al. | A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system | |
CN105303093A (en) | Token verification method for cryptographic smart token | |
CN101504622A (en) | Method and device for information interaction between threads | |
CN107257282A (en) | A kind of full bag encryption method of code based on RC4 algorithms | |
CN110598402A (en) | Operation security system based on android application | |
CN111159712B (en) | Detection method, device and storage medium | |
CN104504336A (en) | Method and device for preventing embedded system from being maliciously debugged online | |
CN115398431A (en) | User information violation acquisition detection method and related equipment | |
CN114928756B (en) | Video data protection, encryption and verification method, system and equipment | |
CN102034040A (en) | Log implementation method in encryption card | |
CN102087689B (en) | Method and device for protecting software reused module | |
CN116861411B (en) | Seccomp mechanism-based safe sandbox data protection method and system | |
CN112825093A (en) | Security baseline checking method, host, server, electronic device and storage medium | |
CN107608849A (en) | A kind of method for quickly identifying and system towards Android APP encrypted contents | |
RU2621613C2 (en) | Method and card with chip for information transfer | |
CN114297647B (en) | Program security detection method and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191220 |
|
RJ01 | Rejection of invention patent application after publication |