CN110598402A - Operation security system based on android application - Google Patents

Operation security system based on android application Download PDF

Info

Publication number
CN110598402A
CN110598402A CN201910847886.6A CN201910847886A CN110598402A CN 110598402 A CN110598402 A CN 110598402A CN 201910847886 A CN201910847886 A CN 201910847886A CN 110598402 A CN110598402 A CN 110598402A
Authority
CN
China
Prior art keywords
application program
instruction
android application
encryption
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910847886.6A
Other languages
Chinese (zh)
Inventor
王旭
李传智
常译文
王家良
李勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU TIANKUAN TECHNOLOGY Co Ltd
Original Assignee
HANGZHOU TIANKUAN TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU TIANKUAN TECHNOLOGY Co Ltd filed Critical HANGZHOU TIANKUAN TECHNOLOGY Co Ltd
Priority to CN201910847886.6A priority Critical patent/CN110598402A/en
Publication of CN110598402A publication Critical patent/CN110598402A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses an android application-based operation security system which comprises an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit, wherein the application program encryption processing unit is used for encrypting an original file of an android application program and acquiring an encryption instruction of the original file encryption processing of the android application program. According to the android application program encryption method and device, the instruction array in the original file of the android application program is encrypted, so that the android application program can be operated only by analyzing and restoring the instruction array in the original file of the android application program through the encrypted instruction of the encrypted instruction array when the android application program is operated, the encrypted instruction is stored secretly, so that the android application program cannot be used by people except a user, the safety of the android application program operation data is improved, and other people are prevented from stealing or tampering the data.

Description

Operation security system based on android application
Technical Field
The invention relates to the technical field of application program operation safety protection, in particular to an operation secrecy system based on android application.
Background
Along with the rapid development of the mobile internet, the smart phone application is also developed along with the smart phone application, in the existing smart phone system, the android system plays a great role in the mobile phone system market due to open source characteristics, but the android application is reversely tampered, and other phenomena cause potential safety hazards to the privacy and property of a user, meanwhile, legal rights and interests of an android application developer can be violated, and the security of the android application also becomes an important part in the development of the android application.
At present, android application lacks measures for encrypting original files of the android application program when the application program runs, so that anyone can directly run the android application program, the secrecy effect of data of the android application program is influenced, the data of the android application program is easy to steal and tamper, meanwhile, the measures for detecting and running the original files are lacked when the application program runs, and the safety of running the android application program is caused to be compromised.
Disclosure of Invention
The invention aims to solve the defects in the prior art, and provides an android application-based operation security system.
In order to achieve the purpose, the invention adopts the following technical scheme: an operation security system based on android application comprises an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encryption instruction analysis processing unit is used for acquiring the encryption instruction and decrypting and processing the original file of the android application program through the encryption instruction;
the application program running unit is used for running the android application program and detecting the application program.
As a further description of the above technical solution:
the application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction security processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
As a further description of the above technical solution:
the encryption instruction analysis acquisition module is used for analyzing the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
As a further description of the above technical solution:
the encryption instruction analysis processing unit comprises an encryption instruction acquisition module and an instruction array analysis processing module;
the encryption instruction acquisition module is used for inputting a password to open the instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
As a further description of the above technical solution:
the encryption instruction analysis processing unit also comprises an application program file optimization module;
the application program file optimization module is used for adjusting the byte order of all fields, aligning each field in the structure, verifying all classes in the DEX file, optimizing some specific classes and optimizing operation codes in the method.
As a further description of the above technical solution:
the application program running unit comprises an application program running module, an interrupt storage module, a data recovery module, a program running monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
As a further description of the above technical solution:
the interrupt storage module is used for automatically storing running data when the android application program is crashed or powered off during running;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
As a further description of the above technical solution:
the program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
As a further description of the above technical solution:
a working method of a security running system based on android application comprises the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: and obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and performing optimization processing on the android application program file.
S04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
As a further description of the above technical solution:
the android application original file in step S01 is a DEX file that can be executed on a platform, and the android application original file stores information of all class files of an application program of the android platform.
Advantageous effects
The invention provides an operation security system based on android application. The method has the following beneficial effects:
(1): this secret system of operation based on android application is through carrying out encryption processing to the instruction array in the original file of android application program for need carry out analysis reduction to the instruction array in the original file of android application program through the encrypted instruction of instruction array encryption processing when running android application program just can run android application program, thereby it can't be used by the people outside the user to make android application program through carrying out secret storage to encrypted instruction, thereby improve the security of android application program operating data, prevent that other people from stealing or falsifying data.
(2): this secret system of operation based on android application realizes detecting the original file of android application program, prevents to maliciously modify the android application program file and leads to the vulnerability to appear when the program is operated, and still realizes detecting the operation of android application program, prevents that some from binding the program additional operation, steals the data of android application program operation, further improves the security of android application program during operation, strengthens the operational security of android application.
Drawings
Fig. 1 is an overall schematic diagram of an android application-based security system provided in the present invention;
FIG. 2 is a system diagram of an application encryption unit according to the present invention;
FIG. 3 is a schematic diagram of a system architecture of an encryption command parsing unit according to the present invention;
fig. 4 is a schematic system structure diagram of an application program execution unit in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1-4, an android application-based security running system includes an application encryption processing unit, an encryption instruction parsing processing unit, and an application running unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encrypted instruction analysis processing unit is used for acquiring the encrypted instruction and decrypting and processing the original file of the android application program through the encrypted instruction;
the application program running unit is used for running the android application program and detecting the application program.
The application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction secret processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
and the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
The encryption instruction analysis acquisition module is used for analyzing the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
The encryption instruction analysis processing unit comprises an encryption instruction acquisition module and an instruction array analysis processing module;
the encryption instruction acquisition module is used for inputting a password to open an instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
The encryption instruction analysis processing unit also comprises an application program file optimization module;
the application program file optimization module is used for adjusting byte sequences of all fields, aligning each domain in the structure, verifying all classes in the DEX file, optimizing some specific classes, optimizing operation codes in the method, and improving the operation speed of the android application program file by optimizing the android application program file.
The application program running unit comprises an application program running module, an interrupt storage module, a data recovery module, a program running monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
The interrupt storage module is used for automatically storing the running data when the android application program is crashed or powered off during running;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
The data that the storage module stores the operation when interrupting android application program operation to android application program to with data transmission to the data recovery module, the data recovery module reads the data that the storage module of interruption transmitted when running android application program once more, and resumes the data that android application program operated, unexpected interrupt leads to data loss when preventing the user from using, perhaps need operate again.
The program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
A working method of a security running system based on android application comprises the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: and obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and performing optimization processing on the android application program file.
S04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
The android application original file in step S01 is a DEX file that can be executed on a platform, and the android application original file stores information of all class files of an application program of the android platform.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (10)

1. An operation security system based on android application is characterized by comprising an application program encryption processing unit, an encryption instruction analysis processing unit and an application program operation unit;
the application program encryption processing unit is used for encrypting the original file of the android application program and acquiring an encryption instruction for encrypting the original file of the android application program;
the encryption instruction analysis processing unit is used for acquiring the encryption instruction and decrypting and processing the original file of the android application program through the encryption instruction;
the application program running unit is used for running the android application program and detecting the application program.
2. The android application-based operation security system of claim 1, wherein the application program encryption processing unit comprises an application program original file index module, an instruction array encryption processing module, an encryption instruction analysis acquisition module and an encryption instruction security processing unit;
the application program original file indexing module is used for carrying out layered analysis indexing on an original file of the android application program to find an instruction array in the original file;
the instruction array encryption processing module is used for carrying out AES encryption processing on the instruction array and storing the processed application program file.
3. The android application-based operation security system of claim 2, wherein the encryption instruction parsing and acquiring module is configured to parse the encrypted instruction array to acquire an encryption instruction of the instruction array for AES encryption;
the encryption instruction secrecy processing unit is used for creating an instruction folder, encrypting the instruction folder and storing the encryption instruction through the instruction folder.
4. The android application-based operation security system of claim 1, wherein the encryption instruction parsing unit comprises an encryption instruction acquisition module and an instruction array parsing module;
the encryption instruction acquisition module is used for inputting a password to open the instruction folder and acquiring an encryption instruction stored in the instruction folder;
the instruction array analysis processing module is used for decrypting the instruction array in the android application program file through the encryption instruction and restoring the decrypted instruction array to the android application program file.
5. The android application-based operation security system of claim 1, wherein the encryption instruction parsing unit further comprises an application program file optimization module;
the application program file optimization module is used for adjusting the byte order of all fields, aligning each field in the structure, verifying all classes in the DEX file, optimizing some specific classes and optimizing operation codes in the method.
6. The android application-based operation security system of claim 1, wherein the application program operation unit comprises an application program operation module, an interrupt storage module, a data recovery module, a program operation monitoring module and an application program detection module;
the application program running module is used for reading the android application program file and running the android application program.
7. The android application-based run security system of claim 6, wherein the interrupt storage module is configured to automatically store run data when a system crash or power failure occurs during the running of the android application program;
the data recovery module is used for automatically recovering data when the program is operated again after the interruption occurs, so that the data is prevented from being lost.
8. The android application-based operation security system of claim 6, wherein the program operation monitoring module is used for detecting and identifying the android application program during operation, preventing some bound programs from additionally operating, stealing operating data and improving the safety of the android application program during operation;
the application program detection module is used for reading and identifying the android application program file in the application program running module to detect the android application program file, and preventing bugs from occurring in the process of running the program due to malicious modification of the android application program file.
9. A working method of a security running system based on android application is characterized by comprising the following steps:
s01: analyzing and indexing the android application original file to find an instruction array in the original file, and carrying out AES (advanced encryption standard) encryption processing on the instruction array;
s02: obtaining an encryption instruction of the instruction array AES encryption processing, and creating an instruction file frame to encrypt and store the encryption instruction;
s03: obtaining an encryption instruction in the instruction folder through password verification, decrypting an instruction array in the android application program file through the encryption instruction, restoring the decrypted instruction array into the android application program file, and optimizing the android application program file;
s04: the android application program file is detected, malicious modification of the android application program file is prevented, the android application program file is read and the android application program is operated after detection is completed, and the android application is detected when the android application is operated.
10. The working method of the android application-based security system running system according to claim 9, wherein the android application original file in the step S01 is a DEX file executable on a platform, and the android application original file stores information of all class files of an application program of the android platform.
CN201910847886.6A 2019-09-09 2019-09-09 Operation security system based on android application Pending CN110598402A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910847886.6A CN110598402A (en) 2019-09-09 2019-09-09 Operation security system based on android application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910847886.6A CN110598402A (en) 2019-09-09 2019-09-09 Operation security system based on android application

Publications (1)

Publication Number Publication Date
CN110598402A true CN110598402A (en) 2019-12-20

Family

ID=68858095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910847886.6A Pending CN110598402A (en) 2019-09-09 2019-09-09 Operation security system based on android application

Country Status (1)

Country Link
CN (1) CN110598402A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188489A (en) * 2020-09-25 2021-01-05 深圳星联天通科技有限公司 Data processing method and device and computer storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102708322A (en) * 2012-05-12 2012-10-03 北京深思洛克软件技术股份有限公司 Method for protecting JAVA application programs in Android system
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
US20160012233A1 (en) * 2014-07-14 2016-01-14 Lenovo (Singapore) Pte, Ltd. Verifying integrity of backup file in a multiple operating system environment
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106228041A (en) * 2016-07-21 2016-12-14 北京理工大学 A kind of for the precompiler code protection method of Android
US20190081990A1 (en) * 2017-09-08 2019-03-14 Salesforce.Com, Inc. Intercepting calls for encryption handling in persistent access multi-key systems

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system
CN102708322A (en) * 2012-05-12 2012-10-03 北京深思洛克软件技术股份有限公司 Method for protecting JAVA application programs in Android system
CN103533172A (en) * 2013-10-22 2014-01-22 陕西高新实业有限公司 Method for storing and managing photo information of mobile phone
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
US20160012233A1 (en) * 2014-07-14 2016-01-14 Lenovo (Singapore) Pte, Ltd. Verifying integrity of backup file in a multiple operating system environment
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106228041A (en) * 2016-07-21 2016-12-14 北京理工大学 A kind of for the precompiler code protection method of Android
US20190081990A1 (en) * 2017-09-08 2019-03-14 Salesforce.Com, Inc. Intercepting calls for encryption handling in persistent access multi-key systems

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112188489A (en) * 2020-09-25 2021-01-05 深圳星联天通科技有限公司 Data processing method and device and computer storage medium

Similar Documents

Publication Publication Date Title
CN107169324A (en) A kind of Android application reinforcement means based on dynamic encryption and decryption
US7930743B2 (en) Information processing system, information processing method, information processing program, computer readable medium and computer data signal
Li et al. Android malware forensics: Reconstruction of malicious events
CN104484607A (en) Universal method and universal system for performing safety testing on Android application programs
CN110351281B (en) Universal data frame analysis method, device and equipment
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN112131595B (en) Safe access method and device for SQLite database file
CN111159757A (en) File encryption method, file decryption method and corresponding devices
CN105930728B (en) A kind of application checking method and device
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN105303093A (en) Token verification method for cryptographic smart token
CN101504622A (en) Method and device for information interaction between threads
CN107257282A (en) A kind of full bag encryption method of code based on RC4 algorithms
CN110598402A (en) Operation security system based on android application
CN111159712B (en) Detection method, device and storage medium
CN104504336A (en) Method and device for preventing embedded system from being maliciously debugged online
CN115398431A (en) User information violation acquisition detection method and related equipment
CN114928756B (en) Video data protection, encryption and verification method, system and equipment
CN102034040A (en) Log implementation method in encryption card
CN102087689B (en) Method and device for protecting software reused module
CN116861411B (en) Seccomp mechanism-based safe sandbox data protection method and system
CN112825093A (en) Security baseline checking method, host, server, electronic device and storage medium
CN107608849A (en) A kind of method for quickly identifying and system towards Android APP encrypted contents
RU2621613C2 (en) Method and card with chip for information transfer
CN114297647B (en) Program security detection method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191220

RJ01 Rejection of invention patent application after publication