CN112115430A - Apk reinforcement method, electronic equipment and storage medium - Google Patents

Apk reinforcement method, electronic equipment and storage medium Download PDF

Info

Publication number
CN112115430A
CN112115430A CN202010920292.6A CN202010920292A CN112115430A CN 112115430 A CN112115430 A CN 112115430A CN 202010920292 A CN202010920292 A CN 202010920292A CN 112115430 A CN112115430 A CN 112115430A
Authority
CN
China
Prior art keywords
file
apk
dex file
decryption program
dex
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010920292.6A
Other languages
Chinese (zh)
Inventor
韩强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth RGB Electronics Co Ltd
Original Assignee
Shenzhen Skyworth RGB Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth RGB Electronics Co Ltd filed Critical Shenzhen Skyworth RGB Electronics Co Ltd
Priority to CN202010920292.6A priority Critical patent/CN112115430A/en
Publication of CN112115430A publication Critical patent/CN112115430A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses an apk reinforcement method, electronic equipment and a storage medium, wherein the method comprises the steps of compiling a source code to be reinforced to obtain a dex file; encrypting the dex file to obtain a first dex file; generating a decryption program for decrypting the first dex file based on the first dex file; encrypting the decryption program to obtain a first decryption program; configuring the decryption program and the first decryption program into a so file; and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file. The invention uses a plug-in mode to pack the code to be reinforced into the dex file, encrypts the dex file and packs the dex file and a decryption program for decrypting the encrypted dex file into the apk together after encryption processing, thereby increasing the difficulty of obtaining the source code file of the application program and improving the protection force on the code of the application program.

Description

Apk reinforcement method, electronic equipment and storage medium
Technical Field
The present invention relates to the field of application security processing technologies, and in particular, to an apk reinforcement method, an electronic device, and a storage medium.
Background
With the development of an Android open system, the Android system occupies a large amount of time of a mobile terminal, and gradually becomes a popular operating system of the mobile terminal, and meanwhile, software applications based on the system are more and more, but the Android application which is developed and released is developed by using a Java language and is easily subjected to malicious decompiling by other people, so that important information in the application is obtained, and thus, the loss is easily caused by reversing. At present, a plurality of methods for applying reinforcement are available, but most of the reinforcement methods have a complex starting process and low operating efficiency.
Accordingly, the prior art is yet to be developed and improved.
Disclosure of Invention
Based on this, the invention provides an apk reinforcement method, an electronic device and a storage medium, which are used for solving the technical problem that the reinforcement safety of the apk in the prior art is low.
In a first aspect, an embodiment of the present invention provides a method for strengthening an apk, including:
compiling a source code to be reinforced to obtain a dex file;
encrypting the dex file to obtain a first dex file;
generating a decryption program for decrypting the first dex file based on the first dex file;
encrypting the decryption program to obtain a first decryption program;
configuring the decryption program and the first decryption program into a so file;
and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file.
Optionally, the compiling the source code to be consolidated to obtain the dex file specifically includes:
constructing a JAVA running environment, and acquiring a source code to be reinforced;
and executing a compiling command on the source code to be reinforced by utilizing an integrated development tool to obtain a dex file.
Optionally, the encrypting the dex file to obtain the first dex file specifically includes:
encrypting the dex file by using a gradle plug-in through an encryption algorithm to obtain an encrypted dex file;
acquiring a signature of the apk to be reinforced;
and taking the signature as a key to perform encryption operation on the encrypted dex file to obtain a signed encrypted dex file, and taking the signed encrypted dex file as a first dex file.
Optionally, the encryption algorithm comprises a symmetric encryption algorithm and an asymmetric encryption algorithm.
Optionally, the generating a decryption program for decrypting the first dex file based on the first dex file specifically includes:
determining a decryption key for decrypting the first dex file;
and compiling a decryption program by utilizing an integrated development tool, wherein the decryption program is configured with the decryption key.
Optionally, the decryption program is a native decryption program, and the native decryption program is located in a native layer of the system framework.
Optionally, the configuring the decryption program and the first decryption program into a so file specifically includes:
and compiling the decryption program and the first decryption program by using a C language or a C + + language respectively to obtain a so file.
Optionally, the configuring the first dex file as a resource file of an apk, and obtaining a target apk with the so file specifically includes:
configuring the first dex file into an apk resource file;
and generating the target apk by the resource file of the apk and the so file according to a preset system rule.
In a second aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes a processor and a memory connected to the processor, where the memory stores one or more programs, and the processor is configured to execute:
compiling a source code to be reinforced to obtain a dex file;
encrypting the dex file to obtain a first dex file;
generating a decryption program for decrypting the first dex file based on the first dex file;
encrypting the decryption program to obtain a first decryption program;
configuring the decryption program and the first decryption program into a so file;
and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file.
In a third aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, where instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform an apk reinforcement method, where the apk reinforcement method includes the following steps:
compiling a source code to be reinforced to obtain a dex file;
encrypting the dex file to obtain a first dex file;
generating a decryption program for decrypting the first dex file based on the first dex file;
encrypting the decryption program to obtain a first decryption program;
configuring the decryption program and the first decryption program into a so file;
and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file.
Compared with the prior art, the embodiment of the invention has the following advantages:
according to the method provided by the embodiment of the invention, the method for reinforcing the apk comprises the following steps: compiling a source code to be reinforced to obtain a dex file; encrypting the dex file to obtain a first dex file; generating a decryption program for decrypting the first dex file based on the first dex file; encrypting the decryption program to obtain a first decryption program; configuring the decryption program and the first decryption program into a so file; and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file. The invention uses a plug-in mode to pack the code to be reinforced into the dex file, encrypts the dex file and packs the dex file and a decryption program used for decrypting the encrypted dex file into the apk together, thus increasing the difficulty of obtaining the source code file of the application program and improving the protection of the code of the application program.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of an apk reinforcement method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
For further understanding of the technical solutions of the present application, the following description is made with reference to the accompanying drawings:
referring to fig. 1, fig. 1 is a flowchart of an apk reinforcement method provided by the present invention, and it should be noted that the apk reinforcement method according to the embodiment of the present invention is not limited to the steps and the sequence in the flowchart shown in fig. 1, and the steps in the flowchart may be added, removed, or changed according to different requirements.
As shown in FIG. 1, the method for strengthening the apk provided by the invention comprises the following steps:
and S10, compiling the source code to be reinforced to obtain a dex file.
In this embodiment, since the application format supported by the Android system mainly exists in the form of apk, the apk (Android application package) Android application package is a file format similar to Symbian Sis or Sisx application package used by the Android operating system, and is used for distributing and installing mobile applications and middleware.
The code of the Android application program is required to be operated on an Android device, and is compiled first and packaged into a file which can be identified by an Android system to be operated, and the file format which can be identified and operated by the Android system is 'APK'. The APK file contains a compiled code file (. dex), file resources (resources), ssets, certificates (certifies), and a manifest file (manifest file).
The dex file refers to an executable file that converts all bytecode files into Android dex files (classes).
Accordingly, the main logic of the application is implemented in the class. Dex file protection is therefore the key to protect the entire apk file.
Therefore, the logic implemented in the class.
Exemplarily, compiling the source code to be consolidated to obtain the dex file specifically includes:
s11, constructing a JAVA running environment and acquiring a source code to be reinforced;
and S12, executing a compiling command on the source code to be reinforced by using the integrated development tool to obtain a dex file.
Specifically, the source code to be hardened refers to Java code that needs to be protected, for example: the Java code of the user information is stored during registration, and the Java code of the user information is detected during login. The integrated Development tool comprises Eclipse, a standard plug-in set is attached to the Eclipse, the integrated Development tool comprises a Java Development Kit (JDK) and Myeclipse, the integrated Development tool comprises complete coding, debugging, testing and publishing functions, and the integrated Development tool is a JavaEE integrated Development environment with rich functions.
S20, encrypting the dex file to obtain a first dex file.
In this embodiment, since the dex file is easily decompiled maliciously to obtain important data, in order to protect the rights and interests of developers and users and on the premise of not affecting the convenience of legal applications, the dex file is encrypted by using a corresponding encryption algorithm to obtain an encrypted dex file, and the encrypted dex file is used as the first dex file. The dex file is encrypted by a user-defined gradle plug-in through a certain encryption algorithm. The Gradle plug-in is internally provided with a plurality of commonly used plug-ins, the plug-ins in the Gradle can improve development efficiency in a certain scene, and more functions can be realized by expanding the existing plug-ins, for example, the Android Gradle plug-in is realized based on the built-in Java plug-in. It can realize that:
1. adding tasks into the project, and testing, compiling and packaging the project;
2. adding the dependency to the project, wherein the dependency can be used for configuring the dependency needed in the project construction process;
3. new extension attributes, methods and the like can be added to the existing object types in the Project, so that the configuration and the construction optimization of the Project can be facilitated, for example, Android { } in the construction of the Android Project is an extension added to the Project object by the Android Gradle plug-in;
4. some conventions can be made for the project, for example, the storage position of the source code under the src/main/Java directory can be stipulated by using a Java Gradle plug-in, and the Java source code file under the specified directory can be compiled at the time of compiling.
Therefore, the adopted gradle plug-in is simple and easy to use, and the plug-in can be customized according to different project requirements, so that the development cost is saved, and the portability is strong.
Exemplarily, the encrypting the dex file to obtain the first dex file specifically includes:
s21, encrypting the dex file by using a gradle plug-in through an encryption algorithm to obtain an encrypted dex file;
s22, acquiring a signature of the apk to be reinforced;
s23, using the signature as a key to perform an encryption operation on the encrypted dex file to obtain a signed encrypted dex file, and using the signed encrypted dex file as a first dex file.
In particular, the encryption algorithm includes a symmetric encryption algorithm and an asymmetric encryption algorithm. The symmetric encryption algorithm refers to an encryption algorithm using the same key for encryption and decryption, and the key is not public. The symmetric encryption algorithm comprises DES, tripleDES, RC2, RC4, RC5, Blowfish and the like. According to the method and the device, only the dex file generated by the Java code needing to be protected is encrypted, and the Java code not needing to be protected does not need to be encrypted, so that a symmetric encryption algorithm can be flexibly changed according to actual requirements.
Asymmetric encryption algorithms require two keys: a public key and a private password. The public key and the private key are a pair, and if the public key is used for encrypting data, only the matched private key can be decrypted; if the data is encrypted with a private key, only the paired public key can decrypt it. For example: the first party generates a pair of keys and discloses one of the keys as a public key to the other party; the party B obtaining the public key encrypts the protection information by using the public key and then sends the protection information to the party A; the first party decrypts the encrypted information by using another private key stored by the first party. Similarly, party A can encrypt the protection information by using the private key of the party A and then send the protection information to party B, and party B decrypts the encrypted information by using the public key of party A. The asymmetric encryption algorithm has the characteristics of complex algorithm strength and algorithm dependence on safety, but the encryption and decryption speed is higher than that of the symmetric encryption algorithm. The asymmetric encryption algorithm includes RSA, ECC (for mobile devices), Diffie-Hellman, El Gamal, DSA (for digital signature), and the like.
The signature is used to authenticate identity and to verify the integrity of the data. In order to prevent malicious attack and complete transmitted data, the encrypted dex file also needs to be signed, after the first dex file is received, signature verification operation needs to be performed firstly, the encrypted dex file in the first dex file can be obtained only if the signatures of the two parties are matched, and otherwise, the first dex file fails or is discarded.
The encryption operation may be an and operation, an or operation, an and or operation, etc., and is set according to the user's needs. In this embodiment, the encryption operation is preferably an or operation, which further increases the protection level.
S30, generating a decryption program for decrypting the first dex file based on the first dex file.
In this embodiment, in the compiling process, the decrypted logic needs to be compiled into the apk together, and the decrypted logic performs the decryption operation on the encrypted dex file when the target apk is installed on a terminal, such as a mobile phone or a television, and runs. And writing a decryption program for decrypting the encrypted dex file by using an Android Studio development tool. The decryption program is a native decryption program and is located in a local stratum, namely a native layer. In order to further improve the decompilation cracking difficulty and improve the safety, a C/C + + language is adopted to write the decryption logic in the decryption program.
Illustratively, the generating a decryption program for decrypting the first dex file based on the first dex file specifically includes:
s31, determining a decryption key for decrypting the first dex file;
and S32, compiling a decryption program by using the integrated development tool, wherein the decryption program is configured with the decryption key.
And S40, encrypting the decryption program to obtain a first decryption program.
In this embodiment, the code logic in the decryption program is encrypted again by using the encryption algorithm, so as to further increase the difficulty of decompilation and reduce the probability of being cracked. When the method is implemented specifically, code logic of the decryption program is obtained; and encrypting the code logic by using the user-defined gradle plug-in through an encryption algorithm to obtain a first decryption program. The encryption algorithm may be a symmetric encryption algorithm or an asymmetric encryption algorithm, and the encryption algorithm is not limited in this application.
S50, configuring the decryption program and the first decryption program into a so file.
In this embodiment, the so file refers to a program function library under Linux, that is, compiled codes and data that can be used by other programs, and in order to enable the target apk to be used normally, the target apk needs to include a corresponding so file. Generally, so files are called shared libraries, depend on a development platform and cannot be independently operated and used.
The use method of the so file comprises the following steps:
(1) and compiling the dynamic library. Providing a header file: so _ test.h, three.c files: test _ a.c, test _ b.c, test _ c.c, compiling the files into a dynamic library: so.
For example:
command: and $ gcc test _ a.c test _ b.c test _ c.c-fPIC-shared-o-libtest. so can not be connected by an external program without the mark, and the mark is equivalent to an executable file.
(2) Linking of dynamic libraries
Providing a program source file test.c and a dynamic library libtest.so to link to generate an execution file test:
for example:
command: $ gcc test.c-L. -lte-o test
Command: $ ldd test executes test, and it can be seen how it calls a function in the dynamic library.
Since the difficulty of decompiling the dex file compiled from the Java source file is lower than the difficulty of decompiling the so file compiled from the C/C + + source file, the decryption program and the first decryption program are respectively compiled using C language or C + + language to obtain the so file.
S60, configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file.
In this embodiment, in order to hide the encrypted dex file to protect the application code, the first dex file is configured as an assert resource file of the application, and is packaged together with other resource files and the so file to obtain the target apk. The target apk can be run and executed on a terminal such as a mobile phone or a television.
Exemplarily, the configuring the first dex file into a resource file of an apk, and obtaining a target apk with the so file specifically includes:
s61, configuring the first dex file into an apk resource file;
and S62, generating the target apk by the resource file of the apk and the so file according to a preset system rule.
Based on the above-mentioned strengthening method of the apk, the present application further provides an electronic device, as shown in fig. 2, where the electronic device 1 includes a processor 11 and a memory 22 connected to the processor 11, and fig. 2 only shows some components of the electronic device 1, but it should be understood that not all of the shown components are required to be implemented, and more or less components may be implemented instead.
The memory 22 may in some embodiments be an internal storage unit of the electronic device 1, such as a memory of the system 100. The memory 22 may also be an external storage device of the system 100 in other embodiments, such as a plug-in usb disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the electronic device 1. Further, the memory 22 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 22 is used for storing application software installed in the electronic device 1 and various types of data, such as the reinforcement program code of the apk. The memory 22 may also be used to temporarily store data that has been output or is to be output. In one embodiment, the memory 22 stores an apk reinforcement program, which can be executed by the processor 11 to implement the apk reinforcement method in the present application, specifically the method described above.
The processor 11 may be, in some embodiments, a Central Processing Unit (CPU), a microprocessor, a mobile phone baseband processor or other data Processing chip, and is configured to run a program code stored in the memory 22 or process data, for example, execute the apk reinforcement method, specifically including:
compiling a source code to be reinforced to obtain a dex file;
encrypting the dex file to obtain a first dex file;
generating a decryption program for decrypting the first dex file based on the first dex file;
encrypting the decryption program to obtain a first decryption program;
configuring the decryption program and the first decryption program into a so file;
configuring the first dex file into a resource file of an apk, and obtaining a target apk together with the so file; in particular, the steps in the method for strengthening apk are as described above.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. An apk reinforcing method is characterized by comprising the following steps:
compiling a source code to be reinforced to obtain a dex file;
encrypting the dex file to obtain a first dex file;
generating a decryption program for decrypting the first dex file based on the first dex file;
encrypting the decryption program to obtain a first decryption program;
configuring the decryption program and the first decryption program into a so file;
and configuring the first dex file into a resource file of the apk, and obtaining the target apk together with the so file.
2. The apk reinforcement method of claim 1, wherein the compiling the source code to be reinforced to obtain the dex file specifically comprises:
constructing a JAVA running environment, and acquiring a source code to be reinforced;
and executing a compiling command on the source code to be reinforced by utilizing an integrated development tool to obtain a dex file.
3. The apk reinforcement method according to claim 2, wherein the encrypting the dex file to obtain the first dex file specifically comprises:
encrypting the dex file by using a gradle plug-in through an encryption algorithm to obtain an encrypted dex file;
acquiring a signature of the apk to be reinforced;
and taking the signature as a key to perform encryption operation on the encrypted dex file to obtain a signed encrypted dex file, and taking the signed encrypted dex file as a first dex file.
4. The apk reinforcement method of claim 3, wherein the encryption algorithm comprises a symmetric encryption algorithm and an asymmetric encryption algorithm.
5. The apk reinforcement method according to claim 1, wherein the generating a decryption program for decrypting the first dex file based on the first dex file specifically comprises:
determining a decryption key for decrypting the first dex file;
and compiling a decryption program by utilizing an integrated development tool, wherein the decryption program is configured with the decryption key.
6. The apk reinforcement method according to claim 5, wherein the decryption program is a native decryption program, and the native decryption program is at a native layer of a system framework.
7. The apk reinforcement method according to claim 1, wherein the configuring the decryption program and the first decryption program into a so file specifically comprises:
and compiling the decryption program and the first decryption program by using a C language or a C + + language respectively to obtain a so file.
8. The apk reinforcement method according to claim 1, wherein the configuring the first dex file as a resource file of the apk, and obtaining the target apk together with the so file specifically comprises:
configuring the first dex file into an apk resource file;
and generating the target apk by the resource file of the apk and the so file according to a preset system rule.
9. An electronic device, comprising a processor and a memory coupled to the processor, the memory having one or more programs stored thereon, the processor being configured to perform the steps of the apk reinforcement method of any of claims 1-8.
10. A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a processor of an electronic device, enable the electronic device to perform the steps of the apk reinforcement method of any one of claims 1-8.
CN202010920292.6A 2020-09-03 2020-09-03 Apk reinforcement method, electronic equipment and storage medium Pending CN112115430A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010920292.6A CN112115430A (en) 2020-09-03 2020-09-03 Apk reinforcement method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010920292.6A CN112115430A (en) 2020-09-03 2020-09-03 Apk reinforcement method, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112115430A true CN112115430A (en) 2020-12-22

Family

ID=73802212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010920292.6A Pending CN112115430A (en) 2020-09-03 2020-09-03 Apk reinforcement method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112115430A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765567A (en) * 2021-01-07 2021-05-07 上海擎感智能科技有限公司 Data processing method and device for application program
CN113836582A (en) * 2021-09-30 2021-12-24 西安诺瓦星云科技股份有限公司 Software encryption and decryption method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408337A (en) * 2014-11-18 2015-03-11 刘鹏 Reinforcement method for preventing reverse of APK (Android package) file
CN105391763A (en) * 2015-10-13 2016-03-09 北京奇虎科技有限公司 Method and server for reinforcing a plurality of apk files
US20180129794A1 (en) * 2015-06-25 2018-05-10 Phicomm (Shanghai) Co., Ltd. Method for Protecting Dex File from Decompilation in Android System

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104408337A (en) * 2014-11-18 2015-03-11 刘鹏 Reinforcement method for preventing reverse of APK (Android package) file
US20180129794A1 (en) * 2015-06-25 2018-05-10 Phicomm (Shanghai) Co., Ltd. Method for Protecting Dex File from Decompilation in Android System
CN105391763A (en) * 2015-10-13 2016-03-09 北京奇虎科技有限公司 Method and server for reinforcing a plurality of apk files

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765567A (en) * 2021-01-07 2021-05-07 上海擎感智能科技有限公司 Data processing method and device for application program
CN113836582A (en) * 2021-09-30 2021-12-24 西安诺瓦星云科技股份有限公司 Software encryption and decryption method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10878083B2 (en) Mobile device having trusted execution environment
KR101471589B1 (en) Method for Providing Security for Common Intermediate Language Program
WO2020042778A1 (en) Firmware upgrade method and device
CN104680039B (en) A kind of data guard method and device of application program installation kit
KR101729960B1 (en) Method and Apparatus for authenticating and managing an application using trusted platform module
KR20030082484A (en) Saving and retrieving data based on public key encryption
KR20030082485A (en) Saving and retrieving data based on symmetric key encryption
KR20150035249A (en) Recording medium storing application package, method and apparatus of creating application package, method and apparatus of executing application package
CN109992987B (en) Script file protection method and device based on Nginx and terminal equipment
US7970133B2 (en) System and method for secure and flexible key schedule generation
CN104298932A (en) Method and device for calling SO file
CA2925733A1 (en) Encryption and decryption processing method, apparatus, and device
CN107870793B (en) Method and device for loading SO file in application program
US20180067777A1 (en) Application protection method, server, and terminal
CN108199827B (en) Client code integrity checking method, storage medium, electronic device and system
WO2023029447A1 (en) Model protection method, device, apparatus, system and storage medium
US20140059341A1 (en) Creating and accessing encrypted web based content in hybrid applications
KR20170089352A (en) Firmware integrity verification for performing the virtualization system
CN112115430A (en) Apk reinforcement method, electronic equipment and storage medium
CN107871066B (en) Code compiling method and device based on android system
KR20140139392A (en) Method for generating application execution file for mobile device, application execution method of mobile device, device for generating application execution file and mobile device
CN110602051B (en) Information processing method based on consensus protocol and related device
CN109784072B (en) Security file management method and system
KR101749209B1 (en) Method and apparatus for hiding information of application, and method and apparatus for executing application
CN106648770B (en) Generation method, loading method and device of application program installation package

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination