WO2015154436A1 - 一种数据处理方法及装置 - Google Patents

一种数据处理方法及装置 Download PDF

Info

Publication number
WO2015154436A1
WO2015154436A1 PCT/CN2014/089505 CN2014089505W WO2015154436A1 WO 2015154436 A1 WO2015154436 A1 WO 2015154436A1 CN 2014089505 W CN2014089505 W CN 2014089505W WO 2015154436 A1 WO2015154436 A1 WO 2015154436A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
resource
encrypted
binary
binary file
Prior art date
Application number
PCT/CN2014/089505
Other languages
English (en)
French (fr)
Inventor
范锁平
任静
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015154436A1 publication Critical patent/WO2015154436A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Definitions

  • the present invention relates to the field of data processing technologies, and in particular, to a data processing method and apparatus.
  • Android mobile operating system With the popularity of embedded smart devices, handheld smart terminals, and especially PAD products, Android mobile operating system has been greatly welcomed and supported by its openness and open source features. According to the latest market statistics, Android system is already market share. The highest mobile operating system, so developing applications on the Android system has become one of the main tasks of current software developers.
  • the application packaging form of the Android system adopts a simple compressed storage method, so that although it is convenient to package and use, it is easy for others to obtain important resource files of the application through decompression, especially after careful design of image resources.
  • Design interface layout resources, etc. are easily obtained by others, applied to other people's software design, which is undoubtedly an infringement of original software, so the realization of a resource protection mechanism on the Android system becomes common to all developers. wish.
  • the Android native resource management solution all resource files of the application software are compressed and saved. When installed or invoked, the compressed resource file is directly decompressed for use by the resource reference module.
  • the end user can even directly decompress it, and all resource files are directly exposed to the user, and any resource file can be freely accessed.
  • the Android system lacks a secure and effective protection mechanism for the native management of application software resources, and the end user can easily obtain important resource files in the software.
  • the main technical problem to be solved by the present invention is to provide a data processing method and device, which solves the technical problem that the resources of the application software in the Android system can be freely obtained and the important resources cannot be protected.
  • a data processing method applied to the protection of resource files of an Android system software including the following step:
  • the resource file When the resource file is not a binary file, the resource file is converted into a binary file and then encrypted; when the resource file is a binary file, the resource file is directly encrypted;
  • the encrypted resource file is decrypted before the resource file is called.
  • the method further includes: creating an encrypted resource storage area; storing the resource in the encrypted resource storage area according to a type of the resource file Corresponding position
  • the step of identifying the type of the resource file, and determining whether the resource file is a binary file comprises: identifying a type of the resource file according to location information stored in the resource file, and determining whether the resource file is Is a binary file.
  • the step of encrypting the resource file directly and the step of encrypting the resource file into a binary file comprises: creating an encryption buffer in the memory; loading the binary file into the Encrypting the buffer area, and performing encryption processing on the encryption buffer area;
  • the method further includes: storing the encrypted encryption buffer area to a corresponding location in the encrypted resource storage area according to the storage location information of the source resource file corresponding to the binary file.
  • the step of decrypting the encrypted resource file includes:
  • the step of decrypting the encrypted resource file includes: creating a decryption storage area and a decryption buffer area; and the encrypted binary according to the type of the source file to be encrypted according to the encrypted binary file
  • the file is cached in the corresponding location in the decryption storage area; the encrypted binary file is loaded into the decryption buffer area, and the decryption buffer area is decrypted, and the storage location information corresponding to the encrypted binary file is decrypted.
  • the file is stored to a corresponding location in the decryption storage area;
  • the step of determining whether the source resource file corresponding to the decrypted binary file is a binary file comprises: determining, according to the storage location information of the decrypted binary file, whether the source resource file corresponding to the decrypted binary file is a binary file .
  • a data processing device is applied to protection of a resource file of an Android system software, the device comprising: a file identification module, an encryption module, and a parsing module, wherein
  • the file identification module is configured to: identify a type of the resource file, and determine whether the resource file is a binary file;
  • the encryption module is configured to: when the file identification module determines that the resource file is not a binary file, convert the resource file into a binary file and perform encryption; and when the file identification module determines that the resource file is In the case of a binary file, the resource file is directly encrypted;
  • the parsing module is configured to decrypt the encrypted resource file before calling the resource file.
  • the device further includes a resource cache module, wherein:
  • the resource cache module is configured to: create an encrypted resource storage area, and store the resource in a corresponding location in the encrypted resource storage area according to the type of the resource file;
  • the file identification module is configured to identify the type of the resource file according to the following manner, and determine whether the resource file is a binary file: identify the type of the resource file according to the location information stored in the resource file, and determine Whether the resource file is a binary file.
  • the device further comprises an encrypted storage module, wherein:
  • the encryption module is configured to encrypt the resource file or encrypt the resource file converted into a binary file by: creating an encryption buffer in the memory, loading the binary file into the encryption buffer area, Encrypting buffer area for encryption processing;
  • the encryption storage module is configured to: after the encryption module encrypts the binary file, store the encrypted encryption buffer area to a corresponding position in the encrypted resource storage area according to the storage location information of the source resource file corresponding to the binary file. .
  • the parsing module includes: a decryption module and a file identification conversion module;
  • the decryption module is configured to: decrypt the encrypted binary file
  • the file identification conversion module is configured to: determine whether the source resource file corresponding to the decrypted binary file is a binary file, and if not, restore the decrypted binary file to a source resource file.
  • the decryption module includes: a second resource cache module, a cache decryption module, and a decryption storage module, where:
  • the second resource cache module is configured to: create a decryption storage area, and cache the encrypted binary file in a corresponding position in the decryption storage area according to the type of the source file that is encrypted by the encrypted binary file;
  • the cache encryption module is configured to: create a decryption buffer, load the encrypted binary file into a decryption buffer, and decrypt the decryption buffer;
  • the decryption storage module is configured to: store the decrypted file to a corresponding location in the decryption storage area according to the storage location information corresponding to the encrypted binary file;
  • the file identification conversion module is configured to determine whether the source resource file corresponding to the decrypted binary file is a binary file according to the following manner: determining, according to the storage location information of the decrypted binary file, a source corresponding to the decrypted binary file Whether the resource file is a binary file.
  • a computer program comprising program instructions which, when executed by a data processing apparatus, cause the data processing apparatus to execute the data processing apparatus described above.
  • the data processing method and device provided by the technical solution of the present invention can protect the resources of the software safely and effectively.
  • the data processing method of the present invention is applied to the protection of resource files of the Android system software, including: Identifying the type of the file, determining whether the resource file is a binary file; if not, converting the resource file into a binary file and encrypting the file If yes, the resource file is directly encrypted; before the resource file is invoked, the encrypted resource file is solved; the method of the present invention prevents the resource file from being randomly obtained by encrypting the resource and decrypting before referencing. Obtain and protect important resources of application software; improve the security of software resources compared with related technologies.
  • FIG. 1 is a schematic diagram of related Android system resource management and usage methods
  • FIG. 2 is a schematic flowchart of a data processing method according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic flowchart of encrypting a resource file according to Embodiment 1 of the present invention.
  • FIG. 5 is a schematic flowchart of decrypting an encrypted resource file according to Embodiment 1 of the present invention.
  • FIG. 6 is a schematic structural diagram of a first data processing apparatus according to Embodiment 2 of the present invention.
  • FIG. 7 is a schematic structural diagram of a second data processing apparatus according to Embodiment 2 of the present invention.
  • FIG. 8 is a schematic structural diagram of a third data processing apparatus according to Embodiment 2 of the present invention.
  • FIG. 9 is a schematic structural diagram of a fourth data processing apparatus according to Embodiment 2 of the present invention.
  • FIG. 10 is a schematic structural diagram of a fifth data processing apparatus according to Embodiment 2 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the embodiment provides a data processing method, mainly by encrypting the resource file of the software, when the software is running, The encrypted file is decrypted; this can protect the important resources safely and effectively, and prevent the resources from being randomly obtained.
  • the data processing method in this embodiment is applied to the protection of resource files of the Android system software, including as follows step:
  • Step 201 Identify the type of the resource file, determine whether the resource file is a binary file, and if yes, go to step 202, if no, go to step 203.
  • the resource file is a resource file of software on the Android system; the step is to perform type identification on the resource file that needs to be encrypted.
  • This embodiment can selectively encrypt the resource file. For example, encrypt a part of the resource file of the software.
  • the resource file type of the software may be divided into two types, one is a binary file, and the other is a text file.
  • the text file of the software in this embodiment includes at least one of a layout file, a character file, a color file, a size file, an animation file, and a menu file of the software; the binary file may include a picture file and/or a multimedia file.
  • Step 202 Convert the resource file into a binary file and perform encryption.
  • the resource file is a text file
  • the text file needs to be converted into a binary file, and then the binary file is encrypted.
  • Step 203 Encrypt the resource file directly.
  • Step 204 Decrypt the encrypted resource file before calling the resource file.
  • step 204 if the encrypted resource file is an encrypted resource file in a packaged form, the packaged file needs to be unpacked, and then the encrypted resource file obtained by the unpacking is decrypted.
  • the resource file of the software on the Android system is encrypted by the above steps 201-203.
  • the encrypted resource file may be packaged for the device to obtain.
  • each resource file may be encrypted first, and then compressed and packaged together.
  • the method of this embodiment may also perform encryption after packaging each resource file together.
  • the timing of unpacking and decrypting in the method of the embodiment corresponds to the encryption and packing timing of the resource file when the software is released. For example, when the packet is encrypted first, before the resource file is called, the packet needs to be decrypted and decrypted; When encrypting, you need to decrypt the unpacked before calling the resource file.
  • the method of the embodiment can encrypt and package important resources when the software is released, and then unpack and decrypt the important resources when the software is running, so that important resources are not randomly obtained, and a specific key is required to obtain, safely and effectively. Protected the important resources of the software.
  • the method of the embodiment can convert the non-binary file of the software into a binary file, and then encrypt the binary file, and can also directly encrypt the binary file of the software; that is, encrypt the resource file by encrypting the binary file, which The method further increases the security of the data because the source resource file is not obtained even after being decrypted and acquired by other users. After all the resource files are encrypted by applying the method in this embodiment, all the encrypted binary files can be packaged and then uploaded for the user to obtain.
  • the software when the software includes three resource files to be protected, first read a resource file for type identification. If it is a non-binary file, convert it to a binary file, encrypt the binary file, and directly encrypt the binary file. Then read the next resource file to repeat the above actions until all the resource files are encrypted; finally, all the encrypted binary files are compressed and packaged for distribution.
  • the method in this embodiment may identify the file by using the name of the resource file and/or the storage location information, and determine whether the resource file is a binary file. Specifically, the method in this embodiment further includes: before step 201:
  • the step 201 specifically includes: identifying, according to the location information stored by the resource file, the type of the resource file, Determine whether the resource file is a binary file.
  • the method of the embodiment stores the text file and the binary file of the software in different directories, so that the file type can be directly determined according to the storage path when the file type is subsequently identified.
  • the method in this embodiment encrypts the binary file by loading the binary stream into the buffer area to encrypt the buffer area.
  • the method in the embodiment directly The process of encrypting the resource file or encrypting the converted binary file when the resource file is a non-binary file includes:
  • the method further includes: storing the encrypted encryption buffer area to a corresponding location in the encrypted resource storage area according to the storage location information of the source resource file corresponding to the binary file
  • the method of this embodiment also needs to store the encrypted binary file to the directory or location where the binary is loaded after the encryption process.
  • binary files are encrypted under different directories or locations; finally, all encrypted binary files can be read from the encrypted resource storage area for package uploading.
  • the type of the resource file includes a text type and a binary type, as shown in FIG. 3:
  • Step 301 Create an encrypted resource storage area and create an encryption buffer in the memory.
  • the encryption resource storage area is used to store the encrypted resource file in this embodiment.
  • the encryption buffer area in this embodiment is used to encrypt the binary data.
  • Step 302 Store the resource in a corresponding location in the encrypted resource storage area according to the type of the resource file.
  • resource files are stored in different locations, that is, have different storage paths or directories.
  • Step 303 Identify the type of the resource file according to the location information stored in the resource file, and determine whether the resource file is a binary file or a text file. If the text file is a text file, go to step 304; otherwise, go to step 305.
  • the text file in this embodiment may include: a layout file, a character file, a color file, a size file, an animation file, and a menu file; the binary file may include a picture file and a multimedia file.
  • the type of the resource file may be identified according to a storage path of the resource file.
  • Step 304 Convert the text file to a binary file.
  • the resource file is a character file
  • the character file needs to be converted into binary data.
  • Step 305 Write the binary file into the encryption buffer.
  • Step 306 Encrypt the encrypted buffer area by bytes.
  • Step 307 Store the encrypted encryption buffer area to a corresponding location in the encrypted resource storage area according to the storage location information of the source resource file corresponding to the binary file.
  • the encrypted buffer storage location and the source resource file corresponding to the binary file The storage location is consistent.
  • Step 308 Clear the encryption buffer.
  • Step 309 Determine whether the current resource file is encrypted. If yes, go to step 310, otherwise go to step 305.
  • Step 310 Determine whether all resource files are encrypted, and if so, end, otherwise go to step 303 to perform encryption processing of the next resource file.
  • step 310 all the encrypted resource files can also be compressed and packaged, and the process ends.
  • the above describes the process of encrypting the resource file of the software.
  • the specific process of decrypting the encrypted resource file in the method of this embodiment is described in detail.
  • the encrypted resource in the above step 201 is described.
  • the process of file interface is as follows:
  • Step 401 Decrypt the encrypted binary file.
  • the packaged file needs to be unpacked to obtain the encrypted binary file before decryption.
  • Step 402 Determine whether the source resource file corresponding to the decrypted binary file is a binary file. If yes, go to step 401 to perform decryption processing on the next resource file, and if no, go to step 403.
  • Step 403 Restore the decrypted binary file to a source resource file, and go to step 401 to perform decryption processing on the next resource file.
  • the decrypted binary file needs to be converted into a text file, that is, the original resource file.
  • the method of this embodiment can decrypt all the encrypted binary files in the manner of steps 401-403, and restore the binary files whose source resource files are non-binary files.
  • the file may be decrypted by decrypting the buffer area.
  • the foregoing step 401 specifically includes:
  • the process of determining whether the source resource file corresponding to the decrypted binary file is a binary file in the above step 402 includes: determining, according to the storage location information of the decrypted binary file, a source resource corresponding to the decrypted binary file. Whether the file is a binary file.
  • the method in this embodiment can decrypt the encrypted binary files in the decrypted storage area; after decrypting all the resource files, the file whose source file is a non-binary file needs to be restored, that is, the decrypted binary is about to be decrypted.
  • the file is converted to a source resource file.
  • this embodiment provides a process of decrypting an encrypted binary file.
  • the following steps are included in the following steps: (including the text type file and the binary type file as an example).
  • step 501 a decryption storage area and a decryption buffer area are created.
  • the interface buffer created in this embodiment is used to store the decrypted resource file.
  • a decryption buffer may be created in the memory for decrypting the encrypted binary file. If the encrypted binary file obtained in this embodiment is an encrypted binary file in a packaged form, the packed file needs to be decompressed to obtain the encrypted binary file in the package before this step.
  • Step 502 Cache the encrypted binary file in a corresponding location of the decryption storage area according to a type of the source file that corresponds to the encrypted binary file.
  • a corresponding storage path may be created according to a category of the source resource file; and then stored according to the storage path.
  • step 503 the binary stream is loaded into the decryption buffer.
  • Step 504 Perform decryption processing on the decryption buffer area by bytes
  • Step 505 Store the decrypted file to a corresponding location in the decryption storage area according to the storage location information corresponding to the encrypted binary file.
  • the decrypted file can be stored in the corresponding file, that is, stored in the original two.
  • the location where the binary file is stored is stored.
  • Step 506 clearing the decryption buffer area.
  • step 507 it is determined whether the current resource file is decrypted. If yes, go to step 508, otherwise go to step 503.
  • Step 508 determining, according to the storage location information of the decrypted binary file, whether the source resource file corresponding to the decrypted binary file is a binary file or a text file; if it is a text file, proceeding to step 509, otherwise ending;
  • the file identification and the path of the current binary file may be used to determine whether the file is a text file or a binary file.
  • step 509 the binary format resource file is restored to a text format resource file, and then ends.
  • the application software resource file is converted into binary data and encrypted and packaged.
  • the packaged file is parsed and processed, and the standard form of the resource file is restored.
  • the restored data user is invisible and will not be randomly obtained.
  • the resource file can be selectively packaged and protected.
  • the method can perform type identification on the resource file, selectively encrypt the resource that needs to be protected, and can identify the encrypted resource.
  • the resource data is referenced, the resource data is parsed and processed, and the data is restored. .
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the embodiment provides a data processing device, which is applied to the protection of resource files of the Android system software, and includes: a file identification module 601, an encryption module 602, and a parsing module 603;
  • the file identification module 601 is configured to: identify a type of the resource file, and determine whether the resource file is a binary file;
  • the encryption module 602 is configured to: when the file identification module 601 determines to be no, convert the resource file into a binary file and perform encryption; when the file identification module 601 determines In the case of YES, the resource file is directly encrypted;
  • the parsing module 603 is configured to decrypt the encrypted resource file before calling the resource file.
  • the data processing apparatus of this embodiment further includes a resource cache module 604;
  • the resource cache module 604 is configured to: create an encrypted resource storage area, according to the The type of the resource file stores the resource in a corresponding location in the encrypted resource storage area;
  • the file identification module 601 is configured to: identify, according to the location information stored in the resource file, the type of the resource file, and determine Whether the resource file is a binary file.
  • resource files include layout files, character files, color files, size files, animation files, menu files, picture files, multimedia files, and the like.
  • the data processing apparatus of this embodiment further includes: an encryption storage module 605; the encryption module 602 is configured to: create an encryption buffer area in the memory, Loading the binary file into the encryption buffer area, and performing encryption processing on the encryption buffer area; the encryption storage module 605 is configured to: after the encryption module 602 encrypts the binary file, according to the storage of the source resource file corresponding to the binary file The location information stores the encrypted encryption buffer to a corresponding location in the encrypted resource storage area.
  • the parsing module 603 in this embodiment includes : decryption module 6031 and file identification conversion module 6032;
  • the decryption module 6031 is configured to: decrypt the encrypted binary file
  • the file identification conversion module 6032 is configured to: determine whether the source resource file corresponding to the decrypted binary file is a binary file, and if not, restore the decrypted binary file to a source resource file.
  • the decryption module 6031 in this embodiment includes: a second resource cache module 60311, a cache decryption module 60312, and a decryption storage module 60313;
  • the resource cache module 604 is configured to: create a decryption storage area, according to the encrypted second
  • the binary file corresponds to the type of the source resource file, and the encrypted binary file is cached in a corresponding position in the decryption storage area;
  • the cache decryption module 60312 is configured to: create a decryption buffer area, load the encrypted binary file into a decryption buffer area, and perform decryption processing on the decryption buffer area;
  • the decryption storage module 60313 is configured to: store the decrypted file to a corresponding position in the decryption storage area according to the storage location information corresponding to the encrypted binary file;
  • the file identification conversion module 6032 is configured to determine, according to the storage location information of the decrypted binary file, whether the source resource file corresponding to the decrypted binary file is a binary file.
  • the device of the embodiment can replace the original simple compressed storage and packaging mode by encrypting and packaging the resources, and decrypting and decrypting before the reference, preventing the resource files from being randomly obtained, and protecting the important resources of the application software; Compared, it improves the security of software resources.
  • the data processing method and device provided by the technical solution of the present invention can protect the resources of the software safely and effectively.
  • the data processing method of the present invention is applied to the protection of resource files of the Android system software, including: Identifying the type of the file, determining whether the resource file is a binary file; if not, converting the resource file into a binary file and encrypting, if yes, directly encrypting the resource file; calling the resource Before the file, the encrypted resource file is solved; the method of the invention improves the important resources of the application software by encrypting the resource and decrypting it before the reference, thereby improving the important resources of the application software; Security of software resources. Therefore, the present invention has strong industrial applicability.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种数据处理方法及装置。该数据处理方法,应用于安卓系统软件的资源文件的保护,包括:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;若否,则将所述资源文件转换为二进制文件后进行加密,若是,则直接对所述资源文件进行加密;在调用所述资源文件之前,对加密后的资源文件进行解;上述技术方案通过对资源进行加密并且在引用之前进行解密,防止资源文件被随意获取,保护应用软件的重要资源;与相关技术相比,提高了软件资源的安全性。

Description

一种数据处理方法及装置 技术领域
本发明涉及数据处理技术领域,尤其涉及一种数据处理方法及装置。
背景技术
随着嵌入式智能设备、手持智能终端、尤其是PAD类产品的流行,Android移动操作系统以其开放性和开源特点受到极大地欢迎和支持,据最新的市场统计,Android系统已经是市场占有率最高的移动操作系统,因此在Android系统上开发应用程序成为目前软件开发者的主要工作之一。
然而目前Android系统的应用打包形式采用简单压缩存储的方法,这样虽然打包和使用比较方便,但是很容易被他人通过解压方式获取应用程序的重要资源文件,尤其是经过精心设计的图片资源,经过专业设计的界面布局资源等,很容易被他人获得,应用于他人的软件设计当中,这对于原创软件无疑是一种侵害,因此在Android系统上实现一种对资源的保护机制成为所有开发者的共同心愿。如图1所示是Android原生的资源管理方案,应用软件所有资源文件被压缩保存,在安装或调用时,被压缩的资源文件直接解压供资源引用模块使用。对于一个Android应用安装包来说,终端用户甚至可以直接手动解压,随之所有资源文件直接暴露给用户,任意资源文件都可以被随意的取用。相关技术中Android系统对应用软件资源的原生管理方式欠缺既安全又有效的保护机制,终端用户可轻易获取软件中的重要资源文件。
发明内容
本发明要解决的主要技术问题是,提供一种数据处理方法及装置,解决了目前Android系统中应用软件的资源可随意获取,重要资源无法被保护的技术问题。
为解决上述技术问题,采用如下技术方案:
一种数据处理方法,应用于安卓系统软件的资源文件的保护,包括如下 步骤:
对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;
当所述资源文件不是二进制文件时,将所述资源文件转换为二进制文件后进行加密;当所述资源文件是二进制文件时,直接对所述资源文件进行加密;
在调用所述资源文件之前,对加密后的资源文件进行解密。
可选地,在所述对所述资源文件的类型进行识别的步骤之前,该方法还包括:创建加密资源存储区;根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;
所述对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件的步骤包括:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
可选地,所述直接对所述资源文件进行加密的步骤和所述将所述资源文件转换为二进制文件后进行加密的步骤包括:在内存中创建加密缓存区;将二进制文件加载到所述加密缓存区,对所述加密缓存区进行加密处理;
在所述加密处理的步骤之后,该方法还包括:根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
可选地,所述对加密后的资源文件进行解密的步骤包括:
对所述加密后的二进制文件进行解密;
判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若否,则将该解密后的二进制文件还原成源资源文件。
可选地,所述对所述加密后的资源文件进行解密的步骤包括:创建解密存储区和解密缓存区;根据所述加密后的二进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;加载所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理,根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
所述判断该解密后的二进制文件对应的源资源文件是否是二进制文件的步骤包括:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
一种数据处理装置,应用于安卓系统软件的资源文件的保护,该装置包括:文件识别模块、加密模块和解析模块,其中;
所述文件识别模块设置成:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;
所述加密模块设置成:当所述文件识别模块判断所述资源文件不是二进制文件的情况下,将所述资源文件转换为二进制文件后进行加密;当所述文件识别模块判断所述资源文件是二进制文件的情况下,直接对所述资源文件进行加密;
所述解析模块设置成:在调用所述资源文件之前,对所述加密后的资源文件进行解密。
可选地,该装置还包括资源缓存模块,其中:
所述资源缓存模块设置成:创建加密资源存储区,根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;
所述文件识别模块设置成按照如下方式对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
可选地,该装置还包括加密存储模块,其中:
所述加密模块设置成按照如下方式对所述资源文件进行加密或将转换为二进制文件后的资源文件进行加密:在内存中创建加密缓存区,将二进制文件加载到所述加密缓存区,对所述加密缓存区进行加密处理;
所述加密存储模块设置成:在加密模块对二进制文件加密处理之后,根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
可选地,所述解析模块包括:解密模块和文件识别转换模块;
所述解密模块设置成:对所述加密后的二进制文件进行解密;
所述文件识别转换模块设置成:判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若否,则将该解密后的二进制文件还原成源资源文件。
可选地,所述解密模块包括:第二资源缓存模块、缓存解密模块和解密存储模块,其中:
所述第二资源缓存模块设置成:创建解密存储区,根据所述加密后的二进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;
所述缓存加密模块设置成:创建解密缓存区,加载所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理;
所述解密存储模块设置成:根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
所述文件识别转换模块设置成按照如下方式判断该解密后的二进制文件对应的源资源文件是否是二进制文件:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
一种计算机程序,包括程序指令,当该程序指令被数据处理装置执行时,使得该数据处理装置可执行上述的数据处理装置。
一种载有上述计算机程序的载体。
本发明技术方案的有益效果是:
本发明技术方案提供的一种数据处理方法及装置,可以安全有效地保护软件的资源;具体地,本发明的数据处理方法,应用于安卓系统软件的资源文件的保护,包括:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;若否,则将所述资源文件转换为二进制文件后进行加密,若 是,则直接对所述资源文件进行加密;在调用所述资源文件之前,对加密后的资源文件进行解;本发明的方法通过对资源进行加密并且在引用之前进行解密,防止资源文件被随意获取,保护应用软件的重要资源;与相关技术相比,提高了软件资源的安全性。
附图概述
图1为相关Android系统资源管理和使用方法的示意图;
图2为本发明实施例一提供的一种数据处理方法的流程示意图;
图3为本发明实施例一提供的一种对资源文件进行加密的流程示意图;
图4为本发明实施例一提供的一种对加密资源文件进行解密的流程示意图;
图5为本发明实施例一提供的一种对加密资源文件进行解密的流程示意图;
图6为本发明实施例二提供的第一种数据处理装置的结构示意图;
图7为本发明实施例二提供的第二种数据处理装置的结构示意图;
图8为本发明实施例二提供的第三种数据处理装置的结构示意图;
图9为本发明实施例二提供的第四种数据处理装置的结构示意图;
图10为本发明实施例二提供的第五种数据处理装置的结构示意图。
本发明的较佳实施方式
下面通过具体实施方式结合附图对本发明作进一步详细说明。
实施例一:
考虑到目前Android系统中应用软件的资源可随意获取,重要资源无法被保护的技术问题,本实施例提供了一种数据处理方法,主要通过对软件的资源文件进行加密,在软件运行时,对加密后的文件进行解密;这样可以安全有效地保护重要资源,防止资源被随意获取;具体地,如图2所示,本实施例数据处理方法,应用于Android系统软件的资源文件的保护,包括如下 步骤:
步骤201:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件,若是,则执行步骤202,若否,则执行步骤203。
本实施例中资源文件为Android系统上软件的资源文件;该步骤是对需要加密的资源文件进行类型识别。本实施例可以选择性对资源文件进行加密。例如对软件的一部分资源文件进行加密。
可选地,在本实施例中可以将软件的资源文件类型划分为两种,一种是二进制文件,另一种是文本文件。本实施例中软件的文本文件包括:软件的布局文件、字符文件、颜色文件、尺寸文件、动画文件和菜单文件中至少一种;二进制文件可以包括图片文件和/或多媒体文件。
步骤202:将所述资源文件转换为二进制文件后进行加密。
例如当资源文件为文本文件时,需要将该文本文件转换为二进制文件,然后对二进制文件进行加密。
步骤203:直接对所述资源文件进行加密。
步骤204:在调用所述资源文件之前,对加密后的资源文件进行解密。
在步骤204中,如果加密后的资源文件为打包形式的加密资源文件,则需要对打包文件进行解包,然后在对解包得到的加密后的资源文件进行解密。
本实施例方法通过上述步骤201-203对Android系统上软件的资源文件进行加密。在步骤203之后还可以对加密后的资源文件进行打包供设备获取;具体地,可以首先对各个资源文件进行加密后,然后在一起压缩打包。
当然本实施例方法也可以在将各资源文件一起打包后,在进行加密。
本实施例方法中进行解包和解密的时序与软件发布时对资源文件进行加密和打包时序对应,例如当先加密后打包时,在调用资源文件之前,就需要先解包后解密;当先打包后加密时,在调用资源文件之前,就需要先解密在解包。
应用本实施例方法可以在软件发布时对重要资源进行加密打包,然后在软件运行时对重要资源进行解包解密,使得重要资源不会被随意获取,需要特定的密钥才能获取,安全有效地保护了软件的重要资源。
应用本实施例方法可以将软件的非二进制文件转换二进制文件,然后对二进制文件进行加密,也可以对软件的二进制文件直接进行加密;即采用对二进制文件加密的方式来对资源文件进行加密,这种方式进一步增加了数据的安全性,因为,即使在被其他用户解密获取后也得不到源资源文件。在应用本实施例方法对所有资源文件加密完成后,可以对所有加密后的二进制文件进行打包然后上传供用户获取。
例如当软件包括三个需要保护的资源文件时,首先读取一个资源文件进行类型识别,若是非二进制文件,则将其转换为二进制文件,对该二进制文件进行加密,若是二进制文件则直接进行加密;然后读取下一个资源文件重复上述动作,直到所有的资源文件完成加密;最后对所有加密后的二进制文件进行压缩打包进行发布。
本实施例方法可以通过资源文件的名称和/或存储位置信息来对文件进行识别,判断资源文件是否是二进制文件;具体地,本实施例方法在步骤201之前还包括:
创建加密资源存储区;
根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;此时步骤201具体包括:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
例如本实施例方法将软件的文本文件和二进制文件存储在不同的目录下,这样在后续识别文件类型时就可以直接根据存储路径判断文件的类型。
在上述方法的基础上,本实施例方法通过将二进制流加载到缓存区对缓存区进行加密的方式实现对二进制文件进行加密;具体地,本实施例方法中当资源文件为二进制文件时直接对所述资源文件进行加密或者当资源文件为非二进制文件时对转换后的二进制文件进行加密的过程包括:
在内存中创建加密缓存区;
将二进制文件加载到加密缓存区,对所述加密缓存区进行加密处理;
在加密处理之后,还包括:根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置
本实施例方法在加密处理之后还需要将加密后的二进制文件存储至加载该二进制的目录或者位置。通过上述过程,实现了对不同目录或位置下二进制文件加密;最后可以从加密资源存储区中读取所有加密二进制文件进行打包上传。
下面将详细介绍应用本实施例方法对软件的资源文件进行加密的具体过程(以资源文件的类型包括文本类型和二进制类型为例),如图3所示:
步骤301:创建加密资源存储区和在内存中创建加密缓存区。
本实施例方法创建加密资源存储区是用于存储加密后的资源文件;本实施例加密缓存区用于对二进制数据加密。
步骤302:根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置。
对于不同类型的资源文件存储在不同位置,即具有不同的存储路径或目录。
步骤303:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是二进制文件还是文本文件,若是文本文件,则转往步骤304,否则转往步骤305。
本实施例中文本文件可以包括:布局文件、字符文件、颜色文件、尺寸文件、动画文件和菜单文件中;二进制文件可以包括图片文件和多媒体文件。
具体地,可以根据资源文件的存储路径来对所述资源文件的类型进行识别。
步骤304:将文本文件转换为二进制文件。
例如当资源文件为字符文件时,就需要将字符文件转换为二进制数据。
步骤305:将二进制文件写入到加密缓存区中。
步骤306:对加密缓存区按字节进行加密处理。
步骤307:根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
具体地,加密后的缓存区存储位置与在该二进制文件对应的源资源文件 存储位置一致。
步骤308:清除加密缓存区。
步骤309:判断当前资源文件是否加密完成,如果完成,则转往步骤310,否则转往步骤305。
步骤310:判断所有资源文件是否加密完成,如果完成,结束,否则转往步骤303,进行下一个资源文件的加密处理。
在步骤310之后还可以对所有加密后的资源文件进行压缩打包,结束。
上述主要介绍了对软件的资源文件进行加密的过程,下面将详细介绍本实施例方法中对加密后的资源文件进行解密的具体过程;如图4所示,上述步骤201中对加密后的资源文件进行界面的过程包括:
步骤401:对所述加密后的二进制文件进行解密。
若是打包形式的加密文件,在解密之前还需要对打包文件进行解包获得加密后的二进制文件。
步骤402:判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若是,转步骤401进行下一个资源文件的解密处理,若否,执行步骤403。
步骤403:将该解密后的二进制文件还原成源资源文件,转步骤401进行下一个资源文件的解密处理。
例如,当解密后的二进制文件对应的源资源文件为文本文件时,就需要将解密后的二进制文件转换成文本文件,即原资源文件。
本实施例方法可以按照步骤401-403的方式将所有加密后的二进制文件解密完,并且将源资源文件为非二进制文件的二进制文件还原。本实施例可以通过对缓存区进行解密的方式来对文件进行解密,具体地,上述步骤401具体包括:
创建解密存储区和解密缓存区;
根据所述加密二进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;
读取所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理,根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
此时,上述步骤402中判断该解密后的二进制文件对应的源资源文件是否是二进制文件的过程包括:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
通过上述过程,本实施例方法可以将存在解密存储区中的加密二进制文件都解密;在对所有资源文件都解密后,还需要对源文件为非二进制文件的文件进行还原,即将解密后的二进制文件转换为源资源文件。本实施例可以通过解密后二进制文件的存储位置例如存储目录或路径等信息判断该二进制文件对应的源文件是否是二进制文件。
如图5所示,本实施例提供了对加密后的二进制文件进行解密的过程,(以资源文件的类型包括文本类型文件和二进制类型文件为例)具体包括如下步骤:
步骤501,创建解密存储区和解密缓存区。
本实施例创建的界面缓存区用于存储解密后的资源文件,本实施例可以在内存中创建解密缓存区用于对加密后的二进制文件进行解密处理。如果本实施例获取的加密二进制文件为打包形式的加密二进制文件,在本步骤之前还需要对打包文件进行解压缩得到包内加密后的二进制文件。
步骤502,根据所述加密二进制文件对应源资源文件的类型将所述加密后二进制文件缓存在所述解密存储区的对应位置。
具体地可以根据源资源文件的类别创建对应的存储路径;然后按照该存储路径进行存储。
步骤503,将二进制流加载进解密缓存区中。
步骤504,对解密缓缓存区按字节进行解密处理;
步骤505,根据所述加密二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中的对应位置。
本实施例方法可以将解密后的文件存储到对应文件中,即存储到原先二 进制文件存储的位置。
步骤506,清除解密缓存区.
步骤507,判断当前资源文件是否解密完成,如果完成,则转往步骤508,否则转往步骤503。
步骤508,根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是二进制文件还是文本文件;如果是文本文件,则转往步骤509,否则结束;
具体可以根据当前二进制文件的文件名及路径,进行文件识别,判断是文本文件还是二进制文件。
步骤509,将二进制格式资源文件还原为文本格式资源文件,然后结束。
本实施例提供的Android系统的数据处理方法,具有以下优点:
1、安全并有效地保护资源文件。应用软件资源文件转换为二进制数据,并进行加密打包,软件运行时,才对打包文件进行解析处理,还原资源文件标准形式,还原后的数据用户不可见,不会被随意获取。
2、灵活性。资源文件可选择性被打包保护,该方法可对资源文件进行类型识别,选择性加密需要被保护的资源,且可识别被加密资源,在资源数据被引用时,对其进行解析处理,还原数据。
3、兼容性。本方案兼容传统原生资源管理方式,对于不需要加密保护的资源,可按照原生资源管理方式进行压缩和加载。
实施例二:
如图6所示,本实施例提供了一种数据处理装置,应用于安卓系统软件的资源文件的保护,包括:文件识别模块601、加密模块602和解析模块603;
所述文件识别模块601设置成:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;
所述加密模块602设置成:当所述文件识别模块601判断为否的情况下,将所述资源文件转换为二进制文件后进行加密;当所述文件识别模块601判 断为是的情况下,直接对所述资源文件进行加密;
所述解析模块603设置成:在调用所述资源文件之前,对所述加密后的资源文件进行解密。
如图7所示,在上述装置的基础上,一种改进方案为:本实施例数据处理装置还包括资源缓存模块604;所述资源缓存模块604设置成:创建加密资源存储区,根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;所述文件识别模块601设置成:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
资源文件的类型包括布局文件、字符文件、颜色文件、尺寸文件、动画文件、菜单文件、图片文件、多媒体文件等。
如图8所示,在上述装置的基础上,另一种改进方案为:本实施例数据处理装置还包括:加密存储模块605;所述加密模块602设置成:在内存中创建加密缓存区,将二进制文件加载到加密缓存区,对所述加密缓存区进行加密处理;所述加密存储模块605设置成:在加密模块602对二进制文件加密处理之后,根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
在上述资源保护装置的基础上,如图9所示(以在图6所述的装置为基础,当然也可以以图7或8的装置为基础),本实施例中所述解析模块603包括:解密模块6031和文件识别转换模块6032;
所述解密模块6031设置成:对所述加密后的二进制文件进行解密;
所述文件识别转换模块6032设置成:判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若否,则将该解密后的二进制文件还原成源资源文件。
可选地,如图10所示,(在图9所述的装置为基础),本实施例中所述解密模块6031包括:第二资源缓存模块60311、缓存解密模块60312和解密存储模块60313;
所述资源缓存模块604设置成:创建解密存储区,根据所述加密后的二 进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;
所述缓存解密模块60312设置成:创建解密缓存区,加载所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理;
所述解密存储模块60313设置成:根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
所述文件识别转换模块6032设置成:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
应用本实施例的装置可以采用对资源进行加密打包方式替换原生的简单压缩存储打包方式,并且在引用之前进行解包解密,防止资源文件被随意获取,保护应用软件的重要资源;与相关技术相比,提高了软件资源的安全性。
以上内容是结合具体的实施方式对本发明所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。对于本发明所属技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本发明的保护范围。
工业实用性
本发明技术方案提供的一种数据处理方法及装置,可以安全有效地保护软件的资源;具体地,本发明的数据处理方法,应用于安卓系统软件的资源文件的保护,包括:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;若否,则将所述资源文件转换为二进制文件后进行加密,若是,则直接对所述资源文件进行加密;在调用所述资源文件之前,对加密后的资源文件进行解;本发明的方法通过对资源进行加密并且在引用之前进行解密,防止资源文件被随意获取,保护应用软件的重要资源;与相关技术相比,提高了软件资源的安全性。因此本发明具有很强的工业实用性。

Claims (12)

  1. 一种数据处理方法,应用于安卓系统软件的资源文件的保护,包括如下步骤:
    对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;
    当所述资源文件不是二进制文件时,将所述资源文件转换为二进制文件后进行加密;当所述资源文件是二进制文件时,直接对所述资源文件进行加密;
    在调用所述资源文件之前,对加密后的资源文件进行解密。
  2. 如权利要求1所述的数据处理方法,其中:
    在所述对所述资源文件的类型进行识别的步骤之前,该方法还包括:创建加密资源存储区;根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;
    所述对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件的步骤包括:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
  3. 如权利要求2所述的数据处理方法,其中:
    所述直接对所述资源文件进行加密的步骤和所述将所述资源文件转换为二进制文件后进行加密的步骤包括:在内存中创建加密缓存区;将二进制文件加载到所述加密缓存区,对所述加密缓存区进行加密处理;
    在所述加密处理的步骤之后,该方法还包括:根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
  4. 如权利要求1-3中任一项所述的数据处理方法,其中,所述对加密后的资源文件进行解密的步骤包括:
    对所述加密后的二进制文件进行解密;
    判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若否,则将该解密后的二进制文件还原成源资源文件。
  5. 如权利要求4所述的数据处理方法,其中:
    所述对所述加密后的资源文件进行解密的步骤包括:创建解密存储区和解密缓存区;根据所述加密后的二进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;加载所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理,根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
    所述判断该解密后的二进制文件对应的源资源文件是否是二进制文件的步骤包括:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
  6. 一种数据处理装置,应用于安卓系统软件的资源文件的保护,该装置包括:文件识别模块、加密模块和解析模块,其中;
    所述文件识别模块设置成:对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件;
    所述加密模块设置成:当所述文件识别模块判断所述资源文件不是二进制文件的情况下,将所述资源文件转换为二进制文件后进行加密;当所述文件识别模块判断所述资源文件是二进制文件的情况下,直接对所述资源文件进行加密;
    所述解析模块设置成:在调用所述资源文件之前,对所述加密后的资源文件进行解密。
  7. 如权利要求6所述的数据处理装置,该装置还包括资源缓存模块,其中:
    所述资源缓存模块设置成:创建加密资源存储区,根据所述资源文件的类型将所述资源存储在所述加密资源存储区中对应的位置;
    所述文件识别模块设置成按照如下方式对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件:根据所述资源文件存储的位置信息对所述资源文件的类型进行识别,判断所述资源文件是否是二进制文件。
  8. 如权利要求7所述的数据处理装置,该装置还包括加密存储模块,其中:
    所述加密模块设置成按照如下方式对所述资源文件进行加密或将转换为 二进制文件后的资源文件进行加密:在内存中创建加密缓存区,将二进制文件加载到所述加密缓存区,对所述加密缓存区进行加密处理;
    所述加密存储模块设置成:在加密模块对二进制文件加密处理之后,根据该二进制文件对应的源资源文件的存储位置信息将加密后的加密缓存区存储到所述加密资源存储区中的对应位置。
  9. 如权利要求6-8任一项所述的数据处理装置,其中,所述解析模块包括:解密模块和文件识别转换模块;
    所述解密模块设置成:对所述加密后的二进制文件进行解密;
    所述文件识别转换模块设置成:判断该解密后的二进制文件对应的源资源文件是否是二进制文件,若否,则将该解密后的二进制文件还原成源资源文件。
  10. 如权利要求9所述的数据处理装置,其中,所述解密模块包括:第二资源缓存模块、缓存解密模块和解密存储模块,其中:
    所述第二资源缓存模块设置成:创建解密存储区,根据所述加密后的二进制文件对应源资源文件的类型将所述加密后的二进制文件缓存在所述解密存储区中对应位置;
    所述缓存加密模块设置成:创建解密缓存区,加载所述加密后的二进制文件到解密缓存区,对所述解密缓存区进行解密处理;
    所述解密存储模块设置成:根据所述加密的二进制文件对应的存储位置信息将解密后的文件存储至所述解密存储区中对应位置;
    所述文件识别转换模块设置成按照如下方式判断该解密后的二进制文件对应的源资源文件是否是二进制文件:根据所述解密后的二进制文件的存储位置信息判断该解密后的二进制文件对应的源资源文件是否是二进制文件。
  11. 一种计算机程序,包括程序指令,当该程序指令被数据处理装置执行时,使得该数据处理装置可执行权利要求1-5中任一项所述的数据处理装置。
  12. 一种载有权利要求11所述计算机程序的载体。
PCT/CN2014/089505 2014-08-15 2014-10-24 一种数据处理方法及装置 WO2015154436A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410404385.8A CN105468987A (zh) 2014-08-15 2014-08-15 一种数据处理方法及装置
CN201410404385.8 2014-08-15

Publications (1)

Publication Number Publication Date
WO2015154436A1 true WO2015154436A1 (zh) 2015-10-15

Family

ID=54287199

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/089505 WO2015154436A1 (zh) 2014-08-15 2014-10-24 一种数据处理方法及装置

Country Status (2)

Country Link
CN (1) CN105468987A (zh)
WO (1) WO2015154436A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117648679A (zh) * 2024-01-26 2024-03-05 中国人民解放军军事科学院系统工程研究院 一种基于JavaScript的资源隔离方法与系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022014A (zh) * 2016-05-16 2016-10-12 武汉斗鱼网络科技有限公司 一种资源文件的打包方法和解包方法
CN106709282B (zh) * 2016-06-28 2018-10-02 腾讯科技(深圳)有限公司 资源文件解密方法及装置
CN108089880A (zh) * 2017-12-28 2018-05-29 北京奇虎科技有限公司 对应用程序安装文件进行预处理的方法、装置和服务器
CN109767516B (zh) * 2018-12-14 2021-06-11 汉海信息技术(上海)有限公司 日志设置和打印方法、设置和打印设备、及日志系统
CN110018930A (zh) * 2019-04-18 2019-07-16 苏州开心盒子软件有限公司 图像恢复方法、装置、设备和存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102033941A (zh) * 2010-12-21 2011-04-27 同辉佳视(北京)信息技术有限公司 数据打包方法及装置
CN103258167A (zh) * 2013-05-10 2013-08-21 广州杰赛科技股份有限公司 一种手持设备中png图片保护方法
CN103746967A (zh) * 2013-12-23 2014-04-23 北京掌阔技术有限公司 一种移动客户端广告调用方法和系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684760B (zh) * 2012-09-24 2018-12-07 腾讯科技(深圳)有限公司 通信的加密和解密的方法、装置及系统
US8886926B2 (en) * 2012-11-07 2014-11-11 Centri Technology, Inc. Single-pass data compression and encryption
JP2014150403A (ja) * 2013-01-31 2014-08-21 Optim Corp 携帯端末、ドキュメント管理方法、携帯端末用プログラム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102033941A (zh) * 2010-12-21 2011-04-27 同辉佳视(北京)信息技术有限公司 数据打包方法及装置
CN103258167A (zh) * 2013-05-10 2013-08-21 广州杰赛科技股份有限公司 一种手持设备中png图片保护方法
CN103746967A (zh) * 2013-12-23 2014-04-23 北京掌阔技术有限公司 一种移动客户端广告调用方法和系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117648679A (zh) * 2024-01-26 2024-03-05 中国人民解放军军事科学院系统工程研究院 一种基于JavaScript的资源隔离方法与系统
CN117648679B (zh) * 2024-01-26 2024-04-30 中国人民解放军军事科学院系统工程研究院 一种基于JavaScript的资源隔离方法与系统

Also Published As

Publication number Publication date
CN105468987A (zh) 2016-04-06

Similar Documents

Publication Publication Date Title
WO2015154436A1 (zh) 一种数据处理方法及装置
WO2016078130A1 (zh) 一种防逆向apk文件的动态加载方法
US8892876B1 (en) Secured application package files for mobile computing devices
US9443064B2 (en) Protecting method and system of java source code
JP5990654B2 (ja) アプリケーションコード難読化装置及びその方法
US20160203087A1 (en) Method for providing security for common intermediate language-based program
CN103218570B (zh) 用于应用程序数据保护的便携式终端的装置和方法
US20080270806A1 (en) Execution Device
JPWO2006009081A1 (ja) アプリケーション実行装置及びアプリケーション実行装置のアプリケーション実行方法
CN104408337A (zh) 一种apk文件防逆向的加固方法
JP2016517241A (ja) ストレージデバイスによって支援されるインライン暗号化および暗号化解除
CN103530535A (zh) 一种Android平台应用程序保护的加脱壳方法
WO2005098570A1 (ja) 実行装置
CN103258167A (zh) 一种手持设备中png图片保护方法
CN107609394A (zh) Android安装包的防篡改方法、存储设备及装置
WO2017181968A1 (zh) 应用文件的处理方法、访问方法及装置、存储介质
WO2019062015A1 (zh) 源代码保护方法、应用服务器及计算机可读存储介质
CN109840400B (zh) 提供安全性的设备和方法以及针对通用中间语言执行安全性的设备和方法
US20140082356A1 (en) Protection of interpreted source code in virtual appliances
WO2024179480A1 (zh) 一种文档内容保护方法和装置
KR101749209B1 (ko) 애플리케이션의 정보 은닉 방법 및 장치, 및 애플리케이션 실행 방법 및 장치
KR101667774B1 (ko) 스크립트 프로그램을 위한 보안 제공 장치 및 방법
JP2008040853A (ja) アプリケーション実行方法およびアプリケーション実行装置
KR101532763B1 (ko) 어플리케이션 불법복제 방지 시스템 및 방법
WO2020103060A1 (zh) 数据处理方法、装置、系统、服务器以及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14888753

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14888753

Country of ref document: EP

Kind code of ref document: A1