Unlock instant, AI-driven research and patent intelligence for your innovation.

A scene information protection method for Android applications

An Android application, user information technology, applied in the direction of program/content distribution protection, electrical components, transmission system, etc., can solve the problem of illegal sharing of scene information that cannot be effectively solved

Active Publication Date: 2016-05-04
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above methods cannot effectively solve the problem of illegal sharing of scene information in the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A scene information protection method for Android applications
  • A scene information protection method for Android applications
  • A scene information protection method for Android applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] see figure 2 , image 3 According to the invention, the game level data running on the Android system is protected to prevent the level data from being illegally shared. Level data is a form of scene data, and the scene data of different games or applications is different. The scene data in this example refers to level data, including level pictures, level-related music and text, etc.

[0054] figure 2 Indicates the process of downloading the level data from the cloud server to the local, and then performing secondary encryption.

[0055] image 3 Indicates the process by which the application uses level data.

[0056] The application program described in this embodiment is the game program A, and the scene data is the level data of the game. The developer of the application saves the level data in the game to the cloud server.

[0057] Such as figure 2 As shown, firstly, the application program (that is, the game program A) is started.

[0058] When the gam...

Embodiment 2

[0075] see Figure 4 , this embodiment assumes that the application program is A. Application A is a level game application. Application A has 10 levels. Each level in application A has different scene information. Suppose the scene data are T1--T10. According to the embodiment of the present invention, the scene data T1-T10 in the application program A are encrypted and stored in the cloud server. When the user uses the application program A, the first level is opened by default. At this time, the application program A requests the corresponding level from the cloud server scene data T1.

[0076] The cloud server sends the encrypted scene data T1 to application A according to the request, and the local device decrypts the encrypted data after receiving it, and then A sends the user information (such as user name User1, user account Account1) to the cloud server, and the server according to User information generates a key K and saves it in the cloud server.

[0077] The cl...

Embodiment 3

[0080] see Figure 5 , the same as the previous embodiment, this embodiment assumes that the application is A, the application A is a level game application, the application A has 10 levels, and each different level in the application A has different scene information, assuming The scene data are T1--T10 respectively.

[0081] According to the embodiment of the present invention, the scene data T1-T10 in the application program A are all encrypted and stored in the cloud server. When the user uses application A, the first checkpoint is opened by default. At this time, the application program A requests the scene data T1 of the corresponding level from the cloud server.

[0082] The cloud server sends the encrypted scene data T1 to application A according to the request, and the local device decrypts the encrypted data after receiving it. Then application A sends user information (such as user name User1, user account Account1) to the cloud server.

[0083] The cloud server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention puts forward a scene information protection method for an Android application program. The method specifically comprises: the scene information of an application program is stored in a cloud server; when the application program needs to use the scene information, the application program requests the cloud server for scene data; according to the user request, the cloud server sends encrypted scene data to the application program; after receiving the encrypted data, a local device carries out a decryption process; then a second encryption process is carried out on the data according to user information, device information, or other factors; the local device only stores the encrypted data after the second encryption process, and the application program carries out decryption on the data only when the application program needs the scene data in operation; and when the application no longer needs the scene data, a plain text will be destroyed. When the data are encrypted, the data are bound with the user information or the device information, so that a cracker cannot share the application program scene information through a copying method, thereby reaching the goal of preventing the application scene information from being illegally copied.

Description

technical field [0001] The invention relates to the field of copyright protection, in particular to a method for protecting scene information of application programs. Background technique [0002] With the popularity of smart phones, there are more and more application software for smart phones. The ensuing piracy problem is also more serious. Commonly used data protection technologies on the Android system (Android system) include code obfuscation, application authorization, and resource watermarking. [0003] Code obfuscation: reorganize and process the released application program, so that the processed code has the same function as the pre-processed code, and the obfuscated code is difficult to be decompiled, even if the decompilation is successful, it is difficult to obtain the real code of the program. significance. The obfuscated application will work normally, so there is no guarantee that the application will not be shared. Usually code obfuscation is only for t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/12
Inventor 韩勇其他发明人请求不公开姓名
Owner BEIJING SENSESHIELD TECH