Method for protecting JAVA application programs in Android system

An application program and Android system technology, applied in the field of computer security, can solve the problems of software piracy, weak application software protection ability, restricting the development of the Android system software market, etc., and achieve the effect of preventing piracy

Active Publication Date: 2012-10-03
BEIJING SENSESHIELD TECH
View PDF3 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can prevent direct decompilation of the application program, its "unpacking operation" is a one-time operation. Save the memory data after unpacking and loading, and restore the original program; in addition, the functional logic of the unpacking program is fixed, and it is easy to be analyzed and cracked by the decryptor, so this packing method is not strong enough to protect the application software
[0005] Due to the above reasons, software piracy in the Android system is very serious at present, and the rights and interests of paid software cannot be guaranteed. As a result, many successful software in the iOS system abandon the Android system or release the software in the form of free advertising in the Android system.
It can be seen that the lack of a protection mechanism for JAVA programs seriously restricts the development of the software market in the Android system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting JAVA application programs in Android system
  • Method for protecting JAVA application programs in Android system
  • Method for protecting JAVA application programs in Android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The specific implementation manner of the present invention is illustrated by examples below.

[0030] For example, to protect the common method M of the class ClassA (i.e., a functional unit that realizes a specific function), according to an embodiment of the present invention, the following steps are performed:

[0031] 1. Locate ClassA.M in the JAVA program file (source file). According to a specific embodiment of the present invention, the location is to first find the ClassA class, and then find the M method in ClassA. Locating by code form is ClassA test=new ClassA(); test.M method can be obtained. Change the method ClassA.M (i.e. the normal method M of the class ClassA to be protected) to a local method. Change the normal method to a native method through the keyword native, and it is a native method after the change.

[0032]2. Create a new common method M1 for class ClassA (M1 is the copy unit corresponding to the above functional unit M). According to an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of computer safety, in particular to a method for protecting application programs in an Android system. By carrying out encryption transformation on a plurality of method instruction codes of JAVA objects to be protected, encrypted method codes are subjected to real-time decryption operation according to the calling requirement when the programs operate, so that the application programs are difficult to subject to decompilation and static analysis, and therefore, the effective protection on the JAVA programs in the Android system is implemented.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method for protecting JAVA application programs in an Android system. By encrypting and transforming several method instruction codes of JAVA class objects to be protected, the encrypted method codes are decrypted and run in real time according to the call requirements when the program is running, making it difficult for the application to be decompiled and statically analyzed, realizing the JAVA effective protection of the program. Background technique [0002] Android system (Android) is a Linux-based open source operating system, mainly used in portable devices. The Android system is one of the mainstream operating systems currently used in mobile devices such as mobile phones and tablet computers. [0003] The application programs in the Android system are usually written in JAVA language, compiled to generate JAVA program files and run after installation. Since JAVA is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/14
CPCG06F9/44G06F9/45504G06F21/128
Inventor 不公告发明人
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products