Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for installing application software

A technology of application software and installation method, which is applied to computer security devices, program control devices, instruments, etc., and can solve problems such as the inability to confirm malicious modification of third-party software installation packages

Inactive Publication Date: 2014-02-12
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF7 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] There is no authoritative certificate management agency or software market to effectively manage the APK package (that is, the installer), and there may be a third-party software installation package (that is, the installer). After the release of the third-party software installation package (that is, the installer), the core Java code is decompiled and rewritten. Therefore, for the terminal where the application is installed, it is impossible to confirm whether the third-party software installation package (that is, the installer) has been maliciously modified, and the maliciously modified application software may be installed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for installing application software
  • Method and device for installing application software
  • Method and device for installing application software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] In this embodiment, processing is performed from the perspective of an installation program to implement the installation method of this application, and the method of this embodiment is a specific implementation in an accessible network environment.

[0079] image 3 This is a specific flowchart of the installation method in the first embodiment of this application. Such as image 3 As shown, the method includes:

[0080] Step 301: Pre-store the original signature information of the corresponding installation program in the server on the network corresponding to the application software.

[0081] In this embodiment, the original signature information is stored in a server on the network to isolate it from the installation program. When the public key is used to verify the signature information, if the public key is encrypted, the encryption algorithm of the public key can also be stored in the server in the network, and the public key cannot be obtained from the server.

[00...

Embodiment 2

[0092] In this embodiment, processing is also performed from the perspective of an installation program to implement the installation method of this application, and the method of this embodiment can be specifically implemented in an inaccessible network environment.

[0093] Figure 4 This is a specific flowchart of the installation method in the second embodiment of this application. Such as Figure 4 As shown, the method includes:

[0094] Step 401: Pre-store the original signature information of the corresponding installation program corresponding to the application software in the static library.

[0095] In this embodiment, the original signature information is stored in a static library to isolate it from the installation program. When the public key is used for signature information verification, if the public key is encrypted, the encryption algorithm of the public key can also be stored in the static library, and the public key cannot be obtained from the static library. ...

Embodiment 3

[0108] Figure 5 This is a specific flowchart of the installation method in the third embodiment of this application. Such as Figure 5 As shown, the method includes:

[0109] Step 501: Pre-store the original signature information of the corresponding installation program in the local database of the Android system corresponding to the application software.

[0110] In this embodiment, the original signature information is stored in the local database of the Android system to isolate it from the installation program.

[0111] When installing the application software, perform the following operations:

[0112] Step 502: The Android system parses the installation program, and obtains signature information carried by the installation program.

[0113] Step 503: The Android system prompts the application signing certificate information (namely signature information) on the application installation interface. The user chooses to trust the certificate or not to trust the certificate accordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for installing application software. The method includes acquiring signature information carried by an installation program; utilizing prestored original signature information of an installation program of the application software to verify the signature information carried by the installation program, and if a verification result is unsuccessful, exiting installation of the application software; if the verification result is successful, executing an executable code of the installation program. The invention further discloses a device for installing the application software. By the method and the system, a tampered installation program can be effectively recognized, so that the application software which is maliciously modified is effectively avoided from being installed in an operation system.

Description

Technical field [0001] This application relates to software installation technology for smart phones, and in particular to a method and device for installing application software. Background technique [0002] Android is an open source embedded development platform, Linux-based operating system, used in mobile devices (such as smart phones and tablets), is one of the most popular development platforms. [0003] Android application software packages are provided in the form of APK packages, that is, the application software installation programs are APK packages. Application software is usually written in Java language, and the Java signature mechanism is used to protect the APK package. Specific methods such as figure 1 Shown: package executable code (source code, specifically Dex files), resource files, configuration files, library files, etc. into APK package 101, then calculate the contents of the APK package into a hash value, and then use the private key Encrypt the hash val...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/445G06F21/51
Inventor 赵子鹏
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products