Reinforcing protection method and device for software installation package

A software installation package and installation package technology, applied in the field of data security, can solve the problems of endangering users, deepening the degree of threat, and different reinforcement effects, and achieve the effects of improving security, preventing memory interception, and increasing flexibility

Active Publication Date: 2014-09-03
北京鸿享技术服务有限公司
View PDF4 Cites 81 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the accompanying security problems have not been well resolved. There are more and more security threats, and the threat level is gradually deepening, which has brought adverse effects on both developers and users.
[0003] Moreover, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also threatens normal applications. serious damage to the developer
[0004] Based on the above problems, a variety of security reinforcement methods for Android applications have appeared in the prior art, through encryption, anti-decompilation, anti-code confusion and other reinforcement measures for Android applications, but due to the different schemes adopted by the reinforcement methods, the effect of reinforcement It is also different. Some reinforcements cannot achieve the effect of preventing brute force cracking. For example, an existing reinforcement method first encrypts the executable file dex of the original program package, and then extracts the information of the four major components to generate a proxy dex file. When the program is executed Dynamically decrypt the original program dex. However, in this encryption method, the encrypted package is separated from the original package. The original package is only an encrypted file. The program can be easily cracked through memory dump, and the reinforcement effect is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcing protection method and device for software installation package
  • Reinforcing protection method and device for software installation package
  • Reinforcing protection method and device for software installation package

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages ​​can be used to implement the contents of the present invention described herein, and the above description of specific languages ​​is for disclosing the best mode of the present invention.

[0034] figure 1 is a schematic diagram of a hardening protection device 100 for a software installation package according to an embodiment of the present invention. The device 100 for hardening and protecting software installation packages may generally include: a file extraction module 110 , an analysis module 120 , an encryption module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a reinforcing protection method and device for a software installation package. The reinforcing protection method for the software installation package comprises the steps of extracting a global configuration file and an executable file in the software installation package, analyzing the executable file to obtain first codes, inserting protection codes into the first codes to obtain second codes, encrypting the second codes, modifying the global configuration file according to entry points of the protection codes, and repackaging the modified global configuration file and the executable file to generate a reinforced installation package. According to the technical scheme, the protection codes are directly inserted into the codes of the executable file, program entries of the global configuration file are correspondingly modified, then reconfiguration of the executable file is achieved, and therefore in the program running process, the protection codes are executed first so as to carry out corresponding decryption processing; the executable file is processed directly, so that the flexibility of protection of the executable file is improved, and the safety of the software installation package is further improved.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method and device for strengthening and protecting software installation packages. Background technique [0002] The Android (Android) platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. At the same time, the number of software applications based on it is also very large. Compared with other mobile terminal operating systems, the Android system provides more for application developers. Many functional interfaces, many of which are the underlying interfaces of the system, improve the scalability of the system, but at the same time provide convenience for malicious software. Malware such as Trojan horses targeting the Android system are also easier to implement. Malicious software can deceive users to install and grant certain permissions by disguising, and then abuse these permissions to perform certain actions in the backg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14G06F21/572
Inventor 施华国刘敦俊杨新权
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products