Unlock instant, AI-driven research and patent intelligence for your innovation.

Reinforcement protection method and device for software installation package

A software installation package and installation package technology, applied in the field of data security, can solve problems such as deepening threats, endangering users, and different reinforcement effects, so as to prevent memory interception, improve security, and increase flexibility.

Active Publication Date: 2016-11-30
北京鸿享技术服务有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the accompanying security problems have not been well resolved. There are more and more security threats, and the threat level is gradually deepening, which has brought adverse effects on both developers and users.
[0003] Moreover, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also threatens normal applications. serious damage to the developer
[0004] Based on the above problems, a variety of security reinforcement methods for Android applications have appeared in the prior art, through encryption, anti-decompilation, anti-code confusion and other reinforcement measures for Android applications, but due to the different schemes adopted by the reinforcement methods, the effect of reinforcement It is also different. Some reinforcements cannot achieve the effect of preventing brute force cracking. For example, an existing reinforcement method first encrypts the executable file dex of the original program package, and then extracts the information of the four major components to generate a proxy dex file. When the program is executed Dynamically decrypt the original program dex. However, in this encryption method, the encrypted package is separated from the original package. The original package is only an encrypted file. The program can be easily cracked through memory dump, and the reinforcement effect is limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcement protection method and device for software installation package
  • Reinforcement protection method and device for software installation package
  • Reinforcement protection method and device for software installation package

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The algorithms and displays provided here are not inherently related to any particular computer, virtual system or other equipment. Various general-purpose systems can also be used with the teaching based on this. From the above description, the structure required to construct this type of system is obvious. In addition, the present invention is not directed to any specific programming language. It should be understood that various programming languages ​​can be used to implement the content of the present invention described herein, and the above description of a specific language is to disclose the best embodiment of the present invention.

[0034] figure 1 It is a schematic diagram of a reinforcement protection device 100 for a software installation package according to an embodiment of the present invention. The reinforcement protection device 100 of the software installation package may generally include: a file extraction module 110, a parsing module 120, an encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for strengthening and protecting a software installation package. Wherein, the reinforcement protection method of the software installation package includes: extracting the global configuration file and the executable file in the software installation package; parsing the executable file to obtain the first code; inserting the protection code into the first code to obtain the second code, and The second code is encrypted; the global configuration file is modified according to the entry point of the protected code; and the modified global configuration file and executable file are repackaged to generate a hardened installation package. In the technical solution of the present invention, the protection code is directly inserted into the code of the executable file, and the program entry of the global configuration file is correspondingly modified to realize the reconstruction of the executable file, so that when the program is running, the protection code is first executed to perform corresponding decryption Processing directly processes executable files, which increases the flexibility of executable file protection and further improves the security of software installation packages.

Description

Technical field [0001] The invention relates to the field of data security, and in particular to a method and device for strengthening and protecting a software installation package. Background technique [0002] The Android platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. At the same time, the number of software applications based on it is also very large. Compared with other mobile terminal operating systems, the Android system provides more for application developers. Multiple functional interfaces, many of which are at the bottom of the system, improve the scalability of the system, but at the same time provide convenience for malware. Trojan horses targeting Android systems are also easier to implement. Currently there are existing ones targeting Android systems. Malware can be used to pretend to deceive users to install and grant certain permissions, and then abuse these permissions to perform certain actions in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
Inventor 施华国刘敦俊杨新权
Owner 北京鸿享技术服务有限公司