Method and device for preventing application program from being tampered

An application program and a technology that has been tampered with, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as increased difficulty in code reading, and achieve the effect of increasing security

Inactive Publication Date: 2014-10-29
BEIJING CHEETAH MOBILE TECH CO LTD +4
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these three methods have their disadvantages: the code obfuscation method is to replace part of the code, such as replacing 1 (number one) with l (letter L), but this will make the code more difficult to read; the signature verification method can be used in the application When running, verify whether the signature is correct.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing application program from being tampered
  • Method and device for preventing application program from being tampered
  • Method and device for preventing application program from being tampered

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Generally, the malicious tampering of the application program is realized by modifying the java language code in the application program. Hackers can achieve malicious purposes by adding malicious codes such as advertisements and viruses to the original code, or deleting some verification-related codes. So as long as the code is prevented from being modified, the application can be fundamentally prevented from being maliciously tampered with.

[0077] Such as image 3 As shown, this embodiment includes the following steps:

[0078] Step a1: After the application program is developed, the code of the application program is first compiled to form an executable APK file, and a file named classes.dex is extracted from the APK file.

[0079] Step a2: The classes.dex file includes all java language codes, and the file is verified using an existing file verification method, and a unique verification code of the file is obtained. For example, the file can be verified by usin...

Embodiment 2

[0086] Since the code calling the so format file is still written in Java language, some hackers can avoid verification by deleting the code calling the "test.so" file. Therefore, this embodiment adds preset executable codes in the "test.so" file. If the application program does not call the "test.so" file, the preset executable codes cannot run, and the application program obtains an error message to give the user relevant prompts , so as to prevent the application program from being modified maliciously.

[0087] Such as Figure 4 As shown, this embodiment includes the following steps:

[0088] Step b1: After the application program is developed, compile the code of the application program to form an executable APK file, and extract a file named classes.dex from the APK file.

[0089] Step b2: The classes.dex file includes all java language codes, and the file is verified using an existing file verification method, and a unique verification code of the file is obtained. F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for preventing an application program from being tampered, and belongs to the field of safety of intelligent mobile terminals. The method for preventing the application program from being tampered is applied to a mobile terminal with the Android system. The method comprises the steps that file verification is carried out on a storage file of the application program, so that a unique verification value of the storage file is obtained; the verification value is used for generating a verification file used for verifying the storage file; compiling and packaging are carried out on the storage file and the verification file, so that an installation package of the application program is generated. According to the technical scheme, the method and device can verify whether the application program is tempered or not, so that safety of the application program is improved.

Description

technical field [0001] The invention relates to the security field of intelligent mobile terminals, in particular to a method and device for preventing application programs from being tampered with. Background technique [0002] Android is a Linux-based free and open-source operating system primarily used on mobile devices such as smartphones and tablets. In the current Android operating system, applications are usually written in the Java language. The application program written in this language can be packaged into a program package with the suffix .APK, and the corresponding Android application can be installed by running the program package on the mobile terminal. However, packaging the application program as a program package with the suffix .APK has its fatal flaw, because the APK program package is relatively easy to be tampered with, which affects the security of the application program. Among them, APK is the abbreviation of Android Package, that is, the Android ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/54
CPCG06F21/12G06F21/51G06F2221/033
Inventor 熊丽兵傅盛徐鸣卢云飞
Owner BEIJING CHEETAH MOBILE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products