Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Reinforcement protection method, sever and system for android app

A server and Android technology, applied in the field of data security, can solve problems such as endangering users, inability to completely solve Android installation package security problems, and damage to normal application developers, so as to reduce the effect of reverse analysis

Active Publication Date: 2015-03-25
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The rapid development of the Android system and the rapid growth of devices have produced a large number of third-party applications. Compared with other operating systems, the open source of the Android system provides application developers with more functional interfaces. These functional interfaces are improving The scalability of the system also provides convenience for malicious software. Illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception and other means continue to threaten the security of the Android system, not only endangering users, but also Also cause serious damage to normal application developers
[0003] The existing reinforcement schemes for the Android software installation package are mainly divided into three types: the first is to completely encrypt the entire dex file; the second is to deform the bytecode of the dex file during runtime to prevent direct Dump of the complete dex , the existing methods cannot be customized very well. This solution needs to perform bytecode transformation functions; the third method is to mix the first two solutions
However, because the above solution has a complete dex image in the memory for a certain period of time when the APK is running, the protected dex can be completely restored by means of a memory dump. As a result, the existing solution cannot completely solve the security problems faced by the Android installation package. problems, people are always looking for more effective solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reinforcement protection method, sever and system for android app
  • Reinforcement protection method, sever and system for android app
  • Reinforcement protection method, sever and system for android app

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0066] figure 1 A flow chart of a method for strengthening and protecting an Android application according to an embodiment of the present invention is shown. Such as figure 1 As shown, the method includes:

[0067] Step S110, obtaining the original Android installation package APK of the Android application.

[0068] On the Android system, an application that can be installed and run needs to be packaged into an Android install...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reinforcement protection method, sever and system for android app. The method comprises the following steps: obtaining an initial android package APK of the android app; decompiling the initial APK, extracting protected method codes from the initial APK, and filling an extraction position with nop; encrypting the extracted protected method codes according to an appointed encryption and decryption strategy to generate a reinforcement configuration file; adding the appointed encryption and decryption strategy, the reinforcement configuration file and a reinforcement protection program into the decompiled APK, and compiling to generate a reinforcement APK of the android app. According to the technical scheme provided by the invention, protected methods can be dynamically encrypted and decrypted, and complete dex mapping does not exist in a memory at any moment, so that a complete dex file is prevented from being obtained in a memory dump manner and the probability of repacking and redistribution of the android app due to reverse analysis is greatly reduced.

Description

technical field [0001] The invention relates to the field of data security, in particular to a reinforcement protection method, server and system for Android applications. Background technique [0002] The rapid development of the Android system and the rapid growth of devices have produced a large number of third-party applications. Compared with other operating systems, the open source of the Android system provides application developers with more functional interfaces. These functional interfaces are improving The scalability of the system also provides convenience for malicious software. Illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception and other methods continue to threaten the security of the Android system, not only endangering users, but also It also causes serious damage to normal application developers. [0003] The existing reinforcement schemes for the Android software installation package are mai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F9/45
CPCG06F21/14
Inventor 李伟董清
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products