Method for protecting installed software on Android platform

A software protection and installed technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as insufficient protection methods, security risks of verification mechanisms, etc., and achieve the effect of avoiding complex problems

Inactive Publication Date: 2015-04-29
GUILIN UNIV OF ELECTRONIC TECH
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The technical problem to be solved by the present invention is the deficiency of the existing protection method and the potential safety hazard of the verification mechanism of Android itself, and a method for protecting the installed software on the Android platform is provided, which can verify when the application program starts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting installed software on Android platform
  • Method for protecting installed software on Android platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] A method for protecting installed software on an Android platform, comprising the steps of:

[0032] (1) The premise and initialization of the method

[0033] ① This method considers that the applications downloaded from the application store when installing the application are safe and do not contain any malicious code.

[0034] ②When the application is started, the system will find the class to which the application is loaded, and add a one-way hash function, key generator function, encryption function, and prompt the user to enter the protection encryption key in the class that loads the application. functions and comparison functions.

[0035] Now a brief introduction to several technologies and corresponding algorithms:

[0036] Symmetric encryption technology: Symmetric encryption algorithms are also called traditional cryptographic algorithms. In most symmetric encryption algorithms, the encryption key and decryption key are the same. The main symmetric encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting installed software on an Android platform. The method comprises the following steps: when an application program is installed, first, encrypting a digest value of an optimized executable code file by utilizing a private key, and finally, storing the encrypted digest value of the file; when the application program is installed, first, performing one-way hash operation on the optimized executable file to generate the digest value of the file, then, encrypting the generated digest value by utilizing a key, and finally, performing the one-way hash operation on the encrypted digest value again to obtain the digest value which serves as a root file for authentication. According to the method, the deficiency of an existing protecting scheme can be overcome, and the potential security hazard of an Android authentication mechanism can be eliminated; the Android system structure is not modified; any module is not required to be added; a developer of the application program is not affected.

Description

technical field [0001] The invention relates to the field of software security, in particular to a method for protecting installed software on an Android (Android) platform. Background technique [0002] With the rapid development of smart phones, smart phones play an increasingly important role in people's lives, such as communication, transactions, information, etc. and user preference. At the same time, due to the open source characteristics of the Android system code and its own unique security mechanism, it has become the main target of malware attacks. The security of the software on the Android platform is very important. At present, the protection methods for the software on the Android platform mainly contain the following methods: [0003] 1) Use code obfuscation technology; [0004] 2) NDK protection; [0005] 3) Shell protection technology; [0006] 4) Signature technology to prevent recompilation. [0007] The first three are the current methods used by de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/121
Inventor 丁勇张皎李新国丁继强官秀国
Owner GUILIN UNIV OF ELECTRONIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products