Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Software hardening method and system

A technology of software and software development tools, applied in the field of security, can solve the problems of deepening threat, endangering users, and many security threats, and achieve the effect of preventing illegal acquisition, improving security, and protecting rights and interests

Active Publication Date: 2016-07-13
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the accompanying security problems have not been well resolved. There are more and more security threats, and the threat level is gradually deepening, which has brought adverse effects on both developers and users.
[0003] Moreover, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also threatens normal applications. serious damage to the developer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software hardening method and system
  • Software hardening method and system
  • Software hardening method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] refer to figure 1 , shows a flow chart of steps of a software hardening method in Embodiment 1 of the present invention. In this embodiment, the software hardening method may include:

[0026] Step 102, analyzing the software development kit SDK to determine the display interface.

[0027] SoftwareDevelopmentKit, SDK, software development kit: Generally, it is a collection of development tools used by some software engineers to build application software for specific software packages, software frameworks, hardware platforms, operating systems, etc.

[0028] The SDK can be delivered to the user together with the installation package of the corresponding application software. At present, when the SDK is delivered to the user together with the installation package of the corresponding application software, all interfaces in the SDK and the contents of the interface are exposed. out (display). In this embodiment, according to the actual required interfaces of applicatio...

Embodiment 2

[0037] refer to figure 2 , shows a flow chart of steps of a software hardening method in Embodiment 2 of the present invention. In this embodiment, the software reinforcement method may be, but not limited to, applied to the Android system, and the method may specifically include:

[0038] Step 202, analyzing the software development kit SDK to determine the display interface.

[0039] In this embodiment, the display interface may be determined according to the type of service to be executed; wherein, there is at least one display interface. For example, for a certain application software, according to the type of business to be executed, it can be determined that the interfaces to be used are: program initialization interface, order query interface and order generation interface, then the program initialization interface and order query interface in the SDK can be and the order generation interface are determined as the display interface to be provided to the user for call...

Embodiment 3

[0057] Based on the same inventive concept as the above-mentioned method embodiment, refer to image 3 , shows a structural block diagram of a software hardening system in Embodiment 3 of the present invention. In this embodiment, the software hardening system includes:

[0058] The parsing module 302 is configured to parse the software development kit SDK and determine the display interface.

[0059] The first hiding module 304 is configured to hide other interfaces in the SDK except the display interface.

[0060] The second hiding module 306 is configured to hide interface content in the display interface.

[0061] The saving module 308 is configured to save the interface content in the display interface, so as to obtain the corresponding interface content from the saved location when the display interface is called.

[0062] A generating module 310, configured to repackage the modified SDK to generate a hardened SDK.

[0063] It can be seen that in this embodiment, onl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software hardening method and system. The method comprises the steps of analyzing a software development kit (SDK), and determining a display port; hiding other ports, except the display port, in the SDK, and hiding the port content in the display port; saving the port content in the display port in another place so as to acquire the corresponding port content from the another place when the display port is called; repackaging the corrected SDK to generate a hardened SDK. By the adoption of the method and system, software protection is achieved, software safety is improved, and the rights of developers and users are protected.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a software reinforcement method and system. Background technique [0002] The Android (Android) platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. At the same time, the number of software applications based on it is also very large. Compared with other mobile terminal operating systems, the Android system provides more for application developers. Many functional interfaces, many of which are the underlying interfaces of the system, improve the scalability of the system, but at the same time provide convenience for malicious software. Malware such as Trojan horses targeting the Android system are also easier to implement. Malicious software can deceive users to install and grant certain permissions by disguising, and then abuse these permissions to perform certain actions in the background, including stealing user priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14G06F21/56
CPCG06F21/14G06F21/566G06F2221/033
Inventor 刘敏
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products