Unlock instant, AI-driven research and patent intelligence for your innovation.

A file reinforcement method and device

A file and configuration file technology, applied in computer security devices, instruments, computing, etc., can solve the problems of stealing user privacy, defrauding users to install, defrauding fees, etc., and achieves the effect of ensuring file security.

Active Publication Date: 2019-03-08
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malware such as Trojan horses targeting the Android system can be stored in the Android installation package in a disguised manner, tricking users into installing and granting certain permissions, and then performing some specific actions in the background by abusing permissions, including stealing user privacy, defrauding tariffs, etc.; Not only that, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also gives normal app developers causing serious damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file reinforcement method and device
  • A file reinforcement method and device
  • A file reinforcement method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] refer to figure 1 , shows a flow chart of steps of a file hardening method according to an embodiment of the present invention.

[0021] Step 102, storing the function call information in the target executable file in the configuration file in advance.

[0022] Taking the Android system as an example, the APK (Android Package, Android installation package) includes a dex (DalvikVMexecutes) file, which is an Android Dalvik execution program, that is, the type of executable file on the Android platform, and the suffix is ​​.dex. If the execution process of the dex file, such as functions, is reversed, it will affect the security of the corresponding application and system. Therefore, the embodiment of the present invention proposes a reinforcement method for dex files to prevent the dex files from being reversed and protect the security of files, applications and systems.

[0023] For target executable files such as dex files, the function call can be hidden so that the...

Embodiment 2

[0029] The embodiment of the present invention can be applied to the Android system, taking the reinforcement and protection of the dex file as an example. The steps and flow of the file hardening method are discussed in conjunction with this example.

[0030] refer to figure 2 , shows a flow chart of steps of a file hardening method according to another embodiment of the present invention.

[0031] In step 202, the call relationship of all or part of the functions is obtained from the target executable file in advance, and the corresponding function call information is obtained.

[0032] Step 204, storing the function call information in a configuration file.

[0033] The target executable file to be protected in the embodiment of the present invention is the dex file, and the function call relationship can be hidden by function obfuscation, that is, to the function call in the target executable file, the call relationship of all or part of the function is obtained, and th...

Embodiment 3

[0045] On the basis of the above embodiments, this embodiment also provides a file strengthening device.

[0046] refer to image 3 , shows a structural block diagram of a file hardening device according to an embodiment of the present invention.

[0047] The preset module 302 is configured to pre-store the function call information in the target executable file into the configuration file.

[0048] The call determination module 304 is configured to determine function call information according to the configuration file when the system executes the target executable file.

[0049] The call execution module 306 is configured to execute a function call according to the function call information.

[0050] Taking the Android system as an example, the APK (Android Package, Android installation package) includes a dex (DalvikVMexecutes) file, which is an Android Dalvik execution program, that is, the type of executable file on the Android platform, and the suffix is ​​.dex. If th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file reinforcement method and apparatus. The method comprises the steps of previously storing function call information in a target executable file into a configuration file; when a system executes the target executable file, determining the function call information according to the configuration file; and executing a function call according to the function call information. Through reinforcing the target executable file, the target executable file is prevented from being reversed, thereby protecting the security of the target executable file.

Description

technical field [0001] The invention relates to the field of reinforcement technology, in particular to a file reinforcement method and device. Background technique [0002] The Android platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. Compared with other terminal operating systems, the open Android system provides application developers with more functional interfaces. These functional interfaces improve the system scalability, but also facilitates malware. Malware such as Trojan horses targeting the Android system can be stored in the Android installation package in a disguised manner, tricking users into installing and granting certain permissions, and then performing some specific actions in the background by abusing permissions, including stealing user privacy, defrauding tariffs, etc.; Not only that, for some normal Android system applications, there are also threats to the security of the Android system th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F2221/2107
Inventor 刘敏周亚金丁昌坤
Owner BEIJING QIHOO TECH CO LTD