Signature verification method and device for application

An application and signature verification technology, applied in the field of information security, can solve the problems of easy disclosure of plaintext signature information, deduction of fees, waste of mobile phone power and traffic, etc.

Inactive Publication Date: 2016-10-12
JUHAOKAN TECH CO LTD
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The APP generated by the second packaging is exactly the same as the regular APP in terms of performance, user experience, and appearance, but behind it, it is secretly running a terrible program, which will waste mobile phone power and data without knowing it, maliciously charge fees, Peeping privacy, etc.
In the face of secondary packaging, many companies have their own preventive measures. Many APPs only deal with it at the code level to prevent secondary packaging. The method is to dynamically obtain the application signature and the plaintext signature preset in the program through the program. Compare the information, and then judge whether it has been packaged twice, but the current Android terminal code is extremely easy to decipher, especially the plaintext signature information written directly in the code is more likely to leak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification method and device for application
  • Signature verification method and device for application
  • Signature verification method and device for application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0049] One of the core ideas of the embodiment of the present application is that the embodiment of the present application obtains the dynamic signature information of the application program by calling the function in the dynamic link library, and compares the dynamic signature information with the pre-embedded first signature information. If they are inconsistent, Then close the application; if consistent, run the application.

[0050] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of an application signature verification method of the present application, which may specifically include the following steps:

[0051] Step 101, calling the target function in the preset dynami...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the present application provides a method for verifying the signature of an application program, including: calling a target function in a preset dynamic link library; obtaining the dynamic signature information of the application program through the target function; and verifying the dynamic signature information Whether it is consistent with the first signature information pre-embedded in the dynamic link library; if not, close the application program; if consistent, run the application program. In the embodiment of the present application, the dynamic signature information of the application program is acquired by calling a function in the dynamic link library, and the dynamic signature information is compared with the pre-embedded first signature information. If they are inconsistent, the application program is closed. Since it is difficult to crack the dynamic link library, the method of obtaining the signature information by calling the function of the JAVA layer in the dynamic link library is also difficult to crack. This makes it difficult for counterfeiters to obtain the signature information of the application, thereby preventing the program from being repackaged.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method for verifying a signature of an application program and a device for verifying a signature of an application program. Background technique [0002] With the development of technology, smart terminals such as smartphones and smart TVs have increasingly become an indispensable part of people's lives. Various applications on smart terminals present a rich and colorful world to people. Through applications, people can easily realize activities such as obtaining information, watching entertainment programs, purchasing commodities, and completing payment. Just because the functions of the application programs are becoming more and more powerful, people pay more and more attention to the data security of the application programs. [0003] Due to the openness of the Android system, some criminals implant malicious codes into the APP and repackage it after...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 杨绍栋于芝涛
Owner JUHAOKAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products