Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Executable program data packet encryption/decryption method and device

A technology for executing programs and data packets, applied in the field of data security, can solve the problems that the encryption method is easy to be cracked and cannot effectively reduce the malicious cracking of application programs, so as to reduce the probability of malicious cracking, improve the difficulty of cracking, and reduce the the effect of prevention

Active Publication Date: 2018-12-04
SHENZHEN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, only simple data obfuscation or encryption of an entire file is used. This encryption method is easy to be cracked and cannot effectively reduce the malicious cracking of the application program.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Executable program data packet encryption/decryption method and device
  • Executable program data packet encryption/decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] This implementation discloses an executable program data packet encryption / decryption method, such as figure 1 As shown, the method includes the following steps:

[0026] When encrypting executable program data packets:

[0027] S1. Obtain an executable program data package. In this embodiment, the executable program data package may be an executable file on the Android platform. In a specific embodiment, an encryption tool may be used to obtain the executable program data package.

[0028] S2. Splitting the executable program data package into several original files based on preset rules. In a specific embodiment, it can be preset that the executable program data package after random data transformation is divided into multiple files, for example, it can be equally divided into 8 binary files. The number of splits mentioned here is an example, and other more or Lesser quantity is workable. When splitting the executable program data package after random data change...

Embodiment 2

[0052] This embodiment provides an executable program data packet encryption / decryption device. Such as figure 2 As shown, the executable program data packet encryption / decryption device includes: a first acquisition unit 111, a split unit 112, an encryption unit 113, a receiving unit 114, a decryption unit 115 and a reassembly unit 116 wherein,

[0053] The first obtaining unit 111 is used to obtain the executable program data package;

[0054] A splitting unit 112, configured to split the executable program datagram into several original files based on preset rules;

[0055] An encryption unit 113, configured to encrypt each original file in the plurality of original files using the first key to obtain an encrypted file corresponding to each original file respectively;

[0056] A receiving unit 114, configured to receive encrypted encrypted files;

[0057] Decryption unit 115, configured to decrypt several encrypted files using the second key corresponding to the first k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for encryption / decryption of an executable program data package. The method comprises the steps that the executable program data package is acquired; based on preset rules, the executable program data package is divided into multiple original documents; a first secret key is used to encrypt the multiple original documents respectively, so that encryption documents which have one-to-one correspondence relations with each original document respectively can be obtained; the multiple encrypted encryption documents are received; a second secret key corresponding to the first secret key is used to decrypt the multiple encryption documents respectively, so that the multiple original documents which have the one-to-one correspondence relations with the encryption documents can be obtained; and index information of the original documents are used respectively to reform the multiple original documents, so that the executable program data package can be obtained. The method and the device provided by the invention have the advantages that vicious decryption of the executable program data package caused by theft of a single secret key in the executable program data package can be prevented; a probability of the vicious decryption of an application program can be reduced; and data safety of the application program can be enhanced.

Description

technical field [0001] The invention relates to the field of data security, in particular to an executable program data packet encryption / decryption method and device. Background technique [0002] With the development of smart terminal technology, there are various operating systems in the prior art, for example, the Android system is a kind of smart terminal operating system widely used at present. With the continuous growth of the market share of the Android mobile phone operating system, the number of application software of the Android system is also increasing at a fairly rapid rate. [0003] Due to the openness of the source code of the Android system, the Android system is popular and also provides convenience for malicious application software. For example, without the user's knowledge, malicious software has bad behaviors such as tariff consumption, arbitrary deduction, privacy theft, etc., and this behavior seriously damages the interests of users. The Java prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/64
CPCG06F21/14G06F21/64
Inventor 蔡树彬明仲黄荣杰
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products