Authentication method and device for reinforced software

An authentication method and authentication device technology, applied in the field of Internet security, can solve problems such as inability to effectively distinguish the source of service requests, inability to perform effective protection, and inability to protect data access

Inactive Publication Date: 2017-01-04
ZTE CORP
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, according to the service provision method of the existing Android system, the service provision application cannot perform access protection on the provided data.
Even if the service request application gives...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for reinforced software
  • Authentication method and device for reinforced software
  • Authentication method and device for reinforced software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] According to one aspect of the present invention, there is provided a method of authentication of hardened software, which is applied to a mobile terminal, such as figure 1 As shown, the authentication method 100 includes:

[0090] Step S103, after the server passes the verification of the shell program of the hardened software, obtain the key data sent by the server, the key data includes: the hidden data in the plaintext software code of the hardened software and the entry address corresponding to the hidden data;

[0091] Step S105 , according to the hidden data and the entry address, replace the corresponding data hidden by the plaintext software code of the hardened software stored in the memory, and then load the plaintext software code.

[0092] Through the authentication method of the reinforced software provided by the embodiment of the present invention, the key data provided by the server can be obtained, and according to the entry address corresponding to th...

Embodiment 2

[0113] According to another aspect of the present invention, there is also provided an authentication method of hardened software, which is applied to a server, such as Figure 5 As shown, the authentication method 500 includes:

[0114] Step S501, obtaining the processing result sent by the hardened software, and verifying the integrity check value of the shell program of the hardened software;

[0115] Step S503, if the verification result is that the verification is passed, then encrypt the key data, and send the encrypted data generated by encryption to the hardened software. The key data includes: the hidden data and the hidden data in the plaintext software code of the hardened software. The entry address corresponding to the data.

[0116] Wherein, in the embodiment of the present invention, the integrity check value of the shell program of the reinforced software is first verified to ensure the integrity of the shell program and effectively prevent the shell program f...

Embodiment 3

[0133] According to another aspect of the present invention, there is also provided an authentication device with hardened software, which is applied to a mobile terminal, such as Figure 8 As shown, the authentication device 800 includes:

[0134] The acquiring module 803 is configured to acquire key data sent by the server after the server passes the verification of the shell program of the hardened software, and the key data includes: the hidden data in the plaintext software code of the hardened software and the entry address corresponding to the hidden data ;

[0135] The replacement module 805 is used to replace the corresponding data hidden by the plaintext software code of the hardened software stored in the memory according to the hidden data and the entry address, and then load the plaintext software code.

[0136] Among them, such as Figure 8 As shown, in the embodiment of the present invention, the authentication device 800 also includes:

[0137] The processin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and device for reinforced software. The authentication method comprises the steps that after shell program verification of a server on the reinforced software is passed, key data sent by the server is acquired, wherein the key data comprises hidden data in plaintext software codes of the reinforced software and entry addresses corresponding to the hidden data; corresponding data which is stored in a memory and hidden by the plaintext software codes of the reinforced software is replaced according to the hidden data and the entry addresses, and then the plaintext software codes are loaded. According to the authentication method, the sources of service requests can be effectively distinguished, effective protection can be conducted when an malicious application requests service provision, the protection intensity of the reinforced software is greatly improved, attack of an attacker is effectively prevented, and it is guaranteed that the reinforced software can normally run.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to an authentication method and device for hardened software. Background technique [0002] In the Android (Android) system, in order to meet the needs of security, we will perform corresponding hardening processing on the application software installation package, and correspondingly hope that all the installation packages circulated in the market have been hardened. But the existing Android software market is of a great variety, and there will be many customized versions for the release of the same software installation package. [0003] For Android services, when running as an application service, a new process will be started or a service object will be created using the existing process of the application. When other applications call this service, the code of this service object completes the specific business logic. [0004] However, according to the service provi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/64
CPCG06F21/12G06F21/64G06F21/125G06F21/44G06F21/57G06F21/602G06F2221/033H04L9/0869H04L9/14
Inventor 李晖王蔚董振江张文张亚腾
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products