Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method, decryption method and system of so file in application program

A technology of application program and encryption method, which is applied in the field of data security, can solve problems such as so file protection loopholes, and achieve the effect of simple method and improved efficiency

Active Publication Date: 2020-02-07
贵州泰若数字科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, there are huge loopholes in the protection of so files in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method, decryption method and system of so file in application program
  • Encryption method, decryption method and system of so file in application program
  • Encryption method, decryption method and system of so file in application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0032] The prior art usually adopts the circular dependency method of the so file to protect the so file. The so-called circular dependency, in layman's terms, is that if there are three so files a, b, and c, then let the a file verify the b and c files, but this In the method, the a file is not verified, therefore, hackers can bypass all verification steps by modifying the verification program of a.

[0033] In order to overcome the above-mentioned defects that exist in the prior art, the present invention provides a kind of encryption method of so file in the application program, such as figure 1 shown, including:

[0034] S1. Generate the public-private key pair of ea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method, and a decryption method and system for so files in an application program. The encryption method comprises the steps of generating a public and secret key pair for each so file in the application program via an RSA algorithm, wherein the public and secret key pairs of any two so files are different; for a to-be-encrypted so file, configuring a first section of information for storing encrypted data of the to-be-encrypted so file and a second section of information for storing a secret key of a paired so file of the to-be-encrypted so file; performing encryption on own data of the to-be-encrypted so file via a public key of the to-be-encrypted so file to obtain the encrypted data, storing the encrypted data to the first section of the information, and storing the secret key of the paired so file in the second section of the information. According to the encryption method, and the decryption method and system provided by the invention, each so file is not relied on another so file, such that any so file cannot be used independently and the protective effect to the so files is implemented.

Description

technical field [0001] The present invention relates to the field of data security, more specifically, to an encryption method, a decryption method and a system for an so file in an application program. Background technique [0002] At present, Android applications will write the core functions into the so file. The so file is a dynamic link library file of Unix, which is equivalent to the .dll file under windows. Since the so file is written in C language or C++, its security is much higher than that written in JAVA. When the Android application is released, the so file will be placed in the final APK file. With the modularization of Android program development, independent functions are generally written into an SO file, and then the main program loads the SO of each independent function to complete the corresponding function. [0003] Hackers can easily obtain all the so files in the APK package by decompressing the APK file, thereby stealing the developer's intellectua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107H04L9/0819H04L9/0894H04L9/302
Inventor 周志刚张文明陈少杰
Owner 贵州泰若数字科技有限公司