Encryption method, decryption method and system of so file in application program
A technology of application program and encryption method, which is applied in the field of data security, can solve problems such as so file protection loopholes, and achieve the effect of simple method and improved efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.
[0032] The prior art usually adopts the circular dependency method of the so file to protect the so file. The so-called circular dependency, in layman's terms, is that if there are three so files a, b, and c, then let the a file verify the b and c files, but this In the method, the a file is not verified, therefore, hackers can bypass all verification steps by modifying the verification program of a.
[0033] In order to overcome the above-mentioned defects that exist in the prior art, the present invention provides a kind of encryption method of so file in the application program, such as figure 1 shown, including:
[0034] S1. Generate the public-private key pair of ea...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


