A kind of Android SO file protection method and device
A file and Android technology, applied in the computer field, can solve the problems of easy acquisition and embezzlement of SO files, low security, etc., and achieve the effect of avoiding embezzlement and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] This embodiment provides a protection method for Android SO files, such as figure 1 As shown, the method includes:
[0045] Step S101, when the application program loads the SO file, obtain the environment information in which the SO file runs, wherein the SO file is an encrypted file;
[0046] Step S102, encrypting the environment information;
[0047] Step S103, sending the encrypted environment information to the server;
[0048] Step S104, when receiving the key returned by the server based on the encrypted environment information, decrypt and invoke the SO file based on the key.
[0049] It should be noted that the method provided in this embodiment is applied to a client, and the client is connected to the server through a wireless or limited network to implement communication.
[0050]In a specific implementation process, the client may be a smart phone, a tablet computer or a desktop computer, which is not limited here. The server may be an independent serve...
Embodiment 2
[0109] This embodiment provides a protection method for Android SO files, such as figure 2 As shown, the method includes:
[0110] Step S201, receiving the encrypted environment information sent by the client, wherein the environment information is used to represent the running environment of the SO file loaded by the application;
[0111] Step S202, judging whether the encrypted environment information meets the preset requirements;
[0112] Step S203, when the encrypted environment information meets the preset requirements, send a key to the client, so that the client can decrypt and invoke the SO file based on the key.
[0113] It should be noted that the method provided in this embodiment is applied to a server, and the server and the client in Embodiment 1 are connected through a wireless or limited network to implement communication.
[0114] In a specific implementation process, the client may be a smart phone, a tablet computer or a desktop computer, which is not li...
Embodiment 3
[0122] This embodiment provides a protection device for Android SO files, the device is a client, such as image 3 shown, including:
[0123] The obtaining module 301 is used to obtain the environment information of the operation of the SO file when the application program loads the SO file, wherein the SO file is an encrypted file;
[0124] An encryption module 302, configured to encrypt the environment information;
[0125] The first sending module 303 is configured to send the encrypted environment information to the server;
[0126] The decryption module 304 is configured to decrypt and call the SO file based on the key when receiving the key returned by the server based on the encrypted environment information.
[0127] In a specific implementation process, the client may be a smart phone, a tablet computer or a desktop computer, which is not limited here.
[0128] Since the device introduced in the third embodiment of the present invention is the device used to implem...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


