Digital key protection method based on Android system and system thereof

A digital key and protection system technology, which is applied to the public key and key distribution of secure communication, can solve the problem that the dex file is easily reversed into java code, the key is not safe to store statically, and the key is easy to be captured and intercepted, etc. problems, to achieve the effect of not being easy to intercept randomly, realizing protection and ensuring security

Inactive Publication Date: 2019-03-19
中新金桥数字科技(北京)有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Based on this, in view of the above problems, it is necessary to propose a method that can solve the insecure key static storage in the android system, the key is easily intercepted by packet capture, and the dex file is easily reversed into java code, and the key is directly obtained, etc. The digital key protection method and system based on the Android system of the problem improve the security of the key, the security of user information, and the security of resource files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital key protection method based on Android system and system thereof
  • Digital key protection method based on Android system and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Such as figure 1 Shown, a kind of digital key protection method based on Android system comprises the following steps:

[0049] a. Receive the resource file, generate an encrypted plaintext key to encrypt the resource file;

[0050] b. Based on the AES symmetric encryption algorithm, the encrypted plaintext key is encrypted once;

[0051] c. According to the RSA asymmetric encryption algorithm, double-encrypt the encrypted plaintext key to obtain the ciphertext.

[0052] In this embodiment, AES symmetric encryption is used to encrypt and decrypt resource files; then RSA asymmetric encryption is used to encrypt and decrypt the encrypted plaintext key, which solves the problem of insecure key static storage in the android system, and solves the problem of In the android system, the key is easy to be captured and intercepted. At the same time, it also solves the problem that the dex file in the android system is easily reversed into java code, and the key is directly obt...

Embodiment 2

[0056] In this embodiment, on the basis of Embodiment 1, the step b includes the following steps:

[0057] b101. After obtaining the encrypted plaintext key, call the RSA public key, perform double encryption on the encrypted plaintext key, and obtain the ciphertext;

[0058] b102, storing the RSA public key used for decryption in the server;

[0059] b103. Write the RSA private key into the c file, compile the c file, generate the corresponding so library, and encapsulate the RSA private key.

[0060] In this embodiment, RSA asymmetric encryption is used to encrypt and decrypt the encrypted plaintext key, and the public key is stored in the server; while ensuring the integrity of the file, the security of the key is guaranteed to realize the protection of the digital key.

Embodiment 3

[0062] On the basis of embodiment 2, this embodiment also includes the following steps:

[0063] After the encryption is completed, if the decryption command is received, the so library interface is called to obtain the RSA private key;

[0064] If the RSA private key matches the RSA public key stored in the server, the decryption is successful and the encrypted plaintext key is obtained.

[0065] In this embodiment, the client uses RSA to decrypt locally, uses the ndk development tool to encapsulate the key in the so file, the matching is successful, and the link to the resource file is obtained; ensuring that the file is secure enough to prevent it from being randomly intercepted.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a digital key protection method based on an Android system. The method comprises the following steps: receiving a resource file and generating an encrypted plaintext key to encrypt the resource file; performing a single encryption on the encrypted plaintext key based on the AES symmetric encryption algorithm; performing a dual encryption on the encrypted plaintext key basedon the RSA asymmetric encryption algorithm, and obtaining a ciphertext. The invention further discloses a digital key protection system based on the Android system. The protection system comprises afile encryption module, an AES encryption module, and an RSA encryption module. The digital key protection method based on Android system and system thereof adopt the AES symmetric encryption to encrypt and decrypt the resource file, and then use the RSA asymmetric encryption to encrypt and decrypt the encrypted plaintext key, so that the following problems are solved: the key static storage in the android system is insecure, the key in the android system is easy to be intercepted, and a dex file in the android system can be easily reversed into a java code and the key is directly obtained. The security of the key, the security of the user information, and the security of the resource file are improved.

Description

technical field [0001] The invention relates to the technical field of digital keys, in particular to an Android system-based digital key protection method and system thereof. Background technique [0002] The key plays a very important role in the protection of user data, so the protection of the key is also the top priority. [0003] The traditional key protection methods are divided into the following types: [0004] 1. Save the static secret key through SharedPreferences: This kind of key preservation method is extremely insecure. After decompiling the android product, you can directly obtain the key stored in plain text from the android product. [0005] 2. The server saves the key method: the key is stored on the server. Although the security has been improved to a certain extent, it is also easy to be intercepted by packet capture. [0006] 3. Save by Java hard coding: Divide the key into different segments, some are stored in the file, some are stored in the code, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L9/30
CPCH04L9/0822H04L9/0631H04L9/0825H04L9/302
Inventor 刘汉操彭付林赵海涛
Owner 中新金桥数字科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products