Application security hardening method and device

An application program and security technology, which is applied in the computer field, can solve the problems of inability to implement batch maintenance of program reinforcement methods, waste of system resources, and high maintenance costs, and achieve the effects of easy batch maintenance, prevention of reverse analysis, and low maintenance costs

Active Publication Date: 2022-04-19
JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The program hardening method provided in the prior art is usually a code obfuscation method such as adding flowery instructions in the program. However, this kind of hardening method often causes program expansion and wastes system resources; Among them, it is completed by the compiler installed in the developer terminal, so that the batch maintenance of the program hardening method cannot be realized, and the maintenance cost is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application security hardening method and device
  • Application security hardening method and device
  • Application security hardening method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will refer to the accompanying drawings to describe in more detail the exemplary embodiments of the present disclosure. Although exemplary embodiments of the present disclosure are shown in the accompanying drawings, it should be understood that the present disclosure may be implemented in various forms and should not be limited by the embodiments described herein. Instead, these embodiments are provided in order to be able to more thoroughly understand the present disclosure, and to be able to communicate the scope of the present disclosure completely to those skilled in the art.

[0025] Figure 1 A schematic diagram of an application security hardening method provided according to one embodiment of the present invention is shown. Wherein, the application security hardening method provided in the present embodiment may be applied to IOS and / or MachOS systems. as Figure 1 As shown, the method comprises:

[0026] Step S110, extract the executable file from...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application program security reinforcement method and device. Wherein, the method includes: extracting the executable file from the preset application file in the application program; parsing the executable file to obtain the data segment and / or link segment in the executable file; aiming at the data segment in the executable file and / or link segments for encryption. By encrypting the data segment and / or link segment of the binary file, this solution can realize the reinforcement of the application program, thereby greatly increasing the reverse difficulty of the application program, effectively preventing the reverse analysis of the application program, and is not easy to cause the code of the application program to Expansion; moreover, the implementation process of this solution is simple and flexible, easy to maintain in batches, and the maintenance cost is low.

Description

Technical field [0001] The present invention relates to the field of computer technology, specifically to an application security reinforcement method and apparatus. Background [0002] With the continuous development of science and technology and society, the number of various applications has also grown rapidly. However, program reverse developers or program reverse products often can easily crack and attack the application by decompiling the application, thus threatening the application security. [0003] At present, in order to prevent reverse cracking of the application, there are many products and methods to strengthen the application in the prior art. However, in the process of implementing the present invention, the inventor finds that the above-described method in the prior art has at least the following defects: [0004] The program reinforcement method provided in the prior art is usually a code obfuscation method such as adding flower instructions to the program, how...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14G06F2221/2107
Inventor 汪德嘉华保健邵根波钱潇龄孟啸龙郑小敏
Owner JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products