Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for preventing application program from being reversely engineered

An application and reverse engineering technology, applied in the direction of program/content distribution protection, instruments, electrical digital data processing, etc., can solve the problems of AndroidApp theft, tampering, debugging, etc., to prevent log leakage, prevent dynamic debugging, prevent The effect of being backed up

Pending Publication Date: 2020-12-15
VATTI CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although Android officially has configuration-specific rules written into files to perform basic encryption on the produced apk package (Android application package) and jar package, there are various reverse engineering Andorid App software on the market (such as Android Reverse Assistant , Android modification master, etc.), it is easy to reverse engineer the source code of Andorid App, and Android is based on java language, and there are countless reverse engineering tools in java language, which can basically achieve 100% decompilation, resulting in Andorid App being Misappropriation, tampering, debugging, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for preventing application program from being reversely engineered
  • Encryption method for preventing application program from being reversely engineered

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0026] Embodiments of the present invention provide an encryption method for preventing applications from being reverse engineered, such as Figure 1-2 shown, including the following steps:

[0027] S1. Perform binary reading of the installation package file corresponding to the application program to obtain the binary installation package file and the shell dex file;

[0028] S2. Encrypting the content of the binary installation package file to obtain an encrypted dex file;

[0029] S3, merging the shell dex file and the encrypted dex file into a new dex file;

[0030] S4. Repackage the new dex file to obtain an encrypted installation package file.

[0031] In this way, the binary installation package file and the shell dex file are obtained by binary reading the unencrypted installation package file in the application, and the encrypted dex file is obtained after encrypting the contents of the binary installation package file; the encrypted shell dex file and the encrypted...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method for preventing an application program from being reversely engineered. The encryption method comprises the following steps: performing binary reading on aninstallation package file corresponding to the application program to obtain a binary installation package file and a shell dex file; encrypting the content of the binary installation package file toobtain an encrypted dex file; combining the shell dex file and the encrypted dex file into a new dex file; and repackaging the new dex file to obtain an encrypted installation package file. Accordingto the encryption method for preventing the application program from being reversely engineered, binary interpretation is carried out on the installation package file, then a unique encryption algorithm is carried out on byte codes of the binary installation package file, and finally a layer of shell of the encryption algorithm is added, so that a core code algorithm in the installation package file is protected; and the installation package file is prevented from being packaged for the second time, and the decryption algorithm is only owned, so that the cracking difficulty is increased. Forthe user, the operation is not perceived, and the normal use of the user is not influenced.

Description

technical field [0001] The invention belongs to the technical field of encryption, and in particular relates to an encryption method for preventing application programs from being reverse engineered. Background technique [0002] Today, Android (Android) mobile phones are the mobile phones with the largest market share in the world, and there are more than 10 million Apps on mobile phones. It can be said that whether a mobile App is safe or not directly affects the use of users. Reverse engineering is to restore the packaged Andorid App (application program) into dex files (compiled code files) and res files (file resources), then convert the dex files into jar files, and then use the visual code tool to code At this time, you can perform operations such as ad implantation, interface modification, and repackaging of the Andorid App. [0003] Although Android officially has configuration-specific rules written into files to perform basic encryption on the produced apk packag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/60
CPCG06F21/14G06F21/602
Inventor 蒋杰文潘叶江
Owner VATTI CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products