Terminal application protecting method and device

A terminal application and protection device technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve the problem of high threshold, achieve the effect of preventing tampering and reducing the embedding of malicious advertisements

Active Publication Date: 2015-01-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] For the situation that the advertisement authentication information is in the JAVA code, after decompiling the classes.dex file in the Android installation package (APK, AndroidPackage) installation file in the terminal application through the assembler Smali, you can find the authentication by reading the pseudo code ID and tampering, the threshold of this method is relatively higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal application protecting method and device
  • Terminal application protecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] figure 1 It is a schematic flowchart of an embodiment of a protection method for a terminal application of the present invention, such as figure 1 shown, including the following steps:

[0046] Step 101: encrypting the application attributes of the terminal application;

[0047] Here, the application attribute of the terminal application is encrypted at the display layer, and the display layer is a decompilable layer, which may be a JAVA layer in the present invention;

[0048] Wherein, the application attribute includes an application package name, or a combination of an application package name and a digital signature.

[0049] The application attributes of the encryption terminal application specifically include:

[0050] The application package name of the terminal application is obtained, the application package name i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal application protecting method. The method comprises the steps that the application attributes of a terminal application are encrypted; the main logic of the terminal application is achieved through a programming language, and a decryption algorithm is packaged; when an instruction for starting the terminal application is received, the encrypted application attributes are called, the encrypted application attributes are decrypted, the decrypted application attributes are checked, and after the application attributes pass the check, the main logic of the terminal application is called. The invention further discloses a terminal application protecting device. According to the scheme, the terminal application can be effectively prevented from being tampered, and malicious advertisement embedment is reduced.

Description

technical field [0001] The present invention relates to a terminal application protection technology, in particular to a terminal application protection method and device based on an open code platform. Background technique [0002] The application security of the Android platform has been widely criticized. Due to the imperfect review mechanism of the domestic Android application market and the decompilability of the JAVA language, many domestic developers have maliciously cracked and decompiled the original application. After the package name and advertisement authentication information of the terminal application, the terminal application is repackaged and released for illegal profit, which will greatly damage the interests of the original developers and seriously hit the enthusiasm of the original developers. The Android security technology commonly used in China at present is to increase the difficulty of reading the decompiled code by obfuscating the source code, but i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/51
CPCG06F21/121G06F21/107
Inventor 李峰胥彪喻帅林野
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products