Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection method of application programs and server

An application and security protection technology, applied in the field of communication, can solve the problems of poor application security and difficulty in tracing, etc.

Active Publication Date: 2016-06-15
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, applications (software) based on mobile platforms (also known as mobile operating systems) are more and more widespread, but the security of applications is poor
Here, the security of the application program mainly means that the application program is decompiled by reverse tools, and the decompiled code is highly readable, easy to analyze, easy to modify, easy to repackage, and difficult to trace after modification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method of application programs and server
  • Safety protection method of application programs and server
  • Safety protection method of application programs and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] An application program security protection method provided by the embodiment of the present invention can be implemented in the following manner: by modifying the encryption flag in the application program to deceive the reverse tool, but this security reinforcement method is easy to analyze and restore, and the security is poor , and the reverse modification of the application cannot be traced, and the traceability is poor.

[0079] Another application security protection method provided by the embodiment of the present invention can be implemented in the following manner: the real application program is encrypted, and the shell program decrypts and starts it when running, but the shell program will also be analyzed by the reverse tool , so the security is poor. In addition, this method has strict restrictions on the version and operating environment of the mobile platform, and cannot adapt to multiple versions of the mobile platform, and has poor compatibility.

[008...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection method of application programs and a server. The method comprises following steps: receiving a first application program sent from a client by the server; collecting parameters / instructions of the first application program by the server in order to obtain a second application program such that the second application program can normally operate and enable a reverse tool to exit by fault when the reverse tool is utilized for analyzing the second application program; and sending the second application program to the client by the server.

Description

technical field [0001] The invention relates to communication technology, in particular to an application program security protection method and server. Background technique [0002] At present, applications (software) based on mobile platforms (also called mobile operating systems) are more and more widespread, but the security of the applications is poor. Here, the security of the application program mainly means that the application program is decompiled by a reverse tool, and the decompiled code is highly readable, easy to analyze, easy to modify, easy to repackage, and difficult to trace after modification. [0003] Taking the Android platform as an example, an application program (such as a Java application program) running on a virtual machine (such as a Dalvik virtual machine) is extremely easy to be decompiled by a reverse tool. [0004] Android is a Linux-based free and open-source operating system primarily used on mobile devices such as smartphones and tablets. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14H04L29/06
Inventor 石松泉左敏刘芳柏洪涛
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products