Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A software reinforcement method and system

A technology of software and software development tools, applied in the field of security, can solve the problems of deepening the degree of threat, endangering users, and many security threats, so as to prevent illegal acquisition, improve security, and achieve the effect of protection

Active Publication Date: 2019-02-12
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the accompanying security problems have not been well resolved. There are more and more security threats, and the threat level is gradually deepening, which has brought adverse effects on both developers and users.
[0003] Moreover, for some normal Android system applications, there are also threats to the security of the Android system through illegal copying, reverse engineering, decompilation, debugging, cracking, secondary packaging, memory interception, etc., which not only endangers users, but also threatens normal applications. serious damage to the developer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A software reinforcement method and system
  • A software reinforcement method and system
  • A software reinforcement method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Reference figure 1 , Shows a flowchart of the steps of a software hardening method in the first embodiment of the present invention. In this embodiment, the software hardening method may include:

[0026] Step 102: Analyze the software development kit SDK to determine the display interface.

[0027] Software Development Kit, SDK, Software Development Kit: Generally, it is a collection of development tools used by software engineers to build application software for specific software packages, software frameworks, hardware platforms, operating systems, etc.

[0028] The SDK can be distributed to users along with the installation package of the corresponding application software. At present, when the SDK is distributed to the user along with the installation package of the corresponding application software, all interfaces in the SDK and the content in the interface are exposed Out of (show). In this embodiment, according to the application software or the interface actually r...

Embodiment 2

[0037] Reference figure 2 , Shows a flowchart of the steps of a software hardening method in the second embodiment of the present invention. In this embodiment, the software hardening method can be but not limited to being applied to the Android system, and the method can specifically include:

[0038] Step 202: Analyze the software development kit SDK to determine the display interface.

[0039] In this embodiment, the display interface may be determined according to the type of service to be executed; wherein there is at least one display interface. For example, for a certain application software, according to the type of business to be executed, the interfaces to be used can be determined as: program initialization interface, order query interface, and order generation interface, then the program initialization interface and order query interface in the SDK can be used The order generation interface is determined as the display interface, so as to be provided for the user to c...

Embodiment 3

[0057] Based on the same inventive concept as the above method embodiment, refer to image 3 , Shows a structural block diagram of a software reinforcement system in the third embodiment of the present invention. In this embodiment, the software reinforcement system includes:

[0058] The parsing module 302 is used to analyze the software development kit SDK and determine the display interface.

[0059] The first hiding module 304 is used to hide other interfaces in the SDK except the display interface.

[0060] The second hiding module 306 is used to hide the interface content in the display interface.

[0061] The save as module 308 is configured to save the interface content in the display interface separately, so as to obtain the corresponding interface content from the save location when the display interface is called.

[0062] The generating module 310 is used to repackage the modified SDK to generate a reinforced SDK.

[0063] It can be seen that in this embodiment, only the dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software hardening method and system. The method comprises the steps of analyzing a software development kit (SDK), and determining a display port; hiding other ports, except the display port, in the SDK, and hiding the port content in the display port; saving the port content in the display port in another place so as to acquire the corresponding port content from the another place when the display port is called; repackaging the corrected SDK to generate a hardened SDK. By the adoption of the method and system, software protection is achieved, software safety is improved, and the rights of developers and users are protected.

Description

Technical field [0001] The present invention relates to the field of security technology, in particular to a software reinforcement method and system. Background technique [0002] The Android platform has developed rapidly and has gradually become the most popular operating system for mobile terminals. At the same time, the number of software applications based on it is also very large. Compared with other mobile terminal operating systems, the Android system provides more for application developers. Multiple functional interfaces, many of which are at the bottom of the system, improve the scalability of the system, but at the same time provide convenience for malware. Trojan horses targeting Android systems are also easier to implement. Currently there are existing ones targeting Android systems. Malware can be used to pretend to deceive users to install and grant certain permissions, and then abuse these permissions to perform certain actions in the background, including steal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/56
CPCG06F21/14G06F21/566G06F2221/033
Inventor 刘敏
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products