Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-interception method and device for program installation package

An installation package and anti-interception technology, which is applied in the field of data processing, can solve the problems of program installation package attack interception and high probability of program installation package being intercepted, and achieve the effect of reducing the probability of interception

Active Publication Date: 2021-04-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of smart terminal technology, more and more people download various layered installation packages from the application market, but some program installation packages are easily detected by antivirus software, resulting in program installation packages being blocked. attack interception
In the prior art solutions, in order to prevent the program installation package from being intercepted, the data and code of the program are usually compressed or interfering code is added, and the decompression or recovery code is inserted at the very beginning of the program, and then the program is repackaged to generate the program. When the program performs compression and deformation operations, it will produce fixed and identifiable features, so it will still be easily detected, resulting in a high probability that the program installation package will be intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-interception method and device for program installation package
  • Anti-interception method and device for program installation package
  • Anti-interception method and device for program installation package

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] Please refer to figure 1 , figure 1 It is a flow chart of the first embodiment of a program installation package anti-interception method proposed by the present invention. As shown in the figure, the method in the embodiment of the present invention includes:

[0051] S101. Acquire a program installation package, where the program installation package includes an executable program.

[0052] In specific implementation, any unprocessed origin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a program installation package anti-interception method, comprising: obtaining a program installation package, the program installation package includes an executable program; generating a random icon resource according to randomly assigned image attribute information, and using the random The icon resource replaces the original icon resource configured in the executable program; according to the pre-generated data mapping file, determine the code insertion position in the executable program, and insert invalid code at the determined code insertion position; according to configuring the random icon resource and the executable program into which the invalid code is inserted to generate a new program installation package. The embodiment of the invention also discloses an anti-interception device for program installation packages. By adopting the embodiment of the present invention, the probability that the program installation package is intercepted can be reduced.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a method and device for anti-intercepting program installation packages. Background technique [0002] With the continuous development of smart terminal technology, more and more people download various layered installation packages from the application market, but some program installation packages are easily detected by antivirus software, resulting in program installation packages being blocked. Attack interception. In the prior art solutions, in order to prevent the program installation package from being intercepted, the data and code of the program are usually compressed or interfering codes are added, and the decompression or recovery code is inserted at the very beginning of the program, and then the program is repackaged to generate the program. The program will generate fixed and identifiable features when performing compression and deformation operations, so i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563
Inventor 钱文祥
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products