Link library file encryption method and device and computing equipment

A file encryption and link library technology, applied in the Internet field, can solve the problems of easy-to-break system security, hidden dangers, etc., and achieve the effect of reducing the risk of hidden security risks and high reliability

Pending Publication Date: 2021-10-22
中国移动通信集团重庆有限公司 +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the embodiment of the present invention provides a link library file encryption method, device and computing equipment, which are used to solve the hidden dangers of system security caused by the easy cracking of the virtual machine protection mechanism existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link library file encryption method and device and computing equipment
  • Link library file encryption method and device and computing equipment
  • Link library file encryption method and device and computing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein.

[0043] The embodiment of the present invention is used for encrypting a link library file, and is specifically used for encrypting a function that needs to be encrypted in the link library file. The link library file in the embodiment of the present invention is an intermediate file generated after the initial code is compiled, and the function corresponding to the initial code can be realized by executing the intermediate file. The embodiment of the present invention does not limit the function language on which the link library file is based. For example, the link library file may be an so file generated after compilin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of Internet, and discloses a link library file encryption method and device, computing equipment and a computer storage medium, and the method comprises the steps: obtaining a virtual byte code set corresponding to a target link library file; determining a function needing to be encrypted in the target link library file to obtain a target function; randomly selecting a virtual byte code as a virtual instruction corresponding to the target function from the virtual byte code set through a random function so as to obtain a virtual instruction mapping table; and replacing the target function with the virtual instruction in the virtual instruction mapping table so as to encrypt the target function. Through the above mode, the embodiment of the invention realizes reliable encryption of the link library file.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of the Internet, in particular to a method, device and computing device for encrypting a link library file. Background technique [0002] The so file is a dynamic link library file in the Android system. Android uses NDK technology to compile the core code implemented in C / C++ language into a so library file for the Java layer to call. The cracking of the so file may lead to the leakage of the core function code and algorithm of the application. Attackers can easily capture and decrypt sensitive data on the client side by using core functions and algorithms, resulting in privacy disclosure or direct property loss of users. Therefore, whether the so file is safe or not has become one of the key factors affecting the overall security of Android. [0003] At present, the commonly used virtual machine protection mechanism of the Android system mainly uses the custom virtual machine in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/62G06F2221/2107
Inventor 孙燚周丽莎
Owner 中国移动通信集团重庆有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products