CN106529222A - Protection method and protection system for preventing secondary packaging and cracking of application program - Google Patents

Protection method and protection system for preventing secondary packaging and cracking of application program Download PDF

Info

Publication number
CN106529222A
CN106529222A CN201611128845.4A CN201611128845A CN106529222A CN 106529222 A CN106529222 A CN 106529222A CN 201611128845 A CN201611128845 A CN 201611128845A CN 106529222 A CN106529222 A CN 106529222A
Authority
CN
China
Prior art keywords
application program
hash
file
hash value
value information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611128845.4A
Other languages
Chinese (zh)
Inventor
郭训平
林魏
严智慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiyouwang'an Technology Co Ltd
Original Assignee
Beijing Zhiyouwang'an Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiyouwang'an Technology Co Ltd filed Critical Beijing Zhiyouwang'an Technology Co Ltd
Priority to CN201611128845.4A priority Critical patent/CN106529222A/en
Publication of CN106529222A publication Critical patent/CN106529222A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a protection method for preventing secondary packaging and cracking of an application program. The method comprises the following steps of (1) carrying out encryption processing on the application program and obtaining the encrypted application program and a Hash verification certificate file of an application program file; (2) installing and running the encrypted application program and obtaining Hash value information of an encrypted application program file; and (3) verifying the Hash verification certificate file and the Hash value information and judging whether the Hash verification certificate file is consistent with the Hash value information or not, if so, enabling the application program to normally run, and if not, enabling the application program to quit running. The invention further provides a protection system for preventing secondary packaging and cracking of the application program.

Description

The anti-secondary packing of application program and the guard method for cracking and protection system
Technical field
The invention belongs to security technology area, more particularly to the anti-secondary packing and the protection for cracking of a kind of application program Method and protection system.
Background technology
At present, existing on the market to apply Android or IOS uses signature check technology to beat as the anti-secondary of application program Bag and the guard method for cracking and system.By taking Android platform as an example, the method is by Android java layer or c layers or server layer During by obtaining current operation, the signature of program is once verified to judge whether changed when program signature with original signature (I.e. secondary packing).
But, existing guard method is only verified to application program, before having original application program signature file The meaning for just losing safeguard protection is put, and, existing guard method obtains the signature of program using Android system interface Information, and Android system is due to increasing income, the code of each system interface all by being perfectly clear that hacker grasps, by simple Hook technologies are rewritable, interception, monitor any data obtained by system interface, there is very big safe back door.
The content of the invention
It is an object of the invention to provide a kind of can improve answering for application security level by hash value check addition With anti-secondary packing and the guard method for cracking and the protection system of program.
Technical scheme is as follows:A kind of anti-secondary packing and the guard method for cracking of application program includes:Plus Close application program, the Hash verification certificate files of file in the application program and application program after acquisition is encrypted;Install and transport Row it is described it is encrypted after application program, and obtain it is described it is encrypted after application program own files hash value information;School Test the Hash to verify certificate file with the hash value information and judge whether consistent, if unanimously, application program is normal Operation, if it is inconsistent, application program is out of service.
Preferably, the encryption application program is specifically included:To carrying out Hash per text document in the application program Obtain and generate Hash verification certificate files.
Preferably, it is described obtain it is described it is encrypted after the hash value information of application program own files specifically include:Institute State it is encrypted after application program obtain per text document hash value information.
Preferably, the verification Hash verifies certificate file with the hash value information and judges whether consistent concrete Including:Verified described with the hash value information of the corresponding file per portion Hash verification certificate files;Judge Whether the Hash verification certificate files of each file are consistent with corresponding hash value information;If described per portion Hash verifications Certificate file is consistent with corresponding hash value information, and the application program continues normal operation;If arbitrary Hash Verification certificate file is inconsistent with corresponding hash value information, then the application program is directly out of service.
Preferably, the file in the application program includes DEX file, XML file, text, resource file and stream Media file.
A kind of anti-secondary packing of application program and the protection system for cracking, including:Encrypting module, for encrypting application Program, the Hash verification certificate files of file in the application program and the application program after acquisition is encrypted;Hash value information Acquisition module, for install and run it is described it is encrypted after application program after, obtain it is described it is encrypted after application program The hash value information of own files;Hash value correction verification module, for verifying the Hash verification certificate files and the hash value Information, judges whether that unanimously if unanimously, application program is normally run, if it is inconsistent, application program is out of service.
Preferably, the encrypting module, specifically for carrying out Hash acquisitions per text document in the application program And generate corresponding Hash verifications certificate file.
Preferably, the hash value data obtaining module, specifically for every a in application program of the acquisition after encrypted The hash value information of file.
Preferably, the hash value correction verification module, specifically for:By described per portion Hash verification certificate files and institute The hash value information for stating corresponding file is verified;Judge the Hash verification certificate files and corresponding Hash of each file Whether value information is consistent;It is if described consistent with corresponding hash value information per portion Hash verification certificate files, described Application program continues normal operation;If arbitrary Hash verifications certificate file is inconsistent with corresponding hash value information, Then the application program is directly out of service.
Preferably, the file in the application program includes DEX file, XML file, text, resource file and stream Media file.
The technical scheme that the present invention is provided has the advantages that:
1st, the anti-secondary packing and the guard method for cracking of the application program and protection system are realized to every a resource text Part, text, code file, media file etc. are verified, and realizing any text document has carried out deleting, changed, replace Change and all can be detected by verification mode;
2nd, the anti-secondary packing and the guard method for cracking of the application program and protection system obtain file hash value, file school The technology tested is all unrelated with the code of Android system or IOS systems, so safe back door will not be caused because Android is increased income to ask Topic.
Description of the drawings
Fig. 1 is the anti-secondary packing of application program provided in an embodiment of the present invention and the flow chart element of the guard method for cracking Figure;
Fig. 2 is the anti-secondary packing of application program shown in Fig. 1 and the schematic flow sheet of the guard method for cracking;
Fig. 3 is the anti-secondary packing of application program provided in an embodiment of the present invention and the structured flowchart of the protection system for cracking.
Specific embodiment
In order that the objects, technical solutions and advantages of the present invention become more apparent, it is below in conjunction with drawings and Examples, right The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, and It is not used in the restriction present invention.
The description of specific distinct unless the context otherwise, the element and component in the present invention, quantity both can be with single shape Formula is present, it is also possible in the form of multiple, and the present invention is not defined to this.Although the step in the present invention is entered with label Arrangement is gone, but is not used to limit the precedence of step, unless expressly stated the order of step or holding for certain step Based on row needs other steps, the relative rank of otherwise step is adjustable.It is appreciated that used herein Term "and/or" is related to and covers one of associated Listed Items or one or more of any and all possible group Close.
Please refer to Fig. 1 and Fig. 2, the anti-secondary packing and the protection for cracking of application program provided in an embodiment of the present invention Method, wherein, the application program is the application program of mobile terminal, and, the mobile terminal including but not limited to has The mobile terminals such as the mobile phone of Android platform or ios platform, flat board, Vehicular display device.
The anti-secondary packing and the guard method for cracking of the application program comprises the steps:
S1, encryption application program, the Hash verification certificate files of file in the application program and application program after acquisition is encrypted.
Specifically,
In the present embodiment, original application program is reinforced using encipheror, not only obtains having and prevent secondary packing With crack defencive function it is encrypted after application program, also the every text document in the application program is carried out based on Hash The reinforcing operation of algorithm, and obtain the Hash verification certificate file corresponding per text document.
Wherein, risk point of the encipheror from application program, labor hacker is to the anti-of application program Compiling/compiling flow process, and by obtain application program in per text document carry out hash value verification come protect application program not by It is secondary to pack and crack.I.e. described encipheror can prevent data input, data display, local datastore and data from passing The leaking data problem occurred during defeated, such as safety keyboard, anti-screenshotss, anti-record screen, anti-fishing etc..It is selectable, it is described to add Close program is the encipheror based on Android platform or ios platform.
In step sl, the encryption application program is specifically included:To carrying out per text document in the application program Reinforcing based on hash algorithm is operated, and obtains the Hash verification certificate files in the application program per text document.It is optional Select, the application file include but is not limited to DEX file, XML file, text, code file, resource file and Files in stream media etc..
It should be noted that the binary value of random length to be mapped as hash algorithm the less binary system of regular length Value, this less binary value are referred to as hash value.Hash value is the unique and extremely compact numerical value representation of one piece of data. If hashing one section of plaintext and even only change the paragraph one is alphabetical, subsequent Hash will produce different values.Will Find hash for same value two different inputs, computationally for it is substantially impossible.
Therefore, Hash is the numerical value that obtained by logical operation of data of the content according to file, different file (even if It is identical filename) hash value that obtains is different, so hash value is just into the identity card of each file;And, The file of different hash values is considered as different files, the content of the file of identical HASH value be certainly it is identical (i.e. Make filename difference).
S2, install and run it is described it is encrypted after application program, and obtain it is described it is encrypted after application program itself The hash value information of file.
Specifically, in step s 2, in mobile terminal, install, start and run it is described it is encrypted after application program Afterwards, based on the hash algorithm, it is described it is encrypted after application program obtain own files hash value information.In the present embodiment In, it is described it is encrypted after application program obtain per text document hash value information.
S3, by the Hash verification certificate file verified with the hash value information and judged whether it is consistent, if Unanimously, then application program is normally run, if it is inconsistent, application program is out of service.
Specifically, in step s3, certificate file is with the hash value information and judges for the verification Hash verifications Whether unanimously specifically include:
Verified described with the hash value information of the corresponding file per portion Hash verification certificate files;
Judge whether the Hash verification certificate files of each file are consistent with corresponding hash value information;
If described consistent with corresponding hash value information per portion Hash verification certificate files, the application program continues It is normal to run;
If arbitrary Hash verifications certificate file is inconsistent with corresponding hash value information, the application program is direct It is out of service.
In the present embodiment, when the application program after the encryption is run, the application program after the encryption is transported automatically Row hash value verification operation.And, if any application file of the application program after the encryption is once changed Dynamic, the application program terminates self-operating automatically.
Fig. 3 is referred to, is anti-secondary packing and the knot of the protection system for cracking of a kind of application program that the present invention is provided Composition, the system include:Encrypting module 10, hash value data obtaining module 20 and hash value correction verification module 30.
Wherein, the encrypting module 10 is used to encrypt application program, the application program and the application after acquisition is encrypted The Hash verification certificate files of file in program.
Specifically, in the encrypting module 10, for obtaining to carrying out Hash per text document in the application program Take and generate corresponding Hash verifications certificate file.It is literary that file in the application program includes but is not limited to DEX file, XML Part, resource file, code file, text and files in stream media etc..
In a preferred embodiment of the invention, the encrypting module 10 can be based on Android platform or ios platform Encrypting module.Risk point of the encrypting module 10 from application program, anti-volume of the labor hacker to application program Translate/flow process is compiled, carry out hash value verification to protect application program by the hash value obtained using journey in the school per text document Not by it is secondary packing and crack.I.e. the encrypting module 10 can prevent data input, data display, local datastore and The leaking data problem occurred in data transmission procedure, such as safety keyboard, anti-screenshotss, anti-record screen, anti-fishing etc..
Specifically, in mobile terminal, install, start and run it is described it is encrypted after application program after, based on described Hash algorithm, the hash value data obtaining module 20 obtain it is described it is encrypted after application program own files hash value letter Breath.In the present embodiment, the hash value data obtaining module 20 be used to obtaining it is encrypted after application program in per a text The hash value information of part.
The hash value correction verification module 30 is used to verify the Hash verification certificate files and the hash value information, judges Whether consistent, if unanimously, application program is normally run, if it is inconsistent, application program is out of service.
Specifically, the hash value correction verification module 30 verifies certificate file and the corresponding text per portion Hash by described The hash value information of part is verified, by judge each file in application program Hash verify certificate file with it is corresponding Whether hash value information is consistent, and the application program is verified.
In checking procedure, if all Hash verifications certificate files are consistent with corresponding hash value information, The verification success of the application program is illustrated then, the application program continues normal operation.
If arbitrary Hash verifications certificate file is inconsistent with corresponding hash value information, the application is illustrated The verification of program is unsuccessful, illustrates that the program in the application program is tampered itself, and the application program is directly out of service.
In the present embodiment, when the application program after the encryption is run, the application program after the encryption is transported automatically Row hash value verification operation.And, it is if any file in the application program after the encryption is once altered, described Application program terminates self-operating automatically.
Compared to prior art, the technical scheme that the present invention is provided has the advantages that:
1st, the anti-secondary packing and the guard method for cracking of the application program and protection system are realized to every a resource text Part, text, code file, media file etc. are verified, and realizing any text document has carried out deleting, changed, replace Change and all can be detected by verification mode;
2nd, the anti-secondary packing and the guard method for cracking of the application program and protection system obtain file hash value, file school The technology tested is all unrelated with the code of Android system or IOS systems, will not cause safe back door problem because Android is increased income.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of spirit or essential attributes without departing substantially from the present invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as and limit involved claim.
Moreover, it will be appreciated that although this specification is been described by according to embodiment, not each embodiment is only wrapped Containing an independent technical scheme, this narrating mode of specification is only that those skilled in the art should for clarity Using specification as an entirety, the technical scheme in each embodiment can also Jing it is appropriately combined, form those skilled in the art Understandable other embodiment..

Claims (10)

1. the anti-secondary packing and the guard method for cracking of a kind of application program, it is characterised in that methods described includes:Encryption should With program, the Hash verification certificate files of file in the application program and application program after acquisition is encrypted;Install and run institute State it is encrypted after application program, and obtain it is described it is encrypted after application program own files hash value information;Verification institute State Hash to verify certificate file with the hash value information and judge whether consistent, if unanimously, application program is normally run, If it is inconsistent, application program is out of service.
2. the anti-secondary packing and the guard method for cracking of application program according to claim 1, it is characterised in that described Encryption application program is specifically included:Obtain and generate Hash verification cards to carrying out Hash in the application program per text document Written matter.
3. the anti-secondary packing and the guard method for cracking of application program according to claim 1, it is characterised in that described Obtain it is described it is encrypted after the hash value information of application program own files specifically include:It is described it is encrypted after application program Obtain the hash value information per text document.
4. the anti-secondary packing and the guard method for cracking of application program as claimed in claim 3, it is characterised in that the school Test the Hash to verify certificate file with the hash value information and judge whether consistent specifically including:By described per a Hash verification certificate files are verified with the hash value information of the corresponding file;Judge the Hash verifications of each file Whether certificate file is consistent with corresponding hash value information;If it is described verify per portion Hash certificate file with it is corresponding Hash value information it is consistent, the application program continues normal operation;If arbitrary Hash verification certificate files are right with institute The hash value information answered is inconsistent, then the application program is directly out of service.
5. the anti-secondary packing and the guard method for cracking of the application program as described in any one of Claims 1-4, its feature exist In the file in the application program includes DEX file, XML file, text, resource file and files in stream media.
6. a kind of anti-secondary packing of application program and the protection system that cracks, it is characterised in that the system includes:Encryption Module, for encrypting application program, the Hash verification cards of file in the application program and the application program after acquisition is encrypted Written matter;Hash value data obtaining module, for install and run it is described it is encrypted after application program after, obtain described The hash value information of the application program own files after encrypted;Hash value correction verification module, for verifying the Hash verifications card Written matter and the hash value information, judge whether that unanimously if unanimously, application program is normally run, if it is inconsistent, Application program is out of service.
7. protection system as claimed in claim 6, it is characterised in that the encrypting module, specifically for the application journey Carry out Hash to obtain and generate corresponding Hash verifications certificate file in sequence per text document.
8. protection system as claimed in claim 6, it is characterised in that the hash value data obtaining module, specifically for obtaining Take it is encrypted after application program in per text document hash value information.
9. protection system as claimed in claim 8, it is characterised in that the hash value correction verification module, specifically for:By institute State every a Hash verifications certificate file to be verified with the hash value information of the corresponding file;Judge each file Whether Hash verification certificate files are consistent with corresponding hash value information;If described equal per portion Hash verification certificate files Consistent with corresponding hash value information, the application program continues normal operation;If arbitrary Hash verifications certificate text Part is inconsistent with corresponding hash value information, then the application program is directly out of service.
10. the protection system as described in any one of claim 6 to 9, it is characterised in that the file in the application program includes DEX file, XML file, text, resource file and files in stream media.
CN201611128845.4A 2016-12-09 2016-12-09 Protection method and protection system for preventing secondary packaging and cracking of application program Pending CN106529222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611128845.4A CN106529222A (en) 2016-12-09 2016-12-09 Protection method and protection system for preventing secondary packaging and cracking of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611128845.4A CN106529222A (en) 2016-12-09 2016-12-09 Protection method and protection system for preventing secondary packaging and cracking of application program

Publications (1)

Publication Number Publication Date
CN106529222A true CN106529222A (en) 2017-03-22

Family

ID=58342962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611128845.4A Pending CN106529222A (en) 2016-12-09 2016-12-09 Protection method and protection system for preventing secondary packaging and cracking of application program

Country Status (1)

Country Link
CN (1) CN106529222A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319823A (en) * 2018-02-02 2018-07-24 广东蜂助手网络技术股份有限公司 A kind of Android APP signature binding method and device
CN110362970A (en) * 2019-07-23 2019-10-22 北京智游网安科技有限公司 A kind of method preventing application program decompiling, storage medium and terminal device
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130151861A1 (en) * 2011-12-08 2013-06-13 Raytheon Company System and method to protect computer software from unauthorized use
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130151861A1 (en) * 2011-12-08 2013-06-13 Raytheon Company System and method to protect computer software from unauthorized use
CN105426708A (en) * 2016-01-19 2016-03-23 北京鼎源科技有限公司 Reinforcing method of application program of Android system
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319823A (en) * 2018-02-02 2018-07-24 广东蜂助手网络技术股份有限公司 A kind of Android APP signature binding method and device
CN110362970A (en) * 2019-07-23 2019-10-22 北京智游网安科技有限公司 A kind of method preventing application program decompiling, storage medium and terminal device
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain

Similar Documents

Publication Publication Date Title
CN106230851B (en) Data security method and system based on block chain
CN104579649B (en) Personal identification method and system
CN110225063A (en) Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system
EP2854070A1 (en) Method and apparatus of creating application package, method and apparatus of executing application package, and recording medium storing application package
US8484752B2 (en) Verifying authenticity of electronic control unit code
CN105429754B (en) The management method and system of national standard Electronic Signature
CN109714303A (en) BIOS starts method and data processing method
US20160197950A1 (en) Detection system and method for statically detecting applications
CN106055936A (en) Method and device for encryption/decryption of executable program data package
CN106529222A (en) Protection method and protection system for preventing secondary packaging and cracking of application program
US20150200783A1 (en) Secure access for sensitive digital information
CN107301343A (en) Secure data processing method, device and electronic equipment
CN113472521A (en) Block chain-based real-name digital identity management method, signature device and verification device
CN106548065B (en) Application program installation detection method and device
CN108599961A (en) A kind of communication means, car-mounted terminal, automobile services platform and system
EP1430680B1 (en) Server with file verification
CN107196761A (en) A kind of method of core function in protection application program
CN107908962A (en) Self checking method applied to Android intelligent terminal
CN107454041A (en) Prevent the method and device that server is attacked
CN108599959A (en) Certificate of authority method of calibration, device and readable storage medium storing program for executing, application apparatus
WO2017197869A1 (en) Version file checking method and apparatus, encryption method and apparatus, and storage medium
CN111479265A (en) Information dissemination method and device, computer equipment and storage medium
CN109033818B (en) Terminal, authentication method, and computer-readable storage medium
US20140230068A1 (en) System and method for packaging and authenticating a software product
CN105812134A (en) Digital signature method, digital signature verification method, security authentication device and security authentication apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322