CN109255245A - A kind of local cryptographic key protection method, apparatus and system - Google Patents

A kind of local cryptographic key protection method, apparatus and system Download PDF

Info

Publication number
CN109255245A
CN109255245A CN201810914611.5A CN201810914611A CN109255245A CN 109255245 A CN109255245 A CN 109255245A CN 201810914611 A CN201810914611 A CN 201810914611A CN 109255245 A CN109255245 A CN 109255245A
Authority
CN
China
Prior art keywords
key
android
outer layer
function
reorganization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810914611.5A
Other languages
Chinese (zh)
Inventor
夏冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HAINAN XINRUAN SOFTWARE Co Ltd
Original Assignee
HAINAN XINRUAN SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HAINAN XINRUAN SOFTWARE Co Ltd filed Critical HAINAN XINRUAN SOFTWARE Co Ltd
Priority to CN201810914611.5A priority Critical patent/CN109255245A/en
Publication of CN109255245A publication Critical patent/CN109255245A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses a kind of local cryptographic key protection method, apparatus and system, by being stored in so file after finishing writing the key of Android application program, after receiving request of the outer layer Android function by program interface call so file of Android application program, reorganization is carried out to the key, again using the key after reorganization as subsidiary return value, it is back to the outer layer Android function, substantially increase the difficulty that decompiling personnel obtain code key built in APP by decompiling, it is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.

Description

A kind of local cryptographic key protection method, apparatus and system
Technical field
This application involves field of information security technology more particularly to a kind of local cryptographic key protection methods, apparatus and system.
Background technique
It is carried out to the application (English: Application, abbreviation APP) under Android (English: Android) operating system The process of research and development is often directly written in final code key in local code, has both facilitated the encryption and decryption of data in this way Storage and the real-time encrypted transmission information with server-side are also convenient for the management to encryption code key.But it at the same time, also brings along One extremely hazardous problem, some of the staff both to have mastered a skill can get source code by the decompiling of code, to find The plaintext code key of most critical;And the data and server-side generated by using code key encryption do trial connection, once connection Success, then the data of server-side will be obtained by the personnel, to cause immeasurable loss.
With the continuous development of computer technology, using related art method, the APP under Android operation system is held Row decompiling operation becomes increasingly easy to obtain the source code of APP.And there is no effectively to local code key by most of APP Relevant protection is done, gets source code after by malice decompiling, the most important key information of the APP can be obtained, thus Lead to the leakage of information.
How effectively the plaintext code key inside APP to be protected as a result, becomes urgent problem to be solved in the industry.
Summary of the invention
This application provides a kind of local cryptographic key protection methods, apparatus and system, are easy with solving local key by malice Source code is got after decompiling, leads to the leakage problem of information.
In a first aspect, the application provides a kind of local cryptographic key protection method, which is characterized in that the described method includes:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
With reference to first aspect, the first in first aspect can receive outer layer Android function and pass through Android in realization mode After the request of program interface call so file of application program, the method also includes:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer Layer Android function returns to null value.
With reference to first aspect the first can realize mode, in second of achievable mode of first aspect, to described Key carries out reorganization
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
With reference to first aspect, the third in first aspect can be in realization mode, and the key is to be write based on C language The key arrived.
Second aspect, the application provide a kind of local key protectors, and described device includes:
Receiving unit, for receiving outer layer Android function asking by program interface call so file of Android application program It asks, wherein include the key of the Android application program in so file;
Recomposition unit, for carrying out reorganization to the key;
Return unit, for being back to the outer layer Android function using the key after reorganization as subsidiary return value.
In conjunction with second aspect, the first in second aspect can be in realization mode, described device further include:
Acquiring unit, for passing through program interface call so file of Android application program receiving outer layer Android function After request, the corresponding packet name of outer layer Android function is obtained;
Judging unit, for judging that the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is It is no consistent;
Recomposition unit, if being also used to the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function Unanimously, reorganization is carried out to the key, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
The return unit, if being also used to Android application program described in the corresponding Bao Mingyu of the outer layer Android function Packet name is inconsistent, returns to null value to the outer layer Android function.
The first in conjunction with second aspect can realize mode, described heavy in second of achievable mode of second aspect Organizing unit includes:
Generation unit, for generating random number based on random number generator;
Extraction unit, for according to the random number, extracting corresponding position in the character string for forming the key respectively Character;
Assembled unit, the key for being combined to obtain by the character after reorganization.
In conjunction with second aspect, the third in second aspect can be in realization mode, and the key is to be write based on C language The key arrived.
The third aspect, the application provide a kind of local cryptographic key protection system, and the system comprises processors, and for depositing Store up the memory of processor-executable instruction;
Wherein, the processor is configured to:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
In conjunction with the third aspect, the first in the third aspect can receive outer layer Android function and pass through Android in realization mode After the request of program interface call so file of application program, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer Layer Android function returns to null value.
In conjunction with the third aspect, in second of achievable mode of the third aspect, reorganization packet is carried out to the key It includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
From the above technical scheme, a kind of local cryptographic key protection method, apparatus and system provided by the present application, pass through by The key of Android application program is stored in so file after finishing writing, receiving programming of the outer layer Android function by Android application program After interface calls the request of so file, reorganization is carried out to the key, then using the key after reorganization as incidentally returning Value is returned, the outer layer Android function is back to, decompiling personnel is substantially increased by decompiling and obtains code key built in APP Difficulty, is effectively protected the built-in code key of APP to a certain extent, to realize the guarantor to the relevant significant data of APP Shield.
Detailed description of the invention
In order to illustrate more clearly of the technical solution of the application, letter will be made to attached drawing needed in the embodiment below Singly introduce, it should be apparent that, for those of ordinary skills, without any creative labor, It is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the first embodiment of local cryptographic key protection method provided by the present application.
Fig. 2 is a kind of flow chart of the second embodiment of local cryptographic key protection method provided by the present application.
Fig. 3 is a kind of flow chart of the 3rd embodiment of local cryptographic key protection method provided by the present application.
Fig. 4 is a kind of structural block diagram of the first embodiment of local key protectors provided by the present application.
Fig. 5 is a kind of structural block diagram of the second embodiment of local key protectors provided by the present application.
Fig. 6 is a kind of structural block diagram of the 3rd embodiment of local key protectors provided by the present application.
Fig. 7 is a kind of schematic diagram of the embodiment of local cryptographic key protection system provided by the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.Below in conjunction with attached drawing, The technical scheme provided by various embodiments of the present application will be described in detail.
Referring to Fig. 1, for a kind of first embodiment of local cryptographic key protection method provided by the present application, the method packet It includes:
Step 101, the request that outer layer Android function passes through program interface call so file of Android application program is received, In, it include the key of the Android application program in so file.
Specifically, in the present embodiment, the key is the key write based on C language.So file is under Linux Program function library, i.e., compiled can be that can not pass through decompiling for code and data that other programs use, so file Source code is got, therefore can play the role of protecting the key of Android application program.
Step 102, reorganization is carried out to the key.
Specifically, in order to which increase key cracks difficulty, reorganization can be carried out to the key, thus in outer layer Android When function obtains key, play a protective role to key.
Step 103, using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
From the above technical scheme, the first embodiment of the local cryptographic key protection method of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, reorganization is carried out to the key, then using the key after reorganization as subsidiary return value, return It is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling, It is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.
Referring to Fig. 2, for a kind of second embodiment of local cryptographic key protection method provided by the present application, with first embodiment The difference is that receive outer layer Android function by the request of program interface call so file of Android application program it Afterwards, the method also includes:
Step 201, the corresponding packet name of outer layer Android function is obtained.
Specifically, packet name (English: Package name) is the unique identification for judging an App in android system, Different App can have same name, but its packet name cannot be identical.Therefore, APP is beaten again by third party in order to prevent To obtain key, the present embodiment first obtains the corresponding packet name of outer layer Android function and tests so as to subsequent to packet name packet.It obtains The method of packet name can realize according to the prior art, in the present embodiment without limitation.
Step 202, judge Android application program described in the corresponding Bao Mingyu of the outer layer Android function packet name whether one It causes.
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, step 102 is held, Reorganization and step 103 are carried out to the key, using the key after reorganization as subsidiary return value, are back to institute State outer layer Android function.
Step 203, if the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, Null value is returned to the outer layer Android function.
From the above technical scheme, the second embodiment of the local cryptographic key protection method of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function The packet name of application program is consistent, carries out reorganization to key, using the key after reorganization as subsidiary return value, is back to Outer layer Android function, if the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is inconsistent, outer layers Android Function returns to null value, avoids APP by third party and beats again packet to obtain the risk of key, has further protected the built-in of APP Code key, to realize the protection to the relevant significant data of APP.
Referring to Fig. 3, for a kind of 3rd embodiment of local cryptographic key protection method provided by the present application, in second embodiment On the basis of, reorganization is carried out to the key and is specifically included:
Step 301, random number is generated based on random number generator.
Specifically, in order to which increase key cracks difficulty, reorganization can be carried out to the key based on random number, thus When digging layer Android function acquisition key, play a protective role to key.
Step 302, according to the random number, the character of corresponding position in the character string for forming the key is extracted respectively.
Step 303, the character is combined to obtain the key after reorganization.
Specifically, in so file, code key can be divided into the character string composition of multiple particular number of bits, can be according to random number Word extract symbol go here and there in corresponding position character, for example take primary " a " in character string " adfs ", the in character string " dsda " The 4th " w ", reassembles into " asw " code key in two " s " and character string " rerw ", so that increase key cracks difficulty Degree.
From the above technical scheme, the 3rd embodiment of the local cryptographic key protection method of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function The packet name of application program is consistent, carries out reorganization to key, reorganization is specifically extracted in symbol string using according to random digit The character of corresponding position, the key after the character to be combined to obtain reorganization are back to outer as subsidiary return value Layer Android function, increase key cracks difficulty, has further protected the built-in code key of APP, to realize to APP correlation Significant data protection.
Referring to Fig. 4, for a kind of first embodiment of local key protectors provided by the present application, described device packet It includes:
Receiving unit 401 passes through program interface call so file of Android application program for receiving outer layer Android function Request, wherein include the key of the Android application program in so file, wherein the key is to be compiled based on C language The key write.
Recomposition unit 402, for carrying out reorganization to the key.
Return unit 403, for being back to the outer layer Android letter using the key after reorganization as subsidiary return value Number.
From the above technical scheme, the first embodiment of the local key protectors of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, reorganization is carried out to the key, then using the key after reorganization as subsidiary return value, return It is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling, It is effectively protected the built-in code key of APP to a certain extent, to realize the protection to the relevant significant data of APP.
Referring to Fig. 5, being protected for a kind of second embodiment of local key protectors provided by the present application with local key The first embodiment of protection unit the difference is that, described device further include:
Acquiring unit 501, for receiving program interface call so text of the outer layer Android function by Android application program After the request of part, the corresponding packet name of outer layer Android function is obtained.
Judging unit 502, for judging the packet of Android application program described in the corresponding Bao Mingyu of the outer layer Android function Whether name is consistent.
Recomposition unit 402, if being also used to Android application program described in the corresponding Bao Mingyu of the outer layer Android function Packet name is consistent, carries out reorganization to the key, using the key after reorganization as subsidiary return value, is back to described Outer layer Android function.
The return unit 403, if being also used to Android application journey described in the corresponding Bao Mingyu of the outer layer Android function The packet name of sequence is inconsistent, returns to null value to the outer layer Android function.
From the above technical scheme, the second embodiment of the local key protectors of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function The packet name of application program is consistent, carries out reorganization to key, using the key after reorganization as subsidiary return value, is back to Outer layer Android function, if the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is inconsistent, outer layers Android Function returns to null value, avoids APP by third party and beats again packet to obtain the risk of key, has further protected the built-in of APP Code key, to realize the protection to the relevant significant data of APP.
Referring to Fig. 6, being protected for a kind of 3rd embodiment of local key protectors provided by the present application in local key On the basis of the second embodiment of protection unit, the recomposition unit 402 includes:
Generation unit 601, for generating random number based on random number generator.
Extraction unit 602, for extracting corresponding position in the character string for forming the key respectively according to the random number Character.
Assembled unit 603, the key for being combined to obtain by the character after reorganization.
From the above technical scheme, the 3rd embodiment of the local key protectors of the application, by answering Android It is stored in so file after being finished writing with the key of program, is receiving programming interface tune of the outer layer Android function by Android application program After request with so file, before carrying out reorganization to key, the corresponding packet name of outer layer Android function is obtained, judges that outer layer is pacified Whether the packet name of the corresponding Bao Mingyu Android application program of tall and erect function is consistent, if the corresponding Bao Mingyu Android of outer layer Android function The packet name of application program is consistent, carries out reorganization to key, reorganization is specifically extracted in symbol string using according to random digit The character of corresponding position, the key after the character to be combined to obtain reorganization are back to outer as subsidiary return value Layer Android function, increase key cracks difficulty, has further protected the built-in code key of APP, to realize to APP correlation Significant data protection.
Referring to Fig. 7, the system comprises processing for a kind of embodiment of local cryptographic key protection system provided by the present application Device 71, and the memory 72 for storage processor executable instruction.
Wherein, the processor 71 is configured as:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein is described It include the key of the Android application program in so file;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
Further, receive outer layer Android function by the request of program interface call so file of Android application program it Afterwards, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, to the key Reorganization is carried out, using the key after reorganization as subsidiary return value, is back to the outer layer Android function;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, to described outer Layer Android function returns to null value.
Further, carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
From the above technical scheme, a kind of local cryptographic key protection provided by the embodiments of the present application and system, by that will pacify The key of tall and erect application program is stored in so file after finishing writing, connect receiving outer layer Android function by the programming of Android application program After mouth calls the request of so file, reorganization is carried out to the key, then return using the key after reorganization as subsidiary Value, is back to the outer layer Android function, substantially increases the difficulty that decompiling personnel obtain code key built in APP by decompiling Degree, is effectively protected the built-in code key of APP to a certain extent;Also, before carrying out reorganization to key, outer layer is obtained The corresponding packet name of Android function judges whether the packet name of the corresponding Bao Mingyu Android application program of outer layer Android function is consistent, such as The packet name of the corresponding Bao Mingyu Android application program of fruit outer layer Android function is consistent, reorganization is carried out to key, at recombination Key after reason is back to outer layer Android function, if the corresponding Bao Mingyu Android of outer layer Android function as subsidiary return value The packet name of application program is inconsistent, and outer layers Android function returns to null value, avoids APP by third party and beats again packet to obtain key Risk;In addition, reorganization specifically using according to random digit extract symbol go here and there in corresponding position character, by the character into Row combination obtains the key after reorganization as subsidiary return value, is back to outer layer Android function, increase key cracks difficulty Degree, to realize the protection to the relevant significant data of APP.
In the specific implementation, the application also provides a kind of computer storage medium, wherein the computer storage medium can store There is program, which may include some or all of in each embodiment of local cryptographic key protection method provided by the invention when executing Step.The storage medium can for magnetic disk, CD, read-only memory (English: Read-Only Memory, referred to as: ROM) or random access memory (English: Random Access Memory, referred to as: RAM) etc..
It is required that those skilled in the art can be understood that the technology in the embodiment of the present invention can add by software The mode of general hardware platform realize.Based on this understanding, the technical solution in the embodiment of the present invention substantially or Say that the part that contributes to existing technology can be embodied in the form of software products, which can deposit Storage is in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that computer equipment (can be with It is personal computer, server or the network equipment etc.) execute certain part institutes of each embodiment of the present invention or embodiment The method stated.
Same and similar part may refer to each other between each embodiment in this specification.Especially for local key For protective device and system embodiment, since it is substantially similar to the method embodiment, so be described relatively simple, it is related Place is referring to the explanation in embodiment of the method.
Above-described the application embodiment does not constitute the restriction to the application protection scope.

Claims (11)

1. a kind of local cryptographic key protection method, which is characterized in that the described method includes:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein so text It include the key of the Android application program in part;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
2. the method as described in claim 1, which is characterized in that receive programming of the outer layer Android function by Android application program After interface calls the request of so file, the method also includes:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, the key is carried out Reorganization is back to the outer layer Android function using the key after reorganization as subsidiary return value;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, pacify to the outer layer Tall and erect function returns to null value.
3. method according to claim 2, which is characterized in that carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
4. the method as described in claim 1, which is characterized in that the key is the key write based on C language.
5. a kind of local key protectors, which is characterized in that described device includes:
Receiving unit, the request for passing through program interface call so file of Android application program for receiving outer layer Android function, It wherein, include the key of the Android application program in so file;
Recomposition unit, for carrying out reorganization to the key;
Return unit, for being back to the outer layer Android function using the key after reorganization as subsidiary return value.
6. device as claimed in claim 5, which is characterized in that described device further include:
Acquiring unit, for the request in reception outer layer Android function by program interface call so file of Android application program Afterwards, the corresponding packet name of outer layer Android function is obtained;
Judging unit, for judge Android application program described in the corresponding Bao Mingyu of the outer layer Android function packet name whether one It causes;
Recomposition unit, if being also used to the Bao Mingyi of Android application program described in the corresponding Bao Mingyu of the outer layer Android function It causes, reorganization is carried out to the key, using the key after reorganization as subsidiary return value, be back to the outer layer peace Tall and erect function;
The return unit, if being also used to the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function It is inconsistent, null value is returned to the outer layer Android function.
7. device as claimed in claim 6, which is characterized in that the recomposition unit includes:
Generation unit, for generating random number based on random number generator;
Extraction unit, for extracting the character of corresponding position in the character string for forming the key respectively according to the random number;
Assembled unit, the key for being combined to obtain by the character after reorganization.
8. device as claimed in claim 5, which is characterized in that the key is the key write based on C language.
9. a kind of local cryptographic key protection system, which is characterized in that the system comprises processors, and can for storage processor The memory executed instruction;
Wherein, the processor is configured to:
It receives outer layer Android function and passes through the request of program interface call so file of Android application program, wherein so text It include the key of the Android application program in part;
Reorganization is carried out to the key;
Using the key after reorganization as subsidiary return value, it is back to the outer layer Android function.
10. system as claimed in claim 9, which is characterized in that receive volume of the outer layer Android function by Android application program After journey interface calls the request of so file, the processor is configured to:
Obtain the corresponding packet name of outer layer Android function;
Judge whether the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is consistent, the key is carried out Reorganization is back to the outer layer Android function using the key after reorganization as subsidiary return value;
If the packet name of Android application program described in the corresponding Bao Mingyu of the outer layer Android function is inconsistent, pacify to the outer layer Tall and erect function returns to null value.
11. system as claimed in claim 10, which is characterized in that carrying out reorganization to the key includes:
Random number is generated based on random number generator;
According to the random number, the character of corresponding position in the character string for forming the key is extracted respectively;
Key after the character to be combined to obtain reorganization.
CN201810914611.5A 2018-08-13 2018-08-13 A kind of local cryptographic key protection method, apparatus and system Pending CN109255245A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810914611.5A CN109255245A (en) 2018-08-13 2018-08-13 A kind of local cryptographic key protection method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810914611.5A CN109255245A (en) 2018-08-13 2018-08-13 A kind of local cryptographic key protection method, apparatus and system

Publications (1)

Publication Number Publication Date
CN109255245A true CN109255245A (en) 2019-01-22

Family

ID=65049234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810914611.5A Pending CN109255245A (en) 2018-08-13 2018-08-13 A kind of local cryptographic key protection method, apparatus and system

Country Status (1)

Country Link
CN (1) CN109255245A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104668A (en) * 2019-12-23 2020-05-05 江苏恒宝智能***技术有限公司 Implementation method and application of return value of security authentication function

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821098A (en) * 2012-07-17 2012-12-12 暨南大学 System and method for self-dissolving instant messaging under cloud environment
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN105117635A (en) * 2015-03-20 2015-12-02 北京凯锐立德科技有限公司 Local data security protection system and method
CN105472602A (en) * 2014-08-19 2016-04-06 深圳市中兴微电子技术有限公司 Encryption device and encryption method
CN106411902A (en) * 2016-09-30 2017-02-15 广东网金控股股份有限公司 Data secure transmission method and system
CN106598584A (en) * 2016-12-08 2017-04-26 广州华多网络科技有限公司 Resource file processing method, apparatus and system
CN106792666A (en) * 2016-12-23 2017-05-31 东软集团股份有限公司 The method and device of network sensitive information in protection wireless network connection
CN107070656A (en) * 2017-03-31 2017-08-18 武汉斗鱼网络科技有限公司 The encryption method of so files, decryption method and system in a kind of application program
CN107196907A (en) * 2017-03-31 2017-09-22 武汉斗鱼网络科技有限公司 A kind of guard method of Android SO files and device
CN107196760A (en) * 2017-04-17 2017-09-22 徐智能 Syndrome with adjustable reconstructs the sequential encryption method of key at random
CN107273723A (en) * 2017-07-07 2017-10-20 广东工业大学 A kind of Android platform applied software protection method based on so file shell addings
CN107330340A (en) * 2017-06-19 2017-11-07 国家计算机网络与信息安全管理中心 File encrypting method, equipment, file decryption method, equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821098A (en) * 2012-07-17 2012-12-12 暨南大学 System and method for self-dissolving instant messaging under cloud environment
CN103106372A (en) * 2013-01-17 2013-05-15 上海交通大学 Lightweight class privacy data encryption method and system for Android system
CN105472602A (en) * 2014-08-19 2016-04-06 深圳市中兴微电子技术有限公司 Encryption device and encryption method
CN105117635A (en) * 2015-03-20 2015-12-02 北京凯锐立德科技有限公司 Local data security protection system and method
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN106411902A (en) * 2016-09-30 2017-02-15 广东网金控股股份有限公司 Data secure transmission method and system
CN106598584A (en) * 2016-12-08 2017-04-26 广州华多网络科技有限公司 Resource file processing method, apparatus and system
CN106792666A (en) * 2016-12-23 2017-05-31 东软集团股份有限公司 The method and device of network sensitive information in protection wireless network connection
CN107070656A (en) * 2017-03-31 2017-08-18 武汉斗鱼网络科技有限公司 The encryption method of so files, decryption method and system in a kind of application program
CN107196907A (en) * 2017-03-31 2017-09-22 武汉斗鱼网络科技有限公司 A kind of guard method of Android SO files and device
CN107196760A (en) * 2017-04-17 2017-09-22 徐智能 Syndrome with adjustable reconstructs the sequential encryption method of key at random
CN107330340A (en) * 2017-06-19 2017-11-07 国家计算机网络与信息安全管理中心 File encrypting method, equipment, file decryption method, equipment and storage medium
CN107273723A (en) * 2017-07-07 2017-10-20 广东工业大学 A kind of Android platform applied software protection method based on so file shell addings

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王元珍: "《80X86汇编语言程序设计》", 30 April 2005 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104668A (en) * 2019-12-23 2020-05-05 江苏恒宝智能***技术有限公司 Implementation method and application of return value of security authentication function
CN111104668B (en) * 2019-12-23 2022-03-01 恒宝股份有限公司 Implementation method and application of return value of security authentication function

Similar Documents

Publication Publication Date Title
CN106506146A (en) Based on the Transaction Information method of calibration of block chain technology, apparatus and system
CN104680039B (en) A kind of data guard method and device of application program installation kit
US20160275019A1 (en) Method and apparatus for protecting dynamic libraries
CN104866734B (en) A kind of guard method of DEX file and device
CN109271798A (en) Sensitive data processing method and system
CN107040520B (en) Cloud computing data sharing system and method
CN105898054A (en) Verification-based message display method and communication terminal
CN108111622A (en) A kind of method, apparatus and system for downloading whitepack library file
CN107317807A (en) A kind of apparatus bound method, apparatus and system
CN108777685A (en) Method and apparatus for handling information
US10740489B2 (en) System and method for prediction preserving data obfuscation
CN104915594B (en) Application program operation method and device
CN108133147A (en) Guard method, equipment and the readable storage medium storing program for executing of executable code
CN108449322A (en) Identity registration, authentication method, system and relevant device
CN108985040B (en) Method and apparatus, storage medium and the processor logged in using cipher key
CN109255245A (en) A kind of local cryptographic key protection method, apparatus and system
CN107122656A (en) It is a kind of that the outside method and apparatus debugged are prevented by Self-debugging
CN106909861A (en) A kind of method and apparatus for realizing mobile terminal remote control, mobile terminal and system
CN107509180A (en) A kind of method, storage device and the mobile terminal of automatic Encrypted short message
CN108090364A (en) A kind of localization method and system in data leak source
CN105988785A (en) RPC (remote procedure call) service development method and device
CN116910712A (en) Code protection method, system, electronic equipment and storage medium
CN106599637A (en) Method and device for inputting verification code into verification interface
CN111881474B (en) Private key management method and device based on trusted computing environment
CN107592217A (en) A kind of user identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190122