CN104166810A - Encryption method for mobile phone game software - Google Patents
Encryption method for mobile phone game software Download PDFInfo
- Publication number
- CN104166810A CN104166810A CN201410364854.8A CN201410364854A CN104166810A CN 104166810 A CN104166810 A CN 104166810A CN 201410364854 A CN201410364854 A CN 201410364854A CN 104166810 A CN104166810 A CN 104166810A
- Authority
- CN
- China
- Prior art keywords
- file
- resource
- encryption method
- mobile game
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000006073 displacement reaction Methods 0.000 claims description 4
- 238000013478 data encryption standard Methods 0.000 description 2
- 206010043458 Thirst Diseases 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
- 230000035922 thirst Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Abstract
The invention discloses an encryption method for mobile phone game software. The mobile phone game software comprises program files and resource files; the encryption process comprises the following steps that (1) the program files and the resource files are merged into at least one large file, a recording file is generated, and the recording file records the starting position and the terminal position of each program file and the starting position and the terminal position of each resource file in the large file; (2) the recording file is merged into the large file; (3) encryption is carried out on the large file to obtain an encrypted file; a decryption process comprises the steps that (4) decryption is carried out on the encrypted file to obtain the large file; (5) the recording file is extracted from the large file; (6) the corresponding program files and the resource files are extracted according to the starting positions and the terminal positions recorded in the recording file. According to the encryption method for the mobile phone game software, simple encryption operations of bit adding or bit subtracting are carried out after the program files and the resource files are merged, and the problem that the program files or the resource files are stolen can be solved effectively.
Description
Technical field
The invention belongs to infotech, relate in particular to the encryption method in mobile phone games.
Background technology
At present, along with popularizing of smart mobile phone, mobile phone games industry is also surging forward, and a large amount of new mobile phone games constantly produce, and simultaneously a large amount of old mobile phone games are eliminated.How to improve the life-span of mobile phone games, with and profit in life cycle, be that each mobile phone games developer thirsts for.Address the above problem, be more primarily to avoid being plagiarized as far as possible.As everyone knows, mobile game is a large compressed package in fact, wherein compressed the resource file such as program file and picture, sound of mobile game, and the resource files such as picture and sound normally do not pass through encryption.This just causes mobile phone games industry to be full of a large amount of mountain vallage developers, they often to the installation file of hot game (for example, apk file) decompress, thereby obtain easily wherein a large amount of valuable resource files, under the support of these resource files, they can promptly develop with master and be close to living Games Software, and adopt item such as " version are strengthened in xx game " to occur, obscure market.Mountain vallage developer's this behavior, the intellecture property of not only having encroached on master developer, and cause very big impact to master developer's game, make a large amount of customer losses.How to address the above problem simply technically, be problem to be solved by this invention.
Summary of the invention
In order to overcome the problems referred to above, the invention provides a kind of can carrying out simply and effective encryption method the program file of mobile game and resource file.
Technical scheme of the present invention is to provide a kind of encryption method of mobile game, and this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
Preferably, described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
Preferably, described log file is arranged on described large top of file or afterbody.
Preferably, described step 1) is incorporated into described program file and resource file in multiple large files.
Preferably, described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
Preferably, described mobile game can run on Android system or IOS system.
After the encryption method of mobile game of the present invention merges program file and resource file, then add position or subtract the simple cryptographic operations such as position, can efficient solution determine program file or the stolen problem of resource file.
Embodiment
Below the specific embodiment of the present invention is described in further detail.
The present invention is a kind of encryption method of mobile game, and this mobile game is the Games Software that can run on Intelligent flat computer or smart mobile phone, comprises the Games Software that runs on Android or IOS, windowphone or other Mobile operating systems.This mobile phone games Soft Roll is drawn together program file and resource file.Encryption method of the present invention comprises two processes of encryption and decryption, and wherein, ciphering process comprises the following steps:
1) program file and resource file are incorporated at least one large file, and produce a log file, this log file records each program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in large file;
3) large file is encrypted, obtains encrypt file;
Wherein, the process of deciphering comprises:
4) encrypt file is decrypted, obtains large file;
5) from large file, extract log file;
6) according to the initial sum final position recording in log file, extract corresponding program file and resource file.
Wherein, step 2) in adopt displacement cryptographic algorithm to be encrypted to large file, the binary file of large file is added position or subtracts bit manipulation, its side-play amount moving only software developer is known, thereby can very effectively be avoided by other people deciphering.Certainly, also can adopt other common various encryption methods, for example, DES(Data Encryption Standard) algorithm.With respect to other cryptographic algorithm, the cryptographic algorithm of displacement is comparatively simple, thereby can greatly reduce the resource consumption to mobile phone CUP and internal memory.In addition, the initial sum final position of each file is recorded in log file, even if thereby other people extrapolate side-play amount, if can not obtain log file, can not correctly extract each resource file.Log file can also be taked further encryption measures, thus the protection of strengthening to log file.
Wherein, log file is arranged on large top of file or afterbody, can separate with specific separator.
Further, step 1) is incorporated into program file and resource file in multiple large files, like this in the time of system upgrade, and the only large file of down loading updating, thus reduce the flow of downloading.
Step 1) will be incorporated into respectively in different large files according to the classification of program file and resource file, thereby while conveniently upgrading, can upgrade for different resource.
Above embodiment is only the present invention's a kind of embodiment wherein, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (6)
1. an encryption method for mobile game, this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
2. the encryption method of mobile game according to claim 1, is characterized in that: described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
3. the encryption method of mobile game according to claim 2, is characterized in that: described log file is arranged on described large top of file or afterbody.
4. the encryption method of mobile game according to claim 3, is characterized in that: described step 1) is incorporated into described program file and resource file in multiple large files.
5. the encryption method of mobile game according to claim 4, is characterized in that: described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
6. the encryption method of mobile game according to claim 5, is characterized in that: described mobile game can run on Android system or IOS system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410364854.8A CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410364854.8A CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104166810A true CN104166810A (en) | 2014-11-26 |
Family
ID=51910619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410364854.8A Pending CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104166810A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915341A (en) * | 2016-06-17 | 2016-08-31 | 潍柴动力股份有限公司 | Flashing method and device of ECU (Electronic Control Unit) |
CN106022014A (en) * | 2016-05-16 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Packing method and unpacking method for resource files |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN109471643A (en) * | 2018-11-19 | 2019-03-15 | 苏州好玩友网络科技有限公司 | A kind of mobile phone games installation kit configuration method and the game installation and operation method using it |
CN110502914A (en) * | 2019-08-26 | 2019-11-26 | 河南航天金穗电子有限公司 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
CN110968549A (en) * | 2019-11-18 | 2020-04-07 | Oppo(重庆)智能科技有限公司 | File storage method and device, electronic equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1248749A (en) * | 1998-09-18 | 2000-03-29 | 英业达股份有限公司 | Method for merging files |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US20020057800A1 (en) * | 2000-09-26 | 2002-05-16 | Spielo Manufacturing Incorporation | System and method for downloading electronic information to a video lottery terminal |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
CN101236590A (en) * | 2008-03-07 | 2008-08-06 | 北京邮电大学 | Threshold password system based software division protection accomplishing method |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
-
2014
- 2014-07-29 CN CN201410364854.8A patent/CN104166810A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
CN1248749A (en) * | 1998-09-18 | 2000-03-29 | 英业达股份有限公司 | Method for merging files |
US20020057800A1 (en) * | 2000-09-26 | 2002-05-16 | Spielo Manufacturing Incorporation | System and method for downloading electronic information to a video lottery terminal |
CN101236590A (en) * | 2008-03-07 | 2008-08-06 | 北京邮电大学 | Threshold password system based software division protection accomplishing method |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022014A (en) * | 2016-05-16 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Packing method and unpacking method for resource files |
CN105915341A (en) * | 2016-06-17 | 2016-08-31 | 潍柴动力股份有限公司 | Flashing method and device of ECU (Electronic Control Unit) |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN109471643A (en) * | 2018-11-19 | 2019-03-15 | 苏州好玩友网络科技有限公司 | A kind of mobile phone games installation kit configuration method and the game installation and operation method using it |
CN110502914A (en) * | 2019-08-26 | 2019-11-26 | 河南航天金穗电子有限公司 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
CN110968549A (en) * | 2019-11-18 | 2020-04-07 | Oppo(重庆)智能科技有限公司 | File storage method and device, electronic equipment and medium |
CN110968549B (en) * | 2019-11-18 | 2024-03-29 | Oppo(重庆)智能科技有限公司 | File storage method, device, electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104166810A (en) | Encryption method for mobile phone game software | |
US9880830B2 (en) | On-board applet migration | |
KR101567902B1 (en) | Multi-issuer secure element partition architecture for nfc enabled devices | |
US9792439B2 (en) | Method and system for securely updating firmware in a computing device | |
CN103106372B (en) | For lightweight privacy data encryption method and the system of android system | |
CN104363271B (en) | Document breakpoint transmission method and device | |
CN106778283B (en) | Method and system for protecting key data of system partition | |
EP3320478B1 (en) | Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
CN101261666B (en) | A method for realizing software copyright protection based on encrypted executable program file | |
CN107273723B (en) | So file shell adding-based Android platform application software protection method | |
CN102890758A (en) | Method and system for protecting executable file | |
CN105683990A (en) | Method and apparatus for protecting dynamic libraries | |
TW201810109A (en) | Processing method for preventing copy attack, server and client | |
CN105989252A (en) | Function level packing-oriented unpacking method and system | |
CN108055585A (en) | Data processing method, set top box upgrading method, terminal and set-top box | |
CN106326733A (en) | Method and apparatus for managing applications in mobile terminal | |
KR20160065261A (en) | System for preventing forgery of application and method therefor | |
GB201215647D0 (en) | Secure data scanning method and system | |
CN108256342B (en) | Encryption method and device and decryption method and device of Shader file | |
CN107087002B (en) | A kind of encipher-decipher method of data, device and electronic equipment | |
CN103530169B (en) | Method for protecting virtual machine files and user terminal | |
WO2017202370A1 (en) | Method and system for encrypting static data for software | |
CN102855419A (en) | Copyright protection method for data files of intelligent terminals | |
CN106775843A (en) | The bytecode-optimized methods of dalvik based on internal memory loading |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141126 |
|
RJ01 | Rejection of invention patent application after publication |