CN104166810A - Encryption method for mobile phone game software - Google Patents

Encryption method for mobile phone game software Download PDF

Info

Publication number
CN104166810A
CN104166810A CN201410364854.8A CN201410364854A CN104166810A CN 104166810 A CN104166810 A CN 104166810A CN 201410364854 A CN201410364854 A CN 201410364854A CN 104166810 A CN104166810 A CN 104166810A
Authority
CN
China
Prior art keywords
file
resource
encryption method
mobile game
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410364854.8A
Other languages
Chinese (zh)
Inventor
牛犇
李梁
韩振杰
滑立栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU JOYME INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SUZHOU JOYME INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU JOYME INFORMATION TECHNOLOGY Co Ltd filed Critical SUZHOU JOYME INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410364854.8A priority Critical patent/CN104166810A/en
Publication of CN104166810A publication Critical patent/CN104166810A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The invention discloses an encryption method for mobile phone game software. The mobile phone game software comprises program files and resource files; the encryption process comprises the following steps that (1) the program files and the resource files are merged into at least one large file, a recording file is generated, and the recording file records the starting position and the terminal position of each program file and the starting position and the terminal position of each resource file in the large file; (2) the recording file is merged into the large file; (3) encryption is carried out on the large file to obtain an encrypted file; a decryption process comprises the steps that (4) decryption is carried out on the encrypted file to obtain the large file; (5) the recording file is extracted from the large file; (6) the corresponding program files and the resource files are extracted according to the starting positions and the terminal positions recorded in the recording file. According to the encryption method for the mobile phone game software, simple encryption operations of bit adding or bit subtracting are carried out after the program files and the resource files are merged, and the problem that the program files or the resource files are stolen can be solved effectively.

Description

The encryption method of mobile game
 
Technical field
The invention belongs to infotech, relate in particular to the encryption method in mobile phone games.
Background technology
At present, along with popularizing of smart mobile phone, mobile phone games industry is also surging forward, and a large amount of new mobile phone games constantly produce, and simultaneously a large amount of old mobile phone games are eliminated.How to improve the life-span of mobile phone games, with and profit in life cycle, be that each mobile phone games developer thirsts for.Address the above problem, be more primarily to avoid being plagiarized as far as possible.As everyone knows, mobile game is a large compressed package in fact, wherein compressed the resource file such as program file and picture, sound of mobile game, and the resource files such as picture and sound normally do not pass through encryption.This just causes mobile phone games industry to be full of a large amount of mountain vallage developers, they often to the installation file of hot game (for example, apk file) decompress, thereby obtain easily wherein a large amount of valuable resource files, under the support of these resource files, they can promptly develop with master and be close to living Games Software, and adopt item such as " version are strengthened in xx game " to occur, obscure market.Mountain vallage developer's this behavior, the intellecture property of not only having encroached on master developer, and cause very big impact to master developer's game, make a large amount of customer losses.How to address the above problem simply technically, be problem to be solved by this invention.
 
Summary of the invention
In order to overcome the problems referred to above, the invention provides a kind of can carrying out simply and effective encryption method the program file of mobile game and resource file.
Technical scheme of the present invention is to provide a kind of encryption method of mobile game, and this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
Preferably, described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
Preferably, described log file is arranged on described large top of file or afterbody.
Preferably, described step 1) is incorporated into described program file and resource file in multiple large files.
Preferably, described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
Preferably, described mobile game can run on Android system or IOS system.
After the encryption method of mobile game of the present invention merges program file and resource file, then add position or subtract the simple cryptographic operations such as position, can efficient solution determine program file or the stolen problem of resource file.
 
Embodiment
Below the specific embodiment of the present invention is described in further detail.
The present invention is a kind of encryption method of mobile game, and this mobile game is the Games Software that can run on Intelligent flat computer or smart mobile phone, comprises the Games Software that runs on Android or IOS, windowphone or other Mobile operating systems.This mobile phone games Soft Roll is drawn together program file and resource file.Encryption method of the present invention comprises two processes of encryption and decryption, and wherein, ciphering process comprises the following steps:
1) program file and resource file are incorporated at least one large file, and produce a log file, this log file records each program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in large file;
3) large file is encrypted, obtains encrypt file;
Wherein, the process of deciphering comprises:
4) encrypt file is decrypted, obtains large file;
5) from large file, extract log file;
6) according to the initial sum final position recording in log file, extract corresponding program file and resource file.
Wherein, step 2) in adopt displacement cryptographic algorithm to be encrypted to large file, the binary file of large file is added position or subtracts bit manipulation, its side-play amount moving only software developer is known, thereby can very effectively be avoided by other people deciphering.Certainly, also can adopt other common various encryption methods, for example, DES(Data Encryption Standard) algorithm.With respect to other cryptographic algorithm, the cryptographic algorithm of displacement is comparatively simple, thereby can greatly reduce the resource consumption to mobile phone CUP and internal memory.In addition, the initial sum final position of each file is recorded in log file, even if thereby other people extrapolate side-play amount, if can not obtain log file, can not correctly extract each resource file.Log file can also be taked further encryption measures, thus the protection of strengthening to log file.
Wherein, log file is arranged on large top of file or afterbody, can separate with specific separator.
Further, step 1) is incorporated into program file and resource file in multiple large files, like this in the time of system upgrade, and the only large file of down loading updating, thus reduce the flow of downloading.
Step 1) will be incorporated into respectively in different large files according to the classification of program file and resource file, thereby while conveniently upgrading, can upgrade for different resource.
Above embodiment is only the present invention's a kind of embodiment wherein, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (6)

1. an encryption method for mobile game, this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
2. the encryption method of mobile game according to claim 1, is characterized in that: described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
3. the encryption method of mobile game according to claim 2, is characterized in that: described log file is arranged on described large top of file or afterbody.
4. the encryption method of mobile game according to claim 3, is characterized in that: described step 1) is incorporated into described program file and resource file in multiple large files.
5. the encryption method of mobile game according to claim 4, is characterized in that: described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
6. the encryption method of mobile game according to claim 5, is characterized in that: described mobile game can run on Android system or IOS system.
CN201410364854.8A 2014-07-29 2014-07-29 Encryption method for mobile phone game software Pending CN104166810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410364854.8A CN104166810A (en) 2014-07-29 2014-07-29 Encryption method for mobile phone game software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410364854.8A CN104166810A (en) 2014-07-29 2014-07-29 Encryption method for mobile phone game software

Publications (1)

Publication Number Publication Date
CN104166810A true CN104166810A (en) 2014-11-26

Family

ID=51910619

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410364854.8A Pending CN104166810A (en) 2014-07-29 2014-07-29 Encryption method for mobile phone game software

Country Status (1)

Country Link
CN (1) CN104166810A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915341A (en) * 2016-06-17 2016-08-31 潍柴动力股份有限公司 Flashing method and device of ECU (Electronic Control Unit)
CN106022014A (en) * 2016-05-16 2016-10-12 武汉斗鱼网络科技有限公司 Packing method and unpacking method for resource files
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN109471643A (en) * 2018-11-19 2019-03-15 苏州好玩友网络科技有限公司 A kind of mobile phone games installation kit configuration method and the game installation and operation method using it
CN110502914A (en) * 2019-08-26 2019-11-26 河南航天金穗电子有限公司 A kind of remote encryption upgrade method based on public security intelligent terminal control module
CN110968549A (en) * 2019-11-18 2020-04-07 Oppo(重庆)智能科技有限公司 File storage method and device, electronic equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1248749A (en) * 1998-09-18 2000-03-29 英业达股份有限公司 Method for merging files
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US20020057800A1 (en) * 2000-09-26 2002-05-16 Spielo Manufacturing Incorporation System and method for downloading electronic information to a video lottery terminal
US6643775B1 (en) * 1997-12-05 2003-11-04 Jamama, Llc Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications
CN101236590A (en) * 2008-03-07 2008-08-06 北京邮电大学 Threshold password system based software division protection accomplishing method
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6334189B1 (en) * 1997-12-05 2001-12-25 Jamama, Llc Use of pseudocode to protect software from unauthorized use
US6643775B1 (en) * 1997-12-05 2003-11-04 Jamama, Llc Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications
CN1248749A (en) * 1998-09-18 2000-03-29 英业达股份有限公司 Method for merging files
US20020057800A1 (en) * 2000-09-26 2002-05-16 Spielo Manufacturing Incorporation System and method for downloading electronic information to a video lottery terminal
CN101236590A (en) * 2008-03-07 2008-08-06 北京邮电大学 Threshold password system based software division protection accomplishing method
CN102236757A (en) * 2011-06-30 2011-11-09 北京邮电大学 Software protection method and system applicable to Android system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022014A (en) * 2016-05-16 2016-10-12 武汉斗鱼网络科技有限公司 Packing method and unpacking method for resource files
CN105915341A (en) * 2016-06-17 2016-08-31 潍柴动力股份有限公司 Flashing method and device of ECU (Electronic Control Unit)
CN106897587A (en) * 2017-02-27 2017-06-27 百度在线网络技术(北京)有限公司 The method and apparatus of reinforcement application, loading reinforcement application
CN109471643A (en) * 2018-11-19 2019-03-15 苏州好玩友网络科技有限公司 A kind of mobile phone games installation kit configuration method and the game installation and operation method using it
CN110502914A (en) * 2019-08-26 2019-11-26 河南航天金穗电子有限公司 A kind of remote encryption upgrade method based on public security intelligent terminal control module
CN110968549A (en) * 2019-11-18 2020-04-07 Oppo(重庆)智能科技有限公司 File storage method and device, electronic equipment and medium
CN110968549B (en) * 2019-11-18 2024-03-29 Oppo(重庆)智能科技有限公司 File storage method, device, electronic equipment and medium

Similar Documents

Publication Publication Date Title
CN104166810A (en) Encryption method for mobile phone game software
US9880830B2 (en) On-board applet migration
KR101567902B1 (en) Multi-issuer secure element partition architecture for nfc enabled devices
US9792439B2 (en) Method and system for securely updating firmware in a computing device
CN103106372B (en) For lightweight privacy data encryption method and the system of android system
CN104363271B (en) Document breakpoint transmission method and device
CN106778283B (en) Method and system for protecting key data of system partition
EP3320478B1 (en) Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN101261666B (en) A method for realizing software copyright protection based on encrypted executable program file
CN107273723B (en) So file shell adding-based Android platform application software protection method
CN102890758A (en) Method and system for protecting executable file
CN105683990A (en) Method and apparatus for protecting dynamic libraries
TW201810109A (en) Processing method for preventing copy attack, server and client
CN105989252A (en) Function level packing-oriented unpacking method and system
CN108055585A (en) Data processing method, set top box upgrading method, terminal and set-top box
CN106326733A (en) Method and apparatus for managing applications in mobile terminal
KR20160065261A (en) System for preventing forgery of application and method therefor
GB201215647D0 (en) Secure data scanning method and system
CN108256342B (en) Encryption method and device and decryption method and device of Shader file
CN107087002B (en) A kind of encipher-decipher method of data, device and electronic equipment
CN103530169B (en) Method for protecting virtual machine files and user terminal
WO2017202370A1 (en) Method and system for encrypting static data for software
CN102855419A (en) Copyright protection method for data files of intelligent terminals
CN106775843A (en) The bytecode-optimized methods of dalvik based on internal memory loading

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20141126

RJ01 Rejection of invention patent application after publication