CN104166810A - Encryption method for mobile phone game software - Google Patents
Encryption method for mobile phone game software Download PDFInfo
- Publication number
- CN104166810A CN104166810A CN201410364854.8A CN201410364854A CN104166810A CN 104166810 A CN104166810 A CN 104166810A CN 201410364854 A CN201410364854 A CN 201410364854A CN 104166810 A CN104166810 A CN 104166810A
- Authority
- CN
- China
- Prior art keywords
- file
- resource
- encryption method
- mobile game
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an encryption method for mobile phone game software. The mobile phone game software comprises program files and resource files; the encryption process comprises the following steps that (1) the program files and the resource files are merged into at least one large file, a recording file is generated, and the recording file records the starting position and the terminal position of each program file and the starting position and the terminal position of each resource file in the large file; (2) the recording file is merged into the large file; (3) encryption is carried out on the large file to obtain an encrypted file; a decryption process comprises the steps that (4) decryption is carried out on the encrypted file to obtain the large file; (5) the recording file is extracted from the large file; (6) the corresponding program files and the resource files are extracted according to the starting positions and the terminal positions recorded in the recording file. According to the encryption method for the mobile phone game software, simple encryption operations of bit adding or bit subtracting are carried out after the program files and the resource files are merged, and the problem that the program files or the resource files are stolen can be solved effectively.
Description
Technical field
The invention belongs to infotech, relate in particular to the encryption method in mobile phone games.
Background technology
At present, along with popularizing of smart mobile phone, mobile phone games industry is also surging forward, and a large amount of new mobile phone games constantly produce, and simultaneously a large amount of old mobile phone games are eliminated.How to improve the life-span of mobile phone games, with and profit in life cycle, be that each mobile phone games developer thirsts for.Address the above problem, be more primarily to avoid being plagiarized as far as possible.As everyone knows, mobile game is a large compressed package in fact, wherein compressed the resource file such as program file and picture, sound of mobile game, and the resource files such as picture and sound normally do not pass through encryption.This just causes mobile phone games industry to be full of a large amount of mountain vallage developers, they often to the installation file of hot game (for example, apk file) decompress, thereby obtain easily wherein a large amount of valuable resource files, under the support of these resource files, they can promptly develop with master and be close to living Games Software, and adopt item such as " version are strengthened in xx game " to occur, obscure market.Mountain vallage developer's this behavior, the intellecture property of not only having encroached on master developer, and cause very big impact to master developer's game, make a large amount of customer losses.How to address the above problem simply technically, be problem to be solved by this invention.
Summary of the invention
In order to overcome the problems referred to above, the invention provides a kind of can carrying out simply and effective encryption method the program file of mobile game and resource file.
Technical scheme of the present invention is to provide a kind of encryption method of mobile game, and this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
Preferably, described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
Preferably, described log file is arranged on described large top of file or afterbody.
Preferably, described step 1) is incorporated into described program file and resource file in multiple large files.
Preferably, described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
Preferably, described mobile game can run on Android system or IOS system.
After the encryption method of mobile game of the present invention merges program file and resource file, then add position or subtract the simple cryptographic operations such as position, can efficient solution determine program file or the stolen problem of resource file.
Embodiment
Below the specific embodiment of the present invention is described in further detail.
The present invention is a kind of encryption method of mobile game, and this mobile game is the Games Software that can run on Intelligent flat computer or smart mobile phone, comprises the Games Software that runs on Android or IOS, windowphone or other Mobile operating systems.This mobile phone games Soft Roll is drawn together program file and resource file.Encryption method of the present invention comprises two processes of encryption and decryption, and wherein, ciphering process comprises the following steps:
1) program file and resource file are incorporated at least one large file, and produce a log file, this log file records each program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in large file;
3) large file is encrypted, obtains encrypt file;
Wherein, the process of deciphering comprises:
4) encrypt file is decrypted, obtains large file;
5) from large file, extract log file;
6) according to the initial sum final position recording in log file, extract corresponding program file and resource file.
Wherein, step 2) in adopt displacement cryptographic algorithm to be encrypted to large file, the binary file of large file is added position or subtracts bit manipulation, its side-play amount moving only software developer is known, thereby can very effectively be avoided by other people deciphering.Certainly, also can adopt other common various encryption methods, for example, DES(Data Encryption Standard) algorithm.With respect to other cryptographic algorithm, the cryptographic algorithm of displacement is comparatively simple, thereby can greatly reduce the resource consumption to mobile phone CUP and internal memory.In addition, the initial sum final position of each file is recorded in log file, even if thereby other people extrapolate side-play amount, if can not obtain log file, can not correctly extract each resource file.Log file can also be taked further encryption measures, thus the protection of strengthening to log file.
Wherein, log file is arranged on large top of file or afterbody, can separate with specific separator.
Further, step 1) is incorporated into program file and resource file in multiple large files, like this in the time of system upgrade, and the only large file of down loading updating, thus reduce the flow of downloading.
Step 1) will be incorporated into respectively in different large files according to the classification of program file and resource file, thereby while conveniently upgrading, can upgrade for different resource.
Above embodiment is only the present invention's a kind of embodiment wherein, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.
Claims (6)
1. an encryption method for mobile game, this mobile game comprises program file and resource file, it is characterized in that: its ciphering process comprises the following steps:
1) described program file and resource file are incorporated at least one large file, and produce a log file, this log file records each described program file and the initial sum final position of resource file in this large file;
2) log file is incorporated in described large file;
3) described large file is encrypted, obtains encrypt file;
The process of its deciphering comprises:
4) described encrypt file is decrypted, obtains described large file;
5) from described large file, extract described log file;
6), according to the initial sum final position recording in log file, extract corresponding described program file and resource file.
2. the encryption method of mobile game according to claim 1, is characterized in that: described step 2) in adopt displacement cryptographic algorithm to be encrypted to described large file.
3. the encryption method of mobile game according to claim 2, is characterized in that: described log file is arranged on described large top of file or afterbody.
4. the encryption method of mobile game according to claim 3, is characterized in that: described step 1) is incorporated into described program file and resource file in multiple large files.
5. the encryption method of mobile game according to claim 4, is characterized in that: described step 1) will be incorporated into respectively in different large files according to the classification of described program file and resource file.
6. the encryption method of mobile game according to claim 5, is characterized in that: described mobile game can run on Android system or IOS system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410364854.8A CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410364854.8A CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104166810A true CN104166810A (en) | 2014-11-26 |
Family
ID=51910619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410364854.8A Pending CN104166810A (en) | 2014-07-29 | 2014-07-29 | Encryption method for mobile phone game software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104166810A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915341A (en) * | 2016-06-17 | 2016-08-31 | 潍柴动力股份有限公司 | Flashing method and device of ECU (Electronic Control Unit) |
CN106022014A (en) * | 2016-05-16 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Packing method and unpacking method for resource files |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN109471643A (en) * | 2018-11-19 | 2019-03-15 | 苏州好玩友网络科技有限公司 | A kind of mobile phone games installation kit configuration method and the game installation and operation method using it |
CN110502914A (en) * | 2019-08-26 | 2019-11-26 | 河南航天金穗电子有限公司 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
CN110968549A (en) * | 2019-11-18 | 2020-04-07 | Oppo(重庆)智能科技有限公司 | File storage method and device, electronic equipment and medium |
CN114130033A (en) * | 2021-11-19 | 2022-03-04 | 苏州九宫数字科技有限公司 | Resource encryption and decryption method, system and medium for Cocos game package |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1248749A (en) * | 1998-09-18 | 2000-03-29 | 英业达股份有限公司 | How to Merge Archives |
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US20020057800A1 (en) * | 2000-09-26 | 2002-05-16 | Spielo Manufacturing Incorporation | System and method for downloading electronic information to a video lottery terminal |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
CN101236590A (en) * | 2008-03-07 | 2008-08-06 | 北京邮电大学 | A Realization Method of Software Segmentation Protection Based on Threshold Cryptosystem |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
-
2014
- 2014-07-29 CN CN201410364854.8A patent/CN104166810A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6334189B1 (en) * | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US6643775B1 (en) * | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
CN1248749A (en) * | 1998-09-18 | 2000-03-29 | 英业达股份有限公司 | How to Merge Archives |
US20020057800A1 (en) * | 2000-09-26 | 2002-05-16 | Spielo Manufacturing Incorporation | System and method for downloading electronic information to a video lottery terminal |
CN101236590A (en) * | 2008-03-07 | 2008-08-06 | 北京邮电大学 | A Realization Method of Software Segmentation Protection Based on Threshold Cryptosystem |
CN102236757A (en) * | 2011-06-30 | 2011-11-09 | 北京邮电大学 | Software protection method and system applicable to Android system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106022014A (en) * | 2016-05-16 | 2016-10-12 | 武汉斗鱼网络科技有限公司 | Packing method and unpacking method for resource files |
CN105915341A (en) * | 2016-06-17 | 2016-08-31 | 潍柴动力股份有限公司 | Flashing method and device of ECU (Electronic Control Unit) |
CN106897587A (en) * | 2017-02-27 | 2017-06-27 | 百度在线网络技术(北京)有限公司 | The method and apparatus of reinforcement application, loading reinforcement application |
CN109471643A (en) * | 2018-11-19 | 2019-03-15 | 苏州好玩友网络科技有限公司 | A kind of mobile phone games installation kit configuration method and the game installation and operation method using it |
CN110502914A (en) * | 2019-08-26 | 2019-11-26 | 河南航天金穗电子有限公司 | A kind of remote encryption upgrade method based on public security intelligent terminal control module |
CN110968549A (en) * | 2019-11-18 | 2020-04-07 | Oppo(重庆)智能科技有限公司 | File storage method and device, electronic equipment and medium |
CN110968549B (en) * | 2019-11-18 | 2024-03-29 | Oppo(重庆)智能科技有限公司 | File storage method, device, electronic equipment and medium |
CN114130033A (en) * | 2021-11-19 | 2022-03-04 | 苏州九宫数字科技有限公司 | Resource encryption and decryption method, system and medium for Cocos game package |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104166810A (en) | Encryption method for mobile phone game software | |
US9792439B2 (en) | Method and system for securely updating firmware in a computing device | |
CN105678192B (en) | A kind of key application method and application apparatus based on smart card | |
US9734091B2 (en) | Remote load and update card emulation support | |
EP3320478B1 (en) | Secure handling of memory caches and cached software module identities for a method to isolate software modules by means of controlled encryption key management | |
HK1259177A1 (en) | Tokenisation method and system for implementing exchanges on a blockchain | |
US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
CN107273723B (en) | So file shell adding-based Android platform application software protection method | |
CN101261666B (en) | A method for realizing software copyright protection based on encrypted executable program file | |
KR20150002609A (en) | Multi-issuer secure element partition architecture for nfc enabled devices | |
CN104463026B (en) | A kind of system and method for the anti-flight of hardware | |
CN104579689A (en) | Soft secret key system and implementation method | |
CN116388980A (en) | A method and device for segmenting Android environment keys | |
CN107368737A (en) | A kind of processing method for preventing copy-attack, server and client | |
CN105989252A (en) | Function level packing-oriented unpacking method and system | |
CN107092816A (en) | A kind of Android application programs reinforcement means | |
CN104486716A (en) | Method and device for showing bluetooth name | |
CN106326733A (en) | Method and device for managing applications in mobile terminal | |
KR101642267B1 (en) | System for preventing forgery of application and method therefor | |
CN103186746B (en) | A kind of guard method of executable file and system | |
CN102855419B (en) | The data file copyright guard method of intelligent terminal | |
GB2490843A (en) | Secure data scanning method and system | |
CN108256342B (en) | Encryption method and device and decryption method and device of Shader file | |
CN107087002B (en) | A kind of encipher-decipher method of data, device and electronic equipment | |
CN102970414A (en) | Cell phone password protection method based on Android system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20141126 |
|
RJ01 | Rejection of invention patent application after publication |