CN105224374A - A kind of guard method of target execute file, Apparatus and system - Google Patents

A kind of guard method of target execute file, Apparatus and system Download PDF

Info

Publication number
CN105224374A
CN105224374A CN201510766704.4A CN201510766704A CN105224374A CN 105224374 A CN105224374 A CN 105224374A CN 201510766704 A CN201510766704 A CN 201510766704A CN 105224374 A CN105224374 A CN 105224374A
Authority
CN
China
Prior art keywords
execute file
target execute
condition code
encryption target
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510766704.4A
Other languages
Chinese (zh)
Inventor
唐健
李�杰
刘玉良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jieshun Science and Technology Industry Co Ltd
Original Assignee
Shenzhen Jieshun Science and Technology Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jieshun Science and Technology Industry Co Ltd filed Critical Shenzhen Jieshun Science and Technology Industry Co Ltd
Priority to CN201510766704.4A priority Critical patent/CN105224374A/en
Publication of CN105224374A publication Critical patent/CN105224374A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of guard method of target execute file, Apparatus and system, comprising: according to the hardware generating feature code of terminal; Described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code; Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter; Utilize described condition code and described predetermined deciphering parameter, generate working key; Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory; The protection to target execute file can be completed, prevent target execute file decrypted and crack.

Description

A kind of guard method of target execute file, Apparatus and system
Technical field
The present invention relates to computer realm, particularly a kind of guard method of target execute file, Apparatus and system.
Background technology
The software product that technician writes, when not having any safeguard measure, being easy to be decompiled into source code by third party's instrument, even can generating source code engineering, and this is a kind of threat seriously to the intellecture property of developer undoubtedly.
Due to Software Protection Technique and the instrument of current main flow, be all by encipherment protection after target execute file be distributed to terminal client, such target execute file is easy to be deciphered by static analysis and crack after flowing out.Well can not protect target execute file.Therefore, how carrying out safe and reliable protection to target execute file, is those skilled in the art's technical issues that need to address.
Summary of the invention
The object of this invention is to provide a kind of guard method of target execute file, Apparatus and system, the protection to target execute file can be completed, prevent target execute file decrypted and crack.
For solving the problems of the technologies described above, the invention provides a kind of guard method of target execute file, comprising:
According to the hardware generating feature code of terminal;
Described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Utilize described condition code and described predetermined deciphering parameter, generate working key;
Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
Wherein, utilize described condition code and described predetermined deciphering parameter, comprise before generating working key:
Calculate the MD5 of described encryption target execute file, and described MD5 and the MD5 in the predetermined deciphering parameter received are compared;
If identical, then carry out utilizing described condition code and described predetermined deciphering parameter, generate the step of working key.
Wherein, utilize described condition code and described predetermined deciphering parameter, generate working key, comprising:
Using described condition code as encrypted source, using the random number in the described predetermined deciphering parameter received as key, obtain working key by DES algorithm.
The invention provides a kind of protective device of target execute file, comprising:
Generation module, for the hardware generating feature code according to terminal;
First sending module, for described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
First receiver module, for receiving the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Working key module, for utilizing described condition code and described predetermined deciphering parameter, generates working key;
Deciphering module, for utilizing described working key to be decrypted described encryption target execute file, and is stored in the target execute file after deciphering in internal memory.
The invention provides a kind of guard method of target execute file, comprising:
Receiving terminal send according to hardware generating feature code;
Utilize described condition code, search the encryption target execute file corresponding with described condition code;
If there is corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
Wherein, comprising:
If there is not corresponding described encryption target execute file, then send the application of information prompt terminal and generate encryption target execute file.
Wherein, described application generation encryption target execute file comprises:
Receiving terminal send according to the ID of described terminal CPU, the ID of mainboard, by hash algorithm generating feature code;
Verify described condition code;
After being verified, generate a random number;
Using described condition code as encrypted source, using described random number as key, obtain working key by DES algorithm;
Using target execute file as encrypted source, using described working key as key, obtain encryption target execute file by DES algorithm, and preserve described encryption target execute file and described condition code and described random number.
Wherein, described terminal is sent to comprise described encryption target execute file and predetermined deciphering parameter:
MD5 corresponding to described encryption target execute file, described random number and described encryption target execute file is sent to described terminal.
The invention provides a kind of protective device of target execute file, comprising:
Second receiver module, for receiving terminal send according to hardware generating feature code;
Searching module, for utilizing described condition code, searching the encryption target execute file corresponding with described condition code;
Second sending module, if for there is corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
The invention provides a kind of protection system of target execute file, comprising:
Terminal, for the hardware generating feature code according to terminal; Described condition code is sent to server; Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter; Utilize described condition code and described predetermined deciphering parameter, generate working key; Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory;
Server, for receiving terminal send according to hardware generating feature code; Utilize described condition code, search the encryption target execute file corresponding with described condition code; Lookup result is sent to terminal.
The guard method of target execute file provided by the present invention, Apparatus and system, comprising: according to the hardware generating feature code of terminal; Described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code; Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter; Utilize described condition code and described predetermined deciphering parameter, generate working key; Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory;
The method target execute file cryptographic storage is not distributed to terminal user with installation kit on the server, when terminal will run this program, first condition code to be sent to server, server finds encryption target execute file according to condition code and produces corresponding predetermined deciphering parameter and sends to terminal, terminal is according to unique characteristics code and predetermined deciphering parameter, calculate and generate working key, working key is utilized to be decrypted encryption target execute file, and by the target execute file load operating in internal memory after deciphering; Therefore, it is possible to complete the protection to target execute file, prevent target execute file decrypted and crack.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to the accompanying drawing provided.
The process flow diagram of the guard method of the target execute file that Fig. 1 provides for the embodiment of the present invention;
The structured flowchart of the protective device of the target execute file that Fig. 2 provides for the embodiment of the present invention;
The process flow diagram of the guard method of another target execute file that Fig. 3 provides for the embodiment of the present invention;
The structured flowchart of the protective device of another target execute file that Fig. 4 provides for the embodiment of the present invention;
The structured flowchart of the protective device of the another target execute file that Fig. 5 provides for the embodiment of the present invention;
The structured flowchart of the protection system of the target execute file that Fig. 6 provides for the embodiment of the present invention.
Embodiment
Core of the present invention is to provide a kind of guard method, Apparatus and system of target execute file, can complete the protection to target execute file, prevents target execute file decrypted and crack.
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Please refer to Fig. 1, the process flow diagram of the guard method of the target execute file that Fig. 1 provides for the embodiment of the present invention; The method can comprise:
S100, hardware generating feature code according to terminal;
Wherein, by the condition code utilizing the ardware feature of user terminal self to generate, the condition code this with terminal unique trait is used for identifying the security that can improve target execute file in target execute file and encryption target execute file.
The acquisition of this condition code can be the feature that the ID etc. of the CPU choosing terminal has uniqueness or singularity, utilizes and cryptographic algorithm obtains; Such as, utilize the ID of described terminal CPU, the ID of mainboard, by hash algorithm generating feature code.But the cryptographic algorithm of the characteristic specifically chosen and use is not limited here.
S110, described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
Wherein, when server receives the condition code of user terminal transmission, check whether there is the encryption target execute file corresponding with this condition code; First, the generation of encryption target execute file can be server when this application of terminal downloads, according to the Automatic generation of information encryption target execute file of terminal; When also can be the application generation encryption target execute file instruction of server receiving terminal transmission, carry out the generation of target execute file, first such as user terminal has after the IP address of the server of target execute file and port preserve, core code file destination button is generated by the application clicked on interface, obtain the condition code Key of terminal, Key is sent to server.Therefore, the mode of encryption target execute file is generated to server here and encryption method does not limit, only require that the server that is created on of encryption target execute file completes and relevant with the characteristic of terminal namely relevant with condition code.Terminal, when loading this application program, does not have target execute file in installation kit.Terminal needs to send request acquisition to server.The security of target execute file can be ensured like this.
Server can encryption target execute file be corresponding with end message deposits by this after generation encryption target execute file, namely will encrypt the storage corresponding with the condition code of terminal of target execute file here; Therefore, whether the condition code sent according to terminal here can be searched in server has corresponding encryption target execute file.
S120, receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Wherein, the lookup result that reception server sends, when after whois lookup to encryption target execute file, the predetermined deciphering parameter of this encryption target execute file and correspondence can be sent to terminal, make terminal that these information can be utilized to be decrypted encryption target execute file.Confiscated when server and found encryption target execute file, then can send information reminding user and there is not this encryption target execute file, or first reminding user to carry out application generation encryption target execute file.
S130, utilize described condition code and described predetermined deciphering parameter, generate working key;
Wherein, the mode of the working key of terminal generation here specifically will be correlated with the mode correspondence of server generation encryption target execute file; Such as, when server generates a random number; Using condition code as encrypted source, using random number as key, obtain working key by DES algorithm; Using target execute file as encrypted source, using working key as key, obtain encryption target execute file by DES algorithm, and preserve encryption target execute file and condition code and random number.Corresponding predetermined deciphering parameter is here exactly the random number that server produces at random, and like this through ciphering process, confidentiality is fine; What terminal was corresponding will utilize the condition code of self and the random number received, using condition code as encrypted source, using random number as key, obtain working key by DES algorithm, can be used for after obtaining identical working key being decrypted encryption target execute file.
Can see that the generative process of working key is here that to generate the mode of encrypting target execute file with server corresponding, so just can carry out follow-up deciphering.Therefore, the mode of concrete encryption is not limited here, would not limit the generating mode of working key here accordingly.User can according to the safe class of reality, complexity, the cryptographic algorithm that the selecting factors such as arithmetic speed are suitable.
S140, utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
Wherein, described working key is utilized to be decrypted described encryption target execute file, such as, corresponding to the citing in above-mentioned steps 130, here target execute file will be encrypted as encrypted source, using working key as secret key decryption encryption target execute file in internal memory, terminal can from internal memory this target execute file of load and execution.Here encryption target execute file is deciphered in internal memory and namely decipher in internal memory and load this target execute file; target execute file can be prevented in the interim storage of this locality; prevent user from obtaining target execute file; and then target execute file can be prevented by decompiling etc., protect this target execute file well.
Based on technique scheme, the guard method of the target execute file that the embodiment of the present invention provides, the method target execute file cryptographic storage is not distributed to terminal user with installation kit on the server, when terminal will run this program, first condition code to be sent to server, server finds encryption target execute file according to condition code and produces corresponding predetermined deciphering parameter and sends to terminal, terminal is according to unique characteristics code and predetermined deciphering parameter, calculate and generate working key, working key is utilized to be decrypted encryption target execute file, and by the target execute file load operating in internal memory after deciphering, therefore, it is possible to complete the protection to target execute file, prevent target execute file decrypted and crack.
Optionally, in order to ensure the accuracy of target execute file, can verify target execute file, namely utilizing described condition code and described predetermined deciphering parameter, can comprise before generating working key:
Calculate the MD5 of described encryption target execute file, and described MD5 and the MD5 in the predetermined deciphering parameter received are compared;
If identical, then carry out utilizing described condition code and described predetermined deciphering parameter, generate the step of working key.
Wherein, MD5 is used for verifying the consistance of file, and the MD5 value of file similarly is " digital finger-print " of this file specifically.The MD5 value of each file is different, if anyone has done any change to file, namely corresponding " digital finger-print " of its MD5 value will change.Such as Download Server provides a MD5 value in advance for a file, after user has downloaded this file, recalculate the MD5 value of download file with this algorithm, whether identical by comparing these two values, just can judge whether the file downloaded makes mistakes, and whether the file downloaded in other words has been tampered.Therefore, calculate the MD5 of encryption target execute file here, and MD5 and the MD5 in the predetermined deciphering parameter received are compared, if identical, then think that this target execute file is the file that user needs, follow-up decryption work can be continued.Improve accuracy and the reliability of target execute file.
Such as, after terminal receives encryption target execute file and MD5 corresponding to this encryption target execute file and random number R andom, first the MD5 of encryption target execute file is calculated, relatively with the MD5 received, if the failure of encryption target execute file is extracted in unequal prompting, just Key1 is obtained as key by DES using Random as source with Key if equal, to encrypt target execute file for source, be that secret key decryption core code encrypts file destination to internal memory with Key1, load core code and executive routine from internal memory.
Optionally, utilize described condition code and described predetermined deciphering parameter, generate working key, can comprise:
Using condition code as encrypted source, using the random number in the predetermined deciphering parameter received as key, obtain working key by DES algorithm.Wherein, DES algorithm is the DSE arithmetic in cipher system, and be otherwise known as Data Encryption Standard.This algorithm effect is relatively good, and is widely used.
Embodiments provide the guard method of target execute file, can complete protection to target execute file by said method, prevent target execute file decrypted and crack.
Be introduced the protective device of the target execute file that the embodiment of the present invention provides below, the protective device of target execute file described below can mutual corresponding reference with the guard method of above-described target execute file.
Please refer to Fig. 2, the structured flowchart of the protective device of the target execute file that Fig. 2 provides for the embodiment of the present invention; This protective device can comprise:
Generation module 101, for the hardware generating feature code according to terminal;
First sending module 102, for described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
First receiver module 103, for receiving the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Working key module 104, for utilizing described condition code and described predetermined deciphering parameter, generates working key;
Deciphering module 105, for utilizing described working key to be decrypted described encryption target execute file, and is stored in the target execute file after deciphering in internal memory.
Optionally, this protective device can also comprise:
Contrast module, for calculating the MD5 of described encryption target execute file, and compares described MD5 and the MD5 in the predetermined deciphering parameter received; If identical, then carry out utilizing described condition code and described predetermined deciphering parameter, generate the step of working key.
If different, then can this encryption target execute file mistake of trigger prompts module prompts user.
Optionally, working key module 104 can comprise:
Working key unit, for using condition code as encrypted source, using the random number in the predetermined deciphering parameter received as key, obtain working key by DES algorithm.
Wherein, DES algorithm is the DSE arithmetic in cipher system, and be otherwise known as Data Encryption Standard.This algorithm effect is relatively good, and is widely used.
Please refer to Fig. 3, the process flow diagram of the guard method of another target execute file that Fig. 3 provides for the embodiment of the present invention; The method can comprise:
S200, receiving terminal send according to hardware generating feature code;
Wherein, receive the condition code that user terminal utilizes the ardware feature of self to generate, the condition code that this is had terminal unique trait by server is used for identifying in target execute file and encryption target execute file, can improve the security of target execute file.
S210, utilize described condition code, search the encryption target execute file corresponding with described condition code;
Wherein, when server receives the condition code of user terminal transmission, check whether there is the encryption target execute file corresponding with this condition code, first, the generation of encryption target execute file can be server when this application of terminal downloads, according to the Automatic generation of information encryption target execute file of terminal, when also can be the application generation encryption target execute file instruction of server receiving terminal transmission, carry out the generation of target execute file, such as, first user terminal has after the IP address of the server of target execute file and port preserve, core code file destination button is generated by the application clicked on interface, obtain the condition code Key of terminal, Key is sent to server, server stochastic generation random number R andom, again according to the Key that sends as encrypted source, Random generates Key1 as secret key encryption by DES, service end using target execute file as encrypted source, Key1 is as key, core code encryption file destination is generated by DES, then storage encryption target execute file, the condition code Key of counterpart terminal, Random.But, the mode of encryption target execute file is generated to server here and encryption method does not limit, only requires that the server that is created on of encryption target execute file completes and relevant with the characteristic of terminal namely relevant with condition code.Terminal, when loading this application program, does not have target execute file in installation kit.Terminal needs to send request acquisition to server.The security of target execute file can be ensured like this.
If s220 exists corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
Wherein, when after whois lookup to encryption target execute file, the predetermined deciphering parameter of this encryption target execute file and correspondence can be sent to terminal, make terminal that these information can be utilized to be decrypted encryption target execute file.Look into when server and do not find encryption target execute file, then can send information reminding user and there is not this encryption target execute file, or first reminding user to carry out application generation encryption target execute file.
The generative process of working key is here that to generate the mode of encrypting target execute file with server corresponding, so just can carry out follow-up deciphering.Therefore, the mode of concrete encryption is not limited here, would not the generating mode that terminal generates working key be limited accordingly.User can according to the safe class of reality, complexity, the cryptographic algorithm that the selecting factors such as arithmetic speed are suitable.
Based on above-described embodiment, first reminding user will carry out application generation encryption target execute file and can comprise:
If there is not corresponding described encryption target execute file, then send the application of information prompt terminal and generate encryption target execute file.
Based on above-described embodiment, preferably, described application generation encryption target execute file can comprise:
Receiving terminal send according to the ID of described terminal CPU, the ID of mainboard, by hash algorithm generating feature code;
Verify described condition code;
After being verified, generate a random number;
Using described condition code as encrypted source, using described random number as key, obtain working key by DES algorithm;
Using target execute file as encrypted source, using described working key as key, obtain encryption target execute file by DES algorithm, and preserve described encryption target execute file and described condition code and described random number.
Based on above-described embodiment, preferably, described terminal is sent to comprise described encryption target execute file and predetermined deciphering parameter:
MD5 corresponding to described encryption target execute file, described random number and described encryption target execute file is sent to described terminal.
Based on technique scheme, the guard method of another target execute file that the embodiment of the present invention provides, the method target execute file cryptographic storage is not distributed to terminal user with installation kit on the server, when terminal will run this program, first condition code to be sent to server, server finds encryption target execute file according to condition code and produces corresponding predetermined deciphering parameter and sends to terminal, terminal is according to unique characteristics code and predetermined deciphering parameter, calculate and generate working key, working key is utilized to be decrypted encryption target execute file, and by the target execute file load operating in internal memory after deciphering, therefore, it is possible to complete the protection to target execute file, prevent target execute file decrypted and crack.
Embodiments provide the guard method of another target execute file, can complete protection to target execute file by said method, prevent target execute file decrypted and crack.
Be introduced the protective device of another target execute file that the embodiment of the present invention provides below, the protective device of another target execute file described below can mutual corresponding reference with the guard method of another target execute file above-described.
Please refer to Fig. 4, the structured flowchart of the protective device of another target execute file that Fig. 4 provides for the embodiment of the present invention; This protective device can comprise:
Second receiver module 201, for receiving terminal send according to hardware generating feature code;
Searching module 202, for utilizing described condition code, searching the encryption target execute file corresponding with described condition code;
Second sending module 203, if for there is corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
Based on above-described embodiment, this protective device can also comprise reminding module:
Reminding module, if for there is not corresponding described encryption target execute file, then sends the application of information prompt terminal and generates encryption target execute file.
Based on above-described embodiment, preferably, please refer to Fig. 5, this protective device can also comprise encryption target execute file generation module 204:
Receiving terminal send according to the ID of described terminal CPU, the ID of mainboard, by hash algorithm generating feature code;
Verify described condition code;
After being verified, generate a random number;
Using described condition code as encrypted source, using described random number as key, obtain working key by DES algorithm;
Using target execute file as encrypted source, using described working key as key, obtain encryption target execute file by DES algorithm, and preserve described encryption target execute file and described condition code and described random number.
Embodiments provide the guard method of target execute file, can complete protection to target execute file by said method, prevent target execute file decrypted and crack.
Be introduced the protection system of the target execute file that the embodiment of the present invention provides below, the protection system of target execute file described below can mutual corresponding reference with the guard method of above-described target execute file.
Please refer to Fig. 6, the structured flowchart of the protection system of the target execute file that Fig. 6 provides for the embodiment of the present invention; This protection system can comprise:
Terminal 100, for the hardware generating feature code according to terminal; Described condition code is sent to server; Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter; Utilize described condition code and described predetermined deciphering parameter, generate working key; Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory;
Server 200, for receiving terminal send according to hardware generating feature code; Utilize described condition code, search the encryption target execute file corresponding with described condition code; Lookup result is sent to terminal.
Illustrate said system; the invention provides a kind of guard method of target execute file; core code target execute file cryptographic storage C# write as used DES algorithm on the server; and be not distributed to terminal user with installation kit, during terminal operating by web download DES decipher after in internal memory load operating.By user, first this system can apply for that core code generates and namely generate encryption target execute file, server end is sent to according to the unique features code Key that terminal hardware generates, service end generates a random code Random, Key1 is become with after Key to be source Random be key DES, service end is source target execute file is key des encryption target execute file with Key1, and the target execute file after storage encryption, Key, Random are on the server.Key is sent to server during terminal operating, server finds encryption file destination and Random to send to system according to Key, terminal Key is source Random is become Key1 after key des encryption, file destination is deciphered with Key1, then loaded targets file, performance objective document code runs whole system.
Such as; this system can be utilized by target execute file cryptographic storage on corporate server; all-in-one card platform system software operationally passes through web download nucleus module file destination in internal memory; decipher from internal memory operation of loading program, solve core algorithm in huge system, service code protection problem.
In instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually see.For device disclosed in embodiment, because it corresponds to the method disclosed in Example, so description is fairly simple, relevant part illustrates see method part.
Professional can also recognize further, in conjunction with unit and the algorithm steps of each example of embodiment disclosed herein description, can realize with electronic hardware, computer software or the combination of the two, in order to the interchangeability of hardware and software is clearly described, generally describe composition and the step of each example in the above description according to function.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use distinct methods to realize described function to each specifically should being used for, but this realization should not thought and exceeds scope of the present invention.
The software module that the method described in conjunction with embodiment disclosed herein or the step of algorithm can directly use hardware, processor to perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other form any known in random access memory (RAM), internal memory, ROM (read-only memory) (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above the guard method of target execute file provided by the present invention, Apparatus and system are described in detail.Apply specific case herein to set forth principle of the present invention and embodiment, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping.It should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention, can also carry out some improvement and modification to the present invention, these improve and modify and also fall in the protection domain of the claims in the present invention.

Claims (10)

1. a guard method for target execute file, is characterized in that, comprising:
According to the hardware generating feature code of terminal;
Described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Utilize described condition code and described predetermined deciphering parameter, generate working key;
Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
2. the method for claim 1, is characterized in that, utilizes described condition code and described predetermined deciphering parameter, comprises before generating working key:
Calculate the MD5 of described encryption target execute file, and described MD5 and the MD5 in the predetermined deciphering parameter received are compared;
If identical, then carry out utilizing described condition code and described predetermined deciphering parameter, generate the step of working key.
3. method as claimed in claim 2, is characterized in that, utilize described condition code and described predetermined deciphering parameter, generates working key, comprising:
Using described condition code as encrypted source, using the random number in the described predetermined deciphering parameter received as key, obtain working key by DES algorithm.
4. a protective device for target execute file, is characterized in that, comprising:
Generation module, for the hardware generating feature code according to terminal;
First sending module, for described condition code is sent to server, makes described server search the encryption target execute file corresponding with described condition code according to described condition code;
First receiver module, for receiving the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter;
Working key module, for utilizing described condition code and described predetermined deciphering parameter, generates working key;
Deciphering module, for utilizing described working key to be decrypted described encryption target execute file, and is stored in the target execute file after deciphering in internal memory.
5. a guard method for target execute file, is characterized in that, comprising:
Receiving terminal send according to hardware generating feature code;
Utilize described condition code, search the encryption target execute file corresponding with described condition code;
If there is corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
6. method as claimed in claim 5, is characterized in that, comprising:
If there is not corresponding described encryption target execute file, then send the application of information prompt terminal and generate encryption target execute file.
7. method as claimed in claim 6, is characterized in that, described application generates encryption target execute file and comprises:
Receiving terminal send according to the ID of described terminal CPU, the ID of mainboard, by hash algorithm generating feature code;
Verify described condition code;
After being verified, generate a random number;
Using described condition code as encrypted source, using described random number as key, obtain working key by DES algorithm;
Using target execute file as encrypted source, using described working key as key, obtain encryption target execute file by DES algorithm, and preserve described encryption target execute file and described condition code and described random number.
8. method as claimed in claim 7, is characterized in that, send to described terminal to comprise described encryption target execute file and predetermined deciphering parameter:
MD5 corresponding to described encryption target execute file, described random number and described encryption target execute file is sent to described terminal.
9. a protective device for target execute file, is characterized in that, comprising:
Second receiver module, for receiving terminal send according to hardware generating feature code;
Searching module, for utilizing described condition code, searching the encryption target execute file corresponding with described condition code;
Second sending module, if for there is corresponding described encryption target execute file, then described encryption target execute file and predetermined deciphering parameter are sent to described terminal, make described terminal utilize described condition code and described predetermined deciphering parameter, generate working key; And utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory.
10. a protection system for target execute file, is characterized in that, comprising:
Terminal, for the hardware generating feature code according to terminal; Described condition code is sent to server; Receive the lookup result that described server sends, if there is corresponding described encryption target execute file, then described lookup result comprises described encryption target execute file and predetermined deciphering parameter; Utilize described condition code and described predetermined deciphering parameter, generate working key; Utilize described working key to be decrypted described encryption target execute file, and the target execute file after deciphering is stored in internal memory;
Server, for receiving terminal send according to hardware generating feature code; Utilize described condition code, search the encryption target execute file corresponding with described condition code; Lookup result is sent to terminal.
CN201510766704.4A 2015-11-11 2015-11-11 A kind of guard method of target execute file, Apparatus and system Pending CN105224374A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510766704.4A CN105224374A (en) 2015-11-11 2015-11-11 A kind of guard method of target execute file, Apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510766704.4A CN105224374A (en) 2015-11-11 2015-11-11 A kind of guard method of target execute file, Apparatus and system

Publications (1)

Publication Number Publication Date
CN105224374A true CN105224374A (en) 2016-01-06

Family

ID=54993366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510766704.4A Pending CN105224374A (en) 2015-11-11 2015-11-11 A kind of guard method of target execute file, Apparatus and system

Country Status (1)

Country Link
CN (1) CN105224374A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523128A (en) * 2020-04-03 2020-08-11 咪咕文化科技有限公司 Information protection method, system, electronic device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046835A (en) * 2006-03-28 2007-10-03 中国科学院微电子研究所 Digital content protection method based on bonded with hardware equipment
CN102301381A (en) * 2011-07-08 2011-12-28 华为技术有限公司 Method and device for processing information security
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device
CN103116728A (en) * 2012-11-16 2013-05-22 福建联迪商用设备有限公司 Methods of program document signing and signature detecting
CN104700002A (en) * 2013-12-05 2015-06-10 航天信息软件技术有限公司 Software protecting, authorizing and registering method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101046835A (en) * 2006-03-28 2007-10-03 中国科学院微电子研究所 Digital content protection method based on bonded with hardware equipment
CN102301381A (en) * 2011-07-08 2011-12-28 华为技术有限公司 Method and device for processing information security
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device
CN103116728A (en) * 2012-11-16 2013-05-22 福建联迪商用设备有限公司 Methods of program document signing and signature detecting
CN104700002A (en) * 2013-12-05 2015-06-10 航天信息软件技术有限公司 Software protecting, authorizing and registering method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523128A (en) * 2020-04-03 2020-08-11 咪咕文化科技有限公司 Information protection method, system, electronic device and medium
CN111523128B (en) * 2020-04-03 2023-12-08 咪咕文化科技有限公司 Information protection method, system, electronic equipment and medium

Similar Documents

Publication Publication Date Title
US10484185B2 (en) Method and system for distributing attestation key and certificate in trusted computing
EP3387813B1 (en) Mobile device having trusted execution environment
US9735962B1 (en) Three layer key wrapping for securing encryption keys in a data storage system
RU2718689C2 (en) Confidential communication control
CN105681039B (en) Method and device for generating a secret key and corresponding decryption
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US11050562B2 (en) Target device attestation using a trusted platform module
Ronen et al. Pseudo constant time implementations of TLS are only pseudo secure
CN111666564B (en) Application program safe starting method and device, computer equipment and storage medium
CN105320535A (en) Checking method of installation package, client side, server and system
US20180204004A1 (en) Authentication method and apparatus for reinforced software
CN112469036B (en) Message encryption and decryption method and device, mobile terminal and storage medium
CN108199827B (en) Client code integrity checking method, storage medium, electronic device and system
US20230325516A1 (en) Method for file encryption, terminal, electronic device and computer-readable storage medium
CN101944170A (en) Method, system and device for issuing software version
WO2018112482A1 (en) Method and system for distributing attestation key and certificate in trusted computing
CN105468940A (en) Software protection method and apparatus
JP2017531951A (en) Method, device, terminal and server for security check
CN107103214A (en) A kind of application program anti-debug method and device applied to android system
CN114244522A (en) Information protection method and device, electronic equipment and computer readable storage medium
CN109784072B (en) Security file management method and system
CN105224374A (en) A kind of guard method of target execute file, Apparatus and system
CN106971105B (en) IOS-based application program defense method against false face attack

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160106

RJ01 Rejection of invention patent application after publication