CN105373747A - File generation method, file verification method and systems for preventing system from being tampered - Google Patents

File generation method, file verification method and systems for preventing system from being tampered Download PDF

Info

Publication number
CN105373747A
CN105373747A CN201510906673.8A CN201510906673A CN105373747A CN 105373747 A CN105373747 A CN 105373747A CN 201510906673 A CN201510906673 A CN 201510906673A CN 105373747 A CN105373747 A CN 105373747A
Authority
CN
China
Prior art keywords
associated documents
check information
kernel associated
file
kernel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510906673.8A
Other languages
Chinese (zh)
Inventor
刘军华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510906673.8A priority Critical patent/CN105373747A/en
Publication of CN105373747A publication Critical patent/CN105373747A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention provides a file generation method, a file verification method and systems for preventing a system from being tampered. The generation method comprises the steps that the generation system, based on a preset check algorithm, calculates check information with the fixed check length for verifying an original kernel related file; and according to a preset position, the calculated check information is added into the original kernel related file to obtain a kernel related file containing the check information. The verification method comprises the steps that the verification system, according to the preset position and a preset check length, separates the obtained check information in the kernel related file from a to-be-checked kernel related file; to-be-verified check information of the to-be-checked kernel related file is calculated according to the preset check algorithm; and the calculated to-be-verified check information is matched with the separated check information, and whether the obtained kernel related file is a tampered file or not is determined based on a matching result. According to the file generation method, the file verification method and the systems, kernel related information can be effectively prevented from being replaced or deleted.

Description

The document generating method that anti-locking system is tampered, file verification method and system
Technical field
The present invention relates to a kind of computer software fields, particularly relate to document generating method, file verification method and system that a kind of anti-locking system is tampered.
Background technology
Because provide main just a few company of AP chip solution at present, the companies such as broadcom, mtk.These chip companies also can provide the solution of hardware and software in the lump while selling chip.Therefore the firmware adopting the different AP producers of same money chip to provide substantially can be general mutually.Such shortcoming is: the equipment that A company produces, and is just likely become the product of B company by the mode of firmware updating by B company, thus the brand causing A company runs off.Therefore producer needs a kind of oneself equipment of preventing by the scheme of people's malice brush machine.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide document generating method, file verification method and system that a kind of anti-locking system is tampered, is easy to for solving kernel relevant information in prior art the problem be tampered.
For achieving the above object and other relevant objects, the invention provides the document generating method that a kind of anti-locking system is tampered, comprising: based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents; According to the position of presetting, calculated check information is added in described original kernel associated documents, obtain the kernel associated documents comprising check information.
Preferably, described checking algorithm comprises: the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Preferably, described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
Preferably, described according to preset position, the mode of calculated check information being added in described original kernel associated documents comprise following any one: calculated check information is assigned into the predeterminated position in original kernel associated documents; Described check information is added to field location reserved in described kernel associated documents.
Based on above-mentioned purpose, a kind of file verification method that the present invention also provides anti-locking system to be tampered, said method comprising the steps of: according to predeterminated position, preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to the checking algorithm preset, that calculate described kernel associated documents to be verified, to be verified check information; Calculated check information to be verified is mated with isolated check information, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
Preferably, described according to predeterminated position, default check length, the mode that check information in obtained kernel associated documents is separated with kernel associated documents to be verified is comprised following any one: according to preset placement location and preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Preferably, described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
Based on above-mentioned purpose, the filing system that the present invention also provides a kind of anti-locking system to be tampered, comprise: check information generation module, for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents; Check information adds module, for according to the position of presetting, is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
Preferably, described checking algorithm comprises: the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Preferably, described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
Preferably, described check information generation module be used for following any one: calculated check information is assigned into the predeterminated position in original kernel associated documents; Described check information is added to field location reserved in described kernel associated documents.
Based on above-mentioned purpose, the file validation system that the present invention also provides a kind of anti-locking system to be tampered, comprise: separation module, for according to predeterminated position, default check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; Check information computing module, for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information; Based on matching result, authentication module, for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
Preferably, described check information computing module be used for following any one: according to preset placement location and preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Preferably, described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
In sum, the document generating method that anti-locking system of the present invention is tampered, file verification method and system, there is following beneficial effect: by increasing check information in kernel associated documents, and when detecting that kernel associated documents are changed, check information is verified, can effectively prevent kernel relevant information from being replaced in every way or deleting; In addition, adopt and the mode of the logical operation of the file size of kernel associated documents and default proof test value is obtained check information, can rapid computations, improve verification efficiency; Further, assigned by check information the reserved field hereof or in header to add check information, when not affecting file and using, check information can be provided, be convenient to the checking of check information.
Accompanying drawing explanation
Fig. 1 is shown as the process flow diagram of the document generating method that anti-locking system of the present invention is tampered.
Fig. 2 is shown as the process flow diagram of the file verification method that anti-locking system of the present invention is tampered.
Fig. 3 is shown as the structural representation of the filing system that anti-locking system of the present invention is tampered.
Fig. 4 is shown as the structural representation of the file validation system that anti-locking system of the present invention is tampered.
Element numbers explanation
1 filing system
11 check information generation modules
12 check informations add module
2 file validation systems
21 separation modules
22 check information computing modules
23 authentication modules
S11 ~ S12, S21 ~ S23 step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this instructions can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this instructions also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.It should be noted that, when not conflicting, the feature in following examples and embodiment can combine mutually.
It should be noted that, the diagram provided in following examples only illustrates basic conception of the present invention in a schematic way, then only the assembly relevant with the present invention is shown in graphic but not component count, shape and size when implementing according to reality is drawn, it is actual when implementing, and the kenel of each assembly, quantity and ratio can be a kind of change arbitrarily, and its assembly layout kenel also may be more complicated.
Refer to Fig. 1, the invention provides the document generating method that a kind of anti-locking system is tampered.Described document generating method performs primarily of filing system.Described filing system can be arranged in computer equipment.Wherein, described computer equipment includes but not limited to: server, subscriber equipment etc.Issue the kernel associated documents such as the kernel mirror image file of redaction or System guides file when manufacturer before, perform described filing system, obtain the kernel associated documents comprising check information.Concrete implementation is as follows:
In step s 11, described filing system is based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents.
At this, the identification informations such as the version according to obtained kernel associated documents can verify by described checking algorithm, obtain the check information that check length is fixing.
Preferably, described checking algorithm is that the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Such as, described filing system obtains the length of kernel associated documents, and obtained length and the proof test value preset is carried out and computing, obtains the check information that length is fixing.Wherein, because the file size of kernel associated documents is indefinite, therefore the length of selected proof test value is more than or equal to the maximal value of the value of the kernel associated documents file size of history trendline.Such as, the file size of kernel associated documents is abit, and the length of described proof test value is bbit, wherein, a<b, described filing system using the value of a & b as check information.
In step s 12, calculated check information, according to the position of presetting, adds in described original kernel associated documents, obtains the kernel associated documents comprising check information by described filing system.
At this, if described kernel associated documents are System guides file, then calculated check information is assigned into the predeterminated position in original kernel associated documents by described filing system.
Such as, calculated check information is assigned into the afterbody of System guides file by described filing system.
If described kernel associated documents are kernel mirror image file, then described check information is added to field location reserved in described kernel associated documents by described filing system.
At this, described kernel mirror image file comprises: header, zImage file etc.Described kernel mirror image file can also comprise described System guides file.Field larger for the length preset in described header is carried out cutting by described filing system, and the length of described kernel mirror image file and the check information obtained is added in described header.
Such as, the image field in described header is reduced some bytes by described filing system, corresponding, will in the byte reduced, add length field and the check information of kernel mirror image file.Again the kernel associated documents after interpolation are sent to terminal to be verified.
It should be noted that, above-mentioned two kinds of generations comprise the mode of the internal memory associated documents of check information and not necessarily and internal memory associated documents one_to_one corresponding.Respective generating mode can also be exchanged, generate the internal memory associated documents comprising check information.
As shown in Figure 2, the present invention also provides a kind of file verification method that anti-locking system is tampered.Described file verification method performs primarily of file validation system.Described file validation system is arranged in described terminal.Described terminal includes but not limited to: router, mobile device etc.
At this, be modified to prevent the kernel associated documents in operating system, even change, described file validation system is when getting new System guides file, or when reading new kernel mirror image file, described file validation system is verified obtained each kernel associated documents, and after being proved to be successful, replaces kernel associated documents.
Such as, when described terminal successfully downloads a new System guides file, and when preparing to replace, described file validation system is verified obtained System guides file in accordance with the following steps.
And for example, when external burning equipment is connected with described terminal by interface, and when preparing to wipe original kernel mirror image file with new kernel mirror image file, described file validation system is verified obtained kernel mirror image file according to step.
Particularly, described proof procedure is as follows:
In the step s 21, the check information in obtained kernel associated documents, according to predeterminated position, default check length, is separated with kernel associated documents to be verified by described file validation system.
Particularly, described file validation system, according to the filename, file suffixes etc. of obtained kernel associated documents, determines that obtained file is System guides file or kernel mirror image file.And according to the separate mode preset separately, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The mode of described separation includes but not limited to:
1) according to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described file validation system obtains is System guides file, then according to preset correspondence system boot files assign tail position and check length, the check information in obtained System guides file is separated with System guides file to be verified.
2) according to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described file validation system obtains is kernel mirror image file, then according to check information reserved field position and the check length in header corresponding to the kernel mirror image file preset, the check information in obtained kernel mirror image file is separated with kernel mirror image file to be verified.
In step S22, described file validation system according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information.
Particularly, described file validation system adopts the checking algorithm the same with aforesaid filing system, calculates the check information to be verified of the kernel associated documents to be verified separated.
Such as, the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation by described file validation system, and the operation result obtained is check information to be verified.
In step S23, calculated check information to be verified mates with isolated check information by described file validation system, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
Particularly, calculated check information to be verified mates with isolated check information by described file validation system; If consistent, then determine that obtained kernel associated documents are normal upgrade file, and the kernel associated documents of this locality are replaced to obtained kernel associated documents (being the obtained kernel associated documents removing check information) to be verified; Otherwise, then determine that obtained kernel associated documents are for tampering with a document, then will not replace, and provide obtained internal memory associated documents illegal.
Refer to Fig. 3, the invention provides the filing system that a kind of anti-locking system is tampered.Described filing system can be arranged in computer equipment.Wherein, described computer equipment includes but not limited to: server, subscriber equipment etc.Issue the kernel associated documents such as the kernel mirror image file of redaction or System guides file when manufacturer before, perform described filing system, obtain the kernel associated documents comprising check information.Described filing system 1 comprises: check information generation module 11, check information add module 12.
Described check information generation module 11 is for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents.
At this, the identification informations such as the version according to obtained kernel associated documents can verify by described checking algorithm, obtain the check information that check length is fixing.
Preferably, described checking algorithm is that the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Such as, described check information generation module 11 obtains the length of kernel associated documents, and obtained length and the proof test value preset is carried out and computing, obtains the check information that length is fixing.Wherein, because the file size of kernel associated documents is indefinite, therefore the length of selected proof test value is more than or equal to the maximal value of the value of the kernel associated documents file size of history trendline.Such as, the file size of kernel associated documents is abit, and the length of described proof test value is bbit, wherein, a<b, described check information generation module 11 using the value of a & b as check information.
Described check information adds module 12 for according to the position of presetting, and is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
At this, if described kernel associated documents are System guides file, then calculated check information is assigned into the predeterminated position in original kernel associated documents by described check information interpolation module 12.
Such as, described check information adds the afterbody that calculated check information is assigned into System guides file by module 12.
If described kernel associated documents are kernel mirror image file, then described check information adds module 12 and described check information is added to field location reserved in described kernel associated documents.
At this, described kernel mirror image file comprises: header, zImage file etc.Described kernel mirror image file can also comprise described System guides file.Described check information adds module 12 and field larger for the length preset in described header is carried out cutting, and the length of described kernel mirror image file and the check information obtained is added in described header.
Such as, described check information adds module 12 and the image field in described header is reduced some bytes, corresponding, will in the byte reduced, add length field and the check information of kernel mirror image file.Again the kernel associated documents after interpolation are sent to terminal to be verified.
It should be noted that, above-mentioned two kinds of generations comprise the mode of the internal memory associated documents of check information and not necessarily and internal memory associated documents one_to_one corresponding.Respective generating mode can also be exchanged, generate the internal memory associated documents comprising check information.
As shown in Figure 4, the present invention also provides the file validation system 2 that a kind of anti-locking system is tampered.Described file validation system 2 is arranged in described terminal.Described terminal includes but not limited to: router, mobile device etc.Described file validation system 2 comprises: separation module 21, check information computing module 22, authentication module 23.
At this, be modified to prevent the kernel associated documents in operating system, even change, described file validation system 2 is when getting new System guides file, or when reading new kernel mirror image file, described file validation system 2 is verified obtained each kernel associated documents, and after being proved to be successful, replaces kernel associated documents.
Such as, when described terminal successfully downloads a new System guides file, and when preparing to replace, described file validation system 2 according to as lower module to the System guides file that obtains verify.
And for example, when external burning equipment is connected with described terminal by interface, and when preparing to wipe original kernel mirror image file with new kernel mirror image file, described file validation system 2 is verified obtained kernel mirror image file according to lower module.
Check information in obtained kernel associated documents, for according to predeterminated position, default check length, is separated with kernel associated documents to be verified by described separation module 21.
Particularly, described separation module 21, according to the filename, file suffixes etc. of obtained kernel associated documents, determines that obtained file is System guides file or kernel mirror image file.And according to the separate mode preset separately, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The mode of described separation includes but not limited to:
1) according to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described separation module 21 obtains is System guides file, then according to preset correspondence system boot files assign tail position and check length, the check information in obtained System guides file is separated with System guides file to be verified.
2) according to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described separation module 21 obtains is kernel mirror image file, then according to check information reserved field position and the check length in header corresponding to the kernel mirror image file preset, the check information in obtained kernel mirror image file is separated with kernel mirror image file to be verified.
Described check information computing module 22 for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information.
Particularly, described check information computing module 22 adopts the checking algorithm the same with aforesaid filing system 1, calculates the check information to be verified of the kernel associated documents to be verified separated.
Such as, the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation by described check information computing module 22, and the operation result obtained is check information to be verified.
Based on matching result, described authentication module 23 for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
Particularly, calculated check information to be verified mates with isolated check information by described authentication module 23; If consistent, then determine that obtained kernel associated documents are normal upgrade file, and the kernel associated documents of this locality are replaced to obtained kernel associated documents (being the obtained kernel associated documents removing check information) to be verified; Otherwise, then determine that obtained kernel associated documents are for tampering with a document, then will not replace, and provide obtained internal memory associated documents illegal.
In sum, the present invention, by increasing check information in kernel associated documents, and verifies check information when detecting that kernel associated documents are changed, and can effectively prevent kernel relevant information from being replaced in every way or deleting; In addition, adopt and the mode of the logical operation of the file size of kernel associated documents and default proof test value is obtained check information, can rapid computations, improve verification efficiency.So the present invention effectively overcomes various shortcoming of the prior art and tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in art usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.

Claims (14)

1. the document generating method that is tampered of anti-locking system, is characterized in that, comprising:
Based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents;
According to the position of presetting, calculated check information is added in described original kernel associated documents, obtain the kernel associated documents comprising check information.
2. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: described checking algorithm comprises:
The file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
3. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
4. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: the described position according to presetting, the mode of calculated check information being added in described original kernel associated documents comprise following any one:
Calculated check information is assigned into the predeterminated position in original kernel associated documents;
Described check information is added to field location reserved in described kernel associated documents.
5. the file verification method that is tampered of anti-locking system, is characterized in that, said method comprising the steps of:
According to predeterminated position, preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to the checking algorithm preset, that calculate described kernel associated documents to be verified, to be verified check information;
Calculated check information to be verified is mated with isolated check information, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
6. the file verification method that is tampered of anti-locking system according to claim 5, it is characterized in that: described according to predeterminated position, preset check length, the mode that the check information in obtained kernel associated documents is separated with kernel associated documents to be verified is comprised following any one:
According to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
7. the file verification method that is tampered of anti-locking system according to claim 5, is characterized in that: described checking algorithm comprises:
The file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
8. the filing system that is tampered of anti-locking system, is characterized in that, comprising:
Check information generation module, for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents;
Check information adds module, for according to the position of presetting, is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
9. the filing system that is tampered of anti-locking system according to claim 8, is characterized in that: described checking algorithm comprises:
The file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
10. the filing system that is tampered of anti-locking system according to claim 8, is characterized in that: described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
The filing system that 11. anti-locking systems according to claim 8 are tampered, is characterized in that: described check information generation module be used for following any one:
Calculated check information is assigned into the predeterminated position in original kernel associated documents;
Described check information is added to field location reserved in described kernel associated documents.
The file validation system that 12. 1 kinds of anti-locking systems are tampered, is characterized in that, comprising:
Separation module, for according to predeterminated position, default check length, is separated the check information in obtained kernel associated documents with kernel associated documents to be verified;
Check information computing module, for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information;
Based on matching result, authentication module, for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
The file validation system that 13. anti-locking systems according to claim 12 are tampered, is characterized in that: described check information computing module be used for following any one:
According to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The file validation system that 14. anti-locking systems according to claim 12 are tampered, is characterized in that: described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
CN201510906673.8A 2015-12-09 2015-12-09 File generation method, file verification method and systems for preventing system from being tampered Pending CN105373747A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510906673.8A CN105373747A (en) 2015-12-09 2015-12-09 File generation method, file verification method and systems for preventing system from being tampered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510906673.8A CN105373747A (en) 2015-12-09 2015-12-09 File generation method, file verification method and systems for preventing system from being tampered

Publications (1)

Publication Number Publication Date
CN105373747A true CN105373747A (en) 2016-03-02

Family

ID=55375935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510906673.8A Pending CN105373747A (en) 2015-12-09 2015-12-09 File generation method, file verification method and systems for preventing system from being tampered

Country Status (1)

Country Link
CN (1) CN105373747A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296450A (en) * 2016-08-05 2017-01-04 广东电网有限责任公司电力调度控制中心 The fixed value modification method and system of self checking mechanism
CN106534083A (en) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 Root tool verification method and apparatus
CN107346392A (en) * 2017-06-27 2017-11-14 努比亚技术有限公司 Terminal system change recognition methods, device and readable storage medium storing program for executing
CN107666459A (en) * 2016-07-27 2018-02-06 广州市动景计算机科技有限公司 Application cache method of calibration and device and computing device
CN108629197A (en) * 2017-03-21 2018-10-09 中国航发商用航空发动机有限责任公司 File access control method and system for the integration environment
CN111680298A (en) * 2020-04-29 2020-09-18 杭州涂鸦信息技术有限公司 Embedded system safe starting method and device with storage function
CN111930595A (en) * 2020-07-30 2020-11-13 长沙景嘉微电子股份有限公司 Display card drive verification method, device, terminal and medium
WO2022120572A1 (en) * 2020-12-08 2022-06-16 深圳欣锐科技股份有限公司 Tamper verification method and apparatus

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030123700A1 (en) * 2001-12-28 2003-07-03 Canon Kabushiki Kaisha Image generation apparatus, image file generation method, image verification apparatus and image verification method
CN101170414A (en) * 2007-12-11 2008-04-30 刘彤 A file content tamper-prevention method under distribution environment
CN101795293A (en) * 2010-01-27 2010-08-04 浪潮(北京)电子信息产业有限公司 File download method, file download system, sending device and detecting device
CN101848055A (en) * 2009-03-23 2010-09-29 华为技术有限公司 Method and device for correcting data
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102509049A (en) * 2011-11-14 2012-06-20 任子行网络技术股份有限公司 Program validity verification method and system
CN102508728A (en) * 2011-11-29 2012-06-20 中国航空工业集团公司第六三一研究所 Error detection and read method of goal document solidified on FLASH carrier
CN102655441A (en) * 2011-03-04 2012-09-05 上海日省电子有限公司 Communication automatic error correction coding method and system
CN104579558A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Method for detecting integrity in data transmission process

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030123700A1 (en) * 2001-12-28 2003-07-03 Canon Kabushiki Kaisha Image generation apparatus, image file generation method, image verification apparatus and image verification method
CN101170414A (en) * 2007-12-11 2008-04-30 刘彤 A file content tamper-prevention method under distribution environment
CN101848055A (en) * 2009-03-23 2010-09-29 华为技术有限公司 Method and device for correcting data
CN101795293A (en) * 2010-01-27 2010-08-04 浪潮(北京)电子信息产业有限公司 File download method, file download system, sending device and detecting device
CN102655441A (en) * 2011-03-04 2012-09-05 上海日省电子有限公司 Communication automatic error correction coding method and system
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102509049A (en) * 2011-11-14 2012-06-20 任子行网络技术股份有限公司 Program validity verification method and system
CN102508728A (en) * 2011-11-29 2012-06-20 中国航空工业集团公司第六三一研究所 Error detection and read method of goal document solidified on FLASH carrier
CN104579558A (en) * 2014-12-05 2015-04-29 苏州沃斯麦机电科技有限公司 Method for detecting integrity in data transmission process

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666459B (en) * 2016-07-27 2020-10-16 阿里巴巴(中国)有限公司 Application cache checking method and device and computing equipment
CN107666459A (en) * 2016-07-27 2018-02-06 广州市动景计算机科技有限公司 Application cache method of calibration and device and computing device
CN106296450A (en) * 2016-08-05 2017-01-04 广东电网有限责任公司电力调度控制中心 The fixed value modification method and system of self checking mechanism
CN106534083B (en) * 2016-10-31 2019-07-23 北京小米移动软件有限公司 Brush machine Tool validation method and device
CN106534083A (en) * 2016-10-31 2017-03-22 北京小米移动软件有限公司 Root tool verification method and apparatus
CN108629197B (en) * 2017-03-21 2020-07-28 中国航发商用航空发动机有限责任公司 File access control method and system for integrated environment
CN108629197A (en) * 2017-03-21 2018-10-09 中国航发商用航空发动机有限责任公司 File access control method and system for the integration environment
CN107346392A (en) * 2017-06-27 2017-11-14 努比亚技术有限公司 Terminal system change recognition methods, device and readable storage medium storing program for executing
CN107346392B (en) * 2017-06-27 2021-09-21 努比亚技术有限公司 Terminal system change identification method and device and readable storage medium
CN111680298A (en) * 2020-04-29 2020-09-18 杭州涂鸦信息技术有限公司 Embedded system safe starting method and device with storage function
CN111680298B (en) * 2020-04-29 2023-10-27 杭州涂鸦信息技术有限公司 Safe starting method of embedded system and device with storage function
CN111930595A (en) * 2020-07-30 2020-11-13 长沙景嘉微电子股份有限公司 Display card drive verification method, device, terminal and medium
WO2022120572A1 (en) * 2020-12-08 2022-06-16 深圳欣锐科技股份有限公司 Tamper verification method and apparatus

Similar Documents

Publication Publication Date Title
CN105373747A (en) File generation method, file verification method and systems for preventing system from being tampered
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
CN109918055B (en) Application program generation method and device
CN110166543B (en) Application program processing method and device and computer equipment
CN106843978B (en) SDK access method and system
CN110022558B (en) Method for encrypting and decrypting upgrade package, electronic device and storage medium
CN102932407A (en) Cloud computing-based safety backup system and method
CN104318155A (en) Dynamic loading method capable of guarding against reverse APK file
CN111694589B (en) Upgrade package generation method, device, server and computer readable storage medium
WO2022078366A1 (en) Application protection method and apparatus, device and medium
KR20210029621A (en) Apparatus and method for improving runtime performance after application update in electronic device
CN109558161A (en) Upgrade packet processing method, device and OTA cloud server
CN107656750A (en) Update of plug-in method and device
CN111597553A (en) Process processing method, device, equipment and storage medium in virus searching and killing
CN111176685A (en) Upgrading method and device
CN109033818B (en) Terminal, authentication method, and computer-readable storage medium
CN105930713A (en) Method and terminal for generating identifying codes
CN113177193A (en) Watermark adding method, watermark verifying method and terminal equipment
CN109271543B (en) Thumbnail display method and device, terminal and computer-readable storage medium
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment
CN108664796B (en) So file protection method and device
CN114157662B (en) Cloud platform parameter adaptation method, device, terminal equipment and storage medium
CN106155709B (en) Plug-in loading method, device and equipment
CN113948164A (en) Clinical medicine management method, device, equipment and computer readable storage medium
JP7184198B2 (en) Verification Information Creation System, Verification Information Creation Method, and Verification Information Creation Program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160302

RJ01 Rejection of invention patent application after publication