CN105373747A - File generation method, file verification method and systems for preventing system from being tampered - Google Patents
File generation method, file verification method and systems for preventing system from being tampered Download PDFInfo
- Publication number
- CN105373747A CN105373747A CN201510906673.8A CN201510906673A CN105373747A CN 105373747 A CN105373747 A CN 105373747A CN 201510906673 A CN201510906673 A CN 201510906673A CN 105373747 A CN105373747 A CN 105373747A
- Authority
- CN
- China
- Prior art keywords
- associated documents
- check information
- kernel associated
- file
- kernel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The invention provides a file generation method, a file verification method and systems for preventing a system from being tampered. The generation method comprises the steps that the generation system, based on a preset check algorithm, calculates check information with the fixed check length for verifying an original kernel related file; and according to a preset position, the calculated check information is added into the original kernel related file to obtain a kernel related file containing the check information. The verification method comprises the steps that the verification system, according to the preset position and a preset check length, separates the obtained check information in the kernel related file from a to-be-checked kernel related file; to-be-verified check information of the to-be-checked kernel related file is calculated according to the preset check algorithm; and the calculated to-be-verified check information is matched with the separated check information, and whether the obtained kernel related file is a tampered file or not is determined based on a matching result. According to the file generation method, the file verification method and the systems, kernel related information can be effectively prevented from being replaced or deleted.
Description
Technical field
The present invention relates to a kind of computer software fields, particularly relate to document generating method, file verification method and system that a kind of anti-locking system is tampered.
Background technology
Because provide main just a few company of AP chip solution at present, the companies such as broadcom, mtk.These chip companies also can provide the solution of hardware and software in the lump while selling chip.Therefore the firmware adopting the different AP producers of same money chip to provide substantially can be general mutually.Such shortcoming is: the equipment that A company produces, and is just likely become the product of B company by the mode of firmware updating by B company, thus the brand causing A company runs off.Therefore producer needs a kind of oneself equipment of preventing by the scheme of people's malice brush machine.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide document generating method, file verification method and system that a kind of anti-locking system is tampered, is easy to for solving kernel relevant information in prior art the problem be tampered.
For achieving the above object and other relevant objects, the invention provides the document generating method that a kind of anti-locking system is tampered, comprising: based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents; According to the position of presetting, calculated check information is added in described original kernel associated documents, obtain the kernel associated documents comprising check information.
Preferably, described checking algorithm comprises: the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Preferably, described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
Preferably, described according to preset position, the mode of calculated check information being added in described original kernel associated documents comprise following any one: calculated check information is assigned into the predeterminated position in original kernel associated documents; Described check information is added to field location reserved in described kernel associated documents.
Based on above-mentioned purpose, a kind of file verification method that the present invention also provides anti-locking system to be tampered, said method comprising the steps of: according to predeterminated position, preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to the checking algorithm preset, that calculate described kernel associated documents to be verified, to be verified check information; Calculated check information to be verified is mated with isolated check information, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
Preferably, described according to predeterminated position, default check length, the mode that check information in obtained kernel associated documents is separated with kernel associated documents to be verified is comprised following any one: according to preset placement location and preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Preferably, described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
Based on above-mentioned purpose, the filing system that the present invention also provides a kind of anti-locking system to be tampered, comprise: check information generation module, for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents; Check information adds module, for according to the position of presetting, is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
Preferably, described checking algorithm comprises: the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Preferably, described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
Preferably, described check information generation module be used for following any one: calculated check information is assigned into the predeterminated position in original kernel associated documents; Described check information is added to field location reserved in described kernel associated documents.
Based on above-mentioned purpose, the file validation system that the present invention also provides a kind of anti-locking system to be tampered, comprise: separation module, for according to predeterminated position, default check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; Check information computing module, for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information; Based on matching result, authentication module, for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
Preferably, described check information computing module be used for following any one: according to preset placement location and preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified; According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Preferably, described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
In sum, the document generating method that anti-locking system of the present invention is tampered, file verification method and system, there is following beneficial effect: by increasing check information in kernel associated documents, and when detecting that kernel associated documents are changed, check information is verified, can effectively prevent kernel relevant information from being replaced in every way or deleting; In addition, adopt and the mode of the logical operation of the file size of kernel associated documents and default proof test value is obtained check information, can rapid computations, improve verification efficiency; Further, assigned by check information the reserved field hereof or in header to add check information, when not affecting file and using, check information can be provided, be convenient to the checking of check information.
Accompanying drawing explanation
Fig. 1 is shown as the process flow diagram of the document generating method that anti-locking system of the present invention is tampered.
Fig. 2 is shown as the process flow diagram of the file verification method that anti-locking system of the present invention is tampered.
Fig. 3 is shown as the structural representation of the filing system that anti-locking system of the present invention is tampered.
Fig. 4 is shown as the structural representation of the file validation system that anti-locking system of the present invention is tampered.
Element numbers explanation
1 filing system
11 check information generation modules
12 check informations add module
2 file validation systems
21 separation modules
22 check information computing modules
23 authentication modules
S11 ~ S12, S21 ~ S23 step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this instructions can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this instructions also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.It should be noted that, when not conflicting, the feature in following examples and embodiment can combine mutually.
It should be noted that, the diagram provided in following examples only illustrates basic conception of the present invention in a schematic way, then only the assembly relevant with the present invention is shown in graphic but not component count, shape and size when implementing according to reality is drawn, it is actual when implementing, and the kenel of each assembly, quantity and ratio can be a kind of change arbitrarily, and its assembly layout kenel also may be more complicated.
Refer to Fig. 1, the invention provides the document generating method that a kind of anti-locking system is tampered.Described document generating method performs primarily of filing system.Described filing system can be arranged in computer equipment.Wherein, described computer equipment includes but not limited to: server, subscriber equipment etc.Issue the kernel associated documents such as the kernel mirror image file of redaction or System guides file when manufacturer before, perform described filing system, obtain the kernel associated documents comprising check information.Concrete implementation is as follows:
In step s 11, described filing system is based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents.
At this, the identification informations such as the version according to obtained kernel associated documents can verify by described checking algorithm, obtain the check information that check length is fixing.
Preferably, described checking algorithm is that the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Such as, described filing system obtains the length of kernel associated documents, and obtained length and the proof test value preset is carried out and computing, obtains the check information that length is fixing.Wherein, because the file size of kernel associated documents is indefinite, therefore the length of selected proof test value is more than or equal to the maximal value of the value of the kernel associated documents file size of history trendline.Such as, the file size of kernel associated documents is abit, and the length of described proof test value is bbit, wherein, a<b, described filing system using the value of a & b as check information.
In step s 12, calculated check information, according to the position of presetting, adds in described original kernel associated documents, obtains the kernel associated documents comprising check information by described filing system.
At this, if described kernel associated documents are System guides file, then calculated check information is assigned into the predeterminated position in original kernel associated documents by described filing system.
Such as, calculated check information is assigned into the afterbody of System guides file by described filing system.
If described kernel associated documents are kernel mirror image file, then described check information is added to field location reserved in described kernel associated documents by described filing system.
At this, described kernel mirror image file comprises: header, zImage file etc.Described kernel mirror image file can also comprise described System guides file.Field larger for the length preset in described header is carried out cutting by described filing system, and the length of described kernel mirror image file and the check information obtained is added in described header.
Such as, the image field in described header is reduced some bytes by described filing system, corresponding, will in the byte reduced, add length field and the check information of kernel mirror image file.Again the kernel associated documents after interpolation are sent to terminal to be verified.
It should be noted that, above-mentioned two kinds of generations comprise the mode of the internal memory associated documents of check information and not necessarily and internal memory associated documents one_to_one corresponding.Respective generating mode can also be exchanged, generate the internal memory associated documents comprising check information.
As shown in Figure 2, the present invention also provides a kind of file verification method that anti-locking system is tampered.Described file verification method performs primarily of file validation system.Described file validation system is arranged in described terminal.Described terminal includes but not limited to: router, mobile device etc.
At this, be modified to prevent the kernel associated documents in operating system, even change, described file validation system is when getting new System guides file, or when reading new kernel mirror image file, described file validation system is verified obtained each kernel associated documents, and after being proved to be successful, replaces kernel associated documents.
Such as, when described terminal successfully downloads a new System guides file, and when preparing to replace, described file validation system is verified obtained System guides file in accordance with the following steps.
And for example, when external burning equipment is connected with described terminal by interface, and when preparing to wipe original kernel mirror image file with new kernel mirror image file, described file validation system is verified obtained kernel mirror image file according to step.
Particularly, described proof procedure is as follows:
In the step s 21, the check information in obtained kernel associated documents, according to predeterminated position, default check length, is separated with kernel associated documents to be verified by described file validation system.
Particularly, described file validation system, according to the filename, file suffixes etc. of obtained kernel associated documents, determines that obtained file is System guides file or kernel mirror image file.And according to the separate mode preset separately, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The mode of described separation includes but not limited to:
1) according to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described file validation system obtains is System guides file, then according to preset correspondence system boot files assign tail position and check length, the check information in obtained System guides file is separated with System guides file to be verified.
2) according to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described file validation system obtains is kernel mirror image file, then according to check information reserved field position and the check length in header corresponding to the kernel mirror image file preset, the check information in obtained kernel mirror image file is separated with kernel mirror image file to be verified.
In step S22, described file validation system according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information.
Particularly, described file validation system adopts the checking algorithm the same with aforesaid filing system, calculates the check information to be verified of the kernel associated documents to be verified separated.
Such as, the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation by described file validation system, and the operation result obtained is check information to be verified.
In step S23, calculated check information to be verified mates with isolated check information by described file validation system, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
Particularly, calculated check information to be verified mates with isolated check information by described file validation system; If consistent, then determine that obtained kernel associated documents are normal upgrade file, and the kernel associated documents of this locality are replaced to obtained kernel associated documents (being the obtained kernel associated documents removing check information) to be verified; Otherwise, then determine that obtained kernel associated documents are for tampering with a document, then will not replace, and provide obtained internal memory associated documents illegal.
Refer to Fig. 3, the invention provides the filing system that a kind of anti-locking system is tampered.Described filing system can be arranged in computer equipment.Wherein, described computer equipment includes but not limited to: server, subscriber equipment etc.Issue the kernel associated documents such as the kernel mirror image file of redaction or System guides file when manufacturer before, perform described filing system, obtain the kernel associated documents comprising check information.Described filing system 1 comprises: check information generation module 11, check information add module 12.
Described check information generation module 11 is for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents.
At this, the identification informations such as the version according to obtained kernel associated documents can verify by described checking algorithm, obtain the check information that check length is fixing.
Preferably, described checking algorithm is that the file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
Such as, described check information generation module 11 obtains the length of kernel associated documents, and obtained length and the proof test value preset is carried out and computing, obtains the check information that length is fixing.Wherein, because the file size of kernel associated documents is indefinite, therefore the length of selected proof test value is more than or equal to the maximal value of the value of the kernel associated documents file size of history trendline.Such as, the file size of kernel associated documents is abit, and the length of described proof test value is bbit, wherein, a<b, described check information generation module 11 using the value of a & b as check information.
Described check information adds module 12 for according to the position of presetting, and is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
At this, if described kernel associated documents are System guides file, then calculated check information is assigned into the predeterminated position in original kernel associated documents by described check information interpolation module 12.
Such as, described check information adds the afterbody that calculated check information is assigned into System guides file by module 12.
If described kernel associated documents are kernel mirror image file, then described check information adds module 12 and described check information is added to field location reserved in described kernel associated documents.
At this, described kernel mirror image file comprises: header, zImage file etc.Described kernel mirror image file can also comprise described System guides file.Described check information adds module 12 and field larger for the length preset in described header is carried out cutting, and the length of described kernel mirror image file and the check information obtained is added in described header.
Such as, described check information adds module 12 and the image field in described header is reduced some bytes, corresponding, will in the byte reduced, add length field and the check information of kernel mirror image file.Again the kernel associated documents after interpolation are sent to terminal to be verified.
It should be noted that, above-mentioned two kinds of generations comprise the mode of the internal memory associated documents of check information and not necessarily and internal memory associated documents one_to_one corresponding.Respective generating mode can also be exchanged, generate the internal memory associated documents comprising check information.
As shown in Figure 4, the present invention also provides the file validation system 2 that a kind of anti-locking system is tampered.Described file validation system 2 is arranged in described terminal.Described terminal includes but not limited to: router, mobile device etc.Described file validation system 2 comprises: separation module 21, check information computing module 22, authentication module 23.
At this, be modified to prevent the kernel associated documents in operating system, even change, described file validation system 2 is when getting new System guides file, or when reading new kernel mirror image file, described file validation system 2 is verified obtained each kernel associated documents, and after being proved to be successful, replaces kernel associated documents.
Such as, when described terminal successfully downloads a new System guides file, and when preparing to replace, described file validation system 2 according to as lower module to the System guides file that obtains verify.
And for example, when external burning equipment is connected with described terminal by interface, and when preparing to wipe original kernel mirror image file with new kernel mirror image file, described file validation system 2 is verified obtained kernel mirror image file according to lower module.
Check information in obtained kernel associated documents, for according to predeterminated position, default check length, is separated with kernel associated documents to be verified by described separation module 21.
Particularly, described separation module 21, according to the filename, file suffixes etc. of obtained kernel associated documents, determines that obtained file is System guides file or kernel mirror image file.And according to the separate mode preset separately, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The mode of described separation includes but not limited to:
1) according to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described separation module 21 obtains is System guides file, then according to preset correspondence system boot files assign tail position and check length, the check information in obtained System guides file is separated with System guides file to be verified.
2) according to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
Such as, if the kernel relevant information that described separation module 21 obtains is kernel mirror image file, then according to check information reserved field position and the check length in header corresponding to the kernel mirror image file preset, the check information in obtained kernel mirror image file is separated with kernel mirror image file to be verified.
Described check information computing module 22 for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information.
Particularly, described check information computing module 22 adopts the checking algorithm the same with aforesaid filing system 1, calculates the check information to be verified of the kernel associated documents to be verified separated.
Such as, the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation by described check information computing module 22, and the operation result obtained is check information to be verified.
Based on matching result, described authentication module 23 for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
Particularly, calculated check information to be verified mates with isolated check information by described authentication module 23; If consistent, then determine that obtained kernel associated documents are normal upgrade file, and the kernel associated documents of this locality are replaced to obtained kernel associated documents (being the obtained kernel associated documents removing check information) to be verified; Otherwise, then determine that obtained kernel associated documents are for tampering with a document, then will not replace, and provide obtained internal memory associated documents illegal.
In sum, the present invention, by increasing check information in kernel associated documents, and verifies check information when detecting that kernel associated documents are changed, and can effectively prevent kernel relevant information from being replaced in every way or deleting; In addition, adopt and the mode of the logical operation of the file size of kernel associated documents and default proof test value is obtained check information, can rapid computations, improve verification efficiency.So the present invention effectively overcomes various shortcoming of the prior art and tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in art usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.
Claims (14)
1. the document generating method that is tampered of anti-locking system, is characterized in that, comprising:
Based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents;
According to the position of presetting, calculated check information is added in described original kernel associated documents, obtain the kernel associated documents comprising check information.
2. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: described checking algorithm comprises:
The file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
3. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
4. the document generating method that is tampered of anti-locking system according to claim 1, is characterized in that: the described position according to presetting, the mode of calculated check information being added in described original kernel associated documents comprise following any one:
Calculated check information is assigned into the predeterminated position in original kernel associated documents;
Described check information is added to field location reserved in described kernel associated documents.
5. the file verification method that is tampered of anti-locking system, is characterized in that, said method comprising the steps of:
According to predeterminated position, preset check length, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to the checking algorithm preset, that calculate described kernel associated documents to be verified, to be verified check information;
Calculated check information to be verified is mated with isolated check information, and determines that whether obtained kernel associated documents are for tampering with a document based on matching result.
6. the file verification method that is tampered of anti-locking system according to claim 5, it is characterized in that: described according to predeterminated position, preset check length, the mode that the check information in obtained kernel associated documents is separated with kernel associated documents to be verified is comprised following any one:
According to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
7. the file verification method that is tampered of anti-locking system according to claim 5, is characterized in that: described checking algorithm comprises:
The file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
8. the filing system that is tampered of anti-locking system, is characterized in that, comprising:
Check information generation module, for based on the checking algorithm preset, that calculation check length is fixed, for verifying the check information of original kernel associated documents;
Check information adds module, for according to the position of presetting, is added to by calculated check information in described original kernel associated documents, obtains the kernel associated documents comprising check information.
9. the filing system that is tampered of anti-locking system according to claim 8, is characterized in that: described checking algorithm comprises:
The file size of original kernel associated documents and the proof test value of preset length are carried out logical operation.
10. the filing system that is tampered of anti-locking system according to claim 8, is characterized in that: described kernel associated documents comprise following at least one: kernel mirror image file, System guides file.
The filing system that 11. anti-locking systems according to claim 8 are tampered, is characterized in that: described check information generation module be used for following any one:
Calculated check information is assigned into the predeterminated position in original kernel associated documents;
Described check information is added to field location reserved in described kernel associated documents.
The file validation system that 12. 1 kinds of anti-locking systems are tampered, is characterized in that, comprising:
Separation module, for according to predeterminated position, default check length, is separated the check information in obtained kernel associated documents with kernel associated documents to be verified;
Check information computing module, for according to preset checking algorithm, that calculate described kernel associated documents to be verified, to be verified check information;
Based on matching result, authentication module, for being mated with isolated check information by calculated check information to be verified, and determines that whether obtained kernel associated documents are for tampering with a document.
The file validation system that 13. anti-locking systems according to claim 12 are tampered, is characterized in that: described check information computing module be used for following any one:
According to the placement location preset and the check length of presetting, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified;
According to reserved field position and the default check length of the kernel associated documents preset, the check information in obtained kernel associated documents is separated with kernel associated documents to be verified.
The file validation system that 14. anti-locking systems according to claim 12 are tampered, is characterized in that: described checking algorithm comprises: the file size of kernel associated documents to be verified and the proof test value of preset length are carried out logical operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510906673.8A CN105373747A (en) | 2015-12-09 | 2015-12-09 | File generation method, file verification method and systems for preventing system from being tampered |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510906673.8A CN105373747A (en) | 2015-12-09 | 2015-12-09 | File generation method, file verification method and systems for preventing system from being tampered |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105373747A true CN105373747A (en) | 2016-03-02 |
Family
ID=55375935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510906673.8A Pending CN105373747A (en) | 2015-12-09 | 2015-12-09 | File generation method, file verification method and systems for preventing system from being tampered |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105373747A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106296450A (en) * | 2016-08-05 | 2017-01-04 | 广东电网有限责任公司电力调度控制中心 | The fixed value modification method and system of self checking mechanism |
CN106534083A (en) * | 2016-10-31 | 2017-03-22 | 北京小米移动软件有限公司 | Root tool verification method and apparatus |
CN107346392A (en) * | 2017-06-27 | 2017-11-14 | 努比亚技术有限公司 | Terminal system change recognition methods, device and readable storage medium storing program for executing |
CN107666459A (en) * | 2016-07-27 | 2018-02-06 | 广州市动景计算机科技有限公司 | Application cache method of calibration and device and computing device |
CN108629197A (en) * | 2017-03-21 | 2018-10-09 | 中国航发商用航空发动机有限责任公司 | File access control method and system for the integration environment |
CN111680298A (en) * | 2020-04-29 | 2020-09-18 | 杭州涂鸦信息技术有限公司 | Embedded system safe starting method and device with storage function |
CN111930595A (en) * | 2020-07-30 | 2020-11-13 | 长沙景嘉微电子股份有限公司 | Display card drive verification method, device, terminal and medium |
WO2022120572A1 (en) * | 2020-12-08 | 2022-06-16 | 深圳欣锐科技股份有限公司 | Tamper verification method and apparatus |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030123700A1 (en) * | 2001-12-28 | 2003-07-03 | Canon Kabushiki Kaisha | Image generation apparatus, image file generation method, image verification apparatus and image verification method |
CN101170414A (en) * | 2007-12-11 | 2008-04-30 | 刘彤 | A file content tamper-prevention method under distribution environment |
CN101795293A (en) * | 2010-01-27 | 2010-08-04 | 浪潮(北京)电子信息产业有限公司 | File download method, file download system, sending device and detecting device |
CN101848055A (en) * | 2009-03-23 | 2010-09-29 | 华为技术有限公司 | Method and device for correcting data |
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102509049A (en) * | 2011-11-14 | 2012-06-20 | 任子行网络技术股份有限公司 | Program validity verification method and system |
CN102508728A (en) * | 2011-11-29 | 2012-06-20 | 中国航空工业集团公司第六三一研究所 | Error detection and read method of goal document solidified on FLASH carrier |
CN102655441A (en) * | 2011-03-04 | 2012-09-05 | 上海日省电子有限公司 | Communication automatic error correction coding method and system |
CN104579558A (en) * | 2014-12-05 | 2015-04-29 | 苏州沃斯麦机电科技有限公司 | Method for detecting integrity in data transmission process |
-
2015
- 2015-12-09 CN CN201510906673.8A patent/CN105373747A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030123700A1 (en) * | 2001-12-28 | 2003-07-03 | Canon Kabushiki Kaisha | Image generation apparatus, image file generation method, image verification apparatus and image verification method |
CN101170414A (en) * | 2007-12-11 | 2008-04-30 | 刘彤 | A file content tamper-prevention method under distribution environment |
CN101848055A (en) * | 2009-03-23 | 2010-09-29 | 华为技术有限公司 | Method and device for correcting data |
CN101795293A (en) * | 2010-01-27 | 2010-08-04 | 浪潮(北京)电子信息产业有限公司 | File download method, file download system, sending device and detecting device |
CN102655441A (en) * | 2011-03-04 | 2012-09-05 | 上海日省电子有限公司 | Communication automatic error correction coding method and system |
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102509049A (en) * | 2011-11-14 | 2012-06-20 | 任子行网络技术股份有限公司 | Program validity verification method and system |
CN102508728A (en) * | 2011-11-29 | 2012-06-20 | 中国航空工业集团公司第六三一研究所 | Error detection and read method of goal document solidified on FLASH carrier |
CN104579558A (en) * | 2014-12-05 | 2015-04-29 | 苏州沃斯麦机电科技有限公司 | Method for detecting integrity in data transmission process |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107666459B (en) * | 2016-07-27 | 2020-10-16 | 阿里巴巴(中国)有限公司 | Application cache checking method and device and computing equipment |
CN107666459A (en) * | 2016-07-27 | 2018-02-06 | 广州市动景计算机科技有限公司 | Application cache method of calibration and device and computing device |
CN106296450A (en) * | 2016-08-05 | 2017-01-04 | 广东电网有限责任公司电力调度控制中心 | The fixed value modification method and system of self checking mechanism |
CN106534083B (en) * | 2016-10-31 | 2019-07-23 | 北京小米移动软件有限公司 | Brush machine Tool validation method and device |
CN106534083A (en) * | 2016-10-31 | 2017-03-22 | 北京小米移动软件有限公司 | Root tool verification method and apparatus |
CN108629197B (en) * | 2017-03-21 | 2020-07-28 | 中国航发商用航空发动机有限责任公司 | File access control method and system for integrated environment |
CN108629197A (en) * | 2017-03-21 | 2018-10-09 | 中国航发商用航空发动机有限责任公司 | File access control method and system for the integration environment |
CN107346392A (en) * | 2017-06-27 | 2017-11-14 | 努比亚技术有限公司 | Terminal system change recognition methods, device and readable storage medium storing program for executing |
CN107346392B (en) * | 2017-06-27 | 2021-09-21 | 努比亚技术有限公司 | Terminal system change identification method and device and readable storage medium |
CN111680298A (en) * | 2020-04-29 | 2020-09-18 | 杭州涂鸦信息技术有限公司 | Embedded system safe starting method and device with storage function |
CN111680298B (en) * | 2020-04-29 | 2023-10-27 | 杭州涂鸦信息技术有限公司 | Safe starting method of embedded system and device with storage function |
CN111930595A (en) * | 2020-07-30 | 2020-11-13 | 长沙景嘉微电子股份有限公司 | Display card drive verification method, device, terminal and medium |
WO2022120572A1 (en) * | 2020-12-08 | 2022-06-16 | 深圳欣锐科技股份有限公司 | Tamper verification method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105373747A (en) | File generation method, file verification method and systems for preventing system from being tampered | |
CN111143869B (en) | Application package processing method and device, electronic equipment and storage medium | |
CN109918055B (en) | Application program generation method and device | |
CN110166543B (en) | Application program processing method and device and computer equipment | |
CN106843978B (en) | SDK access method and system | |
CN110022558B (en) | Method for encrypting and decrypting upgrade package, electronic device and storage medium | |
CN102932407A (en) | Cloud computing-based safety backup system and method | |
CN104318155A (en) | Dynamic loading method capable of guarding against reverse APK file | |
CN111694589B (en) | Upgrade package generation method, device, server and computer readable storage medium | |
WO2022078366A1 (en) | Application protection method and apparatus, device and medium | |
KR20210029621A (en) | Apparatus and method for improving runtime performance after application update in electronic device | |
CN109558161A (en) | Upgrade packet processing method, device and OTA cloud server | |
CN107656750A (en) | Update of plug-in method and device | |
CN111597553A (en) | Process processing method, device, equipment and storage medium in virus searching and killing | |
CN111176685A (en) | Upgrading method and device | |
CN109033818B (en) | Terminal, authentication method, and computer-readable storage medium | |
CN105930713A (en) | Method and terminal for generating identifying codes | |
CN113177193A (en) | Watermark adding method, watermark verifying method and terminal equipment | |
CN109271543B (en) | Thumbnail display method and device, terminal and computer-readable storage medium | |
CN111400771A (en) | Target partition checking method and device, storage medium and computer equipment | |
CN108664796B (en) | So file protection method and device | |
CN114157662B (en) | Cloud platform parameter adaptation method, device, terminal equipment and storage medium | |
CN106155709B (en) | Plug-in loading method, device and equipment | |
CN113948164A (en) | Clinical medicine management method, device, equipment and computer readable storage medium | |
JP7184198B2 (en) | Verification Information Creation System, Verification Information Creation Method, and Verification Information Creation Program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160302 |
|
RJ01 | Rejection of invention patent application after publication |