CN106534083A - Root tool verification method and apparatus - Google Patents

Root tool verification method and apparatus Download PDF

Info

Publication number
CN106534083A
CN106534083A CN201610930638.4A CN201610930638A CN106534083A CN 106534083 A CN106534083 A CN 106534083A CN 201610930638 A CN201610930638 A CN 201610930638A CN 106534083 A CN106534083 A CN 106534083A
Authority
CN
China
Prior art keywords
password
brush machine
terminal device
account
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610930638.4A
Other languages
Chinese (zh)
Other versions
CN106534083B (en
Inventor
张霄
史博琼
朱立元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610930638.4A priority Critical patent/CN106534083B/en
Publication of CN106534083A publication Critical patent/CN106534083A/en
Application granted granted Critical
Publication of CN106534083B publication Critical patent/CN106534083B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a root tool verification method and apparatus. The method comprises the following steps: when a root tool start triggering instruction is obtained, generating a verification value according to the root tool and the verification algorithm; sending the verification value to a server; receiving the verification value sent from a terminal device; according to the verification value and a pre-stored standard verification value, determining whether the root tool has been altered invalid or not; if the root tool is confirmed to not have been altered, sending a start instruction to the terminal device; starting the root tool upon the reception of the start instruction sent from the server. In the invention, the terminal device starts the root tool only when the start instruction is received. Compared with the mode in which a root tool is directly operated for rooting, the method and apparatus of the invention start rooting after verification. Accordingly, the root tool for rooting is such one as never been altered invalid, and the user information security can be ensured and the success rate for rooting is increased.

Description

Brush machine Tool validation method and device
Technical field
It relates to computer technology, more particularly to a kind of brush machine Tool validation method and device.
Background technology
With the development of computer technology, the use of terminal device is more and more extensive.Mistake of the user in using terminal equipment Cheng Zhong, with the increase of use time, the performance of terminal device may decline, at this point it is possible to recovered by brush machine or Lift the performance of terminal device.
In correlation technique, after user stores brush machine instrument on terminal device, directly operation brush machine instrument carries out brush machine Operation.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of brush machine Tool validation method and device.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine Tool validation method, including:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the standard school for prestoring Test value and judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, to end End equipment sends and starts indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
With reference in a first aspect, in the first possible implementation of first aspect, methods described also includes:
Obtain the account and password of user input;
The account and the password are sent to the server, so that the server is according to the account, described close Whether correctly code and the cryptographic check information that prestores judge the password, and when it is determined that the password is correct, to described Terminal device sends parameter configuration;
If receiving the parameter configuration that the server sends, institute is run according to the parameter configuration State brush machine instrument.
With reference to the first possible implementation of first aspect, in first aspect in second possible implementation In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration Password;
Methods described also includes:
Second password that the frequency that the server is received to be made an appointment with the terminal device is sent;
Correspondingly, the account and password for obtaining user input, including:
Obtain account, the first password and second password of the user input;
Correspondingly, it is described to include to the server transmission account and the password:
The account, the first password, second password are sent to the server and second password is sent Moment.
With reference to the first possible implementation of first aspect, in first aspect in the third possible implementation In, after the account and password of the receiving user's input, methods described also includes:
Key according to being made an appointment with the server is encrypted to the password, forms the password after encryption;
Correspondingly, it is described to include to the server transmission account and the password:
The password after the account and the encryption is sent to the server.
With reference to first aspect and first aspect the first possible implementation to first aspect the third is possible Any one possible implementation in implementation, in first aspect in the 4th kind of possible implementation, the school Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine Tool validation method, including:
The check value that receiving terminal apparatus send;Wherein, the check value be the terminal device according to brush machine instrument and What check algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, with The terminal device is made to start the brush machine instrument.
With reference to second aspect, in the first possible implementation of second aspect, methods described also includes:
Receive account and password that the terminal device sends;Wherein, the account and password are connect for the terminal device Receive user input;
Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring;
If it is determined that the password is correct, then parameter configuration is sent to the terminal device.
With reference to the first possible implementation of second aspect, in second aspect in second possible implementation In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration Password;
Methods described also includes:
Second password is sent with the frequency made an appointment with the terminal device to the terminal device;
Correspondingly, the receiving terminal apparatus send account and password, including:
Receive the account, the first password, second password that the terminal device sends and send described the The moment of two passwords;
Correspondingly, it is described that the password is judged according to the account, the password and the cryptographic check information for prestoring It is whether correct, including:
According to the account with prestore whether proper password corresponding with the account judges the first password Correctly;
If it is determined that the first password is correct, then according to the moment and institute that second password is sent to the terminal device The moment for stating terminal device transmission second password determines whether second password is correct;
If it is determined that second password is correct, it is determined that the password is correct;
If it is determined that the first password mistake, it is determined that the code error.
With reference to the first possible implementation of second aspect, in second aspect in the third possible implementation In, account and password that the receiving terminal apparatus send, including:
Password after receiving the account of the terminal device transmission and encrypting;Wherein, the password after the encryption is Terminal device password according to the secret key pair made an appointment with server is encrypted what is formed;
Correspondingly, it is described that the password is judged according to the account, the password and the cryptographic check information for prestoring It is whether correct, including:
The password after the encryption is decrypted according to the key, forms the password after decryption;
If it is determined that the password after the decryption is consistent with proper password corresponding with the account is prestored, it is determined that The password is correct;
If it is determined that password after the decryption is with to prestore proper password corresponding with the account inconsistent, then really The fixed code error.
With reference to second aspect and second aspect the first possible implementation to second aspect the third is possible Any one possible implementation in implementation, in second aspect in the 4th kind of possible implementation, the school Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
With reference to second aspect, in the 5th kind of possible implementation of second aspect, it is described according to the check value and The criteria check value for prestoring judge the brush machine instrument whether be illegally modified including:
If it is determined that the check value is identical with the criteria check value, it is determined that the brush machine instrument is not illegally repaiied Change;
If it is determined that the check value is differed with the criteria check value, it is determined that the brush machine instrument is illegally modified.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal device, including:
Generation module, is configured to when brush machine instrument start-up triggering command is got, according to the brush machine instrument and inspection Checking method generates check value;
First sending module, is configured to send the check value to server, so that the server is according to the school The criteria check value tested value and prestore judges whether the brush machine instrument is illegally modified, and it is determined that the brush machine instrument When not being illegally modified, send to terminal device and start indicator;
Starting module, when being configured as receiving the startup indicator of the server transmission, starts described Brush machine instrument.
With reference to the third aspect, in the first possible implementation of the third aspect, the terminal device also includes:
Acquisition module, is configured to obtain the account and password of user input;
Second sending module, is configured to send the account and the password to the server, so that the service According to the account, the password and the cryptographic check information for prestoring, device judges that the password is whether correct, and it is determined that When the password is correct, parameter configuration is sent to the terminal device;
Operation module, when being configured as receiving the parameter configuration of the server transmission, according to described Parameter configuration runs the brush machine instrument.
With reference to the first possible implementation of the third aspect, in the third aspect in second possible implementation In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration Password;
The terminal device also includes:
Receiver module, the institute that the frequency for being configured to receive the server to be made an appointment with the terminal device is sent State the second password;
Correspondingly, the acquisition module includes:
Acquisition submodule, is configured to obtain the account of the user input, the first password and second password;
Correspondingly, second sending module includes:
First sending submodule, be configured to the server send the account, the first password, described second The moment of password and transmission second password.
With reference to the first possible implementation of the third aspect, in the third aspect in the third possible implementation In, the terminal device also includes:
Encrypting module, is configured to be encrypted the password according to the key made an appointment with the server, shape Into the password after encryption;
Correspondingly, second sending module includes:
Second sending submodule, is configured to the server send the password after the account and the encryption.
With reference to the third aspect and the third aspect the first possible implementation to the third aspect the third is possible Any one possible implementation in implementation, in the third aspect in the 4th kind of possible implementation, the school Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of server, including:
First receiver module, is configured to the check value of receiving terminal apparatus transmission;Wherein, the check value is the end End equipment is generated according to brush machine instrument and check algorithm;
First judge module, is configured to judge the brush machine according to the check value and the criteria check value for prestoring Whether instrument is illegally modified;
First sending module, when being configured as determining that the brush machine instrument is not illegally modified, sets to the terminal Preparation send startup indicator, so that the terminal device starts the brush machine instrument.
With reference to fourth aspect, in the first possible implementation of fourth aspect, the server also includes:
Second receiver module, is configured to receive account and the password that the terminal device sends;Wherein, the account and Password is the terminal device receiving user's input;
Second judge module, is configured to be sentenced according to the account, the password and the cryptographic check information for prestoring Whether the password that breaks is correct;
Second sending module, when being configured as determining that the password is correct, sends parameter configuration to the terminal device Information.
With reference to the first possible implementation of fourth aspect, in fourth aspect in second possible implementation In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration Password;
The server also includes:
3rd sending module, is configured to the terminal device send with the frequency made an appointment with the terminal device Second password;
Correspondingly, second receiver module, including:
First receiving submodule, is configured to receive the account of the terminal device transmission, the first password, institute State the second password and send the moment of second password;
Correspondingly, second judge module includes:
First judging submodule, be configured to according to the account with prestore it is corresponding with the account correct close Code judges whether the first password is correct;When it is determined that the first password is correct, institute is sent according to the terminal device The moment at the moment and terminal device transmission second password of stating the second password determines whether second password is correct; When it is determined that second password is correct, determine that the password is correct;When it is determined that during the first password mistake, determining described close Code mistake.
With reference to the first possible implementation of fourth aspect, in fourth aspect in the third possible implementation In, second receiver module includes:
Second receiving submodule, is configured to receive the account of the terminal device transmission and the password after encryption; Wherein, the password after the encryption is that terminal device password according to the secret key pair made an appointment with server carries out adding Close formation;
Correspondingly, second judge module includes:
Decryption submodule, is configured to be decrypted the password after the encryption according to the key, after forming decryption Password;
Second judging submodule, the password after being configured as determining the decryption with prestore and the account pair When the proper password answered is consistent, determine that the password is correct;When it is determined that password after the decryption with prestore with it is described When the corresponding proper password of account is inconsistent, the code error is determined.
With reference to fourth aspect and fourth aspect the first possible implementation to second aspect the third is possible Any one possible implementation in implementation, in fourth aspect in the 4th kind of possible implementation, the school Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
With reference to fourth aspect, in the 5th kind of possible implementation of fourth aspect, first judge module includes:
3rd judging submodule, when being configured as determining that the check value is identical with the criteria check value, determines institute State brush machine instrument not to be illegally modified;When it is determined that the check value is differed with the criteria check value, the brush is determined Machine instrument is illegally modified.
In terms of the 5th of the embodiment of the present disclosure, there is provided a kind of terminal device, including:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the standard school for prestoring Test value and judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, to end End equipment sends and starts indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
In terms of the 6th of the embodiment of the present disclosure, there is provided a kind of server, including:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
The check value that receiving terminal apparatus send;Wherein, the check value be the terminal device according to brush machine instrument and What check algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, with The terminal device is made to start the brush machine instrument.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
In one embodiment, by when brush machine instrument start-up triggering command is got, being calculated according to brush machine instrument and inspection Method generates check value, sends check value to server, and the check value that receiving terminal apparatus send according to check value and is prestored Criteria check value judge whether brush machine instrument is illegally modified, however, it is determined that brush machine instrument is not illegally modified, then to terminal Equipment sends and starts indicator, if receiving the startup indicator of server transmission, starts brush machine instrument, realizes end End equipment sends the check value generated according to brush machine instrument and checking algorithm, clothes before brush machine instrument is started, first to server Business device is verified after the check value is received, and after verification passes through sends startup indicator, terminal to terminal device Equipment starts brush machine instrument only after the startup indicator is received, carries out brush machine operation, compared to correlation technique In, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can carry out brush machine operation in brush machine instrument Before verified, it is therefore prevented that the brush machine instrument being illegally modified is run on the terminal device, so as to realizing carries out brush machine operation Brush machine instrument be all the brush machine instrument not being illegally modified, protect the information security of user and improve brush machine success Rate.
In another embodiment, by the account and password that obtain user input, account and password are sent to server, connect Account and password that terminal device sends are received, whether password is judged according to account, password and the cryptographic check information for prestoring Correctly, however, it is determined that password is correct, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission Information, then run brush machine instrument according to parameter configuration, realizes and can verify user input according to the account of user input Password, and after being verified, send the parameter configuration of brush machine instrument to terminal device, terminal device is matched somebody with somebody according to parameter Confidence breath operation brush machine instrument, can verify the legitimacy of brush machine account, and, brush machine instrument is transported according to parameter configuration OK, so as to further protecting the information security of user and improve brush machine success rate.
In another embodiment, by second password being sent with the frequency made an appointment with terminal device to terminal device, The second password that the reception server is sent with the frequency made an appointment with terminal device, obtains the account of user input, first close Code and the second password, send account, first password, the second password to server and send the moment of the second password, receiving terminal The account of equipment transmission, first password, the moment of the second password of the second password and transmission, according to account and prestore and account Number corresponding proper password judges whether first password is correct, however, it is determined that first password is correct, then according to sending to terminal device The moment of the moment of the second password and terminal device the second password of transmission determines whether the second password is correct, however, it is determined that the second password Correctly, it is determined that password is correct, however, it is determined that first password mistake, it is determined that code error, however, it is determined that password is correct, then to terminal Equipment sends parameter configuration, if receiving the parameter configuration of server transmission, is run according to parameter configuration Brush machine instrument, realizes when the legitimacy of brush machine account is verified, employs the mode of checking first password and the second password, from And, further protect the information security of user and improve brush machine success rate.
In another embodiment, by after the account and password for obtaining user input, according to making an appointment with server Key password is encrypted, formed encryption after password, to server send account and encryption after password, receiving terminal Password after the account of equipment transmission and encryption, is decrypted according to the password after key pair encryption, forms the password after decryption, If it is determined that the password after decryption is consistent with proper password corresponding with account is prestored, it is determined that password is correct, however, it is determined that Password after decryption is with to prestore proper password corresponding with account inconsistent, it is determined that code error, however, it is determined that password Correctly, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission, according to parameter Configuration information runs brush machine instrument, realizes when the legitimacy of brush machine account is verified, employing carries out adding with key to password Close form is verified, so as to further protecting the information security of user and improve brush machine success rate.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in specification and the part of this specification is constituted, show the enforcement for meeting the disclosure Example, and be used for explaining the principle of the disclosure together with specification.
Fig. 1 is a kind of flow chart of the brush machine Tool validation method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the brush machine Tool validation method for implementing to exemplify according to another exemplary;
Fig. 3 is a kind of flow chart of the brush machine Tool validation method according to further example embodiment;
Fig. 4 is a kind of flow chart of the brush machine Tool validation method according to another exemplary embodiment;
Fig. 5 is a kind of block diagram of the terminal device according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary;
Fig. 7 is a kind of block diagram of the terminal device according to further example embodiment;
Fig. 8 is a kind of block diagram of the terminal device according to another exemplary embodiment;
Fig. 9 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary;
Figure 10 is a kind of block diagram of the server according to an exemplary embodiment;
Figure 11 is a kind of block diagram of the server for implementing to exemplify according to another exemplary;
Figure 12 is a kind of block diagram of the server according to further example embodiment;
Figure 13 is a kind of block diagram of the server according to another exemplary embodiment;
Figure 14 is a kind of block diagram of the server for implementing to exemplify according to another exemplary;
Figure 15 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment;
Figure 16 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings It is not intended to the scope of disclosure design is limited by any mode with word description, but by reference to specific embodiment is Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
First the noun involved by the embodiment of the present disclosure is explained:
Brush machine:Software upgrading, operating system update are carried out to terminal device, operating system patch or also original initial is improved The operation of operating system etc..
Brush machine instrument:Complete the code of brush machine function.
Fig. 1 is a kind of flow chart of the brush machine Tool validation method according to an exemplary embodiment.As shown in figure 1, The brush machine Tool validation method that the embodiment of the present disclosure is provided is comprised the following steps:
In a step 101, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm Check value.
This step can be performed by terminal device.Terminal device in the embodiment of the present disclosure can be handheld device, vehicle-mounted Equipment, wearable device, computing device, and various forms of user equipmenies (User Equipment;Referred to as:UE), it is mobile Platform (Mobile Station;Referred to as:) and terminal (terminal) etc. MS.
User can in advance in terminal device store brush machine instrument.The brush machine instrument can be obtained from server , or obtain from other control systems.Optionally, the brush machine instrument can be a software kit.
Brush machine instrument start-up triggering command can be triggered by user, or by server triggers.If this opens Dynamic triggering command be user triggering, then can be user when there is the demand of brush machine, by display screen or button etc. be input into The instruction of equipment input;If the enabled instruction is server triggers, can be that server passes through network with the default cycle To the instruction that terminal device sends.The predetermined period can be the cycle of server and terminal device agreement, for example, during half a year Between.
Terminal device can generate check value according to brush machine instrument and checking algorithm when startup triggering command is got. Optionally, can be that security control component in brush machine instrument generates check value according to brush machine instrument and checking algorithm.
In a kind of possible implementation, the checking algorithm can be hash algorithm.Brush machine instrument can be entered with two The form of sequence processed is stored in terminal device, and binary sequence is mapped as check value according to hash algorithm by terminal device.Should Check value can also be binary sequence.When using Secure Hash Algorithm (Secure Hash Algorithm), the check value Can be SHA1 values;When using Message-Digest Algorithm 5 (Message-Digest Algorithm 5;Referred to as:MD5), the verification Value can be MD5 values.Optionally, in order to improve efficiency, can be according to the executable file and checking algorithm in brush machine instrument Generate check value.
Certainly, the checking algorithm can be other checking algorithms, and the embodiment of the present disclosure is without limitation.
In a step 102, check value is sent to server.
The check value is sent to server after check value is generated by terminal device so that server according to check value and The criteria check value for prestoring judges whether brush machine instrument is illegally modified, and it is determined that brush machine instrument is not illegally modified When, send to terminal device and start indicator.
Terminal device can send check value to server by mobile communications network.
In step 103, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
At step 104, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring Change.
Criteria check value is previously stored with server.The criteria check value can be brush machine work of the server according to standard What tool and checking algorithm were generated.The brush machine instrument of standard here is stored in the brush machine instrument on server.Optionally, standard Check value can server generated according to the brush machine instrument and hash algorithm of standard.
If it is determined that check value is identical with criteria check value, it is determined that brush machine instrument is not illegally modified;If it is determined that verification Value is differed with criteria check value, it is determined that brush machine instrument is illegally modified.When check value is identical with criteria check value, explanation The brush machine instrument is identical with standard brush machine instrument, is not changed by the not people with modification authority.Check value with When criteria check value is differed, illustrate that the brush machine instrument is different with standard brush machine instrument, the brush machine instrument is not had The people of modification authority is modified.
In step 105, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to Order.
When server determines that the brush machine instrument is not illegally modified, send to terminal device and start indicator, with Terminal device is made to start brush machine instrument.
In step 106, if receiving the startup indicator of server transmission, start brush machine instrument.
If terminal device starts the brush machine instrument, to carry out after the startup indicator for receiving server transmission Brush machine is operated.
It should be noted that in a kind of implementation, server if it is determined that brush machine instrument is illegally modified, then to terminal Equipment sends to be forbidden enlightening indicator.Terminal device is receiving when forbidding enlightening indicator of server transmission, forbids Start brush machine instrument.In another kind of implementation, network between terminal device and server disconnect or network performance compared with During difference, check value cannot be successfully sent to server, then terminal device is not received by server feedback in default duration Instruction when, the No starting brush machine instrument.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by getting brush machine instrument start-up triggering command When, check value is generated according to brush machine instrument and check algorithm, check value, the verification that receiving terminal apparatus send is sent to server According to check value and the criteria check value for prestoring, value, judges whether brush machine instrument is illegally modified, however, it is determined that brush machine instrument It is not illegally modified, then sends to terminal device and start indicator, if receiving the startup indicator of server transmission, Then start brush machine instrument, realized terminal device before brush machine instrument is started, first send according to brush machine instrument to server and The check value that checking algorithm is generated, server is verified after the check value is received, and is set to terminal after verification passes through Preparation send startup indicator, and terminal device starts brush machine instrument only after the startup indicator is received, carries out Brush machine is operated, compared to correlation technique in, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can be with Verified before brush machine instrument carries out brush machine operation, it is therefore prevented that the brush machine instrument being illegally modified is run on the terminal device, So as to it is all the brush machine instrument not being illegally modified to realize and carry out the brush machine instrument of brush machine operation, protects the letter of user Cease safety and improve brush machine success rate.
Fig. 2 is a kind of flow chart of the brush machine Tool validation method for implementing to exemplify according to another exemplary.Disclosure reality Apply example offer brush machine Tool validation method, on the basis of embodiment illustrated in fig. 1, to start brush machine instrument after the step of make One describes in detail.As shown in Fig. 2 the brush machine Tool validation method that the embodiment of the present disclosure is provided comprises the steps:
In step 201, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm Check value.
In step 202., check value is sent to server.
The purpose of step 202 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 203, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 204, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring Change.
In step 205, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to Order.
The purpose of step 205 starts brush machine instrument to make terminal device.
In step 206, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 201- step 206 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein State.
In step 207, the account and password of user input are obtained.
After brush machine instrument is started, in order to further ensure that the security and success rate of brush machine, user input account is needed And password.Brush machine instrument can show user interface upon actuation, to point out user input account and password.
Optionally, in order to ensure the security of password, after the account and password of user input is got, can adopt and add Close algorithm carries out being encrypted password, forms ciphertext.
In a step 208, account and password are sent to server.
The purpose of step 208 is to make server judge password according to account, password and the cryptographic check information for prestoring It is whether correct, and when it is determined that password is correct, parameter configuration is sent to terminal device.
In step 209, receiving terminal apparatus send account and password.
Wherein, account and password are terminal device receiving user's input.
In step 210, judge whether password is correct according to account, password and the cryptographic check information for prestoring.
Optionally, if in step 207 terminal device send be ciphertext password, in a step 208, server need First ciphertext password is decrypted using decipherment algorithm.
Here cryptographic check information can be the mapping relations between account and proper password.It is stored with not in server Mapping relations between same account and proper password.After account and password is received, can determine and be somebody's turn to do according to account The corresponding proper password of account.If the password for receiving is identical with the proper password, judge that password is correct;If what is received is close Code is differed with the proper password, then judge code error.
Here the password, or server that password is arranged when can be user's registration brush machine instrument is sent to terminal The dynamic password of equipment, can also be the combination of the password and dynamic password arranged during registration brush machine instrument.If password is to use The password arranged during the registration brush machine instrument of family, the then password that the user of server storage is arranged when proper password is user's registration. If password is dynamic password, proper password is the password that server is sent to terminal device.If password is above two The combination of password, then proper password is also the combination of above two proper password.The embodiment of the present disclosure is without limitation.
In step 211, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
Parameter configuration can be that server is allocated to the brush machine instrument according to the account of user input.The parameter is matched somebody with somebody Confidence breath can be same day brush machine number of times, can download version species and can be to associating terminal device perform internal finger The authority informations such as order.
In the step 212, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation Machine instrument.
Terminal device runs brush machine work according to the design parameter in parameter configuration after parameter configuration is received Tool.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by the account and password that obtain user input, to clothes Business device sends account and password, account and password that receiving terminal apparatus send, according to account, password and the password for prestoring Check information judges whether password is correct, however, it is determined that password is correct, then send parameter configuration to terminal device, if receiving The parameter configuration that server sends, then run brush machine instrument according to parameter configuration, and realizing can be defeated according to user The account for entering verifies the password of user input, and after being verified, sends the parameter configuration letter of brush machine instrument to terminal device Breath, terminal device run brush machine instrument according to parameter configuration, can verify the legitimacy of brush machine account, and, make brush machine Instrument is run according to parameter configuration, so as to further protecting the information security of user and improve brush machine success rate.
Fig. 3 is a kind of flow chart of the brush machine Tool validation method according to further example embodiment.Disclosure reality Example is applied in the technology of embodiment illustrated in fig. 2, a detailed description is made to the concrete form of password.In the disclosed embodiments, it is close Code includes:First password and the second password.The password that first password is arranged when being user's registration brush machine instrument.As shown in figure 3, this The brush machine Tool validation method that open embodiment is provided is comprised the following steps:
In step 301, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm Check value.
In step 302, check value is sent to server.
The purpose of step 302 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 303, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 304, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring Change.
In step 305, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to Order.
The purpose of step 305 starts brush machine instrument to make terminal device.
Within step 306, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 301- step 306 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein State.
In step 307, the second password is sent with the frequency made an appointment with terminal device to terminal device.
In the embodiment of the present disclosure, the mode of checking first password and the second password when the account of user is verified, is employed. The password that first password is arranged when being for registering brush machine instrument.Second password be server to terminal device send it is dynamic close Code.
Server can be set to terminal after the default time period after startup indicator is have sent to server The standby frequency to make an appointment with terminal device sends the second password.For example, the frequency of the agreement can be 1/300, i.e. service Device sent second password to terminal device at interval of 300 seconds.The second password for sending every time is different sequences, i.e. second is close Code is dynamic change.
It should be noted that before step 307, server and terminal device need to carry out clock alignment operation.
In step 308, the second password that the reception server is sent with the frequency made an appointment with terminal device.
In a step 309, account, first password and second password of user input are obtained.
After terminal device receives the second password, user can know second password, and by account, first password and The the second Password Input terminal device for learning.
In the step 310, account, first password, the second password are sent to server and sends the moment of the second password.
Terminal device can send the moment that terminal device sends the second password to server in the form of timestamp.
In step 311, receiving terminal apparatus send account, first password, the second password and send second password Moment.
In step 312, according to account with prestore whether proper password corresponding with account judges first password Correctly.
Similar with step 210, server can determine proper password corresponding with the account according to account.Work as first password When identical with proper password, determine that first password is correct;When first password is differed with proper password, determine that first password is wrong By mistake.
In step 313, however, it is determined that first password is correct, then according to the moment and end that the second password is sent to terminal device The moment of end equipment the second password of transmission determines whether the second password is correct.
Only under the premise of first password is correct, server just judges whether the second password is correct.
In deterministic process, server can according to its to terminal device send the second password moment and terminal device to Its moment for sending the second password determines whether the second password is correct.If server sends the moment of the second password to terminal device With terminal device to server send the second password moment difference in default scope, and the second password be server to The password that terminal device sends, i.e. the second password belong to the dynamic password storehouse of server, it is determined that the second password is correct.
In a step 314, however, it is determined that the second password is correct, it is determined that password is correct.
When it is determined that the second password is correct, it is determined that the password being made up of first password and the second password is correct.
In step 315, however, it is determined that first password mistake, it is determined that code error.
It is determined that during first password mistake, it is possible to it is determined that the code error being made up of first password and the second password.
In step 316, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
In step 317, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation Machine instrument.
With step 211, step 316 realizes that process and know-why are similar, step 317 and step 212 realize process and Know-why is similar to, and here is omitted.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by terminal device making an appointment with terminal device Frequency send the second password, the second password that the reception server is sent with the frequency made an appointment with terminal device is obtained and is used Account, first password and the second password that family is input into, send account, first password, the second password to server and send second The moment of password, the account of receiving terminal apparatus transmission, first password, the moment of the second password of the second password and transmission, according to With proper password corresponding with account is prestored, account judges whether first password is correct, however, it is determined that first password is correct, The moment for then sending the second password according to the moment and terminal device that the second password is sent to terminal device determines that the second password is It is no correct, however, it is determined that the second password is correct, it is determined that password is correct, however, it is determined that first password mistake, it is determined that code error, if Determine that password is correct, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission, Brush machine instrument is run according to parameter configuration, is realized when the legitimacy of brush machine account is verified, employ checking first close The mode of code and the second password, so as to further protecting the information security of user and improve brush machine success rate.
Fig. 4 is a kind of flow chart of the brush machine Tool validation method according to another exemplary embodiment.Disclosure reality Example is applied in the technology of embodiment illustrated in fig. 2, a detailed description is made to the concrete form of password.As shown in figure 4, the disclosure is implemented The brush machine Tool validation method that example is provided comprises the steps:
In step 401, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm Check value.
In step 402, check value is sent to server.
The purpose of step 402 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 403, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 404, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring Change.
In step 405, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to Order.
The purpose of step 405 starts brush machine instrument to make terminal device.
In a step 406, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 401- step 406 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein State.
In step 407, the account and password of user input are obtained.
In a step 408, password is encrypted according to the key made an appointment with server, forms close after encryption Code.
Terminal device can be encrypted according to the secret key pair password made an appointment after account and password is got.
In step 409, the password after sending account and encryption to server.
In step 410, receiving terminal apparatus send account and encryption after password.
Wherein, the password after encryption is encrypted shape according to the secret key pair password made an appointment with server for terminal device Into.
In step 411, it is decrypted according to the password after key pair encryption, forms the password after decryption.
After password of the server after account and encryption is received, it is decrypted according to the password after secret key pair encryption, really Password after fixed decryption.
In step 412, however, it is determined that the password after decryption is consistent with proper password corresponding with account is prestored, then Determine that password is correct.
In step 413, however, it is determined that the password after decryption with to prestore proper password corresponding with account inconsistent, Then determine code error.
In step 412 and step 413, server can determine proper password corresponding with the account according to account, It is determined that decryption after password after, it is determined that decryption after password it is whether consistent with proper password.If consistent, it is determined that password is correct; If inconsistent, it is determined that code error.
In step 414, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
In step 415, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation Machine instrument.
With step 211, step 414 realizes that process and know-why are similar, step 415 and step 212 realize process and Know-why is similar to, and here is omitted.
The embodiment of the present disclosure provide brush machine Tool validation method, by obtain user input account and password after, Key according to being made an appointment with server is encrypted to password, formed encryption after password, to server send account and Password after password after encryption, the account that receiving terminal apparatus send and encryption, is carried out according to the password after key pair encryption Decryption, forms the password after decryption, however, it is determined that the password after decryption is consistent with proper password corresponding with account is prestored, Then determine that password is correct, however, it is determined that the password after decryption with to prestore proper password corresponding with account inconsistent, then really Determine code error, however, it is determined that password is correct, then parameter configuration is sent to terminal device, if receiving the ginseng of server transmission Number configuration information, then run brush machine instrument according to parameter configuration, realizes when the legitimacy of brush machine account is verified, adopts Password is verified in the form of key is encrypted, so as to further protecting the information security of user and improve Brush machine success rate.
It is following for disclosure device embodiment, can be used for performing method of disclosure embodiment.For disclosure device reality The details not disclosed in applying example, refer to method of disclosure embodiment.
Fig. 5 is a kind of block diagram of the terminal device according to an exemplary embodiment.As shown in figure 5, the disclosure is implemented The terminal device that example is provided includes:Generation module 51, the first sending module 52 and starting module 53.
Generation module 51, is configured to when brush machine instrument start-up triggering command is got, according to brush machine instrument and inspection Algorithm generates check value.
Optionally, checking algorithm is hash algorithm, and check value is SHA1 values or MD5 values.
First sending module 52, is configured to send check value to server, so that server is according to check value and in advance The criteria check value of storage judges whether brush machine instrument is illegally modified, and when it is determined that brush machine instrument is not illegally modified, Send to terminal device and start indicator.
Starting module 53, when being configured as receiving the startup indicator of server transmission, starts brush machine instrument.
The terminal device that the embodiment of the present disclosure is provided, by arranging generation module, is configured to getting brush machine instrument When starting triggering command, check value is generated according to brush machine instrument and check algorithm, the first sending module is configured to server Check value is sent, so that according to check value and the criteria check value for prestoring, server judges whether brush machine instrument is illegally repaiied Change, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator, starting module is matched somebody with somebody It is set to when the startup indicator of server transmission is received, starts brush machine instrument, realizes terminal device and starting brush machine Before instrument, the check value generated according to brush machine instrument and checking algorithm is first sent to server, server is receiving the school After testing value, being verified, and startup indicator being sent to terminal device after verification passes through, terminal device is only being received After the startup indicator, just start brush machine instrument, carry out brush machine operation, compared to correlation technique in, directly operation brush machine Instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can be verified before brush machine instrument carries out brush machine operation, be prevented The brush machine instrument being illegally modified is run on the terminal device, so as to realizing carries out the brush machine instrument of brush machine operation and be all The brush machine instrument not being illegally modified, protects the information security of user and improves brush machine success rate.
Fig. 6 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary.As shown in fig. 6, disclosure reality The terminal device of example offer is applied on the basis of embodiment illustrated in fig. 5, is further included:Acquisition module 61, the second sending module 62 and operation module 63.
Acquisition module 61, is configured to obtain the account and password of user input.
Second sending module 62, is configured to send account and password to server, so that server is according to account, password And the cryptographic check information for prestoring judges whether password is correct, and when it is determined that password is correct, sends to terminal device and join Number configuration information.
Operation module 63, when being configured as receiving the parameter configuration of server transmission, believes according to parameter configuration Breath operation brush machine instrument.
The terminal device that the embodiment of the present disclosure is provided, by arranging acquisition module, is configured to obtain the account of user input Number and password, the second sending module, be configured to send account and password to server, so that server is according to account, password And the cryptographic check information for prestoring judges whether password is correct, and when it is determined that password is correct, sends to terminal device and join Number configuration information, runs module, when being configured as receiving the parameter configuration of server transmission, is believed according to parameter configuration Breath operation brush machine instrument, realizes the password that the account of user input can be verified user input, and being sent to server is carried out Checking, and after being verified, the parameter configuration that the service of reception sends runs brush machine instrument according to parameter configuration, The legitimacy of brush machine account can be verified, and, brush machine instrument is run according to parameter configuration, so as to further protect The information security of user and improve brush machine success rate.
Fig. 7 is a kind of block diagram of the terminal device according to further example embodiment.As shown in fig. 7, disclosure reality The terminal device of example offer is applied on the basis of embodiment illustrated in fig. 6, password includes:First password and the second password, first is close The password that code is arranged when being user's registration brush machine instrument.Terminal device also includes receiver module 71, and, acquisition module 61 includes Acquisition submodule 611, the second sending module 62 include the first sending submodule 621.
Receiver module 71, the second of the frequency transmission for being configured to the reception server to make an appointment with terminal device are close Code.
Acquisition submodule 611, is configured to obtain account, first password and second password of user input.
First sending submodule 621, is configured to send account, first password, the second password to server and sends the The moment of two passwords.
The embodiment of the present disclosure provide terminal device, by arrange receiver module, be configured to the reception server with end The second password that the frequency that end equipment is made an appointment sends, acquisition module include acquisition submodule, are configured to acquisition user defeated Account, first password and the second password for entering, the second sending module include the first sending submodule, are configured to server send out Send account, first password, the second password and send the moment of the second password, realize when the legitimacy of brush machine account is verified, The mode of checking first password and the second password is employed, so as to further protecting the information security of user and improve brush Machine success rate.
Fig. 8 is a kind of block diagram of the terminal device according to another exemplary embodiment.As shown in figure 8, disclosure reality Example is applied on the basis of embodiment illustrated in fig. 6, terminal device also includes encrypting module 81, and, the second sending module 62 includes Second sending submodule 622.
Encrypting module 81, is configured to be encrypted password according to the key made an appointment with server, forms encryption Password afterwards.
Second sending submodule 622, is configured to the password after sending account and encryption to server.
The terminal device that the embodiment of the present disclosure is provided, by arranging encrypting module, is configured to according to advance with server The key of agreement is encrypted to password, forms the password after encryption, and the second sending module includes the second sending submodule, matched somebody with somebody The password being set to after sending account and encryption to server, realizes when the legitimacy of brush machine account is verified, employs to close Code verified in the form of key is encrypted, so as to, further protect user information security and improve brush machine into Power.
The foregoing describe the built-in function and structure of terminal device.Fig. 9 is exemplified according to another exemplary enforcement Plant the block diagram of terminal device.As shown in figure 9, the terminal device includes:
Processor 91;
For storing the memory 92 of 91 executable instruction of processor;
Wherein, processor 91 is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to brush machine instrument and check algorithm;To clothes Business device sends check value, so that according to check value and the criteria check value for prestoring, server judges whether brush machine instrument is non- Method is changed, and when it is determined that brush machine instrument is not illegally modified, is sent to terminal device and started indicator;If receiving clothes The startup indicator that business device sends, then start brush machine instrument.
Figure 10 is a kind of block diagram of the server according to an exemplary embodiment.As shown in Figure 10, the disclosure is implemented The server that example is provided includes:First receiver module 111, the first judge module 112 and the first sending module 113.
First receiver module 111, is configured to the check value of receiving terminal apparatus transmission.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
Optionally, checking algorithm is hash algorithm, and check value is SHA1 values or MD5 values.
First judge module 112, is configured to judge brush machine instrument according to check value and the criteria check value for prestoring Whether it is illegally modified.
Optionally, the first judge module 112 includes:3rd judging submodule, is configured as determining check value and standard When check value is identical, determine that brush machine instrument is not illegally modified;When it is determined that check value is differed with criteria check value, it is determined that Brush machine instrument is illegally modified.
First sending module 113, when being configured as determining that brush machine instrument is not illegally modified, sends to terminal device Start indicator, so that terminal device starts brush machine instrument.
The server that the embodiment of the present disclosure is provided, by arranging the first receiver module, is configured to receiving terminal apparatus and sends out The check value for sending;Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm, the first judge module, quilt It is configured to judge whether brush machine instrument is illegally modified according to check value and the criteria check value for prestoring, first sends mould Block, when being configured as determining that brush machine instrument is not illegally modified, sends to terminal device and starts indicator, so that terminal Equipment starts brush machine instrument, realized terminal device before brush machine instrument is started, first sends according to brush machine instrument to server The check value generated with checking algorithm, server are verified after the check value is received, and to terminal after verification passes through Equipment sends and starts indicator, and terminal device starts brush machine instrument only after the startup indicator is received, enters Row brush machine is operated, compared to correlation technique in, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can To be verified before brush machine instrument carries out brush machine operation, it is therefore prevented that the brush machine instrument being illegally modified is transported on the terminal device OK, so as to it is all the brush machine instrument not being illegally modified to realize and carry out the brush machine instrument of brush machine operation, protects user's Information security and improve brush machine success rate.
Figure 11 is a kind of block diagram of the server for implementing to exemplify according to another exemplary.As shown in figure 11, disclosure reality The server of example offer is applied on the basis of embodiment illustrated in fig. 10, also including the second receiver module 114, the second judge module 115 and second sending module 116.
Second receiver module 114, is configured to the account and password of receiving terminal apparatus transmission;Wherein, account and password For terminal device receiving user's input.
Second judge module 115, is configured to judge password according to account, password and the cryptographic check information for prestoring It is whether correct.
Second sending module 116, when being configured as determining that password is correct, sends parameter configuration to terminal device.
The server that the embodiment of the present disclosure is provided, by arranging the second receiver module, is configured to receiving terminal apparatus and sends out The account sent and password;Wherein, account and password are terminal device receiving user's input, and the second judge module is configured to Judge whether password is correct, and the second sending module is configured as according to account, password and the cryptographic check information for prestoring When determining that password is correct, parameter configuration is sent to terminal device, realize and can be used according to the checking of the account of user input The password of family input, and after being verified, sends the parameter configuration of brush machine instrument to terminal device, terminal device according to Parameter configuration runs brush machine instrument, can verify the legitimacy of brush machine account, and, brush machine instrument is made according to parameter configuration Information is run, so as to further protecting the information security of user and improve brush machine success rate.
Figure 12 is a kind of block diagram of the server according to further example embodiment.As shown in figure 12, disclosure reality The server of example offer is applied on the basis of embodiment illustrated in fig. 11, password includes:First password and the second password, first password For user's registration brush machine instrument when the password that arranges.Server also includes the 3rd sending module 121, and, the second receiver module 114 include the first receiving submodule 1141, and the second judge module 115 includes the first judging submodule 1151.
3rd sending module 121, is configured to send second with the frequency made an appointment with terminal device to terminal device Password.
First receiving submodule 1141, be configured to receiving terminal apparatus transmission account, first password, the second password and Send the moment of the second password.
First judging submodule 1151, is configured to be sentenced with proper password corresponding with account is prestored according to account Whether disconnected first password is correct;When it is determined that first password is correct, according to moment and end that the second password is sent to terminal device The moment of end equipment the second password of transmission determines whether the second password is correct;When it is determined that the second password is correct, determine password just Really;When it is determined that during first password mistake, determining code error.
The embodiment of the present disclosure provide server, by arrange the 3rd sending module, be configured to terminal device with The frequency that terminal device is made an appointment sends the second password, and the second receiver module includes the first receiving submodule, is configured to connect Account, first password, the second password that terminal device sends and the moment for sending the second password are received, the second judge module includes the One judging submodule, be configured to according to account with prestore whether proper password corresponding with account judges first password Correctly;When it is determined that first password is correct, second is sent according to moment and terminal device that the second password is sent to terminal device The moment of password determines whether the second password is correct;When it is determined that the second password is correct, determine that password is correct;When it is determined that first is close During code mistake, code error is determined, realized when the legitimacy of brush machine account is verified, employ checking first password and second The mode of password, so as to further protecting the information security of user and improve brush machine success rate.
Figure 13 is a kind of block diagram of the server according to another exemplary embodiment.As shown in figure 13, disclosure reality The server of example offer is applied on the basis of embodiment illustrated in fig. 11, the second receiver module 114 includes the second receiving submodule 1142, the second judge module 115 includes decrypting submodule 1152 and the second judging submodule 1153.
Second receiving submodule 1142, the password after being configured to the account of receiving terminal apparatus transmission and encrypting.
Wherein, the password after encryption is encrypted shape according to the secret key pair password made an appointment with server for terminal device Into.
Decryption submodule 1152, the password after being configured to according to key pair encryption are decrypted, and form close after decryption Code.
Second judging submodule 1153, be configured as determine decryption after password with prestore it is corresponding with account When proper password is consistent, determine that password is correct;When it is determined that password after decryption with prestore it is corresponding with account correct close When code is inconsistent, code error is determined.
The server that the embodiment of the present disclosure is provided, by arranging the second receiving submodule, is configured to receiving terminal apparatus Password after the account of transmission and encryption, wherein, the password after encryption is terminal device according to secret with what server was made an appointment Key is encrypted what is formed to password, decrypts submodule, and the password after being configured to according to key pair encryption is decrypted, and is formed Password after decryption, the second judging submodule, be configured as determine decryption after password with prestore it is corresponding with account Proper password it is consistent when, determine that password is correct;When it is determined that password after decryption with prestore it is corresponding with account correct When password is inconsistent, code error is determined, realize when the legitimacy of brush machine account is verified, employ and password is entered with key The form of row encryption is verified, so as to further protecting the information security of user and improve brush machine success rate.
The foregoing describe the built-in function and structure of terminal device.Figure 14 is exemplified according to another exemplary enforcement Plant the block diagram of server.As shown in figure 14, the server that the embodiment of the present disclosure is provided includes:
Processor 141;
For storing the memory 142 of 141 executable instruction of processor;
Wherein, processor 141 is configured to:
The check value that receiving terminal apparatus send;Wherein, check value is terminal device according to brush machine instrument and check algorithm Generate;Judge whether brush machine instrument is illegally modified according to check value and the criteria check value for prestoring;If it is determined that brush machine Instrument is not illegally modified, then send to terminal device and start indicator, so that terminal device starts brush machine instrument.
Figure 15 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.For example, device 800 Can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, Body-building equipment, personal digital assistant etc..
With reference to Figure 15, device 800 can include following one or more assemblies:Process assembly 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong Letter component 816.
The integrated operation of 802 usual control device 800 of process assembly, such as with display, call, data communication, phase Machine operates and records the associated operation of operation.Process assembly 802 can refer to perform including one or more processors 820 Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more modules, just Interaction between process assembly 802 and other assemblies.For example, process assembly 802 can include multi-media module, many to facilitate Interaction between media component 808 and process assembly 802.
Memory 804 is configured to store various types of data to support the operation in device 800.These data are shown Example includes the instruction of any application program or method for operating on device 800, and contact data, telephone book data disappear Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and the touch or slide related duration and pressure.In certain embodiments, many matchmakers Body component 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 be in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and Post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, for interface is provided between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, and the state for various aspects are provided for device 800 is commented Estimate.For example, sensor cluster 814 can detect the opening/closed mode of device 800, and the relative positioning of component is for example described Display and keypad of the component for device 800, sensor cluster 814 can be with 800 1 components of detection means 800 or device Position change, user is presence or absence of with what device 800 was contacted, 800 orientation of device or acceleration/deceleration and device 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect when not having any physical contact The presence of object nearby.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement In example, communication component 816 receives the broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example Such as, NFC module can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete said method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
Figure 16 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.For example, brush machine work Tool checking device 1900 may be provided in a server.With reference to Figure 16, device 1900 includes process assembly 1922, and which is further Including one or more processors, and the memory resource by representated by memory 1932, can be by process assembly for storage The instruction of 1922 execution, such as application program.The application program stored in memory 1932 can including one or one with On each corresponding to one group of instruction module.Additionally, process assembly 1922 is configured to execute instruction, to perform above-mentioned net Page front end adjustment method.
Device 1900 can also include that power supply module 1926 be configured to the power management of performs device 1900, one Wired or wireless network interface 1950 is configured to for device 1900 to be connected to network, and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is filled by brush machine Tool validation During the computing device put so that brush machine Tool validation device is able to carry out above-mentioned brush machine Tool validation method.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is filled by brush machine Tool validation During the computing device put so that brush machine Tool validation device is able to carry out above-mentioned brush machine Tool validation method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claims are pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appending claims System.

Claims (24)

1. a kind of brush machine Tool validation method, it is characterised in that include:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the criteria check value for prestoring Judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, set to terminal Preparation send startup indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
2. method according to claim 1, it is characterised in that methods described also includes:
Obtain the account and password of user input;
The account and the password are sent to the server so that the server according to the account, the password and The cryptographic check information for prestoring judges whether the password is correct, and when it is determined that the password is correct, to the terminal Equipment sends parameter configuration;
If receiving the parameter configuration that the server sends, the brush is run according to the parameter configuration Machine instrument.
3. method according to claim 2, it is characterised in that the password includes:First password and the second password;It is described First password is the password arranged during brush machine instrument described in user's registration;
Methods described also includes:
Second password that the frequency that the server is received to be made an appointment with the terminal device is sent;
Correspondingly, the account and password for obtaining user input, including:
Obtain account, the first password and second password of the user input;
Correspondingly, it is described to include to the server transmission account and the password:
The account, the first password, second password are sent to the server and send second password when Carve.
4. method according to claim 2, it is characterised in that after the account and password of the receiving user's input, institute Stating method also includes:
Key according to being made an appointment with the server is encrypted to the password, forms the password after encryption;
Correspondingly, it is described to include to the server transmission account and the password:
The password after the account and the encryption is sent to the server.
5. the method according to any one of claim 1-4, it is characterised in that the checking algorithm is hash algorithm, described Check value is SHA1 values or MD5 values.
6. a kind of brush machine Tool validation method, it is characterised in that include:
The check value that receiving terminal apparatus send;Wherein, the check value is the terminal device according to brush machine instrument and inspection What algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, so that institute State terminal device and start the brush machine instrument.
7. method according to claim 6, it is characterised in that methods described also includes:
Receive account and password that the terminal device sends;Wherein, the account and password are that the terminal device receives use Family input;
Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring;
If it is determined that the password is correct, then parameter configuration is sent to the terminal device.
8. method according to claim 7, it is characterised in that the password includes:First password and the second password;It is described First password is the password arranged during brush machine instrument described in user's registration;
Methods described also includes:
Second password is sent with the frequency made an appointment with the terminal device to the terminal device;
Correspondingly, the receiving terminal apparatus send account and password, including:
Receive the account, the first password, second password that the terminal device sends and to send described second close The moment of code;
Correspondingly, it is described that whether the password is judged according to the account, the password and the cryptographic check information for prestoring Correctly, including:
Judge whether the first password correct with proper password corresponding with the account is prestored according to the account;
If it is determined that the first password is correct, then according to the moment and the end that second password is sent to the terminal device The moment of end equipment transmission second password determines whether second password is correct;
If it is determined that second password is correct, it is determined that the password is correct;
If it is determined that the first password mistake, it is determined that the code error.
9. method according to claim 7, it is characterised in that account and password that the receiving terminal apparatus send, bag Include:
Password after receiving the account of the terminal device transmission and encrypting;Wherein, the password after the encryption is described Terminal device password according to the secret key pair made an appointment with server is encrypted what is formed;
Correspondingly, it is described that whether the password is judged according to the account, the password and the cryptographic check information for prestoring Correctly, including:
The password after the encryption is decrypted according to the key, forms the password after decryption;
If it is determined that the password after the decryption is consistent with proper password corresponding with the account is prestored, it is determined that described Password is correct;
If it is determined that password after the decryption is with to prestore proper password corresponding with the account inconsistent, it is determined that institute State code error.
10. the method according to any one of claim 6-9, it is characterised in that the checking algorithm is hash algorithm, described Check value is SHA1 values or MD5 values.
11. methods according to claim 6, it is characterised in that described according to the check value and the standard for prestoring Check value judge the brush machine instrument whether be illegally modified including:
If it is determined that the check value is identical with the criteria check value, it is determined that the brush machine instrument is not illegally modified;
If it is determined that the check value is differed with the criteria check value, it is determined that the brush machine instrument is illegally modified.
12. a kind of terminal devices, it is characterised in that include:
Generation module, is configured to, when brush machine instrument start-up triggering command is got, be calculated according to the brush machine instrument and inspection Method generates check value;
First sending module, is configured to send the check value to server, so that the server is according to the check value And the criteria check value for prestoring judges whether the brush machine instrument is illegally modified, and it is determined that the brush machine instrument does not have When being illegally modified, send to terminal device and start indicator;
Starting module, when being configured as receiving the startup indicator of the server transmission, starts the brush machine Instrument.
13. terminal devices according to claim 12, it is characterised in that the terminal device also includes:
Acquisition module, is configured to obtain the account and password of user input;
Second sending module, is configured to send the account and the password to the server, so that the server root Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring, and it is determined that described When password is correct, parameter configuration is sent to the terminal device;
Operation module, when being configured as receiving the parameter configuration of the server transmission, according to the parameter Configuration information runs the brush machine instrument.
14. terminal devices according to claim 13, it is characterised in that the password includes:First password and second close Code;The first password is the password arranged during brush machine instrument described in user's registration;
The terminal device also includes:
Receiver module, the frequency for being configured to receive the server to make an appointment with the terminal device send described the Two passwords;
Correspondingly, the acquisition module includes:
Acquisition submodule, is configured to obtain the account of the user input, the first password and second password;
Correspondingly, second sending module includes:
First sending submodule, is configured to send the account, the first password, second password to the server And send the moment of second password.
15. terminal devices according to claim 13, it is characterised in that the terminal device also includes:
Encrypting module, is configured to be encrypted the password according to the key made an appointment with the server, is formed and added Password after close;
Correspondingly, second sending module includes:
Second sending submodule, is configured to the server send the password after the account and the encryption.
16. terminal devices according to any one of claim 12-15, it is characterised in that the checking algorithm is calculated for Hash Method, the check value are SHA1 values or MD5 values.
17. a kind of servers, it is characterised in that include:
First receiver module, is configured to the check value of receiving terminal apparatus transmission;Wherein, the check value is set for the terminal For what is generated according to brush machine instrument and check algorithm;
First judge module, is configured to judge the brush machine instrument according to the check value and the criteria check value for prestoring Whether it is illegally modified;
First sending module, when being configured as determining that the brush machine instrument is not illegally modified, sends out to the terminal device Startup indicator is sent, so that the terminal device starts the brush machine instrument.
18. servers according to claim 17, it is characterised in that the server also includes:
Second receiver module, is configured to receive account and the password that the terminal device sends;Wherein, the account and password For the terminal device receiving user's input;
Second judge module, is configured to judge institute according to the account, the password and the cryptographic check information for prestoring Password is stated whether correct;
Second sending module, when being configured as determining that the password is correct, sends parameter configuration to the terminal device.
19. servers according to claim 18, it is characterised in that the password includes:First password and the second password; The first password is the password arranged during brush machine instrument described in user's registration;
The server also includes:
3rd sending module, is configured to send described with the frequency made an appointment with the terminal device to the terminal device Second password;
Correspondingly, second receiver module, including:
First receiving submodule, be configured to receive the account, the first password that the terminal device sends, described the The moment of two passwords and transmission second password;
Correspondingly, second judge module includes:
First judging submodule, is configured to be sentenced with proper password corresponding with the account is prestored according to the account Whether the first password that breaks is correct;When it is determined that the first password is correct, described the is sent according to the terminal device The moment of the moment of two passwords and terminal device transmission second password determines whether second password is correct;When true When second password is correct calmly, determine that the password is correct;When it is determined that during the first password mistake, determining that the password is wrong By mistake.
20. servers according to claim 18, it is characterised in that second receiver module includes:
Second receiving submodule, is configured to receive the account of the terminal device transmission and the password after encryption;Wherein, Password after the encryption is that terminal device password according to the secret key pair made an appointment with server is encrypted shape Into;
Correspondingly, second judge module includes:
Decryption submodule, is configured to be decrypted the password after the encryption according to the key, forms close after decryption Code;
Second judging submodule, the password after being configured as determining the decryption with prestore it is corresponding with the account When proper password is consistent, determine that the password is correct;When it is determined that password after the decryption with prestore and the account When corresponding proper password is inconsistent, the code error is determined.
21. servers according to any one of claim 17-20, it is characterised in that the checking algorithm is hash algorithm, The check value is SHA1 values or MD5 values.
22. servers according to claim 17, it is characterised in that first judge module includes:
3rd judging submodule, when being configured as determining that the check value is identical with the criteria check value, determines the brush Machine instrument is not illegally modified;When it is determined that the check value is differed with the criteria check value, the brush machine work is determined Tool is illegally modified.
23. a kind of terminal devices, it is characterised in that include:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the criteria check value for prestoring Judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, set to terminal Preparation send startup indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
24. a kind of servers, it is characterised in that include:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
The check value that receiving terminal apparatus send;Wherein, the check value is the terminal device according to brush machine instrument and inspection What algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, so that institute State terminal device and start the brush machine instrument.
CN201610930638.4A 2016-10-31 2016-10-31 Brush machine Tool validation method and device Active CN106534083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610930638.4A CN106534083B (en) 2016-10-31 2016-10-31 Brush machine Tool validation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610930638.4A CN106534083B (en) 2016-10-31 2016-10-31 Brush machine Tool validation method and device

Publications (2)

Publication Number Publication Date
CN106534083A true CN106534083A (en) 2017-03-22
CN106534083B CN106534083B (en) 2019-07-23

Family

ID=58292844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610930638.4A Active CN106534083B (en) 2016-10-31 2016-10-31 Brush machine Tool validation method and device

Country Status (1)

Country Link
CN (1) CN106534083B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992857A (en) * 2017-03-30 2017-07-28 努比亚技术有限公司 A kind of brush machine verification method and device
CN107360165A (en) * 2017-07-13 2017-11-17 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system
CN110659477A (en) * 2019-09-23 2020-01-07 深圳市网心科技有限公司 Anti-flash protection method and system for android device, android device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN104123505A (en) * 2014-07-24 2014-10-29 丹阳市广播电视台 Android intelligent device anti-getroot system and calibration method thereof
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN105183499A (en) * 2015-08-04 2015-12-23 上海青橙实业有限公司 ROM flashing method, mobile terminal and terminal system
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN104123505A (en) * 2014-07-24 2014-10-29 丹阳市广播电视台 Android intelligent device anti-getroot system and calibration method thereof
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN105183499A (en) * 2015-08-04 2015-12-23 上海青橙实业有限公司 ROM flashing method, mobile terminal and terminal system
CN105373747A (en) * 2015-12-09 2016-03-02 上海斐讯数据通信技术有限公司 File generation method, file verification method and systems for preventing system from being tampered

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992857A (en) * 2017-03-30 2017-07-28 努比亚技术有限公司 A kind of brush machine verification method and device
CN106992857B (en) * 2017-03-30 2020-11-10 义乌国信土地规划咨询有限公司 Machine-swiping verification method and device
CN107360165A (en) * 2017-07-13 2017-11-17 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system
CN107360165B (en) * 2017-07-13 2021-02-12 北京元心科技有限公司 Terminal device, cloud server and method and device for managing and controlling operating system
CN110659477A (en) * 2019-09-23 2020-01-07 深圳市网心科技有限公司 Anti-flash protection method and system for android device, android device and storage medium

Also Published As

Publication number Publication date
CN106534083B (en) 2019-07-23

Similar Documents

Publication Publication Date Title
EP3657370B1 (en) Methods and devices for authenticating smart card
CN104852911B (en) Safe verification method, apparatus and system
CN107241688A (en) Signature, verification method, device and the storage medium of application installation package
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104125067B (en) Account and token secret key binding method and device
CN104216742B (en) Brush machine control method and device based on password
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN106453052A (en) Message interaction method and apparatus thereof
TWI761843B (en) Access control method and device, electronic device and storage medium
CN104484593B (en) terminal verification method and device
EP2978162A1 (en) Anti-counterfeiting verification method, device and system
CN104468581B (en) The method and device of login application program
CN107766701A (en) Electronic equipment, dynamic library file guard method and device
CN109039860A (en) Send and show method and device, the identity authentication method and device of message
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN106060027B (en) Method, apparatus, equipment and the system verified based on identifying code
CN104158665A (en) Method and device of verification
CN106709284A (en) Root package validation method and device
CN106534083A (en) Root tool verification method and apparatus
CN111917728A (en) Password verification method and device
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN106789070A (en) The decryption method of data, device and terminal
CN106295363A (en) Startup calibration method and device
EP3249566B1 (en) Method and device for encrypting application
CN107911380A (en) Auth method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant