CN106534083A - Root tool verification method and apparatus - Google Patents
Root tool verification method and apparatus Download PDFInfo
- Publication number
- CN106534083A CN106534083A CN201610930638.4A CN201610930638A CN106534083A CN 106534083 A CN106534083 A CN 106534083A CN 201610930638 A CN201610930638 A CN 201610930638A CN 106534083 A CN106534083 A CN 106534083A
- Authority
- CN
- China
- Prior art keywords
- password
- brush machine
- terminal device
- account
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a root tool verification method and apparatus. The method comprises the following steps: when a root tool start triggering instruction is obtained, generating a verification value according to the root tool and the verification algorithm; sending the verification value to a server; receiving the verification value sent from a terminal device; according to the verification value and a pre-stored standard verification value, determining whether the root tool has been altered invalid or not; if the root tool is confirmed to not have been altered, sending a start instruction to the terminal device; starting the root tool upon the reception of the start instruction sent from the server. In the invention, the terminal device starts the root tool only when the start instruction is received. Compared with the mode in which a root tool is directly operated for rooting, the method and apparatus of the invention start rooting after verification. Accordingly, the root tool for rooting is such one as never been altered invalid, and the user information security can be ensured and the success rate for rooting is increased.
Description
Technical field
It relates to computer technology, more particularly to a kind of brush machine Tool validation method and device.
Background technology
With the development of computer technology, the use of terminal device is more and more extensive.Mistake of the user in using terminal equipment
Cheng Zhong, with the increase of use time, the performance of terminal device may decline, at this point it is possible to recovered by brush machine or
Lift the performance of terminal device.
In correlation technique, after user stores brush machine instrument on terminal device, directly operation brush machine instrument carries out brush machine
Operation.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of brush machine Tool validation method and device.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine Tool validation method, including:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the standard school for prestoring
Test value and judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, to end
End equipment sends and starts indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
With reference in a first aspect, in the first possible implementation of first aspect, methods described also includes:
Obtain the account and password of user input;
The account and the password are sent to the server, so that the server is according to the account, described close
Whether correctly code and the cryptographic check information that prestores judge the password, and when it is determined that the password is correct, to described
Terminal device sends parameter configuration;
If receiving the parameter configuration that the server sends, institute is run according to the parameter configuration
State brush machine instrument.
With reference to the first possible implementation of first aspect, in first aspect in second possible implementation
In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration
Password;
Methods described also includes:
Second password that the frequency that the server is received to be made an appointment with the terminal device is sent;
Correspondingly, the account and password for obtaining user input, including:
Obtain account, the first password and second password of the user input;
Correspondingly, it is described to include to the server transmission account and the password:
The account, the first password, second password are sent to the server and second password is sent
Moment.
With reference to the first possible implementation of first aspect, in first aspect in the third possible implementation
In, after the account and password of the receiving user's input, methods described also includes:
Key according to being made an appointment with the server is encrypted to the password, forms the password after encryption;
Correspondingly, it is described to include to the server transmission account and the password:
The password after the account and the encryption is sent to the server.
With reference to first aspect and first aspect the first possible implementation to first aspect the third is possible
Any one possible implementation in implementation, in first aspect in the 4th kind of possible implementation, the school
Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine Tool validation method, including:
The check value that receiving terminal apparatus send;Wherein, the check value be the terminal device according to brush machine instrument and
What check algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, with
The terminal device is made to start the brush machine instrument.
With reference to second aspect, in the first possible implementation of second aspect, methods described also includes:
Receive account and password that the terminal device sends;Wherein, the account and password are connect for the terminal device
Receive user input;
Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring;
If it is determined that the password is correct, then parameter configuration is sent to the terminal device.
With reference to the first possible implementation of second aspect, in second aspect in second possible implementation
In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration
Password;
Methods described also includes:
Second password is sent with the frequency made an appointment with the terminal device to the terminal device;
Correspondingly, the receiving terminal apparatus send account and password, including:
Receive the account, the first password, second password that the terminal device sends and send described the
The moment of two passwords;
Correspondingly, it is described that the password is judged according to the account, the password and the cryptographic check information for prestoring
It is whether correct, including:
According to the account with prestore whether proper password corresponding with the account judges the first password
Correctly;
If it is determined that the first password is correct, then according to the moment and institute that second password is sent to the terminal device
The moment for stating terminal device transmission second password determines whether second password is correct;
If it is determined that second password is correct, it is determined that the password is correct;
If it is determined that the first password mistake, it is determined that the code error.
With reference to the first possible implementation of second aspect, in second aspect in the third possible implementation
In, account and password that the receiving terminal apparatus send, including:
Password after receiving the account of the terminal device transmission and encrypting;Wherein, the password after the encryption is
Terminal device password according to the secret key pair made an appointment with server is encrypted what is formed;
Correspondingly, it is described that the password is judged according to the account, the password and the cryptographic check information for prestoring
It is whether correct, including:
The password after the encryption is decrypted according to the key, forms the password after decryption;
If it is determined that the password after the decryption is consistent with proper password corresponding with the account is prestored, it is determined that
The password is correct;
If it is determined that password after the decryption is with to prestore proper password corresponding with the account inconsistent, then really
The fixed code error.
With reference to second aspect and second aspect the first possible implementation to second aspect the third is possible
Any one possible implementation in implementation, in second aspect in the 4th kind of possible implementation, the school
Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
With reference to second aspect, in the 5th kind of possible implementation of second aspect, it is described according to the check value and
The criteria check value for prestoring judge the brush machine instrument whether be illegally modified including:
If it is determined that the check value is identical with the criteria check value, it is determined that the brush machine instrument is not illegally repaiied
Change;
If it is determined that the check value is differed with the criteria check value, it is determined that the brush machine instrument is illegally modified.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal device, including:
Generation module, is configured to when brush machine instrument start-up triggering command is got, according to the brush machine instrument and inspection
Checking method generates check value;
First sending module, is configured to send the check value to server, so that the server is according to the school
The criteria check value tested value and prestore judges whether the brush machine instrument is illegally modified, and it is determined that the brush machine instrument
When not being illegally modified, send to terminal device and start indicator;
Starting module, when being configured as receiving the startup indicator of the server transmission, starts described
Brush machine instrument.
With reference to the third aspect, in the first possible implementation of the third aspect, the terminal device also includes:
Acquisition module, is configured to obtain the account and password of user input;
Second sending module, is configured to send the account and the password to the server, so that the service
According to the account, the password and the cryptographic check information for prestoring, device judges that the password is whether correct, and it is determined that
When the password is correct, parameter configuration is sent to the terminal device;
Operation module, when being configured as receiving the parameter configuration of the server transmission, according to described
Parameter configuration runs the brush machine instrument.
With reference to the first possible implementation of the third aspect, in the third aspect in second possible implementation
In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration
Password;
The terminal device also includes:
Receiver module, the institute that the frequency for being configured to receive the server to be made an appointment with the terminal device is sent
State the second password;
Correspondingly, the acquisition module includes:
Acquisition submodule, is configured to obtain the account of the user input, the first password and second password;
Correspondingly, second sending module includes:
First sending submodule, be configured to the server send the account, the first password, described second
The moment of password and transmission second password.
With reference to the first possible implementation of the third aspect, in the third aspect in the third possible implementation
In, the terminal device also includes:
Encrypting module, is configured to be encrypted the password according to the key made an appointment with the server, shape
Into the password after encryption;
Correspondingly, second sending module includes:
Second sending submodule, is configured to the server send the password after the account and the encryption.
With reference to the third aspect and the third aspect the first possible implementation to the third aspect the third is possible
Any one possible implementation in implementation, in the third aspect in the 4th kind of possible implementation, the school
Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of server, including:
First receiver module, is configured to the check value of receiving terminal apparatus transmission;Wherein, the check value is the end
End equipment is generated according to brush machine instrument and check algorithm;
First judge module, is configured to judge the brush machine according to the check value and the criteria check value for prestoring
Whether instrument is illegally modified;
First sending module, when being configured as determining that the brush machine instrument is not illegally modified, sets to the terminal
Preparation send startup indicator, so that the terminal device starts the brush machine instrument.
With reference to fourth aspect, in the first possible implementation of fourth aspect, the server also includes:
Second receiver module, is configured to receive account and the password that the terminal device sends;Wherein, the account and
Password is the terminal device receiving user's input;
Second judge module, is configured to be sentenced according to the account, the password and the cryptographic check information for prestoring
Whether the password that breaks is correct;
Second sending module, when being configured as determining that the password is correct, sends parameter configuration to the terminal device
Information.
With reference to the first possible implementation of fourth aspect, in fourth aspect in second possible implementation
In, the password includes:First password and the second password;The first password is what is arranged during brush machine instrument described in user's registration
Password;
The server also includes:
3rd sending module, is configured to the terminal device send with the frequency made an appointment with the terminal device
Second password;
Correspondingly, second receiver module, including:
First receiving submodule, is configured to receive the account of the terminal device transmission, the first password, institute
State the second password and send the moment of second password;
Correspondingly, second judge module includes:
First judging submodule, be configured to according to the account with prestore it is corresponding with the account correct close
Code judges whether the first password is correct;When it is determined that the first password is correct, institute is sent according to the terminal device
The moment at the moment and terminal device transmission second password of stating the second password determines whether second password is correct;
When it is determined that second password is correct, determine that the password is correct;When it is determined that during the first password mistake, determining described close
Code mistake.
With reference to the first possible implementation of fourth aspect, in fourth aspect in the third possible implementation
In, second receiver module includes:
Second receiving submodule, is configured to receive the account of the terminal device transmission and the password after encryption;
Wherein, the password after the encryption is that terminal device password according to the secret key pair made an appointment with server carries out adding
Close formation;
Correspondingly, second judge module includes:
Decryption submodule, is configured to be decrypted the password after the encryption according to the key, after forming decryption
Password;
Second judging submodule, the password after being configured as determining the decryption with prestore and the account pair
When the proper password answered is consistent, determine that the password is correct;When it is determined that password after the decryption with prestore with it is described
When the corresponding proper password of account is inconsistent, the code error is determined.
With reference to fourth aspect and fourth aspect the first possible implementation to second aspect the third is possible
Any one possible implementation in implementation, in fourth aspect in the 4th kind of possible implementation, the school
Checking method is hash algorithm, and the check value is SHA1 values or MD5 values.
With reference to fourth aspect, in the 5th kind of possible implementation of fourth aspect, first judge module includes:
3rd judging submodule, when being configured as determining that the check value is identical with the criteria check value, determines institute
State brush machine instrument not to be illegally modified;When it is determined that the check value is differed with the criteria check value, the brush is determined
Machine instrument is illegally modified.
In terms of the 5th of the embodiment of the present disclosure, there is provided a kind of terminal device, including:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the standard school for prestoring
Test value and judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, to end
End equipment sends and starts indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
In terms of the 6th of the embodiment of the present disclosure, there is provided a kind of server, including:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
The check value that receiving terminal apparatus send;Wherein, the check value be the terminal device according to brush machine instrument and
What check algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, with
The terminal device is made to start the brush machine instrument.
The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:
In one embodiment, by when brush machine instrument start-up triggering command is got, being calculated according to brush machine instrument and inspection
Method generates check value, sends check value to server, and the check value that receiving terminal apparatus send according to check value and is prestored
Criteria check value judge whether brush machine instrument is illegally modified, however, it is determined that brush machine instrument is not illegally modified, then to terminal
Equipment sends and starts indicator, if receiving the startup indicator of server transmission, starts brush machine instrument, realizes end
End equipment sends the check value generated according to brush machine instrument and checking algorithm, clothes before brush machine instrument is started, first to server
Business device is verified after the check value is received, and after verification passes through sends startup indicator, terminal to terminal device
Equipment starts brush machine instrument only after the startup indicator is received, carries out brush machine operation, compared to correlation technique
In, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can carry out brush machine operation in brush machine instrument
Before verified, it is therefore prevented that the brush machine instrument being illegally modified is run on the terminal device, so as to realizing carries out brush machine operation
Brush machine instrument be all the brush machine instrument not being illegally modified, protect the information security of user and improve brush machine success
Rate.
In another embodiment, by the account and password that obtain user input, account and password are sent to server, connect
Account and password that terminal device sends are received, whether password is judged according to account, password and the cryptographic check information for prestoring
Correctly, however, it is determined that password is correct, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission
Information, then run brush machine instrument according to parameter configuration, realizes and can verify user input according to the account of user input
Password, and after being verified, send the parameter configuration of brush machine instrument to terminal device, terminal device is matched somebody with somebody according to parameter
Confidence breath operation brush machine instrument, can verify the legitimacy of brush machine account, and, brush machine instrument is transported according to parameter configuration
OK, so as to further protecting the information security of user and improve brush machine success rate.
In another embodiment, by second password being sent with the frequency made an appointment with terminal device to terminal device,
The second password that the reception server is sent with the frequency made an appointment with terminal device, obtains the account of user input, first close
Code and the second password, send account, first password, the second password to server and send the moment of the second password, receiving terminal
The account of equipment transmission, first password, the moment of the second password of the second password and transmission, according to account and prestore and account
Number corresponding proper password judges whether first password is correct, however, it is determined that first password is correct, then according to sending to terminal device
The moment of the moment of the second password and terminal device the second password of transmission determines whether the second password is correct, however, it is determined that the second password
Correctly, it is determined that password is correct, however, it is determined that first password mistake, it is determined that code error, however, it is determined that password is correct, then to terminal
Equipment sends parameter configuration, if receiving the parameter configuration of server transmission, is run according to parameter configuration
Brush machine instrument, realizes when the legitimacy of brush machine account is verified, employs the mode of checking first password and the second password, from
And, further protect the information security of user and improve brush machine success rate.
In another embodiment, by after the account and password for obtaining user input, according to making an appointment with server
Key password is encrypted, formed encryption after password, to server send account and encryption after password, receiving terminal
Password after the account of equipment transmission and encryption, is decrypted according to the password after key pair encryption, forms the password after decryption,
If it is determined that the password after decryption is consistent with proper password corresponding with account is prestored, it is determined that password is correct, however, it is determined that
Password after decryption is with to prestore proper password corresponding with account inconsistent, it is determined that code error, however, it is determined that password
Correctly, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission, according to parameter
Configuration information runs brush machine instrument, realizes when the legitimacy of brush machine account is verified, employing carries out adding with key to password
Close form is verified, so as to further protecting the information security of user and improve brush machine success rate.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
During accompanying drawing herein is merged in specification and the part of this specification is constituted, show the enforcement for meeting the disclosure
Example, and be used for explaining the principle of the disclosure together with specification.
Fig. 1 is a kind of flow chart of the brush machine Tool validation method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the brush machine Tool validation method for implementing to exemplify according to another exemplary;
Fig. 3 is a kind of flow chart of the brush machine Tool validation method according to further example embodiment;
Fig. 4 is a kind of flow chart of the brush machine Tool validation method according to another exemplary embodiment;
Fig. 5 is a kind of block diagram of the terminal device according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary;
Fig. 7 is a kind of block diagram of the terminal device according to further example embodiment;
Fig. 8 is a kind of block diagram of the terminal device according to another exemplary embodiment;
Fig. 9 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary;
Figure 10 is a kind of block diagram of the server according to an exemplary embodiment;
Figure 11 is a kind of block diagram of the server for implementing to exemplify according to another exemplary;
Figure 12 is a kind of block diagram of the server according to further example embodiment;
Figure 13 is a kind of block diagram of the server according to another exemplary embodiment;
Figure 14 is a kind of block diagram of the server for implementing to exemplify according to another exemplary;
Figure 15 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment;
Figure 16 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings
It is not intended to the scope of disclosure design is limited by any mode with word description, but by reference to specific embodiment is
Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.Conversely, they be only with as appended by
The example of consistent apparatus and method in terms of some described in detail in claims, the disclosure.
First the noun involved by the embodiment of the present disclosure is explained:
Brush machine:Software upgrading, operating system update are carried out to terminal device, operating system patch or also original initial is improved
The operation of operating system etc..
Brush machine instrument:Complete the code of brush machine function.
Fig. 1 is a kind of flow chart of the brush machine Tool validation method according to an exemplary embodiment.As shown in figure 1,
The brush machine Tool validation method that the embodiment of the present disclosure is provided is comprised the following steps:
In a step 101, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm
Check value.
This step can be performed by terminal device.Terminal device in the embodiment of the present disclosure can be handheld device, vehicle-mounted
Equipment, wearable device, computing device, and various forms of user equipmenies (User Equipment;Referred to as:UE), it is mobile
Platform (Mobile Station;Referred to as:) and terminal (terminal) etc. MS.
User can in advance in terminal device store brush machine instrument.The brush machine instrument can be obtained from server
, or obtain from other control systems.Optionally, the brush machine instrument can be a software kit.
Brush machine instrument start-up triggering command can be triggered by user, or by server triggers.If this opens
Dynamic triggering command be user triggering, then can be user when there is the demand of brush machine, by display screen or button etc. be input into
The instruction of equipment input;If the enabled instruction is server triggers, can be that server passes through network with the default cycle
To the instruction that terminal device sends.The predetermined period can be the cycle of server and terminal device agreement, for example, during half a year
Between.
Terminal device can generate check value according to brush machine instrument and checking algorithm when startup triggering command is got.
Optionally, can be that security control component in brush machine instrument generates check value according to brush machine instrument and checking algorithm.
In a kind of possible implementation, the checking algorithm can be hash algorithm.Brush machine instrument can be entered with two
The form of sequence processed is stored in terminal device, and binary sequence is mapped as check value according to hash algorithm by terminal device.Should
Check value can also be binary sequence.When using Secure Hash Algorithm (Secure Hash Algorithm), the check value
Can be SHA1 values;When using Message-Digest Algorithm 5 (Message-Digest Algorithm 5;Referred to as:MD5), the verification
Value can be MD5 values.Optionally, in order to improve efficiency, can be according to the executable file and checking algorithm in brush machine instrument
Generate check value.
Certainly, the checking algorithm can be other checking algorithms, and the embodiment of the present disclosure is without limitation.
In a step 102, check value is sent to server.
The check value is sent to server after check value is generated by terminal device so that server according to check value and
The criteria check value for prestoring judges whether brush machine instrument is illegally modified, and it is determined that brush machine instrument is not illegally modified
When, send to terminal device and start indicator.
Terminal device can send check value to server by mobile communications network.
In step 103, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
At step 104, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring
Change.
Criteria check value is previously stored with server.The criteria check value can be brush machine work of the server according to standard
What tool and checking algorithm were generated.The brush machine instrument of standard here is stored in the brush machine instrument on server.Optionally, standard
Check value can server generated according to the brush machine instrument and hash algorithm of standard.
If it is determined that check value is identical with criteria check value, it is determined that brush machine instrument is not illegally modified;If it is determined that verification
Value is differed with criteria check value, it is determined that brush machine instrument is illegally modified.When check value is identical with criteria check value, explanation
The brush machine instrument is identical with standard brush machine instrument, is not changed by the not people with modification authority.Check value with
When criteria check value is differed, illustrate that the brush machine instrument is different with standard brush machine instrument, the brush machine instrument is not had
The people of modification authority is modified.
In step 105, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to
Order.
When server determines that the brush machine instrument is not illegally modified, send to terminal device and start indicator, with
Terminal device is made to start brush machine instrument.
In step 106, if receiving the startup indicator of server transmission, start brush machine instrument.
If terminal device starts the brush machine instrument, to carry out after the startup indicator for receiving server transmission
Brush machine is operated.
It should be noted that in a kind of implementation, server if it is determined that brush machine instrument is illegally modified, then to terminal
Equipment sends to be forbidden enlightening indicator.Terminal device is receiving when forbidding enlightening indicator of server transmission, forbids
Start brush machine instrument.In another kind of implementation, network between terminal device and server disconnect or network performance compared with
During difference, check value cannot be successfully sent to server, then terminal device is not received by server feedback in default duration
Instruction when, the No starting brush machine instrument.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by getting brush machine instrument start-up triggering command
When, check value is generated according to brush machine instrument and check algorithm, check value, the verification that receiving terminal apparatus send is sent to server
According to check value and the criteria check value for prestoring, value, judges whether brush machine instrument is illegally modified, however, it is determined that brush machine instrument
It is not illegally modified, then sends to terminal device and start indicator, if receiving the startup indicator of server transmission,
Then start brush machine instrument, realized terminal device before brush machine instrument is started, first send according to brush machine instrument to server and
The check value that checking algorithm is generated, server is verified after the check value is received, and is set to terminal after verification passes through
Preparation send startup indicator, and terminal device starts brush machine instrument only after the startup indicator is received, carries out
Brush machine is operated, compared to correlation technique in, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can be with
Verified before brush machine instrument carries out brush machine operation, it is therefore prevented that the brush machine instrument being illegally modified is run on the terminal device,
So as to it is all the brush machine instrument not being illegally modified to realize and carry out the brush machine instrument of brush machine operation, protects the letter of user
Cease safety and improve brush machine success rate.
Fig. 2 is a kind of flow chart of the brush machine Tool validation method for implementing to exemplify according to another exemplary.Disclosure reality
Apply example offer brush machine Tool validation method, on the basis of embodiment illustrated in fig. 1, to start brush machine instrument after the step of make
One describes in detail.As shown in Fig. 2 the brush machine Tool validation method that the embodiment of the present disclosure is provided comprises the steps:
In step 201, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm
Check value.
In step 202., check value is sent to server.
The purpose of step 202 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring
It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 203, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 204, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring
Change.
In step 205, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to
Order.
The purpose of step 205 starts brush machine instrument to make terminal device.
In step 206, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 201- step 206 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein
State.
In step 207, the account and password of user input are obtained.
After brush machine instrument is started, in order to further ensure that the security and success rate of brush machine, user input account is needed
And password.Brush machine instrument can show user interface upon actuation, to point out user input account and password.
Optionally, in order to ensure the security of password, after the account and password of user input is got, can adopt and add
Close algorithm carries out being encrypted password, forms ciphertext.
In a step 208, account and password are sent to server.
The purpose of step 208 is to make server judge password according to account, password and the cryptographic check information for prestoring
It is whether correct, and when it is determined that password is correct, parameter configuration is sent to terminal device.
In step 209, receiving terminal apparatus send account and password.
Wherein, account and password are terminal device receiving user's input.
In step 210, judge whether password is correct according to account, password and the cryptographic check information for prestoring.
Optionally, if in step 207 terminal device send be ciphertext password, in a step 208, server need
First ciphertext password is decrypted using decipherment algorithm.
Here cryptographic check information can be the mapping relations between account and proper password.It is stored with not in server
Mapping relations between same account and proper password.After account and password is received, can determine and be somebody's turn to do according to account
The corresponding proper password of account.If the password for receiving is identical with the proper password, judge that password is correct;If what is received is close
Code is differed with the proper password, then judge code error.
Here the password, or server that password is arranged when can be user's registration brush machine instrument is sent to terminal
The dynamic password of equipment, can also be the combination of the password and dynamic password arranged during registration brush machine instrument.If password is to use
The password arranged during the registration brush machine instrument of family, the then password that the user of server storage is arranged when proper password is user's registration.
If password is dynamic password, proper password is the password that server is sent to terminal device.If password is above two
The combination of password, then proper password is also the combination of above two proper password.The embodiment of the present disclosure is without limitation.
In step 211, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
Parameter configuration can be that server is allocated to the brush machine instrument according to the account of user input.The parameter is matched somebody with somebody
Confidence breath can be same day brush machine number of times, can download version species and can be to associating terminal device perform internal finger
The authority informations such as order.
In the step 212, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation
Machine instrument.
Terminal device runs brush machine work according to the design parameter in parameter configuration after parameter configuration is received
Tool.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by the account and password that obtain user input, to clothes
Business device sends account and password, account and password that receiving terminal apparatus send, according to account, password and the password for prestoring
Check information judges whether password is correct, however, it is determined that password is correct, then send parameter configuration to terminal device, if receiving
The parameter configuration that server sends, then run brush machine instrument according to parameter configuration, and realizing can be defeated according to user
The account for entering verifies the password of user input, and after being verified, sends the parameter configuration letter of brush machine instrument to terminal device
Breath, terminal device run brush machine instrument according to parameter configuration, can verify the legitimacy of brush machine account, and, make brush machine
Instrument is run according to parameter configuration, so as to further protecting the information security of user and improve brush machine success rate.
Fig. 3 is a kind of flow chart of the brush machine Tool validation method according to further example embodiment.Disclosure reality
Example is applied in the technology of embodiment illustrated in fig. 2, a detailed description is made to the concrete form of password.In the disclosed embodiments, it is close
Code includes:First password and the second password.The password that first password is arranged when being user's registration brush machine instrument.As shown in figure 3, this
The brush machine Tool validation method that open embodiment is provided is comprised the following steps:
In step 301, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm
Check value.
In step 302, check value is sent to server.
The purpose of step 302 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring
It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 303, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 304, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring
Change.
In step 305, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to
Order.
The purpose of step 305 starts brush machine instrument to make terminal device.
Within step 306, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 301- step 306 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein
State.
In step 307, the second password is sent with the frequency made an appointment with terminal device to terminal device.
In the embodiment of the present disclosure, the mode of checking first password and the second password when the account of user is verified, is employed.
The password that first password is arranged when being for registering brush machine instrument.Second password be server to terminal device send it is dynamic close
Code.
Server can be set to terminal after the default time period after startup indicator is have sent to server
The standby frequency to make an appointment with terminal device sends the second password.For example, the frequency of the agreement can be 1/300, i.e. service
Device sent second password to terminal device at interval of 300 seconds.The second password for sending every time is different sequences, i.e. second is close
Code is dynamic change.
It should be noted that before step 307, server and terminal device need to carry out clock alignment operation.
In step 308, the second password that the reception server is sent with the frequency made an appointment with terminal device.
In a step 309, account, first password and second password of user input are obtained.
After terminal device receives the second password, user can know second password, and by account, first password and
The the second Password Input terminal device for learning.
In the step 310, account, first password, the second password are sent to server and sends the moment of the second password.
Terminal device can send the moment that terminal device sends the second password to server in the form of timestamp.
In step 311, receiving terminal apparatus send account, first password, the second password and send second password
Moment.
In step 312, according to account with prestore whether proper password corresponding with account judges first password
Correctly.
Similar with step 210, server can determine proper password corresponding with the account according to account.Work as first password
When identical with proper password, determine that first password is correct;When first password is differed with proper password, determine that first password is wrong
By mistake.
In step 313, however, it is determined that first password is correct, then according to the moment and end that the second password is sent to terminal device
The moment of end equipment the second password of transmission determines whether the second password is correct.
Only under the premise of first password is correct, server just judges whether the second password is correct.
In deterministic process, server can according to its to terminal device send the second password moment and terminal device to
Its moment for sending the second password determines whether the second password is correct.If server sends the moment of the second password to terminal device
With terminal device to server send the second password moment difference in default scope, and the second password be server to
The password that terminal device sends, i.e. the second password belong to the dynamic password storehouse of server, it is determined that the second password is correct.
In a step 314, however, it is determined that the second password is correct, it is determined that password is correct.
When it is determined that the second password is correct, it is determined that the password being made up of first password and the second password is correct.
In step 315, however, it is determined that first password mistake, it is determined that code error.
It is determined that during first password mistake, it is possible to it is determined that the code error being made up of first password and the second password.
In step 316, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
In step 317, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation
Machine instrument.
With step 211, step 316 realizes that process and know-why are similar, step 317 and step 212 realize process and
Know-why is similar to, and here is omitted.
The brush machine Tool validation method that the embodiment of the present disclosure is provided, by terminal device making an appointment with terminal device
Frequency send the second password, the second password that the reception server is sent with the frequency made an appointment with terminal device is obtained and is used
Account, first password and the second password that family is input into, send account, first password, the second password to server and send second
The moment of password, the account of receiving terminal apparatus transmission, first password, the moment of the second password of the second password and transmission, according to
With proper password corresponding with account is prestored, account judges whether first password is correct, however, it is determined that first password is correct,
The moment for then sending the second password according to the moment and terminal device that the second password is sent to terminal device determines that the second password is
It is no correct, however, it is determined that the second password is correct, it is determined that password is correct, however, it is determined that first password mistake, it is determined that code error, if
Determine that password is correct, then parameter configuration is sent to terminal device, if receiving the parameter configuration of server transmission,
Brush machine instrument is run according to parameter configuration, is realized when the legitimacy of brush machine account is verified, employ checking first close
The mode of code and the second password, so as to further protecting the information security of user and improve brush machine success rate.
Fig. 4 is a kind of flow chart of the brush machine Tool validation method according to another exemplary embodiment.Disclosure reality
Example is applied in the technology of embodiment illustrated in fig. 2, a detailed description is made to the concrete form of password.As shown in figure 4, the disclosure is implemented
The brush machine Tool validation method that example is provided comprises the steps:
In step 401, when brush machine instrument start-up triggering command is got, generated according to brush machine instrument and check algorithm
Check value.
In step 402, check value is sent to server.
The purpose of step 402 is to make server judge that brush machine instrument is according to check value and the criteria check value for prestoring
It is no to be illegally modified, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator.
In step 403, the check value that receiving terminal apparatus send.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
In step 404, judge whether brush machine instrument is illegally repaiied according to check value and the criteria check value for prestoring
Change.
In step 405, however, it is determined that brush machine instrument is not illegally modified, then send startup instruction to terminal device to refer to
Order.
The purpose of step 405 starts brush machine instrument to make terminal device.
In a step 406, if receiving the startup indicator of server transmission, start brush machine instrument.
With step 101- step 106, step 401- step 406 realizes that process and know-why are similar, no longer go to live in the household of one's in-laws on getting married herein
State.
In step 407, the account and password of user input are obtained.
In a step 408, password is encrypted according to the key made an appointment with server, forms close after encryption
Code.
Terminal device can be encrypted according to the secret key pair password made an appointment after account and password is got.
In step 409, the password after sending account and encryption to server.
In step 410, receiving terminal apparatus send account and encryption after password.
Wherein, the password after encryption is encrypted shape according to the secret key pair password made an appointment with server for terminal device
Into.
In step 411, it is decrypted according to the password after key pair encryption, forms the password after decryption.
After password of the server after account and encryption is received, it is decrypted according to the password after secret key pair encryption, really
Password after fixed decryption.
In step 412, however, it is determined that the password after decryption is consistent with proper password corresponding with account is prestored, then
Determine that password is correct.
In step 413, however, it is determined that the password after decryption with to prestore proper password corresponding with account inconsistent,
Then determine code error.
In step 412 and step 413, server can determine proper password corresponding with the account according to account,
It is determined that decryption after password after, it is determined that decryption after password it is whether consistent with proper password.If consistent, it is determined that password is correct;
If inconsistent, it is determined that code error.
In step 414, however, it is determined that password is correct, then parameter configuration is sent to terminal device.
In step 415, if receiving the parameter configuration of server transmission, brushed according to parameter configuration operation
Machine instrument.
With step 211, step 414 realizes that process and know-why are similar, step 415 and step 212 realize process and
Know-why is similar to, and here is omitted.
The embodiment of the present disclosure provide brush machine Tool validation method, by obtain user input account and password after,
Key according to being made an appointment with server is encrypted to password, formed encryption after password, to server send account and
Password after password after encryption, the account that receiving terminal apparatus send and encryption, is carried out according to the password after key pair encryption
Decryption, forms the password after decryption, however, it is determined that the password after decryption is consistent with proper password corresponding with account is prestored,
Then determine that password is correct, however, it is determined that the password after decryption with to prestore proper password corresponding with account inconsistent, then really
Determine code error, however, it is determined that password is correct, then parameter configuration is sent to terminal device, if receiving the ginseng of server transmission
Number configuration information, then run brush machine instrument according to parameter configuration, realizes when the legitimacy of brush machine account is verified, adopts
Password is verified in the form of key is encrypted, so as to further protecting the information security of user and improve
Brush machine success rate.
It is following for disclosure device embodiment, can be used for performing method of disclosure embodiment.For disclosure device reality
The details not disclosed in applying example, refer to method of disclosure embodiment.
Fig. 5 is a kind of block diagram of the terminal device according to an exemplary embodiment.As shown in figure 5, the disclosure is implemented
The terminal device that example is provided includes:Generation module 51, the first sending module 52 and starting module 53.
Generation module 51, is configured to when brush machine instrument start-up triggering command is got, according to brush machine instrument and inspection
Algorithm generates check value.
Optionally, checking algorithm is hash algorithm, and check value is SHA1 values or MD5 values.
First sending module 52, is configured to send check value to server, so that server is according to check value and in advance
The criteria check value of storage judges whether brush machine instrument is illegally modified, and when it is determined that brush machine instrument is not illegally modified,
Send to terminal device and start indicator.
Starting module 53, when being configured as receiving the startup indicator of server transmission, starts brush machine instrument.
The terminal device that the embodiment of the present disclosure is provided, by arranging generation module, is configured to getting brush machine instrument
When starting triggering command, check value is generated according to brush machine instrument and check algorithm, the first sending module is configured to server
Check value is sent, so that according to check value and the criteria check value for prestoring, server judges whether brush machine instrument is illegally repaiied
Change, and when it is determined that brush machine instrument is not illegally modified, sends to terminal device and start indicator, starting module is matched somebody with somebody
It is set to when the startup indicator of server transmission is received, starts brush machine instrument, realizes terminal device and starting brush machine
Before instrument, the check value generated according to brush machine instrument and checking algorithm is first sent to server, server is receiving the school
After testing value, being verified, and startup indicator being sent to terminal device after verification passes through, terminal device is only being received
After the startup indicator, just start brush machine instrument, carry out brush machine operation, compared to correlation technique in, directly operation brush machine
Instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can be verified before brush machine instrument carries out brush machine operation, be prevented
The brush machine instrument being illegally modified is run on the terminal device, so as to realizing carries out the brush machine instrument of brush machine operation and be all
The brush machine instrument not being illegally modified, protects the information security of user and improves brush machine success rate.
Fig. 6 is a kind of block diagram of the terminal device for implementing to exemplify according to another exemplary.As shown in fig. 6, disclosure reality
The terminal device of example offer is applied on the basis of embodiment illustrated in fig. 5, is further included:Acquisition module 61, the second sending module
62 and operation module 63.
Acquisition module 61, is configured to obtain the account and password of user input.
Second sending module 62, is configured to send account and password to server, so that server is according to account, password
And the cryptographic check information for prestoring judges whether password is correct, and when it is determined that password is correct, sends to terminal device and join
Number configuration information.
Operation module 63, when being configured as receiving the parameter configuration of server transmission, believes according to parameter configuration
Breath operation brush machine instrument.
The terminal device that the embodiment of the present disclosure is provided, by arranging acquisition module, is configured to obtain the account of user input
Number and password, the second sending module, be configured to send account and password to server, so that server is according to account, password
And the cryptographic check information for prestoring judges whether password is correct, and when it is determined that password is correct, sends to terminal device and join
Number configuration information, runs module, when being configured as receiving the parameter configuration of server transmission, is believed according to parameter configuration
Breath operation brush machine instrument, realizes the password that the account of user input can be verified user input, and being sent to server is carried out
Checking, and after being verified, the parameter configuration that the service of reception sends runs brush machine instrument according to parameter configuration,
The legitimacy of brush machine account can be verified, and, brush machine instrument is run according to parameter configuration, so as to further protect
The information security of user and improve brush machine success rate.
Fig. 7 is a kind of block diagram of the terminal device according to further example embodiment.As shown in fig. 7, disclosure reality
The terminal device of example offer is applied on the basis of embodiment illustrated in fig. 6, password includes:First password and the second password, first is close
The password that code is arranged when being user's registration brush machine instrument.Terminal device also includes receiver module 71, and, acquisition module 61 includes
Acquisition submodule 611, the second sending module 62 include the first sending submodule 621.
Receiver module 71, the second of the frequency transmission for being configured to the reception server to make an appointment with terminal device are close
Code.
Acquisition submodule 611, is configured to obtain account, first password and second password of user input.
First sending submodule 621, is configured to send account, first password, the second password to server and sends the
The moment of two passwords.
The embodiment of the present disclosure provide terminal device, by arrange receiver module, be configured to the reception server with end
The second password that the frequency that end equipment is made an appointment sends, acquisition module include acquisition submodule, are configured to acquisition user defeated
Account, first password and the second password for entering, the second sending module include the first sending submodule, are configured to server send out
Send account, first password, the second password and send the moment of the second password, realize when the legitimacy of brush machine account is verified,
The mode of checking first password and the second password is employed, so as to further protecting the information security of user and improve brush
Machine success rate.
Fig. 8 is a kind of block diagram of the terminal device according to another exemplary embodiment.As shown in figure 8, disclosure reality
Example is applied on the basis of embodiment illustrated in fig. 6, terminal device also includes encrypting module 81, and, the second sending module 62 includes
Second sending submodule 622.
Encrypting module 81, is configured to be encrypted password according to the key made an appointment with server, forms encryption
Password afterwards.
Second sending submodule 622, is configured to the password after sending account and encryption to server.
The terminal device that the embodiment of the present disclosure is provided, by arranging encrypting module, is configured to according to advance with server
The key of agreement is encrypted to password, forms the password after encryption, and the second sending module includes the second sending submodule, matched somebody with somebody
The password being set to after sending account and encryption to server, realizes when the legitimacy of brush machine account is verified, employs to close
Code verified in the form of key is encrypted, so as to, further protect user information security and improve brush machine into
Power.
The foregoing describe the built-in function and structure of terminal device.Fig. 9 is exemplified according to another exemplary enforcement
Plant the block diagram of terminal device.As shown in figure 9, the terminal device includes:
Processor 91;
For storing the memory 92 of 91 executable instruction of processor;
Wherein, processor 91 is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to brush machine instrument and check algorithm;To clothes
Business device sends check value, so that according to check value and the criteria check value for prestoring, server judges whether brush machine instrument is non-
Method is changed, and when it is determined that brush machine instrument is not illegally modified, is sent to terminal device and started indicator;If receiving clothes
The startup indicator that business device sends, then start brush machine instrument.
Figure 10 is a kind of block diagram of the server according to an exemplary embodiment.As shown in Figure 10, the disclosure is implemented
The server that example is provided includes:First receiver module 111, the first judge module 112 and the first sending module 113.
First receiver module 111, is configured to the check value of receiving terminal apparatus transmission.
Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm.
Optionally, checking algorithm is hash algorithm, and check value is SHA1 values or MD5 values.
First judge module 112, is configured to judge brush machine instrument according to check value and the criteria check value for prestoring
Whether it is illegally modified.
Optionally, the first judge module 112 includes:3rd judging submodule, is configured as determining check value and standard
When check value is identical, determine that brush machine instrument is not illegally modified;When it is determined that check value is differed with criteria check value, it is determined that
Brush machine instrument is illegally modified.
First sending module 113, when being configured as determining that brush machine instrument is not illegally modified, sends to terminal device
Start indicator, so that terminal device starts brush machine instrument.
The server that the embodiment of the present disclosure is provided, by arranging the first receiver module, is configured to receiving terminal apparatus and sends out
The check value for sending;Wherein, check value is that terminal device is generated according to brush machine instrument and check algorithm, the first judge module, quilt
It is configured to judge whether brush machine instrument is illegally modified according to check value and the criteria check value for prestoring, first sends mould
Block, when being configured as determining that brush machine instrument is not illegally modified, sends to terminal device and starts indicator, so that terminal
Equipment starts brush machine instrument, realized terminal device before brush machine instrument is started, first sends according to brush machine instrument to server
The check value generated with checking algorithm, server are verified after the check value is received, and to terminal after verification passes through
Equipment sends and starts indicator, and terminal device starts brush machine instrument only after the startup indicator is received, enters
Row brush machine is operated, compared to correlation technique in, directly operation brush machine instrument carries out the mode of brush machine operation, and the embodiment of the present disclosure can
To be verified before brush machine instrument carries out brush machine operation, it is therefore prevented that the brush machine instrument being illegally modified is transported on the terminal device
OK, so as to it is all the brush machine instrument not being illegally modified to realize and carry out the brush machine instrument of brush machine operation, protects user's
Information security and improve brush machine success rate.
Figure 11 is a kind of block diagram of the server for implementing to exemplify according to another exemplary.As shown in figure 11, disclosure reality
The server of example offer is applied on the basis of embodiment illustrated in fig. 10, also including the second receiver module 114, the second judge module
115 and second sending module 116.
Second receiver module 114, is configured to the account and password of receiving terminal apparatus transmission;Wherein, account and password
For terminal device receiving user's input.
Second judge module 115, is configured to judge password according to account, password and the cryptographic check information for prestoring
It is whether correct.
Second sending module 116, when being configured as determining that password is correct, sends parameter configuration to terminal device.
The server that the embodiment of the present disclosure is provided, by arranging the second receiver module, is configured to receiving terminal apparatus and sends out
The account sent and password;Wherein, account and password are terminal device receiving user's input, and the second judge module is configured to
Judge whether password is correct, and the second sending module is configured as according to account, password and the cryptographic check information for prestoring
When determining that password is correct, parameter configuration is sent to terminal device, realize and can be used according to the checking of the account of user input
The password of family input, and after being verified, sends the parameter configuration of brush machine instrument to terminal device, terminal device according to
Parameter configuration runs brush machine instrument, can verify the legitimacy of brush machine account, and, brush machine instrument is made according to parameter configuration
Information is run, so as to further protecting the information security of user and improve brush machine success rate.
Figure 12 is a kind of block diagram of the server according to further example embodiment.As shown in figure 12, disclosure reality
The server of example offer is applied on the basis of embodiment illustrated in fig. 11, password includes:First password and the second password, first password
For user's registration brush machine instrument when the password that arranges.Server also includes the 3rd sending module 121, and, the second receiver module
114 include the first receiving submodule 1141, and the second judge module 115 includes the first judging submodule 1151.
3rd sending module 121, is configured to send second with the frequency made an appointment with terminal device to terminal device
Password.
First receiving submodule 1141, be configured to receiving terminal apparatus transmission account, first password, the second password and
Send the moment of the second password.
First judging submodule 1151, is configured to be sentenced with proper password corresponding with account is prestored according to account
Whether disconnected first password is correct;When it is determined that first password is correct, according to moment and end that the second password is sent to terminal device
The moment of end equipment the second password of transmission determines whether the second password is correct;When it is determined that the second password is correct, determine password just
Really;When it is determined that during first password mistake, determining code error.
The embodiment of the present disclosure provide server, by arrange the 3rd sending module, be configured to terminal device with
The frequency that terminal device is made an appointment sends the second password, and the second receiver module includes the first receiving submodule, is configured to connect
Account, first password, the second password that terminal device sends and the moment for sending the second password are received, the second judge module includes the
One judging submodule, be configured to according to account with prestore whether proper password corresponding with account judges first password
Correctly;When it is determined that first password is correct, second is sent according to moment and terminal device that the second password is sent to terminal device
The moment of password determines whether the second password is correct;When it is determined that the second password is correct, determine that password is correct;When it is determined that first is close
During code mistake, code error is determined, realized when the legitimacy of brush machine account is verified, employ checking first password and second
The mode of password, so as to further protecting the information security of user and improve brush machine success rate.
Figure 13 is a kind of block diagram of the server according to another exemplary embodiment.As shown in figure 13, disclosure reality
The server of example offer is applied on the basis of embodiment illustrated in fig. 11, the second receiver module 114 includes the second receiving submodule
1142, the second judge module 115 includes decrypting submodule 1152 and the second judging submodule 1153.
Second receiving submodule 1142, the password after being configured to the account of receiving terminal apparatus transmission and encrypting.
Wherein, the password after encryption is encrypted shape according to the secret key pair password made an appointment with server for terminal device
Into.
Decryption submodule 1152, the password after being configured to according to key pair encryption are decrypted, and form close after decryption
Code.
Second judging submodule 1153, be configured as determine decryption after password with prestore it is corresponding with account
When proper password is consistent, determine that password is correct;When it is determined that password after decryption with prestore it is corresponding with account correct close
When code is inconsistent, code error is determined.
The server that the embodiment of the present disclosure is provided, by arranging the second receiving submodule, is configured to receiving terminal apparatus
Password after the account of transmission and encryption, wherein, the password after encryption is terminal device according to secret with what server was made an appointment
Key is encrypted what is formed to password, decrypts submodule, and the password after being configured to according to key pair encryption is decrypted, and is formed
Password after decryption, the second judging submodule, be configured as determine decryption after password with prestore it is corresponding with account
Proper password it is consistent when, determine that password is correct;When it is determined that password after decryption with prestore it is corresponding with account correct
When password is inconsistent, code error is determined, realize when the legitimacy of brush machine account is verified, employ and password is entered with key
The form of row encryption is verified, so as to further protecting the information security of user and improve brush machine success rate.
The foregoing describe the built-in function and structure of terminal device.Figure 14 is exemplified according to another exemplary enforcement
Plant the block diagram of server.As shown in figure 14, the server that the embodiment of the present disclosure is provided includes:
Processor 141;
For storing the memory 142 of 141 executable instruction of processor;
Wherein, processor 141 is configured to:
The check value that receiving terminal apparatus send;Wherein, check value is terminal device according to brush machine instrument and check algorithm
Generate;Judge whether brush machine instrument is illegally modified according to check value and the criteria check value for prestoring;If it is determined that brush machine
Instrument is not illegally modified, then send to terminal device and start indicator, so that terminal device starts brush machine instrument.
Figure 15 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.For example, device 800
Can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices,
Body-building equipment, personal digital assistant etc..
With reference to Figure 15, device 800 can include following one or more assemblies:Process assembly 802, memory 804, power supply
Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong
Letter component 816.
The integrated operation of 802 usual control device 800 of process assembly, such as with display, call, data communication, phase
Machine operates and records the associated operation of operation.Process assembly 802 can refer to perform including one or more processors 820
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more modules, just
Interaction between process assembly 802 and other assemblies.For example, process assembly 802 can include multi-media module, many to facilitate
Interaction between media component 808 and process assembly 802.
Memory 804 is configured to store various types of data to support the operation in device 800.These data are shown
Example includes the instruction of any application program or method for operating on device 800, and contact data, telephone book data disappear
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and the touch or slide related duration and pressure.In certain embodiments, many matchmakers
Body component 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 be in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and
Post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody
It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, for interface is provided between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, and the state for various aspects are provided for device 800 is commented
Estimate.For example, sensor cluster 814 can detect the opening/closed mode of device 800, and the relative positioning of component is for example described
Display and keypad of the component for device 800, sensor cluster 814 can be with 800 1 components of detection means 800 or device
Position change, user is presence or absence of with what device 800 was contacted, 800 orientation of device or acceleration/deceleration and device 800
Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect when not having any physical contact
The presence of object nearby.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement
In example, communication component 816 receives the broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, NFC module can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology,
Bluetooth (BT) technology and other technologies are realizing.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realizations, for performing said method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete said method by the processor 820 of device 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
Figure 16 is a kind of block diagram of the brush machine Tool validation device according to an exemplary embodiment.For example, brush machine work
Tool checking device 1900 may be provided in a server.With reference to Figure 16, device 1900 includes process assembly 1922, and which is further
Including one or more processors, and the memory resource by representated by memory 1932, can be by process assembly for storage
The instruction of 1922 execution, such as application program.The application program stored in memory 1932 can including one or one with
On each corresponding to one group of instruction module.Additionally, process assembly 1922 is configured to execute instruction, to perform above-mentioned net
Page front end adjustment method.
Device 1900 can also include that power supply module 1926 be configured to the power management of performs device 1900, one
Wired or wireless network interface 1950 is configured to for device 1900 to be connected to network, and input and output (I/O) interface
1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac
OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is filled by brush machine Tool validation
During the computing device put so that brush machine Tool validation device is able to carry out above-mentioned brush machine Tool validation method.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is filled by brush machine Tool validation
During the computing device put so that brush machine Tool validation device is able to carry out above-mentioned brush machine Tool validation method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claims are pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is limited only by appending claims
System.
Claims (24)
1. a kind of brush machine Tool validation method, it is characterised in that include:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the criteria check value for prestoring
Judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, set to terminal
Preparation send startup indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
2. method according to claim 1, it is characterised in that methods described also includes:
Obtain the account and password of user input;
The account and the password are sent to the server so that the server according to the account, the password and
The cryptographic check information for prestoring judges whether the password is correct, and when it is determined that the password is correct, to the terminal
Equipment sends parameter configuration;
If receiving the parameter configuration that the server sends, the brush is run according to the parameter configuration
Machine instrument.
3. method according to claim 2, it is characterised in that the password includes:First password and the second password;It is described
First password is the password arranged during brush machine instrument described in user's registration;
Methods described also includes:
Second password that the frequency that the server is received to be made an appointment with the terminal device is sent;
Correspondingly, the account and password for obtaining user input, including:
Obtain account, the first password and second password of the user input;
Correspondingly, it is described to include to the server transmission account and the password:
The account, the first password, second password are sent to the server and send second password when
Carve.
4. method according to claim 2, it is characterised in that after the account and password of the receiving user's input, institute
Stating method also includes:
Key according to being made an appointment with the server is encrypted to the password, forms the password after encryption;
Correspondingly, it is described to include to the server transmission account and the password:
The password after the account and the encryption is sent to the server.
5. the method according to any one of claim 1-4, it is characterised in that the checking algorithm is hash algorithm, described
Check value is SHA1 values or MD5 values.
6. a kind of brush machine Tool validation method, it is characterised in that include:
The check value that receiving terminal apparatus send;Wherein, the check value is the terminal device according to brush machine instrument and inspection
What algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, so that institute
State terminal device and start the brush machine instrument.
7. method according to claim 6, it is characterised in that methods described also includes:
Receive account and password that the terminal device sends;Wherein, the account and password are that the terminal device receives use
Family input;
Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring;
If it is determined that the password is correct, then parameter configuration is sent to the terminal device.
8. method according to claim 7, it is characterised in that the password includes:First password and the second password;It is described
First password is the password arranged during brush machine instrument described in user's registration;
Methods described also includes:
Second password is sent with the frequency made an appointment with the terminal device to the terminal device;
Correspondingly, the receiving terminal apparatus send account and password, including:
Receive the account, the first password, second password that the terminal device sends and to send described second close
The moment of code;
Correspondingly, it is described that whether the password is judged according to the account, the password and the cryptographic check information for prestoring
Correctly, including:
Judge whether the first password correct with proper password corresponding with the account is prestored according to the account;
If it is determined that the first password is correct, then according to the moment and the end that second password is sent to the terminal device
The moment of end equipment transmission second password determines whether second password is correct;
If it is determined that second password is correct, it is determined that the password is correct;
If it is determined that the first password mistake, it is determined that the code error.
9. method according to claim 7, it is characterised in that account and password that the receiving terminal apparatus send, bag
Include:
Password after receiving the account of the terminal device transmission and encrypting;Wherein, the password after the encryption is described
Terminal device password according to the secret key pair made an appointment with server is encrypted what is formed;
Correspondingly, it is described that whether the password is judged according to the account, the password and the cryptographic check information for prestoring
Correctly, including:
The password after the encryption is decrypted according to the key, forms the password after decryption;
If it is determined that the password after the decryption is consistent with proper password corresponding with the account is prestored, it is determined that described
Password is correct;
If it is determined that password after the decryption is with to prestore proper password corresponding with the account inconsistent, it is determined that institute
State code error.
10. the method according to any one of claim 6-9, it is characterised in that the checking algorithm is hash algorithm, described
Check value is SHA1 values or MD5 values.
11. methods according to claim 6, it is characterised in that described according to the check value and the standard for prestoring
Check value judge the brush machine instrument whether be illegally modified including:
If it is determined that the check value is identical with the criteria check value, it is determined that the brush machine instrument is not illegally modified;
If it is determined that the check value is differed with the criteria check value, it is determined that the brush machine instrument is illegally modified.
12. a kind of terminal devices, it is characterised in that include:
Generation module, is configured to, when brush machine instrument start-up triggering command is got, be calculated according to the brush machine instrument and inspection
Method generates check value;
First sending module, is configured to send the check value to server, so that the server is according to the check value
And the criteria check value for prestoring judges whether the brush machine instrument is illegally modified, and it is determined that the brush machine instrument does not have
When being illegally modified, send to terminal device and start indicator;
Starting module, when being configured as receiving the startup indicator of the server transmission, starts the brush machine
Instrument.
13. terminal devices according to claim 12, it is characterised in that the terminal device also includes:
Acquisition module, is configured to obtain the account and password of user input;
Second sending module, is configured to send the account and the password to the server, so that the server root
Judge whether the password is correct according to the account, the password and the cryptographic check information for prestoring, and it is determined that described
When password is correct, parameter configuration is sent to the terminal device;
Operation module, when being configured as receiving the parameter configuration of the server transmission, according to the parameter
Configuration information runs the brush machine instrument.
14. terminal devices according to claim 13, it is characterised in that the password includes:First password and second close
Code;The first password is the password arranged during brush machine instrument described in user's registration;
The terminal device also includes:
Receiver module, the frequency for being configured to receive the server to make an appointment with the terminal device send described the
Two passwords;
Correspondingly, the acquisition module includes:
Acquisition submodule, is configured to obtain the account of the user input, the first password and second password;
Correspondingly, second sending module includes:
First sending submodule, is configured to send the account, the first password, second password to the server
And send the moment of second password.
15. terminal devices according to claim 13, it is characterised in that the terminal device also includes:
Encrypting module, is configured to be encrypted the password according to the key made an appointment with the server, is formed and added
Password after close;
Correspondingly, second sending module includes:
Second sending submodule, is configured to the server send the password after the account and the encryption.
16. terminal devices according to any one of claim 12-15, it is characterised in that the checking algorithm is calculated for Hash
Method, the check value are SHA1 values or MD5 values.
17. a kind of servers, it is characterised in that include:
First receiver module, is configured to the check value of receiving terminal apparatus transmission;Wherein, the check value is set for the terminal
For what is generated according to brush machine instrument and check algorithm;
First judge module, is configured to judge the brush machine instrument according to the check value and the criteria check value for prestoring
Whether it is illegally modified;
First sending module, when being configured as determining that the brush machine instrument is not illegally modified, sends out to the terminal device
Startup indicator is sent, so that the terminal device starts the brush machine instrument.
18. servers according to claim 17, it is characterised in that the server also includes:
Second receiver module, is configured to receive account and the password that the terminal device sends;Wherein, the account and password
For the terminal device receiving user's input;
Second judge module, is configured to judge institute according to the account, the password and the cryptographic check information for prestoring
Password is stated whether correct;
Second sending module, when being configured as determining that the password is correct, sends parameter configuration to the terminal device.
19. servers according to claim 18, it is characterised in that the password includes:First password and the second password;
The first password is the password arranged during brush machine instrument described in user's registration;
The server also includes:
3rd sending module, is configured to send described with the frequency made an appointment with the terminal device to the terminal device
Second password;
Correspondingly, second receiver module, including:
First receiving submodule, be configured to receive the account, the first password that the terminal device sends, described the
The moment of two passwords and transmission second password;
Correspondingly, second judge module includes:
First judging submodule, is configured to be sentenced with proper password corresponding with the account is prestored according to the account
Whether the first password that breaks is correct;When it is determined that the first password is correct, described the is sent according to the terminal device
The moment of the moment of two passwords and terminal device transmission second password determines whether second password is correct;When true
When second password is correct calmly, determine that the password is correct;When it is determined that during the first password mistake, determining that the password is wrong
By mistake.
20. servers according to claim 18, it is characterised in that second receiver module includes:
Second receiving submodule, is configured to receive the account of the terminal device transmission and the password after encryption;Wherein,
Password after the encryption is that terminal device password according to the secret key pair made an appointment with server is encrypted shape
Into;
Correspondingly, second judge module includes:
Decryption submodule, is configured to be decrypted the password after the encryption according to the key, forms close after decryption
Code;
Second judging submodule, the password after being configured as determining the decryption with prestore it is corresponding with the account
When proper password is consistent, determine that the password is correct;When it is determined that password after the decryption with prestore and the account
When corresponding proper password is inconsistent, the code error is determined.
21. servers according to any one of claim 17-20, it is characterised in that the checking algorithm is hash algorithm,
The check value is SHA1 values or MD5 values.
22. servers according to claim 17, it is characterised in that first judge module includes:
3rd judging submodule, when being configured as determining that the check value is identical with the criteria check value, determines the brush
Machine instrument is not illegally modified;When it is determined that the check value is differed with the criteria check value, the brush machine work is determined
Tool is illegally modified.
23. a kind of terminal devices, it is characterised in that include:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
When brush machine instrument start-up triggering command is got, check value is generated according to the brush machine instrument and check algorithm;
The check value is sent to server, so that the server is according to the check value and the criteria check value for prestoring
Judge whether the brush machine instrument is illegally modified, and when it is determined that the brush machine instrument is not illegally modified, set to terminal
Preparation send startup indicator;
If receiving the startup indicator that the server sends, start the brush machine instrument.
24. a kind of servers, it is characterised in that include:
Processor;
For storing the memory of the processor executable;
Wherein, the processor is configured to:
The check value that receiving terminal apparatus send;Wherein, the check value is the terminal device according to brush machine instrument and inspection
What algorithm was generated;
Judge whether the brush machine instrument is illegally modified according to the check value and the criteria check value for prestoring;
If it is determined that the brush machine instrument is not illegally modified, then sends to the terminal device and start indicator, so that institute
State terminal device and start the brush machine instrument.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930638.4A CN106534083B (en) | 2016-10-31 | 2016-10-31 | Brush machine Tool validation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610930638.4A CN106534083B (en) | 2016-10-31 | 2016-10-31 | Brush machine Tool validation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534083A true CN106534083A (en) | 2017-03-22 |
CN106534083B CN106534083B (en) | 2019-07-23 |
Family
ID=58292844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610930638.4A Active CN106534083B (en) | 2016-10-31 | 2016-10-31 | Brush machine Tool validation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534083B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992857A (en) * | 2017-03-30 | 2017-07-28 | 努比亚技术有限公司 | A kind of brush machine verification method and device |
CN107360165A (en) * | 2017-07-13 | 2017-11-17 | 北京元心科技有限公司 | Terminal device, cloud server and method and device for managing and controlling operating system |
CN110659477A (en) * | 2019-09-23 | 2020-01-07 | 深圳市网心科技有限公司 | Anti-flash protection method and system for android device, android device and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
CN104123505A (en) * | 2014-07-24 | 2014-10-29 | 丹阳市广播电视台 | Android intelligent device anti-getroot system and calibration method thereof |
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
CN105183499A (en) * | 2015-08-04 | 2015-12-23 | 上海青橙实业有限公司 | ROM flashing method, mobile terminal and terminal system |
CN105373747A (en) * | 2015-12-09 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | File generation method, file verification method and systems for preventing system from being tampered |
-
2016
- 2016-10-31 CN CN201610930638.4A patent/CN106534083B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
CN104123505A (en) * | 2014-07-24 | 2014-10-29 | 丹阳市广播电视台 | Android intelligent device anti-getroot system and calibration method thereof |
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
CN105183499A (en) * | 2015-08-04 | 2015-12-23 | 上海青橙实业有限公司 | ROM flashing method, mobile terminal and terminal system |
CN105373747A (en) * | 2015-12-09 | 2016-03-02 | 上海斐讯数据通信技术有限公司 | File generation method, file verification method and systems for preventing system from being tampered |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992857A (en) * | 2017-03-30 | 2017-07-28 | 努比亚技术有限公司 | A kind of brush machine verification method and device |
CN106992857B (en) * | 2017-03-30 | 2020-11-10 | 义乌国信土地规划咨询有限公司 | Machine-swiping verification method and device |
CN107360165A (en) * | 2017-07-13 | 2017-11-17 | 北京元心科技有限公司 | Terminal device, cloud server and method and device for managing and controlling operating system |
CN107360165B (en) * | 2017-07-13 | 2021-02-12 | 北京元心科技有限公司 | Terminal device, cloud server and method and device for managing and controlling operating system |
CN110659477A (en) * | 2019-09-23 | 2020-01-07 | 深圳市网心科技有限公司 | Anti-flash protection method and system for android device, android device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106534083B (en) | 2019-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3657370B1 (en) | Methods and devices for authenticating smart card | |
CN104852911B (en) | Safe verification method, apparatus and system | |
CN107241688A (en) | Signature, verification method, device and the storage medium of application installation package | |
CN108269334A (en) | Method for unlocking, terminal device and smart lock | |
CN104125067B (en) | Account and token secret key binding method and device | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN104091376A (en) | Intelligent lock control method and apparatus thereof | |
CN106453052A (en) | Message interaction method and apparatus thereof | |
TWI761843B (en) | Access control method and device, electronic device and storage medium | |
CN104484593B (en) | terminal verification method and device | |
EP2978162A1 (en) | Anti-counterfeiting verification method, device and system | |
CN104468581B (en) | The method and device of login application program | |
CN107766701A (en) | Electronic equipment, dynamic library file guard method and device | |
CN109039860A (en) | Send and show method and device, the identity authentication method and device of message | |
CN106060098A (en) | Processing method, processing device and processing system for verification codes | |
CN106060027B (en) | Method, apparatus, equipment and the system verified based on identifying code | |
CN104158665A (en) | Method and device of verification | |
CN106709284A (en) | Root package validation method and device | |
CN106534083A (en) | Root tool verification method and apparatus | |
CN111917728A (en) | Password verification method and device | |
CN113055169B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN106295363A (en) | Startup calibration method and device | |
EP3249566B1 (en) | Method and device for encrypting application | |
CN107911380A (en) | Auth method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |