CN112733092B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN112733092B
CN112733092B CN202011631583.XA CN202011631583A CN112733092B CN 112733092 B CN112733092 B CN 112733092B CN 202011631583 A CN202011631583 A CN 202011631583A CN 112733092 B CN112733092 B CN 112733092B
Authority
CN
China
Prior art keywords
client
image file
channel source
encryption
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011631583.XA
Other languages
Chinese (zh)
Other versions
CN112733092A (en
Inventor
贾学文
彭飞
邓竹立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
58tongcheng Information Technology Co ltd
Original Assignee
Wuba Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuba Co Ltd filed Critical Wuba Co Ltd
Priority to CN202011631583.XA priority Critical patent/CN112733092B/en
Publication of CN112733092A publication Critical patent/CN112733092A/en
Application granted granted Critical
Publication of CN112733092B publication Critical patent/CN112733092B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Abstract

The application discloses an information processing method and device. Under the condition that the memory loads the image file of the client, a first initial address of the image file in the memory is obtained, and the image file at least comprises a loading instruction set of the client. And searching a loading instruction with a preset encryption type in a loading instruction set included in the image file according to the first starting address. Determining an encryption field in a load instruction of a preset encryption type; the encryption field records encryption identification information for indicating whether to encrypt the function instruction of the client in the mirror image file. And acquiring the encrypted identification information in the encrypted field. And if the encryption identification information is used for indicating that the function instruction is not encrypted, determining that the channel source of the client is an unofficial channel source. By the method and the device, the accuracy of detecting the channel source of the client can be improved, and the safety of data can be further improved, for example, a lawbreaker is prevented from illegally crawling the data of the server by using the client with the source of an unofficial channel.

Description

Information processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method and apparatus.
Background
Currently, the client of the iOS (apple operating system) includes multiple versions, for example, a development version, an enterprise version, a TestFlight (grayscale) version, an App Store version, and the like, wherein the clients of the TestFlight (grayscale) version and the App Store version can be directly installed on the App Store of the iOS for downloading by users, that is, the clients of the TestFlight (grayscale) version and the App Store version are clients from official channels.
The background server corresponding to the client can provide multiple functions for the client, and in order to improve the data security, some specific functions are only opened to clients (clients of a TestFlight version and an App Store version) of official channel sources, but not to clients of unofficial channel sources.
Therefore, before the client side can enjoy the specific functions, it is required to check whether the channel source of the client side is the official channel source, and the client side can enjoy the specific functions only when the channel source of the client side is the official channel source.
In one approach, it may be verified by the mobileprovision file whether the channel source of the client is an official channel source.
The mobileprovision file may be a description file of signature information of the client, and in a general case, the mobileprovision file exists in the client of an unofficial channel source such as a development version client and an enterprise version client, and the mobileprovision file does not exist in the client of an official channel source such as a TestFlight version client and an App Store version client.
Thus, a system standard API may be used to call the query function to query whether a mobile provision file exists in the client through the query function, determine that the channel source of the client is an unofficial channel source when the result returned by the query function indicates that the mobile provision file exists in the client, and determine that the channel source of the client is an official channel source when the result returned by the query function indicates that the mobile provision file does not exist in the client.
However, the inventor finds that a lawbreaker can load a hook function on a client from an unofficial channel source and then modify a query result returned by the query function using the hook function so that the query result indicates that no mobileprovision file exists in the client, and thus, the channel source of the client from the unofficial channel source is determined as the official channel source by mistake, and then the client from the unofficial channel source can still enjoy a specific function of the background server, thereby reducing the security of data.
Disclosure of Invention
In order to improve the security of data, the application shows an information processing method and device.
In a first aspect, the present application shows an information processing method applied to an electronic device, the method including:
under the condition that a memory of the electronic equipment loads an image file of the client, acquiring a first initial address of the image file in the memory, wherein the image file at least comprises a loading instruction set;
according to the first starting address, searching a loading instruction of a preset encryption type in the loading instruction set included in the image file;
determining an encryption field in a load instruction of a preset encryption type; the encryption field records encryption identification information used for indicating whether the function instruction of the client in the image file is encrypted or not;
acquiring the encrypted identification information in the encrypted field;
and under the condition that the encryption identification information is used for indicating that the function instruction is not encrypted, determining that the channel source of the client is an unofficial channel source.
In an optional implementation, the method further includes:
and under the condition that the encryption identification information is used for indicating that the function instruction is encrypted, determining that the channel source of the client is an official channel source.
In an optional implementation manner, the image file further includes a header file;
the searching for a load instruction of a preset encryption type in the load instruction set included in the image file according to the first start address includes:
acquiring the space size occupied by the header file;
acquiring a second initial address of the loading instruction set in the memory according to the first initial address and the space size;
acquiring the number of the loading instructions recorded in the header file and included in the loading instruction set;
and searching the loading instruction of the preset encryption type in the loading instruction set in the image file according to the number and the second starting address.
In an optional implementation manner, the obtaining a second starting address of the load instruction set in the memory according to the first starting address and the space size includes:
and calculating the sum of the first starting address and the space size to obtain a memory address, and using the memory address as the second starting address.
In an optional implementation, the method further includes:
and reporting abnormal information to a server side under the condition that the channel source of the client side is an unofficial channel source, wherein the abnormal information is used for indicating that the channel source of the client side is the unofficial channel source.
In an optional implementation, the method further comprises:
and closing the use permission of at least part of functions of the client under the condition that the channel source of the client is an unofficial channel source.
In an optional implementation, the apparatus further comprises:
outputting updating prompt information, wherein the updating prompt information is used for prompting that the client is updated to be a client of an official channel source; the update prompt information at least comprises a download link of the client from an official channel.
In a second aspect, the present application shows an information processing method applied to an electronic device, where the information processing method includes:
a first obtaining module, configured to obtain a first starting address of an image file in a memory of the electronic device when the image file of the client is loaded in the memory, where the image file at least includes a loading instruction set;
the searching module is used for searching a loading instruction of a preset encryption type in the loading instruction set included in the image file according to the first starting address;
the first determining module is used for determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information used for indicating whether to encrypt the function instruction of the client in the image file;
a second obtaining module, configured to obtain the encrypted identification information in the encrypted field;
and the second determining module is used for determining that the channel source of the client is an unofficial channel source under the condition that the encryption identification information is used for indicating that the function instruction is not encrypted.
In an optional implementation manner, the apparatus further includes:
and the third determining module is used for determining that the channel source of the client is an official channel source under the condition that the encryption identification information is used for indicating that the function instruction is encrypted.
In an optional implementation, the image file further includes a header file;
the searching module comprises:
a first acquisition unit configured to acquire a size of a space occupied by the header file;
a second obtaining unit, configured to obtain a second start address of the load instruction set in the memory according to the first start address and the space size;
a third obtaining unit, configured to obtain the number of load instructions included in the load instruction set that are recorded in the header file;
and the searching unit is used for searching the loading instruction of the preset encryption type in the loading instruction set in the image file according to the number and the second starting address.
In an optional implementation manner, the second obtaining unit is specifically configured to: and calculating the sum of the first starting address and the space size to obtain a memory address, and using the memory address as the second starting address.
In an optional implementation, the apparatus further comprises:
the reporting module is used for reporting abnormal information to the server side under the condition that the channel source of the client side is an unofficial channel source, wherein the abnormal information is used for indicating that the channel source of the client side is the unofficial channel source.
In an optional implementation manner, the apparatus further includes:
and the closing module is used for closing the use permission of at least part of functions of the client under the condition that the channel source of the client is an unofficial channel source.
In an optional implementation, the apparatus further comprises:
the output module is used for outputting updating prompt information, and the updating prompt information is used for prompting that the client is updated to be a client of an official channel source; the update prompt information at least comprises a download link of the client from the official channel.
In a third aspect, the present application shows an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method of the first aspect.
In a fourth aspect, the present application shows a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
In a fifth aspect, the present application shows a computer program product, in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
The technical scheme provided by the application can comprise the following beneficial effects:
after the client development is completed, the client may be launched to a server corresponding to each operating system, for example, a server corresponding to an android operating system and a server corresponding to an IOS operating system, where the server corresponding to the operating system may encrypt a function instruction of the client in an image file in the client using a specific encryption algorithm to obtain an encrypted function instruction, and then replace an unencrypted function instruction of the client in the image file with the encrypted function instruction, and determine a loading instruction of a preset encryption type in a loading instruction set included in the image file, and then update encryption identification information in an encryption field of the loading instruction of the preset encryption type, for example, replace encryption identification information in the encryption field used for indicating that the function instruction of the client in the image file is encrypted with encryption identification information used for indicating that the function instruction of the client in the image file is not encrypted.
Then, the server can upload the client from the official channel of the server, so that the client can be downloaded and used by a large number of users.
After a user downloads and installs a client using an electronic device (having an operating system, such as an android operating system or an IOS operating system, etc.), the user can run the client on the electronic device to enjoy the functions of the client.
When the client is operated on the electronic device, the client can load the image file into a memory of the electronic device, and under the condition that the function of the client needs to be realized, a load instruction of a preset encryption type can be determined in a load instruction set included in the image file, encryption identification information in an encryption field of the load instruction of the preset encryption type is obtained, the encryption identification information can be obtained and used for indicating that the function instruction of the client in the image file is encrypted, then the encrypted function instruction of the client in the image file is decrypted by using a decryption algorithm corresponding to a specific encryption algorithm, an original (unencrypted) function instruction is obtained, and then the function of the client is realized based on the original function instruction.
In general, a function instruction of a client in an image file in a client (a client from an unofficial channel) that is not issued by a background server of an operating system is not encrypted, and in a load instruction of a preset encryption type in a load instruction set in the image file, encryption identification information in an encryption field is used to indicate that the function instruction of the client in the image file is not encrypted.
In view of this, in the present application, when the memory of the electronic device loads the image file of the client, a first starting address of the image file of the client in the memory is obtained, where the image file of the client at least includes a loading instruction set of the client. And searching a loading instruction with a preset encryption type in a loading instruction set included in the image file of the client according to the first starting address. Determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information for indicating whether to encrypt the function instruction of the client in the mirror image file. And acquiring the encrypted identification information in the encrypted field. And judging whether the encryption identification information is used for indicating the encryption of the function instruction of the client in the image file of the client. And under the condition that the encryption identification information is used for indicating that the function instruction of the client in the mirror image file of the client is not encrypted, determining that the channel source of the client is an unofficial channel source.
By the method and the device, a system standard API is not used for calling the query function, whether the mobile provisioning file exists in the client side or not can be queried through the query function, and the channel source of the client side can be determined according to the result returned by the query function. Therefore, the method avoids the illegal method that a lawbreaker modifies the query result to bypass detection by loading a hook function on the client end of the source of the unofficial channel and then modifying the query result returned by the query function by using the hook function so that the query result indicates that the mobileprovision file does not exist in the client end.
Therefore, the accuracy of detecting the channel source of the client can be improved through the method and the device, and the safety of data can be further improved, for example, a lawbreaker is prevented from illegally crawling the data of the server by using the client with the source of an unofficial channel.
Drawings
Fig. 1 is a flowchart of the steps of an information processing method of the present application.
Fig. 2 is a block diagram of a configuration of an information processing apparatus according to the present application.
Fig. 3 is a block diagram of an electronic device shown in the present application.
Fig. 4 is a block diagram of an electronic device shown in the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating steps of an information processing method according to the present application is shown, where the method is applied to an electronic device, and the method may specifically include the following steps:
in step S101, under the condition that the memory of the electronic device loads the image file of the client, a first start address of the image file of the client in the memory is obtained, where the image file of the client at least includes a loading instruction set of the client.
In the application, when a user needs to start a client on an electronic device, a start operation for starting the client may be input on the electronic device, and the electronic device may start the client after receiving the start operation, for example, the electronic device may load an image file of the client in a memory of the electronic device.
In addition, the electronic device may further record an address field (including a start address, an end address, and the like) of the image file in the memory, and may form a corresponding entry from the client identifier of the client and the address field of the image file of the client in the memory, and store the corresponding entry in the corresponding relationship between the client identifier and the address field. Wherein the client identifications of different clients are different.
Thus, in this step, when the first start address of the image file of the client in the memory is obtained, the identifier of the client may be obtained, then the address segment corresponding to the client identifier of the client is searched in the correspondence between the client identifier and the address segment, and then the minimum address in the address segment is obtained and used as the first start address of the image file in the memory.
In step S102, a load instruction of a preset encryption type is searched in a load instruction set included in the image file of the client according to the first start address.
In an embodiment of the present application, the image file of the client further includes a header file. Wherein, this step can be realized through the following process, including:
1021. and acquiring the space occupied by the header file in the mirror image file of the client.
In this application, the image file of the client includes at least a header file and a loading instruction set, and the location of the header file in the image file is adjacent to the location of the loading instruction set in the image file, and the location of the header file in the image file is located before the location of the loading instruction set in the image file.
In addition, in the data structure of the image file of the client, the size of the space occupied by the header file is often fixed, and may be, for example, one value of 30 bytes to 40 bytes. The occupied space size of the header file can be fixedly stored in a specific storage space of the electronic device in advance,
in this way, in this step, the size of the space stored in the specific storage space can be obtained and used as the size of the space occupied by the header file in the image file of the client.
1022. And acquiring a second initial address of a loading instruction set in the mirror image file of the client in the memory according to the first initial address of the mirror image file of the client in the memory and the space occupied by the header file in the mirror image file of the client.
In this application, the image file of the client includes at least a header file and a loading instruction set, and the location of the header file in the image file is adjacent to the location of the loading instruction set in the image file, and the location of the header file in the image file is located before the location of the loading instruction set in the image file.
Thus, when the mirror image file of the client is loaded in the memory of the electronic device, the address field of the header file in the mirror image file in the memory is adjacent to the address field of the loading instruction set in the mirror image file in the memory, and the address field of the header file in the mirror image file in the memory is located before the address field of the loading instruction set in the mirror image file in the memory.
The length of the address field of the header file in the mirror image file in the memory is the size of the space occupied by the header file in the mirror image file.
Therefore, in order to determine the second start address of the loading instruction set of the image file in the memory, the sum of the first start address of the image file in the memory and the size of the space occupied by the header file in the image file may be calculated to obtain a memory address, and the memory address may be used as the second start address of the loading instruction set in the memory.
1023. And acquiring the number of the loading instructions which are recorded in the header file of the mirror image file and are included in the loading instruction set.
In this application, the header file of the image file further records the number of the load instructions included in the load instruction set in the image file, so that all the instructions in the load instruction set can be determined in the memory according to the number and the second start address of the load instruction set in the memory.
1024. And searching the loading instruction with the preset encryption type in the loading instruction set in the image file of the client according to the number and the second initial address of the loading instruction set in the memory.
For example, in one approach, the load instructions are traversed from the second memory address in the memory until the number of load instructions are traversed, and thus the traversed load instructions are all load instructions in the load instruction set in the image file of the client.
And then searching the traversed load instruction for a load instruction with a preset encryption type.
Each load instruction has a type field therein for indicating the type of the load instruction. The type field in the load instruction with the preset ENCRYPTION type stores a specific type identifier, such as LC _ ENCRYPTION _ INFO.
Therefore, the load instruction with the specific type identifier stored in the type field can be searched in the traversed load instruction and used as the load instruction with the preset encryption type. For example, a load instruction with the type field storing "LC _ ENCRYPTION _ INFO" is searched in the traversed load instruction, and is used as a load instruction with a preset ENCRYPTION type.
If the preset encryption type load instructions in the load instruction set are searched in the image file only according to the second starting address, but the number of the load instructions included in the load instruction set is not combined, the electronic device only knows that the load instructions are traversed from the second starting address of the memory, but does not know under what conditions, the traversal may be ended after the second starting address of the memory is traversed to the last address of the memory, and then the preset encryption type load instructions in the load instruction set are searched in all the traversed contents.
However, in a general situation, the load instruction in the load instruction set of the image file often occupies only a portion of the memory after the second start address of the slave memory, and does not occupy all the memory after the second start address of the slave memory, so that the traversed load instruction may have a load instruction that is not located in the load instruction set of the image file, so that the electronic device traverses contents that may not be traversed, and thus efficiency of searching for the load instruction of the preset encryption type in the load instruction set in the image file may be reduced.
Therefore, according to the number of the loading instructions and the second starting address included in the loading instruction set, the loading instructions of the preset encryption type in the loading instruction set are searched in the image file, and the traversal under what condition can be finished can be known according to the number of the loading instructions included in the loading instruction set, so that the situation that the second starting address of the memory is traversed to the last address of the memory all the time is avoided, the situation that the contents which can not be traversed are traversed can be avoided, and the efficiency of searching the loading instructions of the preset encryption type in the loading instruction set in the image file can be improved.
In step S103, determining an encryption field in the load instruction of the preset encryption type; the encryption field records encryption identification information for indicating whether to encrypt the function instruction of the client in the mirror image file.
In this application, the functional instructions include instructions for implementing business logic of the client, and the like.
In step S104, the encryption identification information in the encryption field is acquired.
In step S105, it is determined whether the encryption identification information is used to indicate encryption of a function instruction of the client in the image file of the client.
In an embodiment of the present application, in a case that the encryption identification information is first preset encryption identification information, it may be determined that the encryption identification information is used to indicate that the function instruction of the client in the mirror file has been encrypted, and the first preset encryption identification information may be "1" or the like.
In another embodiment of the present application, in a case that the encryption identification information is second preset encryption identification information, it may be determined that the encryption identification information is used for indicating that the function instruction of the client in the mirror file is not encrypted, and the second preset encryption identification information may be "0" or the like.
In the case where the encryption identification information is used to indicate that the function instruction of the client in the image file of the client is not encrypted, in step S106, it is determined that the channel source of the client is an unofficial channel source.
In the case where the encryption identification information is used to indicate that the function instruction of the client in the image file of the client has been encrypted, in step S107, it is determined that the channel source of the client is an official channel source.
After the client is developed, the client may be launched to a server corresponding to each operating system, for example, a server corresponding to an android operating system and a server corresponding to an IOS operating system, where the server corresponding to the operating system may encrypt a function instruction of the client in an image file in the client using a specific encryption algorithm to obtain an encrypted function instruction, and then replace an unencrypted function instruction of the client in the image file with the encrypted function instruction, and determine a load instruction of a preset encryption type in a load instruction set included in the image file, and then update encryption identification information in an encryption field of the load instruction of the preset encryption type, for example, use encryption identification information used for indicating that the function instruction of the client in the image file is encrypted, and replace encryption identification information used for indicating that the function instruction of the client in the image file is not encrypted in the encryption field.
Then, the server can upload the client from the official channel of the server, so that the client can be downloaded and used by a large number of users.
After a user downloads and installs a client using an electronic device (having an operating system, such as an android operating system or an IOS operating system, etc.), the user can run the client on the electronic device to enjoy the functions of the client.
When the client is operated on the electronic device, the client can load the image file into a memory of the electronic device, and under the condition that the function of the client needs to be realized, a loading instruction with a preset encryption type can be determined in a loading instruction set included in the image file, encryption identification information in an encryption field of the loading instruction with the preset encryption type is obtained, the encryption identification information can be obtained and used for indicating that the function instruction of the client in the image file is encrypted, then a decryption algorithm corresponding to a specific encryption algorithm is used for decrypting the encrypted function instruction of the client in the image file, an original (unencrypted) function instruction is obtained, and then the function of the client is realized based on the original function instruction.
In general, a function instruction of a client in an image file in a client (a client from an unofficial channel) that is not issued by a background server of an operating system is not encrypted, and in a load instruction of a preset encryption type in a load instruction set in the image file, encryption identification information in an encryption field is used to indicate that the function instruction of the client in the image file is not encrypted.
In view of this, in the present application, when the memory of the electronic device loads the image file of the client, a first starting address of the image file of the client in the memory is obtained, where the image file of the client at least includes a loading instruction set of the client. And searching a loading instruction with a preset encryption type in a loading instruction set included in the image file of the client according to the first starting address. Determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information for indicating whether to encrypt the function instruction of the client in the mirror image file. And acquiring the encrypted identification information in the encrypted field. And judging whether the encryption identification information is used for indicating the encryption of the function instruction of the client in the image file of the client. And under the condition that the encryption identification information is used for indicating that the function instruction of the client in the image file of the client is not encrypted, determining that the channel source of the client is an unofficial channel source.
By the method and the device, a system standard API is not used for calling the query function, whether the mobile provision file exists in the client side can be queried without the query function, and the channel source of the client side can be determined without the result returned by the query function. Therefore, the method avoids the illegal means that a lawbreaker loads a hook function on a client from an unofficial channel source and then modifies a query result returned by the query function by using the hook function so that the query result indicates that no mobileprovision file exists in the client so as to modify the query result to bypass detection.
Therefore, the accuracy of detecting the channel source of the client can be improved through the method and the device, and the safety of data can be further improved, for example, lawless persons are prevented from illegally crawling the data of the server by using the client of the unofficial channel source.
In addition, the channel source detection method for the client is not easy to bypass detection by lawless persons.
For example, on the basis of the present application, in one case, if a lawbreaker is in a load instruction set included in an image file in a client from an unofficial channel, the encrypted identification information in the encrypted field in the load instruction of the preset encryption type is privately modified to: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted.
Through the scheme of the application, the client side of the lawless persons from the unofficial channel can be mistakenly judged as the client side of the official channel source, and the detection of the application can be escaped.
However, in practice, in the process that the client runs on the electronic device, the operating system of the electronic device detects, in the load instruction set included in the image file, that the encryption identification information in the encryption field in the load instruction of the preset encryption type is: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted, so that the function instruction of the client in the mirror image file is decrypted by using a decryption algorithm corresponding to a specific encryption algorithm.
However, since the function instruction of the client in the image file is not obtained by using the specific encryption algorithm for encryption, an error, such as a messy code output, may occur when the decryption algorithm corresponding to the specific encryption algorithm is used for decrypting the function instruction of the client in the image file, which may result in that the function instruction of the client cannot be run, and thus the function of the client cannot be realized.
In view of this, because "in the load instruction set included in the image file in the client from the unofficial channel, the encrypted identification information in the encrypted field in the load instruction of the preset encryption type is privately modified to be: the encrypted identification information "for indicating that the function instruction of the client in the mirror file has been encrypted" may result in "the function instruction of the client cannot be run, and thus the function of the client cannot be realized".
Therefore, in order to realize part of functions of the client from the unofficial channel, a lawbreaker usually does not "modify the encryption identification information in the encryption field in the load instruction of the preset encryption type privately into a load instruction set included in the image file in the client from the unofficial channel: encrypted identification information "indicating that the function instructions of the client in the mirror file have been encrypted, in which case the client that is the source of the unofficial channel can be detected in the manner of the present application.
Service end corresponding to operating system
On the basis of the application, under another condition, if a lawbreaker in a loading instruction set included in an image file in a client from an unofficial channel, privately modifying encryption identification information in an encryption field in a loading instruction with a preset encryption type into: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted. And the lawbreaker uses an encryption algorithm to encrypt the function instruction of the client in the image file in the client to obtain the encrypted function instruction, and then uses the encrypted function instruction to replace the unencrypted function instruction of the client in the image file.
Through the scheme of the application, the client side of the non-official channel source of the lawless person can be mistakenly judged as the client side of the official channel source, and the detection of the application can be escaped.
However, in practice, since the specific encryption algorithm of the operating system and the decryption algorithm corresponding to the specific encryption algorithm are kept secret, a lawless person can hardly steal the specific encryption algorithm of the operating system and the decryption algorithm corresponding to the specific encryption algorithm, and thus, even if the lawless person encrypts the function instruction of the client in the image file in the client, the encryption algorithm used is different from the specific encryption algorithm.
And in the process that the client runs on the electronic device, an operating system of the electronic device detects that the encryption identification information in the encryption field in the loading instruction of the preset encryption type is: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted, so that the encrypted function instruction of the client in the mirror image file can be decrypted by using a decryption algorithm corresponding to a specific encryption algorithm.
However, since the encrypted functional instruction of the client in the image file is not encrypted by using a specific encryption algorithm, for example, the specific encryption algorithm of the operating system is different from the encryption algorithm used by the lawbreaker, and the decryption algorithm corresponding to the specific encryption algorithm of the operating system is different from the decryption algorithm corresponding to the encryption algorithm used by the lawbreaker, the decryption of the "encrypted functional instruction encrypted by using the encryption algorithm" by using the decryption algorithm corresponding to the specific encryption algorithm may cause an error, for example, a messy code is output, which may result in that the functional instruction of the client cannot be run, and further, the function of the client cannot be realized.
In view of this, since "in the load instruction set included in the image file in the client from the unofficial channel, the encryption identification information in the encryption field in the load instruction of the preset encryption type is privately modified to be: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted. And a lawbreaker uses an encryption algorithm to encrypt the function instruction of the client in the image file in the client to obtain an encrypted function instruction, and then uses the encrypted function instruction to replace the unencrypted function instruction of the client in the image file, which can cause that the function instruction of the client cannot be operated, and further the function of the client cannot be realized.
Therefore, in order to realize part of functions of the client from the unofficial channel, a lawbreaker usually does not "modify the encryption identification information in the encryption field in the load instruction of the preset encryption type privately into a load instruction set included in the image file in the client from the unofficial channel: and the encryption identification information is used for indicating that the function instruction of the client in the mirror image file is encrypted. And a lawbreaker encrypts the function instruction of the client in the image file in the client by using an encryption algorithm to obtain an encrypted function instruction, and then replaces the unencrypted function instruction of the client in the image file by using the encrypted function instruction.
Further, in another embodiment of the application, in the case that the channel source of the client is an unofficial channel source, the usage right of at least part of the functions of the client may be closed. For example, the client may actively turn off some specific functions, so that the specific functions are disabled, and the specific functions cannot be triggered to be used on the client, and the specific functions may be functions that are specified on the client by a technician in the process of developing the client in advance, and specific functions may be determined according to actual situations, and are not described in detail herein.
In another embodiment of the present application, in a case that the channel source of the client is an unofficial channel source, the server may be reported with exception information, where the exception information is used to indicate that the channel source of the client is an unofficial channel source. The abnormal information may include a Media Access Control (MAC) Address of the electronic device where the client is located, an Internet Protocol (IP) Address of the electronic device, an Identity Document (ID) of a user logged in the client, current location information of the electronic device, log information of the client, and the like.
The server may include a background server corresponding to the client, and the like. The client and the background server corresponding to the client can belong to the same manufacturer.
After the server obtains the abnormal information, the server can perceive that the channel source of the client is an unofficial channel source according to the abnormal information, and some functions need to be disabled for the client with the unofficial channel source, so that the server can locate the client according to at least one of the information of the MAC address of the electronic device where the client is located, the IP address of the electronic device, the ID of the user logged in the client and the like in the abnormal information, and then disable the functions of the client on the server side.
For example, the client from the unofficial channel may disable the payment function, and the payment function needs to be assisted by the server, so that the server may refuse to respond to the payment request when the client sends the payment request to the server, so that the client cannot use the payment function.
Further, in another embodiment of the present application, an update prompt message may be output, where the update prompt message is used to prompt the client to update the client to the source of the official channel; the update prompt message at least comprises a download link of the client from the official channel. So that the user using the client can download the client installed with the official channel source based on the download link in the update prompt, and further can use the more comprehensive functions of the client.
It is noted that for simplicity of description, the method embodiments are shown as a series of acts or combinations, but those skilled in the art will recognize that the present application is not limited by the order of acts, as some steps may, in accordance with the present application, occur in other orders or concurrently. Further, those skilled in the art will also appreciate that the embodiments described in the specification are exemplary and that no action is necessarily required in this application.
Referring to fig. 2, a block diagram of an information processing apparatus according to the present application is shown, and the information processing apparatus is applied to an electronic device, and the apparatus may specifically include the following modules:
a first obtaining module 11, configured to obtain a first starting address of an image file in a memory of the electronic device when the memory of the electronic device loads the image file of the client, where the image file at least includes a loading instruction set;
a searching module 12, configured to search, according to the first start address, a load instruction of a preset encryption type in the load instruction set included in the image file;
a first determining module 13, configured to determine an encrypted field in a load instruction of a preset encryption type; the encryption field records encryption identification information used for indicating whether to encrypt the function instruction of the client in the image file;
a second obtaining module 14, configured to obtain the encrypted identification information in the encrypted field;
a second determining module 15, configured to determine that the channel source of the client is an unofficial channel source when the encryption identification information is used to indicate that the function instruction is not encrypted.
In an optional implementation, the apparatus further comprises:
and the third determining module is used for determining that the channel source of the client is an official channel source under the condition that the encryption identification information is used for indicating that the function instruction is encrypted.
In an optional implementation manner, the image file further includes a header file;
the searching module comprises:
a first obtaining unit configured to obtain a size of a space occupied by the header file;
a second obtaining unit, configured to obtain a second start address of the load instruction set in the memory according to the first start address and the space size;
a third obtaining unit, configured to obtain the number of load instructions included in the load instruction set that are recorded in the header file;
and the searching unit is used for searching the loading instruction of the preset encryption type in the loading instruction set in the image file according to the number and the second starting address.
In an optional implementation manner, the second obtaining unit is specifically configured to: and calculating the sum of the first starting address and the space size to obtain a memory address, and using the memory address as the second starting address.
In an optional implementation, the apparatus further comprises:
the reporting module is used for reporting abnormal information to the server side under the condition that the channel source of the client side is an unofficial channel source, wherein the abnormal information is used for indicating that the channel source of the client side is the unofficial channel source.
In an optional implementation, the apparatus further comprises:
and the closing module is used for closing the use permission of at least part of functions of the client under the condition that the channel source of the client is an unofficial channel source.
In an optional implementation manner, the apparatus further includes:
the output module is used for outputting updating prompt information, and the updating prompt information is used for prompting that the client is updated to be a client of an official channel source; the update prompt information at least comprises a download link of the client from the official channel.
After the client development is completed, the client may be launched to a server corresponding to each operating system, for example, a server corresponding to an android operating system and a server corresponding to an IOS operating system, where the server corresponding to the operating system may encrypt a function instruction of the client in an image file in the client using a specific encryption algorithm to obtain an encrypted function instruction, and then replace an unencrypted function instruction of the client in the image file with the encrypted function instruction, and determine a loading instruction of a preset encryption type in a loading instruction set included in the image file, and then update encryption identification information in an encryption field of the loading instruction of the preset encryption type, for example, replace encryption identification information in the encryption field used for indicating that the function instruction of the client in the image file is encrypted with encryption identification information used for indicating that the function instruction of the client in the image file is not encrypted.
Then, the server can upload the client from the official channel of the server, so that the client can be downloaded and used by the majority of users.
After a user downloads and installs a client using an electronic device (having an operating system, such as an android operating system or an IOS operating system), the user can run the client on the electronic device to enjoy the functions of the client.
When the client is operated on the electronic device, the client can load the image file into a memory of the electronic device, and under the condition that the function of the client needs to be realized, a load instruction of a preset encryption type can be determined in a load instruction set included in the image file, encryption identification information in an encryption field of the load instruction of the preset encryption type is obtained, the encryption identification information can be obtained and used for indicating that the function instruction of the client in the image file is encrypted, then the encrypted function instruction of the client in the image file is decrypted by using a decryption algorithm corresponding to a specific encryption algorithm, an original (unencrypted) function instruction is obtained, and then the function of the client is realized based on the original function instruction.
In general, the functional instruction of the client in the image file in the client (the client from an unofficial channel) that is not issued by the background server of the operating system is not encrypted, and in the load instruction of the preset encryption type in the load instruction set in the image file, the encryption identification information in the encryption field is used for indicating that the functional instruction of the client in the image file is not encrypted.
In view of this, in the present application, when the memory of the electronic device loads the image file of the client, a first starting address of the image file of the client in the memory is obtained, where the image file of the client at least includes a loading instruction set of the client. And searching a loading instruction of a preset encryption type in a loading instruction set included in the image file of the client according to the first starting address. Determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information for indicating whether to encrypt the function instruction of the client in the mirror image file. And acquiring the encrypted identification information in the encrypted field. And judging whether the encryption identification information is used for indicating the encryption of the function instruction of the client in the mirror image file of the client. And under the condition that the encryption identification information is used for indicating that the function instruction of the client in the mirror image file of the client is not encrypted, determining that the channel source of the client is an unofficial channel source.
By the method and the device, a system standard API is not used for calling the query function, whether the mobile provisioning file exists in the client side or not can be queried through the query function, and the channel source of the client side can be determined according to the result returned by the query function. Therefore, the method avoids the illegal method that a lawbreaker modifies the query result to bypass detection by loading a hook function on the client end of the source of the unofficial channel and then modifying the query result returned by the query function by using the hook function so that the query result indicates that the mobileprovision file does not exist in the client end.
Therefore, the accuracy of detecting the channel source of the client can be improved through the method and the device, and the safety of data can be further improved, for example, lawless persons are prevented from illegally crawling the data of the server by using the client of the unofficial channel source.
For the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
Fig. 3 is a block diagram of an electronic device 800 shown in the present application. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 3, electronic device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, images, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 can detect the open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 can also detect a change in position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives broadcast signals or broadcast operation information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the electronic device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 4 is a block diagram of one type of electronic device 1900 shown in the present application. For example, the electronic device 1900 may be provided as a server.
Referring to fig. 4, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the present application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "include", "including" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article, or terminal device including a series of elements includes not only those elements but also other elements not explicitly listed or inherent to such process, method, article, or terminal device. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or terminal device that comprises the element.
The information processing method and apparatus provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (16)

1. An information processing method applied to an electronic device, the method comprising:
under the condition that a memory of the electronic equipment loads an image file of a client, acquiring a first initial address of the image file in the memory, wherein the image file at least comprises a loading instruction set;
according to the first starting address, searching a loading instruction of a preset encryption type in the loading instruction set included in the image file;
determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information used for indicating whether to encrypt the function instruction of the client in the image file;
acquiring the encrypted identification information in the encrypted field;
and under the condition that the encryption identification information is used for indicating that the function instruction is not encrypted, determining that the channel source of the client is an unofficial channel source.
2. The method of claim 1, further comprising:
and under the condition that the encryption identification information is used for indicating that the function instruction is encrypted, determining that the channel source of the client is an official channel source.
3. The method of claim 1, wherein the image file further comprises a header file;
the searching for a load instruction of a preset encryption type in the load instruction set included in the image file according to the first start address includes:
acquiring the space occupied by the header file;
acquiring a second initial address of the loading instruction set in the memory according to the first initial address and the space size;
acquiring the quantity of the loading instructions which are recorded in the header file and are included in the loading instruction set;
and searching the loading instruction of the preset encryption type in the loading instruction set in the image file according to the number and the second starting address.
4. The method as claimed in claim 3, wherein said obtaining a second start address of said load instruction set in said memory based on said first start address and said space size comprises:
and calculating the sum of the first starting address and the space size to obtain a memory address, and using the memory address as the second starting address.
5. The method according to any one of claims 1-4, further comprising:
and reporting abnormal information to a server side under the condition that the channel source of the client side is an unofficial channel source, wherein the abnormal information is used for indicating that the channel source of the client side is the unofficial channel source.
6. The method according to any one of claims 1-4, further comprising:
and under the condition that the channel source of the client is an unofficial channel source, closing the use permission of at least part of functions of the client.
7. The method according to any one of claims 1-4, further comprising:
outputting updating prompt information, wherein the updating prompt information is used for prompting that the client is updated to be the client of an official channel source; the update prompt information at least comprises a download link of the client from the official channel.
8. An information processing apparatus, applied to an electronic device, the apparatus comprising:
the first obtaining module is used for obtaining a first starting address of an image file in a memory of the electronic equipment under the condition that the memory of the electronic equipment loads the image file of a client, wherein the image file at least comprises a loading instruction set;
the searching module is used for searching a loading instruction with a preset encryption type in the loading instruction set included in the image file according to the first starting address;
the first determining module is used for determining an encryption field in a loading instruction of a preset encryption type; the encryption field records encryption identification information used for indicating whether the function instruction of the client in the image file is encrypted or not;
a second obtaining module, configured to obtain the encrypted identification information in the encrypted field;
and the second determining module is used for determining that the channel source of the client is an unofficial channel source under the condition that the encryption identification information is used for indicating that the function instruction is not encrypted.
9. The apparatus of claim 8, further comprising:
and the third determining module is used for determining that the channel source of the client is an official channel source under the condition that the encryption identification information is used for indicating that the function instruction is encrypted.
10. The apparatus of claim 8, wherein the image file further comprises a header file;
the searching module comprises:
a first acquisition unit configured to acquire a size of a space occupied by the header file;
a second obtaining unit, configured to obtain a second start address of the load instruction set in the memory according to the first start address and the space size;
a third obtaining unit, configured to obtain the number of load instructions included in the load instruction set, where the number is recorded in the header file;
and the searching unit is used for searching the loading instruction of the preset encryption type in the loading instruction set in the image file according to the number and the second starting address.
11. The apparatus according to claim 10, wherein the second obtaining unit is specifically configured to: and calculating the sum of the first starting address and the space size to obtain a memory address, and using the memory address as the second starting address.
12. The apparatus according to any one of claims 8-11, further comprising:
the reporting module is used for reporting abnormal information to the server side under the condition that the channel source of the client side is an unofficial channel source, wherein the abnormal information is used for indicating that the channel source of the client side is the unofficial channel source.
13. The apparatus according to any one of claims 8-11, further comprising:
and the closing module is used for closing the use permission of at least part of functions of the client under the condition that the channel source of the client is an unofficial channel source.
14. The apparatus according to any one of claims 8-11, further comprising:
the output module is used for outputting update prompt information, and the update prompt information is used for prompting that the client is updated to be the client of an official channel source; the update prompt information at least comprises a download link of the client from the official channel.
15. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method of any one of claims 1 to 7.
16. A non-transitory computer-readable storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method of any one of claims 1 to 7.
CN202011631583.XA 2020-12-30 2020-12-30 Information processing method and device Active CN112733092B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011631583.XA CN112733092B (en) 2020-12-30 2020-12-30 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011631583.XA CN112733092B (en) 2020-12-30 2020-12-30 Information processing method and device

Publications (2)

Publication Number Publication Date
CN112733092A CN112733092A (en) 2021-04-30
CN112733092B true CN112733092B (en) 2022-12-23

Family

ID=75608353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011631583.XA Active CN112733092B (en) 2020-12-30 2020-12-30 Information processing method and device

Country Status (1)

Country Link
CN (1) CN112733092B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268761B (en) * 2021-07-20 2021-09-24 北京国电通网络技术有限公司 Information encryption method and device, electronic equipment and computer readable medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295085A (en) * 2017-06-28 2017-10-24 广东欧珀移动通信有限公司 Application message processing and method for down loading, server, client and terminal device
CN109583189A (en) * 2018-12-13 2019-04-05 深圳忆联信息系统有限公司 Firmware method for secure loading, device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269743B2 (en) * 2004-07-16 2007-09-11 Hitachi, Ltd. Method and apparatus for secure data mirroring a storage system
CN103685499A (en) * 2013-12-06 2014-03-26 深圳酷派技术有限公司 Terminal, server, application program management system and application program management method
CN103942074A (en) * 2014-04-09 2014-07-23 华为技术有限公司 Algorithm loading method and device
CN108881122B (en) * 2017-05-15 2021-12-31 北京京东尚科信息技术有限公司 APP information verification method and device
CN110058867B (en) * 2019-04-29 2023-07-18 深圳市网心科技有限公司 Application program mirror image packaging and installing method, computer device and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107295085A (en) * 2017-06-28 2017-10-24 广东欧珀移动通信有限公司 Application message processing and method for down loading, server, client and terminal device
CN109583189A (en) * 2018-12-13 2019-04-05 深圳忆联信息系统有限公司 Firmware method for secure loading, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112733092A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
US20180367315A1 (en) Method and apparatus for signing and verifying application installation package, and storage medium
KR101642019B1 (en) Method, apparatus, program, and recording medium of verifying terminal
CN109814942B (en) Parameter processing method and device
CN111199039A (en) Application security verification method and device and terminal equipment
KR20210016259A (en) Method, apparatus and media for controlling door guards
CN107395624B (en) Information processing method and device
CN104113588B (en) The update method of a kind of the Internet Yellow Page and device
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN112733092B (en) Information processing method and device
US10402562B2 (en) Method and device for encrypting application
CN107733674B (en) Component upgrading method and terminal
CN112163192A (en) root authority acquisition method, root authority acquisition device, root authority acquisition medium and electronic equipment
EP3239880B1 (en) Legal installation package acquiring method and apparatus, computer program and recording medium
CN107122174B (en) Application program updating method and device
CN108011882B (en) Method, device and system for data synchronization
CN113885914A (en) Application program processing method and device, electronic equipment and storage medium
CN112434339A (en) Information processing method and device
CN106846050B (en) Method, device and system for sending display notification
US9703662B2 (en) Method for controlling plug-in by a router and the router thereof
CN113934452B (en) Data processing method and device, electronic equipment and storage medium
CN107391972B (en) Software control method and device and mobile terminal
CN114489641B (en) Data processing method and device, electronic equipment and storage medium
CN114416218B (en) Data processing method and device, electronic equipment and storage medium
CN114221788B (en) Login method, login device, electronic equipment and storage medium
CN110139230B (en) Method and device for forwarding short message and intelligent equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230927

Address after: Room 210-03, 2nd floor, block C, office building, Nangang Industrial Zone, Tianjin Binhai New Area Economic and Technological Development Zone, 300450

Patentee after: 58Tongcheng Information Technology Co.,Ltd.

Address before: Room 210-03, 2nd floor, block C, office building, Nangang Industrial Zone, Tianjin Binhai New Area Economic and Technological Development Zone, 300450

Patentee before: 58 Co.,Ltd.

TR01 Transfer of patent right