CN103473498A - Application program security verification method and terminal - Google Patents

Application program security verification method and terminal Download PDF

Info

Publication number
CN103473498A
CN103473498A CN2013104167748A CN201310416774A CN103473498A CN 103473498 A CN103473498 A CN 103473498A CN 2013104167748 A CN2013104167748 A CN 2013104167748A CN 201310416774 A CN201310416774 A CN 201310416774A CN 103473498 A CN103473498 A CN 103473498A
Authority
CN
China
Prior art keywords
terminal
safety detection
program
detection program
service manager
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013104167748A
Other languages
Chinese (zh)
Other versions
CN103473498B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Minghua Alliance Technology Co., Ltd.
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201310416774.8A priority Critical patent/CN103473498B/en
Publication of CN103473498A publication Critical patent/CN103473498A/en
Application granted granted Critical
Publication of CN103473498B publication Critical patent/CN103473498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an application program security verification method and a terminal. A reliable application program, namely a service management program is provided by a USB (universal serial bus) Key and used for verifying other application programs such as a security detection program on the terminal, so that validity and security of the application programs on the terminal are effectively verified, and the problem of security risks due to incapability of verifying validity of traditional application program download and installation is solved. The method has the advantages that security of the application programs on the terminal is improved, and further, security of personal information of users is ensured.

Description

Application security verification method and terminal
Technical field
The present invention relates to information security technology, also relate to the intelligent key field, relate in particular to a kind of application security verification method and terminal.
Background technology
Along with the development of wireless Internet, e-bank also is widely used, and progressively from conventional P C, expands to the mobile devices such as mobile phone, panel computer.Electronic bank application on terminal has two kinds of modes at present: complete the B/S framework of transaction by browser access transaction webpage, and the C/S framework that applications client completes transaction is installed on terminal.The B/S framework must rely on browser, and there is higher potential safety hazard in browser as a kind of basic application software of opening; The C/S framework is the application software of each bank's stand-alone development, compared to the B/S framework, possesses certain security.
But because the C/S framework need to be installed client software, the security risk that therefore exists client software to be replaced; Such as illegal program misleads the client software of user installation personation, thereby utilize the client software of personation to extract user's personal account and encrypted message etc.; Therefore, adopt aforesaid way that client software is installed on the C/S framework and have higher security risk.
Summary of the invention
Given this, be necessary to provide a kind of application security verification method and terminal, with the security of the application program of being installed on verification terminal.
The embodiment of the invention discloses a kind of application security verification method, comprise the following steps:
Mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed on terminal; Described service manager is to provide with the USBKey of terminal successful matching;
When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal;
Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file;
According to the legal safety detection installation file obtained, described service manager guiding terminal is installed described safety detection program;
Terminal, based on described service manager and safety detection program, is verified the legitimacy of each application program.
Preferably, the mounted safety detection program of described checking is illegal, also comprises afterwards:
Send the information of the mounted illegal safety detection program of unloading.
Preferably, described terminal, based on service manager and safety detection program, verifies that the legitimacy of each application program comprises:
Described service manager sends the request that generates specific key to described USB Key, generate specific key; The described specific key generated is encrypted, preserves the described specific key after encrypting;
Terminal is based on described service manager and safety detection program, by described specific key, and the legitimacy of the application program of verification terminal and described USB Key.
Preferably, described terminal is based on described service manager and safety detection program, and by described specific key, the legitimacy of the application program of verification terminal and described USB Key comprises:
The described service manager of terminal operating or safety detection program, be combined the legitimacy of the application program of active detecting except described service manager and safety detection program or the legitimacy of user identity with USB Key;
Perhaps, according to the detection request of each application program received, detect the legitimacy of each application program or the legitimacy of user identity.
Preferably, terminal is based on described service manager and safety detection program, and by described specific key, the legitimacy of the application program of verification terminal and described USB Key comprises:
Terminal, based on described service manager and safety detection program, is combined with USB Key, carries out the signature operation of USB Key;
Wherein, described safety detection program is for managing the application program of application interface, USB Key and USB Key of USB Key.
The embodiment of the present invention also discloses a kind of application security verification terminal, comprising:
Service management module, for:
Utilize on terminal mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed; Described service manager is to provide with the USB Key of terminal successful matching;
When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal;
Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file;
Legal safety detection installation file according to obtaining, utilize described service manager guiding terminal that described safety detection program is installed;
The program verification module, for based on described service manager and safety detection program, verify the legitimacy of each application program.
Preferably, described application security verification terminal also comprises:
Information sending module, for sending the information of the mounted illegal safety detection program of unloading.
Preferably, described service management module also for:
Utilize described service manager to send the request that generates specific key to described USB Key, generate specific key; The described specific key generated is encrypted, preserves the described specific key after encrypting;
The program verification module also for: based on described service manager and safety detection program, by described specific key, the legitimacy of the application program on verification terminal and described USB Key.
Preferably, described program verification module also for:
Move described service manager or safety detection program, be combined the legitimacy of the application program of active detecting except described service manager and safety detection program or the legitimacy of user identity with USB Key;
Perhaps, according to the detection request of each application program received, detect the legitimacy of each application program or the legitimacy of user identity.
Preferably, described program verification module also for:
Based on described service manager and safety detection program, with USB Key, be combined, carry out the signature operation of USB Key;
Wherein, described safety detection program is for managing the application program of application interface, USB Key and USBKey of USB Key.
It is service manager that the embodiment of the present invention provides a reliable application program by USB Key, and come other application programs on verification terminal as the safety detection program by this reliable application program, thereby the legitimacy of application program and security on verification terminal effectively, avoided traditional application program to download, install the problem that can't verify the existing potential safety hazard of legitimacy, there is the beneficial effect that improves applications security on terminal, further, guaranteed userspersonal information's security.
The accompanying drawing explanation
Fig. 1 is application security verification method the first embodiment schematic flow sheet of the present invention;
Fig. 2 is application security verification method the second embodiment schematic flow sheet of the present invention;
Fig. 3 is application security verification terminal the first embodiment high-level schematic functional block diagram of the present invention;
Fig. 4 is application security verification terminal the second embodiment high-level schematic functional block diagram of the present invention.
The realization of embodiment of the present invention purpose, functional characteristics and advantage, in connection with embodiment, are described further with reference to accompanying drawing.
Embodiment
Further illustrate technical scheme of the present invention below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
In the embodiment of application security verification method of the present invention and terminal, using two generation USB Key as terminal app(Application, application program) foundation for security, providing first built-in reliable app(by USB Key is described service manager, the follow-up app1 that all is referred to as for convenience of description), and by app1 download, other app in checking, admin-authentication terminal.When USB Key and terminal are not bound, can't use USB Key; And after USB Key and terminal successful matching, on terminal, the built-in app1 of USB Key must first be installed, by terminal, app1 in USB Key be installed, make USB Key and terminal bind one to one, the terminal that USB Key can only be corresponding unique, this app1 can normally be used like this.Because the mandate of app1 is that built-in app1 dynamically generates while moving first on terminal, must participate in by USB Key, therefore counterfeit or illegal app1 all can not obtain mandate, thereby guarantees the security of this reliable app1.
In the following embodiment of application security verification method of the present invention and terminal, described app1 is that USB Key publisher is built in the corresponding program of app installation file in USB Key, i.e. described service manager; The major function of app1 is with after terminal communication is connected, proxy terminal to the access of USB Key function, in conjunction with USB Key checking, legitimacy the guiding installation app2(of the application program relevant to electronic banking are described safety detection program, the follow-up app2 that all is referred to as for convenience of description).
Described app2 is that USB Key publisher is built in the app on USB Key, mainly realizes the application interface, management USB Key, management USB Key related application of USB Key, in conjunction with the legitimacy of USB Key checking related application; App2 can carry out edition upgrading or renewal after installing.
In subsequent embodiment in application security verification method of the present invention and terminal, will no longer to foregoing, be repeated in this description.
Based on above description, please refer to Fig. 1, Fig. 1 is application security verification method one embodiment schematic flow sheet of the present invention; As shown in Figure 1, application security verification method of the present invention comprises the following steps:
On mounted app1 sense terminals, whether app2 has been installed on step S01, terminal; If not, perform step S02; If perform step S03;
Step S02, the request of to the transmission of the USB Key with the terminal successful matching, obtaining legal app2 installation file;
Step S03, verify that whether mounted app2 is legal;
If mounted app2 is legal, perform step S05; If mounted app2 is illegal, return to execution step S02;
In the present embodiment, USB Key communicates by bluetooth and terminal, and built-in app1 and app2 in USB Key; Simultaneously, terminal has been installed the app1 in USB Key.Because, USB Key is connected use with terminal before, on terminal, the built-in app1 of USB Key must be installed, to obtain the access authorization of terminal to USB Key.Mounted for verifying on the whether legal app1 sense terminals of other application programs whether app2 has been installed on terminal.
Terminal sends request to the USB Key with the terminal successful matching, after obtaining the installation file of legal app2, also needs execution step:
The installation file of the legal app2 that step S04, basis are obtained, the app1 guiding terminal is installed app2;
Step S05, terminal, based on app1 and app2, are verified the legitimacy of each application program.
After terminal installs app1, whether app2 has been installed on the app1 sense terminals is described safety detection program.If app2 has been installed on terminal, whether legally detect mounted app2; If mounted app2 is illegal, or, detect on terminal app2 is not installed, app1 sends the request of obtaining legal app2 installation file to USB Key; The request that USB Key sends according to terminal, be sent to terminal by the installation file of legal app2.The installation file of the legal app2 that app1 sends according to USB Key, app2, the mounted app2 of terminal operating are installed in guiding.In a preferred embodiment, terminal installation app2, delete the app2 installation file automatically.
After terminal installation app1 and app2, operation app1 and app2.App1 sends the request that generates specific key to USB Key, to generate specific key; And the described specific key generated is encrypted, the described specific key after encrypting is kept under the catalogue of app1 application program inside.Terminal is based on app1 and app2, by described specific key, and the legitimacy of the application program of verification terminal and described USB Key.
Such as, when app1 and/or app2 operation, detect the signature of USB Key related application and the legitimacy of digital certificate; Simultaneously, the related application on USB Key also can be asked the own legitimacy of app1 and/or app2 checking, also can requests verification use USB Key or the legitimacy of the user identity of terminal; Such as, verify whether this user is legal registered users etc.Simultaneously, application interface, management USB Key and the USB Key application program of app2 for realizing USB Key, app2 also can provide download and the installation administration of the related application of USB Key.Based on app1 and app2, terminal is combined with USB Key, realizes the signature operation to USB Key.In the present embodiment, in USB Key, the signature of each application program and digital certificate are signed and issued by the publisher of USB Key.
In the present embodiment, when terminal downloads to the installation file of other application programs from service end, on terminal, whether mounted authentication procedure to be that app1 automatically detects the installation file of newly downloaded application program legal, and when the installation file that this newly downloaded application program detected is legal, allow the installation file of terminal according to this application program, this application program is installed; App1, when the installation file that this newly downloaded application program detected is illegal, forbids that terminal installs this application program, and prompt terminal is deleted the illegal application program installation file of downloading.
In the present embodiment, it is legal that app1 detects the application program installation file of downloading, and comprising: whether the authentication signature that app1 detects in down load application installation file is consistent to the authentication signature to this application program installation file with publisher's key in Binding key; When the authentication signature in this application program installation file is consistent to the authentication signature to this application program installation file with publisher's key in Binding key, it is legal that app1 detects the installation file of this application program; When in the authentication signature in this application program installation file and Binding key, publisher's key is inconsistent to the authentication signature to this application program installation file, it is illegal that app1 detects the installation file of this application program.
In the present embodiment, other application program installation files of terminal downloads comprise the authentication procedure after app1 self edition upgrading of this authentication procedure or renewal; Similarly, after whether the authentication procedure installation file of app1 after this upgrading that detects download or renewal be legal, then upgraded or upgraded.After this authentication procedure installation file after app1 authenticates upgrading or renewal is legal, mobile phone unloads mounted authentication procedure, according to this authentication procedure installation file after upgrading or renewal, and this authentication procedure after installation upgrading or renewal.
Mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed on the present embodiment terminal; When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal; Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file; Described service manager is according to the legal safety detection installation file obtained, and guiding terminal is installed described safety detection program; Terminal is based on described service manager and safety detection program, verify the method for the legitimacy of each application program, the legitimacy of application program and security on verification terminal effectively, avoided traditional application program self to verify the problem of the existing potential safety hazard of legitimacy, there is the beneficial effect that improves applications security on terminal, further, guaranteed userspersonal information's security.
Fig. 2 is application security verification method the second embodiment schematic flow sheet of the present invention; The difference of the present embodiment and the described embodiment of Fig. 1 is to have increased step S11; The present embodiment only is specifically described step S11, and relevant other related steps of application security verification method of the present invention please refer to the specific descriptions of the described embodiment of Fig. 1, do not repeat them here.
As shown in Figure 2, application security verification method of the present invention at step S03, verify that whether mounted safety detection program legal; Mounted safety detection program detected illegal, also comprise afterwards:
The information of step S11, the mounted illegal app2 of transmission unloading;
Step S02, the request of to the transmission of the USB Key with the terminal successful matching, obtaining legal app2 installation file;
In the present embodiment, illegal if app1 detects on terminal mounted app2, terminal sends the information of the mounted illegal safety detection program of unloading, and the prompting user is first by illegal app2 unloading.By after illegal app2 unloading, then send the request of obtaining legal app2 installation file to the USB Key with the terminal successful matching.In the present embodiment, step S02 and step S11 also can change, and after terminal can first be obtained the request of legal app2 installation file to the transmission of the USB Key with this terminal successful matching, then send the information that unloads mounted illegal app2.
The advantage of doing like this is, when guaranteeing that the application program of using on terminal is the valid application program and eliminates the potential safety hazard that illegal application program may bring for terminal, by illegal application program unloading, avoid illegal application program and the valid application program may be incompatible and the problem that causes the valid application program normally to use, further improved the security of information on the terminal.
Fig. 3 is application security verification terminal the first embodiment high-level schematic functional block diagram of the present invention; As shown in Figure 3, application security verification terminal of the present invention comprises service management module 01 and program verification module 02.
Service management module 01 for, utilize on terminal mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed; Described service manager is to provide with the USB Key of terminal successful matching; When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal; Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file; Legal safety detection installation file according to obtaining, utilize described service manager guiding terminal that described safety detection program is installed;
Program verification module 02 for, based on described service manager and safety detection program, verify the legitimacy of each application program.
In the present embodiment, USB Key communicates by bluetooth and terminal, and built-in app1 and app2 in USB Key; Simultaneously, terminal has been installed the app1 in USB Key.Because, USB Key is connected use with terminal before, on terminal, the built-in app1 of USB Key must be installed, to obtain the access authorization of described terminal to USB Key.Service management module 01 is utilized on terminal mounted for verifying on the whether legal app1 sense terminals of other application programs whether app2 has been installed.
After terminal installs app1, service management module 01 is utilized on the app1 sense terminals whether app2 has been installed is described safety detection program.If app2 has been installed on terminal, whether 01 of service management module detects mounted app2 legal; If mounted app2 is illegal, or, detecting on terminal app2 is not installed, 01 of service management module utilizes app1 to send the request of obtaining legal app2 installation file to USB Key; The request that USB Key sends according to terminal, be sent to terminal by the installation file of legal app2.The installation file of the legal app2 that service management module 01 sends according to USB Key, utilize the app1 guiding that app2, the mounted app2 of terminal operating are installed.In a preferred embodiment, terminal installation app2, service management module 01 is deleted the app2 installation file.
After terminal installation app1 and app2, operation app1 and app2.Service management module 01 utilizes app1 to send the request that generates specific key to USB Key, to generate specific key; And the described specific key generated is encrypted, the described specific key after encrypting is kept under the catalogue of app1 application program inside.Program verification module 02 is based on app1 and app2, by described specific key, and the legitimacy of the application program of verification terminal and described USB Key.
Such as, when app1 and/or app2 operation, program verification module 02 detects the signature of USB Key related application and the legitimacy of digital certificate; Simultaneously, the related application on USB Key also can be asked the own legitimacy of app1 and/or app2 checking, also can requests verification use USB Key or the legitimacy of the user identity of terminal; Such as whether, program verification module 02 this user of checking is legal registered users etc.Simultaneously, application interface, management USB Key and the USBKey application program of app2 for realizing USB Key, app2 also can provide download and the installation administration of the related application of USB Key.Based on app1 and app2, terminal is combined with USB Key, the signature operation that the program verification module 02 in terminal realizes USB Key.In the present embodiment, in USB Key, the signature of each application program and digital certificate are signed and issued by the publisher of USB Key.
In the present embodiment, when terminal downloads to the installation file of other application programs from service end, on terminal, whether mounted authentication procedure to be that app1 automatically detects the installation file of newly downloaded application program legal, and when the installation file that this newly downloaded application program detected is legal, allow the installation file of terminal according to this application program, this application program is installed; App1, when the installation file that this newly downloaded application program detected is illegal, forbids that terminal installs this application program, and prompt terminal is deleted the illegal application program installation file of downloading.
In the present embodiment, it is legal that app1 detects the application program installation file of downloading, and comprising: whether the authentication signature that app1 detects in down load application installation file is consistent to the authentication signature to this application program installation file with publisher's key in Binding key; When the authentication signature in this application program installation file is consistent to the authentication signature to this application program installation file with publisher's key in Binding key, it is legal that app1 detects the installation file of this application program; When in the authentication signature in this application program installation file and Binding key, publisher's key is inconsistent to the authentication signature to this application program installation file, it is illegal that app1 detects the installation file of this application program.
In the present embodiment, other application program installation files of terminal downloads comprise the authentication procedure after app1 self edition upgrading of this authentication procedure or renewal; Similarly, after whether the authentication procedure installation file of app1 after this upgrading that detects download or renewal be legal, then upgraded or upgraded.After this authentication procedure installation file after app1 authenticates upgrading or renewal is legal, mobile phone unloads mounted authentication procedure, according to this authentication procedure installation file after upgrading or renewal, and this authentication procedure after installation upgrading or renewal.
Mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed on the present embodiment terminal; When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal; Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file; Described service manager is according to the legal safety detection installation file obtained, and guiding terminal is installed described safety detection program; Terminal is based on described service manager and safety detection program, verify the legitimacy of each application program, the legitimacy of application program and security on verification terminal effectively, avoided traditional application program self to verify the problem of the existing potential safety hazard of legitimacy, there is the beneficial effect that improves applications security on terminal, further, guaranteed userspersonal information's security.
Fig. 4 is application security verification terminal the second embodiment high-level schematic functional block diagram of the present invention.The difference of the present embodiment and the described embodiment of Fig. 3 is to have increased information sending module 03; The present embodiment only is specifically described information sending module 03, and relevant other related modules of application security verification terminal of the present invention please refer to the specific descriptions of the described embodiment of Fig. 3, do not repeat them here.
As shown in Figure 4, application security verification terminal of the present invention also comprises:
Information sending module 03, for sending the information of the mounted illegal safety detection program of unloading.
In the present embodiment, illegal if service management module 01 utilizes app1 mounted app2 to be detected on terminal, information sending module 03 sends the information of the mounted illegal safety detection program of unloading, and the prompting user is first by illegal app2 unloading.By after illegal app2 unloading, service management module 01 sends the request of obtaining legal app2 installation file to the USB Key with the terminal successful matching again.In the present embodiment, after service management module 01 can first be obtained the request of legal app2 installation file to the transmission of the USB Key with this terminal successful matching, then send by information sending module 03 information that unloads mounted illegal app2.
The advantage of doing like this is, when guaranteeing that the application program of using on terminal is the valid application program and eliminates the potential safety hazard that illegal application program may bring for terminal, by illegal application program unloading, avoid illegal application program and the valid application program may be incompatible and the problem that causes the valid application program normally to use, further improved the security of information on the terminal.
The foregoing is only the preferred embodiments of the present invention; not thereby limit its scope of the claims; every equivalent structure or conversion of equivalent flow process that utilizes instructions of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, all in like manner be included in scope of patent protection of the present invention.

Claims (10)

1. an application security verification method, is characterized in that, comprises the following steps:
Mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed on terminal; Described service manager is to provide with the USBKey of terminal successful matching;
When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal;
Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file;
According to the legal safety detection installation file obtained, described service manager guiding terminal is installed described safety detection program;
Terminal, based on described service manager and safety detection program, is verified the legitimacy of each application program.
2. the method for claim 1, is characterized in that, the mounted safety detection program of described checking is illegal, also comprises afterwards:
Send the information of the mounted illegal safety detection program of unloading.
3. method as claimed in claim 1 or 2, is characterized in that, described terminal, based on service manager and safety detection program, verifies that the legitimacy of each application program comprises:
Described service manager sends the request that generates specific key to described USB Key, generate specific key; The described specific key generated is encrypted, preserves the described specific key after encrypting;
Terminal is based on described service manager and safety detection program, by described specific key, and the legitimacy of the application program of verification terminal and described USB Key.
4. method as claimed in claim 3, is characterized in that, described terminal is based on described service manager and safety detection program, and by described specific key, the legitimacy of the application program of verification terminal and described USB Key comprises:
The described service manager of terminal operating or safety detection program, be combined the legitimacy of the application program of active detecting except described service manager and safety detection program or the legitimacy of user identity with USB Key;
Perhaps, according to the detection request of each application program received, detect the legitimacy of each application program or the legitimacy of user identity.
5. method as claimed in claim 3, is characterized in that, terminal is based on described service manager and safety detection program, and by described specific key, the legitimacy of the application program of verification terminal and described USB Key comprises:
Terminal, based on described service manager and safety detection program, is combined with USB Key, carries out the signature operation of USBKey;
Wherein, described safety detection program is for managing the application program of application interface, USB Key and USBKey of USB Key.
6. an application security verification terminal, is characterized in that, comprising:
Service management module, for:
Utilize on terminal mounted for verifying on the whether legal service manager sense terminals of other application programs whether the safety detection program has been installed; Described service manager is to provide with the USB Key of terminal successful matching;
When terminal being detected the safety detection program has been installed, judge that whether mounted safety detection program is legal;
Described safety detection program is not installed or verifies that mounted safety detection program is illegal detecting, to described USB Key, send the request of obtaining legal safety detection installation file;
Legal safety detection installation file according to obtaining, utilize described service manager guiding terminal that described safety detection program is installed;
The program verification module, for based on described service manager and safety detection program, verify the legitimacy of each application program.
7. terminal as claimed in claim 6, is characterized in that, also comprises:
Information sending module, for sending the information of the mounted illegal safety detection program of unloading.
8. terminal as described as claim 6 or 7, is characterized in that, described service management module also for:
Utilize described service manager to send the request that generates specific key to described USB Key, generate specific key; The described specific key generated is encrypted, preserves the described specific key after encrypting;
The program verification module also for: based on described service manager and safety detection program, by described specific key, the legitimacy of the application program on verification terminal and described USB Key.
9. system as claimed in claim 8, is characterized in that, described program verification module also for:
Move described service manager or safety detection program, be combined the legitimacy of the application program of active detecting except described service manager and safety detection program or the legitimacy of user identity with USB Key;
Perhaps, according to the detection request of each application program received, detect the legitimacy of each application program or the legitimacy of user identity.
10. system as claimed in claim 8, is characterized in that, described program verification module also for:
Based on described service manager and safety detection program, with USB Key, be combined, carry out the signature operation of USB Key;
Wherein, described safety detection program is for managing the application program of application interface, USB Key and USBKey of USB Key.
CN201310416774.8A 2013-09-12 2013-09-12 Application security verification method and terminal Active CN103473498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310416774.8A CN103473498B (en) 2013-09-12 2013-09-12 Application security verification method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310416774.8A CN103473498B (en) 2013-09-12 2013-09-12 Application security verification method and terminal

Publications (2)

Publication Number Publication Date
CN103473498A true CN103473498A (en) 2013-12-25
CN103473498B CN103473498B (en) 2016-03-23

Family

ID=49798345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310416774.8A Active CN103473498B (en) 2013-09-12 2013-09-12 Application security verification method and terminal

Country Status (1)

Country Link
CN (1) CN103473498B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021340A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Method and device for detecting installation of malicious applications
CN105096184A (en) * 2015-08-28 2015-11-25 四川长虹电器股份有限公司 High-security-level payment method of smart television
CN105590052A (en) * 2015-12-18 2016-05-18 北京海泰方圆科技股份有限公司 Method for controlling installation of browser plug-in
CN107193612A (en) * 2014-06-27 2017-09-22 青岛海信移动通信技术股份有限公司 The version upgrading method and device of a kind of mobile terminal
CN108280343A (en) * 2017-01-06 2018-07-13 广州市动景计算机科技有限公司 The method, apparatus and system of application security are detected under Android environment
CN108494565A (en) * 2018-05-24 2018-09-04 北京深思数盾科技股份有限公司 digital signature system and method
CN108881104A (en) * 2017-05-08 2018-11-23 中国移动通信有限公司研究院 The method and apparatus that a kind of pair of application program is verified
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
WO2020007249A1 (en) * 2018-07-03 2020-01-09 中国银联股份有限公司 Operating system security active defense method and operating system
CN112948807A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Application program validity verification method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662469A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method and system based on USBKey online banking trade information authentication
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102222183A (en) * 2011-04-28 2011-10-19 奇智软件(北京)有限公司 Mobile terminal software package safety detection method and system thereof
CN103268448A (en) * 2013-05-24 2013-08-28 北京网秦天下科技有限公司 Method and system for dynamically detecting safety of mobile applications

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662469A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method and system based on USBKey online banking trade information authentication
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN102222183A (en) * 2011-04-28 2011-10-19 奇智软件(北京)有限公司 Mobile terminal software package safety detection method and system thereof
CN103268448A (en) * 2013-05-24 2013-08-28 北京网秦天下科技有限公司 Method and system for dynamically detecting safety of mobile applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵路华: "基于USBkey的软件保护体系研究", 《计算机安全》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021340A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Method and device for detecting installation of malicious applications
CN107193612A (en) * 2014-06-27 2017-09-22 青岛海信移动通信技术股份有限公司 The version upgrading method and device of a kind of mobile terminal
CN107193612B (en) * 2014-06-27 2021-03-23 青岛海信移动通信技术股份有限公司 Version upgrading method and device for mobile terminal
CN105096184A (en) * 2015-08-28 2015-11-25 四川长虹电器股份有限公司 High-security-level payment method of smart television
CN105096184B (en) * 2015-08-28 2019-02-12 四川长虹电器股份有限公司 The method of smart television high security level payment
CN105590052A (en) * 2015-12-18 2016-05-18 北京海泰方圆科技股份有限公司 Method for controlling installation of browser plug-in
CN108280343A (en) * 2017-01-06 2018-07-13 广州市动景计算机科技有限公司 The method, apparatus and system of application security are detected under Android environment
CN108881104A (en) * 2017-05-08 2018-11-23 中国移动通信有限公司研究院 The method and apparatus that a kind of pair of application program is verified
CN108494565A (en) * 2018-05-24 2018-09-04 北京深思数盾科技股份有限公司 digital signature system and method
WO2020007249A1 (en) * 2018-07-03 2020-01-09 中国银联股份有限公司 Operating system security active defense method and operating system
CN109460651A (en) * 2018-10-17 2019-03-12 航天信息股份有限公司 The login method and device of billing system
CN112948807A (en) * 2021-02-04 2021-06-11 中国联合网络通信集团有限公司 Application program validity verification method and device

Also Published As

Publication number Publication date
CN103473498B (en) 2016-03-23

Similar Documents

Publication Publication Date Title
CN103473498B (en) Application security verification method and terminal
JP4888816B2 (en) Apparatus, program, method, and system for service provisioning using short-range wireless communication
KR101648521B1 (en) A system and method for providing security in browser-based access to smart cards
CN103167491B (en) A kind of mobile terminal uniqueness authentication method based on software digital certificate
US8584225B1 (en) Push channel authentication for mobile computing devices
WO2017071207A1 (en) Application installation method, corresponding apparatus, and application installation system
CN102404706B (en) Method for managing tariff safety and mobile terminal
CN103744686A (en) Control method and system for installing application in intelligent terminal
CN109842616B (en) Account binding method and device and server
CN104102499A (en) Mobile terminal and mobile terminal software upgrading method
WO2017050186A1 (en) Application permission management method and smart pos terminal
CN110135149A (en) A kind of method and relevant apparatus of application installation
CN105634745A (en) Security authentication method and device for application installation
CN102572552B (en) Internet television upgrades digital certificate method and system automatically
CN103491080A (en) Information safety protecting method and system
CN102065088A (en) Methods for automatically loading internet bank security assembly and authenticating internet bank security
CN104348616A (en) Method for visiting terminal security component, device thereof and system thereof
US10025575B2 (en) Method for installing security-relevant applications in a security element of a terminal
CN103475661B (en) The safe acquisition methods of authentication procedure and system
CN114329358A (en) Application signature method and system, transaction terminal and service platform
JP5277888B2 (en) Application issuing system, apparatus and method
CN111182527B (en) OTA (over the air) firmware upgrading method and device, terminal equipment and storage medium thereof
CN105743651A (en) Method and apparatus for utilizing card application in chip security domain, and application terminal
CN106599619A (en) Verification method and device
WO2020002870A1 (en) Methods for delivering an authenticatable management activity to remote devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170329

Address after: 100000 room 703-710, room B3, Huayuan Road, Haidian District, Beijing, 7

Patentee after: Beijing Minghua Alliance Technology Co., Ltd.

Address before: 518057 Guangdong city of Shenzhen province Nanshan District Ke Feng Lu No. 2 idiopathic information building A building unit seven floor South 701-709

Patentee before: Shenzhen Wendingchuang Data Technology Co., Ltd.

TR01 Transfer of patent right