CN105590065A - Method and apparatus for protecting preset files - Google Patents

Method and apparatus for protecting preset files Download PDF

Info

Publication number
CN105590065A
CN105590065A CN201410562056.6A CN201410562056A CN105590065A CN 105590065 A CN105590065 A CN 105590065A CN 201410562056 A CN201410562056 A CN 201410562056A CN 105590065 A CN105590065 A CN 105590065A
Authority
CN
China
Prior art keywords
file
terminal
signature
preset
preset file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410562056.6A
Other languages
Chinese (zh)
Other versions
CN105590065B (en
Inventor
王兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zhongxing Software Co Ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201410562056.6A priority Critical patent/CN105590065B/en
Priority to PCT/CN2015/079224 priority patent/WO2016062080A1/en
Publication of CN105590065A publication Critical patent/CN105590065A/en
Application granted granted Critical
Publication of CN105590065B publication Critical patent/CN105590065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and an apparatus for protecting preset files. The method comprises the steps of connecting fixed feature parts in preset files in a terminal to generate a signature file, and before the terminal leaves a factory, writing the signature files into a preset storage space of the terminal; and every time when the terminal is started up, connecting current fixed feature parts in each preset file in the terminal to generate a current signature file, reading the pre-stored signature files from the preset storage space, judging whether the current signature files are consistent with the pre-stored signature files, and under the condition of determining that the current signature files are inconsistent with the pre-stored signature files, recovering the preset files in the terminal before the terminal leaves the factory. By the means of the technical scheme of the invention, the preset files can be automatically recovered under the condition that the preset files are deleted by a user, so that the trouble that after the user carries out an ROOT operation, a system cannot be normally started up and the terminal needs to be taken to a maintenance point for maintenance is avoided, and moreover, benefits of mobile photo manufacturers and operators are protected.

Description

Protect method and the device of preset file
Technical field
The present invention relates to field of mobile communication, particularly relate to a kind of method and device of protecting preset file.
Background technology
In the prior art, have the file that some systems are relevant, user ROOT after deleting will beThe situation that system can not normally start, in these cases, conventionally needs user to take maintenace point and goes to keep in repair abilityEnough normal startup systems, in addition, in the time doing carrier customization project, operator wants more preset files at endOn end, these application are relevant to the interests of operator, but finally in user's hand, find the literary composition that these are presetPart has been deleted by user.
In order to prevent the generation of above-mentioned situation, current solution is to prevent as possible user ROOT system.There is no ROOT authority, user does not just delete preset file, but prevents that ten points of user ROOT are tiredDifficulty, through after a while, user always can find way and software to go ROOT system, and then deletion systemPreset file. Therefore, be badly in need of at present a kind of method of protecting preset file in terminal.
Summary of the invention
In view of user ROOT system in prior art causes the deleted problem of the preset file of terminal, proposeThe present invention is to provide a kind of method and device of protecting preset file.
The invention provides a kind of method of protecting preset file, comprising:
Changeless characteristic in each preset file in terminal is connected and generates signature file, andBefore terminal is dispatched from the factory, signature file is written in the predetermined memory space of terminal;
In the time of each start, changeless characteristic in current each preset file in terminal is connectedDeliver a child into current signature file, and from the signature file of predetermined memory space reading pre-stored, judge currentWhether signature file is consistent with the signature file of first storage, determining in inconsistent situation, before recovering to dispatch from the factoryPreset file in terminal.
Preferably, said method further comprises:
Before terminal is dispatched from the factory, will in the preset file of terminal, insert changeless signature identification, and by featureMark is as the characteristic of corresponding preset file;
Preferably, characteristic comprises: the particular community of the mandate of preset file explanation, preset file and/ or preset file itself.
Preferably, changeless characteristic in each preset file in terminal is connected and generate signatureFile specifically comprises:
Adopt the TAR instrument of LINUX operating system by changeless spy in each preset file in terminalLevy part and connect, and adopt message digest algorithm 5 to generate signature file.
Preferably, predetermined memory space comprises: read only memory ROM or other disposable memories.
The present invention also provides a kind of device of protecting preset file, comprising:
Signature blocks, raw for changeless characteristic in each preset file of terminal is connectedBecome signature file, and before terminal is dispatched from the factory, signature file is written in the predetermined memory space of terminal;
Recover module, in the time starting shooting, by changeless in current each preset file in terminal at every turnCharacteristic connects and generates current signature file, and from the signature of predetermined memory space reading pre-storedFile, judges that whether current signature file is consistent with the signature file of first storage, in definite inconsistent situationUnder, recover the preset file in terminal before dispatching from the factory.
Preferably, signature blocks is further used for:
Before terminal is dispatched from the factory, will in the preset file of terminal, insert changeless signature identification, and by featureMark is as the characteristic of corresponding preset file;
Preferably, characteristic comprises: the particular community of the mandate of preset file explanation, preset file and/ or preset file itself.
Preferably, signature blocks specifically for:
Adopt the TAR instrument of LINUX operating system by changeless spy in each preset file in terminalLevy part and connect, and adopt message digest algorithm 5 to generate signature file.
Preferably, predetermined memory space comprises: read only memory ROM or other disposable memories.
Beneficial effect of the present invention is as follows:
By the characteristic of all preset files is coupled together, generate signature file, in the time that terminal is dispatched from the factoryThese signature files are write in predetermined memory space, and when start detect these signatures whether with preset literary compositionPart is consistent, recovers to allow user use after these files as inconsistent again, has solved user in prior artROOT system causes the deleted problem of the preset file of terminal, the feelings that can be deleted by user at preset fileUnder condition, automatically recover these preset files, thereby avoid after user ROOT, system can not normally start,The trouble that maintenace point goes maintenance be need to take, and mobile phone manufacturer and operator's interests protected.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technology of the present inventionMeans, and can being implemented according to the content of description, and for allow above and other objects of the present invention,Feature and advantage can become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description of the drawings
By reading below detailed description of the preferred embodiment, various other advantage and benefit for abilityIt is cheer and bright that territory those of ordinary skill will become. Accompanying drawing is only for the object of preferred embodiment is shown, and alsoDo not think limitation of the present invention. And in whole accompanying drawing, represent identical by identical reference symbolParts. In the accompanying drawings:
Fig. 1 is the flow chart of the method for the preset file of protection of the embodiment of the present invention;
Fig. 2 is the flow chart that dispatching from the factory of example of the present invention write signature;
Fig. 3 is the flow chart of the start sign test name of the embodiment of the present invention;
Fig. 4 is the structural representation of the device of the preset file of protection of the embodiment of the present invention.
Detailed description of the invention
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail. Although shown in accompanying drawingExemplary embodiment of the present disclosure, but should be appreciated that and can realize the disclosure with various forms and should be byHere the embodiment setting forth limits. On the contrary, providing these embodiment is in order more thoroughly to understand thisOpen, and can be by the those skilled in the art that conveys to complete the scope of the present disclosure.
Cause the deleted problem of the preset file of terminal in order to solve user ROOT system in prior art, thisInvention provides a kind of method and device of protecting preset file, and the characteristic of all preset files is connectedGet up, generate signature file, in the time that terminal is dispatched from the factory, these signature files are write in ROM, and in startTime whether detect these signatures consistent with preset file, recover as inconsistent to allow again user make after these filesWith. Below in conjunction with accompanying drawing and embodiment, the present invention is further elaborated. Should be appreciated that thisLocate described specific embodiment only in order to explain the present invention, do not limit the present invention.
Embodiment of the method
According to embodiments of the invention, provide a kind of method of protecting preset file, in the embodiment of the present inventionIn, for the terminal of Android system is installed, Fig. 1 is the method for the preset file of protection of the embodiment of the present inventionFlow chart, as shown in Figure 1, comprise following place according to the method for the preset file of protection of the embodiment of the present inventionReason:
Step 101, connects changeless characteristic in each preset file in terminal to generate and signsName file, and before terminal is dispatched from the factory, signature file is written in the predetermined memory space of terminal; Wherein, onStating predetermined memory space comprises: read only memory ROM or other disposable memories.
In embodiments of the present invention, if preset file itself does not possess changeless characteristic, canWith before terminal is dispatched from the factory, will in the preset file of terminal, insert changeless signature identification, and by characteristic scalarKnow the characteristic as corresponding preset file;
Preferably, above-mentioned characteristic comprises: the particular community of the mandate of preset file explanation, preset file,And/or preset file itself. It should be noted that, characteristic refers to the part not changing with system upgrade, exampleAs, front how many bytes of preset file never change, and certain preset file never changes etc.
In step 101, the TAR instrument that can adopt LINUX operating system is by terminal, each is presetIn file, changeless characteristic connects, and adopts message digest algorithm 5 to generate signature file.
Step 102, in the time of each start, by changeless feature in current each preset file in terminalPart connects the current signature file of generation, and from the signature literary composition of predetermined memory space reading pre-storedPart, judges that whether current signature file is consistent with the signature file of first storage, determining in inconsistent situation,Recovery dispatch from the factory before preset file in terminal.
Below in conjunction with accompanying drawing, dispatching from the factory of the embodiment of the present invention write to the skill of signature flow process and start sign test name flow processArt scheme is elaborated.
Fig. 2 is the flow chart that dispatching from the factory of example of the present invention write signature, as shown in Figure 2, specifically comprises following placeReason:
Step 1, while dispatching from the factory, finds out or adds the characteristic of the file that will protect, and characteristic refers to notThe part changing with system upgrade. For example, the mandate of file explanation, some attributes of file are as author,These can serve as the characteristic of file. If can not find, can insert hereof some not with beingThe mark that system upgrading changes. If itself does not change file with system upgrade, can be directly whole fileTreat as tag file;
Step 2, the characteristic of file reading is saved in temporary file;
Step 3, couples together all temporary files to generate a temporary file, and method of attachment can be directWith the TAR instrument of LINUX;
Step 4, adopt certain algorithm as MD5 code calculation according to as described in temporary file generate signature;
Step 5, while dispatching from the factory is saved in signature in ROM or other disposable memories.
Fig. 3 is the flow chart of the start sign test name of the embodiment of the present invention, as shown in Figure 3, comprises following processing:
Step 1, after start, finds out the characteristic of the preset application that will protect, obtains the side of characteristicMethod is write signature flow process with dispatching from the factory;
Step 2, the characteristic of file reading is saved in temporary file;
Step 3, couples together all temporary files to generate a temporary file, and method of attachment can be directWith the TAR instrument of LINUX;
Step 4, adopt certain algorithm as MD5 code calculation according to as described in temporary file generate signature;
Step 5, checks that whether the signature calculating is identical with the signature of preserving in ROM, if identical,Execution step 6, otherwise, execution step 7;
Step 6, is normally used.
Step 7; Adopt certain recovery measure. As point out customer upgrade system, from the preset file of network recoveryDeng, normal use after recovering.
In sum, by means of the technical scheme of the embodiment of the present invention, by by the feature of all preset filesPart couples together, and generates signature file, these signature files is write to predetermined storage sky in the time that terminal is dispatched from the factoryBetween in, and whether with preset file consistent, recover these literary compositions as inconsistent if detecting these signatures in when startAfter part, allow user use, the user ROOT system in prior art that solved causes the preset file of terminal to be deleted againThe problem of removing, can, in the situation that preset file is deleted by user, recover these preset files automatically, fromAnd avoid after user ROOT, system can not normally start, and need to take maintenace point and go the trouble of keeping in repair, andAnd mobile phone manufacturer and operator's interests are protected.
Device embodiment
According to embodiments of the invention, a kind of device of protecting preset file is provided, Fig. 4 is that the present invention is realExecute the structural representation of the device of the routine preset file of protection, as shown in Figure 4, according to the embodiment of the present inventionProtect the device of preset file to comprise: signature blocks 40 and recover module 42, below real to the present inventionExecuting routine modules is described in detail.
Signature blocks 40, for connecting changeless characteristic in each preset file of terminalGenerate signature file, and before terminal is dispatched from the factory, signature file is written in the predetermined memory space of terminal; ItsIn, predetermined memory space comprises: read only memory ROM or other disposable memories.
Signature blocks 40 is further used for: before terminal is dispatched from the factory, fixing by inserting in the preset file of terminalConstant signature identification, and characteristic using signature identification as corresponding preset file;
Signature blocks 40 specifically for: the TAR instrument that adopts LINUX operating system by terminal eachIn preset file, changeless characteristic connects, and adopts message digest algorithm 5 to generate signature literary compositionPart.
In embodiments of the present invention, characteristic can also comprise: the mandate explanation of preset file, preset literary compositionThe particular community of part and/or preset file itself.
Recover module 42, in the time starting shooting at every turn, will in terminal, in current each preset file, immobilizeCharacteristic connect and generate current signature file, and from the label of predetermined memory space reading pre-storedName file, judges that whether current signature file is consistent with the signature file of first storage, in definite inconsistent feelingsUnder condition, recover the preset file in terminal before dispatching from the factory.
In sum, the embodiment of the present invention, by the characteristic of all preset files is coupled together, generatesSignature file is write these signature files in predetermined memory space in the time that terminal is dispatched from the factory, and inspection in the time of startWhether unanimously with preset file survey these signatures, recover as inconsistent to allow again user use after these files,The user ROOT system in prior art that solved causes the deleted problem of the preset file of terminal, can be in advancePut in the situation that file deleted by user, automatically recover these preset files, thereby avoid after user ROOT,System can not normally start, need to take maintenace point go maintenance trouble, and protected mobile phone manufacturer andOperator's interests.
Obviously, those skilled in the art can carry out various changes and modification and not depart from this present inventionBright spirit and scope. Like this, if of the present invention these amendment and modification belong to the claims in the present invention andWithin the scope of its equivalent technologies, the present invention be also intended to comprise these change and modification interior.
The algorithm providing at this and demonstration are not intrinsic with any certain computer, virtual system or miscellaneous equipmentRelevant. Various general-purpose systems also can with based on using together with this teaching. According to description above, structureIt is apparent making the desired structure of this type systematic. In addition, the present invention is not also for any certain programmedLanguage. It should be understood that and can utilize various programming languages to realize content of the present invention described here, andThe description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the description that provided herein, a large amount of details are described. But, can understand, thisBright embodiment can put into practice in the situation that there is no these details. In some instances, not detailedKnown method, structure and technology are shown, so that not fuzzy understanding of this description.
Similarly, should be appreciated that for simplify the disclosure and help to understand in each inventive aspect one orMultiple, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is sometimes by oneRise and be grouped into single embodiment, figure or in its description. But, should be by the method for the disclosureBe construed to the following intention of reflection: the present invention for required protection requires clearer and more definite than institute in each claimThe more feature of feature of recording. Or rather, as reflected in claims below, send outBright aspect is to be less than all features of disclosed single embodiment above. Therefore, follow detailed description of the inventionClaims be incorporated to clearly thus this detailed description of the invention, wherein each claim conduct itselfIndependent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out certainly the module in the client in embodimentChange adaptively and they are arranged in one or more clients different from this embodiment. CanModule in embodiment is combined into a module, and can puts them in addition multiple submodules or sonUnit or sub-component. Except at least some in such feature and/or process or unit are mutually to repel itCan adopt any combination to public in this description (comprising claim, summary and the accompanying drawing followed) outward,All processes or the unit of all features of opening and so disclosed any method or client carry out groupClose. Unless clearly statement is in addition public in this description (comprising claim, summary and the accompanying drawing followed)Each feature of opening can be by providing identical, be equal to or the alternative features of similar object replaces.
In addition, although those skilled in the art will appreciate that embodiment more described herein comprise otherIncluded some feature instead of further feature in embodiment, but the combination of the feature of different embodiment meaningTaste within scope of the present invention and is formed different embodiment. For example, claim belowIn book, the one of any of embodiment required for protection can be used with combination arbitrarily.
All parts embodiment of the present invention can realize with hardware, or with at one or more processorThe software module of upper operation realizes, or realizes with their combination. It will be understood by those of skill in the art thatCan use in practice microprocessor or digital signal processor (DSP) to realize real according to the present inventionExecute the some or all functions of the some or all parts in the routine client that is loaded with sequence network address.The present invention can also be embodied as for carry out method as described herein part or all equipment orPerson's device program (for example, computer program and computer program). Like this realize journey of the present inventionOrder can be stored on computer-readable medium, or can have the form of one or more signal. ThisThe signal of sample can be downloaded and obtain from internet website, or provides on carrier signal, or with anyOther forms provide.
It should be noted above-described embodiment the present invention will be described instead of limit the invention, andAnd those skilled in the art can design to replace and implement in the case of not departing from the scope of claimsExample. In the claims, any reference symbol between bracket should be configured to claimRestriction. Word " comprises " not to be got rid of existence and is not listed as element or step in the claims. Before being positioned at elementWord " " or " one " do not get rid of and have multiple such elements. If the present invention can be by means of includingThe hardware of dry different elements and realizing by means of the computer of suitably programming. Enumerating some devicesIn unit claim, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order. These word explanations can be run after fameClaim.

Claims (10)

1. a method for the preset file of protection, is characterized in that, comprising:
Changeless characteristic in each preset file in terminal is connected and generates signature file, and before terminal is dispatched from the factory, described signature file is written in the predetermined memory space of terminal;
In the time of each start, changeless characteristic in current each preset file in described terminal is connected and generates current signature file, and from the described signature file of described predetermined memory space reading pre-stored, judge that whether described current signature file is consistent with the described signature file of first storage, determining in inconsistent situation, recovering the preset file in described terminal before dispatching from the factory.
2. the method for claim 1, is characterized in that, described method further comprises:
Before terminal is dispatched from the factory, will in the preset file of described terminal, insert changeless signature identification, and characteristic using described signature identification as corresponding preset file.
3. method as claimed in claim 2, is characterized in that, described characteristic also comprises: the mandate explanation of preset file, particular community and/or the preset file itself of preset file.
4. the method for claim 1, is characterized in that, changeless characteristic in each preset file in terminal is connected to generation signature file and specifically comprise:
Adopt the TAR instrument of LINUX operating system that changeless characteristic in each preset file in terminal is connected, and adopt message digest algorithm 5 to generate signature file.
5. the method for claim 1, is characterized in that, described predetermined memory space comprises: read only memory ROM or other disposable memories.
6. a device for the preset file of protection, is characterized in that, comprising:
Signature blocks, generates signature file for changeless characteristic in each preset file of terminal is connected, and before terminal is dispatched from the factory, described signature file is written in the predetermined memory space of terminal;
Recover module, for in the time starting shooting at every turn, changeless characteristic in current each preset file in described terminal is connected and generates current signature file, and from the described signature file of described predetermined memory space reading pre-stored, judge that whether described current signature file is consistent with the described signature file of first storage, determining in inconsistent situation, recovering the preset file in described terminal before dispatching from the factory.
7. device as claimed in claim 6, is characterized in that, described signature blocks is further used for:
Before terminal is dispatched from the factory, will in the preset file of described terminal, insert changeless signature identification, and characteristic using described signature identification as corresponding preset file.
8. device as claimed in claim 7, is characterized in that, described characteristic also comprises: the mandate explanation of preset file, particular community and/or the preset file itself of preset file.
9. device as claimed in claim 6, is characterized in that, described signature blocks specifically for:
Adopt the TAR instrument of LINUX operating system that changeless characteristic in each preset file in terminal is connected, and adopt message digest algorithm 5 to generate signature file.
10. device as claimed in claim 6, is characterized in that, described predetermined memory space comprises: read only memory ROM or other disposable memories.
CN201410562056.6A 2014-10-21 2014-10-21 Method and device for protecting preset file Active CN105590065B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410562056.6A CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file
PCT/CN2015/079224 WO2016062080A1 (en) 2014-10-21 2015-05-18 Profile protecting method and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410562056.6A CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file

Publications (2)

Publication Number Publication Date
CN105590065A true CN105590065A (en) 2016-05-18
CN105590065B CN105590065B (en) 2020-07-31

Family

ID=55760217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410562056.6A Active CN105590065B (en) 2014-10-21 2014-10-21 Method and device for protecting preset file

Country Status (2)

Country Link
CN (1) CN105590065B (en)
WO (1) WO2016062080A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231635B2 (en) * 2000-04-28 2007-06-12 Sun Microsystems, Inc. Remote incremental program verification using API definitions
CN101582275A (en) * 2008-05-16 2009-11-18 索尼株式会社 Information processing apparatus, information recording medium, information processing method, and information processing program
CN102831031A (en) * 2011-06-17 2012-12-19 鸿富锦精密工业(深圳)有限公司 Recovery method and system for operating system
CN103577211A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Novel packaging and burning as well as updating methods for Android ROM (read only memory) system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7788230B2 (en) * 2007-01-23 2010-08-31 International Business Machines Corporation Backing-up and restoring files including files referenced with multiple file names
CN101340675A (en) * 2008-08-27 2009-01-07 深圳华为通信技术有限公司 Method and apparatus for implementing backup and recovery by mobile terminal
CN103514065B (en) * 2012-06-29 2016-08-10 国基电子(上海)有限公司 Tool automatically detects and recovers electronic installation and the method for function

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231635B2 (en) * 2000-04-28 2007-06-12 Sun Microsystems, Inc. Remote incremental program verification using API definitions
CN101582275A (en) * 2008-05-16 2009-11-18 索尼株式会社 Information processing apparatus, information recording medium, information processing method, and information processing program
CN102831031A (en) * 2011-06-17 2012-12-19 鸿富锦精密工业(深圳)有限公司 Recovery method and system for operating system
CN103577211A (en) * 2012-08-08 2014-02-12 上海赤炫信息科技有限公司 Novel packaging and burning as well as updating methods for Android ROM (read only memory) system
CN103729597A (en) * 2014-01-16 2014-04-16 宇龙计算机通信科技(深圳)有限公司 System starting verifying method and device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN108985104B (en) * 2018-07-20 2022-01-21 南昌黑鲨科技有限公司 Encryption method of intelligent terminal and intelligent terminal

Also Published As

Publication number Publication date
WO2016062080A1 (en) 2016-04-28
CN105590065B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
US8032880B2 (en) Multi-branch management for updating software
CN104517054A (en) Method, device, client and server for detecting malicious APK
CN102736978A (en) Method and device for detecting installation status of application program
CN109542844B (en) Event log collection method and system, electronic equipment and storage medium
CN103279706A (en) Method and device for intercepting installation of Android application program in mobile terminal
CN110162429B (en) System repair method, server and storage medium
CN103995774B (en) Method and device for detecting software installation package
CN106940651A (en) POS terminal method for upgrading software and device
CN103646082A (en) Method and device for checking files
CN102662647B (en) A kind of (SuSE) Linux OS and security upgrading method thereof
CN103513999B (en) A kind of method and electronic equipment for updating system firmware
CN104036194B (en) Vulnerability detection method and device for revealing private data in application program
CN104217137A (en) Method and device for identifying whether intelligent terminal system is changed
CN103631603A (en) Software cleaning method and system
WO2015131643A1 (en) Software detection method and device
CN105204963A (en) Data caching method and device
CN107632932B (en) Multi-stage checking software warehouse reliability detection method
CN106201602A (en) A kind of tag providing method, acquisition methods, server and electronic equipment
CN103500114A (en) Method and device for installing application program
CN105590065A (en) Method and apparatus for protecting preset files
CN103095698B (en) The restorative procedure of client software, device and communication system
CN104239112A (en) Device driver installation method and device
CN114830117A (en) Verification information correction device, verification information correction method, and verification information correction program
CN105553767A (en) Website backdoor file detection method and device
JP5905313B2 (en) Information processing apparatus, information processing method, information processing system, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200701

Address after: Yuhuatai District of Nanjing City, Jiangsu province 210012 Bauhinia Road No. 68

Applicant after: Nanjing Zhongxing New Software Co.,Ltd.

Address before: 518057 Nanshan District Guangdong high tech Industrial Park, South Road, science and technology, ZTE building, Ministry of Justice

Applicant before: ZTE Corp.

GR01 Patent grant
GR01 Patent grant