CN105653932B - The method and apparatus of software upgrading verification - Google Patents

The method and apparatus of software upgrading verification Download PDF

Info

Publication number
CN105653932B
CN105653932B CN201511018132.8A CN201511018132A CN105653932B CN 105653932 B CN105653932 B CN 105653932B CN 201511018132 A CN201511018132 A CN 201511018132A CN 105653932 B CN105653932 B CN 105653932B
Authority
CN
China
Prior art keywords
character
software
hardware
character string
sequence number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511018132.8A
Other languages
Chinese (zh)
Other versions
CN105653932A (en
Inventor
丘婷
丘一婷
唐周标
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Falcon Safety Technology Co., Ltd
Original Assignee
Beijing Kingsoft Security Management System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Security Management System Technology Co Ltd filed Critical Beijing Kingsoft Security Management System Technology Co Ltd
Priority to CN201511018132.8A priority Critical patent/CN105653932B/en
Publication of CN105653932A publication Critical patent/CN105653932A/en
Application granted granted Critical
Publication of CN105653932B publication Critical patent/CN105653932B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Abstract

The invention discloses a kind of methods of software upgrading verification, including:Whether the sequence number of inspection software is correct;If the sequence number of the software is correct, whether the hardware ID for detecting the hardware for installing the software is correct;If the hardware ID is correct, whether the MD5 values for detecting authority are correct;If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires;If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled;If the sequence number of the software is not disabled, upgrade the software.Invention additionally discloses a kind of devices of software upgrading verification.This method and device improve the safety of software upgrading verification.

Description

The method and apparatus of software upgrading verification
Technical field
The present invention relates to software upgrading technical fields, and in particular to a kind of method and apparatus of software upgrading verification.
Background technology
Software upgrading refers to after modification to program or new function being added, keeping software continuous after software publishing Perfect, after the software publication after improving, user downloads update software and completes software upgrading.In order to protect software copyright, The equity of developer and user, when software upgrading, generally require upgrading verification.The upgrading verification of major part software product at present is all Using this relatively simple verification mode of account number cipher.This verification mode is stolen there are account or is tampered to influence The risk of upgrading.
Invention content
The above-mentioned deficiency for aiming to overcome that the prior art of the embodiment of the present invention provides a kind of side of software upgrading verification Method can improve the safety of software upgrading verification process.
The another object of the embodiment of the present invention is to overcome the above-mentioned deficiency of the prior art, provides a kind of software upgrading verification Device, the safety of software upgrading verification process can be improved.
In order to achieve the above-mentioned object of the invention, the technical solution of the embodiment of the present invention is as follows:
A kind of method of software upgrading verification, including:Whether the sequence number of inspection software is correct;If the sequence of the software Row number is correct, then whether the hardware ID for detecting the hardware for installing the software is correct;If the hardware ID is correct, detection is awarded Whether the MD5 values for weighing file are correct;If the MD5 values of the authority are correct, inquiring the update time that mandate allows is It is no to expire;If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;If described soft Part upgrading number is less than limitation, then whether the sequence number for inquiring the software is disabled;If the sequence number of the software is not It is disabled, then upgrade the software.
Further, further include:The step of the step of generating the authority, the generation authority includes: Software information is obtained according to the sequence number of the software;By the software information, the sequence number of the software and the software Version information generates the first character string;Part first character is intercepted since the first character of first character string String;Part first character string that interception is replaced with the second character string obtains third character string, the length of second character string Degree is N byte, the equal length of the length of second character string and the part of interception first character string;By the third The character of N+1 character A to the third character string in a last character in character string replaces with new word successively Symbol, obtains the 4th character string;4th character string is saved as into authority.
Further, the process for obtaining the 4th character string includes:By N+1 character A in the third character string Subscript modulus described in the second character string length N, obtain the first numerical value n;Obtain (n+1)th character of second character string B;The character B is converted into binary number b;The character A is converted into binary number a;By the binary number b and described Binary number a carries out step-by-step xor operation, obtains numerical value c;The numerical value c is replaced to N+1 words of the third character string Accord with A;The cycle above process is replaced until the last character in the third character string.
Further, further include:The hardware ID is generated, the process for generating the hardware ID includes:Obtain disk sequence Row number, the Disk Serial Number are the first character group being made of character;By two characters adjacent in first character group Position exchange to form the second character group;The partial character of second character group is subjected to character filtering;By filtered portion Divide character as the hardware ID.
Further:During the acquisition Disk Serial Number, the length of first character group is m bytes;It is described to incite somebody to action The position of two adjacent characters, which is exchanged, in first character group to form the process of the second character group and includes:From first word The first character of symbol group starts, with two adjacent characters for one group, by the position of described two characters in described one group It is exchanged;The process that the partial bytes by second character group carry out character filtering includes:Described is judged one by one Whether the preceding x character of two character groups is character in standard character group, wherein o<x≤m;By the preceding x of second character group The character being not belonging in a character in the standard character group is replaced to form the filtered partial character with preset characters.
Further, the character in the standard character group includes:A~z, A~Z and 0~9.
Further, before software upgrading verification, further include:Obtain and preserve the MD5 values of the authority, institute The MD5 values for stating authority are the MD5 values of the 4th character string.
Further, before software upgrading verification, further include:Store the sequence number of the software;The software is activated, The hardware ID for the hardware for installing the software is preserved, and the sequence number of the software, licencing key and the hardware ID are bound.
And a kind of device of software upgrading verification, including:First module, just whether the sequence number for inspection software Really;Second module, if for the software sequence number it is correct, detect the hardware for installing the software hardware ID whether Correctly;Third module, if correct for the hardware ID, whether the MD5 values for detecting authority are correct;4th module, If the MD5 values for the authority are correct, inquire authorizing whether the update time allowed expires;5th module is used If not yet due in the update time, inquire authorizing whether the upgrading number allowed is more than limitation;6th module, for such as Software upgrading number described in fruit is less than limitation, then whether the sequence number for inquiring the software is disabled;7th module, for such as The sequence number of software described in fruit is not disabled, then upgrades the software.
Further, further include:8th module, for generating the authority;9th module, for obtaining and preserving institute State the MD5 values of authority;Tenth module, the sequence number for storing the software;11st module, for activating this soft Part, preserves the hardware ID for the hardware for installing the software, and the sequence number of the software, licencing key and the hardware ID are tied up It is fixed.
The embodiment of the present invention has the beneficial effect that:
1, the method for the software upgrading verification of the embodiment of the present invention can be easily real in software upgrading verification process The now safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information Dictionary etc. is largely attacked.
2, the device of the software upgrading verification of the embodiment of the present invention can be easily real in software upgrading verification process The now safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information Dictionary etc. is largely attacked.
Description of the drawings
Fig. 1 is the flow chart of the method for the software upgrading verification of the embodiment of the present invention;
Fig. 2 is the flow chart of the method for the generation authority of the embodiment of the present invention;
Fig. 3 is the structural schematic diagram of the device of the software upgrading verification of the embodiment of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, right below in conjunction with drawings and examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
An embodiment of the present invention provides a kind of methods of software upgrading verification.The method of software upgrading verification is used for network Server side.As shown in Figure 1, the flow chart of the method for the software upgrading verification of the embodiment of the present invention.The specific mistake of this method Journey is as follows:
Before the software is verified in upgrading, this method includes following process:
Step S10:Store the sequence number of the software.
In general, after the product (such as CD, flash memory etc.) for the carrying software that completes, network server can be pre- The sequence number for first storing the software, so that whether the sequence number that subsequently can detect software input by user is correct.On each product The software of carrying has different sequence numbers, and the software carried on the sequence number of the software and each product uniquely corresponds to. The sequence number of the software can be by being attached to the packaging of product or being documented in the modes such as specification so that user knows the software Sequence number.
Step S20:Activate the software, preserve the hardware ID for the hardware for installing the software, and by the sequence number of software, authorize Password and hardware ID binding.
User by the software installation on hardware after, can by way of being inputted on webpage by the sequence number of software, award Power password, hardware ID etc. are sent to network server, so that network server activates the software on the hardware and preserves the hardware The information such as hardware ID.During activation, network server can also record the time for activating the software.
Hardware ID is the ID number of energy one machine of unique mark.Software includes system centre, server client, common Three modules of client, the hardware ID described in technical scheme of the present invention refer to the machine for being mounted with system centre module ID number.
When user is after buying software, software can be obtained by searching or reading the modes such as specification in packaging sequence Row number.
Licencing key is user-defined character string.Character in the character string can be capitalization, lowercase, Numbers and symbols etc..Under normal circumstances, network server can limit the length of licencing key and define the group established practice of its character Then, for example, the length that can limit licencing key is 6, the character for forming licencing key can only be 1~9 number.
The hardware ID is generated by following process:
(1) Disk Serial Number is obtained.
The Disk Serial Number is the first character group being made of character.The Disk Serial Number is typically chosen system disk or peace Fill the sequence number of the disk of the software.The character can be capitalization, lowercase, numbers and symbols etc..Preferably, The length of one character group is x bytes.For example, the length of the first character group is 20 bytes, the first character group is # 123456789abcdeABCDE。
(2) it exchanges the position of two characters adjacent in the first character group to form the second character group.
The step can exchange the position of the adjacent character of any two.Preferably, exchange rule in the position is:From The first character of one character group starts, and with two adjacent characters for one group, the position of two characters in one group is carried out It exchanges.For example, after preferably exchanging rule using this, the first character group #123456789abcdeABCDE becomes the second character group 1#32547698badcAeCBED。
(3) partial character of the second character group is subjected to character filtering.
Character filtering can be filtered according to certain rule, to which the character for not being inconsistent normally is replaced with other words Symbol is to realize the filter process of character.
Preferably, the step of character filtering can be carried out according to following process:
(a) judge whether the preceding x character of the second character group is character in standard character group one by one.
The standard character group can arbitrarily be defined by network server.For example, the character in the standard character group includes:a ~z, A~Z and 0~9, that is to say, that when character is any character in a~z, A~Z and 0~9, which is standard word Symbol.For example, according to the definition of above-mentioned standard character, in addition to character " # " in the second character group 1#32547698badcAeCBED, He is standard character entirely.
Wherein, o<x≤m.For example, when x is 8, then preceding 8 characters of the second character group need to be only judged.
(b) character being not belonging in the preceding x character of the second character group in standard character group preset characters are replaced into shape At filtered partial character.
There is no limit can be capitalization, lowercase, number, symbol etc. to preset characters.For example, the second character Second character " # " is then replaced with K by group 1#32547698badcAeCBED when preset characters are K, and x is 8, filtered Partial character is 1K325476.
(4) using filtered partial character as hardware ID.
For example, the above-mentioned filtered partial character 1K325476 is as hardware ID.
The generating process of the hardware ID obtains new character group by specific method filtering characters and is used as hardware ID, can To improve the safety of subsequent upgrade verification process, the risk that hardware ID is cracked or usurps is reduced.
Step S30:Generate authority.
As shown in Fig. 2, step S30 specifically includes following process:
Step S31:Software information is obtained according to the sequence number of software.
Preferably, which includes:The system centre section that the type of the sequence number of software, the sequence number of software are bound The upgrading for the client node number, software that points, the server node number of sequence number binding of software, the sequence number of software are bound The term of validity.
Wherein, the type of the sequence number of the software includes:Trial edition sequence number, ordinary enterprises version sequence number and high-level enterprise Version sequence number etc..
The software information can be at least one of above- mentioned information, can also be a variety of combinations in above- mentioned information.
When the software includes simultaneously three system centre, server, client modules, then the software information can be simultaneously The sequence of the server node number and software of the sequence number binding of the system centre number of nodes, software of sequence number binding including software The client node number of row number binding.
The software of one binding sequence number has just been bundled with serial number type, system centre number of nodes, clothes when selling The information such as business device number of nodes, client node number, the upgrading term of validity will obtain these information and only need to inquire database.
Step S32:The version information of software information, the sequence number of software and software is generated into the first character string.
Above-mentioned version information includes the date of software publication.The statement of date may be used in the date of software publication Form is denoted as XXXXXXXX, wherein first 4 are year, and and then two are the moon, and last two are day.Such as the date of issue of software Phase is on 2 27th, 2007, then the version information is denoted as 20070227.
The step can be by writing the version information of the sequence number of software information, software and software in a certain order Enter in output buffer and obtains.The generating process is the state of the art.Output buffer refers to a fritter of computer For storing the memory of data.It is of course also possible to these character string informations are not written into output buffer, but with any one piece Memory field stores, and can do subsequent operation.Can be below when output buffer is written in above-mentioned character string information File output prepare.
The character of first character string is number, lowercase a~z and capitalization A~Z.Such as first character string be 1234567。
Step S33:The first character string of part is intercepted since the first character of the first character string.
The length of the first character string of part of interception is unlimited, but the length should be less than the total length of the first character string, and big In 0.Such as the first character string of part of interception is 1234.
Step S34:The first character string of part that interception is replaced with the second character string obtains third character string.
The length of second character string is N byte.The length of second character string and the first character string of part of interception Equal length.Second character string is customized character string.The character of second character string is for digital, lowercase a~z and greatly Write female A~Z.For example, the second character string is customized for 4321, then the length N of the second character string is 4 bytes, replaced Third character string is 4321567.
Step S35:By N+1 character A in third character string to the word of the third character string in a last character Symbol replaces with new character successively, obtains the 4th character string.
Wherein, step S35 specifically includes following process again:
(1) by the length N of the second character string of subscript modulus of N+1 character A in third character string, the first number is obtained Value n.
Lower target meaning in the present invention is:When character A is N+1 characters, N is designated as under character A.
Wherein, the subscript that the result of modulus is character A divided by the remainder that N is obtained.
For example, the length N of the second above-mentioned character string is 4, then the 5th in third character string character A is the 5, the 5th word 4 are designated as under symbol A, the first numerical value n is 0.
(2) (n+1)th character B of the second character string is obtained.
For example, when the first numerical value n is 0, then the 1st character B in the second character string 4321 is 4.
(3) character B is converted into binary number b.
For example, when character B is 4, binary number b is 100.
(4) character A is converted into binary number a.
For example, when character A is 5, binary number a is 101.
(5) binary number b and binary number a are subjected to step-by-step xor operation, obtain numerical value c.
For example, above-mentioned when binary number b is 100, binary number a is 101, and the numerical value c obtained after step-by-step xor operation is 101。
(6) numerical value c is replaced to N+1 character A of third character string.
For example, the 5th character A in third character string, i.e. number 5, are replaced by 101.
(7) above process is recycled until the last character in third character string is replaced.
For example, for above-mentioned third character string be 4321567, recycle above-mentioned process, then will use step (1)~ (6) character 6 and 7 in third character string is replaced successively, then it is as follows specifically to replace result:
It is designated as 5,5 under 6th character 6 and obtains the first numerical value n by 4 modulus to be 1, binary number a is 1, the second character The 2nd character B in string is 3, and binary number b is 11, then the numerical value c that step-by-step exclusive or obtains is replaced by for 10, final 6 10。
6 are designated as under 7th character 7, is 2 by 4 modulus, binary number a is 10, the 3rd word in the second character string It is 2 to accord with B, and binary number b is 10, then the numerical value c that step-by-step exclusive or obtains is replaced by 10 for 10, final 7.
By above-mentioned replacement process, final third character string 4321567 is replaced by the 4th character string 43211011010。
Step S36:4th character string is saved as into authority.
For example, the 4th character string 43211011010 is saved as into authority, it can be by defeated by the 4th character string Go out and is realized to a null file and preservation.
When in software installation to a new hardware, then hardware ID can change.Needing to preserve installation, this is new hard Part ID, and sequence number, licencing key and the new hardware ID of software are bound again, one is then regenerated as procedure described above Part new authority, can just to upgrade after subsequently making user import the new authority.
The process of above-mentioned generation authority will be replaced with newly by the first character string of the generations such as the relevant information of software The 4th character string the safety of authority is improved by the 4th text string generation authority.
Step S40:Obtain and preserve the MD5 values of authority.
The MD5 values of the authority are the MD5 values of the 4th character string.MD5, that is, Message-Digest Algorithm 5 (Message-Digest Algorithm 5) is that one of widely used hash algorithm of computer (and is translated for ensuring that information transmission is complete consistent Digest algorithm, hash algorithm).The MD5 values can be realized by existing mainstream programming language.
Step S50:The authority, which is sent on the hardware for installing the software, to be made to load the authority on the hardware.
By above-mentioned process, the preparation for upgrading software is completed.After the completion of the preparation for upgrading software, the software Upgrade the step that the process verified further includes specifically following:
Step S60:Whether the sequence number of inspection software is correct.
The sequence number of software is sent to network server by user's cocoa by way of being inputted on webpage.Certainly, Network server can be made to obtain the sequence number of the software by other prior arts.For example, being stored in the network server The sequence number #123456789abcdeABCDE of software, the then if sequence number of software input by user is also # 123456789abcdeABCDE then judges that the sequence number of software is correct, carries out step S70;Otherwise, step S130, network are carried out Server refuses the software upgrading request of user.
Step S70:If the sequence number of software is correct, whether the hardware ID for detecting the hardware of installation software is correct.
Network server can detect the hardware ID of the hardware automatically.It is of course also possible to make net by other prior arts Network server obtains the hardware ID.For example, be stored in the network server this with above-mentioned software sequence number binding it is hard Part ID is 1K325476, then if the hardware ID detected is also 1K325476, determination hardware ID is correct, carries out step S80; Otherwise, step S130 is carried out, network server refuses the software upgrading request of user.
Step S80:If the hardware ID is correct, whether the MD5 values for detecting authority are correct.
Network server can detect the MD5 values of the authority automatically.It is of course also possible to be made by other prior arts Network server obtains the MD5 values of the authority.For example, if the MD5 values of the authority detected and the MD5 values of preservation It is identical, then judge that MD5 values are correct, carries out step S90;Otherwise, step S130 is carried out, network server refuses the software liter of user Grade request.
Step S90:If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires.
For example, upgrading allow time be from activate the software from 1 year, then inquire request upgrading time Away from whether activating from the software more than 1 year, if be not above, step S100 is carried out;Otherwise, step S130 is carried out, Network server refuses the software upgrading request of user.The present invention inquire authorize allow update time mode not as Limit, can also be other modes, for example, authorizing the time allowed by limiting the specific date to determine, if inquiring this Exact date has been subjected to, then refuses upgrade request;If the exact date arrives not yet, step S100 is carried out.
Step S100:If update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation.
For example, upgrading number can be set to 9999 times, to prevent malicious attack.If inquiring mandate permission Upgrading number is not above 9999 times, then carries out step S110;Otherwise, step S130 is carried out, network server refuses user's Software upgrading is asked.
Step S110:If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled.
If the sequence number of the software is not disabled, step S120 is carried out;Otherwise, step S130, network service are carried out Device refuses the software upgrading request of user.
Step S120:If the sequence number of the software is not disabled, upgrade the software.
Step S130:Refusal upgrades the software.
The method of the software upgrading verification of the present invention can be realized easily in software upgrading verification process based on mark It is big can to resist wooden horse, password dictionary etc. in conjunction with hardware id information and authority MD5 information for the safety identification authentication of knowledge Part is attacked.
The embodiment of the present invention additionally provides a kind of device of software upgrading verification.As shown in figure 3, for the embodiment of the present invention The structural schematic diagram of the device of software upgrading verification.The device can be network serverless backup, such as cloud service platform.The software The method that the device of upgrading verification can realize above-mentioned software upgrading verification.The device of software upgrading verification includes following knot Structure:
Whether the first module 101, the sequence number for inspection software are correct.
Second module 102, if for software sequence number it is correct, detect installation software hardware hardware ID whether Correctly.
Third module 103, if correct for hardware ID, whether the MD5 values for detecting authority are correct.
4th module 104, if for authority MD5 values it is correct, inquire authorize allow update time whether It expires.
5th module 105 inquires authorizing whether the upgrading number allowed is more than limit if not yet due for update time System.
6th module 106, if being less than limitation for software upgrading number, whether the sequence number of query software is banned With.
7th module 107 upgrades the software if the sequence number for software is not disabled.
Preferably, which further includes:
8th module 108, for generating authority.
9th module 109, the MD5 values for obtaining and preserving authority.
Tenth module 110, the sequence number for storing software.
11st module 111 preserves the hardware ID for the hardware for installing the software for activating the software, and by software Sequence number, licencing key and hardware ID binding.
The device of the software upgrading verification of the embodiment of the present invention can be realized easily in software upgrading verification process Safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information Allusion quotation etc. is largely attacked.
The present invention provides being only presently preferred embodiments of the present invention described in more than one, not limiting this hair It is bright, all within the spirits and principles of the present invention made by all any modification, equivalent and improvement etc., the present invention should all be included in Protection domain within.

Claims (9)

1. a kind of method of software upgrading verification, which is characterized in that including:
Whether the sequence number of inspection software is correct;
If the sequence number of the software is correct, whether the hardware ID for detecting the hardware for installing the software is correct;
If the hardware ID is correct, whether the MD5 values for detecting authority are correct;
If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires;
If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;
If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled;
If the sequence number of the software is not disabled, upgrade the software;
Wherein, the generating process of the hardware ID includes:
Disk Serial Number is obtained, the Disk Serial Number is the first character group being made of character;
It exchanges the position of two characters adjacent in first character group to form the second character group;
The partial character of second character group is subjected to character filtering;
Using filtered partial character as the hardware ID.
2. the method for software upgrading verification as described in claim 1, which is characterized in that further include:Generate the authority The step of, the step of generation authority includes:
Software information is obtained according to the sequence number of the software;
The version information of the software information, the sequence number of the software and the software is generated into the first character string;
Part first character string is intercepted since the first character of first character string;
Part first character string that interception is replaced with the second character string obtains third character string, the length of second character string Degree is N byte, the equal length of the length of second character string and the part of interception first character string;
By the character of N+1 character A in the third character string to the third character string in a last character according to It is secondary to replace with new character, obtain the 4th character string;
4th character string is saved as into authority.
3. the method for software upgrading verification as claimed in claim 2, which is characterized in that described to obtain the process of the 4th character string Including:
By the length N of the second character string described in the subscript modulus of N+1 character A in the third character string, first is obtained Numerical value n;
Obtain (n+1)th character B of second character string;
The character B is converted into binary number b;
The character A is converted into binary number a;
The binary number b and binary number a is subjected to step-by-step xor operation, obtains numerical value c;
The numerical value c is replaced to N+1 character A of the third character string;
The cycle above process is replaced until the last character in the third character string.
4. the method for software upgrading verification as described in claim 1, it is characterised in that:
During the acquisition Disk Serial Number, the length of first character group is m bytes;
The position by two characters adjacent in first character group, which is exchanged, to be formed the process of the second character group and includes:From The first character of first character group starts, will be described two in described one group with two adjacent characters for one group The position of character is exchanged;
The process that the partial bytes by second character group carry out character filtering includes:Second character is judged one by one Whether the preceding x character of group is character in standard character group, wherein o<x≤m;By the preceding x character of second character group In the character that is not belonging in the standard character group replaced to form the filtered partial character with preset characters.
5. the method for software upgrading verification as claimed in claim 4, which is characterized in that the character packet in the standard character group It includes:A~z, A~Z and 0~9.
6. the method for software upgrading verification as claimed in claim 2, which is characterized in that before software upgrading verification, Further include:The MD5 values of the authority are obtained and preserve, the MD5 values of the authority are the MD5 of the 4th character string Value.
7. the method for software upgrading verification as described in claim 1, which is characterized in that before software upgrading verification, Further include:
Store the sequence number of the software;
It activates the software, preserves the hardware ID for the hardware for installing the software, and by the sequence number of the software, licencing key and institute State hardware ID binding.
8. a kind of device of software upgrading verification, which is characterized in that including:
Whether the first module, the sequence number for inspection software are correct;
Second module, if the sequence number for the software is correct, detecting the hardware ID for the hardware for installing the software is It is no correct;
Third module, if correct for the hardware ID, whether the MD5 values for detecting authority are correct;
4th module inquires authorizing whether the update time allowed arrives if the MD5 values for the authority are correct Phase;
5th module inquires authorizing whether the upgrading number allowed is more than limitation if not yet due for the update time;
6th module, if being less than limitation for the software upgrading number, inquire the software sequence number whether by Disabling;
7th module upgrades the software if the sequence number for the software is not disabled;
8th module, for generating the authority.
9. the device of software upgrading verification as claimed in claim 8, which is characterized in that further include:
9th module, the MD5 values for obtaining and preserving the authority;
Tenth module, the sequence number for storing the software;
11st module preserves the hardware ID for the hardware for installing the software for activating the software, and by the sequence of the software Number, licencing key and the hardware ID binding.
CN201511018132.8A 2015-12-30 2015-12-30 The method and apparatus of software upgrading verification Active CN105653932B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511018132.8A CN105653932B (en) 2015-12-30 2015-12-30 The method and apparatus of software upgrading verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511018132.8A CN105653932B (en) 2015-12-30 2015-12-30 The method and apparatus of software upgrading verification

Publications (2)

Publication Number Publication Date
CN105653932A CN105653932A (en) 2016-06-08
CN105653932B true CN105653932B (en) 2018-11-06

Family

ID=56477374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511018132.8A Active CN105653932B (en) 2015-12-30 2015-12-30 The method and apparatus of software upgrading verification

Country Status (1)

Country Link
CN (1) CN105653932B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108008976B (en) * 2017-12-27 2021-08-27 上海贝岭股份有限公司 Software identifier generation method, computer readable storage medium and single chip microcomputer
CN111190614B (en) * 2019-12-26 2023-12-19 北京威努特技术有限公司 Software installation method and computer equipment
CN117150998B (en) * 2023-10-31 2024-01-19 上海合见工业软件集团有限公司 Hardware module equivalence verification system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6950863B1 (en) * 2000-12-21 2005-09-27 Cisco Technology, Inc. Method and system for verifying a software upgrade for a communication device
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102087685A (en) * 2009-12-04 2011-06-08 华为技术有限公司 Method for automatically converting authorization items, device and system thereof
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060282392A1 (en) * 2005-06-09 2006-12-14 International Business Machines Corporation Method and apparatus for dynamically controlling the selection and redundancy of web services components

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6950863B1 (en) * 2000-12-21 2005-09-27 Cisco Technology, Inc. Method and system for verifying a software upgrade for a communication device
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102087685A (en) * 2009-12-04 2011-06-08 华为技术有限公司 Method for automatically converting authorization items, device and system thereof
CN102208003A (en) * 2010-03-31 2011-10-05 鸿富锦精密工业(深圳)有限公司 Software program protection system and method
CN103971034A (en) * 2014-04-24 2014-08-06 福建联迪商用设备有限公司 Method and device for protecting Java software

Also Published As

Publication number Publication date
CN105653932A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
JP7411011B2 (en) Blockchain-implemented counting system and method used for secure voting and distribution
AU2019295815B2 (en) Blockchain-based data verification method and apparatus, and electronic device
CN107426165B (en) Bidirectional secure cloud storage data integrity detection method supporting key updating
CN109074434A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
CN109992285B (en) Independent updating method and device for block chain code block and electronic equipment
CN105653932B (en) The method and apparatus of software upgrading verification
CN112037058B (en) Data verification method, device and storage medium
CN106155742A (en) Assembly updates processing method and processing device
CN104579663B (en) For the method for the validity for limiting digital certificate
CN108009445A (en) A kind of trust data management system of half centralization
CN113344222A (en) Safe and credible federal learning mechanism based on block chain
CN113988857A (en) NFT transaction method, transaction system, computer-readable storage medium and terminal device
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN113656780A (en) Cross-link access control method and device
CN112464212A (en) Data authority control reconstruction method based on mature complex service system
WO2022206439A1 (en) Method and apparatus for providing cross-chain message
US20200379982A1 (en) Information processing system and method of controlling information processing system
CN111028077A (en) Intelligent contract protection method and system based on input filter
CN108090364B (en) Method and system for positioning data leakage source
CN108256351A (en) Document handling method and device, storage medium and terminal
CN113112354A (en) Transaction processing method of block chain network, block chain network and storage medium
CN111026569B (en) Method for repairing specified block data in alliance chain
CN107133499A (en) A kind of software copyright protecting method, client, service end and system
CN111291001A (en) Reading method and device of computer file, computer system and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing,

Patentee after: Beijing Falcon Safety Technology Co., Ltd

Address before: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing,

Patentee before: BEIJING KINGSOFT SECURITY MANAGEMENT SYSTEM TECHNOLOGY Co.,Ltd.