CN105653932B - The method and apparatus of software upgrading verification - Google Patents
The method and apparatus of software upgrading verification Download PDFInfo
- Publication number
- CN105653932B CN105653932B CN201511018132.8A CN201511018132A CN105653932B CN 105653932 B CN105653932 B CN 105653932B CN 201511018132 A CN201511018132 A CN 201511018132A CN 105653932 B CN105653932 B CN 105653932B
- Authority
- CN
- China
- Prior art keywords
- character
- software
- hardware
- character string
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012795 verification Methods 0.000 title claims abstract description 48
- 230000008569 process Effects 0.000 claims description 31
- 238000001914 filtration Methods 0.000 claims description 8
- 230000003213 activating effect Effects 0.000 claims description 5
- 230000007812 deficiency Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000002360 preparation method Methods 0.000 description 2
- 238000004321 preservation Methods 0.000 description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 235000009470 Theobroma cacao Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 244000240602 cacao Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005303 weighing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Abstract
The invention discloses a kind of methods of software upgrading verification, including:Whether the sequence number of inspection software is correct;If the sequence number of the software is correct, whether the hardware ID for detecting the hardware for installing the software is correct;If the hardware ID is correct, whether the MD5 values for detecting authority are correct;If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires;If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled;If the sequence number of the software is not disabled, upgrade the software.Invention additionally discloses a kind of devices of software upgrading verification.This method and device improve the safety of software upgrading verification.
Description
Technical field
The present invention relates to software upgrading technical fields, and in particular to a kind of method and apparatus of software upgrading verification.
Background technology
Software upgrading refers to after modification to program or new function being added, keeping software continuous after software publishing
Perfect, after the software publication after improving, user downloads update software and completes software upgrading.In order to protect software copyright,
The equity of developer and user, when software upgrading, generally require upgrading verification.The upgrading verification of major part software product at present is all
Using this relatively simple verification mode of account number cipher.This verification mode is stolen there are account or is tampered to influence
The risk of upgrading.
Invention content
The above-mentioned deficiency for aiming to overcome that the prior art of the embodiment of the present invention provides a kind of side of software upgrading verification
Method can improve the safety of software upgrading verification process.
The another object of the embodiment of the present invention is to overcome the above-mentioned deficiency of the prior art, provides a kind of software upgrading verification
Device, the safety of software upgrading verification process can be improved.
In order to achieve the above-mentioned object of the invention, the technical solution of the embodiment of the present invention is as follows:
A kind of method of software upgrading verification, including:Whether the sequence number of inspection software is correct;If the sequence of the software
Row number is correct, then whether the hardware ID for detecting the hardware for installing the software is correct;If the hardware ID is correct, detection is awarded
Whether the MD5 values for weighing file are correct;If the MD5 values of the authority are correct, inquiring the update time that mandate allows is
It is no to expire;If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;If described soft
Part upgrading number is less than limitation, then whether the sequence number for inquiring the software is disabled;If the sequence number of the software is not
It is disabled, then upgrade the software.
Further, further include:The step of the step of generating the authority, the generation authority includes:
Software information is obtained according to the sequence number of the software;By the software information, the sequence number of the software and the software
Version information generates the first character string;Part first character is intercepted since the first character of first character string
String;Part first character string that interception is replaced with the second character string obtains third character string, the length of second character string
Degree is N byte, the equal length of the length of second character string and the part of interception first character string;By the third
The character of N+1 character A to the third character string in a last character in character string replaces with new word successively
Symbol, obtains the 4th character string;4th character string is saved as into authority.
Further, the process for obtaining the 4th character string includes:By N+1 character A in the third character string
Subscript modulus described in the second character string length N, obtain the first numerical value n;Obtain (n+1)th character of second character string
B;The character B is converted into binary number b;The character A is converted into binary number a;By the binary number b and described
Binary number a carries out step-by-step xor operation, obtains numerical value c;The numerical value c is replaced to N+1 words of the third character string
Accord with A;The cycle above process is replaced until the last character in the third character string.
Further, further include:The hardware ID is generated, the process for generating the hardware ID includes:Obtain disk sequence
Row number, the Disk Serial Number are the first character group being made of character;By two characters adjacent in first character group
Position exchange to form the second character group;The partial character of second character group is subjected to character filtering;By filtered portion
Divide character as the hardware ID.
Further:During the acquisition Disk Serial Number, the length of first character group is m bytes;It is described to incite somebody to action
The position of two adjacent characters, which is exchanged, in first character group to form the process of the second character group and includes:From first word
The first character of symbol group starts, with two adjacent characters for one group, by the position of described two characters in described one group
It is exchanged;The process that the partial bytes by second character group carry out character filtering includes:Described is judged one by one
Whether the preceding x character of two character groups is character in standard character group, wherein o<x≤m;By the preceding x of second character group
The character being not belonging in a character in the standard character group is replaced to form the filtered partial character with preset characters.
Further, the character in the standard character group includes:A~z, A~Z and 0~9.
Further, before software upgrading verification, further include:Obtain and preserve the MD5 values of the authority, institute
The MD5 values for stating authority are the MD5 values of the 4th character string.
Further, before software upgrading verification, further include:Store the sequence number of the software;The software is activated,
The hardware ID for the hardware for installing the software is preserved, and the sequence number of the software, licencing key and the hardware ID are bound.
And a kind of device of software upgrading verification, including:First module, just whether the sequence number for inspection software
Really;Second module, if for the software sequence number it is correct, detect the hardware for installing the software hardware ID whether
Correctly;Third module, if correct for the hardware ID, whether the MD5 values for detecting authority are correct;4th module,
If the MD5 values for the authority are correct, inquire authorizing whether the update time allowed expires;5th module is used
If not yet due in the update time, inquire authorizing whether the upgrading number allowed is more than limitation;6th module, for such as
Software upgrading number described in fruit is less than limitation, then whether the sequence number for inquiring the software is disabled;7th module, for such as
The sequence number of software described in fruit is not disabled, then upgrades the software.
Further, further include:8th module, for generating the authority;9th module, for obtaining and preserving institute
State the MD5 values of authority;Tenth module, the sequence number for storing the software;11st module, for activating this soft
Part, preserves the hardware ID for the hardware for installing the software, and the sequence number of the software, licencing key and the hardware ID are tied up
It is fixed.
The embodiment of the present invention has the beneficial effect that:
1, the method for the software upgrading verification of the embodiment of the present invention can be easily real in software upgrading verification process
The now safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information
Dictionary etc. is largely attacked.
2, the device of the software upgrading verification of the embodiment of the present invention can be easily real in software upgrading verification process
The now safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information
Dictionary etc. is largely attacked.
Description of the drawings
Fig. 1 is the flow chart of the method for the software upgrading verification of the embodiment of the present invention;
Fig. 2 is the flow chart of the method for the generation authority of the embodiment of the present invention;
Fig. 3 is the structural schematic diagram of the device of the software upgrading verification of the embodiment of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, right below in conjunction with drawings and examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
An embodiment of the present invention provides a kind of methods of software upgrading verification.The method of software upgrading verification is used for network
Server side.As shown in Figure 1, the flow chart of the method for the software upgrading verification of the embodiment of the present invention.The specific mistake of this method
Journey is as follows:
Before the software is verified in upgrading, this method includes following process:
Step S10:Store the sequence number of the software.
In general, after the product (such as CD, flash memory etc.) for the carrying software that completes, network server can be pre-
The sequence number for first storing the software, so that whether the sequence number that subsequently can detect software input by user is correct.On each product
The software of carrying has different sequence numbers, and the software carried on the sequence number of the software and each product uniquely corresponds to.
The sequence number of the software can be by being attached to the packaging of product or being documented in the modes such as specification so that user knows the software
Sequence number.
Step S20:Activate the software, preserve the hardware ID for the hardware for installing the software, and by the sequence number of software, authorize
Password and hardware ID binding.
User by the software installation on hardware after, can by way of being inputted on webpage by the sequence number of software, award
Power password, hardware ID etc. are sent to network server, so that network server activates the software on the hardware and preserves the hardware
The information such as hardware ID.During activation, network server can also record the time for activating the software.
Hardware ID is the ID number of energy one machine of unique mark.Software includes system centre, server client, common
Three modules of client, the hardware ID described in technical scheme of the present invention refer to the machine for being mounted with system centre module
ID number.
When user is after buying software, software can be obtained by searching or reading the modes such as specification in packaging sequence
Row number.
Licencing key is user-defined character string.Character in the character string can be capitalization, lowercase,
Numbers and symbols etc..Under normal circumstances, network server can limit the length of licencing key and define the group established practice of its character
Then, for example, the length that can limit licencing key is 6, the character for forming licencing key can only be 1~9 number.
The hardware ID is generated by following process:
(1) Disk Serial Number is obtained.
The Disk Serial Number is the first character group being made of character.The Disk Serial Number is typically chosen system disk or peace
Fill the sequence number of the disk of the software.The character can be capitalization, lowercase, numbers and symbols etc..Preferably,
The length of one character group is x bytes.For example, the length of the first character group is 20 bytes, the first character group is #
123456789abcdeABCDE。
(2) it exchanges the position of two characters adjacent in the first character group to form the second character group.
The step can exchange the position of the adjacent character of any two.Preferably, exchange rule in the position is:From
The first character of one character group starts, and with two adjacent characters for one group, the position of two characters in one group is carried out
It exchanges.For example, after preferably exchanging rule using this, the first character group #123456789abcdeABCDE becomes the second character group
1#32547698badcAeCBED。
(3) partial character of the second character group is subjected to character filtering.
Character filtering can be filtered according to certain rule, to which the character for not being inconsistent normally is replaced with other words
Symbol is to realize the filter process of character.
Preferably, the step of character filtering can be carried out according to following process:
(a) judge whether the preceding x character of the second character group is character in standard character group one by one.
The standard character group can arbitrarily be defined by network server.For example, the character in the standard character group includes:a
~z, A~Z and 0~9, that is to say, that when character is any character in a~z, A~Z and 0~9, which is standard word
Symbol.For example, according to the definition of above-mentioned standard character, in addition to character " # " in the second character group 1#32547698badcAeCBED,
He is standard character entirely.
Wherein, o<x≤m.For example, when x is 8, then preceding 8 characters of the second character group need to be only judged.
(b) character being not belonging in the preceding x character of the second character group in standard character group preset characters are replaced into shape
At filtered partial character.
There is no limit can be capitalization, lowercase, number, symbol etc. to preset characters.For example, the second character
Second character " # " is then replaced with K by group 1#32547698badcAeCBED when preset characters are K, and x is 8, filtered
Partial character is 1K325476.
(4) using filtered partial character as hardware ID.
For example, the above-mentioned filtered partial character 1K325476 is as hardware ID.
The generating process of the hardware ID obtains new character group by specific method filtering characters and is used as hardware ID, can
To improve the safety of subsequent upgrade verification process, the risk that hardware ID is cracked or usurps is reduced.
Step S30:Generate authority.
As shown in Fig. 2, step S30 specifically includes following process:
Step S31:Software information is obtained according to the sequence number of software.
Preferably, which includes:The system centre section that the type of the sequence number of software, the sequence number of software are bound
The upgrading for the client node number, software that points, the server node number of sequence number binding of software, the sequence number of software are bound
The term of validity.
Wherein, the type of the sequence number of the software includes:Trial edition sequence number, ordinary enterprises version sequence number and high-level enterprise
Version sequence number etc..
The software information can be at least one of above- mentioned information, can also be a variety of combinations in above- mentioned information.
When the software includes simultaneously three system centre, server, client modules, then the software information can be simultaneously
The sequence of the server node number and software of the sequence number binding of the system centre number of nodes, software of sequence number binding including software
The client node number of row number binding.
The software of one binding sequence number has just been bundled with serial number type, system centre number of nodes, clothes when selling
The information such as business device number of nodes, client node number, the upgrading term of validity will obtain these information and only need to inquire database.
Step S32:The version information of software information, the sequence number of software and software is generated into the first character string.
Above-mentioned version information includes the date of software publication.The statement of date may be used in the date of software publication
Form is denoted as XXXXXXXX, wherein first 4 are year, and and then two are the moon, and last two are day.Such as the date of issue of software
Phase is on 2 27th, 2007, then the version information is denoted as 20070227.
The step can be by writing the version information of the sequence number of software information, software and software in a certain order
Enter in output buffer and obtains.The generating process is the state of the art.Output buffer refers to a fritter of computer
For storing the memory of data.It is of course also possible to these character string informations are not written into output buffer, but with any one piece
Memory field stores, and can do subsequent operation.Can be below when output buffer is written in above-mentioned character string information
File output prepare.
The character of first character string is number, lowercase a~z and capitalization A~Z.Such as first character string be
1234567。
Step S33:The first character string of part is intercepted since the first character of the first character string.
The length of the first character string of part of interception is unlimited, but the length should be less than the total length of the first character string, and big
In 0.Such as the first character string of part of interception is 1234.
Step S34:The first character string of part that interception is replaced with the second character string obtains third character string.
The length of second character string is N byte.The length of second character string and the first character string of part of interception
Equal length.Second character string is customized character string.The character of second character string is for digital, lowercase a~z and greatly
Write female A~Z.For example, the second character string is customized for 4321, then the length N of the second character string is 4 bytes, replaced
Third character string is 4321567.
Step S35:By N+1 character A in third character string to the word of the third character string in a last character
Symbol replaces with new character successively, obtains the 4th character string.
Wherein, step S35 specifically includes following process again:
(1) by the length N of the second character string of subscript modulus of N+1 character A in third character string, the first number is obtained
Value n.
Lower target meaning in the present invention is:When character A is N+1 characters, N is designated as under character A.
Wherein, the subscript that the result of modulus is character A divided by the remainder that N is obtained.
For example, the length N of the second above-mentioned character string is 4, then the 5th in third character string character A is the 5, the 5th word
4 are designated as under symbol A, the first numerical value n is 0.
(2) (n+1)th character B of the second character string is obtained.
For example, when the first numerical value n is 0, then the 1st character B in the second character string 4321 is 4.
(3) character B is converted into binary number b.
For example, when character B is 4, binary number b is 100.
(4) character A is converted into binary number a.
For example, when character A is 5, binary number a is 101.
(5) binary number b and binary number a are subjected to step-by-step xor operation, obtain numerical value c.
For example, above-mentioned when binary number b is 100, binary number a is 101, and the numerical value c obtained after step-by-step xor operation is
101。
(6) numerical value c is replaced to N+1 character A of third character string.
For example, the 5th character A in third character string, i.e. number 5, are replaced by 101.
(7) above process is recycled until the last character in third character string is replaced.
For example, for above-mentioned third character string be 4321567, recycle above-mentioned process, then will use step (1)~
(6) character 6 and 7 in third character string is replaced successively, then it is as follows specifically to replace result:
It is designated as 5,5 under 6th character 6 and obtains the first numerical value n by 4 modulus to be 1, binary number a is 1, the second character
The 2nd character B in string is 3, and binary number b is 11, then the numerical value c that step-by-step exclusive or obtains is replaced by for 10, final 6
10。
6 are designated as under 7th character 7, is 2 by 4 modulus, binary number a is 10, the 3rd word in the second character string
It is 2 to accord with B, and binary number b is 10, then the numerical value c that step-by-step exclusive or obtains is replaced by 10 for 10, final 7.
By above-mentioned replacement process, final third character string 4321567 is replaced by the 4th character string
43211011010。
Step S36:4th character string is saved as into authority.
For example, the 4th character string 43211011010 is saved as into authority, it can be by defeated by the 4th character string
Go out and is realized to a null file and preservation.
When in software installation to a new hardware, then hardware ID can change.Needing to preserve installation, this is new hard
Part ID, and sequence number, licencing key and the new hardware ID of software are bound again, one is then regenerated as procedure described above
Part new authority, can just to upgrade after subsequently making user import the new authority.
The process of above-mentioned generation authority will be replaced with newly by the first character string of the generations such as the relevant information of software
The 4th character string the safety of authority is improved by the 4th text string generation authority.
Step S40:Obtain and preserve the MD5 values of authority.
The MD5 values of the authority are the MD5 values of the 4th character string.MD5, that is, Message-Digest Algorithm 5
(Message-Digest Algorithm 5) is that one of widely used hash algorithm of computer (and is translated for ensuring that information transmission is complete consistent
Digest algorithm, hash algorithm).The MD5 values can be realized by existing mainstream programming language.
Step S50:The authority, which is sent on the hardware for installing the software, to be made to load the authority on the hardware.
By above-mentioned process, the preparation for upgrading software is completed.After the completion of the preparation for upgrading software, the software
Upgrade the step that the process verified further includes specifically following:
Step S60:Whether the sequence number of inspection software is correct.
The sequence number of software is sent to network server by user's cocoa by way of being inputted on webpage.Certainly,
Network server can be made to obtain the sequence number of the software by other prior arts.For example, being stored in the network server
The sequence number #123456789abcdeABCDE of software, the then if sequence number of software input by user is also #
123456789abcdeABCDE then judges that the sequence number of software is correct, carries out step S70;Otherwise, step S130, network are carried out
Server refuses the software upgrading request of user.
Step S70:If the sequence number of software is correct, whether the hardware ID for detecting the hardware of installation software is correct.
Network server can detect the hardware ID of the hardware automatically.It is of course also possible to make net by other prior arts
Network server obtains the hardware ID.For example, be stored in the network server this with above-mentioned software sequence number binding it is hard
Part ID is 1K325476, then if the hardware ID detected is also 1K325476, determination hardware ID is correct, carries out step S80;
Otherwise, step S130 is carried out, network server refuses the software upgrading request of user.
Step S80:If the hardware ID is correct, whether the MD5 values for detecting authority are correct.
Network server can detect the MD5 values of the authority automatically.It is of course also possible to be made by other prior arts
Network server obtains the MD5 values of the authority.For example, if the MD5 values of the authority detected and the MD5 values of preservation
It is identical, then judge that MD5 values are correct, carries out step S90;Otherwise, step S130 is carried out, network server refuses the software liter of user
Grade request.
Step S90:If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires.
For example, upgrading allow time be from activate the software from 1 year, then inquire request upgrading time
Away from whether activating from the software more than 1 year, if be not above, step S100 is carried out;Otherwise, step S130 is carried out,
Network server refuses the software upgrading request of user.The present invention inquire authorize allow update time mode not as
Limit, can also be other modes, for example, authorizing the time allowed by limiting the specific date to determine, if inquiring this
Exact date has been subjected to, then refuses upgrade request;If the exact date arrives not yet, step S100 is carried out.
Step S100:If update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation.
For example, upgrading number can be set to 9999 times, to prevent malicious attack.If inquiring mandate permission
Upgrading number is not above 9999 times, then carries out step S110;Otherwise, step S130 is carried out, network server refuses user's
Software upgrading is asked.
Step S110:If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled.
If the sequence number of the software is not disabled, step S120 is carried out;Otherwise, step S130, network service are carried out
Device refuses the software upgrading request of user.
Step S120:If the sequence number of the software is not disabled, upgrade the software.
Step S130:Refusal upgrades the software.
The method of the software upgrading verification of the present invention can be realized easily in software upgrading verification process based on mark
It is big can to resist wooden horse, password dictionary etc. in conjunction with hardware id information and authority MD5 information for the safety identification authentication of knowledge
Part is attacked.
The embodiment of the present invention additionally provides a kind of device of software upgrading verification.As shown in figure 3, for the embodiment of the present invention
The structural schematic diagram of the device of software upgrading verification.The device can be network serverless backup, such as cloud service platform.The software
The method that the device of upgrading verification can realize above-mentioned software upgrading verification.The device of software upgrading verification includes following knot
Structure:
Whether the first module 101, the sequence number for inspection software are correct.
Second module 102, if for software sequence number it is correct, detect installation software hardware hardware ID whether
Correctly.
Third module 103, if correct for hardware ID, whether the MD5 values for detecting authority are correct.
4th module 104, if for authority MD5 values it is correct, inquire authorize allow update time whether
It expires.
5th module 105 inquires authorizing whether the upgrading number allowed is more than limit if not yet due for update time
System.
6th module 106, if being less than limitation for software upgrading number, whether the sequence number of query software is banned
With.
7th module 107 upgrades the software if the sequence number for software is not disabled.
Preferably, which further includes:
8th module 108, for generating authority.
9th module 109, the MD5 values for obtaining and preserving authority.
Tenth module 110, the sequence number for storing software.
11st module 111 preserves the hardware ID for the hardware for installing the software for activating the software, and by software
Sequence number, licencing key and hardware ID binding.
The device of the software upgrading verification of the embodiment of the present invention can be realized easily in software upgrading verification process
Safety identification authentication based on mark can resist wooden horse, password in conjunction with hardware id information and authority MD5 information
Allusion quotation etc. is largely attacked.
The present invention provides being only presently preferred embodiments of the present invention described in more than one, not limiting this hair
It is bright, all within the spirits and principles of the present invention made by all any modification, equivalent and improvement etc., the present invention should all be included in
Protection domain within.
Claims (9)
1. a kind of method of software upgrading verification, which is characterized in that including:
Whether the sequence number of inspection software is correct;
If the sequence number of the software is correct, whether the hardware ID for detecting the hardware for installing the software is correct;
If the hardware ID is correct, whether the MD5 values for detecting authority are correct;
If the MD5 values of the authority are correct, inquire authorizing whether the update time allowed expires;
If the update time is not yet due, inquire authorizing whether the upgrading number allowed is more than limitation;
If the software upgrading number is less than limitation, whether the sequence number for inquiring the software is disabled;
If the sequence number of the software is not disabled, upgrade the software;
Wherein, the generating process of the hardware ID includes:
Disk Serial Number is obtained, the Disk Serial Number is the first character group being made of character;
It exchanges the position of two characters adjacent in first character group to form the second character group;
The partial character of second character group is subjected to character filtering;
Using filtered partial character as the hardware ID.
2. the method for software upgrading verification as described in claim 1, which is characterized in that further include:Generate the authority
The step of, the step of generation authority includes:
Software information is obtained according to the sequence number of the software;
The version information of the software information, the sequence number of the software and the software is generated into the first character string;
Part first character string is intercepted since the first character of first character string;
Part first character string that interception is replaced with the second character string obtains third character string, the length of second character string
Degree is N byte, the equal length of the length of second character string and the part of interception first character string;
By the character of N+1 character A in the third character string to the third character string in a last character according to
It is secondary to replace with new character, obtain the 4th character string;
4th character string is saved as into authority.
3. the method for software upgrading verification as claimed in claim 2, which is characterized in that described to obtain the process of the 4th character string
Including:
By the length N of the second character string described in the subscript modulus of N+1 character A in the third character string, first is obtained
Numerical value n;
Obtain (n+1)th character B of second character string;
The character B is converted into binary number b;
The character A is converted into binary number a;
The binary number b and binary number a is subjected to step-by-step xor operation, obtains numerical value c;
The numerical value c is replaced to N+1 character A of the third character string;
The cycle above process is replaced until the last character in the third character string.
4. the method for software upgrading verification as described in claim 1, it is characterised in that:
During the acquisition Disk Serial Number, the length of first character group is m bytes;
The position by two characters adjacent in first character group, which is exchanged, to be formed the process of the second character group and includes:From
The first character of first character group starts, will be described two in described one group with two adjacent characters for one group
The position of character is exchanged;
The process that the partial bytes by second character group carry out character filtering includes:Second character is judged one by one
Whether the preceding x character of group is character in standard character group, wherein o<x≤m;By the preceding x character of second character group
In the character that is not belonging in the standard character group replaced to form the filtered partial character with preset characters.
5. the method for software upgrading verification as claimed in claim 4, which is characterized in that the character packet in the standard character group
It includes:A~z, A~Z and 0~9.
6. the method for software upgrading verification as claimed in claim 2, which is characterized in that before software upgrading verification,
Further include:The MD5 values of the authority are obtained and preserve, the MD5 values of the authority are the MD5 of the 4th character string
Value.
7. the method for software upgrading verification as described in claim 1, which is characterized in that before software upgrading verification,
Further include:
Store the sequence number of the software;
It activates the software, preserves the hardware ID for the hardware for installing the software, and by the sequence number of the software, licencing key and institute
State hardware ID binding.
8. a kind of device of software upgrading verification, which is characterized in that including:
Whether the first module, the sequence number for inspection software are correct;
Second module, if the sequence number for the software is correct, detecting the hardware ID for the hardware for installing the software is
It is no correct;
Third module, if correct for the hardware ID, whether the MD5 values for detecting authority are correct;
4th module inquires authorizing whether the update time allowed arrives if the MD5 values for the authority are correct
Phase;
5th module inquires authorizing whether the upgrading number allowed is more than limitation if not yet due for the update time;
6th module, if being less than limitation for the software upgrading number, inquire the software sequence number whether by
Disabling;
7th module upgrades the software if the sequence number for the software is not disabled;
8th module, for generating the authority.
9. the device of software upgrading verification as claimed in claim 8, which is characterized in that further include:
9th module, the MD5 values for obtaining and preserving the authority;
Tenth module, the sequence number for storing the software;
11st module preserves the hardware ID for the hardware for installing the software for activating the software, and by the sequence of the software
Number, licencing key and the hardware ID binding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511018132.8A CN105653932B (en) | 2015-12-30 | 2015-12-30 | The method and apparatus of software upgrading verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511018132.8A CN105653932B (en) | 2015-12-30 | 2015-12-30 | The method and apparatus of software upgrading verification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105653932A CN105653932A (en) | 2016-06-08 |
CN105653932B true CN105653932B (en) | 2018-11-06 |
Family
ID=56477374
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511018132.8A Active CN105653932B (en) | 2015-12-30 | 2015-12-30 | The method and apparatus of software upgrading verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105653932B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108008976B (en) * | 2017-12-27 | 2021-08-27 | 上海贝岭股份有限公司 | Software identifier generation method, computer readable storage medium and single chip microcomputer |
CN111190614B (en) * | 2019-12-26 | 2023-12-19 | 北京威努特技术有限公司 | Software installation method and computer equipment |
CN117150998B (en) * | 2023-10-31 | 2024-01-19 | 上海合见工业软件集团有限公司 | Hardware module equivalence verification system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6950863B1 (en) * | 2000-12-21 | 2005-09-27 | Cisco Technology, Inc. | Method and system for verifying a software upgrade for a communication device |
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN102087685A (en) * | 2009-12-04 | 2011-06-08 | 华为技术有限公司 | Method for automatically converting authorization items, device and system thereof |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
CN103971034A (en) * | 2014-04-24 | 2014-08-06 | 福建联迪商用设备有限公司 | Method and device for protecting Java software |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060282392A1 (en) * | 2005-06-09 | 2006-12-14 | International Business Machines Corporation | Method and apparatus for dynamically controlling the selection and redundancy of web services components |
-
2015
- 2015-12-30 CN CN201511018132.8A patent/CN105653932B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6950863B1 (en) * | 2000-12-21 | 2005-09-27 | Cisco Technology, Inc. | Method and system for verifying a software upgrade for a communication device |
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN102087685A (en) * | 2009-12-04 | 2011-06-08 | 华为技术有限公司 | Method for automatically converting authorization items, device and system thereof |
CN102208003A (en) * | 2010-03-31 | 2011-10-05 | 鸿富锦精密工业(深圳)有限公司 | Software program protection system and method |
CN103971034A (en) * | 2014-04-24 | 2014-08-06 | 福建联迪商用设备有限公司 | Method and device for protecting Java software |
Also Published As
Publication number | Publication date |
---|---|
CN105653932A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7411011B2 (en) | Blockchain-implemented counting system and method used for secure voting and distribution | |
AU2019295815B2 (en) | Blockchain-based data verification method and apparatus, and electronic device | |
CN107426165B (en) | Bidirectional secure cloud storage data integrity detection method supporting key updating | |
CN109074434A (en) | Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers | |
CN109992285B (en) | Independent updating method and device for block chain code block and electronic equipment | |
CN105653932B (en) | The method and apparatus of software upgrading verification | |
CN112037058B (en) | Data verification method, device and storage medium | |
CN106155742A (en) | Assembly updates processing method and processing device | |
CN104579663B (en) | For the method for the validity for limiting digital certificate | |
CN108009445A (en) | A kind of trust data management system of half centralization | |
CN113344222A (en) | Safe and credible federal learning mechanism based on block chain | |
CN113988857A (en) | NFT transaction method, transaction system, computer-readable storage medium and terminal device | |
WO2022206453A1 (en) | Method and apparatus for providing cross-chain private data | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN113656780A (en) | Cross-link access control method and device | |
CN112464212A (en) | Data authority control reconstruction method based on mature complex service system | |
WO2022206439A1 (en) | Method and apparatus for providing cross-chain message | |
US20200379982A1 (en) | Information processing system and method of controlling information processing system | |
CN111028077A (en) | Intelligent contract protection method and system based on input filter | |
CN108090364B (en) | Method and system for positioning data leakage source | |
CN108256351A (en) | Document handling method and device, storage medium and terminal | |
CN113112354A (en) | Transaction processing method of block chain network, block chain network and storage medium | |
CN111026569B (en) | Method for repairing specified block data in alliance chain | |
CN107133499A (en) | A kind of software copyright protecting method, client, service end and system | |
CN111291001A (en) | Reading method and device of computer file, computer system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing, Patentee after: Beijing Falcon Safety Technology Co., Ltd Address before: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing, Patentee before: BEIJING KINGSOFT SECURITY MANAGEMENT SYSTEM TECHNOLOGY Co.,Ltd. |