CN106096381A - The method and system of application file checking - Google Patents

The method and system of application file checking Download PDF

Info

Publication number
CN106096381A
CN106096381A CN201610395335.7A CN201610395335A CN106096381A CN 106096381 A CN106096381 A CN 106096381A CN 201610395335 A CN201610395335 A CN 201610395335A CN 106096381 A CN106096381 A CN 106096381A
Authority
CN
China
Prior art keywords
check code
application file
authority
authority information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610395335.7A
Other languages
Chinese (zh)
Inventor
韩鹏程
任靖
周佳
冯继超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Eren Eben Information Technology Co Ltd
Original Assignee
Beijing Eren Eben Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Eren Eben Information Technology Co Ltd filed Critical Beijing Eren Eben Information Technology Co Ltd
Priority to CN201610395335.7A priority Critical patent/CN106096381A/en
Publication of CN106096381A publication Critical patent/CN106096381A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the method and system of a kind of application file checking, the method includes: mobile device obtains the first check code and second check code of application file, first check code is to obtain according to the first authority information that described application file itself carries, and described second check code is to obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device, when described first check code is consistent with described second check code, determines described application file by checking.By the way, the present invention can determine the security of application file in mobile terminal, and need not input longer code.

Description

The method and system of application file checking
Technical field
The present invention relates to application file security technology area, particularly relate to the side of a kind of application file checking Method and system.
Background technology
Android (Android) application program is faced with serious problem of piracy, may be implanted by pirate application program Virus, advertisement, it is also possible to being packed and distorted by secondary, these all seriously compromise developer and the consumer of application program Rights and interests.
For this situation, each industrial chain of mobile Internet is all doing some effort, protects Android application journey The safety of sequence.At present, the mode of commonly used soft ware authorization is to complete at soft ware authorization interface input active coding or registration code Registration, active coding or registration code typically with "-" separate, such as Windows, Office etc., such as Office2013: active coding is GQKNX-C6 T4B-V2T69-777QJ-XWYG7;And for example the installation active coding of Win10 is NKJFK-GPHP 7-G8C3J- P6JXR-HQRJR;And for example the registration code of UltraEdit is Name:jialei_wy, and active coding is: DSQOQ-OSPNA-JIHHK- TNVIO-ONFGK-EERGI-QOMRC-L QJAK。
In the method for above-mentioned guarantee Android application security, on the one hand, active coding or registration code are longer, are moving End input is more difficult, on the other hand, after registration code or active coding flow out, is still easy to pirate.
Content of the invention
The technical problem that present invention mainly solves is to provide the method and system of a kind of application file checking, Neng Gou Mobile terminal determines the security of application file, and need not input longer code.
For solving above-mentioned technical problem, one aspect of the present invention is: provide a kind of application file to test The method of card, described method includes: the first check code of mobile device acquisition application file and the second check code, wherein, Described first check code is to obtain according to the first authority information that described application file itself carries, described second Check code is to obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device exists When described first check code is consistent with described second check code, determine described application file by checking.
Wherein, described first authority information is the first signing messages, and described second authority information is the second label Name information;Before described mobile device obtains described first check code of application file and the step of the second check code, also Including: described second signing messages that server has been arranged by the legal copy to described application file for the hashing algorithm is counted Calculate, obtain described second check code;Described mobile device obtains the first check code and second verification of described application file The step of code, comprising: described mobile device is when described application file starts, by network attached server, Jin Ercong Described server obtains the second check code of described application file, or, described mobile device is at described application file During startup, obtaining described second check code being built in described application file, described mobile device is calculated by described hash Described first signing messages that described application file itself is carried by method calculates, and obtains described first check code.
Wherein, described second authority information includes the corresponding application program literary composition with the legal copy of described application file The mandate letter of at least one classification in part bag name, equipment Serial Number, unit type, the term of validity of setting, functional specification information Breath;Described first authority information includes and described application file corresponding application file bag name, equipment sequence Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information.
Wherein, before described mobile device obtains the first check code of application file and the step of the second check code, Also include: server generates the described second authority letter of the corresponding text formatting of legal copy with described application file Breath;Described second authority information is calculated by described server by hashing algorithm, authorized check code, described awards Power check code is described second check code;Described mobile device obtains the first check code and second verification of application file The step of code, comprising: described mobile device obtains authority bag, and described authority bag includes described second check code Information;Described first authority that described application file itself is carried by described mobile device by described hashing algorithm Information calculates, and obtains described first check code.
Wherein, described second authority information is calculated by described server by hashing algorithm, authorized school After testing the step of code, also include: described server generates PKI and private key by rivest, shamir, adelman;Described server makes With described private key to described mandate check code encryption, generate authority signature;The information of described second check code is described awarding Power file signature, described mobile device obtains the first check code of application file and the step of the second check code, also includes: Described mobile device obtains the described PKI being built in described application file;Described mobile device passes through described PKI to institute State authority signature to be decrypted, it is thus achieved that described authority checking code, described authority checking code is described second check code.
Wherein, described authority bag also includes described second authority information, described second authority information, The all corresponding grant item of the authorization message of each classification in described first authority information;Described mobile device is described When one check code is consistent with described second check code, determine described application file by checking, comprising: in described first school Test code consistent with described second check code when, described mobile device is by each grant item in described second authority information respectively Compare with corresponding grant item in described first authority information, if each authorizes in described second authority information Item all mates with corresponding grant item in described first authority information, then determine described application file by checking.
For solving above-mentioned technical problem, another technical solution used in the present invention is: provide a kind of application file The system of checking, described system includes: mobile device, and described mobile device includes: acquisition module, is used for obtaining application program literary composition First check code of part and the second check code, wherein, described first check code is itself to carry according to described application file The first authority information obtain, described second check code is second carrying according to the legal copy of described application file Authority information obtains;Determining module, for when described first check code is consistent with described second check code, determines institute State application file by checking.
Wherein, described first authority information is the first signing messages, and described second authority information is the second label Name information;Described system also includes: server, and described server includes: the first computing module, is used for by hashing algorithm to institute State described second signing messages that the legal copy of application file arranged to calculate, obtain described second check code;Described Acquisition module specifically for: when described application file starts, by network attached server, and then from described server Obtain the second check code of described application file, or, when described application file starts, obtain and be built in described answering With described second check code of program file;
Described first signing messages being carried itself described application file by described hashing algorithm is calculated, Obtain described first check code.
Wherein, described second authority information includes the corresponding application program literary composition with the legal copy of described application file The mandate letter of at least one classification in part bag name, equipment Serial Number, unit type, the term of validity of setting, functional specification information Breath;Described first authority information includes and described application file corresponding application file bag name, equipment sequence Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information.
Wherein, described system also includes: server, and described server includes: the first generation module, for generate with described The described second authority information of the corresponding text formatting of legal copy of application file;Second computing module, is used for passing through Described second authority information is calculated by hashing algorithm, authorized check code, and described mandate check code is described Second check code;Described acquisition module specifically for: obtain authority bag, described authority bag includes described second school Test the information of code;Entered by the described first authority information that described application file itself is carried by described hashing algorithm Row calculates, and obtains described first check code.
Wherein, described server also includes: the second generation module, for generating PKI and private by rivest, shamir, adelman Key;3rd generation module, is used for using described private key to described mandate check code encryption, generates authority signature;Described The information of two check codes is described authority signature, and described acquisition module is additionally operable to: obtains and is built in described application program literary composition The described PKI of part;By described PKI, described authority signature is decrypted, it is thus achieved that described authority checking code, described awards Power identifying code is described second check code.
Wherein, described authority bag also includes described second authority information, described second authority information, The all corresponding grant item of the authorization message of each classification in described first authority information;Described determining module is additionally operable to When described first check code is consistent with described second check code, by each grant item in described second authority information respectively with In described first authority information, corresponding grant item is compared, if each grant item in described second authority information All mate with corresponding grant item in described first authority information, then determine described application file by checking.
The invention has the beneficial effects as follows: be different from the situation of prior art, mobile device of the present invention obtains application program literary composition First check code of part and the second check code, the first check code is the first mandate itself carried according to described application file Fileinfo obtains, and described second check code is the second authority letter carrying according to the legal copy of described application file Breath obtains;Described mobile device, when described first check code is consistent with described second check code, determines described application program File is by checking.The the second authority information carried due to the legal copy of application file, application file is taken itself Carry the first authority information, when application file is not tampered with, the first authority information and the second authority Information is consistent, and the first check code and the second check code are also consistent, and after application file is tampered, first authorizes Fileinfo and the second authority information are inconsistent, and the first check code and the second check code are also inconsistent, by this Mode, can determine the security of application file, and need not input longer code in mobile terminal.
Brief description
Fig. 1 is the flow chart of method one embodiment of application file of the present invention checking;
Fig. 2 is the flow chart of another embodiment of method of application file of the present invention checking;
Fig. 3 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 4 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 5 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 6 is the structural representation of system one embodiment of application file of the present invention checking;
Fig. 7 is the structural representation of another embodiment of system of application file of the present invention checking;
Fig. 8 is the structural representation of the another embodiment of system of application file of the present invention checking;
Fig. 9 is the structural representation of the another embodiment of system of application file of the present invention checking.
Detailed description of the invention
The present invention is described in detail with embodiment below in conjunction with the accompanying drawings.
Refering to Fig. 1, Fig. 1 is the flow chart of method one embodiment of application file of the present invention checking, comprising:
Step S101: mobile device obtains the first check code and second check code of application file, wherein, the first school Testing code is to obtain according to the first authority information that application file itself carries, and the second check code is according to application journey The second authority information that the legal copy of preface part is carried obtains, the second mandate that the legal copy of described application file is carried The legal copy corresponding authority information of the i.e. described application file of fileinfo.Mobile device obtains application file First check code and the second check code also can include two independent steps, i.e. include: mobile device obtains application program literary composition The step of the first check code of part, mobile device obtain the step of the second check code of application file.
Application file, after distribution or pirate, or user is during using, and is tampered, these Consumer's Experience is all caused to reduce.In prior art, it is common that by way of input active coding or registration code, ensure to apply journey Preface part is legal copy rather than pirate.But, on the one hand, for mobile device, input long code very inconvenient, the opposing party Face, active coding or registration code also can be tampered.
In embodiments of the present invention, after application file corresponding legal generation, i.e. produce corresponding second and award Power fileinfo, the second authority information refers to the authority information one to one of the legal copy with application file, example As: unique signature of setting, equipment Serial Number, application file bag name, unique temporal information etc. of determination.This is second years old Authority information is attached in the corresponding legal copy of application file.If the second authority information is tampered, then show This application file has been tampered with.Second authority information is typically application developers or the clothes of application developers mandate Business business determines.
First authority information refers to corresponding to the second authority information and the one_to_one corresponding of application file own Authority information.For example, if the second authority information is the signature unique setting, then the first authority information Being also corresponding signature, only this signature is possible to consistent with the signature unique setting, it is possible to make at application file Used time is tampered and inconsistent with the signature unique setting, or application file is originally pirate, and signature is naturally also Inconsistent with the signature unique setting.
Obtain the first verification according to the first authority information that application file itself carries by certain method Code, obtains the second check code according to the second authority information that the legal copy of application file is carried by certain method. Wherein, it is thus achieved that the method for the first check code can be identical with the method obtaining the second check code, it is also possible to differs, differs When, it is thus necessary to determine that the corresponding relation between the first check code and the second check code, to determine the first check code and the second verification Whether code is consistent.
Step S102: mobile device, when the first check code and the second check code are consistent, determines that application file passes through Checking.
Relatively the first check code and the second check code, if the first check code and the second check code are consistent, determines this application Program file, by checking, that is to say that this application file is consistent with the legal copy of application file, this application program File is not tampered with, and mandate is effective.Certainly, the legal copy of this application file is after follow-up use process, still has May be tampered, if be tampered during follow-up use, then the first check code and the second check code are just inconsistent.
If the first check code and the second check code are inconsistent, prompting user application file has been tampered with, and continues Use risky, or application file is piracy, and guide user to use the official of application file legal.
Embodiment of the present invention mobile device obtains the first check code and the second check code, first school of application file Testing code is to obtain according to the first authority information that described application file itself carries, and described second check code is root Obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device is in described first school Test code consistent with described second check code when, determine described application file by checking.Due to application file just The second authority information that version is carried, application file itself carries the first authority information, works as application file When being not tampered with, the first authority information is consistent with the second authority information, the first check code and the second verification Code is also consistent, and after application file is tampered, the first authority information and the second authority information are to differ Causing, the first check code and the second check code are also inconsistent, in this way, can determine application file in mobile terminal Security, and longer code need not be inputted.
Wherein, the first authority information is the first signing messages, and the second authority information is the second signing messages.
Now, in step S101, mobile device obtains the step of the second check code of application file, can pass through two The mode of kind realizes, one is in the case of network-in-dialing, and mobile device can obtain the second verification by network from server Code, another kind of situation is that developer is built in the second check code in the legal copy of application file, when user obtains application journey The legal copy of preface part, after the legal copy of the mobile device set up applications of oneself, in this application program (application journey i.e. installed The legal copy of preface part) in follow-up checking, network can be independent of, mobile device directly obtains and is built in application file The second check code.
See Fig. 2, no matter be above-mentioned any mode, before step S101, be first required to generate the second check code, Combine detailed process can be such that
Step S103: the second signing messages that server has been arranged by the legal copy to application file for the hashing algorithm enters Row calculates, and obtains the second check code.This step can complete at the service provider of application developers or application developers mandate.Enter One step ground, server is built in the second check code in the legal copy of application file, and this is built-in with the application of the second check code The legal copy of program file reaches user side.
If there is network when application file starts, mobile device passes through Network Capture the second check code, then enter Step S1011, if do not have network when application file starts, mobile device obtains the second check code in this locality, then enter Enter step S1012.
Step S1011: by network attached server, and then obtain the second verification of application file from server Code.
Step S1012: obtain the second check code being built in application file.
Although it will be apparent that the second check code is to be built in the legal copy of application file, but still there is security Risk.It is possible to further process is encrypted and decrypted to the second check code by way of public affairs, private key, to enter one Step increases the security of application file.
Wherein, in step S101, the step of the first check code that mobile device obtains application file may is that step S1013, the first signing messages being carried application file itself by hashing algorithm is calculated, and obtains the first verification Code.The method of the method and acquisition the second check code that i.e. obtain the first check code is just as, and is all hashing algorithm.
Hashing algorithm refers to produce the algorithm of the hashed value of some data slots (such as message or session entry).Good hash Algorithm has the characteristic changing hashed value result according to the variation in input data;Therefore, hash is such as disappearing for detection Any change in the large-scale information objects such as breath is very useful.
Hash function in software development or hashing algorithm, also known as hash function (Hash Function), be a kind of from appointing What a kind of data creates the method for little numeral " fingerprint ".Hash function becomes summary message or data compression so that data Amount diminishes, and is fixed up the form of data.Data are upset mixing by this function, re-create a finger being called hashed value Line.Hashed value is commonly used to represent the character string of a short random letters and numeral composition.Good hash function is at input domain In hash collision seldom occurs.At hash table and Data processing, do not suppress conflict to carry out distinguishes data, data-base recording can be made It is more difficult to find.All of hash function is all just like next fundamental characteristics: if two hashed values be differ (according to same Function), then being originally inputted of the two hashed value is also differ.Hashing algorithm include but is not limited to SHA1, MD5, SHA256 etc..Certainly, it is thus achieved that the method for the method of the first check code and acquisition the second check code is except being above-mentioned hashing algorithm Outward, can also is that other methods, do not limit at this.
In actual applications, above-mentioned signing messages proof procedure can realize checking with Java code, it is also possible to uses C language Code realizes checking, specific as follows:
1st, the shallow verification of Java layer (Validation Code is at Java layer);
For example, in Java code, checking signature specifically may is that
Owing to Java code includes a lot of source code information, such as variable name, method name, and come to visit by these titles Asking variable and method, these symbols are with many semantic informations, it is easy to decompiled into Java source code.This in order to prevent Phenomenon, can use the mode of Code obfuscation, improve the difficulty of decompiling to Java code.
2nd, in primary development kit (Native Development Kit, write a Chinese character in simplified form NDK) C code, verification (verifies generation deeply Code is in the C code of NDK);
C language realize with the realization of Java in flow process similar, only code difference, no longer illustrate in detail.Due to C language The program write typically is difficult to decompiling, it is impossible to obtain source code, and compiling has been converted into machine language after completing, is not completely may be used Inverse process, the engineering that therefore decompiling C language generates, the engineering challenges than decompiling Java is a lot.
In the embodiment of the present invention, the process of checking application file can verify on backstage, does not affect application program literary composition The toggle speed of part.
Wherein, the second authority information include with the legal copy of application file corresponding application file bag name, The authorization message of at least one classification in equipment Serial Number, unit type, the term of validity of setting, functional specification information;First Authority information includes and application file corresponding application file bag name, equipment Serial Number, unit type, setting The term of validity, the authorization message of at least one classification in functional specification information.Wherein, functional specification information i.e. limits application journey Preface part can use the information of function, and described first authority information is also mutually corresponding with the second authority information, for example, Second authority information includes the legal copy of application file corresponding application file bag name, then the first authority Information also includes and application file corresponding application file bag name;And for example, the second authority information includes application The legal copy corresponding application file bag name of program file and equipment Serial Number, then the first authority information also include with Application file corresponding application file bag name and equipment Serial Number.Certainly, the second authority information is not limited to Foregoing, does not limit at this.
Wherein, described with application file legal copy corresponding application file bag name, equipment Serial Number, equipment type Number etc. classification authorization message in, may each comprise multiple object, the even first authority information include and application program literary composition It during part corresponding application file bag name, is somebody's turn to do the corresponding application file Bao Mingzhong with the legal copy of application file permissible Including multiple application file bag names, this reader of such as e, this store of e etc.;If the first authority information includes equipment sequence During row, then this equipment Serial Number can include multiple equipment Serial Number;If the first authority information includes unit type, if Standby model also can include multiple unit type, such as this T8 of E people E, E people this T9 of E etc..In like manner, the second authority information is also Can be arranged such that, so can realize an authority bag to multiple application files, or multiple equipment Serial Number, or Multiple unit types realize authorizing, to improve application file authority checking efficiency.
Now, seeing Fig. 3, in step S101, mobile device obtains the first check code and second school of application file Before testing the step of code, also include:
Step S201: server generates the second authority letter of the corresponding text formatting of legal copy with application file Breath.
The legal copy of application file is before dispatching from the factory, according to application file bag name, equipment Serial Number, unit type At least one in (or device customizing model), the term of validity setting etc. generates the second authority information of text formatting, Text form can be .txt form, JSON form or XML format etc., wherein, and the authority letter of preferably JSON form Breath, the authority information of JSON form is in the comparison of subsequent authorization item, and comparison efficiency is high.
For example, the second authority information authorization.json (referring to be exemplified below).
Step S202: the second authority information is calculated by server by hashing algorithm, authorized check code, Check code is authorized to be the second check code.
For example, according to hashing algorithm, such as SHA1, MD5 or SHA256 etc., to the second authority information evaluation, dissipated Train value is mandate check code, such as SHA1 value, MD5 value, or SHA256 value etc..
If the mandate check code that the second authority information is asked changes, then the corresponding second i.e. quilt of authority information By authorizing check code, modification, therefore may determine that whether the second authority information is modified, the second authority information quilt (check code is authorized to change) after modification, i.e. it is believed that the second authority information lost efficacy, the legal copy of this application file It has been modified.
Equally, in step S101, mobile device obtains the step of the first check code of application file, may is that shifting Dynamic equipment obtains authority bag, and this authority bag includes the information of the second check code;By hashing algorithm to application journey The first authority information that preface part itself carries calculates, and obtains the first check code.
Described authority bag includes the information of described second check code, can be the second check code, or, Ke Yishi Described authority signature (authority signature encryption the second check code obtains).
It should be understood that when the second authority information is the literary composition of the corresponding application program with the legal copy of application file Part bag name, equipment Serial Number, unit type, setting one of the term of validity when, the first authority information is also corresponding One;When the second authority information is corresponding application file bag name, equipment sequence with the legal copy of application file Number, unit type, setting the term of validity in two when, the first authority information is also corresponding two, now all right Set the checking of further application file, for example: legal corresponding for application file of the second authority information Application file bag name, equipment Serial Number, the first authority information is corresponding application program with application file File bag name, equipment Serial Number.In the second authority information (authorization.json as described below), Ke Yijin One step explanation grant item also includes the term of validity setting, and i.e. when the second check code and the first check code are consistent, after checking, enters Row further checking, whether the term of validity of confirmation application file is in the term of validity setting, if not having of setting In the effect phase, then this checking is not passed through.
And for example: the second authority information is equipment Serial Number, the first authority information is equipment Serial Number, second In authority information, can further illustrate grant item also include application file bag name, unit type, setting effective Phase, i.e. when the second check code and the first check code are consistent, after checking, further verified, confirmed application journey respectively Whether the application file bag name of preface part, unit type, the term of validity be consistent with set in the second authority information, only Wherein to have one inconsistent, then this checking is not passed through.
Certainly, in above-mentioned example, it is also possible to when verifying for the first time, the second authority information includes whole mandates , only when the second check code including whole grant item is consistent with the first check code including whole grant item, just calculate logical Cross checking.The concrete checking how realizing application file, can according to reality apply it needs to be determined that, do not limit at this Fixed.
Mobile device, when obtaining the second check code, still can use networking to obtain from server and obtain two in this locality The mode of kind, no longer goes to live in the household of one's in-laws on getting married at this and chats.It is mainly described when obtaining in this locality below, in order to be further ensured that the peace of application file The measure that full property is taked.
See Fig. 4, after step S202, can also include:
Step S203: server generates PKI and private key by rivest, shamir, adelman.
Rivest, shamir, adelman, such as RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC etc..Application developers retains Private key, private key is used for encryption authorization check code, and to generate authority signature (following steps S204), PKI is used for deciphering mandate File signature, authorized check code.It is of course also possible to use symmetric encipherment algorithm, do not limit at this.
Step S204: server uses private key to authorizing check code encryption, generates authority signature, for example: Authorization.json.sign authority is signed.
Wherein, the second authority information, authority signature, PKI are required to be built in application file.Example As by the second authority information authorization.json, authority signature authorization.json.sign beats Bag, generates zip compressed package (authority bag), such as authority bag license.zip;By authority bag license.zip Issue the user obtaining mandate after application authorizes, or directly before equipment or terminal dispatch from the factory, utilize authority bag Pre-installed applications is authorized by license.zip.
PKI can be built in the legal copy of application file by server, it is also possible to is saved in server local.When Mobile device is not networked when verifying, server can be built in PKI in the legal copy of application file, sets when mobile When standby networking is verified, PKI can be saved in server local by server.Networking or the flow process verified of not networking, May refer to foregoing, no longer go to live in the household of one's in-laws on getting married at this and chat.
Now, seeing Fig. 5, in step S101, mobile device obtains the step of the second check code of application file, bag Include:
Step S301: mobile device obtains the PKI being built in application file.
Step S302: authority signature is decrypted by mobile device by PKI, it is thus achieved that authority checking code, mandate is tested Card code is the second check code.
It should be noted that the execution of above-mentioned steps S101 and step S102 can be when application file starts Wait and perform, it is also possible to be to perform in application file running.
Authority bag also includes the second authority information, the second authority information, the first authority information In all corresponding grant item of authorization message of each classification;Mobile device when the first check code and the second check code are consistent, Determine that application file passes through checking, comprising:
When the first check code and the second check code are consistent, mobile device is by each grant item in the second authority information Compare with corresponding grant item in the first authority information respectively, if in the second authority information each grant item with In first authority information, corresponding grant item is all mated, then determine application file by checking.
Grant item can be application file bag name, equipment Serial Number, unit type, the term of validity of setting, function limit Determine the authorization message of at least one classification in information.Corresponding grant item coupling refers to the authorized content phase of concrete grant item Coupling.If in the second authority information, each grant item is mated with corresponding grant item in the first authority information, i.e. Represent in the grant item that the second authority information is identical with the first authority information that there is identical object content, this mesh Mark content is the application file characteristic of correspondence information of current authentication, such as application file bag name, application program literary composition The unit type (unit type i.e. described above) of part place equipment, or the equipment sequence of application file place equipment Row number etc..
For example, the first authority information and the second authority information all include application file bag grant item, Second authority Information application program file bag grant item includes two application file bag names, this first mandate literary composition In part information, application file bag grant item also includes two application files identical with the second authority information Bag name, so i.e. represents the application file bag grant item phase in the first authority information and the second authority information Join.
Wherein, in one embodiment, the method also includes:
One predetermined application file bag name is appointed as the general of the legal copy of two or more application file by server Application package name;By hashing algorithm, predetermined application file bag name is calculated, obtain the second check code, the second school Test legal general second check code that code is two or more application file;Now, step S101 includes: mobile device exists Determine two or more application file itself all carry one first application package name after, by hashing algorithm to first Application package name calculates, it is thus achieved that the first check code, in this locality or obtains the second check code by network from server; Step S102 includes: mobile device, when the first check code and the second check code are consistent, determines two or more application file All by checking.
For the plural application file of batch, if in the manner described above, come singly to enter respectively Row checking, proof procedure is long, and compares and lose time, and by the way, can pass through general second check code, Make plural batch application file all by checking, thus simplify proof procedure.
Wherein, in one embodiment, the method also includes:
A series of multiple equipment Serial Numbers or unit type are appointed as the legal copy of an application file by server respectively Equipment Serial Number or unit type;Respectively a series of multiple equipment Serial Numbers or unit type are counted by hashing algorithm Calculating, obtaining corresponding multiple second check code, multiple second check codes are all the second legal check codes of application file; Now, step S101 includes: equipment Serial Number that application file itself is carried by hashing algorithm by mobile device or set Standby model calculates, it is thus achieved that the first check code, in this locality or obtains multiple second check code by network from server;Step Rapid S102 includes: when mobile device has second check code and the first check code consistent in determining multiple second check code, Determine that application file passes through checking.
When an application program is verified on multiple a series of equipment respectively, adopt with the aforedescribed process one by one Ground is verified respectively, and proof procedure is long, and compares and lose time, by the way, can simplify authenticated In the case of journey, make an application file by testing on the equipment of multiple a series of equipment Serial Numbers or unit type Card.
Wherein, in one embodiment, described second authority information includes that second uniquely identifies, described second unique It is designated corresponding application file bag name, equipment Serial Number, unit type, setting with the legal copy of described application file The term of validity, the authorization message of at least one classification in functional specification information;Described first authority information includes first Unique mark, described first is uniquely designated and described application file corresponding application file bag name, equipment sequence Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information, now, the method is also Including:
Second unique mark that the legal copy to application file for the server is carried is classified, and is divided into main second uniquely to mark Know and more than one time second uniquely identifies;By hashing algorithm, respectively to main second uniquely mark and more than one time second Unique mark calculates, and respectively obtains main second check code and more than one order two check code;Now, step S101 bag Include: mobile device application file itself is carried first uniquely mark carry out corresponding classification, be divided into corresponding master the One unique mark and more than one time first uniquely identify;Mobile device passes through hashing algorithm, uniquely identifies to main first respectively Calculate with more than one time first uniquely mark, it is thus achieved that main first check code and more than one the first check code;Mobile Equipment obtains main second check code and more than one order two check code in this locality or by network from server;Step S102 Including: mobile device, when main first check code is consistent with main second check code, determines that application file is tested by the first order Card;Mobile device compares more than one time first check code and more than one the second check code more respectively step by step, when one with When last time, the first check code was consistent step by step respectively with more than one time second check code, determine application file pass through respectively by Level verification.
Aforesaid way is the another kind of mode realizing classification checking, i.e. the more every grant item of one-level one-level is awarded at each In the case that claim is all by checking, finally determine application file by checking.Therefore, by the way, Neng Goushi Now verify step by step.
Illustrate as a example by JSON form the second authority information of this reader of E below, the application of this reader of E Program file bag name " cn.eben.reader "
Above-mentioned indicate with [] application bag name, equipment Serial Number, unit type, device customizing model etc., can include many Individual value.
This authority information includes multiple grant item, such as application file bag name, equipment Serial Number, equipment type Number, functional specification information etc., each grant item also can be to the restriction of multiple objects.For example: when the second authority information bag When including application file bag name, the corresponding grant item of application file bag name can include multiple application file bag Name, this reader of such as e, this store of e etc., again for example, when the second authority information includes unit type, unit type is awarded Can include one or more unit types of an equipment in claim, such as unit type includes E people this T8 of E, E people this T9 of E, So this authority information is effective to the equipment of E people this T8 of E, E people this T9 of E.And for example, i.e. when the second authority information includes During equipment Serial Number (or device numbering), for example, device numbering during this production of E can be set, i.e. know which device numbering is E our company produces, then can set these numberings and can license this reader of e.Content in [] separates with ", ".
Above in functional specification information (extra) grant item of authority information, can set which function can use, Which function is unavailable, the corresponding different mandate of different functions.Generally, can be divided into standard edition (basic function), Enhanced edition, global function version, each version can preset and authorize different functional specification information.
One concrete JSON form authority information is as follows:
Specifically, in one detailed description of the invention of the present invention, the second authority information and authority signature two Item content one authorization message completing of composition, checks that the whether effective process of authorization message specifically can be such that
(1) PKI is built in SDK (Software Development Kit, write a Chinese character in simplified form SDK), and compiling is extremely In application file, after application file starts, decompress this authorization message license.zip and obtain the second authority letter Breath authorization.json and authority signature authorization.json.sign;
(2) with the authority of public key decryptions application file signature authorization.json.sign, the is obtained Two authority information authorization.json corresponding mandate check code (such as SHA1), are the second check code;
(3) calculate the second authority information that decompression obtains and (that is to say that application file itself carries first awards Power fileinfo) check code of authorization.json, (identical with the second check code employing is scattered to be the first check code Row algorithm);
(4) the first check code calculating is compared with the second check code that deciphering obtains, be used for verifying and answer Whether changed by the second authority information authorization.json of program file, the first check code calculating and solution Close the second check code obtaining is identical, then the second authority information authorization.json is without changing, if second authorizes Fileinfo authorization.json is modified, then the first check code and the second check code necessarily differ, and this mandate is For Lame delegation;
(5) in the case that the second authority information authorization.json is effective authority, to the firstth, In second authority information, other grant item is further checked.
When the first, second authority information of inspection, each authority information includes other grant item multiple, At the checking by the second check code for second authority information authorization.json, the mandate tentatively confirming the validity literary composition In the case of part information, need further to verify other grant item in first, second authority information one by one, the firstth, the In two authority information, other grant item all of are all option, and all items come into force guarantee authority information jointly Essence is effective, i.e. grant item in authorization.json needs to verify one by one, if all passing through, then and this application file Program, by checking, authorizes effectively, and each grant item invalid can negate the validity of application file.By above-mentioned side Formula, it is possible to achieve classification checking.
Seeing Fig. 6, the present invention also provides the system that a kind of application file is verified, this system can perform said method In step, related detailed content refers to said method part, at this no longer go to live in the household of one's in-laws on getting married chat.
This system 10 includes: mobile device 100, and this mobile device 100 includes: acquisition module 101 and determining module 102.
Acquisition module 101 is for obtaining the first check code and second check code of application file, wherein, and the first verification Code is to obtain according to the first authority information that application file itself carries, and the second check code is according to application program The second authority information that the legal copy of file is carried obtains.
Determining module 102, for when the first check code and the second check code are consistent, determines application file by testing Card.
Embodiment of the present invention mobile device obtains the first check code and the second check code, first school of application file Testing code is to obtain according to the first authority information that described application file itself carries, and described second check code is root Obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device is in described first school Test code consistent with described second check code when, determine described application file by checking.Due to application file just The second authority information that version is carried, application file itself carries the first authority information, works as application file When being not tampered with, the first authority information is consistent with the second authority information, the first check code and the second verification Code is also consistent, and after application file is tampered, the first authority information and the second authority information are to differ Causing, the first check code and the second check code are also inconsistent, in this way, can determine application file in mobile terminal Security, and longer code need not be inputted.
Wherein, the first authority information is the first signing messages, and the second authority information is the second signing messages.
Wherein, acquisition module 101 is specifically for when application file starts, by network attached server, and then Obtain the second check code of application file from server;Or, when application file starts, obtain and be built in application journey Second check code of preface part.
Wherein, seeing Fig. 7, system 10 also includes server 200, and server 200 includes: the first computing module 201.
First computing module 201 is for the second A.L.S. having been arranged by the legal copy to application file for the hashing algorithm Breath calculates, and obtains the second check code.
The acquisition module 101 of mobile device 100 is specifically for being carried to application file itself by hashing algorithm First signing messages calculates, and obtains the first check code.
Wherein, the second authority information is the corresponding application file bag name with the legal copy of application file, sets The authorization message of at least one classification in standby sequence number, unit type, the term of validity of setting, functional specification information;First awards Power fileinfo for application file corresponding application file bag name, equipment Serial Number, unit type, the having of setting Effect phase, the authorization message of at least one classification in functional specification information.
Seeing Fig. 8, system 10 also includes server 200, and server 200 includes: the first generation module 202 and second calculates Module 203.
First generation module 202 is for generating the second mandate literary composition of the corresponding text formatting of legal copy with application file Part information.
Second computing module 203 is used for being calculated the second authority information by hashing algorithm, authorized school Test code, authorize check code to be the second check code.
The acquisition module 101 of mobile device 100 is specifically for obtaining authority bag, and authority bag includes the second school Test the information of code;Calculated by the first authority information that application file itself is carried by hashing algorithm, obtain First check code.
Wherein, seeing Fig. 9, server 200 also includes: the second generation module 204 and the 3rd generation module 205.
Second generation module 204 is for generating PKI and private key by rivest, shamir, adelman.
3rd generation module 205 is used for using private key to authorizing check code encryption, generates authority signature.
Now, mobile device 100 is additionally operable to:
Obtain the PKI being built in application file.
By PKI, authority signature is decrypted, it is thus achieved that authority checking code, authority checking code is the second verification Code.
Wherein, authority bag also includes the second authority information, the second authority information, the first authority The all corresponding grant item of the authorization message of each classification in information;Determining module is additionally operable in the first check code and the second verification When code is consistent, each grant item in the second authority information is entered with corresponding grant item in the first authority information respectively Row comparison, if each grant item is mated with corresponding grant item in the first authority information in the second authority information, Then determine application file by checking.
The foregoing is only embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilization is originally Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or are directly or indirectly used in what other were related to Technical field, all in like manner includes in the scope of patent protection of the present invention.

Claims (12)

1. the method for an application file checking, it is characterised in that described method includes:
Mobile device obtains the first check code and second check code of application file, and wherein, described first check code is root Obtaining according to the first authority information that described application file itself carries, described second check code is to answer according to described Obtain by the second authority information that the legal copy of program file is carried;
Described mobile device, when described first check code is consistent with described second check code, determines that described application file leads to Cross checking.
2. method according to claim 1, it is characterised in that described first authority information is the first signing messages, Described second authority information is the second signing messages;
Before described mobile device obtains described first check code of application file and the step of the second check code, also wrap Include:
Described second signing messages that server has been arranged by the legal copy to described application file for the hashing algorithm is counted Calculate, obtain described second check code;
Described mobile device obtains the first check code of described application file and the step of the second check code, comprising:
Described mobile device is when described application file starts, by network attached server, and then from described server Obtain the second check code of described application file, or, described mobile device, when described application file starts, obtains It is built in described second check code of described application file;
Described first signing messages that described application file itself is carried by described mobile device by described hashing algorithm Calculate, obtain described first check code.
3. method according to claim 1, it is characterised in that described second authority information includes and described application journey The legal copy corresponding application file bag name of preface part, equipment Serial Number, unit type, the term of validity of setting, functional specification The authorization message of at least one classification in information;Described first authority information includes corresponding with described application file Application file bag name, equipment Serial Number, unit type, the term of validity of setting, at least one in functional specification information The authorization message of classification.
4. method according to claim 3, it is characterised in that described mobile device obtains the first school of application file Before testing the step of code and the second check code, also include:
Server generates the described second authority information of the corresponding text formatting of legal copy with described application file;
Described second authority information is calculated by described server by hashing algorithm, and authorized check code is described Check code is authorized to be described second check code;
Described mobile device obtains the first check code of application file and the step of the second check code, comprising:
Described mobile device obtains authority bag, and described authority bag includes the information of described second check code;
Described first authority that described application file itself is carried by described mobile device by described hashing algorithm Information calculates, and obtains described first check code.
5. method according to claim 4, it is characterised in that
Described second authority information is calculated by described server by hashing algorithm, the step of authorized check code Afterwards, also include:
Described server generates PKI and private key by rivest, shamir, adelman;
Described server uses described private key to described mandate check code encryption, generates authority signature;
The information of described second check code is described authority signature, and described mobile device obtains the first of application file Check code and the step of the second check code, also include:
Described mobile device obtains the described PKI being built in described application file;
Described authority signature is decrypted by described mobile device by described PKI, it is thus achieved that described authority checking code, institute State authority checking code and be described second check code.
6. method according to claim 5, it is characterised in that also include the described second mandate literary composition in described authority bag Part information, the authorization message of each classification all corresponding one in described second authority information, described first authority information Individual grant item;
Described mobile device, when described first check code is consistent with described second check code, determines that described application file leads to Cross checking, comprising:
When described first check code is consistent with described second check code, described mobile device is by described second authority information In each grant item compare with corresponding grant item in described first authority information respectively, if described second authorize literary composition In part information, each grant item is mated with corresponding grant item in described first authority information, it is determined that described application journey Preface part is by checking.
7. the system of an application file checking, it is characterised in that described system includes: mobile device, and described movement sets Standby include:
Acquisition module, for obtaining the first check code and second check code of application file, wherein, described first check code Being to obtain according to the first authority information that described application file itself carries, described second check code is according to institute State what the second authority information that the legal copy of application file carries obtained;
Determining module, for when described first check code is consistent with described second check code, determines described application file By checking.
8. system according to claim 7, it is characterised in that described first authority information is the first signing messages, Described second authority information is the second signing messages;
Described system also includes: server, and described server includes:
First computing module, for the described second signature having been arranged by the legal copy to described application file for the hashing algorithm Information calculates, and obtains described second check code;
Described acquisition module specifically for:
When described application file starts, by network attached server, and then obtain described application from described server Second check code of program file, or, when described application file starts, obtain and be built in described application file Described second check code;
Described first signing messages being carried itself described application file by described hashing algorithm is calculated, and obtains Described first check code.
9. system according to claim 7, it is characterised in that described second authority information includes and described application journey The legal copy corresponding application file bag name of preface part, equipment Serial Number, unit type, the term of validity of setting, functional specification The authorization message of at least one classification in information;Described first authority information includes corresponding with described application file Application file bag name, equipment Serial Number, unit type, the term of validity of setting, at least one in functional specification information The authorization message of classification.
10. system according to claim 9, it is characterised in that described system also includes: server, described server bag Include:
First generation module, for generating the described second mandate of the corresponding text formatting of legal copy with described application file Fileinfo;
Second computing module, for described second authority information being calculated by hashing algorithm, authorized verification Code, described mandate check code is described second check code;
Described acquisition module specifically for:
Obtaining authority bag, described authority bag includes the information of described second check code;
Calculated by the described first authority information that described application file itself is carried by described hashing algorithm, Obtain described first check code.
11. systems according to claim 10, it is characterised in that
Described server also includes:
Second generation module, for generating PKI and private key by rivest, shamir, adelman;
3rd generation module, is used for using described private key to described mandate check code encryption, generates authority signature;
The information of described second check code is described authority signature, and described acquisition module is additionally operable to:
Obtain the described PKI being built in described application file;
By described PKI, described authority signature is decrypted, it is thus achieved that described authority checking code, described authority checking code It is described second check code.
12. systems according to claim 11, it is characterised in that also include in described authority bag that described second authorizes Fileinfo, in described second authority information, described first authority information, the authorization message of each classification is all corresponding One grant item;
Described determining module is additionally operable to when described first check code is consistent with described second check code, authorizes literary composition by described second In part information, each grant item is compared with corresponding grant item in described first authority information respectively, if described second In authority information, each grant item is mated with corresponding grant item in described first authority information, it is determined that described Application file is by checking.
CN201610395335.7A 2016-06-06 2016-06-06 The method and system of application file checking Pending CN106096381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610395335.7A CN106096381A (en) 2016-06-06 2016-06-06 The method and system of application file checking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610395335.7A CN106096381A (en) 2016-06-06 2016-06-06 The method and system of application file checking

Publications (1)

Publication Number Publication Date
CN106096381A true CN106096381A (en) 2016-11-09

Family

ID=57447842

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610395335.7A Pending CN106096381A (en) 2016-06-06 2016-06-06 The method and system of application file checking

Country Status (1)

Country Link
CN (1) CN106096381A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108008976A (en) * 2017-12-27 2018-05-08 上海贝岭股份有限公司 Software identification generation method, computer-readable recording medium and microcontroller
CN108092947A (en) * 2016-11-23 2018-05-29 腾讯科技(深圳)有限公司 A kind of method and device that identity discriminating is carried out to third-party application
CN108268767A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Web application authorization method and device
CN108549826A (en) * 2018-03-30 2018-09-18 努比亚技术有限公司 Method of calibration, terminal, server and the readable storage medium storing program for executing of application program
CN110289947A (en) * 2019-04-29 2019-09-27 北京开态智慧科技有限公司 Data transmit consistency desired result method, apparatus, computer equipment and storage medium
CN110348235A (en) * 2019-07-17 2019-10-18 政采云有限公司 A kind of file test method and device
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification
CN110795103A (en) * 2019-09-27 2020-02-14 北京五八信息技术有限公司 Code compiling method and compiler
CN111767537A (en) * 2020-06-23 2020-10-13 平安普惠企业管理有限公司 Tamper verification method of application program based on IOS (operating system) and related equipment
CN114676393A (en) * 2022-05-26 2022-06-28 杭州微帧信息科技有限公司 Software off-line authentication method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040147251A1 (en) * 2002-11-21 2004-07-29 Ntt Docomo, Inc. Communication terminal, value entity providing server, application delivery server, electronic procurement supporting method, and electronic procurement supporting program
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN104426658A (en) * 2013-09-02 2015-03-18 中国移动通信集团公司 Method and device for performing identity authentication on application on mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040147251A1 (en) * 2002-11-21 2004-07-29 Ntt Docomo, Inc. Communication terminal, value entity providing server, application delivery server, electronic procurement supporting method, and electronic procurement supporting program
CN102314578A (en) * 2011-09-26 2012-01-11 浪潮(北京)电子信息产业有限公司 System and method for realizing software protection
CN104426658A (en) * 2013-09-02 2015-03-18 中国移动通信集团公司 Method and device for performing identity authentication on application on mobile terminal

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108092947A (en) * 2016-11-23 2018-05-29 腾讯科技(深圳)有限公司 A kind of method and device that identity discriminating is carried out to third-party application
CN108092947B (en) * 2016-11-23 2020-12-04 腾讯科技(深圳)有限公司 Method and device for identity authentication of third-party application
CN108268767A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Web application authorization method and device
CN108008976A (en) * 2017-12-27 2018-05-08 上海贝岭股份有限公司 Software identification generation method, computer-readable recording medium and microcontroller
CN108549826A (en) * 2018-03-30 2018-09-18 努比亚技术有限公司 Method of calibration, terminal, server and the readable storage medium storing program for executing of application program
CN110289947A (en) * 2019-04-29 2019-09-27 北京开态智慧科技有限公司 Data transmit consistency desired result method, apparatus, computer equipment and storage medium
CN110348235A (en) * 2019-07-17 2019-10-18 政采云有限公司 A kind of file test method and device
CN110609789A (en) * 2019-08-29 2019-12-24 烽火通信科技股份有限公司 Method and system for software License verification
CN110795103A (en) * 2019-09-27 2020-02-14 北京五八信息技术有限公司 Code compiling method and compiler
CN111767537A (en) * 2020-06-23 2020-10-13 平安普惠企业管理有限公司 Tamper verification method of application program based on IOS (operating system) and related equipment
CN114676393A (en) * 2022-05-26 2022-06-28 杭州微帧信息科技有限公司 Software off-line authentication method
CN114676393B (en) * 2022-05-26 2022-08-26 杭州微帧信息科技有限公司 Software off-line authentication method

Similar Documents

Publication Publication Date Title
CN106096381A (en) The method and system of application file checking
CN104134021B (en) The anti-tamper verification method of software and device
CN103167491B (en) A kind of mobile terminal uniqueness authentication method based on software digital certificate
WO2015101336A1 (en) Signature verification method, apparatus, and system
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
CN106209379A (en) A kind of Android APK countersignature verification method
CN106991298A (en) Access method, the authorization requests method and device of application program docking port
US20140157368A1 (en) Software authentication
CN113709115B (en) Authentication method and device
CN108075888A (en) Dynamic URL generation methods and device
CN113032837A (en) Anonymous authentication method and system for open platform
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN114826572A (en) Decentralized crowdsourcing method and system supporting attribute privacy protection and terminal
Zhang A study on application of digital signature technology
CN112380501B (en) Equipment operation method, device, equipment and storage medium
KR20140061788A (en) Security metohd and server using program code guaranteed integrity
CN112039675A (en) Token generation and authentication method based on block chain intelligent contract
Sevis et al. Survey on data integrity in cloud
CS Machado et al. Software control and intellectual property protection in cyber-physical systems
CN115550060B (en) Trusted certificate verification method, device, equipment and medium based on block chain
CN104994503B (en) A kind of mobile application access method
CN114125158B (en) Anti-harassment method, device, equipment and storage medium based on trusted telephone
CN114698408B (en) Multi-receiver secure communications
CN110351090B (en) Group signature digital certificate revoking method and device, storage medium and electronic equipment
CN112784249A (en) Method, system, processor and computer readable storage medium for implementing mobile terminal authentication processing under non-identification condition

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161109