CN106096381A - The method and system of application file checking - Google Patents
The method and system of application file checking Download PDFInfo
- Publication number
- CN106096381A CN106096381A CN201610395335.7A CN201610395335A CN106096381A CN 106096381 A CN106096381 A CN 106096381A CN 201610395335 A CN201610395335 A CN 201610395335A CN 106096381 A CN106096381 A CN 106096381A
- Authority
- CN
- China
- Prior art keywords
- check code
- application file
- authority
- authority information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the method and system of a kind of application file checking, the method includes: mobile device obtains the first check code and second check code of application file, first check code is to obtain according to the first authority information that described application file itself carries, and described second check code is to obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device, when described first check code is consistent with described second check code, determines described application file by checking.By the way, the present invention can determine the security of application file in mobile terminal, and need not input longer code.
Description
Technical field
The present invention relates to application file security technology area, particularly relate to the side of a kind of application file checking
Method and system.
Background technology
Android (Android) application program is faced with serious problem of piracy, may be implanted by pirate application program
Virus, advertisement, it is also possible to being packed and distorted by secondary, these all seriously compromise developer and the consumer of application program
Rights and interests.
For this situation, each industrial chain of mobile Internet is all doing some effort, protects Android application journey
The safety of sequence.At present, the mode of commonly used soft ware authorization is to complete at soft ware authorization interface input active coding or registration code
Registration, active coding or registration code typically with "-" separate, such as Windows, Office etc., such as Office2013: active coding is
GQKNX-C6 T4B-V2T69-777QJ-XWYG7;And for example the installation active coding of Win10 is NKJFK-GPHP 7-G8C3J-
P6JXR-HQRJR;And for example the registration code of UltraEdit is Name:jialei_wy, and active coding is: DSQOQ-OSPNA-JIHHK-
TNVIO-ONFGK-EERGI-QOMRC-L QJAK。
In the method for above-mentioned guarantee Android application security, on the one hand, active coding or registration code are longer, are moving
End input is more difficult, on the other hand, after registration code or active coding flow out, is still easy to pirate.
Content of the invention
The technical problem that present invention mainly solves is to provide the method and system of a kind of application file checking, Neng Gou
Mobile terminal determines the security of application file, and need not input longer code.
For solving above-mentioned technical problem, one aspect of the present invention is: provide a kind of application file to test
The method of card, described method includes: the first check code of mobile device acquisition application file and the second check code, wherein,
Described first check code is to obtain according to the first authority information that described application file itself carries, described second
Check code is to obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device exists
When described first check code is consistent with described second check code, determine described application file by checking.
Wherein, described first authority information is the first signing messages, and described second authority information is the second label
Name information;Before described mobile device obtains described first check code of application file and the step of the second check code, also
Including: described second signing messages that server has been arranged by the legal copy to described application file for the hashing algorithm is counted
Calculate, obtain described second check code;Described mobile device obtains the first check code and second verification of described application file
The step of code, comprising: described mobile device is when described application file starts, by network attached server, Jin Ercong
Described server obtains the second check code of described application file, or, described mobile device is at described application file
During startup, obtaining described second check code being built in described application file, described mobile device is calculated by described hash
Described first signing messages that described application file itself is carried by method calculates, and obtains described first check code.
Wherein, described second authority information includes the corresponding application program literary composition with the legal copy of described application file
The mandate letter of at least one classification in part bag name, equipment Serial Number, unit type, the term of validity of setting, functional specification information
Breath;Described first authority information includes and described application file corresponding application file bag name, equipment sequence
Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information.
Wherein, before described mobile device obtains the first check code of application file and the step of the second check code,
Also include: server generates the described second authority letter of the corresponding text formatting of legal copy with described application file
Breath;Described second authority information is calculated by described server by hashing algorithm, authorized check code, described awards
Power check code is described second check code;Described mobile device obtains the first check code and second verification of application file
The step of code, comprising: described mobile device obtains authority bag, and described authority bag includes described second check code
Information;Described first authority that described application file itself is carried by described mobile device by described hashing algorithm
Information calculates, and obtains described first check code.
Wherein, described second authority information is calculated by described server by hashing algorithm, authorized school
After testing the step of code, also include: described server generates PKI and private key by rivest, shamir, adelman;Described server makes
With described private key to described mandate check code encryption, generate authority signature;The information of described second check code is described awarding
Power file signature, described mobile device obtains the first check code of application file and the step of the second check code, also includes:
Described mobile device obtains the described PKI being built in described application file;Described mobile device passes through described PKI to institute
State authority signature to be decrypted, it is thus achieved that described authority checking code, described authority checking code is described second check code.
Wherein, described authority bag also includes described second authority information, described second authority information,
The all corresponding grant item of the authorization message of each classification in described first authority information;Described mobile device is described
When one check code is consistent with described second check code, determine described application file by checking, comprising: in described first school
Test code consistent with described second check code when, described mobile device is by each grant item in described second authority information respectively
Compare with corresponding grant item in described first authority information, if each authorizes in described second authority information
Item all mates with corresponding grant item in described first authority information, then determine described application file by checking.
For solving above-mentioned technical problem, another technical solution used in the present invention is: provide a kind of application file
The system of checking, described system includes: mobile device, and described mobile device includes: acquisition module, is used for obtaining application program literary composition
First check code of part and the second check code, wherein, described first check code is itself to carry according to described application file
The first authority information obtain, described second check code is second carrying according to the legal copy of described application file
Authority information obtains;Determining module, for when described first check code is consistent with described second check code, determines institute
State application file by checking.
Wherein, described first authority information is the first signing messages, and described second authority information is the second label
Name information;Described system also includes: server, and described server includes: the first computing module, is used for by hashing algorithm to institute
State described second signing messages that the legal copy of application file arranged to calculate, obtain described second check code;Described
Acquisition module specifically for: when described application file starts, by network attached server, and then from described server
Obtain the second check code of described application file, or, when described application file starts, obtain and be built in described answering
With described second check code of program file;
Described first signing messages being carried itself described application file by described hashing algorithm is calculated,
Obtain described first check code.
Wherein, described second authority information includes the corresponding application program literary composition with the legal copy of described application file
The mandate letter of at least one classification in part bag name, equipment Serial Number, unit type, the term of validity of setting, functional specification information
Breath;Described first authority information includes and described application file corresponding application file bag name, equipment sequence
Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information.
Wherein, described system also includes: server, and described server includes: the first generation module, for generate with described
The described second authority information of the corresponding text formatting of legal copy of application file;Second computing module, is used for passing through
Described second authority information is calculated by hashing algorithm, authorized check code, and described mandate check code is described
Second check code;Described acquisition module specifically for: obtain authority bag, described authority bag includes described second school
Test the information of code;Entered by the described first authority information that described application file itself is carried by described hashing algorithm
Row calculates, and obtains described first check code.
Wherein, described server also includes: the second generation module, for generating PKI and private by rivest, shamir, adelman
Key;3rd generation module, is used for using described private key to described mandate check code encryption, generates authority signature;Described
The information of two check codes is described authority signature, and described acquisition module is additionally operable to: obtains and is built in described application program literary composition
The described PKI of part;By described PKI, described authority signature is decrypted, it is thus achieved that described authority checking code, described awards
Power identifying code is described second check code.
Wherein, described authority bag also includes described second authority information, described second authority information,
The all corresponding grant item of the authorization message of each classification in described first authority information;Described determining module is additionally operable to
When described first check code is consistent with described second check code, by each grant item in described second authority information respectively with
In described first authority information, corresponding grant item is compared, if each grant item in described second authority information
All mate with corresponding grant item in described first authority information, then determine described application file by checking.
The invention has the beneficial effects as follows: be different from the situation of prior art, mobile device of the present invention obtains application program literary composition
First check code of part and the second check code, the first check code is the first mandate itself carried according to described application file
Fileinfo obtains, and described second check code is the second authority letter carrying according to the legal copy of described application file
Breath obtains;Described mobile device, when described first check code is consistent with described second check code, determines described application program
File is by checking.The the second authority information carried due to the legal copy of application file, application file is taken itself
Carry the first authority information, when application file is not tampered with, the first authority information and the second authority
Information is consistent, and the first check code and the second check code are also consistent, and after application file is tampered, first authorizes
Fileinfo and the second authority information are inconsistent, and the first check code and the second check code are also inconsistent, by this
Mode, can determine the security of application file, and need not input longer code in mobile terminal.
Brief description
Fig. 1 is the flow chart of method one embodiment of application file of the present invention checking;
Fig. 2 is the flow chart of another embodiment of method of application file of the present invention checking;
Fig. 3 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 4 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 5 is the flow chart of the another embodiment of method of application file of the present invention checking;
Fig. 6 is the structural representation of system one embodiment of application file of the present invention checking;
Fig. 7 is the structural representation of another embodiment of system of application file of the present invention checking;
Fig. 8 is the structural representation of the another embodiment of system of application file of the present invention checking;
Fig. 9 is the structural representation of the another embodiment of system of application file of the present invention checking.
Detailed description of the invention
The present invention is described in detail with embodiment below in conjunction with the accompanying drawings.
Refering to Fig. 1, Fig. 1 is the flow chart of method one embodiment of application file of the present invention checking, comprising:
Step S101: mobile device obtains the first check code and second check code of application file, wherein, the first school
Testing code is to obtain according to the first authority information that application file itself carries, and the second check code is according to application journey
The second authority information that the legal copy of preface part is carried obtains, the second mandate that the legal copy of described application file is carried
The legal copy corresponding authority information of the i.e. described application file of fileinfo.Mobile device obtains application file
First check code and the second check code also can include two independent steps, i.e. include: mobile device obtains application program literary composition
The step of the first check code of part, mobile device obtain the step of the second check code of application file.
Application file, after distribution or pirate, or user is during using, and is tampered, these
Consumer's Experience is all caused to reduce.In prior art, it is common that by way of input active coding or registration code, ensure to apply journey
Preface part is legal copy rather than pirate.But, on the one hand, for mobile device, input long code very inconvenient, the opposing party
Face, active coding or registration code also can be tampered.
In embodiments of the present invention, after application file corresponding legal generation, i.e. produce corresponding second and award
Power fileinfo, the second authority information refers to the authority information one to one of the legal copy with application file, example
As: unique signature of setting, equipment Serial Number, application file bag name, unique temporal information etc. of determination.This is second years old
Authority information is attached in the corresponding legal copy of application file.If the second authority information is tampered, then show
This application file has been tampered with.Second authority information is typically application developers or the clothes of application developers mandate
Business business determines.
First authority information refers to corresponding to the second authority information and the one_to_one corresponding of application file own
Authority information.For example, if the second authority information is the signature unique setting, then the first authority information
Being also corresponding signature, only this signature is possible to consistent with the signature unique setting, it is possible to make at application file
Used time is tampered and inconsistent with the signature unique setting, or application file is originally pirate, and signature is naturally also
Inconsistent with the signature unique setting.
Obtain the first verification according to the first authority information that application file itself carries by certain method
Code, obtains the second check code according to the second authority information that the legal copy of application file is carried by certain method.
Wherein, it is thus achieved that the method for the first check code can be identical with the method obtaining the second check code, it is also possible to differs, differs
When, it is thus necessary to determine that the corresponding relation between the first check code and the second check code, to determine the first check code and the second verification
Whether code is consistent.
Step S102: mobile device, when the first check code and the second check code are consistent, determines that application file passes through
Checking.
Relatively the first check code and the second check code, if the first check code and the second check code are consistent, determines this application
Program file, by checking, that is to say that this application file is consistent with the legal copy of application file, this application program
File is not tampered with, and mandate is effective.Certainly, the legal copy of this application file is after follow-up use process, still has
May be tampered, if be tampered during follow-up use, then the first check code and the second check code are just inconsistent.
If the first check code and the second check code are inconsistent, prompting user application file has been tampered with, and continues
Use risky, or application file is piracy, and guide user to use the official of application file legal.
Embodiment of the present invention mobile device obtains the first check code and the second check code, first school of application file
Testing code is to obtain according to the first authority information that described application file itself carries, and described second check code is root
Obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device is in described first school
Test code consistent with described second check code when, determine described application file by checking.Due to application file just
The second authority information that version is carried, application file itself carries the first authority information, works as application file
When being not tampered with, the first authority information is consistent with the second authority information, the first check code and the second verification
Code is also consistent, and after application file is tampered, the first authority information and the second authority information are to differ
Causing, the first check code and the second check code are also inconsistent, in this way, can determine application file in mobile terminal
Security, and longer code need not be inputted.
Wherein, the first authority information is the first signing messages, and the second authority information is the second signing messages.
Now, in step S101, mobile device obtains the step of the second check code of application file, can pass through two
The mode of kind realizes, one is in the case of network-in-dialing, and mobile device can obtain the second verification by network from server
Code, another kind of situation is that developer is built in the second check code in the legal copy of application file, when user obtains application journey
The legal copy of preface part, after the legal copy of the mobile device set up applications of oneself, in this application program (application journey i.e. installed
The legal copy of preface part) in follow-up checking, network can be independent of, mobile device directly obtains and is built in application file
The second check code.
See Fig. 2, no matter be above-mentioned any mode, before step S101, be first required to generate the second check code,
Combine detailed process can be such that
Step S103: the second signing messages that server has been arranged by the legal copy to application file for the hashing algorithm enters
Row calculates, and obtains the second check code.This step can complete at the service provider of application developers or application developers mandate.Enter
One step ground, server is built in the second check code in the legal copy of application file, and this is built-in with the application of the second check code
The legal copy of program file reaches user side.
If there is network when application file starts, mobile device passes through Network Capture the second check code, then enter
Step S1011, if do not have network when application file starts, mobile device obtains the second check code in this locality, then enter
Enter step S1012.
Step S1011: by network attached server, and then obtain the second verification of application file from server
Code.
Step S1012: obtain the second check code being built in application file.
Although it will be apparent that the second check code is to be built in the legal copy of application file, but still there is security
Risk.It is possible to further process is encrypted and decrypted to the second check code by way of public affairs, private key, to enter one
Step increases the security of application file.
Wherein, in step S101, the step of the first check code that mobile device obtains application file may is that step
S1013, the first signing messages being carried application file itself by hashing algorithm is calculated, and obtains the first verification
Code.The method of the method and acquisition the second check code that i.e. obtain the first check code is just as, and is all hashing algorithm.
Hashing algorithm refers to produce the algorithm of the hashed value of some data slots (such as message or session entry).Good hash
Algorithm has the characteristic changing hashed value result according to the variation in input data;Therefore, hash is such as disappearing for detection
Any change in the large-scale information objects such as breath is very useful.
Hash function in software development or hashing algorithm, also known as hash function (Hash Function), be a kind of from appointing
What a kind of data creates the method for little numeral " fingerprint ".Hash function becomes summary message or data compression so that data
Amount diminishes, and is fixed up the form of data.Data are upset mixing by this function, re-create a finger being called hashed value
Line.Hashed value is commonly used to represent the character string of a short random letters and numeral composition.Good hash function is at input domain
In hash collision seldom occurs.At hash table and Data processing, do not suppress conflict to carry out distinguishes data, data-base recording can be made
It is more difficult to find.All of hash function is all just like next fundamental characteristics: if two hashed values be differ (according to same
Function), then being originally inputted of the two hashed value is also differ.Hashing algorithm include but is not limited to SHA1, MD5,
SHA256 etc..Certainly, it is thus achieved that the method for the method of the first check code and acquisition the second check code is except being above-mentioned hashing algorithm
Outward, can also is that other methods, do not limit at this.
In actual applications, above-mentioned signing messages proof procedure can realize checking with Java code, it is also possible to uses C language
Code realizes checking, specific as follows:
1st, the shallow verification of Java layer (Validation Code is at Java layer);
For example, in Java code, checking signature specifically may is that
Owing to Java code includes a lot of source code information, such as variable name, method name, and come to visit by these titles
Asking variable and method, these symbols are with many semantic informations, it is easy to decompiled into Java source code.This in order to prevent
Phenomenon, can use the mode of Code obfuscation, improve the difficulty of decompiling to Java code.
2nd, in primary development kit (Native Development Kit, write a Chinese character in simplified form NDK) C code, verification (verifies generation deeply
Code is in the C code of NDK);
C language realize with the realization of Java in flow process similar, only code difference, no longer illustrate in detail.Due to C language
The program write typically is difficult to decompiling, it is impossible to obtain source code, and compiling has been converted into machine language after completing, is not completely may be used
Inverse process, the engineering that therefore decompiling C language generates, the engineering challenges than decompiling Java is a lot.
In the embodiment of the present invention, the process of checking application file can verify on backstage, does not affect application program literary composition
The toggle speed of part.
Wherein, the second authority information include with the legal copy of application file corresponding application file bag name,
The authorization message of at least one classification in equipment Serial Number, unit type, the term of validity of setting, functional specification information;First
Authority information includes and application file corresponding application file bag name, equipment Serial Number, unit type, setting
The term of validity, the authorization message of at least one classification in functional specification information.Wherein, functional specification information i.e. limits application journey
Preface part can use the information of function, and described first authority information is also mutually corresponding with the second authority information, for example,
Second authority information includes the legal copy of application file corresponding application file bag name, then the first authority
Information also includes and application file corresponding application file bag name;And for example, the second authority information includes application
The legal copy corresponding application file bag name of program file and equipment Serial Number, then the first authority information also include with
Application file corresponding application file bag name and equipment Serial Number.Certainly, the second authority information is not limited to
Foregoing, does not limit at this.
Wherein, described with application file legal copy corresponding application file bag name, equipment Serial Number, equipment type
Number etc. classification authorization message in, may each comprise multiple object, the even first authority information include and application program literary composition
It during part corresponding application file bag name, is somebody's turn to do the corresponding application file Bao Mingzhong with the legal copy of application file permissible
Including multiple application file bag names, this reader of such as e, this store of e etc.;If the first authority information includes equipment sequence
During row, then this equipment Serial Number can include multiple equipment Serial Number;If the first authority information includes unit type, if
Standby model also can include multiple unit type, such as this T8 of E people E, E people this T9 of E etc..In like manner, the second authority information is also
Can be arranged such that, so can realize an authority bag to multiple application files, or multiple equipment Serial Number, or
Multiple unit types realize authorizing, to improve application file authority checking efficiency.
Now, seeing Fig. 3, in step S101, mobile device obtains the first check code and second school of application file
Before testing the step of code, also include:
Step S201: server generates the second authority letter of the corresponding text formatting of legal copy with application file
Breath.
The legal copy of application file is before dispatching from the factory, according to application file bag name, equipment Serial Number, unit type
At least one in (or device customizing model), the term of validity setting etc. generates the second authority information of text formatting,
Text form can be .txt form, JSON form or XML format etc., wherein, and the authority letter of preferably JSON form
Breath, the authority information of JSON form is in the comparison of subsequent authorization item, and comparison efficiency is high.
For example, the second authority information authorization.json (referring to be exemplified below).
Step S202: the second authority information is calculated by server by hashing algorithm, authorized check code,
Check code is authorized to be the second check code.
For example, according to hashing algorithm, such as SHA1, MD5 or SHA256 etc., to the second authority information evaluation, dissipated
Train value is mandate check code, such as SHA1 value, MD5 value, or SHA256 value etc..
If the mandate check code that the second authority information is asked changes, then the corresponding second i.e. quilt of authority information
By authorizing check code, modification, therefore may determine that whether the second authority information is modified, the second authority information quilt
(check code is authorized to change) after modification, i.e. it is believed that the second authority information lost efficacy, the legal copy of this application file
It has been modified.
Equally, in step S101, mobile device obtains the step of the first check code of application file, may is that shifting
Dynamic equipment obtains authority bag, and this authority bag includes the information of the second check code;By hashing algorithm to application journey
The first authority information that preface part itself carries calculates, and obtains the first check code.
Described authority bag includes the information of described second check code, can be the second check code, or, Ke Yishi
Described authority signature (authority signature encryption the second check code obtains).
It should be understood that when the second authority information is the literary composition of the corresponding application program with the legal copy of application file
Part bag name, equipment Serial Number, unit type, setting one of the term of validity when, the first authority information is also corresponding
One;When the second authority information is corresponding application file bag name, equipment sequence with the legal copy of application file
Number, unit type, setting the term of validity in two when, the first authority information is also corresponding two, now all right
Set the checking of further application file, for example: legal corresponding for application file of the second authority information
Application file bag name, equipment Serial Number, the first authority information is corresponding application program with application file
File bag name, equipment Serial Number.In the second authority information (authorization.json as described below), Ke Yijin
One step explanation grant item also includes the term of validity setting, and i.e. when the second check code and the first check code are consistent, after checking, enters
Row further checking, whether the term of validity of confirmation application file is in the term of validity setting, if not having of setting
In the effect phase, then this checking is not passed through.
And for example: the second authority information is equipment Serial Number, the first authority information is equipment Serial Number, second
In authority information, can further illustrate grant item also include application file bag name, unit type, setting effective
Phase, i.e. when the second check code and the first check code are consistent, after checking, further verified, confirmed application journey respectively
Whether the application file bag name of preface part, unit type, the term of validity be consistent with set in the second authority information, only
Wherein to have one inconsistent, then this checking is not passed through.
Certainly, in above-mentioned example, it is also possible to when verifying for the first time, the second authority information includes whole mandates
, only when the second check code including whole grant item is consistent with the first check code including whole grant item, just calculate logical
Cross checking.The concrete checking how realizing application file, can according to reality apply it needs to be determined that, do not limit at this
Fixed.
Mobile device, when obtaining the second check code, still can use networking to obtain from server and obtain two in this locality
The mode of kind, no longer goes to live in the household of one's in-laws on getting married at this and chats.It is mainly described when obtaining in this locality below, in order to be further ensured that the peace of application file
The measure that full property is taked.
See Fig. 4, after step S202, can also include:
Step S203: server generates PKI and private key by rivest, shamir, adelman.
Rivest, shamir, adelman, such as RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC etc..Application developers retains
Private key, private key is used for encryption authorization check code, and to generate authority signature (following steps S204), PKI is used for deciphering mandate
File signature, authorized check code.It is of course also possible to use symmetric encipherment algorithm, do not limit at this.
Step S204: server uses private key to authorizing check code encryption, generates authority signature, for example:
Authorization.json.sign authority is signed.
Wherein, the second authority information, authority signature, PKI are required to be built in application file.Example
As by the second authority information authorization.json, authority signature authorization.json.sign beats
Bag, generates zip compressed package (authority bag), such as authority bag license.zip;By authority bag license.zip
Issue the user obtaining mandate after application authorizes, or directly before equipment or terminal dispatch from the factory, utilize authority bag
Pre-installed applications is authorized by license.zip.
PKI can be built in the legal copy of application file by server, it is also possible to is saved in server local.When
Mobile device is not networked when verifying, server can be built in PKI in the legal copy of application file, sets when mobile
When standby networking is verified, PKI can be saved in server local by server.Networking or the flow process verified of not networking,
May refer to foregoing, no longer go to live in the household of one's in-laws on getting married at this and chat.
Now, seeing Fig. 5, in step S101, mobile device obtains the step of the second check code of application file, bag
Include:
Step S301: mobile device obtains the PKI being built in application file.
Step S302: authority signature is decrypted by mobile device by PKI, it is thus achieved that authority checking code, mandate is tested
Card code is the second check code.
It should be noted that the execution of above-mentioned steps S101 and step S102 can be when application file starts
Wait and perform, it is also possible to be to perform in application file running.
Authority bag also includes the second authority information, the second authority information, the first authority information
In all corresponding grant item of authorization message of each classification;Mobile device when the first check code and the second check code are consistent,
Determine that application file passes through checking, comprising:
When the first check code and the second check code are consistent, mobile device is by each grant item in the second authority information
Compare with corresponding grant item in the first authority information respectively, if in the second authority information each grant item with
In first authority information, corresponding grant item is all mated, then determine application file by checking.
Grant item can be application file bag name, equipment Serial Number, unit type, the term of validity of setting, function limit
Determine the authorization message of at least one classification in information.Corresponding grant item coupling refers to the authorized content phase of concrete grant item
Coupling.If in the second authority information, each grant item is mated with corresponding grant item in the first authority information, i.e.
Represent in the grant item that the second authority information is identical with the first authority information that there is identical object content, this mesh
Mark content is the application file characteristic of correspondence information of current authentication, such as application file bag name, application program literary composition
The unit type (unit type i.e. described above) of part place equipment, or the equipment sequence of application file place equipment
Row number etc..
For example, the first authority information and the second authority information all include application file bag grant item,
Second authority Information application program file bag grant item includes two application file bag names, this first mandate literary composition
In part information, application file bag grant item also includes two application files identical with the second authority information
Bag name, so i.e. represents the application file bag grant item phase in the first authority information and the second authority information
Join.
Wherein, in one embodiment, the method also includes:
One predetermined application file bag name is appointed as the general of the legal copy of two or more application file by server
Application package name;By hashing algorithm, predetermined application file bag name is calculated, obtain the second check code, the second school
Test legal general second check code that code is two or more application file;Now, step S101 includes: mobile device exists
Determine two or more application file itself all carry one first application package name after, by hashing algorithm to first
Application package name calculates, it is thus achieved that the first check code, in this locality or obtains the second check code by network from server;
Step S102 includes: mobile device, when the first check code and the second check code are consistent, determines two or more application file
All by checking.
For the plural application file of batch, if in the manner described above, come singly to enter respectively
Row checking, proof procedure is long, and compares and lose time, and by the way, can pass through general second check code,
Make plural batch application file all by checking, thus simplify proof procedure.
Wherein, in one embodiment, the method also includes:
A series of multiple equipment Serial Numbers or unit type are appointed as the legal copy of an application file by server respectively
Equipment Serial Number or unit type;Respectively a series of multiple equipment Serial Numbers or unit type are counted by hashing algorithm
Calculating, obtaining corresponding multiple second check code, multiple second check codes are all the second legal check codes of application file;
Now, step S101 includes: equipment Serial Number that application file itself is carried by hashing algorithm by mobile device or set
Standby model calculates, it is thus achieved that the first check code, in this locality or obtains multiple second check code by network from server;Step
Rapid S102 includes: when mobile device has second check code and the first check code consistent in determining multiple second check code,
Determine that application file passes through checking.
When an application program is verified on multiple a series of equipment respectively, adopt with the aforedescribed process one by one
Ground is verified respectively, and proof procedure is long, and compares and lose time, by the way, can simplify authenticated
In the case of journey, make an application file by testing on the equipment of multiple a series of equipment Serial Numbers or unit type
Card.
Wherein, in one embodiment, described second authority information includes that second uniquely identifies, described second unique
It is designated corresponding application file bag name, equipment Serial Number, unit type, setting with the legal copy of described application file
The term of validity, the authorization message of at least one classification in functional specification information;Described first authority information includes first
Unique mark, described first is uniquely designated and described application file corresponding application file bag name, equipment sequence
Number, the authorization message of at least one classification in unit type, the term of validity of setting, functional specification information, now, the method is also
Including:
Second unique mark that the legal copy to application file for the server is carried is classified, and is divided into main second uniquely to mark
Know and more than one time second uniquely identifies;By hashing algorithm, respectively to main second uniquely mark and more than one time second
Unique mark calculates, and respectively obtains main second check code and more than one order two check code;Now, step S101 bag
Include: mobile device application file itself is carried first uniquely mark carry out corresponding classification, be divided into corresponding master the
One unique mark and more than one time first uniquely identify;Mobile device passes through hashing algorithm, uniquely identifies to main first respectively
Calculate with more than one time first uniquely mark, it is thus achieved that main first check code and more than one the first check code;Mobile
Equipment obtains main second check code and more than one order two check code in this locality or by network from server;Step S102
Including: mobile device, when main first check code is consistent with main second check code, determines that application file is tested by the first order
Card;Mobile device compares more than one time first check code and more than one the second check code more respectively step by step, when one with
When last time, the first check code was consistent step by step respectively with more than one time second check code, determine application file pass through respectively by
Level verification.
Aforesaid way is the another kind of mode realizing classification checking, i.e. the more every grant item of one-level one-level is awarded at each
In the case that claim is all by checking, finally determine application file by checking.Therefore, by the way, Neng Goushi
Now verify step by step.
Illustrate as a example by JSON form the second authority information of this reader of E below, the application of this reader of E
Program file bag name " cn.eben.reader "
Above-mentioned indicate with [] application bag name, equipment Serial Number, unit type, device customizing model etc., can include many
Individual value.
This authority information includes multiple grant item, such as application file bag name, equipment Serial Number, equipment type
Number, functional specification information etc., each grant item also can be to the restriction of multiple objects.For example: when the second authority information bag
When including application file bag name, the corresponding grant item of application file bag name can include multiple application file bag
Name, this reader of such as e, this store of e etc., again for example, when the second authority information includes unit type, unit type is awarded
Can include one or more unit types of an equipment in claim, such as unit type includes E people this T8 of E, E people this T9 of E,
So this authority information is effective to the equipment of E people this T8 of E, E people this T9 of E.And for example, i.e. when the second authority information includes
During equipment Serial Number (or device numbering), for example, device numbering during this production of E can be set, i.e. know which device numbering is
E our company produces, then can set these numberings and can license this reader of e.Content in [] separates with ", ".
Above in functional specification information (extra) grant item of authority information, can set which function can use,
Which function is unavailable, the corresponding different mandate of different functions.Generally, can be divided into standard edition (basic function),
Enhanced edition, global function version, each version can preset and authorize different functional specification information.
One concrete JSON form authority information is as follows:
Specifically, in one detailed description of the invention of the present invention, the second authority information and authority signature two
Item content one authorization message completing of composition, checks that the whether effective process of authorization message specifically can be such that
(1) PKI is built in SDK (Software Development Kit, write a Chinese character in simplified form SDK), and compiling is extremely
In application file, after application file starts, decompress this authorization message license.zip and obtain the second authority letter
Breath authorization.json and authority signature authorization.json.sign;
(2) with the authority of public key decryptions application file signature authorization.json.sign, the is obtained
Two authority information authorization.json corresponding mandate check code (such as SHA1), are the second check code;
(3) calculate the second authority information that decompression obtains and (that is to say that application file itself carries first awards
Power fileinfo) check code of authorization.json, (identical with the second check code employing is scattered to be the first check code
Row algorithm);
(4) the first check code calculating is compared with the second check code that deciphering obtains, be used for verifying and answer
Whether changed by the second authority information authorization.json of program file, the first check code calculating and solution
Close the second check code obtaining is identical, then the second authority information authorization.json is without changing, if second authorizes
Fileinfo authorization.json is modified, then the first check code and the second check code necessarily differ, and this mandate is
For Lame delegation;
(5) in the case that the second authority information authorization.json is effective authority, to the firstth,
In second authority information, other grant item is further checked.
When the first, second authority information of inspection, each authority information includes other grant item multiple,
At the checking by the second check code for second authority information authorization.json, the mandate tentatively confirming the validity literary composition
In the case of part information, need further to verify other grant item in first, second authority information one by one, the firstth, the
In two authority information, other grant item all of are all option, and all items come into force guarantee authority information jointly
Essence is effective, i.e. grant item in authorization.json needs to verify one by one, if all passing through, then and this application file
Program, by checking, authorizes effectively, and each grant item invalid can negate the validity of application file.By above-mentioned side
Formula, it is possible to achieve classification checking.
Seeing Fig. 6, the present invention also provides the system that a kind of application file is verified, this system can perform said method
In step, related detailed content refers to said method part, at this no longer go to live in the household of one's in-laws on getting married chat.
This system 10 includes: mobile device 100, and this mobile device 100 includes: acquisition module 101 and determining module 102.
Acquisition module 101 is for obtaining the first check code and second check code of application file, wherein, and the first verification
Code is to obtain according to the first authority information that application file itself carries, and the second check code is according to application program
The second authority information that the legal copy of file is carried obtains.
Determining module 102, for when the first check code and the second check code are consistent, determines application file by testing
Card.
Embodiment of the present invention mobile device obtains the first check code and the second check code, first school of application file
Testing code is to obtain according to the first authority information that described application file itself carries, and described second check code is root
Obtain according to the second authority information that the legal copy of described application file is carried;Described mobile device is in described first school
Test code consistent with described second check code when, determine described application file by checking.Due to application file just
The second authority information that version is carried, application file itself carries the first authority information, works as application file
When being not tampered with, the first authority information is consistent with the second authority information, the first check code and the second verification
Code is also consistent, and after application file is tampered, the first authority information and the second authority information are to differ
Causing, the first check code and the second check code are also inconsistent, in this way, can determine application file in mobile terminal
Security, and longer code need not be inputted.
Wherein, the first authority information is the first signing messages, and the second authority information is the second signing messages.
Wherein, acquisition module 101 is specifically for when application file starts, by network attached server, and then
Obtain the second check code of application file from server;Or, when application file starts, obtain and be built in application journey
Second check code of preface part.
Wherein, seeing Fig. 7, system 10 also includes server 200, and server 200 includes: the first computing module 201.
First computing module 201 is for the second A.L.S. having been arranged by the legal copy to application file for the hashing algorithm
Breath calculates, and obtains the second check code.
The acquisition module 101 of mobile device 100 is specifically for being carried to application file itself by hashing algorithm
First signing messages calculates, and obtains the first check code.
Wherein, the second authority information is the corresponding application file bag name with the legal copy of application file, sets
The authorization message of at least one classification in standby sequence number, unit type, the term of validity of setting, functional specification information;First awards
Power fileinfo for application file corresponding application file bag name, equipment Serial Number, unit type, the having of setting
Effect phase, the authorization message of at least one classification in functional specification information.
Seeing Fig. 8, system 10 also includes server 200, and server 200 includes: the first generation module 202 and second calculates
Module 203.
First generation module 202 is for generating the second mandate literary composition of the corresponding text formatting of legal copy with application file
Part information.
Second computing module 203 is used for being calculated the second authority information by hashing algorithm, authorized school
Test code, authorize check code to be the second check code.
The acquisition module 101 of mobile device 100 is specifically for obtaining authority bag, and authority bag includes the second school
Test the information of code;Calculated by the first authority information that application file itself is carried by hashing algorithm, obtain
First check code.
Wherein, seeing Fig. 9, server 200 also includes: the second generation module 204 and the 3rd generation module 205.
Second generation module 204 is for generating PKI and private key by rivest, shamir, adelman.
3rd generation module 205 is used for using private key to authorizing check code encryption, generates authority signature.
Now, mobile device 100 is additionally operable to:
Obtain the PKI being built in application file.
By PKI, authority signature is decrypted, it is thus achieved that authority checking code, authority checking code is the second verification
Code.
Wherein, authority bag also includes the second authority information, the second authority information, the first authority
The all corresponding grant item of the authorization message of each classification in information;Determining module is additionally operable in the first check code and the second verification
When code is consistent, each grant item in the second authority information is entered with corresponding grant item in the first authority information respectively
Row comparison, if each grant item is mated with corresponding grant item in the first authority information in the second authority information,
Then determine application file by checking.
The foregoing is only embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilization is originally
Equivalent structure or equivalence flow process that description of the invention and accompanying drawing content are made convert, or are directly or indirectly used in what other were related to
Technical field, all in like manner includes in the scope of patent protection of the present invention.
Claims (12)
1. the method for an application file checking, it is characterised in that described method includes:
Mobile device obtains the first check code and second check code of application file, and wherein, described first check code is root
Obtaining according to the first authority information that described application file itself carries, described second check code is to answer according to described
Obtain by the second authority information that the legal copy of program file is carried;
Described mobile device, when described first check code is consistent with described second check code, determines that described application file leads to
Cross checking.
2. method according to claim 1, it is characterised in that described first authority information is the first signing messages,
Described second authority information is the second signing messages;
Before described mobile device obtains described first check code of application file and the step of the second check code, also wrap
Include:
Described second signing messages that server has been arranged by the legal copy to described application file for the hashing algorithm is counted
Calculate, obtain described second check code;
Described mobile device obtains the first check code of described application file and the step of the second check code, comprising:
Described mobile device is when described application file starts, by network attached server, and then from described server
Obtain the second check code of described application file, or, described mobile device, when described application file starts, obtains
It is built in described second check code of described application file;
Described first signing messages that described application file itself is carried by described mobile device by described hashing algorithm
Calculate, obtain described first check code.
3. method according to claim 1, it is characterised in that described second authority information includes and described application journey
The legal copy corresponding application file bag name of preface part, equipment Serial Number, unit type, the term of validity of setting, functional specification
The authorization message of at least one classification in information;Described first authority information includes corresponding with described application file
Application file bag name, equipment Serial Number, unit type, the term of validity of setting, at least one in functional specification information
The authorization message of classification.
4. method according to claim 3, it is characterised in that described mobile device obtains the first school of application file
Before testing the step of code and the second check code, also include:
Server generates the described second authority information of the corresponding text formatting of legal copy with described application file;
Described second authority information is calculated by described server by hashing algorithm, and authorized check code is described
Check code is authorized to be described second check code;
Described mobile device obtains the first check code of application file and the step of the second check code, comprising:
Described mobile device obtains authority bag, and described authority bag includes the information of described second check code;
Described first authority that described application file itself is carried by described mobile device by described hashing algorithm
Information calculates, and obtains described first check code.
5. method according to claim 4, it is characterised in that
Described second authority information is calculated by described server by hashing algorithm, the step of authorized check code
Afterwards, also include:
Described server generates PKI and private key by rivest, shamir, adelman;
Described server uses described private key to described mandate check code encryption, generates authority signature;
The information of described second check code is described authority signature, and described mobile device obtains the first of application file
Check code and the step of the second check code, also include:
Described mobile device obtains the described PKI being built in described application file;
Described authority signature is decrypted by described mobile device by described PKI, it is thus achieved that described authority checking code, institute
State authority checking code and be described second check code.
6. method according to claim 5, it is characterised in that also include the described second mandate literary composition in described authority bag
Part information, the authorization message of each classification all corresponding one in described second authority information, described first authority information
Individual grant item;
Described mobile device, when described first check code is consistent with described second check code, determines that described application file leads to
Cross checking, comprising:
When described first check code is consistent with described second check code, described mobile device is by described second authority information
In each grant item compare with corresponding grant item in described first authority information respectively, if described second authorize literary composition
In part information, each grant item is mated with corresponding grant item in described first authority information, it is determined that described application journey
Preface part is by checking.
7. the system of an application file checking, it is characterised in that described system includes: mobile device, and described movement sets
Standby include:
Acquisition module, for obtaining the first check code and second check code of application file, wherein, described first check code
Being to obtain according to the first authority information that described application file itself carries, described second check code is according to institute
State what the second authority information that the legal copy of application file carries obtained;
Determining module, for when described first check code is consistent with described second check code, determines described application file
By checking.
8. system according to claim 7, it is characterised in that described first authority information is the first signing messages,
Described second authority information is the second signing messages;
Described system also includes: server, and described server includes:
First computing module, for the described second signature having been arranged by the legal copy to described application file for the hashing algorithm
Information calculates, and obtains described second check code;
Described acquisition module specifically for:
When described application file starts, by network attached server, and then obtain described application from described server
Second check code of program file, or, when described application file starts, obtain and be built in described application file
Described second check code;
Described first signing messages being carried itself described application file by described hashing algorithm is calculated, and obtains
Described first check code.
9. system according to claim 7, it is characterised in that described second authority information includes and described application journey
The legal copy corresponding application file bag name of preface part, equipment Serial Number, unit type, the term of validity of setting, functional specification
The authorization message of at least one classification in information;Described first authority information includes corresponding with described application file
Application file bag name, equipment Serial Number, unit type, the term of validity of setting, at least one in functional specification information
The authorization message of classification.
10. system according to claim 9, it is characterised in that described system also includes: server, described server bag
Include:
First generation module, for generating the described second mandate of the corresponding text formatting of legal copy with described application file
Fileinfo;
Second computing module, for described second authority information being calculated by hashing algorithm, authorized verification
Code, described mandate check code is described second check code;
Described acquisition module specifically for:
Obtaining authority bag, described authority bag includes the information of described second check code;
Calculated by the described first authority information that described application file itself is carried by described hashing algorithm,
Obtain described first check code.
11. systems according to claim 10, it is characterised in that
Described server also includes:
Second generation module, for generating PKI and private key by rivest, shamir, adelman;
3rd generation module, is used for using described private key to described mandate check code encryption, generates authority signature;
The information of described second check code is described authority signature, and described acquisition module is additionally operable to:
Obtain the described PKI being built in described application file;
By described PKI, described authority signature is decrypted, it is thus achieved that described authority checking code, described authority checking code
It is described second check code.
12. systems according to claim 11, it is characterised in that also include in described authority bag that described second authorizes
Fileinfo, in described second authority information, described first authority information, the authorization message of each classification is all corresponding
One grant item;
Described determining module is additionally operable to when described first check code is consistent with described second check code, authorizes literary composition by described second
In part information, each grant item is compared with corresponding grant item in described first authority information respectively, if described second
In authority information, each grant item is mated with corresponding grant item in described first authority information, it is determined that described
Application file is by checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610395335.7A CN106096381A (en) | 2016-06-06 | 2016-06-06 | The method and system of application file checking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610395335.7A CN106096381A (en) | 2016-06-06 | 2016-06-06 | The method and system of application file checking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096381A true CN106096381A (en) | 2016-11-09 |
Family
ID=57447842
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610395335.7A Pending CN106096381A (en) | 2016-06-06 | 2016-06-06 | The method and system of application file checking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106096381A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108008976A (en) * | 2017-12-27 | 2018-05-08 | 上海贝岭股份有限公司 | Software identification generation method, computer-readable recording medium and microcontroller |
CN108092947A (en) * | 2016-11-23 | 2018-05-29 | 腾讯科技(深圳)有限公司 | A kind of method and device that identity discriminating is carried out to third-party application |
CN108268767A (en) * | 2016-12-30 | 2018-07-10 | 北京国双科技有限公司 | Web application authorization method and device |
CN108549826A (en) * | 2018-03-30 | 2018-09-18 | 努比亚技术有限公司 | Method of calibration, terminal, server and the readable storage medium storing program for executing of application program |
CN110289947A (en) * | 2019-04-29 | 2019-09-27 | 北京开态智慧科技有限公司 | Data transmit consistency desired result method, apparatus, computer equipment and storage medium |
CN110348235A (en) * | 2019-07-17 | 2019-10-18 | 政采云有限公司 | A kind of file test method and device |
CN110609789A (en) * | 2019-08-29 | 2019-12-24 | 烽火通信科技股份有限公司 | Method and system for software License verification |
CN110795103A (en) * | 2019-09-27 | 2020-02-14 | 北京五八信息技术有限公司 | Code compiling method and compiler |
CN111767537A (en) * | 2020-06-23 | 2020-10-13 | 平安普惠企业管理有限公司 | Tamper verification method of application program based on IOS (operating system) and related equipment |
CN114676393A (en) * | 2022-05-26 | 2022-06-28 | 杭州微帧信息科技有限公司 | Software off-line authentication method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040147251A1 (en) * | 2002-11-21 | 2004-07-29 | Ntt Docomo, Inc. | Communication terminal, value entity providing server, application delivery server, electronic procurement supporting method, and electronic procurement supporting program |
CN102314578A (en) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | System and method for realizing software protection |
CN104426658A (en) * | 2013-09-02 | 2015-03-18 | 中国移动通信集团公司 | Method and device for performing identity authentication on application on mobile terminal |
-
2016
- 2016-06-06 CN CN201610395335.7A patent/CN106096381A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040147251A1 (en) * | 2002-11-21 | 2004-07-29 | Ntt Docomo, Inc. | Communication terminal, value entity providing server, application delivery server, electronic procurement supporting method, and electronic procurement supporting program |
CN102314578A (en) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | System and method for realizing software protection |
CN104426658A (en) * | 2013-09-02 | 2015-03-18 | 中国移动通信集团公司 | Method and device for performing identity authentication on application on mobile terminal |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108092947A (en) * | 2016-11-23 | 2018-05-29 | 腾讯科技(深圳)有限公司 | A kind of method and device that identity discriminating is carried out to third-party application |
CN108092947B (en) * | 2016-11-23 | 2020-12-04 | 腾讯科技(深圳)有限公司 | Method and device for identity authentication of third-party application |
CN108268767A (en) * | 2016-12-30 | 2018-07-10 | 北京国双科技有限公司 | Web application authorization method and device |
CN108008976A (en) * | 2017-12-27 | 2018-05-08 | 上海贝岭股份有限公司 | Software identification generation method, computer-readable recording medium and microcontroller |
CN108549826A (en) * | 2018-03-30 | 2018-09-18 | 努比亚技术有限公司 | Method of calibration, terminal, server and the readable storage medium storing program for executing of application program |
CN110289947A (en) * | 2019-04-29 | 2019-09-27 | 北京开态智慧科技有限公司 | Data transmit consistency desired result method, apparatus, computer equipment and storage medium |
CN110348235A (en) * | 2019-07-17 | 2019-10-18 | 政采云有限公司 | A kind of file test method and device |
CN110609789A (en) * | 2019-08-29 | 2019-12-24 | 烽火通信科技股份有限公司 | Method and system for software License verification |
CN110795103A (en) * | 2019-09-27 | 2020-02-14 | 北京五八信息技术有限公司 | Code compiling method and compiler |
CN111767537A (en) * | 2020-06-23 | 2020-10-13 | 平安普惠企业管理有限公司 | Tamper verification method of application program based on IOS (operating system) and related equipment |
CN114676393A (en) * | 2022-05-26 | 2022-06-28 | 杭州微帧信息科技有限公司 | Software off-line authentication method |
CN114676393B (en) * | 2022-05-26 | 2022-08-26 | 杭州微帧信息科技有限公司 | Software off-line authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106096381A (en) | The method and system of application file checking | |
CN104134021B (en) | The anti-tamper verification method of software and device | |
CN103167491B (en) | A kind of mobile terminal uniqueness authentication method based on software digital certificate | |
WO2015101336A1 (en) | Signature verification method, apparatus, and system | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
CN106209379A (en) | A kind of Android APK countersignature verification method | |
CN106991298A (en) | Access method, the authorization requests method and device of application program docking port | |
US20140157368A1 (en) | Software authentication | |
CN113709115B (en) | Authentication method and device | |
CN108075888A (en) | Dynamic URL generation methods and device | |
CN113032837A (en) | Anonymous authentication method and system for open platform | |
CN111241492A (en) | Product multi-tenant secure credit granting method, system and electronic equipment | |
CN114826572A (en) | Decentralized crowdsourcing method and system supporting attribute privacy protection and terminal | |
Zhang | A study on application of digital signature technology | |
CN112380501B (en) | Equipment operation method, device, equipment and storage medium | |
KR20140061788A (en) | Security metohd and server using program code guaranteed integrity | |
CN112039675A (en) | Token generation and authentication method based on block chain intelligent contract | |
Sevis et al. | Survey on data integrity in cloud | |
CS Machado et al. | Software control and intellectual property protection in cyber-physical systems | |
CN115550060B (en) | Trusted certificate verification method, device, equipment and medium based on block chain | |
CN104994503B (en) | A kind of mobile application access method | |
CN114125158B (en) | Anti-harassment method, device, equipment and storage medium based on trusted telephone | |
CN114698408B (en) | Multi-receiver secure communications | |
CN110351090B (en) | Group signature digital certificate revoking method and device, storage medium and electronic equipment | |
CN112784249A (en) | Method, system, processor and computer readable storage medium for implementing mobile terminal authentication processing under non-identification condition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |