CN106230777A - A kind of method preventing file to be cracked and terminal - Google Patents
A kind of method preventing file to be cracked and terminal Download PDFInfo
- Publication number
- CN106230777A CN106230777A CN201610556314.9A CN201610556314A CN106230777A CN 106230777 A CN106230777 A CN 106230777A CN 201610556314 A CN201610556314 A CN 201610556314A CN 106230777 A CN106230777 A CN 106230777A
- Authority
- CN
- China
- Prior art keywords
- compressed package
- terminal
- licence
- digital digest
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/603—Digital right managament [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
Abstract
The invention discloses a kind of method preventing file to be cracked and terminal, the method includes: terminal to server sends downloads the request using licence;Receiving the use licence that described server returns according to described request, described use licence includes the device number authorized, containing the compressed package encrypting file;Determine that described compressed package is not modified;Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher described encryption file.Implement technical scheme, it can be ensured that specific file is applied to authorisation device through legal means, ensures legal income.
Description
Technical field
The present invention relates to information security field, particularly relate to a kind of method preventing file to be cracked and terminal.
Background technology
As terminal use, generally require and download some files from server end and use.Such as, if terminal use wants
Change system font, it is necessary to download a font file and use to the machine;Terminal use is if it is intended to change system theme, just
Need to download a theme application file to use to the machine.But, the paying file that current server is issued, is the most just broken
Xie Liao, lacks safety check, thus causes the file that need to pay also can normally use without in the case of paying.
Summary of the invention
The technical problem to be solved in the present invention is, downloads the defect that is easily cracked of file for prior art, it is provided that
A kind of method preventing file to be cracked and terminal, it can be ensured that font file etc. are applied to authorisation device through legal means.
The technical solution adopted for the present invention to solve the technical problems is: construct a kind of method preventing file to be cracked,
Including:
Terminal to server sends downloads the request using licence;
Receiving the use licence that described server returns according to described request, described use licence includes that authorize sets
Standby number, compressed package containing encryption file;
Determine that described compressed package is not modified;
Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then add ciphertext described in deciphering
Part.
Preferably, described use licence also includes the digital digest information of described compressed package;
Described determine that described compressed package is not modified, including:
The digital digest information of the compressed package in the described use licence that calculating receives;
Whether relatively calculate the digital digest information in the described use licence of digital digest information and the reception obtained
Unanimously, if unanimously, it is determined that described compressed package is not modified.
Preferably, described compressed package also includes PKI, and the digital digest information of described compressed package is passed through private key by server
Encryption generates;
Described determine that described compressed package is not modified, specifically include:
Use the digital digest information to the compressed package in the described use licence of reception of the PKI in described compressed package
It is decrypted;
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent, if unanimously, the most really with the digital digest information after deciphering
Fixed described compressed package is not modified.
The present invention also constructs a kind of method preventing file to be cracked, including:
Server receives the request downloading use licence that terminal sends;
According to described request to described terminal send use licence, described use licence include authorize device number,
Compressed package containing encryption file.
Preferably, described transmission to described terminal according to described request uses before licence, and described method also includes:
Determine that described terminal is paying apparatus.
The present invention also constructs a kind of method preventing file to be cracked, including:
Terminal to server sends downloads the request using licence;
Described server returns use licence according to described request to described terminal;
Described terminal receives the described use licence that described server returns, and described use licence includes that authorize sets
Standby number, compressed package containing encryption file;
Described terminal determines that described compressed package is not modified;
The device number of described terminal judges self is the most consistent with the device number of described mandate, the most then add described in deciphering
Ciphertext part.
Preferably, described server returns to described terminal according to described request and uses before licence, including:
Described server determines that described terminal is paying apparatus.
Preferably, described use licence also includes the digital digest information of described compressed package;
Described terminal determines that described compressed package is not modified, including:
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
Described terminal compares the compressed package in the described use licence calculating digital digest information and the reception obtained
Digital digest information is the most consistent, if unanimously, it is determined that described compressed package is not modified.
Preferably, the digital digest information of described compressed package is generated by private key encryption by server;
Described terminal determines that described compressed package is not modified, and specifically includes:
Described terminal uses the numeral of the compressed package in the described use licence to receiving of the PKI in described compressed package
Summary info is decrypted;
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
It is the most consistent with the digital digest information after deciphering that described terminal compares the digital digest information calculating acquisition, if one
Cause, it is determined that described compressed package is not modified.
The present invention also constructs a kind of terminal preventing file to be cracked, including:
Sending module, for sending the request downloading use licence to server;
Receiver module, for receiving the use licence that described server returns according to described request, described use is permitted
Card includes the device number authorized, containing the compressed package encrypting file;
Determine module, be used for determining that described compressed package is not modified;
Judge module, for judging that the device number of described terminal is the most consistent with the device number of described mandate;
Deciphering module, if the device number for described terminal is consistent with the device number of described mandate, then deciphers described encryption
File.
Implement technical scheme, be not only modified and terminal is determining the compressed package comprising encryption file
After authorization terminal, this encryption file could be applied.On the contrary, apply if occurring at least one situation following all to will be unable in terminal
This encryption file: terminal unauthorized, compressed package are modified.Therefore, it can be ensured that encryption file is applied to authorize through legal means
Equipment, ensures legal income.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.In accompanying drawing:
Fig. 1 is the schematic flow sheet of method one embodiment that the present invention prevents file to be cracked;
Fig. 2 is the schematic flow sheet of another embodiment of method that the present invention prevents file to be cracked;
Fig. 3 is the schematic flow sheet of another embodiment of method that the present invention prevents file to be cracked;
Fig. 4 is the structural representation of terminal one embodiment that the present invention prevents file to be cracked.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
Being applied to authorisation device in order to ensure specific file through legal means, the present invention constructs one and prevents file from being broken
The method solved, the method is not only modified and after terminal is authorization terminal determining compressed package, could apply this specific literary composition
Part.On the contrary, if occurring, at least one situation following all will be unable to apply this specific file in terminal: terminal unauthorized, compression
It is coated amendment, therefore can protect rights and interests.
Refer to the schematic flow sheet that Fig. 1, Fig. 1 are method one embodiments that the present invention prevents file to be cracked, this enforcement
The method of example is applied in terminal.Wherein, terminal includes but not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet, pen
Remember this computer, desktop computer, MP3, MP4 etc..The operating system of terminal may include but be not limited to Android operation system, IOS behaviour
Make system, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operating system
Etc..The method preventing file to be cracked of this embodiment includes:
Step S11: terminal to server sends downloads the request using licence.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with a certain paying
During font, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or void
Intend button, to send, to server request, the use licence that this font file is corresponding.
Step S12: receiving the use licence that described server returns according to described request, described use licence includes
The device number authorized, the compressed package containing encryption file.
About this step, it should be noted that, server uses specific key and specific AES to be applied in advance
File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint
Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises
The compressed package of encryption file, compressed package form can be MTTF.Certainly, compressed package also can farther include character feature information
Description file.It addition, user the most also can be to server for authentication, such as successful payment, server will will be deposited
Terminal in pay records is defined as the equipment authorized, and stores its device number.When making that server receives that terminal sent
When asking with the download of licence, can generate for present terminal and use licence, this use license passport includes compressed package, mandate
The relevant information such as device number, then this use licence is sent to terminal.
Step S13: determine that described compressed package is not modified.
In this step, terminal, after receiving use licence, first determines whether to use the compressed package in licence in transmission
During whether by malicious modification, determining after compressed package is not modified, then performing next step.
Step S14: judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher institute
State encryption file.
In this step, determining after compressed package is not modified, determine whether the device number of this terminal whether with make
Consistent with the device number of the mandate in licence, the only device number of the mandate in the device number and use licence of this terminal
Time consistent, just can determine that this encryption file arrives legal terminal through legal means, then, terminal can use the key of agreement
And this encryption file is decrypted by decipherment algorithm, and apply the file after this deciphering.
In a specific embodiment, using licence also to include the digital digest information of described compressed package, this numeral is plucked
Want information by server according to special algorithm, as the data of compressed package are calculated as the ciphertext of a string regular length by hash algorithm.
And, step S13 includes:
Step S131: the digital digest information of the compressed package in the described use licence that calculating receives.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses
The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S132: compare the digital digest in the described use licence calculating digital digest information and the reception obtained
Information is the most consistent, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to terminal is fallen into a trap the Kazakhstan that word summary info used of counting in step S131
The hash algorithm that uncommon algorithm calculates the employing of digital digest information with server is identical, so, when compressed package in transmitting procedure not
When being modified, the digital digest information that both are calculated is inevitable consistent.And when compressed package in transmitting procedure by malicious modification time,
The digital digest information that both are calculated is inevitable inconsistent, therefore the most unanimously can come according to the digital digest information that both calculate
Judge whether compressed package is modified.
In a specific embodiment, further, server, after the digital digest information generating compressed package, also uses
This digital digest information is encrypted by private key.Meanwhile, in the use licence sent to terminal, possibly together with public affairs in compressed package
Key, and this PKI and private key be pair of secret keys pair.And, now, step S13 includes:
Step S133: use the numeral to the compressed package in the described use licence of reception of the PKI in described compressed package
Summary info is decrypted.
In this step, it should be noted that, owing to numeral summary info is added by the PKI in compressed package with server
Close used private key is pair of secret keys pair, therefore, and terminal numeral in using this PKI use licence to being received
Summary info is decrypted, and can obtain the plaintext of digital digest information.
Step S134. calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses
The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
It is the most consistent with the digital digest information after deciphering that step S135. compares the digital digest information calculating acquisition, if
Unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to terminal is fallen into a trap the Kazakhstan that word summary info used of counting in step S134
The hash algorithm that uncommon algorithm calculates the employing of digital digest information with server is identical, so, when compressed package in transmitting procedure not
When being modified, the digital digest information that both are calculated is inevitable consistent.And when compressed package in transmitting procedure by malicious modification time,
The digital digest information that both are calculated is inevitable inconsistent, therefore the most unanimously can come according to the digital digest information that both calculate
Judge whether compressed package is modified.
About above example, it should be noted that, do not limit the precedence relationship of step S133 and step S134, only need to protect
Card the two step is before step S135.In other embodiments, it is possible to first carry out step S134, then perform step
S133。
Referring to the schematic flow sheet that Fig. 2, Fig. 2 are another embodiments of method that the present invention prevents file to be cracked, this is real
The method executing example is applied in server, and wherein, server can be paid for the server of font, it is also possible to be application theme
Server.The method preventing file to be cracked of this embodiment includes:
Step S21: server receives the request downloading use licence that terminal sends.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with paying font
Time, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or virtual press
Key, uses licence to send to server request, and what server just can receive that terminal sent downloads use licence
Request.
Step S22: send use licence to described terminal according to described request, described use licence includes mandate
Device number, containing encryption file compressed package.
In this step, it should be noted that, server uses specific key and specific AES to be applied in advance
File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint
Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises
The compressed package of encryption file, compressed package form MTTF.Certainly, compressed package also can farther include the description of character feature information
File.It addition, user the most also can be to server for authentication, such as successful payment, server will be paid existing
The terminal of record is defined as the equipment authorized, and stores its device number.When server receives the use license that terminal is sent
When the download of card is asked, can generate for present terminal and use licence, this use license passport includes the equipment of compressed package, mandate
Number etc. relevant information, then by this use licence send to terminal.After terminal receives this use licence, only really
Recognize compressed package not to be modified, and when the device number of this terminal is consistent with the device number of mandate, just can be to the encryption in compressed package
File is decrypted.
Between step S21 and step S22, in other words, use licence is being sent according to described request to described terminal
Before, also can farther include:
Step S23: determine that described terminal is paying apparatus.
In this step, server, before sending use licence to terminal, need to first confirm whether this terminal is that paying sets
Standby, it is only paying apparatus in this terminal, i.e. when there is pay records, just can send to this terminal and use licence, so may be used
It is further ensured that the most legal payment terminal could apply this encryption file.
Referring to the schematic flow sheet that Fig. 3, Fig. 3 are another embodiments of method that the present invention prevents file to be cracked, this is real
Executing in the system that the method for example is applied to include server and multiple terminal, wherein, server can be paid for the service of font
Device, it is also possible to be the server of application theme.Terminal include but not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet,
Notebook computer, desktop computer, MP3, MP4 etc..The operating system of terminal may include but be not limited to Android operation system, IOS
Operating system, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operate system
System etc..The method preventing file to be cracked of this embodiment includes:
Step S31: terminal to server sends downloads the request using licence.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with paying font
Time, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or virtual press
Key, uses licence to send to server request.
Step S32: described server returns use licence according to described request to described terminal.
In this step, it should be noted that, server uses specific key and specific AES to be applied in advance
File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint
Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises
The compressed package of encryption file, compressed package form MTTF.Certainly, compressed package also can farther include the description of character feature information
File.It addition, user the most also can be to server for authentication, such as successful payment, server will be paid existing
The terminal of record is defined as the equipment authorized, and stores its device number.When server receives the use license that terminal is sent
When the download of card is asked, can generate for present terminal and use licence, this use license passport includes the equipment of compressed package, mandate
Number etc. relevant information, then by this use licence send to terminal.
Step S33: described terminal receives the described use licence that described server returns, and described use licence includes
The device number authorized, the compressed package containing encryption file.
Step S34: described terminal determines that described compressed package is not modified.
In this step, terminal, after receiving use licence, first determines whether to use the compressed package in licence in transmission
During whether by malicious modification, determining after compressed package is not modified, then performing next step.
Step S35: the device number of described terminal judges self is the most consistent with the device number of described mandate, the most then solve
Close described encryption file.
In this step, determining after compressed package is not modified, determine whether the device number of this terminal whether with make
Consistent with the device number of the mandate in licence, the only device number of the mandate in the device number and use licence of this terminal
Time consistent, just can determine that this encryption file through legal means incoming terminal, then, terminal can use key and the deciphering of agreement
This encryption file is decrypted by algorithm, and applies the file after this deciphering.
Preferably, between step S31 and step S32, the most described server returns to described terminal according to described request
Also can farther include before using licence:
Step S36: described server determines that described terminal is paying apparatus.
In this step, server, before sending use licence to terminal, need to first confirm whether this terminal is that paying sets
Standby, it is only paying apparatus in this terminal, i.e. when there is pay records, just can send to this terminal and use licence, so may be used
It is further ensured that the most legal payment terminal could apply this encryption file.
In a specific embodiment, using licence also to include the digital digest information of described compressed package, this numeral is plucked
Want information that the data of compressed package are calculated as according to specific hash algorithm the ciphertext of a string regular length by server.And, step
Rapid S34 specifically includes:
Step S341: described terminal calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses
The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S342: described terminal compares in the described use licence calculating digital digest information and the reception obtained
The digital digest information of compressed package is the most consistent, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to legal terminal is adopted in the fall into a trap word summary info that counts of step S341
Hash algorithm and server to calculate the hash algorithm that digital digest information uses identical, so, when compressed package is being transmitted across
When not being modified in journey, the digital digest information that both are calculated is inevitable consistent.And when compressed package quilt malice in transmitting procedure
During amendment, the digital digest information that both are calculated is inevitable inconsistent, therefore can be according to the digital digest information that both calculate
No unanimously judge whether compressed package is modified.
In another specific embodiment, further, server, after the digital digest information generating compressed package, also makes
With private key, this digital digest information is encrypted.Meanwhile, in the use licence sent to terminal, in compressed package possibly together with
PKI, and this PKI and private key be pair of secret keys pair.And, now, step S34 specifically includes:
Step S343: described terminal uses the compression in the described use licence to receiving of the PKI in described compressed package
The digital digest information of bag is decrypted.
In this step, it should be noted that, owing to numeral summary info is added by the PKI in compressed package with server
Close used private key is pair of secret keys pair, therefore, and terminal numeral in using this PKI use licence to being received
Summary info is decrypted, and can obtain the plaintext of digital digest information.
Step S344: described terminal calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses
The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S345: whether described terminal compares the digital digest information after calculating the digital digest information obtained and deciphering
Unanimously, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to legal terminal is adopted in the fall into a trap word summary info that counts of step S341
Hash algorithm and server to calculate the hash algorithm that digital digest information uses identical, so, when compressed package is being transmitted across
When not being modified in journey, the digital digest information that both are calculated is inevitable consistent.And when compressed package quilt malice in transmitting procedure
During amendment, the digital digest information that both are calculated is inevitable inconsistent, therefore can be according to the digital digest information that both calculate
No unanimously judge whether compressed package is modified.
About above example, it should be noted that, do not limit the precedence relationship of step S343 and step S344, as long as protecting
Card the two step is before step S345.In other embodiments, it is possible to first carry out step S344, then perform step
S343。
Fig. 4 is the structural representation of terminal one embodiment that the present invention prevents file to be cracked, the terminal bag of this embodiment
Include but be not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet, notebook computer, desktop computer, MP3, MP4 etc..Terminal
Operating system may include but be not limited to Android operation system, IOS, Symbian (Saipan) operating system,
Black Berry (blackberry) operating system, Windows Phone operating system etc..The file that prevents of this embodiment is cracked
Terminal include: sending module 11, receiver module 12, determine module 13, judge module 14 and deciphering module 15.
Sending module 11 downloads the request of use licence to server for sending.
Specifically, when user needs application encryption file, during for example, it is desired to system font is replaced with paying font,
Be accomplished by downloading, from server end, the font file paid, now, user can physical button in triggering terminal or virtual key,
Licence is used to send to server request.
Receiver module 12 is for receiving the use licence that described server returns according to described request, and described use is permitted
Card includes the device number authorized, containing the compressed package encrypting file.
It should be noted that, server uses specific key and specific AES to add file to be applied in advance
Close, the file format after encryption keeps consistent with original.The terminal only authorized could use the secret key decryption appointed, its
His terminal cannot be loaded directly into using.Then this encryption file is compressed by server, produces a pressure comprising encryption file
Contracting bag, compressed package form MTTF.Certainly, compressed package also can farther include the description file of character feature information.It addition, use
Family the most also can be to server for authentication, such as successful payment, and server will be true by the terminal that there is pay records
It is set to the equipment of mandate, and stores its device number.When server receives the download request using licence that terminal is sent
Time, can generate for present terminal and use licence, this use license passport includes the relevant letters such as the device number of compressed package, mandate
Breath, then sends this use licence to terminal.
Determine that module 13 is for determining that described compressed package is not modified.
Specifically, it is determined that module 13 is when determining whether compressed package is modified, the numeral of received compressed package can be passed through
Summary info is the most consistent with the digital digest information of the compressed package that this locality is calculated to be judged, it is possible to by built-in in compressed package
The transmission time the most consistent with the reception time of compressed package judge.
Judge module 14 is for judging that the device number of described terminal is the most consistent with the device number of described mandate.
It should be noted that, if this terminal is legal authorization terminal, then the judged result of its judge module 14 is necessarily one
Cause;If this terminal is illegal terminal, such as, without corresponding pay records, then the judged result of its judge module 14 is necessarily
Inconsistent.
If deciphering module 15 is consistent with the device number of described mandate for the device number of described terminal, then decipher described encryption
File.
It should be noted that, if this terminal is legal authorization terminal, then the use of its deciphering module 15 is good with server commitment
This encryption file of double secret key be decrypted the plaintext that can obtain file, and then this document can be applied on the terminal.If this
Terminal is illegal terminal, then this encryption file decryption just cannot be become in plain text by its deciphering module 15, and then cannot be in this terminal
Upper application this document.
Finally it should be noted that, the step in embodiment of the present invention method can carry out according to actual needs order adjust,
Merge and delete.Module or unit in embodiment of the present invention equipment can merge according to actual needs, divide and delete.
It addition, all or part of step that one of ordinary skill in the art will appreciate that in the various methods of above-described embodiment is to lead to
The program of mistake is carried out the device-dependent hardware of command terminal and is completed, and this program can be stored in a computer-readable recording medium,
Storage medium may include that flash disk, read only memory (Read-Only Memory, ROM), random access device
(RandomAccess Memory, RAM), disk or CD etc..
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any bun made
Change, equivalent, improvement etc., within should be included in scope of the presently claimed invention.
Claims (10)
1. the method preventing file to be cracked, it is characterised in that including:
Terminal to server sends downloads the request using licence;
Receiving the use licence that described server returns according to described request, described use licence includes the equipment authorized
Number, containing encryption file compressed package;
Determine that described compressed package is not modified;
Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher described encryption file.
Method the most according to claim 1, it is characterised in that described use licence also includes the numeral of described compressed package
Summary info;
Described determine that described compressed package is not modified, including:
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent with the digital digest information in the described use licence of reception,
If it is consistent, it is determined that described compressed package is not modified.
Method the most according to claim 2, it is characterised in that described compressed package also includes PKI;The number of described compressed package
Word summary info is generated by private key encryption by server;
Described determine that described compressed package is not modified, specifically include:
The digital digest information using the compressed package in the described use licence to receiving of the PKI in described compressed package is carried out
Deciphering;
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent, if unanimously with the digital digest information after deciphering, it is determined that institute
State compressed package not to be modified.
4. the method preventing file to be cracked, it is characterised in that including:
Server receives the request downloading use licence that terminal sends;
Sending use licence according to described request to described terminal, described use licence includes the device number authorized, contains
The compressed package of encryption file.
Method the most according to claim 4, it is characterised in that described transmission to described terminal according to described request uses perhaps
Before can demonstrate,proving, described method also includes:
Determine that described terminal is paying apparatus.
6. the method preventing file to be cracked, it is characterised in that including:
Terminal to server sends downloads the request using licence;
Described server returns use licence according to described request to described terminal;
Described terminal receives the described use licence that described server returns, and described use licence includes the equipment authorized
Number, containing encryption file compressed package;
Described terminal determines that described compressed package is not modified;
The device number of described terminal judges self is the most consistent with the device number of described mandate, the most then add ciphertext described in deciphering
Part.
Method the most according to claim 6, it is characterised in that described server returns to described terminal according to described request
Before using licence, including:
Described server determines that described terminal is paying apparatus.
Method the most according to claim 6, it is characterised in that described use licence also includes the numeral of described compressed package
Summary info;
Described terminal determines that described compressed package is not modified, including:
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
Described terminal compares the numeral of the compressed package in the described use licence calculating digital digest information and the reception obtained
Summary info is the most consistent, if unanimously, it is determined that described compressed package is not modified.
Method the most according to claim 8, it is characterised in that the digital digest information of described compressed package is passed through by server
Private key encryption generates;
Described terminal determines that described compressed package is not modified, and specifically includes:
Described terminal uses the digital digest of the compressed package in the described use licence to receiving of the PKI in described compressed package
Information is decrypted;
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
It is the most consistent with the digital digest information after deciphering that described terminal compares the digital digest information calculating acquisition, if unanimously,
Then determine that described compressed package is not modified.
10. the terminal preventing file to be cracked, it is characterised in that including:
Sending module, for sending the request downloading use licence to server;
Receiver module, for receiving the use licence that described server returns, described use licence bag according to described request
Include the device number of mandate, the compressed package containing encryption file;
Determine module, be used for determining that described compressed package is not modified;
Judge module, for judging that the device number of described terminal is the most consistent with the device number of described mandate;
Deciphering module, if the device number for described terminal is consistent with the device number of described mandate, then deciphers described encryption file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610556314.9A CN106230777A (en) | 2016-07-12 | 2016-07-12 | A kind of method preventing file to be cracked and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610556314.9A CN106230777A (en) | 2016-07-12 | 2016-07-12 | A kind of method preventing file to be cracked and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106230777A true CN106230777A (en) | 2016-12-14 |
Family
ID=57520012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610556314.9A Withdrawn CN106230777A (en) | 2016-07-12 | 2016-07-12 | A kind of method preventing file to be cracked and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106230777A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110752929A (en) * | 2019-09-29 | 2020-02-04 | 华为终端有限公司 | Application program processing method and related product |
CN112214738A (en) * | 2020-10-20 | 2021-01-12 | 上海星融汽车科技有限公司 | Anti-cracking method of diagnostic equipment |
CN112800004A (en) * | 2019-10-28 | 2021-05-14 | 浙江宇视科技有限公司 | Control method, device, equipment and medium for license plate algorithm library |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1582422A (en) * | 2001-09-04 | 2005-02-16 | 诺基亚有限公司 | Method to protect software against unauthorized use |
CN101203000A (en) * | 2007-05-24 | 2008-06-18 | 深圳市德诺通讯技术有限公司 | Method and system for downloading mobile terminal applied software |
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN102999711A (en) * | 2011-09-19 | 2013-03-27 | 中国电信股份有限公司 | Application copyright protection method, network platform and system |
CN103235906A (en) * | 2013-03-27 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for encrypting and decrypting application program |
CN104298915A (en) * | 2014-10-16 | 2015-01-21 | 厦门美图之家科技有限公司 | Installation package tampering preventing method |
-
2016
- 2016-07-12 CN CN201610556314.9A patent/CN106230777A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1582422A (en) * | 2001-09-04 | 2005-02-16 | 诺基亚有限公司 | Method to protect software against unauthorized use |
CN101203000A (en) * | 2007-05-24 | 2008-06-18 | 深圳市德诺通讯技术有限公司 | Method and system for downloading mobile terminal applied software |
CN101557308A (en) * | 2009-05-06 | 2009-10-14 | 成都市华为赛门铁克科技有限公司 | File upgrading method and terminal device |
CN102999711A (en) * | 2011-09-19 | 2013-03-27 | 中国电信股份有限公司 | Application copyright protection method, network platform and system |
CN103235906A (en) * | 2013-03-27 | 2013-08-07 | 广东欧珀移动通信有限公司 | Method and device for encrypting and decrypting application program |
CN104298915A (en) * | 2014-10-16 | 2015-01-21 | 厦门美图之家科技有限公司 | Installation package tampering preventing method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110752929A (en) * | 2019-09-29 | 2020-02-04 | 华为终端有限公司 | Application program processing method and related product |
CN110752929B (en) * | 2019-09-29 | 2022-04-22 | 华为终端有限公司 | Application program processing method and related product |
CN112800004A (en) * | 2019-10-28 | 2021-05-14 | 浙江宇视科技有限公司 | Control method, device, equipment and medium for license plate algorithm library |
CN112800004B (en) * | 2019-10-28 | 2023-06-16 | 浙江宇视科技有限公司 | License plate algorithm library control method, device, equipment and medium |
CN112214738A (en) * | 2020-10-20 | 2021-01-12 | 上海星融汽车科技有限公司 | Anti-cracking method of diagnostic equipment |
CN112214738B (en) * | 2020-10-20 | 2024-02-13 | 上海星融汽车科技有限公司 | Diagnostic device anti-cracking method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4907880B2 (en) | Portable information terminal and data protection method | |
CN103246842B (en) | For verifying the method and apparatus with data encryption | |
EP1828931B1 (en) | Secure collaborative terminal identity authentication between a wireless communication device and a wireless operator | |
US9026793B2 (en) | Method for installing rights object for content in memory card | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
US20120284534A1 (en) | Memory Device and Method for Accessing the Same | |
CN104966023A (en) | Data protection system, method and apparatus | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN111475845B (en) | Unstructured data identity authorized access system and method | |
CN101394280A (en) | Mobile terminal and data service message protecting method | |
CN106230777A (en) | A kind of method preventing file to be cracked and terminal | |
JP2007249507A (en) | Information leakage prevention method, information leakage prevention system and information terminal | |
CN113378119A (en) | Software authorization method, device, equipment and storage medium | |
CN101622818A (en) | IC tag system | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN112241633B (en) | Bidirectional authentication implementation method and system for non-contact smart card | |
CN110955909B (en) | Personal data protection method and block link point | |
CN110138737B (en) | Authority control method, authority control equipment, user equipment and system | |
CN107967432B (en) | Safe storage device, system and method | |
CN105187419A (en) | Authentication method, device, terminal and system | |
CN108985079B (en) | Data verification method and verification system | |
CN112671782A (en) | File encryption method and terminal | |
US20030046565A1 (en) | Method for encrypting and decrypting contents data distributed through network, and system and user terminal using that method | |
JP7086163B1 (en) | Data processing system | |
WO2019001588A1 (en) | Data processing method and apparatus, terminal, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20161214 |