CN106230777A - A kind of method preventing file to be cracked and terminal - Google Patents

A kind of method preventing file to be cracked and terminal Download PDF

Info

Publication number
CN106230777A
CN106230777A CN201610556314.9A CN201610556314A CN106230777A CN 106230777 A CN106230777 A CN 106230777A CN 201610556314 A CN201610556314 A CN 201610556314A CN 106230777 A CN106230777 A CN 106230777A
Authority
CN
China
Prior art keywords
compressed package
terminal
licence
digital digest
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610556314.9A
Other languages
Chinese (zh)
Inventor
黄文超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201610556314.9A priority Critical patent/CN106230777A/en
Publication of CN106230777A publication Critical patent/CN106230777A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management

Abstract

The invention discloses a kind of method preventing file to be cracked and terminal, the method includes: terminal to server sends downloads the request using licence;Receiving the use licence that described server returns according to described request, described use licence includes the device number authorized, containing the compressed package encrypting file;Determine that described compressed package is not modified;Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher described encryption file.Implement technical scheme, it can be ensured that specific file is applied to authorisation device through legal means, ensures legal income.

Description

A kind of method preventing file to be cracked and terminal
Technical field
The present invention relates to information security field, particularly relate to a kind of method preventing file to be cracked and terminal.
Background technology
As terminal use, generally require and download some files from server end and use.Such as, if terminal use wants Change system font, it is necessary to download a font file and use to the machine;Terminal use is if it is intended to change system theme, just Need to download a theme application file to use to the machine.But, the paying file that current server is issued, is the most just broken Xie Liao, lacks safety check, thus causes the file that need to pay also can normally use without in the case of paying.
Summary of the invention
The technical problem to be solved in the present invention is, downloads the defect that is easily cracked of file for prior art, it is provided that A kind of method preventing file to be cracked and terminal, it can be ensured that font file etc. are applied to authorisation device through legal means.
The technical solution adopted for the present invention to solve the technical problems is: construct a kind of method preventing file to be cracked, Including:
Terminal to server sends downloads the request using licence;
Receiving the use licence that described server returns according to described request, described use licence includes that authorize sets Standby number, compressed package containing encryption file;
Determine that described compressed package is not modified;
Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then add ciphertext described in deciphering Part.
Preferably, described use licence also includes the digital digest information of described compressed package;
Described determine that described compressed package is not modified, including:
The digital digest information of the compressed package in the described use licence that calculating receives;
Whether relatively calculate the digital digest information in the described use licence of digital digest information and the reception obtained Unanimously, if unanimously, it is determined that described compressed package is not modified.
Preferably, described compressed package also includes PKI, and the digital digest information of described compressed package is passed through private key by server Encryption generates;
Described determine that described compressed package is not modified, specifically include:
Use the digital digest information to the compressed package in the described use licence of reception of the PKI in described compressed package It is decrypted;
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent, if unanimously, the most really with the digital digest information after deciphering Fixed described compressed package is not modified.
The present invention also constructs a kind of method preventing file to be cracked, including:
Server receives the request downloading use licence that terminal sends;
According to described request to described terminal send use licence, described use licence include authorize device number, Compressed package containing encryption file.
Preferably, described transmission to described terminal according to described request uses before licence, and described method also includes:
Determine that described terminal is paying apparatus.
The present invention also constructs a kind of method preventing file to be cracked, including:
Terminal to server sends downloads the request using licence;
Described server returns use licence according to described request to described terminal;
Described terminal receives the described use licence that described server returns, and described use licence includes that authorize sets Standby number, compressed package containing encryption file;
Described terminal determines that described compressed package is not modified;
The device number of described terminal judges self is the most consistent with the device number of described mandate, the most then add described in deciphering Ciphertext part.
Preferably, described server returns to described terminal according to described request and uses before licence, including:
Described server determines that described terminal is paying apparatus.
Preferably, described use licence also includes the digital digest information of described compressed package;
Described terminal determines that described compressed package is not modified, including:
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
Described terminal compares the compressed package in the described use licence calculating digital digest information and the reception obtained Digital digest information is the most consistent, if unanimously, it is determined that described compressed package is not modified.
Preferably, the digital digest information of described compressed package is generated by private key encryption by server;
Described terminal determines that described compressed package is not modified, and specifically includes:
Described terminal uses the numeral of the compressed package in the described use licence to receiving of the PKI in described compressed package Summary info is decrypted;
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
It is the most consistent with the digital digest information after deciphering that described terminal compares the digital digest information calculating acquisition, if one Cause, it is determined that described compressed package is not modified.
The present invention also constructs a kind of terminal preventing file to be cracked, including:
Sending module, for sending the request downloading use licence to server;
Receiver module, for receiving the use licence that described server returns according to described request, described use is permitted Card includes the device number authorized, containing the compressed package encrypting file;
Determine module, be used for determining that described compressed package is not modified;
Judge module, for judging that the device number of described terminal is the most consistent with the device number of described mandate;
Deciphering module, if the device number for described terminal is consistent with the device number of described mandate, then deciphers described encryption File.
Implement technical scheme, be not only modified and terminal is determining the compressed package comprising encryption file After authorization terminal, this encryption file could be applied.On the contrary, apply if occurring at least one situation following all to will be unable in terminal This encryption file: terminal unauthorized, compressed package are modified.Therefore, it can be ensured that encryption file is applied to authorize through legal means Equipment, ensures legal income.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.In accompanying drawing:
Fig. 1 is the schematic flow sheet of method one embodiment that the present invention prevents file to be cracked;
Fig. 2 is the schematic flow sheet of another embodiment of method that the present invention prevents file to be cracked;
Fig. 3 is the schematic flow sheet of another embodiment of method that the present invention prevents file to be cracked;
Fig. 4 is the structural representation of terminal one embodiment that the present invention prevents file to be cracked.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Being applied to authorisation device in order to ensure specific file through legal means, the present invention constructs one and prevents file from being broken The method solved, the method is not only modified and after terminal is authorization terminal determining compressed package, could apply this specific literary composition Part.On the contrary, if occurring, at least one situation following all will be unable to apply this specific file in terminal: terminal unauthorized, compression It is coated amendment, therefore can protect rights and interests.
Refer to the schematic flow sheet that Fig. 1, Fig. 1 are method one embodiments that the present invention prevents file to be cracked, this enforcement The method of example is applied in terminal.Wherein, terminal includes but not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet, pen Remember this computer, desktop computer, MP3, MP4 etc..The operating system of terminal may include but be not limited to Android operation system, IOS behaviour Make system, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operating system Etc..The method preventing file to be cracked of this embodiment includes:
Step S11: terminal to server sends downloads the request using licence.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with a certain paying During font, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or void Intend button, to send, to server request, the use licence that this font file is corresponding.
Step S12: receiving the use licence that described server returns according to described request, described use licence includes The device number authorized, the compressed package containing encryption file.
About this step, it should be noted that, server uses specific key and specific AES to be applied in advance File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises The compressed package of encryption file, compressed package form can be MTTF.Certainly, compressed package also can farther include character feature information Description file.It addition, user the most also can be to server for authentication, such as successful payment, server will will be deposited Terminal in pay records is defined as the equipment authorized, and stores its device number.When making that server receives that terminal sent When asking with the download of licence, can generate for present terminal and use licence, this use license passport includes compressed package, mandate The relevant information such as device number, then this use licence is sent to terminal.
Step S13: determine that described compressed package is not modified.
In this step, terminal, after receiving use licence, first determines whether to use the compressed package in licence in transmission During whether by malicious modification, determining after compressed package is not modified, then performing next step.
Step S14: judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher institute State encryption file.
In this step, determining after compressed package is not modified, determine whether the device number of this terminal whether with make Consistent with the device number of the mandate in licence, the only device number of the mandate in the device number and use licence of this terminal Time consistent, just can determine that this encryption file arrives legal terminal through legal means, then, terminal can use the key of agreement And this encryption file is decrypted by decipherment algorithm, and apply the file after this deciphering.
In a specific embodiment, using licence also to include the digital digest information of described compressed package, this numeral is plucked Want information by server according to special algorithm, as the data of compressed package are calculated as the ciphertext of a string regular length by hash algorithm. And, step S13 includes:
Step S131: the digital digest information of the compressed package in the described use licence that calculating receives.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S132: compare the digital digest in the described use licence calculating digital digest information and the reception obtained Information is the most consistent, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to terminal is fallen into a trap the Kazakhstan that word summary info used of counting in step S131 The hash algorithm that uncommon algorithm calculates the employing of digital digest information with server is identical, so, when compressed package in transmitting procedure not When being modified, the digital digest information that both are calculated is inevitable consistent.And when compressed package in transmitting procedure by malicious modification time, The digital digest information that both are calculated is inevitable inconsistent, therefore the most unanimously can come according to the digital digest information that both calculate Judge whether compressed package is modified.
In a specific embodiment, further, server, after the digital digest information generating compressed package, also uses This digital digest information is encrypted by private key.Meanwhile, in the use licence sent to terminal, possibly together with public affairs in compressed package Key, and this PKI and private key be pair of secret keys pair.And, now, step S13 includes:
Step S133: use the numeral to the compressed package in the described use licence of reception of the PKI in described compressed package Summary info is decrypted.
In this step, it should be noted that, owing to numeral summary info is added by the PKI in compressed package with server Close used private key is pair of secret keys pair, therefore, and terminal numeral in using this PKI use licence to being received Summary info is decrypted, and can obtain the plaintext of digital digest information.
Step S134. calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
It is the most consistent with the digital digest information after deciphering that step S135. compares the digital digest information calculating acquisition, if Unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to terminal is fallen into a trap the Kazakhstan that word summary info used of counting in step S134 The hash algorithm that uncommon algorithm calculates the employing of digital digest information with server is identical, so, when compressed package in transmitting procedure not When being modified, the digital digest information that both are calculated is inevitable consistent.And when compressed package in transmitting procedure by malicious modification time, The digital digest information that both are calculated is inevitable inconsistent, therefore the most unanimously can come according to the digital digest information that both calculate Judge whether compressed package is modified.
About above example, it should be noted that, do not limit the precedence relationship of step S133 and step S134, only need to protect Card the two step is before step S135.In other embodiments, it is possible to first carry out step S134, then perform step S133。
Referring to the schematic flow sheet that Fig. 2, Fig. 2 are another embodiments of method that the present invention prevents file to be cracked, this is real The method executing example is applied in server, and wherein, server can be paid for the server of font, it is also possible to be application theme Server.The method preventing file to be cracked of this embodiment includes:
Step S21: server receives the request downloading use licence that terminal sends.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with paying font Time, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or virtual press Key, uses licence to send to server request, and what server just can receive that terminal sent downloads use licence Request.
Step S22: send use licence to described terminal according to described request, described use licence includes mandate Device number, containing encryption file compressed package.
In this step, it should be noted that, server uses specific key and specific AES to be applied in advance File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises The compressed package of encryption file, compressed package form MTTF.Certainly, compressed package also can farther include the description of character feature information File.It addition, user the most also can be to server for authentication, such as successful payment, server will be paid existing The terminal of record is defined as the equipment authorized, and stores its device number.When server receives the use license that terminal is sent When the download of card is asked, can generate for present terminal and use licence, this use license passport includes the equipment of compressed package, mandate Number etc. relevant information, then by this use licence send to terminal.After terminal receives this use licence, only really Recognize compressed package not to be modified, and when the device number of this terminal is consistent with the device number of mandate, just can be to the encryption in compressed package File is decrypted.
Between step S21 and step S22, in other words, use licence is being sent according to described request to described terminal Before, also can farther include:
Step S23: determine that described terminal is paying apparatus.
In this step, server, before sending use licence to terminal, need to first confirm whether this terminal is that paying sets Standby, it is only paying apparatus in this terminal, i.e. when there is pay records, just can send to this terminal and use licence, so may be used It is further ensured that the most legal payment terminal could apply this encryption file.
Referring to the schematic flow sheet that Fig. 3, Fig. 3 are another embodiments of method that the present invention prevents file to be cracked, this is real Executing in the system that the method for example is applied to include server and multiple terminal, wherein, server can be paid for the service of font Device, it is also possible to be the server of application theme.Terminal include but not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet, Notebook computer, desktop computer, MP3, MP4 etc..The operating system of terminal may include but be not limited to Android operation system, IOS Operating system, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operate system System etc..The method preventing file to be cracked of this embodiment includes:
Step S31: terminal to server sends downloads the request using licence.
In this step, when user needs application encryption file, for example, it is desired to system font to be replaced with paying font Time, it is necessary to download the font file paid from server end, now, user can physical button in triggering terminal or virtual press Key, uses licence to send to server request.
Step S32: described server returns use licence according to described request to described terminal.
In this step, it should be noted that, server uses specific key and specific AES to be applied in advance File be encrypted, the file format after encryption and original keep consistent.The terminal only authorized could use and appoint Secret key decryption, other-end cannot be loaded directly into use.Then this encryption file is compressed by server, produces one and comprises The compressed package of encryption file, compressed package form MTTF.Certainly, compressed package also can farther include the description of character feature information File.It addition, user the most also can be to server for authentication, such as successful payment, server will be paid existing The terminal of record is defined as the equipment authorized, and stores its device number.When server receives the use license that terminal is sent When the download of card is asked, can generate for present terminal and use licence, this use license passport includes the equipment of compressed package, mandate Number etc. relevant information, then by this use licence send to terminal.
Step S33: described terminal receives the described use licence that described server returns, and described use licence includes The device number authorized, the compressed package containing encryption file.
Step S34: described terminal determines that described compressed package is not modified.
In this step, terminal, after receiving use licence, first determines whether to use the compressed package in licence in transmission During whether by malicious modification, determining after compressed package is not modified, then performing next step.
Step S35: the device number of described terminal judges self is the most consistent with the device number of described mandate, the most then solve Close described encryption file.
In this step, determining after compressed package is not modified, determine whether the device number of this terminal whether with make Consistent with the device number of the mandate in licence, the only device number of the mandate in the device number and use licence of this terminal Time consistent, just can determine that this encryption file through legal means incoming terminal, then, terminal can use key and the deciphering of agreement This encryption file is decrypted by algorithm, and applies the file after this deciphering.
Preferably, between step S31 and step S32, the most described server returns to described terminal according to described request Also can farther include before using licence:
Step S36: described server determines that described terminal is paying apparatus.
In this step, server, before sending use licence to terminal, need to first confirm whether this terminal is that paying sets Standby, it is only paying apparatus in this terminal, i.e. when there is pay records, just can send to this terminal and use licence, so may be used It is further ensured that the most legal payment terminal could apply this encryption file.
In a specific embodiment, using licence also to include the digital digest information of described compressed package, this numeral is plucked Want information that the data of compressed package are calculated as according to specific hash algorithm the ciphertext of a string regular length by server.And, step Rapid S34 specifically includes:
Step S341: described terminal calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S342: described terminal compares in the described use licence calculating digital digest information and the reception obtained The digital digest information of compressed package is the most consistent, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to legal terminal is adopted in the fall into a trap word summary info that counts of step S341 Hash algorithm and server to calculate the hash algorithm that digital digest information uses identical, so, when compressed package is being transmitted across When not being modified in journey, the digital digest information that both are calculated is inevitable consistent.And when compressed package quilt malice in transmitting procedure During amendment, the digital digest information that both are calculated is inevitable inconsistent, therefore can be according to the digital digest information that both calculate No unanimously judge whether compressed package is modified.
In another specific embodiment, further, server, after the digital digest information generating compressed package, also makes With private key, this digital digest information is encrypted.Meanwhile, in the use licence sent to terminal, in compressed package possibly together with PKI, and this PKI and private key be pair of secret keys pair.And, now, step S34 specifically includes:
Step S343: described terminal uses the compression in the described use licence to receiving of the PKI in described compressed package The digital digest information of bag is decrypted.
In this step, it should be noted that, owing to numeral summary info is added by the PKI in compressed package with server Close used private key is pair of secret keys pair, therefore, and terminal numeral in using this PKI use licence to being received Summary info is decrypted, and can obtain the plaintext of digital digest information.
Step S344: described terminal calculates the digital digest information of the compressed package in the described use licence received.
In this step, terminal, after receiving use licence, first extracts the information of compressed package therein, and uses The hash algorithm good with server commitment calculates the digital digest information of this compressed package.
Step S345: whether described terminal compares the digital digest information after calculating the digital digest information obtained and deciphering Unanimously, if unanimously, it is determined that described compressed package is not modified.
In this step, it should be noted that, owing to legal terminal is adopted in the fall into a trap word summary info that counts of step S341 Hash algorithm and server to calculate the hash algorithm that digital digest information uses identical, so, when compressed package is being transmitted across When not being modified in journey, the digital digest information that both are calculated is inevitable consistent.And when compressed package quilt malice in transmitting procedure During amendment, the digital digest information that both are calculated is inevitable inconsistent, therefore can be according to the digital digest information that both calculate No unanimously judge whether compressed package is modified.
About above example, it should be noted that, do not limit the precedence relationship of step S343 and step S344, as long as protecting Card the two step is before step S345.In other embodiments, it is possible to first carry out step S344, then perform step S343。
Fig. 4 is the structural representation of terminal one embodiment that the present invention prevents file to be cracked, the terminal bag of this embodiment Include but be not limited to mobile phone, panel computer, intelligent watch, Intelligent bracelet, notebook computer, desktop computer, MP3, MP4 etc..Terminal Operating system may include but be not limited to Android operation system, IOS, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone operating system etc..The file that prevents of this embodiment is cracked Terminal include: sending module 11, receiver module 12, determine module 13, judge module 14 and deciphering module 15.
Sending module 11 downloads the request of use licence to server for sending.
Specifically, when user needs application encryption file, during for example, it is desired to system font is replaced with paying font, Be accomplished by downloading, from server end, the font file paid, now, user can physical button in triggering terminal or virtual key, Licence is used to send to server request.
Receiver module 12 is for receiving the use licence that described server returns according to described request, and described use is permitted Card includes the device number authorized, containing the compressed package encrypting file.
It should be noted that, server uses specific key and specific AES to add file to be applied in advance Close, the file format after encryption keeps consistent with original.The terminal only authorized could use the secret key decryption appointed, its His terminal cannot be loaded directly into using.Then this encryption file is compressed by server, produces a pressure comprising encryption file Contracting bag, compressed package form MTTF.Certainly, compressed package also can farther include the description file of character feature information.It addition, use Family the most also can be to server for authentication, such as successful payment, and server will be true by the terminal that there is pay records It is set to the equipment of mandate, and stores its device number.When server receives the download request using licence that terminal is sent Time, can generate for present terminal and use licence, this use license passport includes the relevant letters such as the device number of compressed package, mandate Breath, then sends this use licence to terminal.
Determine that module 13 is for determining that described compressed package is not modified.
Specifically, it is determined that module 13 is when determining whether compressed package is modified, the numeral of received compressed package can be passed through Summary info is the most consistent with the digital digest information of the compressed package that this locality is calculated to be judged, it is possible to by built-in in compressed package The transmission time the most consistent with the reception time of compressed package judge.
Judge module 14 is for judging that the device number of described terminal is the most consistent with the device number of described mandate.
It should be noted that, if this terminal is legal authorization terminal, then the judged result of its judge module 14 is necessarily one Cause;If this terminal is illegal terminal, such as, without corresponding pay records, then the judged result of its judge module 14 is necessarily Inconsistent.
If deciphering module 15 is consistent with the device number of described mandate for the device number of described terminal, then decipher described encryption File.
It should be noted that, if this terminal is legal authorization terminal, then the use of its deciphering module 15 is good with server commitment This encryption file of double secret key be decrypted the plaintext that can obtain file, and then this document can be applied on the terminal.If this Terminal is illegal terminal, then this encryption file decryption just cannot be become in plain text by its deciphering module 15, and then cannot be in this terminal Upper application this document.
Finally it should be noted that, the step in embodiment of the present invention method can carry out according to actual needs order adjust, Merge and delete.Module or unit in embodiment of the present invention equipment can merge according to actual needs, divide and delete. It addition, all or part of step that one of ordinary skill in the art will appreciate that in the various methods of above-described embodiment is to lead to The program of mistake is carried out the device-dependent hardware of command terminal and is completed, and this program can be stored in a computer-readable recording medium, Storage medium may include that flash disk, read only memory (Read-Only Memory, ROM), random access device (RandomAccess Memory, RAM), disk or CD etc..
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any bun made Change, equivalent, improvement etc., within should be included in scope of the presently claimed invention.

Claims (10)

1. the method preventing file to be cracked, it is characterised in that including:
Terminal to server sends downloads the request using licence;
Receiving the use licence that described server returns according to described request, described use licence includes the equipment authorized Number, containing encryption file compressed package;
Determine that described compressed package is not modified;
Judge that the device number of described terminal is the most consistent with the device number of described mandate, the most then decipher described encryption file.
Method the most according to claim 1, it is characterised in that described use licence also includes the numeral of described compressed package Summary info;
Described determine that described compressed package is not modified, including:
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent with the digital digest information in the described use licence of reception, If it is consistent, it is determined that described compressed package is not modified.
Method the most according to claim 2, it is characterised in that described compressed package also includes PKI;The number of described compressed package Word summary info is generated by private key encryption by server;
Described determine that described compressed package is not modified, specifically include:
The digital digest information using the compressed package in the described use licence to receiving of the PKI in described compressed package is carried out Deciphering;
The digital digest information of the compressed package in the described use licence that calculating receives;
Relatively calculate the digital digest information obtained the most consistent, if unanimously with the digital digest information after deciphering, it is determined that institute State compressed package not to be modified.
4. the method preventing file to be cracked, it is characterised in that including:
Server receives the request downloading use licence that terminal sends;
Sending use licence according to described request to described terminal, described use licence includes the device number authorized, contains The compressed package of encryption file.
Method the most according to claim 4, it is characterised in that described transmission to described terminal according to described request uses perhaps Before can demonstrate,proving, described method also includes:
Determine that described terminal is paying apparatus.
6. the method preventing file to be cracked, it is characterised in that including:
Terminal to server sends downloads the request using licence;
Described server returns use licence according to described request to described terminal;
Described terminal receives the described use licence that described server returns, and described use licence includes the equipment authorized Number, containing encryption file compressed package;
Described terminal determines that described compressed package is not modified;
The device number of described terminal judges self is the most consistent with the device number of described mandate, the most then add ciphertext described in deciphering Part.
Method the most according to claim 6, it is characterised in that described server returns to described terminal according to described request Before using licence, including:
Described server determines that described terminal is paying apparatus.
Method the most according to claim 6, it is characterised in that described use licence also includes the numeral of described compressed package Summary info;
Described terminal determines that described compressed package is not modified, including:
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
Described terminal compares the numeral of the compressed package in the described use licence calculating digital digest information and the reception obtained Summary info is the most consistent, if unanimously, it is determined that described compressed package is not modified.
Method the most according to claim 8, it is characterised in that the digital digest information of described compressed package is passed through by server Private key encryption generates;
Described terminal determines that described compressed package is not modified, and specifically includes:
Described terminal uses the digital digest of the compressed package in the described use licence to receiving of the PKI in described compressed package Information is decrypted;
Described terminal calculates the digital digest information of the compressed package in the described use licence received;
It is the most consistent with the digital digest information after deciphering that described terminal compares the digital digest information calculating acquisition, if unanimously, Then determine that described compressed package is not modified.
10. the terminal preventing file to be cracked, it is characterised in that including:
Sending module, for sending the request downloading use licence to server;
Receiver module, for receiving the use licence that described server returns, described use licence bag according to described request Include the device number of mandate, the compressed package containing encryption file;
Determine module, be used for determining that described compressed package is not modified;
Judge module, for judging that the device number of described terminal is the most consistent with the device number of described mandate;
Deciphering module, if the device number for described terminal is consistent with the device number of described mandate, then deciphers described encryption file.
CN201610556314.9A 2016-07-12 2016-07-12 A kind of method preventing file to be cracked and terminal Withdrawn CN106230777A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610556314.9A CN106230777A (en) 2016-07-12 2016-07-12 A kind of method preventing file to be cracked and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610556314.9A CN106230777A (en) 2016-07-12 2016-07-12 A kind of method preventing file to be cracked and terminal

Publications (1)

Publication Number Publication Date
CN106230777A true CN106230777A (en) 2016-12-14

Family

ID=57520012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610556314.9A Withdrawn CN106230777A (en) 2016-07-12 2016-07-12 A kind of method preventing file to be cracked and terminal

Country Status (1)

Country Link
CN (1) CN106230777A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
CN112214738A (en) * 2020-10-20 2021-01-12 上海星融汽车科技有限公司 Anti-cracking method of diagnostic equipment
CN112800004A (en) * 2019-10-28 2021-05-14 浙江宇视科技有限公司 Control method, device, equipment and medium for license plate algorithm library

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1582422A (en) * 2001-09-04 2005-02-16 诺基亚有限公司 Method to protect software against unauthorized use
CN101203000A (en) * 2007-05-24 2008-06-18 深圳市德诺通讯技术有限公司 Method and system for downloading mobile terminal applied software
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102999711A (en) * 2011-09-19 2013-03-27 中国电信股份有限公司 Application copyright protection method, network platform and system
CN103235906A (en) * 2013-03-27 2013-08-07 广东欧珀移动通信有限公司 Method and device for encrypting and decrypting application program
CN104298915A (en) * 2014-10-16 2015-01-21 厦门美图之家科技有限公司 Installation package tampering preventing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1582422A (en) * 2001-09-04 2005-02-16 诺基亚有限公司 Method to protect software against unauthorized use
CN101203000A (en) * 2007-05-24 2008-06-18 深圳市德诺通讯技术有限公司 Method and system for downloading mobile terminal applied software
CN101557308A (en) * 2009-05-06 2009-10-14 成都市华为赛门铁克科技有限公司 File upgrading method and terminal device
CN102999711A (en) * 2011-09-19 2013-03-27 中国电信股份有限公司 Application copyright protection method, network platform and system
CN103235906A (en) * 2013-03-27 2013-08-07 广东欧珀移动通信有限公司 Method and device for encrypting and decrypting application program
CN104298915A (en) * 2014-10-16 2015-01-21 厦门美图之家科技有限公司 Installation package tampering preventing method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110752929A (en) * 2019-09-29 2020-02-04 华为终端有限公司 Application program processing method and related product
CN110752929B (en) * 2019-09-29 2022-04-22 华为终端有限公司 Application program processing method and related product
CN112800004A (en) * 2019-10-28 2021-05-14 浙江宇视科技有限公司 Control method, device, equipment and medium for license plate algorithm library
CN112800004B (en) * 2019-10-28 2023-06-16 浙江宇视科技有限公司 License plate algorithm library control method, device, equipment and medium
CN112214738A (en) * 2020-10-20 2021-01-12 上海星融汽车科技有限公司 Anti-cracking method of diagnostic equipment
CN112214738B (en) * 2020-10-20 2024-02-13 上海星融汽车科技有限公司 Diagnostic device anti-cracking method

Similar Documents

Publication Publication Date Title
JP4907880B2 (en) Portable information terminal and data protection method
CN103246842B (en) For verifying the method and apparatus with data encryption
EP1828931B1 (en) Secure collaborative terminal identity authentication between a wireless communication device and a wireless operator
US9026793B2 (en) Method for installing rights object for content in memory card
CN110690956B (en) Bidirectional authentication method and system, server and terminal
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN104966023A (en) Data protection system, method and apparatus
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN111475845B (en) Unstructured data identity authorized access system and method
CN101394280A (en) Mobile terminal and data service message protecting method
CN106230777A (en) A kind of method preventing file to be cracked and terminal
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
CN113378119A (en) Software authorization method, device, equipment and storage medium
CN101622818A (en) IC tag system
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN112241633B (en) Bidirectional authentication implementation method and system for non-contact smart card
CN110955909B (en) Personal data protection method and block link point
CN110138737B (en) Authority control method, authority control equipment, user equipment and system
CN107967432B (en) Safe storage device, system and method
CN105187419A (en) Authentication method, device, terminal and system
CN108985079B (en) Data verification method and verification system
CN112671782A (en) File encryption method and terminal
US20030046565A1 (en) Method for encrypting and decrypting contents data distributed through network, and system and user terminal using that method
JP7086163B1 (en) Data processing system
WO2019001588A1 (en) Data processing method and apparatus, terminal, and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20161214