CN106250194A - Program file installation method and device - Google Patents

Program file installation method and device Download PDF

Info

Publication number
CN106250194A
CN106250194A CN201610645809.9A CN201610645809A CN106250194A CN 106250194 A CN106250194 A CN 106250194A CN 201610645809 A CN201610645809 A CN 201610645809A CN 106250194 A CN106250194 A CN 106250194A
Authority
CN
China
Prior art keywords
file
password
program
program file
file data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610645809.9A
Other languages
Chinese (zh)
Other versions
CN106250194B (en
Inventor
刘荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201610645809.9A priority Critical patent/CN106250194B/en
Publication of CN106250194A publication Critical patent/CN106250194A/en
Application granted granted Critical
Publication of CN106250194B publication Critical patent/CN106250194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a program file installation method and device. The program file installation method comprises the following steps: acquiring a program file to be installed, reading file data located at a specified position in the program file, and acquiring first file data; performing a first encryption operation on the first file data to obtain a first ciphertext; comparing a file tag of the program file, which is positioned outside the program file, with the first ciphertext, if the file tag of the program file is the same as the first ciphertext, determining that the program file is a legal installation file, installing the program file, and if the file tag of the program file is not the same as the first ciphertext, not installing the program file; the file label of the legal installation file is generated by performing the first encryption operation on second file data; and the second file data is obtained by reading the file data located at the specified position in the legal installation file. By adopting the embodiment of the invention, the integrity of the program file can be ensured, and the efficiency of the program file installation process can be improved.

Description

Program file installation method and device
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of program file installation method and device.
Background technology
In most computer system, to prevent illegal application program from installing, on the one hand, prevent from being tampered Application program is installed, and on the other hand, will prevent the application program being fitted without authority from installing, such as, at the panel computer of student In, only can allow some specific application program is installed.The existing technical scheme preventing unauthorized applications from installing is mainly Password is installed by using or uses digital signature to realize.
In using the technical scheme installing password, each application program has unique corresponding illegally pacifies for preventing The installation password of dress, the most when installing the application, is required for manager and is manually entered corresponding password of installing and verifies, when This application program just can be installed when being verified.In this technical scheme, during due to set up applications each time, it is required for pipe Reason person is manually entered installation password in person, to install same application program in 1000 computers, then needs manager Repeating to be manually entered 1000 times and install password, therefore the workload of installation process is big, inefficiency,
In the technical scheme using digital signature, before release application program, according to content and the private of application program Key generates corresponding ciphertext, and this ciphertext is deposited in application program;When set up applications, first by application program Ciphertext extracts, and re-uses corresponding PKI and is decrypted this ciphertext, if successful decryption, then installs this application program, if Unsuccessful, do not install.In this technical scheme, after generating corresponding ciphertext due to the content according to application program and private key, Can deposit in application program by this ciphertext, therefore this process can destroy original application file data, and easily causing should Make mistakes with program file;In installation process, need first the ciphertext in application program to be extracted, then be decrypted, therefore The process very complicated installed, the inefficiency of installation.
Summary of the invention
The present invention proposes a kind of program file installation method and device, it is possible to ensure the integrity of program file, and can Improve the efficiency of program file installation process.
The present invention proposes a kind of program file installation method, specifically includes:
Obtain program file to be installed, and read the file data being positioned at appointment position in described program file, obtain Obtain the first file data;
Described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
Contrast the file label and described of the outside of the file data being positioned at described program file of described program file One ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if differing, then Described program file is not installed;Wherein, the file label of described legal installation file is described by carrying out the second file data First cryptographic calculation generates;Described second file data is positioned at described appointment position by reading in described legal installation file File data obtain.
Further, at the program file that described acquisition is to be installed, and read described program file is positioned at specific bit The file data put, it is thus achieved that after the first file data, described carries out the first cryptographic calculation to described first file data, it is thus achieved that Before first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password Generate;Described second Crypted password is identical with described first password.
Further, at the program file that described acquisition is to be installed, and read described program file is positioned at specific bit The file data put, it is thus achieved that after the first file data, described carries out the first cryptographic calculation to described first file data, it is thus achieved that Before first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file A part in Ming.
Correspondingly, present invention also offers a kind of program file erecting device, specifically include:
First file data acquisition module, for obtaining program file to be installed, and reads in described program file It is positioned at the file data specifying position, it is thus achieved that the first file data;
First ciphertext acquisition module, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that the first ciphertext; And,
Module is installed, for contrasting the file of the outside of the file data being positioned at described program file of described program file Label and described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program literary composition Part, if differing, does not the most install described program file;Wherein, the file label of described legal installation file is by the second literary composition Number of packages generates according to carrying out described first cryptographic calculation;Described second file data is by reading the position in described legal installation file File data in described appointment position obtains.
Further, first password adds module, adds to described first file for the first password that will pre-set In data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password Generate;Described second Crypted password is identical with described first password.
Further, the first Crypted password obtains module, for the first password pre-set carries out the second encryption fortune Calculate, it is thus achieved that the first Crypted password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file A part in Ming.
Implement the present invention, have the advantages that
Program file installation method that the embodiment of the present invention provides and device, due to during installation procedure file, Have only to reading part or total data from program file and can carry out the checking of program file legitimacy, without right The content of program file carries out splitting parsing, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program literary composition The integrity of part, reduces the error rate that program file is installed, and can improve what the legitimacy to program file was verified The efficiency of process, and then improve the efficiency of program file installation process.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of an embodiment of the program file installation method that the present invention provides;
Fig. 2 is the structural representation of an embodiment of the program file erecting device that the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
See Fig. 1, be the schematic flow sheet of an embodiment of the program file installation method that the present invention provides, including step Rapid S11 to S13, specific as follows:
S11: obtain program file to be installed, and read the number of files being positioned at appointment position in described program file According to, it is thus achieved that the first file data;
S12: described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
S13: contrast file label and the institute of the outside of the file data being positioned at described program file of described program file State the first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if not phase With, described program file is not the most installed;Wherein, the file label of described legal installation file is by carrying out the second file data Described first cryptographic calculation generates;Described second file data is positioned at described appointment by reading in described legal installation file The file data of position obtains.
It should be noted that the program file installation method that the embodiment of the present invention is provided is by client executing.Program literary composition Part is pre-stored within server end or other storage mediums (such as SD card, USB flash disk or CD etc.).Client is installing certain During program file, first, from the server end storing this program file or other storage mediums, this program file is obtained, and Part or all files data are read from this program file;Subsequently, this some or all of file data is encrypted Computing, thus obtain a ciphertext;Finally, the ciphertext obtained by contrast and the file label of this program file carry out school Test, if the ciphertext obtained is identical with the file label of this program file, then illustrate that this program file is not tampered with and has Installing authority, verification is passed through, and determines that this program file is legal installation file, and client installs this program file, if being obtained The file label of ciphertext and program file differ, then illustrate that this program file has been tampered or has been fitted without authority, school Test failure, determine this program file for illegally to install file, client does not install this program file.SD card or USB flash disk or light Program file in the storage mediums such as dish obtains by downloading from server end.Server end is used for issuing and store program literary composition Part.It is sent to before server end issues at legal installation file, for making or process its of this legal installation file First his host side reads the some or all of data in this legal installation file, and carries out these some or all of data Cryptographic calculation, thus obtain a ciphertext, then using this ciphertext as the file label of this legal installation file, and by this legal peace Dress file sends to be issued to server end.Especially, the generation process of file label is completed by server end.Need further Illustrating, file label is positioned at the outside of the file data of program file, i.e. file label not included in program file Among appearance, thus without the data of Rogue program's file itself, it is ensured that the integrity of program file, such as, file label can Think the filename etc. of program file.
Being preferably carried out in mode at one, client is when a certain program file installed by needs, from this program literary composition of storage The server end of part or other storage mediums obtain this program file, and reads this program file being positioned at appointment position On file data, thus obtain the first file data;Subsequently, this first file data is carried out the first cryptographic calculation, thus Obtain the first ciphertext;Finally, contrast this first ciphertext the most identical with the file label of this program file, if identical, then illustrate This program file is not tampered with and has installation authority, is legal installation file, and client installs this program file, if not phase With, then illustrating that this program file has been tampered or has been fitted without authority, be that file is illegally installed, client does not install this program File.The file label of legal installation file is passed through reading in this legal installation file by a certain host side or server end The second file data specifying the file data on position to be obtained that is positioned at be encrypted computing and generate.Wherein, host side, clothes The position of file data that business device end and client read, and the kind of the cryptographic calculation carried out respectively is pre-stored within respectively From system in.If the file data read during the generation of file label is read in same position with client File data differ, then it is assumed that this application program transmission during be tampered.If the generation process at file label In the position of position and the client reading file data reading file data different, or the AES used is not With, then it is assumed that this program file is fitted without authority on the client.
For example, it is assumed that the file label of a certain application file is the filename of this application file, file name Generation process performed by a certain host side, it is assumed that this host side its own system pre-sets read file data position Be the 0th byte be md5 encryption computing to the 3rd byte, the cryptographic calculation carried out, then this host side reads this application program The 0th byte in file is to the file data " ABCD " of the 3rd byte, thus obtains the second file data " ABCD ", and right This second file data carry out md5 encryption computing obtain ciphertext " cb08ca4a7bb5f9683c19133a84872ca7 ", and with This application file, as the filename of this application program, is finally sent and issues to server end by this ciphertext.Assume this Client in example directly obtains this application file from server end and installs, then if a certain client needs peace Fill this application program, then from server end, download this application file, and should according to the reading that arranges in its own system With program is positioned at the file data specifying position, thus obtain the first file data, subsequently this first file data is carried out First cryptographic calculation, if the ciphertext obtained is " cb08ca4a7bb5f9683c19133a84872ca7 ", then it is assumed that this application Program file is not tampered with and has installation authority, is legal installation file, and client installs this application program, otherwise visitor Family end does not install this application program.If client reads the 0th byte number of files to the 3rd byte of this application file " ABCD " according to the first file data obtained, or client read file data position be not the 0th byte extremely 3rd byte, or the first AES that client is used is not MD5 algorithm, is likely to cause client finally to obtain The ciphertext obtained is not " cb08ca4a7bb5f9683c19133a84872ca7 ", and now client judges that this application program is as illegal Application program, can not install.
Especially, if client program file acquired in from server end or other storage mediums does not include literary composition Part label, then it is assumed that this program file is fitted without authority in the client, is defined as illegally installing file, and client is not installed This program file.For example, it is assumed that the application file of study class all generates corresponding file label according to the method for the present invention, The application file of game class the most all generates corresponding file label less than the method according to the present invention, then according to this Bright program file installation method carries out student's panel computer of application file installation only can install the application learning class Program file, and the application file of game class cannot be installed.
Due to during installation procedure file, it is only necessary to read part or total data from program file Carry out the checking of program file legitimacy, resolve, therefore, it is possible to preventing without carrying out the content of program file splitting While illegal program file is installed, it is ensured that the integrity of program file, reduce the error rate that program file is installed, and energy The enough efficiency improving the process that the legitimacy to program file is verified, and then improve the efficiency of program file installation process.
In another is preferably carried out mode, at the program file that described acquisition is to be installed, and read described program literary composition Part is positioned at the file data specifying position, it is thus achieved that after the first file data, described described first file data is carried out First cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password Generate;Described second Crypted password is identical with described first password.
It should be noted that client is when a certain program file installed by needs, from the server storing this program file End or other storage mediums obtain this program file, and reads the number of files being positioned on appointment position in this program file According to, thus obtain the first file data;Subsequently, this first file data is added first password and carries out the first cryptographic calculation, Thus obtain the first ciphertext;Finally, contrast this first ciphertext the most identical with the file label of this program file, if identical, then Illustrating that this program file is not tampered with and has installation authority, be legal installation file, client installs this program file, if Differing, then illustrate that this program file has been tampered or has been fitted without authority, be illegally to install file, client does not install this Program file.The file label of legal installation file by a certain host side or server end by the addition of the second password or Person with the addition of and the second password is encrypted the second file data of the second Crypted password that computing is generated is encrypted computing Generate.The cryptographic calculation carrying out the second password can be identical with the cryptographic calculation carrying out the second file data, it is also possible to no With.Wherein, host side, server end and the position of client reading file data, and the cryptographic calculation carried out respectively Kind is pre-stored within respective system.First password is pre-stored within the system of client or at installation procedure file During be manually entered by user.Second password is pre-stored within the system of host side or server end, or at literary composition Part name is manually entered by manager during generating.If the file data read during the generation of file label and client The file data that end is read in same position differs, then it is assumed that this application program is tampered during transmission.If The position reading file data during the generation of file label is different from the position that client reads file data, or The AES used is different, then it is assumed that this program file is fitted without authority on the client.Life when file label Added in the second file data during one-tenth be the second password time, if first password differs, then with this second password Think that this program file is fitted without authority on the client;During the generation of file label in the second file data Added be the second Crypted password time, if first password differs with this second Crypted password, then it is assumed that this program file exists It is fitted without authority in this client.
Participate in the legitimate verification of program file by introducing password in installation process, improve and prevent illegal program The intensity that file is installed.
In another is preferably carried out mode, at the program file that described acquisition is to be installed, and read described program literary composition Part is positioned at the file data specifying position, it is thus achieved that after the first file data, described described first file data is carried out First cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set Cryptographic calculation generates;Described second password is identical with described first password.
It should be noted that client is when a certain program file installed by needs, from the server storing this program file End or other storage mediums obtain this program file, and reads the number of files being positioned on appointment position in this program file According to, thus obtain the first file data;Subsequently, to first password, the interpolation of this first file data is encrypted computing to be generated The first Crypted password and carry out the first cryptographic calculation, thus obtain the first ciphertext;Finally, this first ciphertext and this program are contrasted The file label of file is the most identical, if identical, then illustrate that this program file is not tampered with and has installation authority, is legal Installing file, client installs this program file, if differing, then illustrates that this program file has been tampered or has been fitted without power Limit, is illegally to install file, and client does not install this program file.The file label of legal installation file by a certain host side or Person's server end is by the addition of the second number of files that the second password is encrypted the second Crypted password that computing is generated Generate according to being encrypted computing.The cryptographic calculation carrying out the second password is permissible with the cryptographic calculation carrying out the second file data Identical, it is also possible to different.Wherein, host side, server end and client read the position of file data, and carry out respectively The kind of cryptographic calculation be pre-stored within respective system.First password be pre-stored within the system of client or It is manually entered by user during installation procedure file.Second password is pre-stored within the system of host side or server end In, or be manually entered by manager during the generation of file label.If being read during the generation of file label The file data that read in same position of file data and client differ, then it is assumed that this application program is in transmission During be tampered.If file data is read with client in the position reading file data during the generation of file label Position different, or the AES used is different, or first password and the second password differ, then it is assumed that this program File is fitted without authority on the client.
Participate in the legitimate verification of program file by introducing password in installation process, improve and prevent illegal program The intensity that file is installed.
Further, described first cryptographic calculation is irreversible operation.
It should be noted that the cryptographic calculation during filename generates, the second file data carried out and client The first cryptographic calculation that first file data is carried out by end is irreversible computing.Such as, this cryptographic calculation can be The AES computings such as CRC, MD4, MD5, SHA.
The cryptographic calculation carried out the second file data during the generation of file label and client are to first The first cryptographic calculation that file data is carried out is irreversible computing, it is possible to increase decode the file label of program file Difficulty, thus improve the difficulty of file label alterring program file, and then can improve further and prevent illegal program The intensity that file is installed.
Further, described file label is that the filename of described program file is whole or the file of described program file A part in Ming.
It should be noted that a whole or part for filename for the filename that file label is program file, therefore, When client carries out legitimate verification to a certain program file obtained from server end or other storage mediums, only need Ciphertext computing to be obtained contrasts with the filename of this program file, i.e. can determine whether whether this program file is legal peace Dress file.
The program file installation method that the embodiment of the present invention provides, due to during installation procedure file, it is only necessary to Read from program file partly or total data can carry out the checking of program file legitimacy, without to program literary composition The content of part carries out splitting and resolves, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program file complete Whole property, reduces the error rate that program file is installed, and can improve process that the legitimacy to program file verifies Efficiency, and then improve the efficiency of program file installation process.Further, by introducing password participation program file in installation process Legitimate verification, improve the intensity preventing illegal program file from installing.It addition, it is right during the generation of file label Cryptographic calculation that second file data is carried out and the first cryptographic calculation that the first file data is carried out by client are Irreversible computing, it is possible to increase decode the difficulty of the file label of program file, thus improve the file alterring program file The difficulty of label, and then the intensity preventing illegal program file from installing can be improved further.
Correspondingly, the present invention also provides for a kind of program file erecting device, it is possible to realize the program literary composition in above-described embodiment All flow processs of part installation method.
See Fig. 2, be the structural representation of an embodiment of the program file erecting device that the present invention provides, the most such as Under:
First file data acquisition module 21, for obtaining program file to be installed, and reads in described program file Be positioned at specify position file data, it is thus achieved that the first file data;
First ciphertext acquisition module 22, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that first is close Literary composition;And,
Module 23 is installed, for contrasting the literary composition of the outside of the file data being positioned at described program file of described program file Part label and described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program literary composition Part, if differing, does not the most install described program file;Wherein, the file label of described legal installation file is by the second literary composition Number of packages generates according to carrying out described first cryptographic calculation;Described second file data is by reading the position in described legal installation file File data in described appointment position obtains.
In another is preferably carried out mode, described application file erecting device, also include:
First password adds module, adds to described first file data for the first password that will pre-set;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password Generate;Described second Crypted password is identical with described first password.
In another is preferably carried out mode, described application file erecting device, also include:
First Crypted password obtains module, for the first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the One Crypted password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file A part in Ming.
The program file erecting device that the embodiment of the present invention provides, due to during installation procedure file, it is only necessary to Read from program file partly or total data can carry out the checking of program file legitimacy, without to program literary composition The content of part carries out splitting and resolves, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program file complete Whole property, reduces the error rate that program file is installed, and can improve process that the legitimacy to program file verifies Efficiency, and then improve the efficiency of program file installation process.Further, by introducing password participation journey file in installation process Legitimate verification, improves the intensity preventing illegal program file from installing.It addition, to during the generation of file label Cryptographic calculation that two file datas are carried out and the first cryptographic calculation that the first file data is carried out by client are not Reversible computing, it is possible to increase decode the difficulty of the file label of program file, thus improve the files-designated alterring program file The difficulty signed, and then the intensity preventing illegal program file from installing can be improved further.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (10)

1. a program file installation method, it is characterised in that including:
Obtain program file to be installed, and read the file data being positioned at appointment position in described program file, it is thus achieved that the One file data;
Described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
Contrast the file label of the outside of the file data being positioned at described program file of described program file and described first close Literary composition, if identical, it is determined that described program file is legal installation file, and installs described program file, if differing, then uneasy Fill described program file;Wherein, the file label of described legal installation file is by carrying out described first to the second file data Cryptographic calculation generates;Described second file data is by reading the literary composition being positioned at described appointment position in described legal installation file Number of packages is according to acquisition.
2. program file installation method as claimed in claim 1, it is characterised in that at the program literary composition that described acquisition is to be installed Part, and read the file data being positioned at appointment position in described program file, it is thus achieved that after the first file data, described to institute State the first file data and carry out the first cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, the second password pre-set And carry out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is gone forward side by side by described second file data is added the second Crypted password Described first cryptographic calculation of row generates;Described second Crypted password is raw by described second password carries out the second cryptographic calculation Become;Described second Crypted password is identical with described first password.
3. program file installation method as claimed in claim 1, it is characterised in that at the program literary composition that described acquisition is to be installed Part, and read the file data being positioned at appointment position in described program file, it is thus achieved that after the first file data, described to institute State the first file data and carry out the first cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password to described second file data and carrying out Described first cryptographic calculation generates;Described second Crypted password by carrying out described second encryption to the second password pre-set Computing generates;Described second password is identical with described first password.
4. the program file installation method as described in any one of claims 1 to 3, it is characterised in that described first cryptographic calculation For irreversible operation.
5. the program file installation method as described in any one of claims 1 to 3, it is characterised in that described file label is institute State that the filename of program file is whole or a part in the filename of described program file.
6. a program file erecting device, it is characterised in that including:
First file data acquisition module, for obtaining program file to be installed, and reads being positioned in described program file Specify the file data of position, it is thus achieved that the first file data;
First ciphertext acquisition module, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that the first ciphertext;With And,
Module is installed, for contrasting the file label of the outside of the file data being positioned at described program file of described program file With described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if Differ, described program file is not the most installed;Wherein, the file label of described legal installation file is by the second file data Carry out described first cryptographic calculation to generate;Described second file data is described by being positioned in the described legal installation file of reading The file data specifying position obtains.
7. program file erecting device as claimed in claim 6, it is characterised in that described application file erecting device, Also include:
First password adds module, adds to described first file data for the first password that will pre-set;
Then, the file label of described legal installation file is by adding, to described second file data, the second password pre-set And carry out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is gone forward side by side by described second file data is added the second Crypted password Described first cryptographic calculation of row generates;Described second Crypted password is raw by described second password carries out the second cryptographic calculation Become;Described second Crypted password is identical with described first password.
8. program file erecting device as claimed in claim 6, it is characterised in that described application file erecting device, Also include:
First Crypted password obtains module, for the first password pre-set is carried out the second cryptographic calculation, it is thus achieved that first adds Password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password to described second file data and carrying out Described first cryptographic calculation generates;Described second Crypted password by carrying out described second encryption to the second password pre-set Computing generates;Described second password is identical with described first password.
9. the program file erecting device as described in any one of claim 6 to 8, it is characterised in that described first cryptographic calculation For irreversible operation.
10. the program file erecting device as described in any one of claim 6 to 8, it is characterised in that described file label is institute State that the filename of program file is whole or a part in the filename of described program file.
CN201610645809.9A 2016-08-08 2016-08-08 Program file installation method and device Active CN106250194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610645809.9A CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610645809.9A CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Publications (2)

Publication Number Publication Date
CN106250194A true CN106250194A (en) 2016-12-21
CN106250194B CN106250194B (en) 2019-06-21

Family

ID=58079265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610645809.9A Active CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Country Status (1)

Country Link
CN (1) CN106250194B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723365A (en) * 2020-06-30 2020-09-29 湖北亿咖通科技有限公司 Method and equipment for installing application program in vehicle-mounted information entertainment system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652057A (en) * 2004-02-06 2005-08-10 恩益禧电子股份有限公司 Apparatus and method for program tamper detection ,and program
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
WO2014102523A2 (en) * 2012-12-31 2014-07-03 British Telecommunications Public Limited Company Processing device and method of operation thereof
CN105119888A (en) * 2015-07-10 2015-12-02 小米科技有限责任公司 Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652057A (en) * 2004-02-06 2005-08-10 恩益禧电子股份有限公司 Apparatus and method for program tamper detection ,and program
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
WO2014102523A2 (en) * 2012-12-31 2014-07-03 British Telecommunications Public Limited Company Processing device and method of operation thereof
CN105119888A (en) * 2015-07-10 2015-12-02 小米科技有限责任公司 Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723365A (en) * 2020-06-30 2020-09-29 湖北亿咖通科技有限公司 Method and equipment for installing application program in vehicle-mounted information entertainment system

Also Published As

Publication number Publication date
CN106250194B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
US10673638B2 (en) Unified programming environment for programmable devices
US10587451B2 (en) Device programming with system generation
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
US20180041341A1 (en) Counterfeit prevention
US8560820B2 (en) Single security model in booting a computing device
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
CN102508791B (en) Method and device for encrypting hard disk partition
US10943013B2 (en) Maintaining keys for trusted boot code
CN107430658B (en) Security software certification and verifying
CN109313690A (en) Self-contained encryption boot policy verifying
US20090259855A1 (en) Code Image Personalization For A Computing Device
CN106936588B (en) Hosting method, device and system of hardware control lock
US20090287917A1 (en) Secure software distribution
GB2517016A (en) Secure data storage
CN110795126A (en) Firmware safety upgrading system
CN109660353A (en) A kind of application program installation method and device
US20070014414A1 (en) Hardware linked product key
WO2017050186A1 (en) Application permission management method and smart pos terminal
CN106709281B (en) Patch granting and acquisition methods, device
CN109522683B (en) Software tracing method, system, computer equipment and storage medium
US20140230052A1 (en) System and method for testing a secured manufactured device
CN106250194A (en) Program file installation method and device
CN110457170A (en) For testing the method, apparatus, system and medium of U-shield
CN110414216B (en) Safe loading method and system for vehicle-mounted T-Box program code
CN113886894A (en) Digital signature method and digital signature device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant