CN106250194A - Program file installation method and device - Google Patents
Program file installation method and device Download PDFInfo
- Publication number
- CN106250194A CN106250194A CN201610645809.9A CN201610645809A CN106250194A CN 106250194 A CN106250194 A CN 106250194A CN 201610645809 A CN201610645809 A CN 201610645809A CN 106250194 A CN106250194 A CN 106250194A
- Authority
- CN
- China
- Prior art keywords
- file
- password
- program
- program file
- file data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000009434 installation Methods 0.000 title claims abstract description 84
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000004364 calculation method Methods 0.000 claims description 79
- 239000000203 mixture Substances 0.000 claims description 21
- 230000002427 irreversible effect Effects 0.000 claims description 9
- 238000011900 installation process Methods 0.000 abstract description 12
- 230000008569 process Effects 0.000 description 11
- 238000012795 verification Methods 0.000 description 6
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a program file installation method and device. The program file installation method comprises the following steps: acquiring a program file to be installed, reading file data located at a specified position in the program file, and acquiring first file data; performing a first encryption operation on the first file data to obtain a first ciphertext; comparing a file tag of the program file, which is positioned outside the program file, with the first ciphertext, if the file tag of the program file is the same as the first ciphertext, determining that the program file is a legal installation file, installing the program file, and if the file tag of the program file is not the same as the first ciphertext, not installing the program file; the file label of the legal installation file is generated by performing the first encryption operation on second file data; and the second file data is obtained by reading the file data located at the specified position in the legal installation file. By adopting the embodiment of the invention, the integrity of the program file can be ensured, and the efficiency of the program file installation process can be improved.
Description
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of program file installation method and device.
Background technology
In most computer system, to prevent illegal application program from installing, on the one hand, prevent from being tampered
Application program is installed, and on the other hand, will prevent the application program being fitted without authority from installing, such as, at the panel computer of student
In, only can allow some specific application program is installed.The existing technical scheme preventing unauthorized applications from installing is mainly
Password is installed by using or uses digital signature to realize.
In using the technical scheme installing password, each application program has unique corresponding illegally pacifies for preventing
The installation password of dress, the most when installing the application, is required for manager and is manually entered corresponding password of installing and verifies, when
This application program just can be installed when being verified.In this technical scheme, during due to set up applications each time, it is required for pipe
Reason person is manually entered installation password in person, to install same application program in 1000 computers, then needs manager
Repeating to be manually entered 1000 times and install password, therefore the workload of installation process is big, inefficiency,
In the technical scheme using digital signature, before release application program, according to content and the private of application program
Key generates corresponding ciphertext, and this ciphertext is deposited in application program;When set up applications, first by application program
Ciphertext extracts, and re-uses corresponding PKI and is decrypted this ciphertext, if successful decryption, then installs this application program, if
Unsuccessful, do not install.In this technical scheme, after generating corresponding ciphertext due to the content according to application program and private key,
Can deposit in application program by this ciphertext, therefore this process can destroy original application file data, and easily causing should
Make mistakes with program file;In installation process, need first the ciphertext in application program to be extracted, then be decrypted, therefore
The process very complicated installed, the inefficiency of installation.
Summary of the invention
The present invention proposes a kind of program file installation method and device, it is possible to ensure the integrity of program file, and can
Improve the efficiency of program file installation process.
The present invention proposes a kind of program file installation method, specifically includes:
Obtain program file to be installed, and read the file data being positioned at appointment position in described program file, obtain
Obtain the first file data;
Described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
Contrast the file label and described of the outside of the file data being positioned at described program file of described program file
One ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if differing, then
Described program file is not installed;Wherein, the file label of described legal installation file is described by carrying out the second file data
First cryptographic calculation generates;Described second file data is positioned at described appointment position by reading in described legal installation file
File data obtain.
Further, at the program file that described acquisition is to be installed, and read described program file is positioned at specific bit
The file data put, it is thus achieved that after the first file data, described carries out the first cryptographic calculation to described first file data, it is thus achieved that
Before first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set
Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data
And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password
Generate;Described second Crypted password is identical with described first password.
Further, at the program file that described acquisition is to be installed, and read described program file is positioned at specific bit
The file data put, it is thus achieved that after the first file data, described carries out the first cryptographic calculation to described first file data, it is thus achieved that
Before first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data
Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set
Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file
A part in Ming.
Correspondingly, present invention also offers a kind of program file erecting device, specifically include:
First file data acquisition module, for obtaining program file to be installed, and reads in described program file
It is positioned at the file data specifying position, it is thus achieved that the first file data;
First ciphertext acquisition module, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that the first ciphertext;
And,
Module is installed, for contrasting the file of the outside of the file data being positioned at described program file of described program file
Label and described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program literary composition
Part, if differing, does not the most install described program file;Wherein, the file label of described legal installation file is by the second literary composition
Number of packages generates according to carrying out described first cryptographic calculation;Described second file data is by reading the position in described legal installation file
File data in described appointment position obtains.
Further, first password adds module, adds to described first file for the first password that will pre-set
In data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set
Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data
And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password
Generate;Described second Crypted password is identical with described first password.
Further, the first Crypted password obtains module, for the first password pre-set carries out the second encryption fortune
Calculate, it is thus achieved that the first Crypted password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data
Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set
Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file
A part in Ming.
Implement the present invention, have the advantages that
Program file installation method that the embodiment of the present invention provides and device, due to during installation procedure file,
Have only to reading part or total data from program file and can carry out the checking of program file legitimacy, without right
The content of program file carries out splitting parsing, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program literary composition
The integrity of part, reduces the error rate that program file is installed, and can improve what the legitimacy to program file was verified
The efficiency of process, and then improve the efficiency of program file installation process.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of an embodiment of the program file installation method that the present invention provides;
Fig. 2 is the structural representation of an embodiment of the program file erecting device that the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
See Fig. 1, be the schematic flow sheet of an embodiment of the program file installation method that the present invention provides, including step
Rapid S11 to S13, specific as follows:
S11: obtain program file to be installed, and read the number of files being positioned at appointment position in described program file
According to, it is thus achieved that the first file data;
S12: described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
S13: contrast file label and the institute of the outside of the file data being positioned at described program file of described program file
State the first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if not phase
With, described program file is not the most installed;Wherein, the file label of described legal installation file is by carrying out the second file data
Described first cryptographic calculation generates;Described second file data is positioned at described appointment by reading in described legal installation file
The file data of position obtains.
It should be noted that the program file installation method that the embodiment of the present invention is provided is by client executing.Program literary composition
Part is pre-stored within server end or other storage mediums (such as SD card, USB flash disk or CD etc.).Client is installing certain
During program file, first, from the server end storing this program file or other storage mediums, this program file is obtained, and
Part or all files data are read from this program file;Subsequently, this some or all of file data is encrypted
Computing, thus obtain a ciphertext;Finally, the ciphertext obtained by contrast and the file label of this program file carry out school
Test, if the ciphertext obtained is identical with the file label of this program file, then illustrate that this program file is not tampered with and has
Installing authority, verification is passed through, and determines that this program file is legal installation file, and client installs this program file, if being obtained
The file label of ciphertext and program file differ, then illustrate that this program file has been tampered or has been fitted without authority, school
Test failure, determine this program file for illegally to install file, client does not install this program file.SD card or USB flash disk or light
Program file in the storage mediums such as dish obtains by downloading from server end.Server end is used for issuing and store program literary composition
Part.It is sent to before server end issues at legal installation file, for making or process its of this legal installation file
First his host side reads the some or all of data in this legal installation file, and carries out these some or all of data
Cryptographic calculation, thus obtain a ciphertext, then using this ciphertext as the file label of this legal installation file, and by this legal peace
Dress file sends to be issued to server end.Especially, the generation process of file label is completed by server end.Need further
Illustrating, file label is positioned at the outside of the file data of program file, i.e. file label not included in program file
Among appearance, thus without the data of Rogue program's file itself, it is ensured that the integrity of program file, such as, file label can
Think the filename etc. of program file.
Being preferably carried out in mode at one, client is when a certain program file installed by needs, from this program literary composition of storage
The server end of part or other storage mediums obtain this program file, and reads this program file being positioned at appointment position
On file data, thus obtain the first file data;Subsequently, this first file data is carried out the first cryptographic calculation, thus
Obtain the first ciphertext;Finally, contrast this first ciphertext the most identical with the file label of this program file, if identical, then illustrate
This program file is not tampered with and has installation authority, is legal installation file, and client installs this program file, if not phase
With, then illustrating that this program file has been tampered or has been fitted without authority, be that file is illegally installed, client does not install this program
File.The file label of legal installation file is passed through reading in this legal installation file by a certain host side or server end
The second file data specifying the file data on position to be obtained that is positioned at be encrypted computing and generate.Wherein, host side, clothes
The position of file data that business device end and client read, and the kind of the cryptographic calculation carried out respectively is pre-stored within respectively
From system in.If the file data read during the generation of file label is read in same position with client
File data differ, then it is assumed that this application program transmission during be tampered.If the generation process at file label
In the position of position and the client reading file data reading file data different, or the AES used is not
With, then it is assumed that this program file is fitted without authority on the client.
For example, it is assumed that the file label of a certain application file is the filename of this application file, file name
Generation process performed by a certain host side, it is assumed that this host side its own system pre-sets read file data position
Be the 0th byte be md5 encryption computing to the 3rd byte, the cryptographic calculation carried out, then this host side reads this application program
The 0th byte in file is to the file data " ABCD " of the 3rd byte, thus obtains the second file data " ABCD ", and right
This second file data carry out md5 encryption computing obtain ciphertext " cb08ca4a7bb5f9683c19133a84872ca7 ", and with
This application file, as the filename of this application program, is finally sent and issues to server end by this ciphertext.Assume this
Client in example directly obtains this application file from server end and installs, then if a certain client needs peace
Fill this application program, then from server end, download this application file, and should according to the reading that arranges in its own system
With program is positioned at the file data specifying position, thus obtain the first file data, subsequently this first file data is carried out
First cryptographic calculation, if the ciphertext obtained is " cb08ca4a7bb5f9683c19133a84872ca7 ", then it is assumed that this application
Program file is not tampered with and has installation authority, is legal installation file, and client installs this application program, otherwise visitor
Family end does not install this application program.If client reads the 0th byte number of files to the 3rd byte of this application file
" ABCD " according to the first file data obtained, or client read file data position be not the 0th byte extremely
3rd byte, or the first AES that client is used is not MD5 algorithm, is likely to cause client finally to obtain
The ciphertext obtained is not " cb08ca4a7bb5f9683c19133a84872ca7 ", and now client judges that this application program is as illegal
Application program, can not install.
Especially, if client program file acquired in from server end or other storage mediums does not include literary composition
Part label, then it is assumed that this program file is fitted without authority in the client, is defined as illegally installing file, and client is not installed
This program file.For example, it is assumed that the application file of study class all generates corresponding file label according to the method for the present invention,
The application file of game class the most all generates corresponding file label less than the method according to the present invention, then according to this
Bright program file installation method carries out student's panel computer of application file installation only can install the application learning class
Program file, and the application file of game class cannot be installed.
Due to during installation procedure file, it is only necessary to read part or total data from program file
Carry out the checking of program file legitimacy, resolve, therefore, it is possible to preventing without carrying out the content of program file splitting
While illegal program file is installed, it is ensured that the integrity of program file, reduce the error rate that program file is installed, and energy
The enough efficiency improving the process that the legitimacy to program file is verified, and then improve the efficiency of program file installation process.
In another is preferably carried out mode, at the program file that described acquisition is to be installed, and read described program literary composition
Part is positioned at the file data specifying position, it is thus achieved that after the first file data, described described first file data is carried out
First cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set
Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data
And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password
Generate;Described second Crypted password is identical with described first password.
It should be noted that client is when a certain program file installed by needs, from the server storing this program file
End or other storage mediums obtain this program file, and reads the number of files being positioned on appointment position in this program file
According to, thus obtain the first file data;Subsequently, this first file data is added first password and carries out the first cryptographic calculation,
Thus obtain the first ciphertext;Finally, contrast this first ciphertext the most identical with the file label of this program file, if identical, then
Illustrating that this program file is not tampered with and has installation authority, be legal installation file, client installs this program file, if
Differing, then illustrate that this program file has been tampered or has been fitted without authority, be illegally to install file, client does not install this
Program file.The file label of legal installation file by a certain host side or server end by the addition of the second password or
Person with the addition of and the second password is encrypted the second file data of the second Crypted password that computing is generated is encrypted computing
Generate.The cryptographic calculation carrying out the second password can be identical with the cryptographic calculation carrying out the second file data, it is also possible to no
With.Wherein, host side, server end and the position of client reading file data, and the cryptographic calculation carried out respectively
Kind is pre-stored within respective system.First password is pre-stored within the system of client or at installation procedure file
During be manually entered by user.Second password is pre-stored within the system of host side or server end, or at literary composition
Part name is manually entered by manager during generating.If the file data read during the generation of file label and client
The file data that end is read in same position differs, then it is assumed that this application program is tampered during transmission.If
The position reading file data during the generation of file label is different from the position that client reads file data, or
The AES used is different, then it is assumed that this program file is fitted without authority on the client.Life when file label
Added in the second file data during one-tenth be the second password time, if first password differs, then with this second password
Think that this program file is fitted without authority on the client;During the generation of file label in the second file data
Added be the second Crypted password time, if first password differs with this second Crypted password, then it is assumed that this program file exists
It is fitted without authority in this client.
Participate in the legitimate verification of program file by introducing password in installation process, improve and prevent illegal program
The intensity that file is installed.
In another is preferably carried out mode, at the program file that described acquisition is to be installed, and read described program literary composition
Part is positioned at the file data specifying position, it is thus achieved that after the first file data, described described first file data is carried out
First cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data
Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set
Cryptographic calculation generates;Described second password is identical with described first password.
It should be noted that client is when a certain program file installed by needs, from the server storing this program file
End or other storage mediums obtain this program file, and reads the number of files being positioned on appointment position in this program file
According to, thus obtain the first file data;Subsequently, to first password, the interpolation of this first file data is encrypted computing to be generated
The first Crypted password and carry out the first cryptographic calculation, thus obtain the first ciphertext;Finally, this first ciphertext and this program are contrasted
The file label of file is the most identical, if identical, then illustrate that this program file is not tampered with and has installation authority, is legal
Installing file, client installs this program file, if differing, then illustrates that this program file has been tampered or has been fitted without power
Limit, is illegally to install file, and client does not install this program file.The file label of legal installation file by a certain host side or
Person's server end is by the addition of the second number of files that the second password is encrypted the second Crypted password that computing is generated
Generate according to being encrypted computing.The cryptographic calculation carrying out the second password is permissible with the cryptographic calculation carrying out the second file data
Identical, it is also possible to different.Wherein, host side, server end and client read the position of file data, and carry out respectively
The kind of cryptographic calculation be pre-stored within respective system.First password be pre-stored within the system of client or
It is manually entered by user during installation procedure file.Second password is pre-stored within the system of host side or server end
In, or be manually entered by manager during the generation of file label.If being read during the generation of file label
The file data that read in same position of file data and client differ, then it is assumed that this application program is in transmission
During be tampered.If file data is read with client in the position reading file data during the generation of file label
Position different, or the AES used is different, or first password and the second password differ, then it is assumed that this program
File is fitted without authority on the client.
Participate in the legitimate verification of program file by introducing password in installation process, improve and prevent illegal program
The intensity that file is installed.
Further, described first cryptographic calculation is irreversible operation.
It should be noted that the cryptographic calculation during filename generates, the second file data carried out and client
The first cryptographic calculation that first file data is carried out by end is irreversible computing.Such as, this cryptographic calculation can be
The AES computings such as CRC, MD4, MD5, SHA.
The cryptographic calculation carried out the second file data during the generation of file label and client are to first
The first cryptographic calculation that file data is carried out is irreversible computing, it is possible to increase decode the file label of program file
Difficulty, thus improve the difficulty of file label alterring program file, and then can improve further and prevent illegal program
The intensity that file is installed.
Further, described file label is that the filename of described program file is whole or the file of described program file
A part in Ming.
It should be noted that a whole or part for filename for the filename that file label is program file, therefore,
When client carries out legitimate verification to a certain program file obtained from server end or other storage mediums, only need
Ciphertext computing to be obtained contrasts with the filename of this program file, i.e. can determine whether whether this program file is legal peace
Dress file.
The program file installation method that the embodiment of the present invention provides, due to during installation procedure file, it is only necessary to
Read from program file partly or total data can carry out the checking of program file legitimacy, without to program literary composition
The content of part carries out splitting and resolves, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program file complete
Whole property, reduces the error rate that program file is installed, and can improve process that the legitimacy to program file verifies
Efficiency, and then improve the efficiency of program file installation process.Further, by introducing password participation program file in installation process
Legitimate verification, improve the intensity preventing illegal program file from installing.It addition, it is right during the generation of file label
Cryptographic calculation that second file data is carried out and the first cryptographic calculation that the first file data is carried out by client are
Irreversible computing, it is possible to increase decode the difficulty of the file label of program file, thus improve the file alterring program file
The difficulty of label, and then the intensity preventing illegal program file from installing can be improved further.
Correspondingly, the present invention also provides for a kind of program file erecting device, it is possible to realize the program literary composition in above-described embodiment
All flow processs of part installation method.
See Fig. 2, be the structural representation of an embodiment of the program file erecting device that the present invention provides, the most such as
Under:
First file data acquisition module 21, for obtaining program file to be installed, and reads in described program file
Be positioned at specify position file data, it is thus achieved that the first file data;
First ciphertext acquisition module 22, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that first is close
Literary composition;And,
Module 23 is installed, for contrasting the literary composition of the outside of the file data being positioned at described program file of described program file
Part label and described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program literary composition
Part, if differing, does not the most install described program file;Wherein, the file label of described legal installation file is by the second literary composition
Number of packages generates according to carrying out described first cryptographic calculation;Described second file data is by reading the position in described legal installation file
File data in described appointment position obtains.
In another is preferably carried out mode, described application file erecting device, also include:
First password adds module, adds to described first file data for the first password that will pre-set;
Then, the file label of described legal installation file is by adding, to described second file data, second pre-set
Password also carries out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is by adding the second Crypted password to described second file data
And carry out described first cryptographic calculation generation;Described second Crypted password is by carrying out the second cryptographic calculation to described second password
Generate;Described second Crypted password is identical with described first password.
In another is preferably carried out mode, described application file erecting device, also include:
First Crypted password obtains module, for the first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the
One Crypted password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password also to described second file data
Carry out described first cryptographic calculation to generate;Described second Crypted password is by carrying out described second to the second password pre-set
Cryptographic calculation generates;Described second password is identical with described first password.
Further, described first cryptographic calculation is irreversible operation.
Further, described file label is that the filename of described program file is whole or the file of described program file
A part in Ming.
The program file erecting device that the embodiment of the present invention provides, due to during installation procedure file, it is only necessary to
Read from program file partly or total data can carry out the checking of program file legitimacy, without to program literary composition
The content of part carries out splitting and resolves, therefore, it is possible to while preventing illegal program file from installing, it is ensured that program file complete
Whole property, reduces the error rate that program file is installed, and can improve process that the legitimacy to program file verifies
Efficiency, and then improve the efficiency of program file installation process.Further, by introducing password participation journey file in installation process
Legitimate verification, improves the intensity preventing illegal program file from installing.It addition, to during the generation of file label
Cryptographic calculation that two file datas are carried out and the first cryptographic calculation that the first file data is carried out by client are not
Reversible computing, it is possible to increase decode the difficulty of the file label of program file, thus improve the files-designated alterring program file
The difficulty signed, and then the intensity preventing illegal program file from installing can be improved further.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications are also considered as
Protection scope of the present invention.
Claims (10)
1. a program file installation method, it is characterised in that including:
Obtain program file to be installed, and read the file data being positioned at appointment position in described program file, it is thus achieved that the
One file data;
Described first file data is carried out the first cryptographic calculation, it is thus achieved that the first ciphertext;
Contrast the file label of the outside of the file data being positioned at described program file of described program file and described first close
Literary composition, if identical, it is determined that described program file is legal installation file, and installs described program file, if differing, then uneasy
Fill described program file;Wherein, the file label of described legal installation file is by carrying out described first to the second file data
Cryptographic calculation generates;Described second file data is by reading the literary composition being positioned at described appointment position in described legal installation file
Number of packages is according to acquisition.
2. program file installation method as claimed in claim 1, it is characterised in that at the program literary composition that described acquisition is to be installed
Part, and read the file data being positioned at appointment position in described program file, it is thus achieved that after the first file data, described to institute
State the first file data and carry out the first cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is added to described first file data;
Then, the file label of described legal installation file is by adding, to described second file data, the second password pre-set
And carry out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is gone forward side by side by described second file data is added the second Crypted password
Described first cryptographic calculation of row generates;Described second Crypted password is raw by described second password carries out the second cryptographic calculation
Become;Described second Crypted password is identical with described first password.
3. program file installation method as claimed in claim 1, it is characterised in that at the program literary composition that described acquisition is to be installed
Part, and read the file data being positioned at appointment position in described program file, it is thus achieved that after the first file data, described to institute
State the first file data and carry out the first cryptographic calculation, it is thus achieved that before the first ciphertext, also include:
The first password pre-set is carried out the second cryptographic calculation, it is thus achieved that the first Crypted password;
Described first Crypted password is added to described first file data;
Then, the file label of described legal installation file is by adding the second Crypted password to described second file data and carrying out
Described first cryptographic calculation generates;Described second Crypted password by carrying out described second encryption to the second password pre-set
Computing generates;Described second password is identical with described first password.
4. the program file installation method as described in any one of claims 1 to 3, it is characterised in that described first cryptographic calculation
For irreversible operation.
5. the program file installation method as described in any one of claims 1 to 3, it is characterised in that described file label is institute
State that the filename of program file is whole or a part in the filename of described program file.
6. a program file erecting device, it is characterised in that including:
First file data acquisition module, for obtaining program file to be installed, and reads being positioned in described program file
Specify the file data of position, it is thus achieved that the first file data;
First ciphertext acquisition module, for carrying out the first cryptographic calculation to described first file data, it is thus achieved that the first ciphertext;With
And,
Module is installed, for contrasting the file label of the outside of the file data being positioned at described program file of described program file
With described first ciphertext, if identical, it is determined that described program file is legal installation file, and installs described program file, if
Differ, described program file is not the most installed;Wherein, the file label of described legal installation file is by the second file data
Carry out described first cryptographic calculation to generate;Described second file data is described by being positioned in the described legal installation file of reading
The file data specifying position obtains.
7. program file erecting device as claimed in claim 6, it is characterised in that described application file erecting device,
Also include:
First password adds module, adds to described first file data for the first password that will pre-set;
Then, the file label of described legal installation file is by adding, to described second file data, the second password pre-set
And carry out described first cryptographic calculation generation;Described second password is identical with described first password;
Or, the file label of described legal installation file is gone forward side by side by described second file data is added the second Crypted password
Described first cryptographic calculation of row generates;Described second Crypted password is raw by described second password carries out the second cryptographic calculation
Become;Described second Crypted password is identical with described first password.
8. program file erecting device as claimed in claim 6, it is characterised in that described application file erecting device,
Also include:
First Crypted password obtains module, for the first password pre-set is carried out the second cryptographic calculation, it is thus achieved that first adds
Password;And,
First Crypted password adds module, for being added to described first file data by described first Crypted password;
Then, the file label of described legal installation file is by adding the second Crypted password to described second file data and carrying out
Described first cryptographic calculation generates;Described second Crypted password by carrying out described second encryption to the second password pre-set
Computing generates;Described second password is identical with described first password.
9. the program file erecting device as described in any one of claim 6 to 8, it is characterised in that described first cryptographic calculation
For irreversible operation.
10. the program file erecting device as described in any one of claim 6 to 8, it is characterised in that described file label is institute
State that the filename of program file is whole or a part in the filename of described program file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610645809.9A CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610645809.9A CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106250194A true CN106250194A (en) | 2016-12-21 |
CN106250194B CN106250194B (en) | 2019-06-21 |
Family
ID=58079265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610645809.9A Active CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250194B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723365A (en) * | 2020-06-30 | 2020-09-29 | 湖北亿咖通科技有限公司 | Method and equipment for installing application program in vehicle-mounted information entertainment system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652057A (en) * | 2004-02-06 | 2005-08-10 | 恩益禧电子股份有限公司 | Apparatus and method for program tamper detection ,and program |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
WO2014102523A2 (en) * | 2012-12-31 | 2014-07-03 | British Telecommunications Public Limited Company | Processing device and method of operation thereof |
CN105119888A (en) * | 2015-07-10 | 2015-12-02 | 小米科技有限责任公司 | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device |
CN105516246A (en) * | 2015-11-25 | 2016-04-20 | 魅族科技(中国)有限公司 | Method for preventing application program downloading hijacking and server |
-
2016
- 2016-08-08 CN CN201610645809.9A patent/CN106250194B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652057A (en) * | 2004-02-06 | 2005-08-10 | 恩益禧电子股份有限公司 | Apparatus and method for program tamper detection ,and program |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
WO2014102523A2 (en) * | 2012-12-31 | 2014-07-03 | British Telecommunications Public Limited Company | Processing device and method of operation thereof |
CN105119888A (en) * | 2015-07-10 | 2015-12-02 | 小米科技有限责任公司 | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device |
CN105516246A (en) * | 2015-11-25 | 2016-04-20 | 魅族科技(中国)有限公司 | Method for preventing application program downloading hijacking and server |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723365A (en) * | 2020-06-30 | 2020-09-29 | 湖北亿咖通科技有限公司 | Method and equipment for installing application program in vehicle-mounted information entertainment system |
Also Published As
Publication number | Publication date |
---|---|
CN106250194B (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10673638B2 (en) | Unified programming environment for programmable devices | |
US10587451B2 (en) | Device programming with system generation | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
US20180041341A1 (en) | Counterfeit prevention | |
US8560820B2 (en) | Single security model in booting a computing device | |
CN102271042B (en) | Certificate authorization method, system, universal serial bus (USB) Key equipment and server | |
CN102508791B (en) | Method and device for encrypting hard disk partition | |
US10943013B2 (en) | Maintaining keys for trusted boot code | |
CN107430658B (en) | Security software certification and verifying | |
CN109313690A (en) | Self-contained encryption boot policy verifying | |
US20090259855A1 (en) | Code Image Personalization For A Computing Device | |
CN106936588B (en) | Hosting method, device and system of hardware control lock | |
US20090287917A1 (en) | Secure software distribution | |
GB2517016A (en) | Secure data storage | |
CN110795126A (en) | Firmware safety upgrading system | |
CN109660353A (en) | A kind of application program installation method and device | |
US20070014414A1 (en) | Hardware linked product key | |
WO2017050186A1 (en) | Application permission management method and smart pos terminal | |
CN106709281B (en) | Patch granting and acquisition methods, device | |
CN109522683B (en) | Software tracing method, system, computer equipment and storage medium | |
US20140230052A1 (en) | System and method for testing a secured manufactured device | |
CN106250194A (en) | Program file installation method and device | |
CN110457170A (en) | For testing the method, apparatus, system and medium of U-shield | |
CN110414216B (en) | Safe loading method and system for vehicle-mounted T-Box program code | |
CN113886894A (en) | Digital signature method and digital signature device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |