CN106250194B - Program file installation method and device - Google Patents

Program file installation method and device Download PDF

Info

Publication number
CN106250194B
CN106250194B CN201610645809.9A CN201610645809A CN106250194B CN 106250194 B CN106250194 B CN 106250194B CN 201610645809 A CN201610645809 A CN 201610645809A CN 106250194 B CN106250194 B CN 106250194B
Authority
CN
China
Prior art keywords
file
password
program
program file
file data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610645809.9A
Other languages
Chinese (zh)
Other versions
CN106250194A (en
Inventor
刘荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201610645809.9A priority Critical patent/CN106250194B/en
Publication of CN106250194A publication Critical patent/CN106250194A/en
Application granted granted Critical
Publication of CN106250194B publication Critical patent/CN106250194B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation

Abstract

The invention discloses a kind of program file installation method and devices.Described program file installation method includes: to obtain program file to be installed, and read the file data positioned at designated position in described program file, obtains the first file data;First cryptographic calculation is carried out to first file data, obtains the first ciphertext;The file label of the outside positioned at described program file of comparison described program file and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not identical, does not install described program file;Wherein, the file label of the legal installation file is generated by carrying out first cryptographic calculation to the second file data;Second file data is obtained by the file data positioned at the designated position read in the legal installation file.It using the embodiment of the present invention, can guarantee the integrality of program file, and can be improved the efficiency of program file installation process.

Description

Program file installation method and device
Technical field
The present invention relates to field of computer technology more particularly to a kind of program file installation methods and device.
Background technique
In most computer system, to prevent illegal application program from installing, on the one hand, to prevent from being tampered On the other hand application program installation will prevent the application program installation for being fitted without permission, for example, in the tablet computer of student In, can only allow that certain specific application programs are installed.It is existing prevent unauthorized applications install technical solution be mainly It is realized by using installation password or using digital signature.
In the technical solution using installation password, each application program has unique corresponding for preventing from illegally pacifying The installation password of dress requires administrator and is manually entered corresponding installation password to verify per when installing the application, when Ability mountable application program when being verified.In the technical scheme, due to requiring pipe when installing application program each time Reason person is manually entered installation password in person, to install the same application program in 1000 computers, then needs administrator Repetition is manually entered 1000 installation passwords, therefore the heavy workload of installation process, inefficiency,
In the technical solution using digital signature, before release application program, according to the content and private of application program Key generates corresponding ciphertext, and the ciphertext is deposited in application program;It when the application is installed, first will be in application program Ciphertext extracts, and reuses corresponding public key and the ciphertext is decrypted, if successful decryption, installs the application program, if It is unsuccessful, then it does not install.In the technical scheme, after due to generating corresponding ciphertext according to the content and private key of application program, The ciphertext can be deposited in application program, therefore the process can destroy original application file data, be easy to cause and answer It is malfunctioned with program file;During the installation process, it needs first to extract the ciphertext in application program, then is decrypted, therefore The process very complicated of installation, the inefficiency of installation.
Summary of the invention
The present invention proposes a kind of program file installation method and device, can guarantee the integrality of program file, and can Improve the efficiency of program file installation process.
The present invention proposes a kind of program file installation method, specifically includes:
Program file to be installed is obtained, and reads the file data positioned at designated position in described program file, is obtained Obtain the first file data;
First cryptographic calculation is carried out to first file data, obtains the first ciphertext;
Compare the file label and described the of the outside of the file data positioned at described program file of described program file One ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not identical, Described program file is not installed;Wherein, the file label of the legal installation file passes through to described in the progress of the second file data First cryptographic calculation generates;Second file data is located at the designated position by reading in the legal installation file File data obtain.
Further, program file to be installed is obtained described, and reads in described program file and is located at specific bit The file data set, it is described that first cryptographic calculation is carried out to first file data after obtaining the first file data, it obtains Before first ciphertext, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password It generates;Second Crypted password is identical as the first password.
Further, program file to be installed is obtained described, and reads in described program file and is located at specific bit The file data set, it is described that first cryptographic calculation is carried out to first file data after obtaining the first file data, it obtains Before first ciphertext, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file A part in name.
Correspondingly, it the present invention also provides a kind of program file mounting device, specifically includes:
First file data obtains module, for obtaining program file to be installed, and reads in described program file File data positioned at designated position obtains the first file data;
First ciphertext obtains module, for carrying out the first cryptographic calculation to first file data, obtains the first ciphertext; And
Module, the file of the outside of the file data positioned at described program file for comparing described program file are installed Label and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program text Part does not install described program file if not identical;Wherein, the file label of the legal installation file passes through to the second text Number of packages is generated according to first cryptographic calculation is carried out;Second file data is by reading the position in the legal installation file File data in the designated position obtains.
Further, first password adding module, for pre-set first password to be added to first file In data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password It generates;Second Crypted password is identical as the first password.
Further, the first Crypted password obtains module, transports for carrying out the second encryption to pre-set first password It calculates, obtains the first Crypted password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file A part in name.
The invention has the following beneficial effects:
Program file installation method and device provided in an embodiment of the present invention, due to during installation procedure file, The verifying of program file legitimacy can be carried out by only needing to read part or total data from program file, without right The content of program file carries out fractionation parsing, therefore can guarantee program text while preventing illegal program file from installing The integrality of part, reduces the error rate of program file installation, and can be improved and verified to the legitimacy of program file The efficiency of process, and then improve the efficiency of program file installation process.
Detailed description of the invention
Fig. 1 is the flow diagram of one embodiment of program file installation method provided by the invention;
Fig. 2 is the structural schematic diagram of one embodiment of program file mounting device provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
It is the flow diagram of one embodiment of program file installation method provided by the invention, including step referring to Fig. 1 Rapid S11 to S13, specific as follows:
S11: obtaining program file to be installed, and reads the number of files positioned at designated position in described program file According to the first file data of acquisition;
S12: the first cryptographic calculation is carried out to first file data, obtains the first ciphertext;
S13: the file label of the outside of the file data positioned at described program file of comparison described program file and institute The first ciphertext is stated, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not phase Together, then described program file is not installed;Wherein, the file label of the legal installation file is by carrying out the second file data First cryptographic calculation generates;Second file data is located at described specify by reading in the legal installation file The file data of position obtains.
It should be noted that program file installation method is by client executing provided by the embodiment of the present invention.Program text Part is pre-stored in server end or other storage mediums (such as SD card, USB flash disk or CD).Client is installing some When program file, firstly, the program file is obtained from the server end or other storage mediums for storing the program file, and Part or all files data are read from the program file;Then, which is encrypted Operation, to obtain a ciphertext;Finally, carrying out school by the file label for comparing ciphertext obtained and the program file It tests, if ciphertext obtained is identical as the file label of the program file, illustrates that the program file is not tampered with and has Permission is installed, verification passes through, and determines that the program file is legal installation file, client installs the program file, if being obtained Ciphertext and program file file label it is not identical, then illustrate that the program file has been tampered or has been fitted without permission, school Failure is tested, determines that the program file is illegal installation file, client does not install the program file.SD card or USB flash disk or light Program file in the storage mediums such as disk is obtained by downloading from server end.Server end is for issuing and storing program text Part.Legal installation file be sent to server end publication before, for make or handle the legal installation file its His host side reads some or all of data in the legal installation file first, and carries out to some or all of data Cryptographic calculation, to obtain a ciphertext, then using the ciphertext as the file label of the legal installation file, and by the legal peace Dress file, which is sent in server end, to be issued.Particularly, the generating process of file label is completed by server end.It needs further Illustrate, file label is located at the outside of the file data of program file, i.e., file label is not included in program file Among appearance, thus will not Rogue program's file itself data, ensure that the integrality of program file, for example, file label can Think the filename etc. of program file.
In a preferred embodiment, client is literary from the program is stored when needing to install a certain program file The program file is obtained in the server end of part or other storage mediums, and reads in the program file and is located at designated position On file data, thus obtain the first file data;Then, the first cryptographic calculation is carried out to first file data, thus Obtain the first ciphertext;Finally, whether compare first ciphertext identical as the file label of the program file, if they are the same, then illustrate The program file is not tampered with and has installation permission, is legal installation file, client installs the program file, if not phase Together, then illustrate that the program file has been tampered or has been fitted without permission, be illegal installation file, client does not install the program File.The file label of legal installation file is passed through by a certain host side or server end in the reading legal installation file File data the second file data obtained being located on designated position carry out cryptographic calculation generation.Wherein, host side, clothes The position for the file data that device end and the client of being engaged in are read, and the type of cryptographic calculation carried out respectively are pre-stored within respectively From system in.If read file data and client are read in same position in the generating process of file label File data it is not identical, then it is assumed that the application program is tampered during transmission.If in the generating process of file label In position and client the reading position of file data of reading file data is different or used Encryption Algorithm not Together, then it is assumed that the program file is fitted without permission on the client.
For example, it is assumed that the file label of a certain application file is the filename of the application file, file name Generating process executed by a certain host side, it is assumed that in the host side own system it is pre-set read file data position It is the 0th byte to the 3rd byte, the cryptographic calculation carried out is md5 encryption operation, then the host side reads the application program The 0th byte in file to the 3rd byte file data " ABCD ", to obtain the second file data " ABCD ", and right Second file data carries out md5 encryption operation and obtains ciphertext " cb08ca4a7bb5f9683c19133a84872ca7 ", and with The application file, is finally sent in server end and issues by filename of the ciphertext as the application program.Assuming that this Client in example directly obtains the application file from server end and is installed, then if a certain client needs to pacify The application program is filled, then downloads the application file from server end, and this is read according to the setting in own system and is answered With the file data of designated position is located in program, to obtain the first file data, then first file data is carried out First cryptographic calculation, if ciphertext obtained is " cb08ca4a7bb5f9683c19133a84872ca7 ", then it is assumed that the application Program file is not tampered with and has installation permission, is legal installation file, and client installs the application program, otherwise objective Family end is not installed by the application program.If client reads the 0th byte of the application file to the number of files of the 3rd byte According to the first file data obtained be not " ABCD " or client read file data position be not the 0th byte extremely First Encryption Algorithm used by 3rd byte or client is not MD5 algorithm, is likely to that client is caused finally to obtain The ciphertext obtained is not " cb08ca4a7bb5f9683c19133a84872ca7 ", and client determines that the application program is illegal at this time Application program, it is not mountable.
Particularly, if client does not include text from program file acquired in server end or other storage mediums Part label, then it is assumed that the program file is fitted without permission in the client, is determined as illegal installation file, and client is not installed The program file.For example, it is assumed that the application file of study class generates corresponding file label according to method of the invention, And the application file of game class does not then generate corresponding file label according to method of the invention, then according to this hair Student's tablet computer that bright program file installation method carries out application file installation can only install the application of study class Program file, and the application file of game class cannot be installed.
Due to during installation procedure file, it is only necessary to read part or total data from program file The verifying for carrying out program file legitimacy, carries out fractionation parsing without the content to program file, therefore can prevent While illegal program file is installed, guarantee the integrality of program file, reduces the error rate of program file installation, and energy The efficiency for the process verified to the legitimacy of program file is enough improved, and then improves the efficiency of program file installation process.
It is preferably carried out in mode at another, obtains program file to be installed described, and read described program text The file data positioned at designated position in part, it is described that first file data is carried out after obtaining the first file data First cryptographic calculation, obtain the first ciphertext before, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password It generates;Second Crypted password is identical as the first password.
It should be noted that client is when needing to install a certain program file, from the server for storing the program file The program file is obtained in end or other storage mediums, and reads the number of files being located on designated position in the program file According to obtain the first file data;Then, first password is added to first file data and carries out the first cryptographic calculation, To obtain the first ciphertext;Finally, whether as the file label of the program file identical, if they are the same, then if comparing first ciphertext Illustrating that the program file is not tampered with and has installation permission, is legal installation file, client installs the program file, if It is not identical, then illustrate that the program file has been tampered or has been fitted without permission, be illegal installation file, client does not install this Program file.The file label of legal installation file by a certain host side or server end by be added to the second password or Person is added to the second file data for carrying out cryptographic calculation the second Crypted password generated to the second password and carries out cryptographic calculation It generates.The cryptographic calculation carried out to the second password can be identical with the cryptographic calculation carried out to the second file data, can also not Together.Wherein, host side, server end and client read the position of file data, and the cryptographic calculation carried out respectively Type is pre-stored in respective system.First password is pre-stored in the system of client or in installation procedure file During be manually entered by user.Second password is pre-stored within host side perhaps in the system of server end or in text It is manually entered in part name generating process by administrator.If read file data and client in the generating process of file label End read file data in same position is not identical, then it is assumed that the application program is tampered during transmission.If The position of reading file data in the generating process of file label is different from the client reading position of file data, or Used Encryption Algorithm is different, then it is assumed that the program file is fitted without permission on the client.When the life of file label At in the process in the second file data added by be the second password when, if first password and second password be not identical, Think that the program file is fitted without permission on the client;When in the generating process of file label in the second file data It is added when being the second Crypted password, if first password and second Crypted password be not identical, then it is assumed that the program file exists Permission is fitted without in the client.
The legitimate verification of program file is participated in by introducing password during the installation process, improving prevents illegal program The intensity of file installation.
It is preferably carried out in mode at another, obtains program file to be installed described, and read described program text The file data positioned at designated position in part, it is described that first file data is carried out after obtaining the first file data First cryptographic calculation, obtain the first ciphertext before, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password Cryptographic calculation generates;Second password is identical as the first password.
It should be noted that client is when needing to install a certain program file, from the server for storing the program file The program file is obtained in end or other storage mediums, and reads the number of files being located on designated position in the program file According to obtain the first file data;Then, which is added and first password progress cryptographic calculation is generated The first Crypted password and carry out the first cryptographic calculation, thus obtain the first ciphertext;Finally, comparing first ciphertext and the program Whether the file label of file is identical, if they are the same, then illustrates that the program file is not tampered with and has installation permission, is legal Installation file, client install the program file, if not identical, illustrate that the program file has been tampered or has been fitted without power Limit, is illegal installation file, client does not install the program file.The file label of legal installation file by a certain host side or Person's server end passes through to the second number of files being added to the second password progress cryptographic calculation the second Crypted password generated According to progress cryptographic calculation generation.The cryptographic calculation carried out to the second password can be with the cryptographic calculation carried out to the second file data It is identical, it can also be different.Wherein, host side, server end and client read the position of file data, and carry out respectively The type of cryptographic calculation be pre-stored in respective system.First password be pre-stored in the system of client or It is manually entered during installation procedure file by user.The system that second password is pre-stored within host side or server end In, or be manually entered by administrator in the generating process of file label.If being read in the generating process of file label File data and client read file data in same position it is not identical, then it is assumed that the application program is in transmission It is tampered in the process.If the position of the reading file data in the generating process of file label and client read file data The different perhaps used Encryption Algorithm in position is different or first password and the second password it is not identical, then it is assumed that the program File is fitted without permission on the client.
The legitimate verification of program file is participated in by introducing password during the installation process, improving prevents illegal program The intensity of file installation.
Further, first cryptographic calculation is irreversible operation.
It should be noted that the cryptographic calculation carried out in filename generating process to the second file data and client Holding the first cryptographic calculation carried out to the first file data is irreversible operation.For example, which can be The Encryption Algorithm operation such as CRC, MD4, MD5, SHA.
The cryptographic calculation and client carried out in the generating process of file label to the second file data is to first The first cryptographic calculation that file data is carried out is irreversible operation, can be improved the file label for decoding program file Difficulty to improve the difficulty for alterring program the file label of file, and then can further improve and prevent illegal program The intensity of file installation.
Further, the file label is the filename whole of described program file or the file of described program file A part in name.
It should be noted that file label be program file filename whole or filename a part, therefore, When client carries out legitimate verification to a certain program file obtained from server end or other storage mediums, only need The filename of ciphertext and the program file that operation obtains is compared, that is, can determine whether the program file is legal peace Fill file.
Program file installation method provided in an embodiment of the present invention, due to during installation procedure file, it is only necessary to Part or total data are read from program file can carry out the verifying of program file legitimacy, without to program text The content of part carries out fractionation parsing, therefore can guarantee the complete of program file while preventing illegal program file from installing Whole property, reduces the error rate of program file installation, and can be improved the process verified to the legitimacy of program file Efficiency, and then improve the efficiency of program file installation process.Also, program file is participated in by introducing password during the installation process Legitimate verification, improve the intensity for preventing illegal program file from installing.In addition, right in the generating process of file label The first cryptographic calculation that the cryptographic calculation and client that second file data is carried out carry out the first file data is Irreversible operation can be improved the difficulty for decoding the file label of program file, to improve the file for alterring program file The difficulty of label, and then the intensity for preventing illegal program file from installing can be further improved.
Correspondingly, the present invention also provides a kind of program file mounting device, it can be realized the program text in above-described embodiment All processes of part installation method.
Referring to fig. 2, be program file mounting device provided by the invention one embodiment structural schematic diagram, specifically such as Under:
First file data obtains module 21, for obtaining program file to be installed, and reads in described program file The file data positioned at designated position, obtain the first file data;
First ciphertext obtains module 22, and for carrying out the first cryptographic calculation to first file data, it is close to obtain first Text;And
Module 23, the text of the outside of the file data positioned at described program file for comparing described program file are installed Part label and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program text Part does not install described program file if not identical;Wherein, the file label of the legal installation file passes through to the second text Number of packages is generated according to first cryptographic calculation is carried out;Second file data is by reading the position in the legal installation file File data in the designated position obtains.
It is preferably carried out in mode at another, described program file mounting device, further includes:
First password adding module, for pre-set first password to be added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password It generates;Second Crypted password is identical as the first password.
It is preferably carried out in mode at another, described program file mounting device, further includes:
First Crypted password obtains module, for carrying out the second cryptographic calculation to pre-set first password, obtains the One Crypted password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file A part in name.
Program file mounting device provided in an embodiment of the present invention, due to during installation procedure file, it is only necessary to Part or total data are read from program file can carry out the verifying of program file legitimacy, without to program text The content of part carries out fractionation parsing, therefore can guarantee the complete of program file while preventing illegal program file from installing Whole property, reduces the error rate of program file installation, and can be improved the process verified to the legitimacy of program file Efficiency, and then improve the efficiency of program file installation process.Also, journey file is participated in by introducing password during the installation process Legitimate verification improves the intensity for preventing illegal program file from installing.In addition, in the generating process of file label The first cryptographic calculation that the cryptographic calculation and client that two file datas are carried out carry out the first file data is not Reversible operation can be improved the difficulty for decoding the file label of program file, to improve the files-designated for alterring program file The difficulty of label, and then the intensity for preventing illegal program file from installing can be further improved.
The above is a preferred embodiment of the present invention, it is noted that for those skilled in the art For, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (10)

1. a kind of program file installation method characterized by comprising
Program file to be installed is obtained, and reads the file data positioned at designated position in described program file, obtains the One file data;
First cryptographic calculation is carried out to first file data, obtains the first ciphertext;
Compare the file label of the outside of the file data positioned at described program file of described program file and described first close Text, if they are the same, it is determined that described program file is legal installation file, and installs described program file, uneasy if not identical Fill described program file;Wherein, the file label of the legal installation file is by host side or server end to the second file Data carry out first cryptographic calculation and generate;It is described legal that second file data is read by host side or server end The file data positioned at the designated position in installation file obtains.
2. program file installation method as described in claim 1, which is characterized in that obtain program text to be installed described Part, and the file data positioned at designated position in described program file is read, it is described to institute after obtaining the first file data State the first file data carry out the first cryptographic calculation, obtain the first ciphertext before, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file is by adding pre-set second password to second file data And it carries out first cryptographic calculation and generates;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is gone forward side by side by adding the second Crypted password to second file data Row first cryptographic calculation generates;Second Crypted password is raw by carrying out the second cryptographic calculation to second password At;Second Crypted password is identical as the first password.
3. program file installation method as described in claim 1, which is characterized in that obtain program text to be installed described Part, and the file data positioned at designated position in described program file is read, it is described to institute after obtaining the first file data State the first file data carry out the first cryptographic calculation, obtain the first ciphertext before, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password to second file data and carrying out First cryptographic calculation generates;Second Crypted password is by carrying out second encryption to pre-set second password Operation generates;Second password is identical as the first password.
4. program file installation method as described in any one of claims 1 to 3, which is characterized in that first cryptographic calculation For irreversible operation.
5. program file installation method as described in any one of claims 1 to 3, which is characterized in that the file label is institute State a part in the filename whole of program file or the filename of described program file.
6. a kind of program file mounting device characterized by comprising
First file data obtains module, for obtaining program file to be installed, and reads being located in described program file The file data of designated position obtains the first file data;
First ciphertext obtains module, for carrying out the first cryptographic calculation to first file data, obtains the first ciphertext;With And
Module, the file label of the outside of the file data positioned at described program file for comparing described program file are installed With first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if It is not identical, then described program file is not installed;Wherein, the file label of the legal installation file passes through host side or server End carries out first cryptographic calculation to the second file data and generates;Second file data passes through host side or server end The file data positioned at the designated position read in the legal installation file obtains.
7. program file mounting device as claimed in claim 6, which is characterized in that described program file mounting device also wraps It includes:
First password adding module, for pre-set first password to be added in first file data;
Then, the file label of the legal installation file is by adding pre-set second password to second file data And it carries out first cryptographic calculation and generates;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is gone forward side by side by adding the second Crypted password to second file data Row first cryptographic calculation generates;Second Crypted password is raw by carrying out the second cryptographic calculation to second password At;Second Crypted password is identical as the first password.
8. program file mounting device as claimed in claim 6, which is characterized in that described program file mounting device also wraps It includes:
First Crypted password obtains module, for carrying out the second cryptographic calculation to pre-set first password, obtains first and adds Password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password to second file data and carrying out First cryptographic calculation generates;Second Crypted password is by carrying out second encryption to pre-set second password Operation generates;Second password is identical as the first password.
9. such as the described in any item program file mounting devices of claim 6 to 8, which is characterized in that first cryptographic calculation For irreversible operation.
10. such as the described in any item program file mounting devices of claim 6 to 8, which is characterized in that the file label is institute State a part in the filename whole of program file or the filename of described program file.
CN201610645809.9A 2016-08-08 2016-08-08 Program file installation method and device Active CN106250194B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610645809.9A CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610645809.9A CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Publications (2)

Publication Number Publication Date
CN106250194A CN106250194A (en) 2016-12-21
CN106250194B true CN106250194B (en) 2019-06-21

Family

ID=58079265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610645809.9A Active CN106250194B (en) 2016-08-08 2016-08-08 Program file installation method and device

Country Status (1)

Country Link
CN (1) CN106250194B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111723365B (en) * 2020-06-30 2023-03-17 亿咖通(湖北)技术有限公司 Method and equipment for installing application program in vehicle-mounted information entertainment system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652057A (en) * 2004-02-06 2005-08-10 恩益禧电子股份有限公司 Apparatus and method for program tamper detection ,and program
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
WO2014102523A2 (en) * 2012-12-31 2014-07-03 British Telecommunications Public Limited Company Processing device and method of operation thereof
CN105119888A (en) * 2015-07-10 2015-12-02 小米科技有限责任公司 Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652057A (en) * 2004-02-06 2005-08-10 恩益禧电子股份有限公司 Apparatus and method for program tamper detection ,and program
CN102446106A (en) * 2010-09-30 2012-05-09 联想(北京)有限公司 Installation management method, server and terminal for application program
WO2014102523A2 (en) * 2012-12-31 2014-07-03 British Telecommunications Public Limited Company Processing device and method of operation thereof
CN105119888A (en) * 2015-07-10 2015-12-02 小米科技有限责任公司 Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device
CN105516246A (en) * 2015-11-25 2016-04-20 魅族科技(中国)有限公司 Method for preventing application program downloading hijacking and server

Also Published As

Publication number Publication date
CN106250194A (en) 2016-12-21

Similar Documents

Publication Publication Date Title
TWI557589B (en) Secure software product identifier for product validation and activation
US10547604B2 (en) Information recording apparatus with shadow boot program for authentication with a server
CN109313690B (en) Self-contained encrypted boot policy verification
US8150039B2 (en) Single security model in booting a computing device
US8874922B2 (en) Systems and methods for multi-layered authentication/verification of trusted platform updates
JP6332970B2 (en) System and method for secure software update
CN110677376B (en) Authentication method, related device and system and computer readable storage medium
US20090259855A1 (en) Code Image Personalization For A Computing Device
CN110688660B (en) Method and device for safely starting terminal and storage medium
TWI436235B (en) Data encryption method and system, data decryption method
US11093587B2 (en) Software wrapper and installer using timestamp validation and system identification validation
CN110795126A (en) Firmware safety upgrading system
US20040177260A1 (en) System and method for remote code integrity in distributed systems
US11838282B2 (en) Information recording apparatus with server-based user authentication for accessing a locked operating system storage
CN106250194B (en) Program file installation method and device
CN114546506B (en) Authorization method, device, equipment and medium for embedded operating system
TWI473488B (en) Method and storage device for protecting digital content
CN110414216B (en) Safe loading method and system for vehicle-mounted T-Box program code
CN107070648A (en) A kind of cryptographic key protection method and PKI system
US11468188B2 (en) Smart deployai data pipeline digital signing and encryption
CN114629641B (en) Code downloading starting safety protection method and device based on safety chip
CN109660355B (en) Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered
CN107483462A (en) The operating right management system and method for a kind of outgoing USB flash disk
KR20010095907A (en) A contents providing system and the providing method with new security technology
Rawat et al. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant