CN106250194B - Program file installation method and device - Google Patents
Program file installation method and device Download PDFInfo
- Publication number
- CN106250194B CN106250194B CN201610645809.9A CN201610645809A CN106250194B CN 106250194 B CN106250194 B CN 106250194B CN 201610645809 A CN201610645809 A CN 201610645809A CN 106250194 B CN106250194 B CN 106250194B
- Authority
- CN
- China
- Prior art keywords
- file
- password
- program
- program file
- file data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Abstract
The invention discloses a kind of program file installation method and devices.Described program file installation method includes: to obtain program file to be installed, and read the file data positioned at designated position in described program file, obtains the first file data;First cryptographic calculation is carried out to first file data, obtains the first ciphertext;The file label of the outside positioned at described program file of comparison described program file and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not identical, does not install described program file;Wherein, the file label of the legal installation file is generated by carrying out first cryptographic calculation to the second file data;Second file data is obtained by the file data positioned at the designated position read in the legal installation file.It using the embodiment of the present invention, can guarantee the integrality of program file, and can be improved the efficiency of program file installation process.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of program file installation methods and device.
Background technique
In most computer system, to prevent illegal application program from installing, on the one hand, to prevent from being tampered
On the other hand application program installation will prevent the application program installation for being fitted without permission, for example, in the tablet computer of student
In, can only allow that certain specific application programs are installed.It is existing prevent unauthorized applications install technical solution be mainly
It is realized by using installation password or using digital signature.
In the technical solution using installation password, each application program has unique corresponding for preventing from illegally pacifying
The installation password of dress requires administrator and is manually entered corresponding installation password to verify per when installing the application, when
Ability mountable application program when being verified.In the technical scheme, due to requiring pipe when installing application program each time
Reason person is manually entered installation password in person, to install the same application program in 1000 computers, then needs administrator
Repetition is manually entered 1000 installation passwords, therefore the heavy workload of installation process, inefficiency,
In the technical solution using digital signature, before release application program, according to the content and private of application program
Key generates corresponding ciphertext, and the ciphertext is deposited in application program;It when the application is installed, first will be in application program
Ciphertext extracts, and reuses corresponding public key and the ciphertext is decrypted, if successful decryption, installs the application program, if
It is unsuccessful, then it does not install.In the technical scheme, after due to generating corresponding ciphertext according to the content and private key of application program,
The ciphertext can be deposited in application program, therefore the process can destroy original application file data, be easy to cause and answer
It is malfunctioned with program file;During the installation process, it needs first to extract the ciphertext in application program, then is decrypted, therefore
The process very complicated of installation, the inefficiency of installation.
Summary of the invention
The present invention proposes a kind of program file installation method and device, can guarantee the integrality of program file, and can
Improve the efficiency of program file installation process.
The present invention proposes a kind of program file installation method, specifically includes:
Program file to be installed is obtained, and reads the file data positioned at designated position in described program file, is obtained
Obtain the first file data;
First cryptographic calculation is carried out to first file data, obtains the first ciphertext;
Compare the file label and described the of the outside of the file data positioned at described program file of described program file
One ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not identical,
Described program file is not installed;Wherein, the file label of the legal installation file passes through to described in the progress of the second file data
First cryptographic calculation generates;Second file data is located at the designated position by reading in the legal installation file
File data obtain.
Further, program file to be installed is obtained described, and reads in described program file and is located at specific bit
The file data set, it is described that first cryptographic calculation is carried out to first file data after obtaining the first file data, it obtains
Before first ciphertext, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second
Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data
And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password
It generates;Second Crypted password is identical as the first password.
Further, program file to be installed is obtained described, and reads in described program file and is located at specific bit
The file data set, it is described that first cryptographic calculation is carried out to first file data after obtaining the first file data, it obtains
Before first ciphertext, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data
First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password
Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file
A part in name.
Correspondingly, it the present invention also provides a kind of program file mounting device, specifically includes:
First file data obtains module, for obtaining program file to be installed, and reads in described program file
File data positioned at designated position obtains the first file data;
First ciphertext obtains module, for carrying out the first cryptographic calculation to first file data, obtains the first ciphertext;
And
Module, the file of the outside of the file data positioned at described program file for comparing described program file are installed
Label and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program text
Part does not install described program file if not identical;Wherein, the file label of the legal installation file passes through to the second text
Number of packages is generated according to first cryptographic calculation is carried out;Second file data is by reading the position in the legal installation file
File data in the designated position obtains.
Further, first password adding module, for pre-set first password to be added to first file
In data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second
Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data
And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password
It generates;Second Crypted password is identical as the first password.
Further, the first Crypted password obtains module, transports for carrying out the second encryption to pre-set first password
It calculates, obtains the first Crypted password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data
First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password
Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file
A part in name.
The invention has the following beneficial effects:
Program file installation method and device provided in an embodiment of the present invention, due to during installation procedure file,
The verifying of program file legitimacy can be carried out by only needing to read part or total data from program file, without right
The content of program file carries out fractionation parsing, therefore can guarantee program text while preventing illegal program file from installing
The integrality of part, reduces the error rate of program file installation, and can be improved and verified to the legitimacy of program file
The efficiency of process, and then improve the efficiency of program file installation process.
Detailed description of the invention
Fig. 1 is the flow diagram of one embodiment of program file installation method provided by the invention;
Fig. 2 is the structural schematic diagram of one embodiment of program file mounting device provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
It is the flow diagram of one embodiment of program file installation method provided by the invention, including step referring to Fig. 1
Rapid S11 to S13, specific as follows:
S11: obtaining program file to be installed, and reads the number of files positioned at designated position in described program file
According to the first file data of acquisition;
S12: the first cryptographic calculation is carried out to first file data, obtains the first ciphertext;
S13: the file label of the outside of the file data positioned at described program file of comparison described program file and institute
The first ciphertext is stated, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if not phase
Together, then described program file is not installed;Wherein, the file label of the legal installation file is by carrying out the second file data
First cryptographic calculation generates;Second file data is located at described specify by reading in the legal installation file
The file data of position obtains.
It should be noted that program file installation method is by client executing provided by the embodiment of the present invention.Program text
Part is pre-stored in server end or other storage mediums (such as SD card, USB flash disk or CD).Client is installing some
When program file, firstly, the program file is obtained from the server end or other storage mediums for storing the program file, and
Part or all files data are read from the program file;Then, which is encrypted
Operation, to obtain a ciphertext;Finally, carrying out school by the file label for comparing ciphertext obtained and the program file
It tests, if ciphertext obtained is identical as the file label of the program file, illustrates that the program file is not tampered with and has
Permission is installed, verification passes through, and determines that the program file is legal installation file, client installs the program file, if being obtained
Ciphertext and program file file label it is not identical, then illustrate that the program file has been tampered or has been fitted without permission, school
Failure is tested, determines that the program file is illegal installation file, client does not install the program file.SD card or USB flash disk or light
Program file in the storage mediums such as disk is obtained by downloading from server end.Server end is for issuing and storing program text
Part.Legal installation file be sent to server end publication before, for make or handle the legal installation file its
His host side reads some or all of data in the legal installation file first, and carries out to some or all of data
Cryptographic calculation, to obtain a ciphertext, then using the ciphertext as the file label of the legal installation file, and by the legal peace
Dress file, which is sent in server end, to be issued.Particularly, the generating process of file label is completed by server end.It needs further
Illustrate, file label is located at the outside of the file data of program file, i.e., file label is not included in program file
Among appearance, thus will not Rogue program's file itself data, ensure that the integrality of program file, for example, file label can
Think the filename etc. of program file.
In a preferred embodiment, client is literary from the program is stored when needing to install a certain program file
The program file is obtained in the server end of part or other storage mediums, and reads in the program file and is located at designated position
On file data, thus obtain the first file data;Then, the first cryptographic calculation is carried out to first file data, thus
Obtain the first ciphertext;Finally, whether compare first ciphertext identical as the file label of the program file, if they are the same, then illustrate
The program file is not tampered with and has installation permission, is legal installation file, client installs the program file, if not phase
Together, then illustrate that the program file has been tampered or has been fitted without permission, be illegal installation file, client does not install the program
File.The file label of legal installation file is passed through by a certain host side or server end in the reading legal installation file
File data the second file data obtained being located on designated position carry out cryptographic calculation generation.Wherein, host side, clothes
The position for the file data that device end and the client of being engaged in are read, and the type of cryptographic calculation carried out respectively are pre-stored within respectively
From system in.If read file data and client are read in same position in the generating process of file label
File data it is not identical, then it is assumed that the application program is tampered during transmission.If in the generating process of file label
In position and client the reading position of file data of reading file data is different or used Encryption Algorithm not
Together, then it is assumed that the program file is fitted without permission on the client.
For example, it is assumed that the file label of a certain application file is the filename of the application file, file name
Generating process executed by a certain host side, it is assumed that in the host side own system it is pre-set read file data position
It is the 0th byte to the 3rd byte, the cryptographic calculation carried out is md5 encryption operation, then the host side reads the application program
The 0th byte in file to the 3rd byte file data " ABCD ", to obtain the second file data " ABCD ", and right
Second file data carries out md5 encryption operation and obtains ciphertext " cb08ca4a7bb5f9683c19133a84872ca7 ", and with
The application file, is finally sent in server end and issues by filename of the ciphertext as the application program.Assuming that this
Client in example directly obtains the application file from server end and is installed, then if a certain client needs to pacify
The application program is filled, then downloads the application file from server end, and this is read according to the setting in own system and is answered
With the file data of designated position is located in program, to obtain the first file data, then first file data is carried out
First cryptographic calculation, if ciphertext obtained is " cb08ca4a7bb5f9683c19133a84872ca7 ", then it is assumed that the application
Program file is not tampered with and has installation permission, is legal installation file, and client installs the application program, otherwise objective
Family end is not installed by the application program.If client reads the 0th byte of the application file to the number of files of the 3rd byte
According to the first file data obtained be not " ABCD " or client read file data position be not the 0th byte extremely
First Encryption Algorithm used by 3rd byte or client is not MD5 algorithm, is likely to that client is caused finally to obtain
The ciphertext obtained is not " cb08ca4a7bb5f9683c19133a84872ca7 ", and client determines that the application program is illegal at this time
Application program, it is not mountable.
Particularly, if client does not include text from program file acquired in server end or other storage mediums
Part label, then it is assumed that the program file is fitted without permission in the client, is determined as illegal installation file, and client is not installed
The program file.For example, it is assumed that the application file of study class generates corresponding file label according to method of the invention,
And the application file of game class does not then generate corresponding file label according to method of the invention, then according to this hair
Student's tablet computer that bright program file installation method carries out application file installation can only install the application of study class
Program file, and the application file of game class cannot be installed.
Due to during installation procedure file, it is only necessary to read part or total data from program file
The verifying for carrying out program file legitimacy, carries out fractionation parsing without the content to program file, therefore can prevent
While illegal program file is installed, guarantee the integrality of program file, reduces the error rate of program file installation, and energy
The efficiency for the process verified to the legitimacy of program file is enough improved, and then improves the efficiency of program file installation process.
It is preferably carried out in mode at another, obtains program file to be installed described, and read described program text
The file data positioned at designated position in part, it is described that first file data is carried out after obtaining the first file data
First cryptographic calculation, obtain the first ciphertext before, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second
Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data
And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password
It generates;Second Crypted password is identical as the first password.
It should be noted that client is when needing to install a certain program file, from the server for storing the program file
The program file is obtained in end or other storage mediums, and reads the number of files being located on designated position in the program file
According to obtain the first file data;Then, first password is added to first file data and carries out the first cryptographic calculation,
To obtain the first ciphertext;Finally, whether as the file label of the program file identical, if they are the same, then if comparing first ciphertext
Illustrating that the program file is not tampered with and has installation permission, is legal installation file, client installs the program file, if
It is not identical, then illustrate that the program file has been tampered or has been fitted without permission, be illegal installation file, client does not install this
Program file.The file label of legal installation file by a certain host side or server end by be added to the second password or
Person is added to the second file data for carrying out cryptographic calculation the second Crypted password generated to the second password and carries out cryptographic calculation
It generates.The cryptographic calculation carried out to the second password can be identical with the cryptographic calculation carried out to the second file data, can also not
Together.Wherein, host side, server end and client read the position of file data, and the cryptographic calculation carried out respectively
Type is pre-stored in respective system.First password is pre-stored in the system of client or in installation procedure file
During be manually entered by user.Second password is pre-stored within host side perhaps in the system of server end or in text
It is manually entered in part name generating process by administrator.If read file data and client in the generating process of file label
End read file data in same position is not identical, then it is assumed that the application program is tampered during transmission.If
The position of reading file data in the generating process of file label is different from the client reading position of file data, or
Used Encryption Algorithm is different, then it is assumed that the program file is fitted without permission on the client.When the life of file label
At in the process in the second file data added by be the second password when, if first password and second password be not identical,
Think that the program file is fitted without permission on the client;When in the generating process of file label in the second file data
It is added when being the second Crypted password, if first password and second Crypted password be not identical, then it is assumed that the program file exists
Permission is fitted without in the client.
The legitimate verification of program file is participated in by introducing password during the installation process, improving prevents illegal program
The intensity of file installation.
It is preferably carried out in mode at another, obtains program file to be installed described, and read described program text
The file data positioned at designated position in part, it is described that first file data is carried out after obtaining the first file data
First cryptographic calculation, obtain the first ciphertext before, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data
First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password
Cryptographic calculation generates;Second password is identical as the first password.
It should be noted that client is when needing to install a certain program file, from the server for storing the program file
The program file is obtained in end or other storage mediums, and reads the number of files being located on designated position in the program file
According to obtain the first file data;Then, which is added and first password progress cryptographic calculation is generated
The first Crypted password and carry out the first cryptographic calculation, thus obtain the first ciphertext;Finally, comparing first ciphertext and the program
Whether the file label of file is identical, if they are the same, then illustrates that the program file is not tampered with and has installation permission, is legal
Installation file, client install the program file, if not identical, illustrate that the program file has been tampered or has been fitted without power
Limit, is illegal installation file, client does not install the program file.The file label of legal installation file by a certain host side or
Person's server end passes through to the second number of files being added to the second password progress cryptographic calculation the second Crypted password generated
According to progress cryptographic calculation generation.The cryptographic calculation carried out to the second password can be with the cryptographic calculation carried out to the second file data
It is identical, it can also be different.Wherein, host side, server end and client read the position of file data, and carry out respectively
The type of cryptographic calculation be pre-stored in respective system.First password be pre-stored in the system of client or
It is manually entered during installation procedure file by user.The system that second password is pre-stored within host side or server end
In, or be manually entered by administrator in the generating process of file label.If being read in the generating process of file label
File data and client read file data in same position it is not identical, then it is assumed that the application program is in transmission
It is tampered in the process.If the position of the reading file data in the generating process of file label and client read file data
The different perhaps used Encryption Algorithm in position is different or first password and the second password it is not identical, then it is assumed that the program
File is fitted without permission on the client.
The legitimate verification of program file is participated in by introducing password during the installation process, improving prevents illegal program
The intensity of file installation.
Further, first cryptographic calculation is irreversible operation.
It should be noted that the cryptographic calculation carried out in filename generating process to the second file data and client
Holding the first cryptographic calculation carried out to the first file data is irreversible operation.For example, which can be
The Encryption Algorithm operation such as CRC, MD4, MD5, SHA.
The cryptographic calculation and client carried out in the generating process of file label to the second file data is to first
The first cryptographic calculation that file data is carried out is irreversible operation, can be improved the file label for decoding program file
Difficulty to improve the difficulty for alterring program the file label of file, and then can further improve and prevent illegal program
The intensity of file installation.
Further, the file label is the filename whole of described program file or the file of described program file
A part in name.
It should be noted that file label be program file filename whole or filename a part, therefore,
When client carries out legitimate verification to a certain program file obtained from server end or other storage mediums, only need
The filename of ciphertext and the program file that operation obtains is compared, that is, can determine whether the program file is legal peace
Fill file.
Program file installation method provided in an embodiment of the present invention, due to during installation procedure file, it is only necessary to
Part or total data are read from program file can carry out the verifying of program file legitimacy, without to program text
The content of part carries out fractionation parsing, therefore can guarantee the complete of program file while preventing illegal program file from installing
Whole property, reduces the error rate of program file installation, and can be improved the process verified to the legitimacy of program file
Efficiency, and then improve the efficiency of program file installation process.Also, program file is participated in by introducing password during the installation process
Legitimate verification, improve the intensity for preventing illegal program file from installing.In addition, right in the generating process of file label
The first cryptographic calculation that the cryptographic calculation and client that second file data is carried out carry out the first file data is
Irreversible operation can be improved the difficulty for decoding the file label of program file, to improve the file for alterring program file
The difficulty of label, and then the intensity for preventing illegal program file from installing can be further improved.
Correspondingly, the present invention also provides a kind of program file mounting device, it can be realized the program text in above-described embodiment
All processes of part installation method.
Referring to fig. 2, be program file mounting device provided by the invention one embodiment structural schematic diagram, specifically such as
Under:
First file data obtains module 21, for obtaining program file to be installed, and reads in described program file
The file data positioned at designated position, obtain the first file data;
First ciphertext obtains module 22, and for carrying out the first cryptographic calculation to first file data, it is close to obtain first
Text;And
Module 23, the text of the outside of the file data positioned at described program file for comparing described program file are installed
Part label and first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program text
Part does not install described program file if not identical;Wherein, the file label of the legal installation file passes through to the second text
Number of packages is generated according to first cryptographic calculation is carried out;Second file data is by reading the position in the legal installation file
File data in the designated position obtains.
It is preferably carried out in mode at another, described program file mounting device, further includes:
First password adding module, for pre-set first password to be added in first file data;
Then, the file label of the legal installation file passes through to second file data addition pre-set second
Password simultaneously carries out the first cryptographic calculation generation;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is by adding the second Crypted password to second file data
And it carries out first cryptographic calculation and generates;Second Crypted password is by carrying out the second cryptographic calculation to second password
It generates;Second Crypted password is identical as the first password.
It is preferably carried out in mode at another, described program file mounting device, further includes:
First Crypted password obtains module, for carrying out the second cryptographic calculation to pre-set first password, obtains the
One Crypted password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password simultaneously to second file data
First cryptographic calculation is carried out to generate;Second Crypted password is by carrying out described second to pre-set second password
Cryptographic calculation generates;Second password is identical as the first password.
Further, first cryptographic calculation is irreversible operation.
Further, the file label is the filename whole of described program file or the file of described program file
A part in name.
Program file mounting device provided in an embodiment of the present invention, due to during installation procedure file, it is only necessary to
Part or total data are read from program file can carry out the verifying of program file legitimacy, without to program text
The content of part carries out fractionation parsing, therefore can guarantee the complete of program file while preventing illegal program file from installing
Whole property, reduces the error rate of program file installation, and can be improved the process verified to the legitimacy of program file
Efficiency, and then improve the efficiency of program file installation process.Also, journey file is participated in by introducing password during the installation process
Legitimate verification improves the intensity for preventing illegal program file from installing.In addition, in the generating process of file label
The first cryptographic calculation that the cryptographic calculation and client that two file datas are carried out carry out the first file data is not
Reversible operation can be improved the difficulty for decoding the file label of program file, to improve the files-designated for alterring program file
The difficulty of label, and then the intensity for preventing illegal program file from installing can be further improved.
The above is a preferred embodiment of the present invention, it is noted that for those skilled in the art
For, without departing from the principle of the present invention, it can also make several improvements and retouch, these improvements and modifications are also considered as
Protection scope of the present invention.
Claims (10)
1. a kind of program file installation method characterized by comprising
Program file to be installed is obtained, and reads the file data positioned at designated position in described program file, obtains the
One file data;
First cryptographic calculation is carried out to first file data, obtains the first ciphertext;
Compare the file label of the outside of the file data positioned at described program file of described program file and described first close
Text, if they are the same, it is determined that described program file is legal installation file, and installs described program file, uneasy if not identical
Fill described program file;Wherein, the file label of the legal installation file is by host side or server end to the second file
Data carry out first cryptographic calculation and generate;It is described legal that second file data is read by host side or server end
The file data positioned at the designated position in installation file obtains.
2. program file installation method as described in claim 1, which is characterized in that obtain program text to be installed described
Part, and the file data positioned at designated position in described program file is read, it is described to institute after obtaining the first file data
State the first file data carry out the first cryptographic calculation, obtain the first ciphertext before, further includes:
Pre-set first password is added in first file data;
Then, the file label of the legal installation file is by adding pre-set second password to second file data
And it carries out first cryptographic calculation and generates;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is gone forward side by side by adding the second Crypted password to second file data
Row first cryptographic calculation generates;Second Crypted password is raw by carrying out the second cryptographic calculation to second password
At;Second Crypted password is identical as the first password.
3. program file installation method as described in claim 1, which is characterized in that obtain program text to be installed described
Part, and the file data positioned at designated position in described program file is read, it is described to institute after obtaining the first file data
State the first file data carry out the first cryptographic calculation, obtain the first ciphertext before, further includes:
Second cryptographic calculation is carried out to pre-set first password, obtains the first Crypted password;
First Crypted password is added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password to second file data and carrying out
First cryptographic calculation generates;Second Crypted password is by carrying out second encryption to pre-set second password
Operation generates;Second password is identical as the first password.
4. program file installation method as described in any one of claims 1 to 3, which is characterized in that first cryptographic calculation
For irreversible operation.
5. program file installation method as described in any one of claims 1 to 3, which is characterized in that the file label is institute
State a part in the filename whole of program file or the filename of described program file.
6. a kind of program file mounting device characterized by comprising
First file data obtains module, for obtaining program file to be installed, and reads being located in described program file
The file data of designated position obtains the first file data;
First ciphertext obtains module, for carrying out the first cryptographic calculation to first file data, obtains the first ciphertext;With
And
Module, the file label of the outside of the file data positioned at described program file for comparing described program file are installed
With first ciphertext, if they are the same, it is determined that described program file is legal installation file, and installs described program file, if
It is not identical, then described program file is not installed;Wherein, the file label of the legal installation file passes through host side or server
End carries out first cryptographic calculation to the second file data and generates;Second file data passes through host side or server end
The file data positioned at the designated position read in the legal installation file obtains.
7. program file mounting device as claimed in claim 6, which is characterized in that described program file mounting device also wraps
It includes:
First password adding module, for pre-set first password to be added in first file data;
Then, the file label of the legal installation file is by adding pre-set second password to second file data
And it carries out first cryptographic calculation and generates;Second password is identical as the first password;
Alternatively, the file label of the legal installation file is gone forward side by side by adding the second Crypted password to second file data
Row first cryptographic calculation generates;Second Crypted password is raw by carrying out the second cryptographic calculation to second password
At;Second Crypted password is identical as the first password.
8. program file mounting device as claimed in claim 6, which is characterized in that described program file mounting device also wraps
It includes:
First Crypted password obtains module, for carrying out the second cryptographic calculation to pre-set first password, obtains first and adds
Password;And
First Crypted password adding module, for first Crypted password to be added in first file data;
Then, the file label of the legal installation file is by adding the second Crypted password to second file data and carrying out
First cryptographic calculation generates;Second Crypted password is by carrying out second encryption to pre-set second password
Operation generates;Second password is identical as the first password.
9. such as the described in any item program file mounting devices of claim 6 to 8, which is characterized in that first cryptographic calculation
For irreversible operation.
10. such as the described in any item program file mounting devices of claim 6 to 8, which is characterized in that the file label is institute
State a part in the filename whole of program file or the filename of described program file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610645809.9A CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610645809.9A CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106250194A CN106250194A (en) | 2016-12-21 |
CN106250194B true CN106250194B (en) | 2019-06-21 |
Family
ID=58079265
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610645809.9A Active CN106250194B (en) | 2016-08-08 | 2016-08-08 | Program file installation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106250194B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111723365B (en) * | 2020-06-30 | 2023-03-17 | 亿咖通(湖北)技术有限公司 | Method and equipment for installing application program in vehicle-mounted information entertainment system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652057A (en) * | 2004-02-06 | 2005-08-10 | 恩益禧电子股份有限公司 | Apparatus and method for program tamper detection ,and program |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
WO2014102523A2 (en) * | 2012-12-31 | 2014-07-03 | British Telecommunications Public Limited Company | Processing device and method of operation thereof |
CN105119888A (en) * | 2015-07-10 | 2015-12-02 | 小米科技有限责任公司 | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device |
CN105516246A (en) * | 2015-11-25 | 2016-04-20 | 魅族科技(中国)有限公司 | Method for preventing application program downloading hijacking and server |
-
2016
- 2016-08-08 CN CN201610645809.9A patent/CN106250194B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652057A (en) * | 2004-02-06 | 2005-08-10 | 恩益禧电子股份有限公司 | Apparatus and method for program tamper detection ,and program |
CN102446106A (en) * | 2010-09-30 | 2012-05-09 | 联想(北京)有限公司 | Installation management method, server and terminal for application program |
WO2014102523A2 (en) * | 2012-12-31 | 2014-07-03 | British Telecommunications Public Limited Company | Processing device and method of operation thereof |
CN105119888A (en) * | 2015-07-10 | 2015-12-02 | 小米科技有限责任公司 | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device |
CN105516246A (en) * | 2015-11-25 | 2016-04-20 | 魅族科技(中国)有限公司 | Method for preventing application program downloading hijacking and server |
Also Published As
Publication number | Publication date |
---|---|
CN106250194A (en) | 2016-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI557589B (en) | Secure software product identifier for product validation and activation | |
US10547604B2 (en) | Information recording apparatus with shadow boot program for authentication with a server | |
CN109313690B (en) | Self-contained encrypted boot policy verification | |
US8150039B2 (en) | Single security model in booting a computing device | |
US8874922B2 (en) | Systems and methods for multi-layered authentication/verification of trusted platform updates | |
JP6332970B2 (en) | System and method for secure software update | |
CN110677376B (en) | Authentication method, related device and system and computer readable storage medium | |
US20090259855A1 (en) | Code Image Personalization For A Computing Device | |
CN110688660B (en) | Method and device for safely starting terminal and storage medium | |
TWI436235B (en) | Data encryption method and system, data decryption method | |
US11093587B2 (en) | Software wrapper and installer using timestamp validation and system identification validation | |
CN110795126A (en) | Firmware safety upgrading system | |
US20040177260A1 (en) | System and method for remote code integrity in distributed systems | |
US11838282B2 (en) | Information recording apparatus with server-based user authentication for accessing a locked operating system storage | |
CN106250194B (en) | Program file installation method and device | |
CN114546506B (en) | Authorization method, device, equipment and medium for embedded operating system | |
TWI473488B (en) | Method and storage device for protecting digital content | |
CN110414216B (en) | Safe loading method and system for vehicle-mounted T-Box program code | |
CN107070648A (en) | A kind of cryptographic key protection method and PKI system | |
US11468188B2 (en) | Smart deployai data pipeline digital signing and encryption | |
CN114629641B (en) | Code downloading starting safety protection method and device based on safety chip | |
CN109660355B (en) | Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered | |
CN107483462A (en) | The operating right management system and method for a kind of outgoing USB flash disk | |
KR20010095907A (en) | A contents providing system and the providing method with new security technology | |
Rawat et al. | Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |