CN106709284A - Root package validation method and device - Google Patents

Root package validation method and device Download PDF

Info

Publication number
CN106709284A
CN106709284A CN201611036621.0A CN201611036621A CN106709284A CN 106709284 A CN106709284 A CN 106709284A CN 201611036621 A CN201611036621 A CN 201611036621A CN 106709284 A CN106709284 A CN 106709284A
Authority
CN
China
Prior art keywords
brush machine
machine bag
check value
bag
brush
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611036621.0A
Other languages
Chinese (zh)
Inventor
张霄
史博琼
朱立元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611036621.0A priority Critical patent/CN106709284A/en
Publication of CN106709284A publication Critical patent/CN106709284A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot

Abstract

The invention relates to a root package validation method and a device. The method comprises: storing a root package in a pre-set encrypted path; acquiring a check value of the root package in an encrypted path after getting start instruction of root package; and operating the root package if the check value of the root package is consistent with the pre-stored standard check value. Compared with relevant technology, the root package validation method and the device can check before the root package starts operation, which prevents the root package of illegal source from running on the terminal device and guarantees the legitimacy of root packages, protects the security of users and improves the success rate of flashing without linked network.

Description

Brush machine bag verification method and device
Technical field
This disclosure relates to computer technology, more particularly to a kind of brush machine bag verification method and device.
Background technology
With the development of computer technology, the use of terminal device is more and more extensive.Mistake of the user in using terminal equipment Cheng Zhong, with the increase of use time, the performance of terminal device may decline and application program needs more redaction, this When, can recover by brush machine or be lifted the performance of terminal device.
In correlation technique, user downloads brush machine bag, after terminal device stores brush machine bag, refers to the startup of brush machine bag is got After order, directly operation brush machine bag carries out brush machine operation.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of brush machine bag verification method and device.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verification method, including:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
With reference in a first aspect, in the first possible implementation of first aspect, methods described also includes:
Display interface for password input;
Obtain the encrypted message that user is input into the interface for password input;
If it is determined that the encrypted message of the input is consistent with the proper password information for prestoring, it is determined that perform brush machine Bag is stored in the operation under encryption path set in advance.
With reference to the first possible implementation of first aspect or first aspect, second in first aspect is possible In implementation, the check value of the brush machine bag is the certificate of the brush machine bag, the criteria check value be terminal device on The certificate of the application program corresponding with brush machine bag installed;Wherein, application program acquisition from legal server for operation Installation kit after generate.
With reference to the first possible implementation of first aspect or first aspect, the third in first aspect is possible In implementation, the check value of the brush machine bag is the value generated according to the certificate and checking algorithm of the brush machine bag, the mark Pre-check value is to be generated according to the certificate of mounted application program corresponding with brush machine bag on terminal device and checking algorithm Value;Wherein, the application program is generation after the installation kit that operation is obtained from legal server.
With reference in a first aspect, in the 4th kind of possible implementation of first aspect, methods described also includes:
If it is determined that the check value of the brush machine bag is inconsistent with the criteria check value for prestoring, then the brush out of service Machine bag, and delete the brush machine bag.
With reference in a first aspect, in the 5th kind of possible implementation of first aspect, the brush machine bag is OTA brush machines Bag.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verifies device, including:
Memory module, is configured as being stored in brush machine bag under encryption path set in advance;
First acquisition module, is configured as after brush machine bag enabled instruction is got, and obtains the institute under the encryption path State the check value of brush machine bag;
Operation module, the check value for being configured as determining the brush machine bag is consistent with the criteria check value for prestoring When, run the brush machine bag.
With reference to second aspect, in the first possible implementation of second aspect, described device also includes:
Display module, is configured as showing interface for password input;
Second acquisition module, is configured as obtaining the encrypted message that user is input into the interface for password input;
Determining module, the encrypted message for being configured as determining the input is consistent with the proper password information for prestoring When, it is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
With reference to the first possible implementation of second aspect or second aspect, second in second aspect is possible In implementation, the check value of the brush machine bag is the certificate of the brush machine bag, and the criteria check value is that brush machine bag verifies dress Put the certificate of mounted application program corresponding with brush machine bag;Wherein, the application program is operation from legal server Generated after the installation kit of middle acquisition.
With reference to the first possible implementation of second aspect or second aspect, the third in second aspect is possible In implementation, the check value of the brush machine bag is the value generated according to the certificate and checking algorithm of the brush machine bag, the mark Pre-check value is that the certificate and checking algorithm of mounted application program corresponding with brush machine bag on device are verified according to brush machine bag The value of generation;Wherein, the application program is generation after the installation kit that operation is obtained from legal server.
With reference to second aspect, in the 4th kind of possible implementation of second aspect, described device also includes:
Module out of service, is configured as the check value for determining the brush machine bag with the criteria check value for prestoring not When consistent, the brush machine bag out of service, and delete the brush machine bag.
With reference to second aspect, in the 5th kind of possible implementation of second aspect, the brush machine bag is OTA brush machines Bag.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verifies device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In one embodiment, it is stored under encryption path set in advance by by brush machine bag, is getting brush machine Bao Qi After dynamic instruction, the check value of the brush machine bag under encryption path is obtained, however, it is determined that the check value of brush machine bag and the standard for prestoring Check value is consistent, then run brush machine bag, realizes before brush machine bag is run, first by the storage of brush machine bag under encryption path, and The check value of comparing brushes machine bag and the criteria check value for prestoring, only when it is determined that check value is consistent with criteria check value, Just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the mode of brush machine operation, and the embodiment of the present disclosure can Verified with before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources runs on the terminal device, so that, Realize in the scene without connection network, the brush machine bag for carrying out brush machine operation is all legal brush machine bag, protects user Information security and improve brush machine success rate.
In another embodiment, by showing interface for password input, it is close that acquisition user is input into interface for password input Code information, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, it is determined that brush machine bag is deposited in execution The operation under encryption path set in advance is stored in, brush machine bag is stored under encryption path set in advance, getting brush After machine enabled instruction, obtain the check value of the brush machine bag under encryption path, however, it is determined that the check value of brush machine bag with prestore Criteria check value is consistent, then run brush machine bag, the encrypted message that can first obtain user input is realized, only in encrypted message When correct, just brush machine bag is stored under encryption path set in advance, the efficiency of brush machine bag verification method can be improved and tested The accuracy rate of card method, so that, further protect the information security of user and improve brush machine success rate.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure Example, and it is used to explain the principle of the disclosure together with specification.
Fig. 1 is a kind of flow chart of the brush machine bag verification method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the brush machine bag verification method according to another exemplary embodiment;
Fig. 3 is the schematic diagram of the user interface in embodiment illustrated in fig. 2;
Fig. 4 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the brush machine bag checking device according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings It is not intended to limit the scope that the disclosure is conceived by any mode with word description, but is by reference to specific embodiment Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in implementation method do not represent all implementation methods consistent with the disclosure.Conversely, they be only with it is such as appended The example of the consistent apparatus and method of some aspects described in detail in claims, the disclosure.
The noun involved by the embodiment of the present disclosure is explained first:
Brush machine:Software upgrading, operating system update are carried out to terminal device, operating system patch or also original initial is improved The operation of operating system etc..
Brush machine bag:Complete the code of brush machine function.
Fig. 1 is a kind of flow chart of the brush machine bag verification method according to an exemplary embodiment.As shown in figure 1, this The brush machine bag verification method that open embodiment is provided is comprised the following steps:
In a step 101, brush machine bag is stored under encryption path set in advance.
The embodiment of the present disclosure can be performed by terminal device.Terminal device in the embodiment of the present disclosure can be hand-held setting Standby, mobile unit, wearable device, computing device, and various forms of user equipmenies (User Equipment;Referred to as: UE), mobile station (Mobile Station;Referred to as:) and terminal (terminal) etc. MS.
Optionally, before step 101, terminal device can first obtain brush machine bag.User can carry out operation makes terminal Equipment obtains brush machine bag.The brush machine bag can be obtained, or obtained from other control systems from server. Terminal device is set to send the request that brush machine bag is downloaded in request, and the reception server to server for example, user can carry out operating The brush machine bag of transmission, to realize obtaining brush machine bag;User can also be by the brush machine packet replication in other control systems to the terminal In equipment, to realize that terminal device obtains brush machine bag.Optionally, the brush machine bag can be a software kit.It should be noted that The third-party application journey that brush machine bag in the embodiment of the present disclosure can be the renewal program bag of operating system, install on terminal device The AKU of sequence and the installation kit of third party application etc..According to the difference of brush machine mode, brush machine bag here can be Block the brush machine bag or over the air (Over-the-Air Technology of brush;Referred to as:OTA) brush machine bag.
Terminal device is stored under encryption path set in advance after brush machine bag is got.The encryption path phase When in trusted area (Trust Zone).Only the program with corresponding authority could access the text being stored under the encryption path Part.Terminal device, can when performing acquisition brush machine bag and brush machine bag being stored in into the operation under encryption path set in advance Being carried out in the way of user cannot perceive.For example, terminal device downloads the AKU of certain application program automatically, and will The AKU is stored under encryption path.
After be stored in brush machine bag under encryption path by terminal device, the program that only system is trusted could access the brush machine Bag, it is thus possible to prevent the rogue program without authority from changing the brush machine bag, it is to avoid the brush machine bag changed cannot normally run Situation, improve brush engine efficiency.
In a step 102, after brush machine bag enabled instruction is got, the check value of the brush machine bag under encryption path is obtained.
Brush machine bag enabled instruction can be triggered by user, or by server triggers.If the enabled instruction Be user triggering, then can be user when there is the demand of brush machine, grasped by input equipments such as display screen or buttons Make to trigger the enabled instruction.For example, can be user in application program A when the enabled instruction is that user triggers On the interface of opening, " upgrading " button is clicked on, after the operation for getting user, generation brush machine bag starts and refers to terminal device Order, you can think that the click action is to trigger an operation of brush machine bag enabled instruction.If the enabled instruction is server triggers , then can be that server sends the instruction of brush machine by network with the default cycle to terminal device, to trigger the enabled instruction. The predetermined period can be the cycle of server and terminal device agreement, for example, six months.
Terminal device illustrates that now user or server have the demand of brush machine when brush machine bag enabled instruction is got. Compared to the mode that brush machine bag is directly run in correlation technique, in the embodiment of the present disclosure, terminal device is needed first from encryption path The lower check value for obtaining brush machine bag.
In the first possible implementation, the check value of brush machine bag can be the certificate of brush machine bag.Here brush machine The certificate of bag refer to brush machine unwrap hair during, developer is signed using the secret key pair brush machine bag that key server is distributed What name was formed.It should be noted that for same application program A, the certificate of its initial version and its n-th more redaction Certificate is duplicate.Optionally, the check value of brush machine bag can be stored in the certain field of brush machine bag performance parameter, eventually End equipment can directly read the check value of brush machine bag from the field.
In second possible implementation, the check value of brush machine bag can be calculated according to the certificate of brush machine bag and verification The value of method generation.The checking algorithm can be hash algorithm.The certificate of brush machine bag can be stored in the form of binary sequence In terminal device, binary sequence is mapped as check value by terminal device according to hash algorithm.The check value can also be two System sequence.When using Secure Hash Algorithm (Secure Hash Algorithm), the check value can be SHA1 values;When Using Message-Digest Algorithm 5 (Message-Digest Algorithm 5;Referred to as:When MD5), the check value can be MD5 Value.It should be noted that in this kind of implementation, check value can directly include that terminal device is direct in brush machine bag Read can get, or terminal device after certificate is got, according to certificate and checking algorithm calculate come.
In step 103, however, it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine is run Bag.
Terminal device is after the check value for getting brush machine bag, it is thus necessary to determine that the check value of brush machine bag whether with deposit in advance The criteria check value of storage is consistent, to determine whether the brush machine bag is the brush machine bag that is got from legal source.
Correspondence step 102 in the first possible implementation, criteria check value be terminal device on it is mounted with The certificate of the corresponding application program of brush machine bag.Wherein, application program is life after the installation kit that operation is obtained from legal server Into.
Second possible implementation in correspondence step 102, criteria check value is to have been installed according on terminal device Application program corresponding with brush machine bag certificate and checking algorithm generation value.Wherein, application program is operation from legal clothes Generated after the installation kit obtained in business device.
It is understood that second possible implementation in step 102 is compared to the first possible realization side Formula, security is higher.
Application program corresponding with brush machine bag means the application program for having same names with the brush machine bag.For example, Entitled " the XX online shopping " of certain brush machine bag, then application program corresponding with the brush machine bag be on terminal device and installed Entitled " XX online shopping " application program, and the application program be operation from legal server obtain installation kit Generate afterwards.Legal server means the server of official.Terminal program after installation kit is got from legal server, Installation kit generation application program is run, can be stored the check value of the application program as the check value of standard in memory In.Optionally, criteria check value can also be stored under encryption path set in advance.
When it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, illustrate that the brush machine bag is from legal The brush machine bag got in server, is a brush machine bag trusty, will not threaten the information security of user.Now, run The brush machine bag, carries out brush machine operation.Here the meaning of " consistent " is, the check value of brush machine bag and the criteria check value for prestoring It is identical.
When it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, illustrate that the brush machine bag is from illegal The brush machine bag got in server, it can threaten the information security of user.Now, brush machine bag out of service, and from The brush machine bag is deleted under encryption path.
In the brush machine bag verification method that the embodiment of the present disclosure is provided, it is local that criteria check value is stored in terminal device, Realize in the scene that terminal device does not connect network, can still realize verifying brush machine bag, protect the letter of user Breath safety.
The brush machine bag verification method that the embodiment of the present disclosure is provided, encryption path set in advance is stored in by by brush machine bag Under, after brush machine bag enabled instruction is got, obtain the check value of the brush machine bag under encryption path, however, it is determined that the verification of brush machine bag Be worth it is consistent with the criteria check value for prestoring, then run brush machine bag, realize run brush machine bag before, first brush machine bag is deposited Storage under encryption path, and the check value of comparing brushes machine bag and the criteria check value for prestoring, only it is determined that check value with When criteria check value is consistent, just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the side of brush machine operation Formula, the embodiment of the present disclosure can be verified before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources is at end Run in end equipment, so that, realize in the scene without connection network, it is all legal to carry out the brush machine bag of brush machine operation Brush machine bag, protects the information security of user and improves brush machine success rate.
Fig. 2 is a kind of flow chart of the brush machine bag verification method according to another exemplary embodiment.The disclosure is implemented The brush machine bag verification method that example is provided, on the basis of embodiment illustrated in fig. 1, to brush machine bag is stored in into encryption set in advance The step of before under path, makees one and describes in detail.As shown in Fig. 2 the brush machine bag verification method that the embodiment of the present disclosure is provided is included such as Lower step:
In step 201, interface for password input is shown.
Terminal device can show interface for password input after brush machine bag is got, before brush machine bag is stored.This is close Code inputting interface can be the numeric keypad of nine grids form, and the full keyboard of numeral, letter and symbol can also be input fingerprint Interface, be input into interface etc. of gesture.The embodiment of the present disclosure is without limitation.
In step 202., the encrypted message that user is input into interface for password input is obtained.
Encrypted message is input into the interface for password input that user can show in terminal device.Here encrypted message can be with The elements such as digital, the alphabetical or symbol of composition password and the built-up sequence of these elements are represented, gesture is also may indicate that and is referred to Line etc..
In step 203, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, it is determined that hold It is about to the operation that brush machine bag is stored under encryption path set in advance.
The proper password information for prestoring can be that user is set in advance, or terminal device sets itself simultaneously Inform user's.Optionally, the proper password information that this is prestored can also be stored under encryption path.
Terminal device is after the encrypted message that user is input into interface for password input is got, it is necessary to judge the password Whether information is correct, to determine whether the user is validated user.
Terminal device is just true only when it is determined that the encrypted message of input is consistent with the proper password information for prestoring It is fixed to perform the operation being stored in brush machine bag under encryption path set in advance, that is, perform step 204.
Fig. 3 is the schematic diagram of the user interface in embodiment illustrated in fig. 2.As shown in figure 3, in user interface 301, Yong Hu Encrypted message is input into the interface for password input that terminal device shows.In the user interface 301, interface for password input is nine palaces The numeric keypad of case form.
Step 201- steps 203 act as, when certain malicious user wants that carrying out to terminal device brush machine operates, the evil User from illegal server by terminal device after illegal brush machine bag has been downloaded for meaning, and terminal device can show Password Input Interface.Because the malicious user is not aware that encrypted message, so, now terminal device will not be by the illegal brush machine bag storage In under encryption path set in advance, afterwards the step of 204- steps 205 be not carried out, this improves brush machine bag verification method Efficiency, and, further protect the information security of user.
In step 204, brush machine bag is stored under encryption path set in advance.
In step 205, after brush machine enabled instruction is got, the check value of the brush machine bag under encryption path is obtained.
In step 206, however, it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine is run Bag.
Step 204- steps 206 are similar with the implementation process and know-why of step 101- steps 103, no longer go to live in the household of one's in-laws on getting married herein State.
The brush machine bag verification method that the embodiment of the present disclosure is provided, by showing interface for password input, obtains user in password The encrypted message being input on inputting interface, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, then It is determined that performing operation brush machine bag being stored under encryption path set in advance, brush machine bag is stored in encryption set in advance Under path, after brush machine enabled instruction is got, the check value of the brush machine bag under encryption path is obtained, however, it is determined that the school of brush machine bag It is consistent with the criteria check value for prestoring to test value, then run brush machine bag, realizes the message in cipher that can first obtain user input , only when encrypted message is correct, just be stored in brush machine bag under encryption path set in advance by breath, can improve brush machine bag and test The efficiency of card method and the accuracy rate of verification method so that, further protect user information security and improve brush machine into Power.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.For disclosure device reality The details not disclosed in example is applied, method of disclosure embodiment is refer to.
Fig. 4 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.As shown in figure 4, this public affairs The brush machine bag checking device for opening embodiment offer includes:Memory module 41, the first acquisition module 42 and operation module 43.
Memory module 41, is configured as being stored in brush machine bag under encryption path set in advance.
Optionally, the brush machine bag in the embodiment of the present disclosure is OTA brush machine bags.
First acquisition module 42, is configured as after brush machine bag enabled instruction is got, and obtains the brush machine under encryption path The check value of bag.
Operation module 43, be configured as determine brush machine bag check value it is consistent with the criteria check value for prestoring when, Operation brush machine bag.
In a kind of possible implementation, the check value of brush machine bag is the certificate of brush machine bag, and criteria check value is brush machine The certificate of mounted application program corresponding with brush machine bag on bag checking device.Wherein, application program is operation from legal clothes Generated after the installation kit obtained in business device.
In alternatively possible implementation, the check value of brush machine bag is to be given birth to according to the certificate and checking algorithm of brush machine bag Into value, criteria check value be according to brush machine bag verify device on mounted application program corresponding with brush machine bag certificate and The value of checking algorithm generation.Wherein, application program is generation after the installation kit that operation is obtained from legal server.
It should be noted that the brush machine bag checking device in the embodiment of the present disclosure can also include module out of service, its Be configured as determine brush machine bag check value it is inconsistent with the criteria check value for prestoring when, brush machine bag out of service, and Brush machine bag is deleted, to protect the information security of user.
The brush machine bag checking device that the embodiment of the present disclosure is provided, by setting memory module, is configured as depositing brush machine bag It is stored under encryption path set in advance, the first acquisition module, is configured as after brush machine bag enabled instruction is got, obtains and add The check value of the brush machine bag under close path, runs module, is configured as check value and the mark for prestoring if it is determined that brush machine bag Pre-check value is consistent, then run brush machine bag, realizes before brush machine bag is run, first by the storage of brush machine bag under encryption path, And the check value of comparing brushes machine bag and the criteria check value for prestoring, only it is determined that check value is consistent with criteria check value When, just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the mode of brush machine operation, and the disclosure is implemented Example can be verified before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources is on brush machine bag checking device Operation, so that, realizing in the scene without connection network, the brush machine bag for carrying out brush machine operation is all legal brush machine bag, Protect the information security of user and improve brush machine success rate.
Fig. 5 is a kind of block diagram of the brush machine bag checking device according to another exemplary embodiment.The embodiment of the present disclosure On the basis of embodiment illustrated in fig. 4, other modules to brush machine bag checking device make a detailed description.As shown in figure 5, this public affairs The brush machine bag checking device for opening embodiment offer also includes:Display module 51, the second acquisition module 52 and determining module 53.
Display module 51, is configured as showing interface for password input.
Second acquisition module 52, is configured as obtaining the encrypted message that user is input into interface for password input.
Determining module 53, is configured as determining that the encrypted message of input is consistent with the proper password information for prestoring When, it is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
The brush machine bag checking device that the embodiment of the present disclosure is provided, by setting display module, is configured as display password defeated Enter interface, the second acquisition module is configured as obtaining the encrypted message that user is input into interface for password input, determining module, Be configured as determine input encrypted message it is consistent with the proper password information for prestoring when, it is determined that execution brush machine bag is deposited The operation under encryption path set in advance is stored in, the encrypted message that can first obtain user input is realized, only in password When information is correct, just brush machine bag is stored under encryption path set in advance, the efficiency of brush machine bag verification method can be improved And the accuracy rate of verification method, so that, further protect the information security of user and improve brush machine success rate.
The foregoing describe built-in function and structure that brush machine bag verifies device.Fig. 6 is shown according to an exemplary embodiment A kind of brush machine bag verify device block diagram.As shown in fig. 6, brush machine bag checking device includes:
Processor 61;
Memory 62 for storing the executable instruction of processor 61;
Wherein, processor 61 is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under encryption path is obtained;
If it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine bag is run.
Fig. 7 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.For example, device 800 can To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for Body equipment, personal digital assistant etc..
Reference picture 7, device 800 can include following one or more assemblies:Processing assembly 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong Letter component 816.
The integrated operation of the usual control device 800 of processing assembly 802, such as with display, call, data communication, phase Machine is operated and the associated operation of record operation.Processing assembly 802 can refer to including one or more processors 820 to perform Order, to complete all or part of step of above-mentioned method.Additionally, processing assembly 802 can include one or more modules, just Interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, it is many to facilitate Interaction between media component 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in device 800.These data are shown Example includes the instruction for any application program or method operated on device 800, and contact data, telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 800.
Multimedia groupware 808 is included in one screen of output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detection and the touch or slide related duration and pressure.In certain embodiments, many matchmakers Body component 808 includes a front camera and/or rear camera.When device 800 be in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, to provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented Estimate.For example, sensor cluster 814 can detect the opening/closed mode of device 800, the relative positioning of component is for example described Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device Position change, user is presence or absence of with what device 800 was contacted, the orientation of device 800 or acceleration/deceleration and device 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to be detected when without any physical contact The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realization, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium verifies device by brush machine bag Computing device when so that brush machine bag checking device be able to carry out above-mentioned brush machine bag verification method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claims are pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and And can without departing from the scope carry out various modifications and changes.The scope of the present disclosure is only limited by appending claims System.

Claims (13)

1. a kind of brush machine bag verification method, it is characterised in that including:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
2. method according to claim 1, it is characterised in that methods described also includes:
Display interface for password input;
Obtain the encrypted message that user is input into the interface for password input;
If it is determined that the encrypted message of the input is consistent with the proper password information for prestoring, it is determined that brush machine bag is deposited in execution It is stored in the operation under encryption path set in advance.
3. method according to claim 1 and 2, it is characterised in that the check value of the brush machine bag is the brush machine bag Certificate, the criteria check value is the certificate of mounted application program corresponding with brush machine bag on terminal device;Wherein, it is described Application program is generation after the installation kit that operation is obtained from legal server.
4. method according to claim 1 and 2, it is characterised in that the check value of the brush machine bag is according to the brush machine The value of certificate and the checking algorithm generation of bag, the criteria check value is according to mounted corresponding with brush machine bag on terminal device Application program certificate and checking algorithm generation value;Wherein, application program acquisition from legal server for operation Installation kit after generate.
5. method according to claim 1, it is characterised in that methods described also includes:
If it is determined that the check value of the brush machine bag is inconsistent with the criteria check value for prestoring, then the brush machine out of service Bag, and delete the brush machine bag.
6. method according to claim 1, it is characterised in that the brush machine bag is over the air OTA brush machine bags.
7. a kind of brush machine bag verifies device, it is characterised in that including:
Memory module, is configured as being stored in brush machine bag under encryption path set in advance;
First acquisition module, is configured as after brush machine bag enabled instruction is got, and obtains the brush under the encryption path The check value of machine bag;
Operation module, when the check value for being configured as determining the brush machine bag is consistent with the criteria check value for prestoring, fortune The row brush machine bag.
8. device according to claim 7, it is characterised in that described device also includes:
Display module, is configured as showing interface for password input;
Second acquisition module, is configured as obtaining the encrypted message that user is input into the interface for password input;
Determining module, when the encrypted message for being configured as determining the input is consistent with the proper password information for prestoring, It is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
9. the device according to claim 7 or 8, it is characterised in that the check value of the brush machine bag is the brush machine bag Certificate, the criteria check value is the certificate of mounted application program corresponding with brush machine bag on brush machine bag checking device;Its In, the application program is generation after the installation kit that operation is obtained from legal server.
10. the device according to claim 7 or 8, it is characterised in that the check value of the brush machine bag is according to the brush machine The value of certificate and the checking algorithm generation of bag, the criteria check value is to verify mounted on device and brush machine according to brush machine bag Wrap the value of certificate and the checking algorithm generation of corresponding application program;Wherein, the application program is operation from legal server Generated after the installation kit of middle acquisition.
11. devices according to claim 7, it is characterised in that described device also includes:
Module out of service, the check value for being configured as determining the brush machine bag is inconsistent with the criteria check value for prestoring When, the brush machine bag out of service, and delete the brush machine bag.
12. devices according to claim 7, it is characterised in that the brush machine bag is over the air OTA brush machine bags.
A kind of 13. brush machine bag checking devices, it is characterised in that including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
CN201611036621.0A 2016-11-23 2016-11-23 Root package validation method and device Pending CN106709284A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611036621.0A CN106709284A (en) 2016-11-23 2016-11-23 Root package validation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611036621.0A CN106709284A (en) 2016-11-23 2016-11-23 Root package validation method and device

Publications (1)

Publication Number Publication Date
CN106709284A true CN106709284A (en) 2017-05-24

Family

ID=58940190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611036621.0A Pending CN106709284A (en) 2016-11-23 2016-11-23 Root package validation method and device

Country Status (1)

Country Link
CN (1) CN106709284A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597534A (en) * 2019-08-26 2019-12-20 珠海格力电器股份有限公司 Intelligent device and application program updating method, updating auxiliary method and device
CN110798544A (en) * 2019-11-05 2020-02-14 Oppo(重庆)智能科技有限公司 Method and device for verifying validity of mobile terminal, terminal and storage medium
WO2021097611A1 (en) * 2019-11-18 2021-05-27 深圳市欢太科技有限公司 Firmware flashing method and related apparatus
CN113434161A (en) * 2020-03-23 2021-09-24 成都鼎桥通信技术有限公司 Software version update control method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103501391A (en) * 2013-10-10 2014-01-08 上海斐讯数据通信技术有限公司 Method and system for managing updating behavior of user
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN104239099A (en) * 2014-09-10 2014-12-24 厦门美图移动科技有限公司 Mobile phone flushing control method
US20150040240A1 (en) * 2013-08-01 2015-02-05 Corel Corporation System and method for software piracy monetization
CN105183499A (en) * 2015-08-04 2015-12-23 上海青橙实业有限公司 ROM flashing method, mobile terminal and terminal system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150040240A1 (en) * 2013-08-01 2015-02-05 Corel Corporation System and method for software piracy monetization
CN103501391A (en) * 2013-10-10 2014-01-08 上海斐讯数据通信技术有限公司 Method and system for managing updating behavior of user
CN104065482A (en) * 2014-06-06 2014-09-24 宇龙计算机通信科技(深圳)有限公司 Method and device for improving terminalself-flashing safety through ciphertext handshaking
CN104239099A (en) * 2014-09-10 2014-12-24 厦门美图移动科技有限公司 Mobile phone flushing control method
CN105183499A (en) * 2015-08-04 2015-12-23 上海青橙实业有限公司 ROM flashing method, mobile terminal and terminal system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
樊重俊等: "《数据库基础及应用》", 31 January 2015 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110597534A (en) * 2019-08-26 2019-12-20 珠海格力电器股份有限公司 Intelligent device and application program updating method, updating auxiliary method and device
CN110798544A (en) * 2019-11-05 2020-02-14 Oppo(重庆)智能科技有限公司 Method and device for verifying validity of mobile terminal, terminal and storage medium
WO2021097611A1 (en) * 2019-11-18 2021-05-27 深圳市欢太科技有限公司 Firmware flashing method and related apparatus
CN113434161A (en) * 2020-03-23 2021-09-24 成都鼎桥通信技术有限公司 Software version update control method and device

Similar Documents

Publication Publication Date Title
CN107241688A (en) Signature, verification method, device and the storage medium of application installation package
CN104125055B (en) Encryption and decryption method and electronic equipment
CN104216742B (en) Brush machine control method and device based on password
CN104125067B (en) Account and token secret key binding method and device
CN102016865A (en) System and method of authorizing execution of software code based on accessible entitlements
EP2940977B1 (en) Method and device for sending information in voice service
CN104009837B (en) Key updating method, device and terminal
EP2978162B1 (en) Anti-counterfeiting verification method, device and system
CN104484593B (en) terminal verification method and device
CN104780045B (en) The management method and device of smart machine
CN107169320A (en) Method of calibration and device
CN106709284A (en) Root package validation method and device
TWI761843B (en) Access control method and device, electronic device and storage medium
CN107766701A (en) Electronic equipment, dynamic library file guard method and device
CN104468581B (en) The method and device of login application program
CN111199039B (en) Application security verification method and device and terminal equipment
CN106778225A (en) The method and apparatus for processing password
CN104113588B (en) The update method of a kind of the Internet Yellow Page and device
CN105282162A (en) Processing method and device for account management business
CN106534083B (en) Brush machine Tool validation method and device
CN106789070A (en) The decryption method of data, device and terminal
CN106295363A (en) Startup calibration method and device
CN106062762B (en) Using encryption method and device
CN107506636A (en) The guard method of pre-installed applications program and device
CN106022160A (en) Method and apparatuses for deleting user data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524

RJ01 Rejection of invention patent application after publication