CN106709284A - Root package validation method and device - Google Patents
Root package validation method and device Download PDFInfo
- Publication number
- CN106709284A CN106709284A CN201611036621.0A CN201611036621A CN106709284A CN 106709284 A CN106709284 A CN 106709284A CN 201611036621 A CN201611036621 A CN 201611036621A CN 106709284 A CN106709284 A CN 106709284A
- Authority
- CN
- China
- Prior art keywords
- brush machine
- machine bag
- check value
- bag
- brush
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010200 validation analysis Methods 0.000 title abstract 3
- 238000000034 method Methods 0.000 claims abstract description 50
- 238000012795 verification Methods 0.000 claims description 23
- 238000009434 installation Methods 0.000 claims description 16
- 238000005516 engineering process Methods 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 10
- 238000012545 processing Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000000429 assembly Methods 0.000 description 3
- 230000000712 assembly Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000012092 media component Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
Abstract
The invention relates to a root package validation method and a device. The method comprises: storing a root package in a pre-set encrypted path; acquiring a check value of the root package in an encrypted path after getting start instruction of root package; and operating the root package if the check value of the root package is consistent with the pre-stored standard check value. Compared with relevant technology, the root package validation method and the device can check before the root package starts operation, which prevents the root package of illegal source from running on the terminal device and guarantees the legitimacy of root packages, protects the security of users and improves the success rate of flashing without linked network.
Description
Technical field
This disclosure relates to computer technology, more particularly to a kind of brush machine bag verification method and device.
Background technology
With the development of computer technology, the use of terminal device is more and more extensive.Mistake of the user in using terminal equipment
Cheng Zhong, with the increase of use time, the performance of terminal device may decline and application program needs more redaction, this
When, can recover by brush machine or be lifted the performance of terminal device.
In correlation technique, user downloads brush machine bag, after terminal device stores brush machine bag, refers to the startup of brush machine bag is got
After order, directly operation brush machine bag carries out brush machine operation.
The content of the invention
To overcome problem present in correlation technique, the disclosure to provide a kind of brush machine bag verification method and device.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verification method, including:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
With reference in a first aspect, in the first possible implementation of first aspect, methods described also includes:
Display interface for password input;
Obtain the encrypted message that user is input into the interface for password input;
If it is determined that the encrypted message of the input is consistent with the proper password information for prestoring, it is determined that perform brush machine
Bag is stored in the operation under encryption path set in advance.
With reference to the first possible implementation of first aspect or first aspect, second in first aspect is possible
In implementation, the check value of the brush machine bag is the certificate of the brush machine bag, the criteria check value be terminal device on
The certificate of the application program corresponding with brush machine bag installed;Wherein, application program acquisition from legal server for operation
Installation kit after generate.
With reference to the first possible implementation of first aspect or first aspect, the third in first aspect is possible
In implementation, the check value of the brush machine bag is the value generated according to the certificate and checking algorithm of the brush machine bag, the mark
Pre-check value is to be generated according to the certificate of mounted application program corresponding with brush machine bag on terminal device and checking algorithm
Value;Wherein, the application program is generation after the installation kit that operation is obtained from legal server.
With reference in a first aspect, in the 4th kind of possible implementation of first aspect, methods described also includes:
If it is determined that the check value of the brush machine bag is inconsistent with the criteria check value for prestoring, then the brush out of service
Machine bag, and delete the brush machine bag.
With reference in a first aspect, in the 5th kind of possible implementation of first aspect, the brush machine bag is OTA brush machines
Bag.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verifies device, including:
Memory module, is configured as being stored in brush machine bag under encryption path set in advance;
First acquisition module, is configured as after brush machine bag enabled instruction is got, and obtains the institute under the encryption path
State the check value of brush machine bag;
Operation module, the check value for being configured as determining the brush machine bag is consistent with the criteria check value for prestoring
When, run the brush machine bag.
With reference to second aspect, in the first possible implementation of second aspect, described device also includes:
Display module, is configured as showing interface for password input;
Second acquisition module, is configured as obtaining the encrypted message that user is input into the interface for password input;
Determining module, the encrypted message for being configured as determining the input is consistent with the proper password information for prestoring
When, it is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
With reference to the first possible implementation of second aspect or second aspect, second in second aspect is possible
In implementation, the check value of the brush machine bag is the certificate of the brush machine bag, and the criteria check value is that brush machine bag verifies dress
Put the certificate of mounted application program corresponding with brush machine bag;Wherein, the application program is operation from legal server
Generated after the installation kit of middle acquisition.
With reference to the first possible implementation of second aspect or second aspect, the third in second aspect is possible
In implementation, the check value of the brush machine bag is the value generated according to the certificate and checking algorithm of the brush machine bag, the mark
Pre-check value is that the certificate and checking algorithm of mounted application program corresponding with brush machine bag on device are verified according to brush machine bag
The value of generation;Wherein, the application program is generation after the installation kit that operation is obtained from legal server.
With reference to second aspect, in the 4th kind of possible implementation of second aspect, described device also includes:
Module out of service, is configured as the check value for determining the brush machine bag with the criteria check value for prestoring not
When consistent, the brush machine bag out of service, and delete the brush machine bag.
With reference to second aspect, in the 5th kind of possible implementation of second aspect, the brush machine bag is OTA brush machines
Bag.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of brush machine bag verifies device, including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
The technical scheme provided by this disclosed embodiment can include the following benefits:
In one embodiment, it is stored under encryption path set in advance by by brush machine bag, is getting brush machine Bao Qi
After dynamic instruction, the check value of the brush machine bag under encryption path is obtained, however, it is determined that the check value of brush machine bag and the standard for prestoring
Check value is consistent, then run brush machine bag, realizes before brush machine bag is run, first by the storage of brush machine bag under encryption path, and
The check value of comparing brushes machine bag and the criteria check value for prestoring, only when it is determined that check value is consistent with criteria check value,
Just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the mode of brush machine operation, and the embodiment of the present disclosure can
Verified with before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources runs on the terminal device, so that,
Realize in the scene without connection network, the brush machine bag for carrying out brush machine operation is all legal brush machine bag, protects user
Information security and improve brush machine success rate.
In another embodiment, by showing interface for password input, it is close that acquisition user is input into interface for password input
Code information, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, it is determined that brush machine bag is deposited in execution
The operation under encryption path set in advance is stored in, brush machine bag is stored under encryption path set in advance, getting brush
After machine enabled instruction, obtain the check value of the brush machine bag under encryption path, however, it is determined that the check value of brush machine bag with prestore
Criteria check value is consistent, then run brush machine bag, the encrypted message that can first obtain user input is realized, only in encrypted message
When correct, just brush machine bag is stored under encryption path set in advance, the efficiency of brush machine bag verification method can be improved and tested
The accuracy rate of card method, so that, further protect the information security of user and improve brush machine success rate.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the disclosure
Example, and it is used to explain the principle of the disclosure together with specification.
Fig. 1 is a kind of flow chart of the brush machine bag verification method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the brush machine bag verification method according to another exemplary embodiment;
Fig. 3 is the schematic diagram of the user interface in embodiment illustrated in fig. 2;
Fig. 4 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of the brush machine bag checking device according to another exemplary embodiment;
Fig. 6 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings
It is not intended to limit the scope that the disclosure is conceived by any mode with word description, but is by reference to specific embodiment
Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in implementation method do not represent all implementation methods consistent with the disclosure.Conversely, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects described in detail in claims, the disclosure.
The noun involved by the embodiment of the present disclosure is explained first:
Brush machine:Software upgrading, operating system update are carried out to terminal device, operating system patch or also original initial is improved
The operation of operating system etc..
Brush machine bag:Complete the code of brush machine function.
Fig. 1 is a kind of flow chart of the brush machine bag verification method according to an exemplary embodiment.As shown in figure 1, this
The brush machine bag verification method that open embodiment is provided is comprised the following steps:
In a step 101, brush machine bag is stored under encryption path set in advance.
The embodiment of the present disclosure can be performed by terminal device.Terminal device in the embodiment of the present disclosure can be hand-held setting
Standby, mobile unit, wearable device, computing device, and various forms of user equipmenies (User Equipment;Referred to as:
UE), mobile station (Mobile Station;Referred to as:) and terminal (terminal) etc. MS.
Optionally, before step 101, terminal device can first obtain brush machine bag.User can carry out operation makes terminal
Equipment obtains brush machine bag.The brush machine bag can be obtained, or obtained from other control systems from server.
Terminal device is set to send the request that brush machine bag is downloaded in request, and the reception server to server for example, user can carry out operating
The brush machine bag of transmission, to realize obtaining brush machine bag;User can also be by the brush machine packet replication in other control systems to the terminal
In equipment, to realize that terminal device obtains brush machine bag.Optionally, the brush machine bag can be a software kit.It should be noted that
The third-party application journey that brush machine bag in the embodiment of the present disclosure can be the renewal program bag of operating system, install on terminal device
The AKU of sequence and the installation kit of third party application etc..According to the difference of brush machine mode, brush machine bag here can be
Block the brush machine bag or over the air (Over-the-Air Technology of brush;Referred to as:OTA) brush machine bag.
Terminal device is stored under encryption path set in advance after brush machine bag is got.The encryption path phase
When in trusted area (Trust Zone).Only the program with corresponding authority could access the text being stored under the encryption path
Part.Terminal device, can when performing acquisition brush machine bag and brush machine bag being stored in into the operation under encryption path set in advance
Being carried out in the way of user cannot perceive.For example, terminal device downloads the AKU of certain application program automatically, and will
The AKU is stored under encryption path.
After be stored in brush machine bag under encryption path by terminal device, the program that only system is trusted could access the brush machine
Bag, it is thus possible to prevent the rogue program without authority from changing the brush machine bag, it is to avoid the brush machine bag changed cannot normally run
Situation, improve brush engine efficiency.
In a step 102, after brush machine bag enabled instruction is got, the check value of the brush machine bag under encryption path is obtained.
Brush machine bag enabled instruction can be triggered by user, or by server triggers.If the enabled instruction
Be user triggering, then can be user when there is the demand of brush machine, grasped by input equipments such as display screen or buttons
Make to trigger the enabled instruction.For example, can be user in application program A when the enabled instruction is that user triggers
On the interface of opening, " upgrading " button is clicked on, after the operation for getting user, generation brush machine bag starts and refers to terminal device
Order, you can think that the click action is to trigger an operation of brush machine bag enabled instruction.If the enabled instruction is server triggers
, then can be that server sends the instruction of brush machine by network with the default cycle to terminal device, to trigger the enabled instruction.
The predetermined period can be the cycle of server and terminal device agreement, for example, six months.
Terminal device illustrates that now user or server have the demand of brush machine when brush machine bag enabled instruction is got.
Compared to the mode that brush machine bag is directly run in correlation technique, in the embodiment of the present disclosure, terminal device is needed first from encryption path
The lower check value for obtaining brush machine bag.
In the first possible implementation, the check value of brush machine bag can be the certificate of brush machine bag.Here brush machine
The certificate of bag refer to brush machine unwrap hair during, developer is signed using the secret key pair brush machine bag that key server is distributed
What name was formed.It should be noted that for same application program A, the certificate of its initial version and its n-th more redaction
Certificate is duplicate.Optionally, the check value of brush machine bag can be stored in the certain field of brush machine bag performance parameter, eventually
End equipment can directly read the check value of brush machine bag from the field.
In second possible implementation, the check value of brush machine bag can be calculated according to the certificate of brush machine bag and verification
The value of method generation.The checking algorithm can be hash algorithm.The certificate of brush machine bag can be stored in the form of binary sequence
In terminal device, binary sequence is mapped as check value by terminal device according to hash algorithm.The check value can also be two
System sequence.When using Secure Hash Algorithm (Secure Hash Algorithm), the check value can be SHA1 values;When
Using Message-Digest Algorithm 5 (Message-Digest Algorithm 5;Referred to as:When MD5), the check value can be MD5
Value.It should be noted that in this kind of implementation, check value can directly include that terminal device is direct in brush machine bag
Read can get, or terminal device after certificate is got, according to certificate and checking algorithm calculate come.
In step 103, however, it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine is run
Bag.
Terminal device is after the check value for getting brush machine bag, it is thus necessary to determine that the check value of brush machine bag whether with deposit in advance
The criteria check value of storage is consistent, to determine whether the brush machine bag is the brush machine bag that is got from legal source.
Correspondence step 102 in the first possible implementation, criteria check value be terminal device on it is mounted with
The certificate of the corresponding application program of brush machine bag.Wherein, application program is life after the installation kit that operation is obtained from legal server
Into.
Second possible implementation in correspondence step 102, criteria check value is to have been installed according on terminal device
Application program corresponding with brush machine bag certificate and checking algorithm generation value.Wherein, application program is operation from legal clothes
Generated after the installation kit obtained in business device.
It is understood that second possible implementation in step 102 is compared to the first possible realization side
Formula, security is higher.
Application program corresponding with brush machine bag means the application program for having same names with the brush machine bag.For example,
Entitled " the XX online shopping " of certain brush machine bag, then application program corresponding with the brush machine bag be on terminal device and installed
Entitled " XX online shopping " application program, and the application program be operation from legal server obtain installation kit
Generate afterwards.Legal server means the server of official.Terminal program after installation kit is got from legal server,
Installation kit generation application program is run, can be stored the check value of the application program as the check value of standard in memory
In.Optionally, criteria check value can also be stored under encryption path set in advance.
When it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, illustrate that the brush machine bag is from legal
The brush machine bag got in server, is a brush machine bag trusty, will not threaten the information security of user.Now, run
The brush machine bag, carries out brush machine operation.Here the meaning of " consistent " is, the check value of brush machine bag and the criteria check value for prestoring
It is identical.
When it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, illustrate that the brush machine bag is from illegal
The brush machine bag got in server, it can threaten the information security of user.Now, brush machine bag out of service, and from
The brush machine bag is deleted under encryption path.
In the brush machine bag verification method that the embodiment of the present disclosure is provided, it is local that criteria check value is stored in terminal device,
Realize in the scene that terminal device does not connect network, can still realize verifying brush machine bag, protect the letter of user
Breath safety.
The brush machine bag verification method that the embodiment of the present disclosure is provided, encryption path set in advance is stored in by by brush machine bag
Under, after brush machine bag enabled instruction is got, obtain the check value of the brush machine bag under encryption path, however, it is determined that the verification of brush machine bag
Be worth it is consistent with the criteria check value for prestoring, then run brush machine bag, realize run brush machine bag before, first brush machine bag is deposited
Storage under encryption path, and the check value of comparing brushes machine bag and the criteria check value for prestoring, only it is determined that check value with
When criteria check value is consistent, just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the side of brush machine operation
Formula, the embodiment of the present disclosure can be verified before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources is at end
Run in end equipment, so that, realize in the scene without connection network, it is all legal to carry out the brush machine bag of brush machine operation
Brush machine bag, protects the information security of user and improves brush machine success rate.
Fig. 2 is a kind of flow chart of the brush machine bag verification method according to another exemplary embodiment.The disclosure is implemented
The brush machine bag verification method that example is provided, on the basis of embodiment illustrated in fig. 1, to brush machine bag is stored in into encryption set in advance
The step of before under path, makees one and describes in detail.As shown in Fig. 2 the brush machine bag verification method that the embodiment of the present disclosure is provided is included such as
Lower step:
In step 201, interface for password input is shown.
Terminal device can show interface for password input after brush machine bag is got, before brush machine bag is stored.This is close
Code inputting interface can be the numeric keypad of nine grids form, and the full keyboard of numeral, letter and symbol can also be input fingerprint
Interface, be input into interface etc. of gesture.The embodiment of the present disclosure is without limitation.
In step 202., the encrypted message that user is input into interface for password input is obtained.
Encrypted message is input into the interface for password input that user can show in terminal device.Here encrypted message can be with
The elements such as digital, the alphabetical or symbol of composition password and the built-up sequence of these elements are represented, gesture is also may indicate that and is referred to
Line etc..
In step 203, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, it is determined that hold
It is about to the operation that brush machine bag is stored under encryption path set in advance.
The proper password information for prestoring can be that user is set in advance, or terminal device sets itself simultaneously
Inform user's.Optionally, the proper password information that this is prestored can also be stored under encryption path.
Terminal device is after the encrypted message that user is input into interface for password input is got, it is necessary to judge the password
Whether information is correct, to determine whether the user is validated user.
Terminal device is just true only when it is determined that the encrypted message of input is consistent with the proper password information for prestoring
It is fixed to perform the operation being stored in brush machine bag under encryption path set in advance, that is, perform step 204.
Fig. 3 is the schematic diagram of the user interface in embodiment illustrated in fig. 2.As shown in figure 3, in user interface 301, Yong Hu
Encrypted message is input into the interface for password input that terminal device shows.In the user interface 301, interface for password input is nine palaces
The numeric keypad of case form.
Step 201- steps 203 act as, when certain malicious user wants that carrying out to terminal device brush machine operates, the evil
User from illegal server by terminal device after illegal brush machine bag has been downloaded for meaning, and terminal device can show Password Input
Interface.Because the malicious user is not aware that encrypted message, so, now terminal device will not be by the illegal brush machine bag storage
In under encryption path set in advance, afterwards the step of 204- steps 205 be not carried out, this improves brush machine bag verification method
Efficiency, and, further protect the information security of user.
In step 204, brush machine bag is stored under encryption path set in advance.
In step 205, after brush machine enabled instruction is got, the check value of the brush machine bag under encryption path is obtained.
In step 206, however, it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine is run
Bag.
Step 204- steps 206 are similar with the implementation process and know-why of step 101- steps 103, no longer go to live in the household of one's in-laws on getting married herein
State.
The brush machine bag verification method that the embodiment of the present disclosure is provided, by showing interface for password input, obtains user in password
The encrypted message being input on inputting interface, however, it is determined that the encrypted message of input is consistent with the proper password information for prestoring, then
It is determined that performing operation brush machine bag being stored under encryption path set in advance, brush machine bag is stored in encryption set in advance
Under path, after brush machine enabled instruction is got, the check value of the brush machine bag under encryption path is obtained, however, it is determined that the school of brush machine bag
It is consistent with the criteria check value for prestoring to test value, then run brush machine bag, realizes the message in cipher that can first obtain user input
, only when encrypted message is correct, just be stored in brush machine bag under encryption path set in advance by breath, can improve brush machine bag and test
The efficiency of card method and the accuracy rate of verification method so that, further protect user information security and improve brush machine into
Power.
Following is disclosure device embodiment, can be used for performing method of disclosure embodiment.For disclosure device reality
The details not disclosed in example is applied, method of disclosure embodiment is refer to.
Fig. 4 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.As shown in figure 4, this public affairs
The brush machine bag checking device for opening embodiment offer includes:Memory module 41, the first acquisition module 42 and operation module 43.
Memory module 41, is configured as being stored in brush machine bag under encryption path set in advance.
Optionally, the brush machine bag in the embodiment of the present disclosure is OTA brush machine bags.
First acquisition module 42, is configured as after brush machine bag enabled instruction is got, and obtains the brush machine under encryption path
The check value of bag.
Operation module 43, be configured as determine brush machine bag check value it is consistent with the criteria check value for prestoring when,
Operation brush machine bag.
In a kind of possible implementation, the check value of brush machine bag is the certificate of brush machine bag, and criteria check value is brush machine
The certificate of mounted application program corresponding with brush machine bag on bag checking device.Wherein, application program is operation from legal clothes
Generated after the installation kit obtained in business device.
In alternatively possible implementation, the check value of brush machine bag is to be given birth to according to the certificate and checking algorithm of brush machine bag
Into value, criteria check value be according to brush machine bag verify device on mounted application program corresponding with brush machine bag certificate and
The value of checking algorithm generation.Wherein, application program is generation after the installation kit that operation is obtained from legal server.
It should be noted that the brush machine bag checking device in the embodiment of the present disclosure can also include module out of service, its
Be configured as determine brush machine bag check value it is inconsistent with the criteria check value for prestoring when, brush machine bag out of service, and
Brush machine bag is deleted, to protect the information security of user.
The brush machine bag checking device that the embodiment of the present disclosure is provided, by setting memory module, is configured as depositing brush machine bag
It is stored under encryption path set in advance, the first acquisition module, is configured as after brush machine bag enabled instruction is got, obtains and add
The check value of the brush machine bag under close path, runs module, is configured as check value and the mark for prestoring if it is determined that brush machine bag
Pre-check value is consistent, then run brush machine bag, realizes before brush machine bag is run, first by the storage of brush machine bag under encryption path,
And the check value of comparing brushes machine bag and the criteria check value for prestoring, only it is determined that check value is consistent with criteria check value
When, just run brush machine bag, compared to correlation technique in, directly operation brush machine bag carries out the mode of brush machine operation, and the disclosure is implemented
Example can be verified before brush machine bag carries out brush machine operation, it is therefore prevented that the brush machine bag of illicit sources is on brush machine bag checking device
Operation, so that, realizing in the scene without connection network, the brush machine bag for carrying out brush machine operation is all legal brush machine bag,
Protect the information security of user and improve brush machine success rate.
Fig. 5 is a kind of block diagram of the brush machine bag checking device according to another exemplary embodiment.The embodiment of the present disclosure
On the basis of embodiment illustrated in fig. 4, other modules to brush machine bag checking device make a detailed description.As shown in figure 5, this public affairs
The brush machine bag checking device for opening embodiment offer also includes:Display module 51, the second acquisition module 52 and determining module 53.
Display module 51, is configured as showing interface for password input.
Second acquisition module 52, is configured as obtaining the encrypted message that user is input into interface for password input.
Determining module 53, is configured as determining that the encrypted message of input is consistent with the proper password information for prestoring
When, it is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
The brush machine bag checking device that the embodiment of the present disclosure is provided, by setting display module, is configured as display password defeated
Enter interface, the second acquisition module is configured as obtaining the encrypted message that user is input into interface for password input, determining module,
Be configured as determine input encrypted message it is consistent with the proper password information for prestoring when, it is determined that execution brush machine bag is deposited
The operation under encryption path set in advance is stored in, the encrypted message that can first obtain user input is realized, only in password
When information is correct, just brush machine bag is stored under encryption path set in advance, the efficiency of brush machine bag verification method can be improved
And the accuracy rate of verification method, so that, further protect the information security of user and improve brush machine success rate.
The foregoing describe built-in function and structure that brush machine bag verifies device.Fig. 6 is shown according to an exemplary embodiment
A kind of brush machine bag verify device block diagram.As shown in fig. 6, brush machine bag checking device includes:
Processor 61;
Memory 62 for storing the executable instruction of processor 61;
Wherein, processor 61 is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under encryption path is obtained;
If it is determined that the check value of brush machine bag is consistent with the criteria check value for prestoring, then brush machine bag is run.
Fig. 7 is a kind of block diagram of the brush machine bag checking device according to an exemplary embodiment.For example, device 800 can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices are good for
Body equipment, personal digital assistant etc..
Reference picture 7, device 800 can include following one or more assemblies:Processing assembly 802, memory 804, power supply
Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output (I/O) interface 812, sensor cluster 814, Yi Jitong
Letter component 816.
The integrated operation of the usual control device 800 of processing assembly 802, such as with display, call, data communication, phase
Machine is operated and the associated operation of record operation.Processing assembly 802 can refer to including one or more processors 820 to perform
Order, to complete all or part of step of above-mentioned method.Additionally, processing assembly 802 can include one or more modules, just
Interaction between processing assembly 802 and other assemblies.For example, processing assembly 802 can include multi-media module, it is many to facilitate
Interaction between media component 808 and processing assembly 802.
Memory 804 is configured as storing various types of data supporting the operation in device 800.These data are shown
Example includes the instruction for any application program or method operated on device 800, and contact data, telephone book data disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) is erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for device 800.
Multimedia groupware 808 is included in one screen of output interface of offer between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detection and the touch or slide related duration and pressure.In certain embodiments, many matchmakers
Body component 808 includes a front camera and/or rear camera.When device 800 be in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or with focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody
It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
, to provide interface between processing assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented
Estimate.For example, sensor cluster 814 can detect the opening/closed mode of device 800, the relative positioning of component is for example described
Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device
Position change, user is presence or absence of with what device 800 was contacted, the orientation of device 800 or acceleration/deceleration and device 800
Temperature change.Sensor cluster 814 can include proximity transducer, be configured to be detected when without any physical contact
The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realization, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium verifies device by brush machine bag
Computing device when so that brush machine bag checking device be able to carry out above-mentioned brush machine bag verification method.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice invention disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claims are pointed out.
It should be appreciated that the disclosure is not limited to the precision architecture for being described above and being shown in the drawings, and
And can without departing from the scope carry out various modifications and changes.The scope of the present disclosure is only limited by appending claims
System.
Claims (13)
1. a kind of brush machine bag verification method, it is characterised in that including:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
2. method according to claim 1, it is characterised in that methods described also includes:
Display interface for password input;
Obtain the encrypted message that user is input into the interface for password input;
If it is determined that the encrypted message of the input is consistent with the proper password information for prestoring, it is determined that brush machine bag is deposited in execution
It is stored in the operation under encryption path set in advance.
3. method according to claim 1 and 2, it is characterised in that the check value of the brush machine bag is the brush machine bag
Certificate, the criteria check value is the certificate of mounted application program corresponding with brush machine bag on terminal device;Wherein, it is described
Application program is generation after the installation kit that operation is obtained from legal server.
4. method according to claim 1 and 2, it is characterised in that the check value of the brush machine bag is according to the brush machine
The value of certificate and the checking algorithm generation of bag, the criteria check value is according to mounted corresponding with brush machine bag on terminal device
Application program certificate and checking algorithm generation value;Wherein, application program acquisition from legal server for operation
Installation kit after generate.
5. method according to claim 1, it is characterised in that methods described also includes:
If it is determined that the check value of the brush machine bag is inconsistent with the criteria check value for prestoring, then the brush machine out of service
Bag, and delete the brush machine bag.
6. method according to claim 1, it is characterised in that the brush machine bag is over the air OTA brush machine bags.
7. a kind of brush machine bag verifies device, it is characterised in that including:
Memory module, is configured as being stored in brush machine bag under encryption path set in advance;
First acquisition module, is configured as after brush machine bag enabled instruction is got, and obtains the brush under the encryption path
The check value of machine bag;
Operation module, when the check value for being configured as determining the brush machine bag is consistent with the criteria check value for prestoring, fortune
The row brush machine bag.
8. device according to claim 7, it is characterised in that described device also includes:
Display module, is configured as showing interface for password input;
Second acquisition module, is configured as obtaining the encrypted message that user is input into the interface for password input;
Determining module, when the encrypted message for being configured as determining the input is consistent with the proper password information for prestoring,
It is determined that performing the operation being stored in brush machine bag under encryption path set in advance.
9. the device according to claim 7 or 8, it is characterised in that the check value of the brush machine bag is the brush machine bag
Certificate, the criteria check value is the certificate of mounted application program corresponding with brush machine bag on brush machine bag checking device;Its
In, the application program is generation after the installation kit that operation is obtained from legal server.
10. the device according to claim 7 or 8, it is characterised in that the check value of the brush machine bag is according to the brush machine
The value of certificate and the checking algorithm generation of bag, the criteria check value is to verify mounted on device and brush machine according to brush machine bag
Wrap the value of certificate and the checking algorithm generation of corresponding application program;Wherein, the application program is operation from legal server
Generated after the installation kit of middle acquisition.
11. devices according to claim 7, it is characterised in that described device also includes:
Module out of service, the check value for being configured as determining the brush machine bag is inconsistent with the criteria check value for prestoring
When, the brush machine bag out of service, and delete the brush machine bag.
12. devices according to claim 7, it is characterised in that the brush machine bag is over the air OTA brush machine bags.
A kind of 13. brush machine bag checking devices, it is characterised in that including:
Processor;
Memory for storing the processor-executable instruction;
Wherein, the processor is configured as:
Brush machine bag is stored under encryption path set in advance;
After brush machine bag enabled instruction is got, the check value of the brush machine bag under the encryption path is obtained;
If it is determined that the check value of the brush machine bag is consistent with the criteria check value for prestoring, then the brush machine bag is run.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611036621.0A CN106709284A (en) | 2016-11-23 | 2016-11-23 | Root package validation method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611036621.0A CN106709284A (en) | 2016-11-23 | 2016-11-23 | Root package validation method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106709284A true CN106709284A (en) | 2017-05-24 |
Family
ID=58940190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611036621.0A Pending CN106709284A (en) | 2016-11-23 | 2016-11-23 | Root package validation method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106709284A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597534A (en) * | 2019-08-26 | 2019-12-20 | 珠海格力电器股份有限公司 | Intelligent device and application program updating method, updating auxiliary method and device |
CN110798544A (en) * | 2019-11-05 | 2020-02-14 | Oppo(重庆)智能科技有限公司 | Method and device for verifying validity of mobile terminal, terminal and storage medium |
WO2021097611A1 (en) * | 2019-11-18 | 2021-05-27 | 深圳市欢太科技有限公司 | Firmware flashing method and related apparatus |
CN113434161A (en) * | 2020-03-23 | 2021-09-24 | 成都鼎桥通信技术有限公司 | Software version update control method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103501391A (en) * | 2013-10-10 | 2014-01-08 | 上海斐讯数据通信技术有限公司 | Method and system for managing updating behavior of user |
CN104065482A (en) * | 2014-06-06 | 2014-09-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for improving terminalself-flashing safety through ciphertext handshaking |
CN104239099A (en) * | 2014-09-10 | 2014-12-24 | 厦门美图移动科技有限公司 | Mobile phone flushing control method |
US20150040240A1 (en) * | 2013-08-01 | 2015-02-05 | Corel Corporation | System and method for software piracy monetization |
CN105183499A (en) * | 2015-08-04 | 2015-12-23 | 上海青橙实业有限公司 | ROM flashing method, mobile terminal and terminal system |
-
2016
- 2016-11-23 CN CN201611036621.0A patent/CN106709284A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150040240A1 (en) * | 2013-08-01 | 2015-02-05 | Corel Corporation | System and method for software piracy monetization |
CN103501391A (en) * | 2013-10-10 | 2014-01-08 | 上海斐讯数据通信技术有限公司 | Method and system for managing updating behavior of user |
CN104065482A (en) * | 2014-06-06 | 2014-09-24 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for improving terminalself-flashing safety through ciphertext handshaking |
CN104239099A (en) * | 2014-09-10 | 2014-12-24 | 厦门美图移动科技有限公司 | Mobile phone flushing control method |
CN105183499A (en) * | 2015-08-04 | 2015-12-23 | 上海青橙实业有限公司 | ROM flashing method, mobile terminal and terminal system |
Non-Patent Citations (1)
Title |
---|
樊重俊等: "《数据库基础及应用》", 31 January 2015 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110597534A (en) * | 2019-08-26 | 2019-12-20 | 珠海格力电器股份有限公司 | Intelligent device and application program updating method, updating auxiliary method and device |
CN110798544A (en) * | 2019-11-05 | 2020-02-14 | Oppo(重庆)智能科技有限公司 | Method and device for verifying validity of mobile terminal, terminal and storage medium |
WO2021097611A1 (en) * | 2019-11-18 | 2021-05-27 | 深圳市欢太科技有限公司 | Firmware flashing method and related apparatus |
CN113434161A (en) * | 2020-03-23 | 2021-09-24 | 成都鼎桥通信技术有限公司 | Software version update control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107241688A (en) | Signature, verification method, device and the storage medium of application installation package | |
CN104125055B (en) | Encryption and decryption method and electronic equipment | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN104125067B (en) | Account and token secret key binding method and device | |
CN102016865A (en) | System and method of authorizing execution of software code based on accessible entitlements | |
EP2940977B1 (en) | Method and device for sending information in voice service | |
CN104009837B (en) | Key updating method, device and terminal | |
EP2978162B1 (en) | Anti-counterfeiting verification method, device and system | |
CN104484593B (en) | terminal verification method and device | |
CN104780045B (en) | The management method and device of smart machine | |
CN107169320A (en) | Method of calibration and device | |
CN106709284A (en) | Root package validation method and device | |
TWI761843B (en) | Access control method and device, electronic device and storage medium | |
CN107766701A (en) | Electronic equipment, dynamic library file guard method and device | |
CN104468581B (en) | The method and device of login application program | |
CN111199039B (en) | Application security verification method and device and terminal equipment | |
CN106778225A (en) | The method and apparatus for processing password | |
CN104113588B (en) | The update method of a kind of the Internet Yellow Page and device | |
CN105282162A (en) | Processing method and device for account management business | |
CN106534083B (en) | Brush machine Tool validation method and device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN106295363A (en) | Startup calibration method and device | |
CN106062762B (en) | Using encryption method and device | |
CN107506636A (en) | The guard method of pre-installed applications program and device | |
CN106022160A (en) | Method and apparatuses for deleting user data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170524 |
|
RJ01 | Rejection of invention patent application after publication |