CN107135077A - Software protecting method and device - Google Patents

Software protecting method and device Download PDF

Info

Publication number
CN107135077A
CN107135077A CN201710313959.4A CN201710313959A CN107135077A CN 107135077 A CN107135077 A CN 107135077A CN 201710313959 A CN201710313959 A CN 201710313959A CN 107135077 A CN107135077 A CN 107135077A
Authority
CN
China
Prior art keywords
software
cryptographic hash
node
developer
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710313959.4A
Other languages
Chinese (zh)
Other versions
CN107135077B (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710313959.4A priority Critical patent/CN107135077B/en
Publication of CN107135077A publication Critical patent/CN107135077A/en
Application granted granted Critical
Publication of CN107135077B publication Critical patent/CN107135077B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the present invention provides a kind of software protecting method and device.This method includes:Node in peer-to-peer network receives the signing messages that Software Development Platform is sent;Verified according to the signing messages that the public key of software developer is sent to Software Development Platform;If the signing messages that node is sent according to the public key of software developer to Software Development Platform is proved to be successful, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;If the second cryptographic Hash is less than threshold value, the identity information of software developer, the identification information of software to be released, the first cryptographic Hash, random number and the second cryptographic Hash are sent to other nodes in peer-to-peer network by node.The embodiment of the present invention avoids illegal node from modifying software, while can conveniently determine whether the software is changed, and improves the protection dynamics to software according to the corresponding cryptographic Hash of software identification.

Description

Software protecting method and device
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of software protecting method and device.
Background technology
Web is widely available, and people use various Web to apply, work and life band that these Web application services give people Carry out huge facility, promote the development of society.However, the high speed development applied with Web, for Web application leaks Leakage of information and economic loss increase caused by attack.Software is tampered turns into the maximum prestige that web system is faced The side of body.
In order to solve the problem, prior art proposes some technical schemes, to prevent software to be tampered, wherein, it is a kind of Mode is:The content of software or information products is divided into local information and the network information to be stored in standalone media and network respectively In the heart;Legal user possesses a unique identification information;Network center runs an application software, can be passed by user Whether the identification information judgment user come is legal, and the network information needed for being transmitted to the validated user.So that software is interior Appearance is difficult to be copied illegally, so as to effectively prevent pirate, or even prevents piracy, available for application software or the information production appeared on the market Product.The invention, which is mainly user, to be had after legal mark, and the software can be downloaded from network.In addition, also a kind of mode is:Root According to the software control instruction received, corresponding first software features character string is generated;Using the first software features character string as solution Key, the encryption picture file prestored is decrypted, and obtains corresponding decryption picture file;Loading decryption picture file, And judge whether decryption picture file being capable of normal load;If so, then software is identified as being not tampered with;If it is not, then software is recognized To be tampered.Its by it is traditional using checking character string whether be tampered come identification software replace with using decrypt picture file come It is identified so that identification process is no longer dependent on independent checking character string, and identification process is more directly perceived, and need not It is artificial to compare.
But, it is that protection dynamics to software is not strong enough that above-mentioned technical proposal, which has a problem that,.
The content of the invention
The embodiment of the present invention provides a kind of software protecting method and device, to improve the protection dynamics to software.
The one side of the embodiment of the present invention is to provide a kind of software protecting method, including:
Node in peer-to-peer network receives the signing messages that Software Development Platform is sent, and the signing messages is the software Development platform is breathed out using its corresponding private key to the identity information of software developer, the identification information of software to be released, first The information that uncommon value is obtained after being signed;
The node is according to the identity information of the software developer, and query history, which is recorded, obtains the software developer's Public key;
The signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is carried out Checking;
If the signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is tested Demonstrate,prove successfully, then the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released Identification information, first cryptographic Hash, the random number and second cryptographic Hash of software be sent to the peer-to-peer network In other nodes.
The other side of the embodiment of the present invention is to provide a kind of software safeguards, including:
Receiving module, the signing messages for receiving Software Development Platform transmission, the signing messages is that the software is opened Platform is sent out using its corresponding private key to the identity information of software developer, identification information, the first Hash of software to be released The information that value is obtained after being signed;
Enquiry module, for the identity information according to the software developer, query history record obtains the software and opened The public key of originator;
Authentication module, the signing messages sent for the public key according to the software developer to the Software Development Platform Verified;
Computing module, the signing messages sent for the public key according to the software developer to the Software Development Platform When being proved to be successful, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
Sending module, for when second cryptographic Hash is less than threshold value, by the identity information of the software developer, treating The identification information of the software of issue, first cryptographic Hash, the random number and second cryptographic Hash are sent to the equity Other nodes in network.
Software protecting method and device provided in an embodiment of the present invention, software development is received by the node in peer-to-peer network The signing messages that platform is sent, and the signing messages is verified according to the public key of software developer;, should if verified into Node calculates new cryptographic Hash according to history cryptographic Hash and random number, if new cryptographic Hash is less than threshold value, the node will be soft The identity information of part developer, the identification information of software to be released, random number and new cryptographic Hash are sent in peer-to-peer network Other nodes, it is to avoid illegal node is modified to software, while can be conveniently true according to the corresponding cryptographic Hash of software identification Fixed, whether the software is changed, and improves the protection dynamics to software.
Brief description of the drawings
Fig. 1 is software protecting method flow diagram provided in an embodiment of the present invention;
Fig. 2 is the network architecture diagram that software protecting method provided in an embodiment of the present invention is applicable;
Fig. 3 is the structure chart of software safeguards provided in an embodiment of the present invention;
The structure chart for the software safeguards that Fig. 4 provides for another embodiment of the present invention.
Embodiment
Fig. 1 is software protecting method flow diagram provided in an embodiment of the present invention;Fig. 2 is software provided in an embodiment of the present invention The applicable network architecture diagram of means of defence.Specific software protecting method and step is as follows:
Node in step S101, peer-to-peer network receives the signing messages that Software Development Platform is sent, the signing messages Be the Software Development Platform is believed the mark of the identity information of software developer, software to be released using its corresponding private key The information that breath, the first cryptographic Hash are obtained after being signed.
As shown in Fig. 2 Software Development Platform is when issuing a software, while the identity information of issue software developer, The identification information of software to be released, software to be released and the first cryptographic Hash, first cryptographic Hash is Software Development Platform pair The identity information of software developer, the identification information of software to be released, software to be released carry out the Kazakhstan that Hash operation is obtained Uncommon value.Such as Software Development Platform is by the identity information of the software developer, identification information of software to be released, to be released soft Part and the first cryptographic Hash are sent to application server.Wherein, the identity information of software developer can be specifically software developer Title, the identification information of software to be released can be specifically the title of software to be released, and software to be released specifically can be with Be software developer's software to be released after exploitation in itself.In order to prevent malicious modification person from calculating while changing software new HASH values cause verifier can not discover, issue software while, Software Development Platform is also needed to software developer's Identity information, the identification information of software to be released and the first cryptographic Hash are published to public account book, and the public account book is by peer-to-peer network Each node maintenance in network, and ensure that the public account book is not tampered with, in addition, Software Development Platform can also be peer-to-peer network In node.
When user terminal from application server inquires the software of its needs, that the software is originally obtained after one's death is corresponding soft in itself The identity information of part developer, the identification information of software to be released and the first cryptographic Hash;Meanwhile, user terminal is also from peer-to-peer network The software corresponding first cryptographic Hash in itself is obtained in public account book in network.User terminal compares what is obtained from application server The software in itself corresponding first cryptographic Hash and the software that is obtained from public account book in itself corresponding first cryptographic Hash whether Unanimously, if it is inconsistent, the user terminal does not download the software in itself;If consistent, the user terminal downloads software sheet Body, when the complete software of user terminal downloads originally after one's death, identity information to software developer, the mark letter of software to be released Breath, software to be released carry out Hash operation and obtain a cryptographic Hash, and compare the cryptographic Hash calculated and application server, public affairs Whether corresponding first cryptographic Hash is consistent in itself for the software recorded altogether in account book, if it is inconsistent, the user terminal is uneasy Dress uses the software in itself, if unanimously, the user terminal is installed or uses the software in itself.
Software Development Platform specifically can be using its corresponding private key to the identity information of the software developer, to be released The identification information of software, the first cryptographic Hash obtain signing messages after being signed, and signing messages is sent in peer-to-peer network Node.
Step S102, the node are according to the identity information of the software developer, and query history, which is recorded, obtains described soft The public key of part developer.
In the present embodiment, public account book can also record pair of the identity information of each node and the public key of each node It should be related to, for example can be with the identity information of logging software developer and the public key of the software developer.
Node in peer-to-peer network is received after the signing messages of Software Development Platform transmission, inquires about this in public account book soft The public key of the corresponding software developer of identity information of part developer.
The signature that step S103, the node are sent according to the public key of the software developer to the Software Development Platform Information is verified.
The signing messages that node in peer-to-peer network is sent according to the public key of the software developer to the Software Development Platform Verified.
If the label that step S104, the node are sent according to the public key of the software developer to the Software Development Platform Name Information Authentication success, then calculate the second cryptographic Hash according to history cryptographic Hash and random number.
If the signature that the node in peer-to-peer network is sent according to the public key of the software developer to the Software Development Platform Information Authentication success, the identity for illustrating the software developer is true legal, then the node is according to history cryptographic Hash and random Number calculates the second cryptographic Hash, while the node calculates the second cryptographic Hash, and other nodes in peer-to-peer network are also calculating second The purpose that each node in cryptographic Hash, peer-to-peer network calculates the second cryptographic Hash is:Each node is breathed out according to second calculated Uncommon value obtains the identity information for recording the software developer, the identification information of software to be released, the right of the first cryptographic Hash, has Body, if the second cryptographic Hash that some node in each node is calculated is less than threshold value, the node can get note Record the identity information, the identification information of software to be released, the right of the first cryptographic Hash of the software developer.
If step S105, second cryptographic Hash are less than threshold value, the node believes the identity of the software developer Breath, identification information, first cryptographic Hash, the random number and second cryptographic Hash of software to be released are sent to described Other nodes in peer-to-peer network.
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released soft The identification information of part, the first cryptographic Hash, the random number and second cryptographic Hash are sent to other in the peer-to-peer network Node.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification To the protection dynamics of software.
On the basis of above-described embodiment, the node in peer-to-peer network can also be by the identity information of oneself and the node Public key is sent to other nodes in peer-to-peer network, so that other nodes deposit the public key of the identity information of the node and the node Store up in public account book.In addition, before the signing messages that node reception Software Development Platform is sent, the node can also receive this The corresponding relation of the identity information for the software developer that Software Development Platform is sent and the public key of the software developer;And The corresponding relation of the identity information of the software developer and the public key of the software developer is stored in the historical record In.
Fig. 3 is the structure chart of software safeguards provided in an embodiment of the present invention.Software provided in an embodiment of the present invention is prevented Protection unit can perform the handling process of software protecting embodiment of the method offer, as shown in figure 3, software safeguards 30 include connecing Module 31, enquiry module 32, authentication module 33, computing module 34, sending module 35 are received, wherein, receiving module 31 is used to receive The signing messages that Software Development Platform is sent, the signing messages is that the Software Development Platform uses its corresponding private key to soft The information that the identity information of part developer, the identification information of software to be released, the first cryptographic Hash are obtained after being signed;Inquiry Module 32 is used for the identity information according to the software developer, and query history record obtains the public key of the software developer; The signing messages that authentication module 33 is used to send the Software Development Platform according to the public key of the software developer is tested Card;The signing messages that computing module 34 is used to send the Software Development Platform according to the public key of the software developer is verified During success, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;Sending module 35 is used for when second cryptographic Hash is small When threshold value, by the identity information of the software developer, the identification information of software to be released, first cryptographic Hash, institute State random number and second cryptographic Hash is sent to other nodes in the peer-to-peer network.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification To the protection dynamics of software.
The structure chart for the software safeguards that Fig. 4 provides for another embodiment of the present invention.On the basis of above-described embodiment, First cryptographic Hash is the Software Development Platform to the mark of the identity information of the software developer, software to be released Information, software to be released carry out the cryptographic Hash that Hash operation is obtained.
First cryptographic Hash is the Software Development Platform to the identity information of the software developer, to be released soft The identification information of part, software to be released carry out the cryptographic Hash that Hash operation is obtained.
Sending module 35 is additionally operable to the public key of the identity information of the node and the node being sent to the peer-to-peer network Other nodes in network.Receiving module 31 also has the body for being used for receiving the software developer that the Software Development Platform is sent The corresponding relation of the public key of part information and the software developer;In addition, software safeguards 30 also include memory module 36, deposit Storage module 36 is used to the corresponding relation of the identity information of the software developer and the public key of the software developer being stored in In the historical record.
The method that software safeguards provided in an embodiment of the present invention can be provided specifically for performing above-mentioned Fig. 1 is implemented Example, here is omitted for concrete function.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification To the protection dynamics of software.
In summary, the embodiment of the present invention receives the A.L.S. that Software Development Platform is sent by the node in peer-to-peer network Breath, and the signing messages is verified according to the public key of software developer;If verified into, the node is according to history Hash Value and random number calculate new cryptographic Hash, if new cryptographic Hash is less than threshold value, the node believes the identity of software developer Breath, identification information, random number and the new cryptographic Hash of software to be released are sent to other nodes in peer-to-peer network, it is to avoid non- Method node is modified to software, while can conveniently determine whether the software is repaiied according to the corresponding cryptographic Hash of software identification Change, improve the protection dynamics to software.
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical of device or unit by some interfaces Letter connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can distribute complete by different functional modules by above-mentioned functions as needed Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. a kind of software protecting method, it is characterised in that including:
Node in peer-to-peer network receives the signing messages that Software Development Platform is sent, and the signing messages is the software development Platform is using its corresponding private key to the identity information of software developer, the identification information of software to be released, the first cryptographic Hash The information obtained after being signed;
The node is according to the identity information of the software developer, the public affairs of the query history record acquisition software developer Key;
The signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is verified;
If the signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is verified into Work(, then calculate the second cryptographic Hash according to history cryptographic Hash and random number;
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released soft The identification information of part, first cryptographic Hash, the random number and second cryptographic Hash are sent in the peer-to-peer network Other nodes.
2. according to the method described in claim 1, it is characterised in that first cryptographic Hash is the Software Development Platform to institute The identity information, the identification information of software to be released, software to be released for stating software developer carry out what Hash operation was obtained Cryptographic Hash.
3. method according to claim 2, it is characterised in that the identity information of the software developer, to be released soft The identification information of part, software to be released and first cryptographic Hash storage are on the application server.
4. method according to claim 3, it is characterised in that also include:
The public key of the identity information of the node and the node is sent to other sections in the peer-to-peer network by the node Point.
5. according to the method described in claim 1, it is characterised in that the node receives the A.L.S. that Software Development Platform is sent Before breath, in addition to:
The node receives the identity information for the software developer that the Software Development Platform is sent and the software development The corresponding relation of the public key of person;
The corresponding relation of the identity information of the software developer and the public key of the software developer is stored in by the node In the historical record.
6. a kind of software safeguards, it is characterised in that including:
Receiving module, the signing messages for receiving Software Development Platform transmission, the signing messages is that the software development is put down Platform is entered using its corresponding private key to the identity information of software developer, the identification information of software to be released, the first cryptographic Hash The information obtained after row signature;
Enquiry module, for the identity information according to the software developer, query history record obtains the software developer Public key;
Authentication module, is carried out for the signing messages that the public key according to the software developer is sent to the Software Development Platform Checking;
Computing module, the signing messages checking sent for the public key according to the software developer to the Software Development Platform During success, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
Sending module, for when second cryptographic Hash is less than threshold value, by the identity information of the software developer, to be released Identification information, first cryptographic Hash, the random number and second cryptographic Hash of software be sent to the peer-to-peer network In other nodes.
7. software safeguards according to claim 6, it is characterised in that first cryptographic Hash is the software development Platform carries out Hash fortune to the identity information of the software developer, the identification information of software to be released, software to be released Obtained cryptographic Hash.
8. software safeguards according to claim 7, it is characterised in that the identity information of the software developer, treat The identification information of the software of issue, software to be released and first cryptographic Hash storage are on the application server.
9. software safeguards according to claim 8, it is characterised in that the sending module is additionally operable to the node Identity information and the public key of the node be sent to other nodes in the peer-to-peer network.
10. software safeguards according to claim 6, it is characterised in that the receiving module, which also has, to be used to receive institute State the corresponding relation of the identity information of the software developer of Software Development Platform transmission and the public key of the software developer;
The software safeguards also include memory module, and the memory module is used for the identity information of the software developer It is stored in the corresponding relation of the public key of the software developer in the historical record.
CN201710313959.4A 2017-05-05 2017-05-05 Software protecting method and device Active CN107135077B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710313959.4A CN107135077B (en) 2017-05-05 2017-05-05 Software protecting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710313959.4A CN107135077B (en) 2017-05-05 2017-05-05 Software protecting method and device

Publications (2)

Publication Number Publication Date
CN107135077A true CN107135077A (en) 2017-09-05
CN107135077B CN107135077B (en) 2019-08-06

Family

ID=59732423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710313959.4A Active CN107135077B (en) 2017-05-05 2017-05-05 Software protecting method and device

Country Status (1)

Country Link
CN (1) CN107135077B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874893A (en) * 2018-03-16 2018-11-23 艾维克科技股份有限公司 Decentralized information establishing system and method capable of evaluating products
CN109274640A (en) * 2018-06-07 2019-01-25 艾维克科技股份有限公司 Decentralized software information establishing system and method
CN110287087A (en) * 2018-03-19 2019-09-27 百度在线网络技术(北京)有限公司 Method and apparatus for detecting application
CN110362967A (en) * 2019-07-15 2019-10-22 北京奇艺世纪科技有限公司 The anti-tamper detection method of application program, device, terminal device and storage medium
CN110941818A (en) * 2018-09-21 2020-03-31 武汉安天信息技术有限责任公司 Reputation obtaining method and device for mobile application program developer
CN112187880A (en) * 2020-09-10 2021-01-05 中国联合网络通信集团有限公司 Network content management method and device
CN114428952A (en) * 2022-04-07 2022-05-03 北京亿赛通科技发展有限责任公司 Method, system and server for verifying characteristic value of public network electronic file

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080137868A1 (en) * 2006-12-08 2008-06-12 University Technologies International, a Canadian Corporation Distributed encryption methods and systems
CN105204914A (en) * 2015-10-23 2015-12-30 中国联合网络通信集团有限公司 Downloading method and device of application software
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes
CN106549995A (en) * 2015-09-21 2017-03-29 北京广密华安科技有限公司 Information cache and the method, apparatus and system for pushing in peer-to-peer network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080137868A1 (en) * 2006-12-08 2008-06-12 University Technologies International, a Canadian Corporation Distributed encryption methods and systems
CN106549995A (en) * 2015-09-21 2017-03-29 北京广密华安科技有限公司 Information cache and the method, apparatus and system for pushing in peer-to-peer network
CN105204914A (en) * 2015-10-23 2015-12-30 中国联合网络通信集团有限公司 Downloading method and device of application software
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
姚忠将: "关于区块链原理及应用的综述", 《科研信息化技术与应用》 *
文学路: "Android应用软件防护技术研究与实践", 《中国优秀硕士学位论文全文数据库(电子期刊)·信息科技辑》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874893A (en) * 2018-03-16 2018-11-23 艾维克科技股份有限公司 Decentralized information establishing system and method capable of evaluating products
CN110287087A (en) * 2018-03-19 2019-09-27 百度在线网络技术(北京)有限公司 Method and apparatus for detecting application
CN110287087B (en) * 2018-03-19 2023-06-13 百度在线网络技术(北京)有限公司 Method and device for detecting application
CN109274640A (en) * 2018-06-07 2019-01-25 艾维克科技股份有限公司 Decentralized software information establishing system and method
CN110941818A (en) * 2018-09-21 2020-03-31 武汉安天信息技术有限责任公司 Reputation obtaining method and device for mobile application program developer
CN110362967A (en) * 2019-07-15 2019-10-22 北京奇艺世纪科技有限公司 The anti-tamper detection method of application program, device, terminal device and storage medium
CN112187880A (en) * 2020-09-10 2021-01-05 中国联合网络通信集团有限公司 Network content management method and device
CN112187880B (en) * 2020-09-10 2022-03-18 中国联合网络通信集团有限公司 Network content management method and device
CN114428952A (en) * 2022-04-07 2022-05-03 北京亿赛通科技发展有限责任公司 Method, system and server for verifying characteristic value of public network electronic file
CN114428952B (en) * 2022-04-07 2022-07-19 北京亿赛通科技发展有限责任公司 Method, system and server for verifying characteristic value of public network electronic file

Also Published As

Publication number Publication date
CN107135077B (en) 2019-08-06

Similar Documents

Publication Publication Date Title
CN107135077A (en) Software protecting method and device
JP7364724B2 (en) Operating system for blockchain IoT devices
TWI770022B (en) Computer implemented control method, system and control system
CN104363271B (en) Document breakpoint transmission method and device
EP2267628B1 (en) Token passing technique for media playback devices
CN107171785A (en) A kind of digital copyright management method based on block chain technology
CN108270874A (en) The update method and device of application program
CN108399329A (en) A method of improving trusted application safety
CN104199657B (en) The call method and device of open platform
JP2005536951A (en) Apparatus, system, and method for securing digital documents in a digital device
CN103731395A (en) Processing method and system for files
CN107947917A (en) A kind of method and device for generating whitepack key
CN104040552A (en) Software modification for partial secure memory processing
CN107590025A (en) A kind of back-up restoring method and system
US7693675B2 (en) Method for protection of sensor node's data, a systems for secure transportation of a sensor node and a sensor node that achieves these
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
CN109214807A (en) Method, apparatus, computer equipment and the storage medium of management contribution information
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN111737715A (en) Decentralized electronic contract online signing method and system
CN113344222A (en) Safe and credible federal learning mechanism based on block chain
CN104426657B (en) A kind of service authentication method, system and server
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN108111528A (en) A kind of anti-phishing method and system based on block chain
US20220101308A1 (en) Method and system for payment for central bank digital currency
CN106548097A (en) The operation method and device of network device software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant