CN107135077A - Software protecting method and device - Google Patents
Software protecting method and device Download PDFInfo
- Publication number
- CN107135077A CN107135077A CN201710313959.4A CN201710313959A CN107135077A CN 107135077 A CN107135077 A CN 107135077A CN 201710313959 A CN201710313959 A CN 201710313959A CN 107135077 A CN107135077 A CN 107135077A
- Authority
- CN
- China
- Prior art keywords
- software
- cryptographic hash
- node
- developer
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The embodiment of the present invention provides a kind of software protecting method and device.This method includes:Node in peer-to-peer network receives the signing messages that Software Development Platform is sent;Verified according to the signing messages that the public key of software developer is sent to Software Development Platform;If the signing messages that node is sent according to the public key of software developer to Software Development Platform is proved to be successful, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;If the second cryptographic Hash is less than threshold value, the identity information of software developer, the identification information of software to be released, the first cryptographic Hash, random number and the second cryptographic Hash are sent to other nodes in peer-to-peer network by node.The embodiment of the present invention avoids illegal node from modifying software, while can conveniently determine whether the software is changed, and improves the protection dynamics to software according to the corresponding cryptographic Hash of software identification.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of software protecting method and device.
Background technology
Web is widely available, and people use various Web to apply, work and life band that these Web application services give people
Carry out huge facility, promote the development of society.However, the high speed development applied with Web, for Web application leaks
Leakage of information and economic loss increase caused by attack.Software is tampered turns into the maximum prestige that web system is faced
The side of body.
In order to solve the problem, prior art proposes some technical schemes, to prevent software to be tampered, wherein, it is a kind of
Mode is:The content of software or information products is divided into local information and the network information to be stored in standalone media and network respectively
In the heart;Legal user possesses a unique identification information;Network center runs an application software, can be passed by user
Whether the identification information judgment user come is legal, and the network information needed for being transmitted to the validated user.So that software is interior
Appearance is difficult to be copied illegally, so as to effectively prevent pirate, or even prevents piracy, available for application software or the information production appeared on the market
Product.The invention, which is mainly user, to be had after legal mark, and the software can be downloaded from network.In addition, also a kind of mode is:Root
According to the software control instruction received, corresponding first software features character string is generated;Using the first software features character string as solution
Key, the encryption picture file prestored is decrypted, and obtains corresponding decryption picture file;Loading decryption picture file,
And judge whether decryption picture file being capable of normal load;If so, then software is identified as being not tampered with;If it is not, then software is recognized
To be tampered.Its by it is traditional using checking character string whether be tampered come identification software replace with using decrypt picture file come
It is identified so that identification process is no longer dependent on independent checking character string, and identification process is more directly perceived, and need not
It is artificial to compare.
But, it is that protection dynamics to software is not strong enough that above-mentioned technical proposal, which has a problem that,.
The content of the invention
The embodiment of the present invention provides a kind of software protecting method and device, to improve the protection dynamics to software.
The one side of the embodiment of the present invention is to provide a kind of software protecting method, including:
Node in peer-to-peer network receives the signing messages that Software Development Platform is sent, and the signing messages is the software
Development platform is breathed out using its corresponding private key to the identity information of software developer, the identification information of software to be released, first
The information that uncommon value is obtained after being signed;
The node is according to the identity information of the software developer, and query history, which is recorded, obtains the software developer's
Public key;
The signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is carried out
Checking;
If the signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is tested
Demonstrate,prove successfully, then the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released
Identification information, first cryptographic Hash, the random number and second cryptographic Hash of software be sent to the peer-to-peer network
In other nodes.
The other side of the embodiment of the present invention is to provide a kind of software safeguards, including:
Receiving module, the signing messages for receiving Software Development Platform transmission, the signing messages is that the software is opened
Platform is sent out using its corresponding private key to the identity information of software developer, identification information, the first Hash of software to be released
The information that value is obtained after being signed;
Enquiry module, for the identity information according to the software developer, query history record obtains the software and opened
The public key of originator;
Authentication module, the signing messages sent for the public key according to the software developer to the Software Development Platform
Verified;
Computing module, the signing messages sent for the public key according to the software developer to the Software Development Platform
When being proved to be successful, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
Sending module, for when second cryptographic Hash is less than threshold value, by the identity information of the software developer, treating
The identification information of the software of issue, first cryptographic Hash, the random number and second cryptographic Hash are sent to the equity
Other nodes in network.
Software protecting method and device provided in an embodiment of the present invention, software development is received by the node in peer-to-peer network
The signing messages that platform is sent, and the signing messages is verified according to the public key of software developer;, should if verified into
Node calculates new cryptographic Hash according to history cryptographic Hash and random number, if new cryptographic Hash is less than threshold value, the node will be soft
The identity information of part developer, the identification information of software to be released, random number and new cryptographic Hash are sent in peer-to-peer network
Other nodes, it is to avoid illegal node is modified to software, while can be conveniently true according to the corresponding cryptographic Hash of software identification
Fixed, whether the software is changed, and improves the protection dynamics to software.
Brief description of the drawings
Fig. 1 is software protecting method flow diagram provided in an embodiment of the present invention;
Fig. 2 is the network architecture diagram that software protecting method provided in an embodiment of the present invention is applicable;
Fig. 3 is the structure chart of software safeguards provided in an embodiment of the present invention;
The structure chart for the software safeguards that Fig. 4 provides for another embodiment of the present invention.
Embodiment
Fig. 1 is software protecting method flow diagram provided in an embodiment of the present invention;Fig. 2 is software provided in an embodiment of the present invention
The applicable network architecture diagram of means of defence.Specific software protecting method and step is as follows:
Node in step S101, peer-to-peer network receives the signing messages that Software Development Platform is sent, the signing messages
Be the Software Development Platform is believed the mark of the identity information of software developer, software to be released using its corresponding private key
The information that breath, the first cryptographic Hash are obtained after being signed.
As shown in Fig. 2 Software Development Platform is when issuing a software, while the identity information of issue software developer,
The identification information of software to be released, software to be released and the first cryptographic Hash, first cryptographic Hash is Software Development Platform pair
The identity information of software developer, the identification information of software to be released, software to be released carry out the Kazakhstan that Hash operation is obtained
Uncommon value.Such as Software Development Platform is by the identity information of the software developer, identification information of software to be released, to be released soft
Part and the first cryptographic Hash are sent to application server.Wherein, the identity information of software developer can be specifically software developer
Title, the identification information of software to be released can be specifically the title of software to be released, and software to be released specifically can be with
Be software developer's software to be released after exploitation in itself.In order to prevent malicious modification person from calculating while changing software new
HASH values cause verifier can not discover, issue software while, Software Development Platform is also needed to software developer's
Identity information, the identification information of software to be released and the first cryptographic Hash are published to public account book, and the public account book is by peer-to-peer network
Each node maintenance in network, and ensure that the public account book is not tampered with, in addition, Software Development Platform can also be peer-to-peer network
In node.
When user terminal from application server inquires the software of its needs, that the software is originally obtained after one's death is corresponding soft in itself
The identity information of part developer, the identification information of software to be released and the first cryptographic Hash;Meanwhile, user terminal is also from peer-to-peer network
The software corresponding first cryptographic Hash in itself is obtained in public account book in network.User terminal compares what is obtained from application server
The software in itself corresponding first cryptographic Hash and the software that is obtained from public account book in itself corresponding first cryptographic Hash whether
Unanimously, if it is inconsistent, the user terminal does not download the software in itself;If consistent, the user terminal downloads software sheet
Body, when the complete software of user terminal downloads originally after one's death, identity information to software developer, the mark letter of software to be released
Breath, software to be released carry out Hash operation and obtain a cryptographic Hash, and compare the cryptographic Hash calculated and application server, public affairs
Whether corresponding first cryptographic Hash is consistent in itself for the software recorded altogether in account book, if it is inconsistent, the user terminal is uneasy
Dress uses the software in itself, if unanimously, the user terminal is installed or uses the software in itself.
Software Development Platform specifically can be using its corresponding private key to the identity information of the software developer, to be released
The identification information of software, the first cryptographic Hash obtain signing messages after being signed, and signing messages is sent in peer-to-peer network
Node.
Step S102, the node are according to the identity information of the software developer, and query history, which is recorded, obtains described soft
The public key of part developer.
In the present embodiment, public account book can also record pair of the identity information of each node and the public key of each node
It should be related to, for example can be with the identity information of logging software developer and the public key of the software developer.
Node in peer-to-peer network is received after the signing messages of Software Development Platform transmission, inquires about this in public account book soft
The public key of the corresponding software developer of identity information of part developer.
The signature that step S103, the node are sent according to the public key of the software developer to the Software Development Platform
Information is verified.
The signing messages that node in peer-to-peer network is sent according to the public key of the software developer to the Software Development Platform
Verified.
If the label that step S104, the node are sent according to the public key of the software developer to the Software Development Platform
Name Information Authentication success, then calculate the second cryptographic Hash according to history cryptographic Hash and random number.
If the signature that the node in peer-to-peer network is sent according to the public key of the software developer to the Software Development Platform
Information Authentication success, the identity for illustrating the software developer is true legal, then the node is according to history cryptographic Hash and random
Number calculates the second cryptographic Hash, while the node calculates the second cryptographic Hash, and other nodes in peer-to-peer network are also calculating second
The purpose that each node in cryptographic Hash, peer-to-peer network calculates the second cryptographic Hash is:Each node is breathed out according to second calculated
Uncommon value obtains the identity information for recording the software developer, the identification information of software to be released, the right of the first cryptographic Hash, has
Body, if the second cryptographic Hash that some node in each node is calculated is less than threshold value, the node can get note
Record the identity information, the identification information of software to be released, the right of the first cryptographic Hash of the software developer.
If step S105, second cryptographic Hash are less than threshold value, the node believes the identity of the software developer
Breath, identification information, first cryptographic Hash, the random number and second cryptographic Hash of software to be released are sent to described
Other nodes in peer-to-peer network.
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released soft
The identification information of part, the first cryptographic Hash, the random number and second cryptographic Hash are sent to other in the peer-to-peer network
Node.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to
The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random
Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released
Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair
Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification
To the protection dynamics of software.
On the basis of above-described embodiment, the node in peer-to-peer network can also be by the identity information of oneself and the node
Public key is sent to other nodes in peer-to-peer network, so that other nodes deposit the public key of the identity information of the node and the node
Store up in public account book.In addition, before the signing messages that node reception Software Development Platform is sent, the node can also receive this
The corresponding relation of the identity information for the software developer that Software Development Platform is sent and the public key of the software developer;And
The corresponding relation of the identity information of the software developer and the public key of the software developer is stored in the historical record
In.
Fig. 3 is the structure chart of software safeguards provided in an embodiment of the present invention.Software provided in an embodiment of the present invention is prevented
Protection unit can perform the handling process of software protecting embodiment of the method offer, as shown in figure 3, software safeguards 30 include connecing
Module 31, enquiry module 32, authentication module 33, computing module 34, sending module 35 are received, wherein, receiving module 31 is used to receive
The signing messages that Software Development Platform is sent, the signing messages is that the Software Development Platform uses its corresponding private key to soft
The information that the identity information of part developer, the identification information of software to be released, the first cryptographic Hash are obtained after being signed;Inquiry
Module 32 is used for the identity information according to the software developer, and query history record obtains the public key of the software developer;
The signing messages that authentication module 33 is used to send the Software Development Platform according to the public key of the software developer is tested
Card;The signing messages that computing module 34 is used to send the Software Development Platform according to the public key of the software developer is verified
During success, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;Sending module 35 is used for when second cryptographic Hash is small
When threshold value, by the identity information of the software developer, the identification information of software to be released, first cryptographic Hash, institute
State random number and second cryptographic Hash is sent to other nodes in the peer-to-peer network.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to
The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random
Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released
Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair
Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification
To the protection dynamics of software.
The structure chart for the software safeguards that Fig. 4 provides for another embodiment of the present invention.On the basis of above-described embodiment,
First cryptographic Hash is the Software Development Platform to the mark of the identity information of the software developer, software to be released
Information, software to be released carry out the cryptographic Hash that Hash operation is obtained.
First cryptographic Hash is the Software Development Platform to the identity information of the software developer, to be released soft
The identification information of part, software to be released carry out the cryptographic Hash that Hash operation is obtained.
Sending module 35 is additionally operable to the public key of the identity information of the node and the node being sent to the peer-to-peer network
Other nodes in network.Receiving module 31 also has the body for being used for receiving the software developer that the Software Development Platform is sent
The corresponding relation of the public key of part information and the software developer;In addition, software safeguards 30 also include memory module 36, deposit
Storage module 36 is used to the corresponding relation of the identity information of the software developer and the public key of the software developer being stored in
In the historical record.
The method that software safeguards provided in an embodiment of the present invention can be provided specifically for performing above-mentioned Fig. 1 is implemented
Example, here is omitted for concrete function.
The signing messages that the embodiment of the present invention is sent by the node reception Software Development Platform in peer-to-peer network, and according to
The public key of software developer is verified to the signing messages;If verified into, the node is according to history cryptographic Hash and at random
Number calculates new cryptographic Hash, if new cryptographic Hash is less than threshold value, and the node is by the identity information of software developer, to be released
Identification information, random number and the new cryptographic Hash of software be sent to other nodes in peer-to-peer network, it is to avoid illegal node pair
Software is modified, while can conveniently determine whether the software is changed, improved according to the corresponding cryptographic Hash of software identification
To the protection dynamics of software.
In summary, the embodiment of the present invention receives the A.L.S. that Software Development Platform is sent by the node in peer-to-peer network
Breath, and the signing messages is verified according to the public key of software developer;If verified into, the node is according to history Hash
Value and random number calculate new cryptographic Hash, if new cryptographic Hash is less than threshold value, the node believes the identity of software developer
Breath, identification information, random number and the new cryptographic Hash of software to be released are sent to other nodes in peer-to-peer network, it is to avoid non-
Method node is modified to software, while can conveniently determine whether the software is repaiied according to the corresponding cryptographic Hash of software identification
Change, improve the protection dynamics to software.
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical of device or unit by some interfaces
Letter connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer
Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can distribute complete by different functional modules by above-mentioned functions as needed
Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
1. a kind of software protecting method, it is characterised in that including:
Node in peer-to-peer network receives the signing messages that Software Development Platform is sent, and the signing messages is the software development
Platform is using its corresponding private key to the identity information of software developer, the identification information of software to be released, the first cryptographic Hash
The information obtained after being signed;
The node is according to the identity information of the software developer, the public affairs of the query history record acquisition software developer
Key;
The signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is verified;
If the signing messages that the node is sent according to the public key of the software developer to the Software Development Platform is verified into
Work(, then calculate the second cryptographic Hash according to history cryptographic Hash and random number;
If second cryptographic Hash is less than threshold value, the node is by the identity information of the software developer, to be released soft
The identification information of part, first cryptographic Hash, the random number and second cryptographic Hash are sent in the peer-to-peer network
Other nodes.
2. according to the method described in claim 1, it is characterised in that first cryptographic Hash is the Software Development Platform to institute
The identity information, the identification information of software to be released, software to be released for stating software developer carry out what Hash operation was obtained
Cryptographic Hash.
3. method according to claim 2, it is characterised in that the identity information of the software developer, to be released soft
The identification information of part, software to be released and first cryptographic Hash storage are on the application server.
4. method according to claim 3, it is characterised in that also include:
The public key of the identity information of the node and the node is sent to other sections in the peer-to-peer network by the node
Point.
5. according to the method described in claim 1, it is characterised in that the node receives the A.L.S. that Software Development Platform is sent
Before breath, in addition to:
The node receives the identity information for the software developer that the Software Development Platform is sent and the software development
The corresponding relation of the public key of person;
The corresponding relation of the identity information of the software developer and the public key of the software developer is stored in by the node
In the historical record.
6. a kind of software safeguards, it is characterised in that including:
Receiving module, the signing messages for receiving Software Development Platform transmission, the signing messages is that the software development is put down
Platform is entered using its corresponding private key to the identity information of software developer, the identification information of software to be released, the first cryptographic Hash
The information obtained after row signature;
Enquiry module, for the identity information according to the software developer, query history record obtains the software developer
Public key;
Authentication module, is carried out for the signing messages that the public key according to the software developer is sent to the Software Development Platform
Checking;
Computing module, the signing messages checking sent for the public key according to the software developer to the Software Development Platform
During success, the second cryptographic Hash is calculated according to history cryptographic Hash and random number;
Sending module, for when second cryptographic Hash is less than threshold value, by the identity information of the software developer, to be released
Identification information, first cryptographic Hash, the random number and second cryptographic Hash of software be sent to the peer-to-peer network
In other nodes.
7. software safeguards according to claim 6, it is characterised in that first cryptographic Hash is the software development
Platform carries out Hash fortune to the identity information of the software developer, the identification information of software to be released, software to be released
Obtained cryptographic Hash.
8. software safeguards according to claim 7, it is characterised in that the identity information of the software developer, treat
The identification information of the software of issue, software to be released and first cryptographic Hash storage are on the application server.
9. software safeguards according to claim 8, it is characterised in that the sending module is additionally operable to the node
Identity information and the public key of the node be sent to other nodes in the peer-to-peer network.
10. software safeguards according to claim 6, it is characterised in that the receiving module, which also has, to be used to receive institute
State the corresponding relation of the identity information of the software developer of Software Development Platform transmission and the public key of the software developer;
The software safeguards also include memory module, and the memory module is used for the identity information of the software developer
It is stored in the corresponding relation of the public key of the software developer in the historical record.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710313959.4A CN107135077B (en) | 2017-05-05 | 2017-05-05 | Software protecting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710313959.4A CN107135077B (en) | 2017-05-05 | 2017-05-05 | Software protecting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107135077A true CN107135077A (en) | 2017-09-05 |
CN107135077B CN107135077B (en) | 2019-08-06 |
Family
ID=59732423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710313959.4A Active CN107135077B (en) | 2017-05-05 | 2017-05-05 | Software protecting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107135077B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108874893A (en) * | 2018-03-16 | 2018-11-23 | 艾维克科技股份有限公司 | Decentralized information establishing system and method capable of evaluating products |
CN109274640A (en) * | 2018-06-07 | 2019-01-25 | 艾维克科技股份有限公司 | Decentralized software information establishing system and method |
CN110287087A (en) * | 2018-03-19 | 2019-09-27 | 百度在线网络技术(北京)有限公司 | Method and apparatus for detecting application |
CN110362967A (en) * | 2019-07-15 | 2019-10-22 | 北京奇艺世纪科技有限公司 | The anti-tamper detection method of application program, device, terminal device and storage medium |
CN110941818A (en) * | 2018-09-21 | 2020-03-31 | 武汉安天信息技术有限责任公司 | Reputation obtaining method and device for mobile application program developer |
CN112187880A (en) * | 2020-09-10 | 2021-01-05 | 中国联合网络通信集团有限公司 | Network content management method and device |
CN114428952A (en) * | 2022-04-07 | 2022-05-03 | 北京亿赛通科技发展有限责任公司 | Method, system and server for verifying characteristic value of public network electronic file |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080137868A1 (en) * | 2006-12-08 | 2008-06-12 | University Technologies International, a Canadian Corporation | Distributed encryption methods and systems |
CN105204914A (en) * | 2015-10-23 | 2015-12-30 | 中国联合网络通信集团有限公司 | Downloading method and device of application software |
CN106530088A (en) * | 2016-12-19 | 2017-03-22 | 杜伯仁 | Method for trading stock product based on block chain security nodes |
CN106549995A (en) * | 2015-09-21 | 2017-03-29 | 北京广密华安科技有限公司 | Information cache and the method, apparatus and system for pushing in peer-to-peer network |
-
2017
- 2017-05-05 CN CN201710313959.4A patent/CN107135077B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080137868A1 (en) * | 2006-12-08 | 2008-06-12 | University Technologies International, a Canadian Corporation | Distributed encryption methods and systems |
CN106549995A (en) * | 2015-09-21 | 2017-03-29 | 北京广密华安科技有限公司 | Information cache and the method, apparatus and system for pushing in peer-to-peer network |
CN105204914A (en) * | 2015-10-23 | 2015-12-30 | 中国联合网络通信集团有限公司 | Downloading method and device of application software |
CN106530088A (en) * | 2016-12-19 | 2017-03-22 | 杜伯仁 | Method for trading stock product based on block chain security nodes |
Non-Patent Citations (2)
Title |
---|
姚忠将: "关于区块链原理及应用的综述", 《科研信息化技术与应用》 * |
文学路: "Android应用软件防护技术研究与实践", 《中国优秀硕士学位论文全文数据库(电子期刊)·信息科技辑》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108874893A (en) * | 2018-03-16 | 2018-11-23 | 艾维克科技股份有限公司 | Decentralized information establishing system and method capable of evaluating products |
CN110287087A (en) * | 2018-03-19 | 2019-09-27 | 百度在线网络技术(北京)有限公司 | Method and apparatus for detecting application |
CN110287087B (en) * | 2018-03-19 | 2023-06-13 | 百度在线网络技术(北京)有限公司 | Method and device for detecting application |
CN109274640A (en) * | 2018-06-07 | 2019-01-25 | 艾维克科技股份有限公司 | Decentralized software information establishing system and method |
CN110941818A (en) * | 2018-09-21 | 2020-03-31 | 武汉安天信息技术有限责任公司 | Reputation obtaining method and device for mobile application program developer |
CN110362967A (en) * | 2019-07-15 | 2019-10-22 | 北京奇艺世纪科技有限公司 | The anti-tamper detection method of application program, device, terminal device and storage medium |
CN112187880A (en) * | 2020-09-10 | 2021-01-05 | 中国联合网络通信集团有限公司 | Network content management method and device |
CN112187880B (en) * | 2020-09-10 | 2022-03-18 | 中国联合网络通信集团有限公司 | Network content management method and device |
CN114428952A (en) * | 2022-04-07 | 2022-05-03 | 北京亿赛通科技发展有限责任公司 | Method, system and server for verifying characteristic value of public network electronic file |
CN114428952B (en) * | 2022-04-07 | 2022-07-19 | 北京亿赛通科技发展有限责任公司 | Method, system and server for verifying characteristic value of public network electronic file |
Also Published As
Publication number | Publication date |
---|---|
CN107135077B (en) | 2019-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107135077A (en) | Software protecting method and device | |
JP7364724B2 (en) | Operating system for blockchain IoT devices | |
TWI770022B (en) | Computer implemented control method, system and control system | |
CN104363271B (en) | Document breakpoint transmission method and device | |
EP2267628B1 (en) | Token passing technique for media playback devices | |
CN107171785A (en) | A kind of digital copyright management method based on block chain technology | |
CN108270874A (en) | The update method and device of application program | |
CN108399329A (en) | A method of improving trusted application safety | |
CN104199657B (en) | The call method and device of open platform | |
JP2005536951A (en) | Apparatus, system, and method for securing digital documents in a digital device | |
CN103731395A (en) | Processing method and system for files | |
CN107947917A (en) | A kind of method and device for generating whitepack key | |
CN104040552A (en) | Software modification for partial secure memory processing | |
CN107590025A (en) | A kind of back-up restoring method and system | |
US7693675B2 (en) | Method for protection of sensor node's data, a systems for secure transportation of a sensor node and a sensor node that achieves these | |
CN109040134A (en) | A kind of design method and relevant apparatus of information encryption | |
CN109214807A (en) | Method, apparatus, computer equipment and the storage medium of management contribution information | |
CN111815321A (en) | Transaction proposal processing method, device, system, storage medium and electronic device | |
CN111737715A (en) | Decentralized electronic contract online signing method and system | |
CN113344222A (en) | Safe and credible federal learning mechanism based on block chain | |
CN104426657B (en) | A kind of service authentication method, system and server | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN108111528A (en) | A kind of anti-phishing method and system based on block chain | |
US20220101308A1 (en) | Method and system for payment for central bank digital currency | |
CN106548097A (en) | The operation method and device of network device software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |