CN107403078A - The restriction application method and terminal of a kind of application - Google Patents

The restriction application method and terminal of a kind of application Download PDF

Info

Publication number
CN107403078A
CN107403078A CN201710500687.9A CN201710500687A CN107403078A CN 107403078 A CN107403078 A CN 107403078A CN 201710500687 A CN201710500687 A CN 201710500687A CN 107403078 A CN107403078 A CN 107403078A
Authority
CN
China
Prior art keywords
limitation
intended application
parameter
terminal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710500687.9A
Other languages
Chinese (zh)
Inventor
刘均
庄文龙
刘国柱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201710500687.9A priority Critical patent/CN107403078A/en
Publication of CN107403078A publication Critical patent/CN107403078A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The restriction application method and terminal of a kind of application.The restriction application method of the application includes:When detecting the opening operation of intended application, the limitation use information of intended application is obtained, limitation use information includes following at least one parameter:Limitation uses the identity information of the terminal of intended application using parameter and registration;Whether changed using set algorithm detection limits use information;When limitation use information is not changed, opening intended application is determined whether using parameter according to limitation.Implement the embodiment of the present invention, the security of application can be improved.

Description

The restriction application method and terminal of a kind of application
Technical field
The present invention relates to field of terminal technology, and in particular to the restriction application method and terminal of a kind of application.
Background technology
At present, the access times or useful life of some applications limitation user in terminal, user are reached using application Certain number or time limit, user would not allow for be continuing with applying, existing method for limiting is to add phase in system files The limitation access times that should be applied or time limit, application is opened every time, first check for limiting whether access times are finished or use Whether the time limit is expired, and number is finished or the time limit expires and used afterwards using refusal user.
However, above-mentioned application is limited in application method, user can search limited in system registry access times or The save location in time limit is limited, and is modified, or is never limited accordingly in access times or the terminal in restriction time limit Limitation use information imported into the system file of terminal, so as to destroy the restriction of access times, reduce the peace of application Quan Xing.
The content of the invention
The embodiment of the present invention provides a kind of the restriction application method and terminal of application, can improve the security of application.
First aspect present invention provides a kind of restriction application method of application, including:
When detecting the opening operation of intended application, the limitation use information of the intended application, the limitation are obtained Use information includes following at least one parameter:Limitation uses the identity information of the terminal of intended application using parameter and registration;
Whether changed using the set algorithm detection limitation use information;
When the limitation use information is not changed, according to the limitation using parameter determines whether opening Intended application.
With reference to the embodiment of the present invention in a first aspect, first aspect of the embodiment of the present invention the first possible implementation In, it is described to use set algorithm, detect whether the limitation use information is changed, including:Detected using Message Digest 5 Whether the limitation is changed using parameter;And/or obtain the identity information for the terminal for installing the intended application;Described in judgement The identity information and the registration for installing the terminal of the intended application using the identity information of the terminal of the intended application be It is no consistent.
With reference to the embodiment of the present invention in a first aspect, first aspect of the embodiment of the present invention second of possible implementation In, methods described also includes:When detecting the shutoff operation of the intended application installation or the intended application, more The limitation of the new intended application uses parameter;Using the limitation use information of set algorithm encryption renewal;Preserve encryption The restriction use information of renewal afterwards.
With reference to second of possible implementation of first aspect of the embodiment of the present invention, in first aspect of the embodiment of the present invention The third possible implementation in, the limitation of the renewal intended application uses parameter, including:It is described when detecting During the shutoff operation of intended application, the limitation is subtracted 1 using the access times in parameter.
Of the first possible implementation, first aspect with reference to first aspect of the embodiment of the present invention, first aspect Any of the third possible implementation of two kinds of possible implementations and first aspect possible implementation, In 4th kind of possible implementation of first aspect of the embodiment of the present invention, the limitation includes following at least one using parameter Parameter:Access times and usage time.
Second aspect of the present invention provides a kind of terminal, and the terminal includes:
Acquiring unit, the limitation for when detecting the opening operation of intended application, obtaining the intended application use Information, the limitation use information include following at least one parameter:Limitation uses the intended application using parameter and registration Terminal identity information;
Detection unit, for whether being changed using the set algorithm detection limitation use information;
Judging unit, for when the limitation use information is not changed, being using parameter judgement according to the limitation It is no to allow to open the intended application.
With reference to second aspect of the embodiment of the present invention, in the first possible implementation of second aspect of the embodiment of the present invention In, the detection unit, it is specifically used for, whether is changed using parameter using the Message Digest 5 detection limitation;And/or Obtain the identity information for the terminal for installing the intended application;Judge the identity information of the terminal of the installation intended application It is whether consistent using the identity information of the terminal of the intended application with the registration.
With reference to second aspect of the embodiment of the present invention, in second of possible implementation of second aspect of the embodiment of the present invention In, the terminal also includes:
Updating block, for when the shutoff operation for detecting the intended application installation or the intended application When, the limitation for updating the intended application uses parameter;
The updating block is additionally operable to, and the limitation use information of renewal is encrypted using the set algorithm;
The terminal also includes:
Storage unit, for preserving the restriction use information of the renewal after encrypting.
With reference to second of possible implementation of second aspect of the embodiment of the present invention, in second aspect of the embodiment of the present invention The third possible implementation in, the updating block, be specifically used for, when the shutoff operation for detecting the intended application When, the limitation is subtracted 1 using the access times in parameter.
Of the first possible implementation, second aspect with reference to second aspect of the embodiment of the present invention, second aspect Any of the third possible implementation of two kinds of possible implementations and second aspect possible implementation, In 4th kind of possible implementation of second aspect of the embodiment of the present invention, the limitation includes following at least one using parameter Parameter:Access times and usage time.
Third aspect present invention provides a kind of terminal, and the terminal includes processor, memory, communication module and bus, its In:
The processor, the memory and the communication module are connected by the bus, the communication module, are used for Receive and send data;
Batch processing code is stored with the memory, the processor is used to call the journey stored in the memory Sequence code performs following operate:
When detecting the opening operation of intended application, the limitation use information of the intended application, the limitation are obtained Use information includes following at least one parameter:Limitation is believed using parameter and registration using the identity of the terminal of the intended application Breath;
Whether changed using the set algorithm detection limitation use information;
When the limitation use information is not changed, according to the limitation using parameter determines whether opening Intended application.
With reference to the third aspect of the embodiment of the present invention, in the first possible implementation of the third aspect of the embodiment of the present invention In, whether the processor is included using the set algorithm detection limitation use information by modification:Using Message Digest 5 Detect whether the limitation is changed using parameter;And/or obtain the identity information for the terminal for installing the intended application;Judge The identity information of the terminal of the installation intended application and the registration are believed using the identity of the terminal of the intended application Whether breath is consistent.
With reference to the third aspect of the embodiment of the present invention, in second of possible implementation of the third aspect of the embodiment of the present invention In, the processor is additionally operable to call the program code stored in the memory to perform following operate:
When detecting the shutoff operation of the intended application installation or the intended application, the target is updated The limitation of application uses parameter;
Using the limitation use information of set algorithm encryption renewal;
Preserve the restriction use information of the renewal after encryption.
With reference to second of possible implementation of the third aspect of the embodiment of the present invention, in the third aspect of the embodiment of the present invention The third possible implementation in, the limitation of intended application described in the update processor is included using parameter:Work as detection To the intended application shutoff operation when, the limitation using the access times in parameter is subtracted 1.
Of the first possible implementation, the third aspect with reference to the third aspect of the embodiment of the present invention, the third aspect Any of the third possible implementation of two kinds of possible implementations and the third aspect possible implementation, In 4th kind of possible implementation of the third aspect of the embodiment of the present invention, the limitation includes following at least one using parameter Parameter:Access times and usage time.
In the embodiment of the present invention, when detecting the opening operation of intended application, the limitation for obtaining intended application uses letter Breath, limitation use information include following at least one parameter:Limitation uses the body of the terminal of intended application using parameter and registration Part information;Whether changed using set algorithm detection limits use information;When limitation use information is not changed, according to limit System determines whether to open intended application using parameter, it is seen then that limitation use information and registration can be used into intended application The identity information of terminal bound by set algorithm, modification limitation use information can be avoided, to destroy access times Limit, so as to improve the security of application.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of the restriction application method of application provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the restriction application method of another application provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another terminal provided in an embodiment of the present invention.
Embodiment
The embodiments of the invention provide the restriction application method and terminal of a kind of application, the security of application can be improved. It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow sheet of the restriction application method of application provided in an embodiment of the present invention. As shown in figure 1, this method may comprise steps of.
S102:When detecting the opening operation of intended application, the limitation use information of the intended application is obtained.
In the present embodiment, opening operation refers to intended application when successfully being installed in terminal, and user opens intended application Operation, when general user such as double-clicks, clicked at the operation to the shortcut of intended application, the opening behaviour of intended application can be triggered Make, for example, using the shortcut of double mouse click intended application on computers, that is, trigger the opening operation of intended application, then For example, when touching the shortcut of intended application on touch-screen mobile phone or tablet personal computer, the opening behaviour of intended application is also triggered Make.
Specifically, the limitation use information of intended application can preserve in system files, in computer application scene Under, the limitation use information of intended application can be stored in table corresponding to system registry intended application, and the limitation makes Include following at least one parameter with information:Limitation uses the identity information of the terminal of intended application using parameter and registration.
In the present embodiment, the limitation can include following at least one parameter using parameter:When access times and use Between.Wherein, access times are the numbers that intended application is tried out for limiting user;Usage time is to be used to limit user's mesh on probation Mark the time of application.Registration refers to that intended application obtains when being registered in terminal using the identity information of the terminal of intended application The identity information of the terminal arrived, the limitation using parameter be using for terminal distribution corresponding to the identity information limitation use when Between or limitation access times.Identity information can include following at least one:Mac address of nic, CPU mark Symbol, Electronic Serial Number, memory identity and communication module identity.
It should be noted that example is only used for explaining the embodiment of the present invention, restriction should not be formed, identity information is not limited to State citing or other identity informations, the information of other mark terminal identities of the IMEI number of such as mobile phone.The present embodiment is not It is construed as limiting.
For example, in the Open Scene of a computer application, correspondingly included in system registry when this is applied When limiting user's number on probation or the information of time, double mouse click application is performed in user, or right mouse button is clicked and selected When selecting the operation of OPEN, use information is limited using that can be got accordingly from system registry corresponding to the application, And in registration, the identity information for the terminal distributed where the limitation use information.
S104:Whether changed using the set algorithm detection limitation use information.
In the present embodiment, using set algorithm, detect whether the limitation use information can be included by modification:Using disappearing Whether the breath digest algorithm detection limitation is changed using parameter;And/or obtain the body for the terminal for installing the intended application Part information;Judge that the identity information of the terminal of the installation intended application and the registration use the end of the intended application Whether the identity information at end is consistent.
Specifically, the identity information of above-mentioned terminal and/or limitation using parameter can be entered using Message Digest 5 Row encryption, can be to the body of terminal using Message Digest Algorithm 5 (Message Digest Algorithm, MD5) What part information and/or limitation were encrypted using parameter, the md5 encryption algorithm is this using exclusive, and the key used can be with Oneself definition, algorithm is general.For checking whether a character string is modified, as identity information and/or limitation use The character string of parameter composition, MD5 algorithms can be used to encrypt this character string, the unique encodings of generation one 128, if this The content of individual character string is modified, and the character string is encrypted with identical MD5 algorithms again, calculates the volume of one 128 Code can thus be used for judging whether character string is changed with being different before.If user repaiies in system files Limitation is changed and has used parameter, then can detect that limitation is changed using parameter by Message Digest 5.
It should be noted that above-mentioned AES can also be other AESs, such as Secure Hash Algorithm (Secure Hash Algorithm, SHA1) etc., the present embodiment is not construed as limiting.
On the other hand, when the limitation using parameter is that intended application is registered, registration is distributed to using the intended application Terminal, the end of the intended application can be used by the identity information and registration for the terminal for detecting currently used intended application Whether the identity information at end is consistent, to distribute to currently used intended application when judging whether the limitation is and registered using parameter Terminal, if identical, show the limitation using parameter be using distribute to this use intended application terminal, if not Together, then show the limitation using parameter be imported into from other registration terminal this use intended application terminal, it is illegal, Then refusal opens intended application.
S106:When the limitation use information is not changed, determine whether to beat using parameter according to the limitation Open the intended application.
When detecting that limitation use information is not changed, show that the limitation using parameter is that the intended application makes currently With what is distributed when being registered in the terminal of intended application, and it is not modified, can be judged whether according to the limitation using parameter Allow to open the intended application.For example, the value of the access times in parameter, detection intended application institute can be used according to limitation Terminal using the number of intended application whether reached intended application limit access times.It can also be used according to limitation Whether the value of the usage time in parameter, the time that the terminal that detection intended application limits place uses expire.If detect Terminal is not reaching to the access times of intended application restriction, and intended application does not expire in the usage time of terminal, then allows Open intended application;Otherwise, refusal opens intended application.
For example, when detecting that limitation use information is not changed, if limitation is using limitation access times in parameter Still allow for using 10 times, limitation usage time allows to use before being on July 8th, 2017, and current system time is On June 8th, 2017, then show to allow terminal opening intended application, the operation for opening intended application is performed, if limited using secondary Number is to still allow for using 0 time, or limitation usage time is on May 8th, 2017 to allow to use before, then refuses terminal and open Intended application.
In the restriction application method of the application described by Fig. 1, when detecting the opening operation of intended application, mesh is obtained The limitation use information of application is marked, limitation use information includes following at least one parameter:Limitation is used using parameter and registration The identity information of the terminal of intended application;Whether changed using set algorithm detection limits use information;When limitation uses letter When breath is not changed, opening intended application is determined whether using parameter according to limitation, it is seen then that can will limit use information Bound with registering using the identity information of the terminal of intended application by set algorithm, modification limitation use information can be avoided, To destroy the restriction of access times, so as to improve the security of application.
Referring to Fig. 2, Fig. 2 is the flow signal of the restriction application method of another application provided in an embodiment of the present invention Figure.As shown in Fig. 2 this method may comprise steps of.
S202:When detecting the intended application installation, the limitation use information of the intended application is obtained.
In the present embodiment, limitation use information can include limitation and use the terminal of intended application using parameter and registration At least one of identity information.Wherein, limitation can include following at least one parameter using parameter:Access times and use Time.Wherein, limit and set using the developer that parameter can be intended application, access times are tried out for limiting user The number of intended application, such as the developer of intended application allow terminal on probation 50 times;Usage time is to be used to limit user's examination With the time of intended application, such as from being installed successfully day, it is allowed to which user is on probation 30 days, or allows user in the fixed time limit It is on probation.Registration refers to that intended application gets peace in installation in terminal using the identity information of the terminal of intended application The identity information of the terminal of intended application is filled, identity information can include following at least one:Mac address of nic, central processing Machine identifier, Electronic Serial Number, memory identity and communication module identity.It should be noted that identity information is not It is limited to the example above or other identity informations, the information of other mark terminal identities of the IMEI number of such as mobile phone.This reality Example is applied to be not construed as limiting.
S204:Limitation use information is encrypted using set algorithm.
Specifically, can be that the identity information of terminal and/or limitation are encrypted using parameter using MD5, the MD5 AES is that the intended application is exclusive, and the key used oneself can define, and algorithm is general.For checking terminal Identity information and/or limitation whether be modified using parameter, can by the identity information of terminal and/or limitation using parameter, The unique encodings of one 128 obtained with MD5 algorithm for encryption form a character string.
S206:Preserve the restriction use information after encryption.
Specifically, the identity information of terminal and/or limitation can be obtained using parameter and MD5 algorithm for encryption one The unique encodings of 128 form a character string and preserved in system files, such as in the registration table in computer.
S208:When detecting the opening operation of intended application, the limitation use information of the intended application is obtained.
Specifically, when detecting the opening operation of intended application, the limit of the intended application preserved in obtaining step S206 Use information processed.
This part description for details, reference can be made to the step S102 in the embodiment shown in Fig. 1, repeat no more here.
S210:Whether changed using the set algorithm detection limitation use information.
Specifically, this part description for details, reference can be made to the step S104 in the embodiment shown in Fig. 1, repeat no more here.
S212:When the limitation use information is not changed, determine whether to beat using parameter according to the limitation Open the intended application.
Specifically, this part description for details, reference can be made to the step S106 in the embodiment shown in Fig. 1, repeat no more here.
S214:When detecting the shutoff operation of the intended application, the limitation for updating the intended application uses parameter.
Specifically, the shutoff operation of the intended application refers to that user terminates operational objective application in terminal.The renewal The limitation of the intended application can be included using parameter:When detecting the shutoff operation of the intended application, by the limit System subtracts 1 using the access times in parameter.For example, the access times of intended application limiting terminal are 30 times, then, used first After end, when user closes intended application in the terminal, access times are saved as 29 times, and again will limitation access times, The unique encodings of one 128 that the identity information and MD5 algorithm for encryption of terminal obtain form new character string, are preserved. Do not open later and close an intended application, renewal that access times subtract 1.When access times are updated to 0, user exists next time When terminal opens intended application, refusal user is opened into intended application.
If the limitation of terminal, also comprising limitation usage time, can be mounted to using parameter in intended application in terminal During work(, the limitation usage time is preserved, need not be updated when subsequently closing intended application, limit the preservation form of usage time Can be preserved in the form of allowing to use duration, when closing intended application, can also update allows to use duration.
S216:Using the limitation use information of set algorithm encryption renewal.
Specifically, can be that the identity information of terminal and/or the limitation of renewal are encrypted using parameter using MD5 , the md5 encryption algorithm is that the intended application is exclusive, and the key used oneself can define, and algorithm is general.For examining Whether the identity information and/or limitation for looking into terminal are modified using parameter, can make the identity information of terminal and/or limitation The unique encodings of one 128 obtained with parameter and MD5 algorithm for encryption form a character string.
S218:Preserve the restriction use information of the renewal after encryption.
Specifically, the limitation of the identity information of terminal and/or renewal can be obtained using parameter and MD5 algorithm for encryption The unique encodings of one 128 form character string and preserve in system files, such as the registration table in computer is medium.
In the restriction application method of the application described by Fig. 2, when detecting the opening operation of intended application, mesh is obtained The limitation use information of application is marked, limitation use information includes following at least one parameter:Limitation is used using parameter and registration The identity information of the terminal of intended application;Whether changed using set algorithm detection limits use information;When limitation uses letter When breath is not changed, opening intended application is determined whether using parameter according to limitation, it is seen then that can will limit use information Bound with registering using the identity information of the terminal of intended application by set algorithm, modification limitation use information can be avoided, To destroy the restriction of access times, so as to improve the security of application.
Referring to Fig. 3, Fig. 3 is a kind of structural representation of terminal disclosed in the embodiment of the present invention.As shown in figure 3, the end End can include:
Information acquisition unit 302, for when detecting the opening operation of intended application, obtaining the limit of the intended application Use information processed, the limitation use information include following at least one parameter:Limitation should using target using parameter and registration The identity information of terminal;
Detection unit 304, for whether being changed using the set algorithm detection limitation use information;
Judging unit 306, for when the limitation use information is not changed, being judged according to the limitation using parameter Whether allow to open the intended application.
In the terminal described by Fig. 3, when detecting the opening operation of intended application, obtaining the limitation of intended application makes With information, limitation use information includes following at least one parameter:Limitation uses the terminal of intended application using parameter and registration Identity information;Whether changed using set algorithm detection limits use information;When limitation use information is not changed, root Opening intended application is determined whether using parameter, it is seen then that limitation use information can be used target with registration according to limitation The identity information of the terminal of application is bound by set algorithm, modification limitation use information can be avoided, to destroy using secondary Several restriction, so as to improve the security of application.
Referring to Fig. 4, Fig. 4 is the structural representation of another terminal provided in an embodiment of the present invention.Wherein, shown in Fig. 4 Terminal be that as shown in Figure 3 terminal optimized obtains, wherein, the detection unit 304, be specifically used for, using eap-message digest Whether the algorithm detection limitation is changed using parameter;And/or obtain the identity information for the terminal for installing the intended application; The identity information and the registration for judging the terminal of the installation intended application are believed using the identity of the terminal of intended application Whether breath is consistent.
As a kind of possible embodiment, the identity information includes following at least one:Mac address of nic, center Processor identifier, Electronic Serial Number, memory identity and communication module identity.
As a kind of possible embodiment, the terminal also includes:
Parameter updating block 308, for when the pass for detecting the intended application installation or the intended application During closed operation, the limitation for updating the intended application uses parameter;
Information ciphering unit 310, for the limitation use information using set algorithm encryption renewal;
Information holding unit 312, for preserving the restriction use information of the renewal after encrypting.
As a kind of possible embodiment, the parameter updating block 308, detect that the target should specifically for working as During shutoff operation, the limitation is subtracted 1 using the access times in parameter.
As a kind of possible embodiment, the limitation includes following at least one parameter using parameter:Access times And usage time.
In the terminal described by Fig. 4, when detecting the opening operation of intended application, obtaining the limitation of intended application makes With information, limitation use information includes following at least one parameter:Limitation uses the terminal of intended application using parameter and registration Identity information;Whether changed using set algorithm detection limits use information;When limitation use information is not changed, root Opening intended application is determined whether using parameter, it is seen then that limitation use information can be used target with registration according to limitation The identity information of the terminal of application is bound by set algorithm, modification limitation use information can be avoided, to destroy using secondary Several restriction, so as to improve the security of application.
Fig. 5 is referred to, Fig. 5 is the structural representation of another terminal provided in an embodiment of the present invention.As shown in figure 5, should Terminal 50 includes processor 501, memory 502, communication module 503 and bus 504, wherein processor 501, the and of memory 502 Communication module 503 can be connected by bus or other modes, and Fig. 5 by bus 504 exemplified by being connected.
Optionally, terminal 50 can also include network interface 505 and power module 506.
Wherein, processor 501 can be Digital Signal Processing (English:Digital Signal Processing, DSP) Chip.In the specific implementation, processor 501 may include:Management/communication module (administration module/ Communication module, AM/CM) (being used for the center that speech channel exchange and information exchange), for completing call treatment, letter Make module, converting code rete and the submultiplex module of processing, RRM, the management of Radio Link and circuit maintenance function Modules such as (transcoder submultiplexer, TCSM) (being used to complete multiplexing and demultiplexing and code conversion function).Specific letter Breath refers to mobile communication relevant knowledge.
Memory 502 be used for store application encryption program code, in the specific implementation, memory 502 can use it is read-only Memory (English:Read-Only Memory, ROM) or random access memory (RAM) (English:Random Access Memory, RAM), the program code available for storage application encryption.
Communication module 503 is used to carry out the mobile communication signal that processor 501 generates transmitting processing (such as modulation), also Mobile communication signal for being received to antenna carries out reception processing (such as demodulation).
Bus 504 can be industry standard architecture (English:Industry Standard Architecture, ISA) bus, external equipment interconnection (English:Peripheral Component Interconnect, PCI) bus, extension mark Quasi- architecture (English:Extended Industry Standard Architecture, EISA) bus, integrated circuit be total Line (English:Inter Integrated Circuit, IIC) etc..
Network interface 505 is used for terminal 50 and carries out data with other-end (UE in mobile station MS, 3G and 4G in 2G) Communication.In the specific implementation, network interface 505 may include:GSM (2G) radio network interface, WCDMA (3G) radio network interfaces with And the radio network interface of one or more of or following 4.5G or 5G in LTE (4G) radio network interface etc..
Power module 506 is used to power for the modules of terminal 50.
In the embodiment of the present invention, processor 501 is additionally operable to call the transmission program generation of the system message in memory 502 Code, perform following operation:
When detecting the opening operation of intended application, the limitation use information of the intended application, the limitation are obtained Use information includes following at least one parameter:Limitation uses the identity information of the terminal of intended application using parameter and registration;
Whether changed using the set algorithm detection limitation use information;
When the limitation use information is not changed, according to the limitation using parameter determines whether opening Intended application.
In one embodiment, it is described to use set algorithm, detect whether the limitation use information is changed, including:
Whether changed using parameter using the Message Digest 5 detection limitation;And/or
Obtain the identity information for the terminal for installing the intended application;
Judge that the identity information of the terminal of the installation intended application and the registration use the terminal of intended application Identity information it is whether consistent.
In one embodiment, the identity information includes following at least one:Mac address of nic, CPU mark Know symbol, Electronic Serial Number, memory identity and communication module identity.
In one embodiment, methods described also includes:
When detecting the shutoff operation of the intended application installation or the intended application, the target is updated The limitation of application uses parameter;
Using the limitation use information of set algorithm encryption renewal;
Preserve the restriction use information of the renewal after encryption.
In one embodiment, the limitation of the renewal intended application uses parameter, including:
When detecting the shutoff operation of the intended application, the limitation is subtracted 1 using the access times in parameter.
In one embodiment, the limitation includes following at least one parameter using parameter:When access times and use Between.
In the terminal described by Fig. 5, when detecting the opening operation of intended application, obtaining the limitation of intended application makes With information, limitation use information includes following at least one parameter:Limitation uses the terminal of intended application using parameter and registration Identity information;Whether changed using set algorithm detection limits use information;When limitation use information is not changed, root Opening intended application is determined whether using parameter, it is seen then that limitation use information can be used target with registration according to limitation The identity information of the terminal of application is bound by set algorithm, modification limitation use information can be avoided, to destroy using secondary Several restriction, so as to improve the security of application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The shape for the computer program product that usable storage medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.Obviously, those skilled in the art can be carried out various to the present invention Change and modification are without departing from the spirit and scope of the present invention.So, if these modifications and variations of the present invention belong to this hair Within the scope of bright claim and its equivalent technologies, then the present invention is also intended to comprising including these changes and modification.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, the flow By computer program the hardware of correlation can be instructed to complete, the program can be stored in computer read/write memory medium, should Program is upon execution, it may include such as the flow of above-mentioned each method embodiment.And foregoing storage medium includes:ROM is deposited at random Store up the medium of the various program storage codes such as memory body RAM, magnetic disc or CD.

Claims (10)

  1. A kind of 1. restriction application method of application, it is characterised in that including:
    When detecting the opening operation of intended application, the limitation use information of the intended application is obtained, the limitation uses Information includes following at least one parameter:Limitation uses the identity information of the terminal of the intended application using parameter and registration;
    Whether changed using the set algorithm detection limitation use information;
    When the limitation use information is not changed, determine whether to open the target using parameter according to described limit Using.
  2. 2. according to the method for claim 1, it is characterised in that it is described to use set algorithm, detect the limitation and use letter Whether breath is changed, including:
    Whether changed using parameter using the Message Digest 5 detection limitation;And/or
    Obtain the identity information for the terminal for installing the intended application;
    Judge that the identity information of the terminal of the installation intended application and the registration use the terminal of the intended application Identity information it is whether consistent.
  3. 3. according to the method for claim 1, it is characterised in that methods described also includes:
    When detecting the shutoff operation of the intended application installation or the intended application, the intended application is updated Limitation use parameter;
    Using the limitation use information of set algorithm encryption renewal;
    Preserve the restriction use information of the renewal after encryption.
  4. 4. according to the method for claim 3, it is characterised in that the limitation of the renewal intended application uses parameter, Including:
    When detecting the shutoff operation of the intended application, the limitation is subtracted 1 using the access times in parameter.
  5. 5. according to the method described in any one of Claims 1-4, it is characterised in that the limitation is included below extremely using parameter A kind of few parameter:Access times and usage time.
  6. A kind of 6. terminal, it is characterised in that including processor, memory, communication module and bus, wherein:
    The processor, the memory and the communication module are connected by the bus, the communication module, for receiving With transmission data;
    Batch processing code is stored with the memory, the processor is used to call the program generation stored in the memory Code performs following operate:
    When detecting the opening operation of intended application, the limitation use information of the intended application is obtained, the limitation uses Information includes following at least one parameter:Limitation uses the identity information of the terminal of the intended application using parameter and registration;
    Whether changed using the set algorithm detection limitation use information;
    When the limitation use information is not changed, determine whether to open the target using parameter according to described limit Using.
  7. 7. terminal according to claim 6, it is characterised in that the processor is made using the set algorithm detection limitation Whether included with information by modification:
    Whether changed using parameter using the Message Digest 5 detection limitation;And/or
    Obtain the identity information for the terminal for installing the intended application;
    Judge that the identity information of the terminal of the installation intended application and the registration use the terminal of the intended application Identity information it is whether consistent.
  8. 8. terminal according to claim 6, it is characterised in that the processor is additionally operable to call and stored in the memory Program code perform following operate:
    When detecting the shutoff operation of the intended application installation or the intended application, the intended application is updated Limitation use parameter;
    Using the limitation use information of set algorithm encryption renewal;
    Preserve the restriction use information of the renewal after encryption.
  9. 9. terminal according to claim 8, it is characterised in that the limitation of intended application described in the update processor uses Parameter includes:
    When detecting the shutoff operation of the intended application, the limitation is subtracted 1 using the access times in parameter.
  10. 10. according to the terminal described in any one of claim 6 to 9, it is characterised in that the limitation is included below extremely using parameter A kind of few parameter:Access times and usage time.
CN201710500687.9A 2017-06-27 2017-06-27 The restriction application method and terminal of a kind of application Pending CN107403078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710500687.9A CN107403078A (en) 2017-06-27 2017-06-27 The restriction application method and terminal of a kind of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710500687.9A CN107403078A (en) 2017-06-27 2017-06-27 The restriction application method and terminal of a kind of application

Publications (1)

Publication Number Publication Date
CN107403078A true CN107403078A (en) 2017-11-28

Family

ID=60405074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710500687.9A Pending CN107403078A (en) 2017-06-27 2017-06-27 The restriction application method and terminal of a kind of application

Country Status (1)

Country Link
CN (1) CN107403078A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244527A1 (en) * 2014-02-26 2015-08-27 Unisys Corporation Enhanced security setup for media decryption
CN105046115A (en) * 2015-09-15 2015-11-11 北京深思数盾科技有限公司 Method and apparatus for detecting tampering with software operation time
CN105808980A (en) * 2016-03-07 2016-07-27 深圳市新产业生物医学工程股份有限公司 Detection method and device of illegal use of software
CN106209793A (en) * 2016-06-30 2016-12-07 上海斐讯数据通信技术有限公司 A kind of auth method and checking system
CN106250727A (en) * 2016-08-16 2016-12-21 深圳市冠旭电子股份有限公司 A kind of method for protecting software and device
CN106599722A (en) * 2016-12-14 2017-04-26 北京奇虎科技有限公司 Intelligent terminal and application program authority control method and device thereof, and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150244527A1 (en) * 2014-02-26 2015-08-27 Unisys Corporation Enhanced security setup for media decryption
CN105046115A (en) * 2015-09-15 2015-11-11 北京深思数盾科技有限公司 Method and apparatus for detecting tampering with software operation time
CN105808980A (en) * 2016-03-07 2016-07-27 深圳市新产业生物医学工程股份有限公司 Detection method and device of illegal use of software
CN106209793A (en) * 2016-06-30 2016-12-07 上海斐讯数据通信技术有限公司 A kind of auth method and checking system
CN106250727A (en) * 2016-08-16 2016-12-21 深圳市冠旭电子股份有限公司 A kind of method for protecting software and device
CN106599722A (en) * 2016-12-14 2017-04-26 北京奇虎科技有限公司 Intelligent terminal and application program authority control method and device thereof, and server

Similar Documents

Publication Publication Date Title
Zeadally et al. Cryptographic technologies and protocol standards for Internet of Things
Ji et al. Overview of 5G security technology
CN104604181B (en) The cryptographic key agreement of wireless communication
US10200865B2 (en) Adaptive security indicator for wireless devices
CN101523797B (en) Cryptographic key management in communication networks
CN1969580B (en) Security in a mobile communications system
Demir et al. Analysing the privacy policies of Wi-Fi trackers
CA2820502C (en) Key agreement using a key derivation key
JP5356409B2 (en) Abstraction functions in mobile handsets
Liu et al. Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
KR101521616B1 (en) Selective Encryption Apparatus and Method for Efficient Secure Data Transmission in Internet of Things
US11134376B2 (en) 5G device compatibility with legacy SIM
WO2011076984A1 (en) Apparatus, method and computer-readable storage medium for determining application protocol elements as different types of lawful interception content
CN111148094A (en) Registration method of 5G user terminal, user terminal equipment and medium
Brisfors et al. How deep learning helps compromising USIM
CN113498053B (en) Electronic user identity module transfer credential packaging
Damir et al. A beyond-5G authentication and key agreement protocol
CN105828324A (en) Method and device of obtaining virtual subscriber identity
CN107403078A (en) The restriction application method and terminal of a kind of application
CN106537960A (en) Method, network element, mobile terminal, system and computer program product for cryptographic algorithm negotiation
CN111107598B (en) Method for automatically switching communication module network operators
EP2566126A1 (en) Secure storage of provisioning data on network for control of lawful intercept
CN107045461A (en) The method and device of data processing
CN108616861A (en) A kind of air card-writing method and device
Xenakis et al. (U) SimMonitor: A mobile application for security evaluation of cellular networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171128

RJ01 Rejection of invention patent application after publication