CN107862202A - Software disables treating method and apparatus - Google Patents

Software disables treating method and apparatus Download PDF

Info

Publication number
CN107862202A
CN107862202A CN201710943432.XA CN201710943432A CN107862202A CN 107862202 A CN107862202 A CN 107862202A CN 201710943432 A CN201710943432 A CN 201710943432A CN 107862202 A CN107862202 A CN 107862202A
Authority
CN
China
Prior art keywords
software
disabled
information
signing certificate
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710943432.XA
Other languages
Chinese (zh)
Inventor
张广超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Security Management System Technology Co Ltd
Original Assignee
Beijing Kingsoft Security Management System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Security Management System Technology Co Ltd filed Critical Beijing Kingsoft Security Management System Technology Co Ltd
Priority to CN201710943432.XA priority Critical patent/CN107862202A/en
Publication of CN107862202A publication Critical patent/CN107862202A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

This application discloses a kind of software to disable treating method and apparatus.This method includes:After the instruction for starting software is received, the information in the signing certificate of software is obtained;Judge whether software is disabled according at least to the information in signing certificate, wherein, the information in the signing certificate of disabled software is to be pre-configured with;In the case where software is disabled, software is forbidden to be activated;In the case where software is not disabled, start software.By the application, solve the problems, such as that software protecting measure efficiency is low in correlation technique, is easily avoided.

Description

Software disables treating method and apparatus
Technical field
The application is related to software management domain, and treating method and apparatus is disabled in particular to a kind of software.
Background technology
Software is the computer program relevant with computer system operation, code, rule, and presumable file, text Shelves and data.Magnanimity software on internet be present, dangerous software is usually contained in these magnanimity softwares, it is dangerous soft for preventing Part runs use in a device, and in the related art, security classes software or/and functional module are by whether judging dbase In software disables storehouse, it is determined whether need to disable certain software, but certain dangerous software easily occur and substituted dbase, with The form of newname carries out startup optimization, and now the security classes software in correlation technique or/and functional module can not be then directed to more The software of dbase has been replaced to carry out effective safeguard procedures.
For software protecting measure efficiency is low in correlation technique, be easily avoided the problem of, not yet propose effective solution at present Certainly scheme.
The content of the invention
The application provides a kind of software disabling treating method and apparatus, to solve software protecting measure efficiency in correlation technique Low, the problem of being easily avoided.
According to the one side of the application, there is provided a kind of software disables processing method.This method includes:Opened receiving After the instruction of dynamic software, the information in the signing certificate of the software is obtained;According at least to the information in the signing certificate Judge whether the software is disabled, wherein, the information in the signing certificate of disabled software is to be pre-configured with;In the software In the case of disabled, the software is forbidden to be activated;In the case where the software is not disabled, start the software.
Further, the information obtained in the signing certificate of the software includes:In the signing certificate for obtaining the software Public key.
Further, according at least to the information in the signing certificate judge the software it is whether disabled including:To institute State the progress MD5 computings of the information in signing certificate and obtain result;Judge whether the software is disabled according at least to the result.
Further, according at least to the information in the signing certificate judge the software it is whether disabled including:Obtain The title of the software;Information in the title of the software and the signing certificate judges whether the software is banned With.
According to the another aspect of the application, there is provided a kind of software disables processing unit.The device includes:Acquiring unit, For after the instruction for starting software is received, obtaining the information in the signing certificate of the software;Judging unit, for extremely Few information in the signing certificate judges whether the software is disabled, wherein, in the signing certificate of disabled software Information be to be pre-configured with;Forbid unit, in the case where the software is disabled, forbidding the software to be activated;Open Moving cell, in the case where the software is not disabled, starting the software.
Further, the acquiring unit also includes:First acquisition module, in the signing certificate for obtaining the software Public key.
Further, the judging unit also includes:Computing module, for being carried out to the information in the signing certificate MD5 computings obtain result;First judge module, for judging whether the software is disabled according at least to the result.
Further, the judging unit also includes:Second acquisition module, for obtaining the title of the software;Second Judge module, judge whether the software is disabled for the information in the title according to the software and the signing certificate.
According to the another aspect of the application, there is provided a kind of storage medium, the storage medium include the program of storage, its In, described program performs the software disabling processing method described in above-mentioned any one.
According to the another aspect of the application, there is provided a kind of processor, the processor are used for operation program, wherein, institute State the software performed during program operation described in above-mentioned any one and disable processing method.
By the application, using following steps:After the instruction for starting software is received, the signing certificate of software is obtained In information;Judge whether software is disabled according at least to the information in signing certificate, wherein, the signing certificate of disabled software In information be to be pre-configured with;In the case where software is disabled, software is forbidden to be activated;In the not disabled situation of software Under, start software, solve the problems, such as that software protecting measure efficiency is low in correlation technique, is easily avoided.By according to software label Information in name certificate judges whether software is disabled, and then makes corresponding measure, has reached and has improved software protecting measure Accuracy effect.
Brief description of the drawings
The accompanying drawing for forming the part of the application is used for providing further understanding of the present application, the schematic reality of the application Apply example and its illustrate to be used to explain the application, do not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is the flow chart of the software disabling processing method provided according to the embodiment of the present application;And
Fig. 2 is the schematic diagram of the software disabling processing unit provided according to the embodiment of the present application.
Embodiment
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application part, rather than whole embodiments.Based on the embodiment in the application, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model of the application protection Enclose.
It should be noted that term " first " in the description and claims of this application and above-mentioned accompanying drawing, " Two " etc. be for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that so use Data can exchange in the appropriate case, so as to embodiments herein described herein.In addition, term " comprising " and " tool Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing series of steps or unit Process, method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but may include without clear It is listing to Chu or for the intrinsic other steps of these processes, method, product or equipment or unit.
For the ease of description, below to the invention relates to part noun or term illustrate:
Signing certificate:Namely code signature certificate, by the digital signature to code come identification software source and software The true identity of developer, ensure that code is not maliciously tampered after signature, and the signing certificate has anti-forgery, its In, signing certificate includes the digital signature of key, title and certificate authority, and wherein key includes private key and public key two It is grouped into, private key is used for code signature, and public key is used for the checking of private key signature and the identification of certificate holder.
MD5:For ensuring that information transfer is completely consistent, it is to allow Large Copacity information to be signed with digital signature software that it, which is acted on, It (is exactly the byte serial of a random length is transformed into a fixed length ten that a kind of form of secrecy is ' compressed ' into before private key Senary numeric string).And md5 encryption has irreversible property.
It should be noted that:Software provided in an embodiment of the present invention disabling processing method can apply to mobile terminal or On computer, at present the operating system in mobile terminal be mainly the Android of Google, the IOS of apple, Hewlett-Packard WebOS, increase income MeeGO, and the Windows of Microsoft, this several operating system can use this method.Meanwhile in the event of other The operating system of type, then this method can also use.In addition, this method can also go out as the function built in operating system It is existing, can also occur as the One function module of a security classes software.
It should be noted that:Disabled software in software provided in an embodiment of the present invention disabling processing method can be by User Defined, (that is, user's sets itself software is disabled), can be that security classes software or functional module voluntarily configure (that is, it is disabled directly to set certain software for security classes software or/and functional module).
According to embodiments herein, there is provided a kind of software disables processing method, and Fig. 1 is according to the embodiment of the present application Software disables the flow chart of processing method, as shown in figure 1, this method comprises the following steps:
Step S101, after the instruction for starting software is received, obtain the information in the signing certificate of software.
It should be noted that:The upgrading of application program, if it is desired to accomplish seamless upgrade to new version, it is necessary to using same One certificate is signed, and this is due to only with same certificate signature, and system can just allow the application program that installation upgrades. If employing different certificates, system may require that application program uses the title of different bags, in this case equivalent to peace A brand-new application program is filled.Therefore, if it is desired to upgrade applications, digital signature is identical, bag title wants phase Together.That is, same software, the different upgraded versions of the software are directed to, even if changing its dbase or other relevant informations, But its digital signature and bag title are consistent with version before.
After receiving the instruction for starting software, in order to judge that the software is disabled software or not disabled software, By the information for the signing certificate for obtaining the software, resist because the information of the signing certificate has relative to the other information of software Forgery property and irreplaceability so that subsequent step can judge that the software is according to the information in the signing certificate for obtaining software It is no disabled, and then improve software disabling processing method accuracy and robustness.
Alternatively, in the software disabling processing method that the embodiment of the present application provides, in the signing certificate for obtaining software Information includes:Obtain the public key in the signing certificate of software.
It should be noted that:Signing certificate includes the digital signature of key, title and certificate authority, wherein, it is close Key includes private key and public key two parts form.
For title, different software is possible to identical title;For the digital signature of certificate authority, no Same software may promulgate certificate by same certificate authority, therefore different software may have identical certificate award The digital signature at power center;For private key, same software, because its different private key of user differs, that is, same software has There are different private keys, therefore can not be as the basis for estimation of software uniqueness;For public key, public key has unique relative to software Property, i.e., different software has a different public keys, and same software has unique public key, and public key is used for the checking of private key signature With the identification of certificate holder (i.e. software identity identifies).
Due to the information in signing certificate include many kinds, wherein, public key be used as the important information in signing certificate, and public affairs Key identifies for software, it is preferred that step S101 obtains the public key in the signing certificate of software so that subsequent step can foundation Public key in the signing certificate of software judges whether the software should be disabled, and then to improve software disabling processing method accurate True property.
Step S102, judge whether software is disabled according at least to the information in signing certificate, wherein, disabled software Information in signing certificate is to be pre-configured with.
Pass through the information being pre-configured with the signing certificate of disabled software so that subsequently judging whether software is disabled has Institute's foundation, and then improve the efficiency and accuracy rate of software disabling processing method;Judge according at least to the information in signing certificate Whether software is disabled, it is possible, firstly, to which so that the information that step S101 is obtained in signing certificate has been applied, secondly, above The middle importance for describing the information in signing certificate, is judged according at least to the information in signing certificate so that in software After substituting dbase or other identification informations, whether this software disabling processing method still can accurately identify the software For disabled software set in advance, accuracy rate and robustness that software disables processing method are improved.
It should be noted that:Step S102 is to judge whether software is disabled according at least to the information in signing certificate, I.e. in the software disabling processing method that the embodiment of the present application provides, step 102 can also go to judge software using other information It is whether disabled, such as the information such as dbase, software label, software nature.
As an optional example, when user's sets itself game class software is disabled, when equipment receives again After the enabled instruction of king's honor, judged according to king's honor for the information of game class software, show that the software is disabled, Again and the information of the signing certificate of king's honor carries out secondary judgement, reaffirms that the software is disabled.The example is not only lifted Example illustrates that information of the step S102 in signing certificate judges whether software is disabled, moreover it demonstrates that step S102 is not only Judge whether software is disabled according to the information in signing certificate, can also judge whether software is disabled using other information, Repeatedly judged so that judged result is more accurate, improves the accuracy of the software disabling processing method of the application.
Illustrated with reference to several optional embodiments.
For example, when user's sets itself Tengxun video it is disabled, when equipment receives the enabled instruction of Tengxun's video again Afterwards, the dbase according to Tengxun's video:Tengxun's video is judged, show that the software is disabled, then according to Tengxun's video The information of signing certificate carries out secondary judgement, reaffirms that the software is disabled.
Again for example:When the security classes software or functional module of the software disabling processing method provided using the embodiment of the present application Certain class software is set for disabling software, such as binding promotes other unrelated application software (in Android download, Netease's application by force The heart, the 9th software net etc.), above-mentioned Android is downloaded, using the addition of the softwares such as center, the 9th software net, binding is promoted by force for Netease The label of other unrelated application software.After equipment receives the enabled instruction of Android download, believe according to the label that Android is downloaded Breath is judged, show that the software is disabled, then and the information of signing certificate downloaded of Android carry out secondary judgement, again really It is disabled to recognize the software.
In addition, in order to improve the efficiency of software disabling processing method, alternatively, prohibit in the software that the embodiment of the present application provides With in processing method, according at least to the information in signing certificate judge software it is whether disabled including:Obtain the title of software;Root Judge whether software is disabled according to the title of software;When judged result is that the software is disabled, step S103 is directly entered, when sentencing Disconnected result is that software is not disabled, then judges whether software is disabled further according to the information in signing certificate.
Similarly, in order to improve the efficiency of software disabling processing method, alternatively, prohibit in the software that the embodiment of the present application provides With in processing method, according at least to the information in signing certificate judge software it is whether disabled including:Obtain the title of software;Root Judge whether software is disabled according to the title of software;When judged result be the software it is not disabled, be directly entered step S104, when Judged result is that software is disabled, then judges whether software is disabled further according to the information in signing certificate.
In order to which concise software disables processing method, alternatively, processing method is disabled in the software that the embodiment of the present application provides In, judging whether software is disabled according at least to the information in signing certificate also includes:As an optional embodiment, judge The whether disabled method of software can be:The information of the signing certificate of disabled software is obtained, by the signature of software to be judged Information in certificate is compared with the signing certificate information of disabled software, if the signing certificate packet of disabled software Contain:The information consistent with the information in the signing certificate of software to be judged, then judge that the software disables software, if software to be judged Signing certificate in information do not find consistent information in the signing certificate information of disabled software, then judge the software not It is disabled.
In order to improve the confidentiality of software disabling processing method, alternatively, in the software disabling that the embodiment of the present application provides In processing method, according at least to the information in signing certificate judge software it is whether disabled including:To the information in signing certificate Carry out MD5 computings and obtain result;Judge whether software is disabled according at least to result.
It should be noted that:Md5 encryption mode has irreversible property, i.e., after certain information A is encrypted by MD5, obtains To unique group encryption information B, and information B can obtain no dope vector after being decrypted, because can not be according to encryption information B Decryption obtains prime information A so that can be in the case of fully representative information A in encryption information B, information A safety, which remains unchanged, to be obtained Ensure.
By the way that the information in signing certificate is encrypted, judged whether software is banned according to encryption information With that is, directly being judged using the signing certificate information after encryption so that without using signing certificate in deterministic process Prime information is judged, and then adds the security of software disabling processing method.
In order to further improve confidentiality, alternatively, in the software disabling processing method that the embodiment of the present application provides, extremely Few information in signing certificate judges whether software is disabled, wherein, the information in the signing certificate of disabled software is Be pre-configured with including:The information being pre-configured with the signing certificate of disabled software, to the label for the disabled software being pre-configured with Information in name certificate carries out MD5 computings, obtains the security information in the signing certificate of disabled software;Treat the software of judgement Signing certificate in information carry out MD5 computings obtain result;Judge whether software is disabled according at least to result.
That is, the information in treating the signing certificate of the software of judgement carries out MD5 computings, security information A is obtained;To advance Information in the signing certificate of the disabled software of configuration carries out MD5 computings, obtains security information B;According to security information A and guarantor Confidential information B is judged, learns whether the software is disabled.Such as:User starts wechat software, that is, gets wechat startup and refer to Make, the key in wechat is EEEEES, by being AAAAAE after md5 encryption, due to unique group encryption letter corresponding to EEEEES Cease for AAAAAE, the encryption key AAAAAE of wechat and pre-configured disabled software encryption information are compared one by one It is right, wherein, the encryption information of pre-configured disabled software is:For heroic alliance:IIIID, Onmyoji:JKAFD, bucket ground It is main:DASFD, king's honor:DJKJK ..., key A AAAAE and pre-configured disabled software after wechat is encrypted Encryption information it is inconsistent when, show that wechat is not disabled.
Step S103, in the case where software is disabled, software is forbidden to be activated.
Step S104, in the case where software is not disabled, start software.
By making not disabled software normally to start use, disabled software No starting so that the application Embodiment provide software disabling processing method, can according to get Different Results (software is disabled, the software not by Disabling), corresponding processing method is carried out respectively, the software for having reached disabled can not start and then can not endanger equipment safety, Not disabled software can be with normal operation, and then meets the primary demand of user, ensure that the conjunction of software disabling processing method Rationality.
Furthermore, it is necessary to explanation is:The software disabling processing method that the embodiment of the present application provides is a kind of method of disabling, Therefore in order to improve the efficiency of software disabling processing method, the workload of software disabling processing method is reduced, alternatively, in this Shen Please embodiment provide software disabling processing method in, in the case where software is disabled, forbidding software to be activated also includes: In the case that software is disabled, forbid software to be activated, and unload the software.
In step S101, refer to and receiving the instruction for starting software and then carrying out the steps such as subsequently acquisition, judgement Suddenly, therefore when judging certain software to disable software, the software must be installed in equipment, in order to improve software disabling The efficiency of processing method, the workload of software disabling processing method is reduced, can be after judging certain software for disabling software, no Only No starting software, while also unload the software so that the later software can not start in equipment, reach a labor forever The effect of ease, and then the efficiency of software disabling processing method is improved, reduce the effect of the workload of software disabling processing method Fruit, while the effect in the savings space of release device can also be played.
In order to improve Consumer's Experience, alternatively, in the software disabling processing method that the embodiment of the present application provides, in software In the case of disabled, forbidding software to be activated also includes:In the case where software is disabled, software is forbidden to be activated, Xiang Yong Family sends unloading prompting, after receiving unloading command, unloads the software.
Before certain disabling software is unloaded, prompt message is issued the user with, after the unloading approval of user to be obtained, then is carried out The software is unloaded, avoids and voluntarily unloads certain software because not obtaining user's agreement, causes the consequence hair for having unloaded critical software It is raw, reach before uninstall by user's secondary-confirmation, avoided the situation of unloading mistake from occurring, improve user experience.
The importance of user's secondary-confirmation is illustrated:For example, memorandum is arranged to by user because of confidentiality reasons Software is disabled, is watched to prevent other people, if after other people click on memorandum recording software, disabling processing method by software and detecting memorandum To disable software, after voluntarily unloading the software, user's important information can be caused to lose, cause the loss that can not be retrieved.
Due to disabling software be can be by user's self-defining, can also be by security classes software or/and functional module voluntarily Configuration, therefore the list for disabling software can change at any time, i.e., it is soft can to add or delete at any time disabling for disabling software matrix Part.
For above-mentioned condition, optionally, in the software disabling processing method that the embodiment of the present application provides, when receiving After disabling the signal for increasing certain software in software matrix newly, search whether newly-increased software is mounted, if the software is mounted, unloading The software;When receive disabling software matrix delete the information of certain software after, search whether the software is mounted, if the software It is not mounted, the software is installed.
By after receiving in the signal of certain newly-increased software in disabling software matrix, searching whether newly-increased software is pacified Dress, if the software is mounted, unloads the software so that the later software can not start in equipment, reach once and for all Effect, and then the efficiency of software disabling processing method is improved, the effect of the workload of software disabling processing method is reduced, together When can also play release device savings space effect.
By when receive disabling software matrix delete the information of certain software after, search whether the software is mounted, if The software is not mounted, installs the software, has been reached the effect of convenient user, has been improved user experience.
When aforesaid operations are done, user can be prompted in advance, reach the effect of secondary-confirmation, avoid unloading The situation of load/setup error occurs, to improve Consumer's Experience, that is, optionally, in the software disabling that the embodiment of the present application provides In processing method, after receiving in the signal of certain newly-increased software in disabling software matrix, search whether newly-increased software is mounted, If the software is mounted, unloading prompting is issued the user with, after receiving unloading command, unloads the software;Disabled when receiving After software matrix deletes the information of certain software, search whether the software is mounted, if the software is not mounted, issue the user with Installation suggestion, after receiving installation instruction, the software is installed.
Further, since after disabling software matrix deletes certain software, when installing the software, the software may not be user's needs Software, therefore can install the software/to user send installation suggestion before, can increase and judge whether the software is use The judgment step of software required for family, to reduce the number that installation suggestion is sent to user, and then improve Consumer's Experience The technique effect of degree.
Optionally, one embodiment as the application, install the software/to user send installation suggestion before, can To judge whether to be operated by user, the software is deleted from disabling software matrix, when judged result is to be, carried out down One step, that is, install the software/to user send installation suggestion;Judge whether to be grasped by security classes software/functional module Make, the software is deleted from disabling software matrix, when judged result is to be, then operates, i.e., do not install without next step The software/do not send installation suggestion to user.
Furthermore, it is necessary to explanation is:The software disabling processing method that the embodiment of the present application provides is a kind of method of disabling, A kind of safer way is just judged when downloading and installing.That is, when download to installation kit after, at least Information in the signing certificate of installation kit judges whether software is disabled corresponding to the installation kit, if disabled, no Allow to be installed.Wherein, do not allow the judgement of installation can also be according to multiple letters such as the information in dbase, signing certificate Breath, multiple judgement is carried out, and then improve the efficiency of software disabling processing method.
The software disabling processing method that the embodiment of the present application provides, by after the instruction for starting software is received, obtaining Take the information in the signing certificate of software;Judge whether software is disabled according at least to the information in signing certificate, wherein, it is banned It is to be pre-configured with the information in the signing certificate of software;In the case where software is disabled, software is forbidden to be activated;In software In the case of not disabled, start software, solve the problems, such as that software protecting measure efficiency is low in correlation technique, is easily avoided. And then improve the effect of the accuracy of software protecting measure.
It should be noted that can be in such as one group of computer executable instructions the flow of accompanying drawing illustrates the step of Performed in computer system, although also, show logical order in flow charts, in some cases, can be with not The order being same as herein performs shown or described step.
The embodiment of the present application additionally provides a kind of software disabling processing unit, it is necessary to illustrate, the embodiment of the present application Software disabling processing unit can be used for the software that is used for that execution the embodiment of the present application is provided and disable processing method.Below to this The software disabling processing unit that application embodiment provides is introduced.
Fig. 2 is the schematic diagram that processing unit is disabled according to the software of the embodiment of the present application.As shown in Fig. 2 the device includes: Acquiring unit 10, judging unit 20, forbid unit 30, start unit 40.
Acquiring unit 10, for after the instruction for starting software is received, obtaining the information in the signing certificate of software; Judging unit 20, for judging whether software is disabled according at least to the information in signing certificate, wherein, the label of disabled software Information in name certificate is to be pre-configured with;Forbid unit 30, in the case where software is disabled, forbidding software to be activated; Start unit 40, in the case where software is not disabled, starting software.
Alternatively, in the software disabling processing unit that the embodiment of the present application provides, acquiring unit also includes:First obtains Module, the public key in signing certificate for obtaining software.
Alternatively, in the software disabling processing unit that the embodiment of the present application provides, judging unit also includes:Computing mould Block, result is obtained for carrying out MD5 computings to the information in signing certificate;First judge module, for sentencing according at least to result Whether disconnected software is disabled.
Alternatively, in the software disabling processing unit that the embodiment of the present application provides, judging unit also includes:Second obtains Module, for obtaining the title of software;Second judge module, judge for the information in the title and signing certificate according to software Whether software is disabled.
The software disabling processing unit that the embodiment of the present application provides, the instruction for starting software is being received by acquiring unit Afterwards, the information in the signing certificate of software is obtained;Whether judging unit judges software according at least to the information in signing certificate It is disabled, wherein, the information in the signing certificate of disabled software is to be pre-configured with;Forbid unit in the disabled situation of software Under, forbid software to be activated;Start unit starts software, solved soft in correlation technique in the case where software is not disabled Part safeguard procedures efficiency is low, the problem of being easily avoided, and then improves the effect of the accuracy of software protecting measure.
Software disabling processing unit includes processor and memory, above-mentioned acquiring unit 10, judging unit 20, forbids unit 30th, start unit 40 etc. as program unit storage in memory, by computing device storage in memory above-mentioned Program unit realizes corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can set one Or more, improve the applicability of software protecting measure and efficiency by adjusting kernel parameter.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one deposit Store up chip.
The embodiments of the invention provide a kind of storage medium, program is stored thereon with, it is real when the program is executed by processor Existing software disabling processing method.
The embodiments of the invention provide a kind of processor, processor is used for operation program, wherein, program performs soft when running Part disables processing method.
The embodiments of the invention provide a kind of equipment, equipment includes processor, memory and storage on a memory and can The program run on a processor, following steps are realized during computing device program:After the instruction for starting software is received, Obtain the information in the signing certificate of software;Judge whether software is disabled according at least to the information in signing certificate, wherein, quilt The information disabled in the signing certificate of software is to be pre-configured with;In the case where software is disabled, software is forbidden to be activated;Soft In the case that part is not disabled, start software.
Optionally, the information obtained in the signing certificate of software includes:Obtain the public key in the signing certificate of software.
Optionally, according at least to the information in signing certificate judge software it is whether disabled including:To in signing certificate Information carries out MD5 computings and obtains result;Judge whether software is disabled according at least to result.
Optionally, according at least to the information in signing certificate judge software it is whether disabled including:Obtain the title of software; Information in the title and signing certificate of software judges whether software is disabled..Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program product, when being performed on data processing equipment, is adapted for carrying out just The program of beginningization there are as below methods step:After the instruction for starting software is received, the letter in the signing certificate of software is obtained Breath;Judge whether software is disabled according at least to the information in signing certificate, wherein, the letter in the signing certificate of disabled software Breath is to be pre-configured with;In the case where software is disabled, software is forbidden to be activated;In the case where software is not disabled, start Software.
Optionally, the information obtained in the signing certificate of software includes:Obtain the public key in the signing certificate of software.
Optionally, according at least to the information in signing certificate judge software it is whether disabled including:To in signing certificate Information carries out MD5 computings and obtains result;Judge whether software is disabled according at least to result.
Optionally, according at least to the information in signing certificate judge software it is whether disabled including:Obtain the title of software; Information in the title and signing certificate of software judges whether software is disabled.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the application can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/ Or the form such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including key element Other identical element in process, method, commodity or equipment also be present.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the application can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is these are only, is not limited to the application.To those skilled in the art, The application can have various modifications and variations.All any modifications made within spirit herein and principle, equivalent substitution, Improve etc., it should be included within the scope of claims hereof.

Claims (10)

1. a kind of software disables processing method, it is characterised in that including:
After the instruction for starting software is received, the information in the signing certificate of the software is obtained;
Judge whether the software is disabled according at least to the information in the signing certificate, wherein, the signature of disabled software Information in certificate is to be pre-configured with;
In the case where the software is disabled, the software is forbidden to be activated;
In the case where the software is not disabled, start the software.
2. according to the method for claim 1, it is characterised in that the information obtained in the signing certificate of the software includes:
Obtain the public key in the signing certificate of the software.
3. method according to claim 1 or 2, it is characterised in that judge according at least to the information in the signing certificate The software it is whether disabled including:
MD5 computings are carried out to the information in the signing certificate and obtain result;
Judge whether the software is disabled according at least to the result.
4. according to the method for claim 1, it is characterised in that according at least to described in the information judgement in the signing certificate Software it is whether disabled including:
Obtain the title of the software;
Information in the title of the software and the signing certificate judges whether the software is disabled.
5. a kind of software disables processing unit, it is characterised in that including:
Acquiring unit, for after the instruction for starting software is received, obtaining the information in the signing certificate of the software;
Judging unit, for judging whether the software is disabled according at least to the information in the signing certificate, wherein, it is banned It is to be pre-configured with the information in the signing certificate of software;
Forbid unit, in the case where the software is disabled, forbidding the software to be activated;
Start unit, in the case where the software is not disabled, starting the software.
6. device according to claim 5, it is characterised in that the acquiring unit also includes:
First acquisition module, the public key in signing certificate for obtaining the software.
7. the device according to claim 5 or 6, it is characterised in that the judging unit also includes:
Computing module, result is obtained for carrying out MD5 computings to the information in the signing certificate;
First judge module, for judging whether the software is disabled according at least to the result.
8. device according to claim 5, it is characterised in that the judging unit also includes:
Second acquisition module, for obtaining the title of the software;
Second judge module, whether judge the software for the information in the title according to the software and the signing certificate It is disabled.
A kind of 9. storage medium, it is characterised in that the storage medium includes the program of storage, wherein, described program right of execution Profit requires the software disabling processing method described in any one in 1 to 4.
A kind of 10. processor, it is characterised in that the processor is used for operation program, wherein, right of execution when described program is run Profit requires the software disabling processing method described in any one in 1 to 4.
CN201710943432.XA 2017-10-11 2017-10-11 Software disables treating method and apparatus Pending CN107862202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710943432.XA CN107862202A (en) 2017-10-11 2017-10-11 Software disables treating method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710943432.XA CN107862202A (en) 2017-10-11 2017-10-11 Software disables treating method and apparatus

Publications (1)

Publication Number Publication Date
CN107862202A true CN107862202A (en) 2018-03-30

Family

ID=61699753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710943432.XA Pending CN107862202A (en) 2017-10-11 2017-10-11 Software disables treating method and apparatus

Country Status (1)

Country Link
CN (1) CN107862202A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948337A (en) * 2019-02-12 2019-06-28 北京北信源信息安全技术有限公司 Method of managing software and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105786609A (en) * 2016-03-30 2016-07-20 北京小米移动软件有限公司 Control method and device of terminal
US20160277186A1 (en) * 2007-01-07 2016-09-22 Apple Inc. Securely recovering a computing device
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device
CN106599676A (en) * 2016-12-22 2017-04-26 北京元心科技有限公司 Trusted process identification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277186A1 (en) * 2007-01-07 2016-09-22 Apple Inc. Securely recovering a computing device
CN105786609A (en) * 2016-03-30 2016-07-20 北京小米移动软件有限公司 Control method and device of terminal
CN106230598A (en) * 2016-07-29 2016-12-14 深圳兆日科技股份有限公司 Mobile terminal third-party application safety certifying method and device
CN106599676A (en) * 2016-12-22 2017-04-26 北京元心科技有限公司 Trusted process identification method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948337A (en) * 2019-02-12 2019-06-28 北京北信源信息安全技术有限公司 Method of managing software and device

Similar Documents

Publication Publication Date Title
EP2988470B1 (en) Automatic purposed-application creation
CN102110210B (en) Trusted graphics rendering for safer browsing on mobile devices
US9633210B2 (en) Keying infrastructure
CN100578522C (en) Electronic device, update method for same and integrated circuit
US20090193211A1 (en) Software authentication for computer systems
JP2019505887A (en) Mobile device with reliable execution environment
CN104363271B (en) Document breakpoint transmission method and device
CN105408912A (en) Process authentication and resource permissions
CN111143869B (en) Application package processing method and device, electronic equipment and storage medium
CN104751049B (en) A kind of application program installation method and mobile terminal
EP2051181A1 (en) Information terminal, security device, data protection method, and data protection program
US20160350525A1 (en) Application Program Management Method, Device, Terminal, and Computer Storage Medium
CN107196907A (en) A kind of guard method of Android SO files and device
CN107358114A (en) A kind of method and terminal for preventing user data loss
US7805601B2 (en) Computerized apparatus and method for version control and management
CN106548065B (en) Application program installation detection method and device
CN108111622A (en) A kind of method, apparatus and system for downloading whitepack library file
CN108134673A (en) A kind of method and device for generating whitepack library file
CN108416224A (en) A kind of data encryption/decryption method and device
CN107995230B (en) A kind of method for down loading and terminal
CN109977692B (en) Data processing method and device, storage medium and electronic equipment
CN107862202A (en) Software disables treating method and apparatus
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment
CN102855419A (en) Copyright protection method for data files of intelligent terminals
CN115688120A (en) Secure chip firmware importing method, secure chip and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330

RJ01 Rejection of invention patent application after publication