CN107864039A - A kind of application signature method, terminal and computer-readable recording medium - Google Patents

A kind of application signature method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107864039A
CN107864039A CN201711091615.XA CN201711091615A CN107864039A CN 107864039 A CN107864039 A CN 107864039A CN 201711091615 A CN201711091615 A CN 201711091615A CN 107864039 A CN107864039 A CN 107864039A
Authority
CN
China
Prior art keywords
digest value
server
signature
digest
intended application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711091615.XA
Other languages
Chinese (zh)
Inventor
曲大伟
王三新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201711091615.XA priority Critical patent/CN107864039A/en
Publication of CN107864039A publication Critical patent/CN107864039A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of application signature method, terminal and computer-readable recording medium, wherein method includes carrying out digest calculations to intended application according to default digest algorithm;Obtain the digest value for the intended application;The digest value is sent to server and signed to the digest value in the server;The digest value after signature is received from the server;Digest value after the signature is stored into the intended application.The embodiment of the present invention can protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve the effect of signature efficiency by the application signature method.

Description

A kind of application signature method, terminal and computer-readable recording medium
Technical field
The present invention relates to electronic technology field, more particularly to a kind of application signature method, terminal and computer-readable deposit Storage media.
Background technology
Application signature technology is able to verify that the effect using legitimacy, be widely used in mobile terminal, DTV, The fields such as POS.Traditional application signature flow is in the field of business commonly known as " developer's signature ", is handled by developer's signature Application package, application program user can therefrom extract the digital certificate of signer at any time, and use this digital certificate The integrality of All Files in program bag is verified.But because signature private key is placed on what developer was locally stored, lead Cause private key safeguard measure weak, in addition, application signature process needs to upload whole application to be signed, so as to cause client and service Transmission speed between device is slow, and signature efficiency is low.
The content of the invention
The embodiment of the present invention provides a kind of application signature method, terminal and computer-readable recording medium, can protect The data of application are not tampered with, and are reached the data volume of control signature process transmission, improved the effect of signature efficiency.
In a first aspect, the embodiments of the invention provide a kind of application signature method, this method includes:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
In summary, the embodiment of the present invention to intended application according to default digest algorithm by carrying out digest calculations;Obtain Digest value for the intended application, the digest value sent to server and in the server to the digest value Signed, the digest value after signing is received from the server, stored the digest value after the signature to the target In, so as to protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve signature The effect of efficiency.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 2 is a kind of another schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 3 is a kind of another schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic flow diagram for application signature method that another embodiment of the present invention provides;
Fig. 5 is a kind of schematic flow diagram for application signature method that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 8 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 9 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Figure 10 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Figure 11 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
It is that the embodiment of the present invention provides a kind of schematic flow diagram of application signature method, as illustrated, the party referring to Fig. 1 Method may include S101~S105.
S101, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
Further, step S201~S202 is included referring to Fig. 2, the step S101.
S201, the All Files in the intended application in addition to META-INF files is plucked using SHA Calculate.
In embodiments of the present invention, using SHA (SHA-256 algorithms) to removing META- in the intended application The digest calculations of length are fixed in all message files outside INF files.
S201, generate the cryptographic Hash of 256 bytes.
In embodiments of the present invention, no matter the file size in intended application is how many, can pass through SHA-256 algorithms Determine the 256 byte cryptographic Hash for this document, i.e. the size of digest value is 256 bytes.Therefore, it is whole compared to transmission File, transmission quantity can be greatly lowered to reach the effect of the data volume of control signature process transmission.
S102, obtain the digest value for the intended application.
Further, step S301~S303 is included referring to Fig. 3, the step S102.
S301, described 256 cryptographic Hash is defined as the digest value for the intended application.
S302, the cryptographic Hash of 256 bytes determined by acquisition.
S303, the cryptographic Hash of 256 byte is stored into default file.
In embodiments of the present invention, the default file can be META-INF/ [filename] .SF files, wherein file Name can be not limited thereto by user's self-defining;The cryptographic Hash by 256 bytes is stored into default file, i.e. will The digest value of 256 bytes is stored into META-INF/ [filename] .SF files.
S103, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, in embodiments of the present invention, the digest value is sent to server, utilizes service The private key of device is signed to the digest value.Specifically, the process signed in the server to the digest value The digest value can be encrypted for the process that as digest value is encrypted, server, and by the summary after encryption Value returns to user to complete to sign, wherein, server has used rivest, shamir, adelman that digest value is encrypted, asymmetric The ciphering process of AES is needs two keys to be referred to as public key and private key, with the digest value of private key encryption/signature Public key decryptions/sign test can be used, can only be decrypted with the data of public key encryption with private key.
S104, the digest value after signature is received from the server.
S105, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored In META-INF file directorys, to complete to the intended application signature process.
As seen from the above, the embodiment of the present invention is by carrying out digest calculations to intended application according to default digest algorithm, obtaining Take the digest value for the intended application, send the digest value to server and in the server to the summary Value is signed, the digest value after signing is received from the server, is stored the digest value after the signature to the mesh In mark application, so as to protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve label The effect of name efficiency.
Referring to Fig. 4, it is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention, as illustrated, being somebody's turn to do Method includes S401~S407.
S401, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
S402, obtain the digest value for the intended application.
S403, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, the digest value is sent to server, plucked using the public key of server to described It is worth and is signed.Specifically, the process signed in the server to the digest value is to the digest value The process being encrypted, the digest value can be encrypted for server, and the digest value after encryption is returned into user with complete Into signature, wherein, server has used rivest, shamir, adelman that digest value is encrypted, rivest, shamir, adelman it is encrypted Journey is needs two keys to be referred to as public key and private key, and with private key encryption ,/digest value of signature can only use public key decryptions/tests Label, can only be decrypted with the data of public key encryption with private key.
S404, the digest value after signature is received from the server.
S405, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored In META-INF file directorys, to complete to the intended application signature process.
S406, receive the public key that the server is sent.
In embodiments of the present invention, because server is when digest value is encrypted, rivest, shamir, adelman has been used, I.e. server can use the private key in server that digest value is encrypted, in such a case, it is possible to using server Digest value is decrypted public key.
S407, the digest value after the signature is decrypted according to the public key received.
In embodiments of the present invention, user can receive public key from server, and the public key can be used for plucking after encryption It is worth and is decrypted, so as to completes signature recognition process.
As seen from the above, the public key that the embodiment of the present invention is sent by receiving the server, according to the public key received Digest value after the encryption is decrypted, whole process all puts key in the server, so as to ensure that public and private key Safety.
Referring to Fig. 5, it is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention, as illustrated, being somebody's turn to do Method includes S501~S506.
S501, public private key pair is created in the server.
In embodiments of the present invention, public private key pair is created, such as strong name instrument (Sn.exe) can be used to create one Key pair.Key file generally all has .snk file extension.A key is created under CMD, key Enter to issue orders:Sn-k<file name>In this order,<file name>It is an output file for including key pair Name.If example below is one key-pair file sn-k sgKey.snk for being named as sgKey.snk of establishment, you wish to postpone Identify procedure set and also be intended to control whole key pair, you can be issued orders with one and generate a pair of secret keys pair, then close from this Key centering extracts public key to a single file.First, key pair is created:Then, from above sn-k keypair.snk look unfamiliar Into key-pair file (keypair.snk) in extraction public key, and copy in an independent file:sn-p Once you create key pair to keypair.snk public.snk, this file must just be placed on strong name marking instrument by you Its position can be found.When a procedure set is identified with strong name, procedure set connector (Assembly Linker (Al.exe)) key file relevant with current directory can be found, and it is output to current directory.Using order line work When tool compiling, this key can also be easily copied under the current directory comprising code module.
S502, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
S503, obtain the digest value for the intended application.
S504, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, in embodiments of the present invention, the digest value is sent to server, utilizes service The private key of device is signed to the digest value.Specifically, the process signed in the server to the digest value The digest value can be encrypted for the process that as digest value is encrypted, server, and by the summary after encryption Value returns to user to complete to sign, wherein, server has used rivest, shamir, adelman that digest value is encrypted, asymmetric The ciphering process of AES is needs two keys to be referred to as public key and private key, with the digest value of private key encryption/signature Public key decryptions/sign test can be used, can only be decrypted with the data of public key encryption with private key.
S505, the digest value after signature is received from the server.
S506, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored In META-INF file directorys, to complete to the intended application signature process.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 6.The terminal 100 of the present embodiment includes: Computing unit 101, acquiring unit 102, ciphering unit 103, the first receiving unit 104, the first memory cell 105.
Wherein, the computing unit 101, for carrying out digest calculations to intended application according to default digest algorithm.
The acquiring unit 102, for obtaining the digest value for the intended application.
The signature unit 103, the digest value is sent to server and in the server to the digest value Signed.
First receiving unit 104, for receiving the digest value after signing from the server.
First memory cell 105, the digest value after the signature is stored into the intended application.
Referring to Fig. 7, the computing unit 101, including:
Computation subunit 1011, for using SHA in the intended application in addition to META-INF files All Files carries out digest calculations.
Generation unit 1012, for generating the cryptographic Hash of 256 bytes.
Referring to Fig. 8, the acquiring unit 102, including:
Determining unit 1021, for described 256 cryptographic Hash to be defined as to the digest value for the intended application.
Subelement 1022 is obtained, for obtaining the cryptographic Hash of identified 256 bytes.
Second memory cell 1023, for the cryptographic Hash of 256 byte to be stored into default file.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 9.The terminal 200 of the present embodiment includes: Computing unit 201, acquiring unit 202, signature unit 203, the first receiving unit 204, the first memory cell 205, second receive Unit 206, decryption unit 207.
Wherein, the computing unit 201, for carrying out digest calculations to intended application according to default digest algorithm.
The acquiring unit 202, for obtaining the digest value for the intended application.
The signature unit 203, for sending the digest value to server and being plucked to described in the server It is worth and is signed.
First receiving unit 204, for receiving the digest value after signing from the server.
First memory cell 205, for the digest value after the signature to be stored into the intended application.
Second receiving unit 206, the public key sent for receiving the server.
The decryption unit 207, for the digest value after the signature to be decrypted according to the public key received.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Figure 10.The terminal 300 of the present embodiment is wrapped Include:Creating unit 301, computing unit 302, acquiring unit 303, signature unit 304, the storage of the first receiving unit 305, first are single Member 306.
Wherein, the creating unit 301, for creating public private key pair in the server.
The computing unit 302, digest calculations are carried out to intended application according to default digest algorithm.
The acquiring unit 303, obtain the digest value for the intended application.
The signature unit 304, the digest value is sent to server and in the server to the digest value Signed.
First receiving unit 305, the digest value after signature is received from the server.
First memory cell 306, the digest value after the signature is stored into the intended application.
It is a kind of terminal schematic block diagram that another embodiment of the present invention provides referring to Figure 11.This implementation as depicted Terminal in example can include:One or more processors 801;One or more input equipments 802, one or more output are set Standby 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805 Connection.Memory 804 is used to store computer program, and the computer program includes programmed instruction, and processor 801 is used to perform The programmed instruction that memory 804 stores.Wherein, processor 801 is arranged to call described program instruction to perform:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Further, the basis presets digest algorithm and digest calculations is carried out to intended application, including:
Summary meter is carried out to the All Files in the intended application in addition to META-INF files using SHA Calculate;
Generate the cryptographic Hash of 256 bytes.
Further, the digest value obtained for the intended application, including:
The cryptographic Hash of 256 byte is defined as the digest value for the intended application;
The cryptographic Hash of 256 bytes determined by acquisition;
The cryptographic Hash of 256 byte is stored into default file.
Further, it is described that the digest value is sent to server and the digest value carried out in the server Signature, including:
The digest value is signed using the private key of the server.
Further, the digest value by after the signature is stored into the intended application, including:
Digest value after the signature is stored in the META-INF file directorys of the intended application.
Further, processor 801 is arranged to call described program instruction also to perform:
Receive the public key that the server is sent;
The digest value after the signature is decrypted according to the public key received.
Further, processor 801 is arranged to call described program instruction also to perform:
Public private key pair is created in the server.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can The implementation described in the first embodiment and second embodiment of application signature method provided in an embodiment of the present invention is performed, Also the implementation of the terminal described by the embodiment of the present invention is can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction is realized when being executed by processor:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Further, the basis presets digest algorithm and digest calculations is carried out to intended application, including:
Summary meter is carried out to the All Files in the intended application in addition to META-INF files using SHA Calculate;
Generate the cryptographic Hash of 256 bytes.
Further, the digest value obtained for the intended application, including:
The cryptographic Hash of 256 byte is defined as the digest value for the intended application;
The cryptographic Hash of 256 bytes determined by acquisition;
The cryptographic Hash of 256 byte is stored into default file.
Further, it is described that the digest value is sent to server and the digest value carried out in the server Signature, including:
The digest value is signed using the private key of the server.
Further, the digest value by after the signature is stored into the intended application, including:
Digest value after the signature is stored in the META-INF file directorys of the intended application.
Further, also realized when the computer program is executed by processor:
Receive the public key that the server is sent;
The digest value after the signature is decrypted according to the public key received.
Further, also realized when the computer program is executed by processor:
Public private key pair is created in the server.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. application signature method, it is characterised in that including:
    Digest calculations are carried out to intended application according to default digest algorithm;
    Obtain the digest value for the intended application;
    The digest value is sent to server and signed to the digest value in the server;
    The digest value after signature is received from the server;
    Digest value after the signature is stored into the intended application.
  2. 2. according to the method for claim 1, it is characterised in that the basis presets digest algorithm and intended application is plucked Calculate, including:
    Digest calculations are carried out to the All Files in the intended application in addition to META-INF files using SHA;
    Generate the cryptographic Hash of 256 bytes.
  3. 3. according to the method for claim 2, it is characterised in that the digest value obtained for the intended application, bag Include:
    The cryptographic Hash of 256 byte is defined as the digest value for the intended application;
    The cryptographic Hash of 256 bytes determined by acquisition;
    The cryptographic Hash of 256 byte is stored into default file.
  4. 4. according to the method for claim 1, it is characterised in that described to send the digest value to server and described The digest value is signed in server, including:
    The digest value is signed using the private key of the server.
  5. 5. according to the method for claim 1, it is characterised in that the digest value by after the signature is stored to the mesh In mark application, including:
    Digest value after the signature is stored in the META-INF file directorys of the intended application.
  6. 6. according to the method for claim 1, it is characterised in that methods described also includes:
    Receive the public key that the server is sent;
    The digest value after the signature is decrypted according to the public key received.
  7. 7. according to the method for claim 1, it is characterised in that methods described also includes:
    Public private key pair is created in the server.
  8. 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
  9. 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
CN201711091615.XA 2017-11-08 2017-11-08 A kind of application signature method, terminal and computer-readable recording medium Withdrawn CN107864039A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711091615.XA CN107864039A (en) 2017-11-08 2017-11-08 A kind of application signature method, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711091615.XA CN107864039A (en) 2017-11-08 2017-11-08 A kind of application signature method, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107864039A true CN107864039A (en) 2018-03-30

Family

ID=61701108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711091615.XA Withdrawn CN107864039A (en) 2017-11-08 2017-11-08 A kind of application signature method, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107864039A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460247A (en) * 2018-12-17 2019-03-12 深圳创维数字技术有限公司 Software packet upgrade method, software client, storage medium and device
CN109981287A (en) * 2019-03-14 2019-07-05 亚数信息科技(上海)有限公司 A kind of code signature method and its storage medium
CN110826034A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110830257A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN111970689A (en) * 2020-06-29 2020-11-20 百度在线网络技术(北京)有限公司 OTA data packet generation method and device and electronic equipment
CN115987529A (en) * 2023-01-31 2023-04-18 深圳市新国都支付技术有限公司 APP signature method based on Hongmon system, electronic device and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049213A (en) * 2015-07-27 2015-11-11 小米科技有限责任公司 File signature method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049213A (en) * 2015-07-27 2015-11-11 小米科技有限责任公司 File signature method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826034A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110830257A (en) * 2018-08-14 2020-02-21 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110826034B (en) * 2018-08-14 2022-09-02 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN110830257B (en) * 2018-08-14 2023-01-03 珠海金山办公软件有限公司 File signature method and device, electronic equipment and readable storage medium
CN109460247A (en) * 2018-12-17 2019-03-12 深圳创维数字技术有限公司 Software packet upgrade method, software client, storage medium and device
CN109460247B (en) * 2018-12-17 2021-08-17 深圳创维数字技术有限公司 Software package upgrading method, software client, storage medium and device
CN109981287A (en) * 2019-03-14 2019-07-05 亚数信息科技(上海)有限公司 A kind of code signature method and its storage medium
CN111970689A (en) * 2020-06-29 2020-11-20 百度在线网络技术(北京)有限公司 OTA data packet generation method and device and electronic equipment
CN115987529A (en) * 2023-01-31 2023-04-18 深圳市新国都支付技术有限公司 APP signature method based on Hongmon system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN107864039A (en) A kind of application signature method, terminal and computer-readable recording medium
CN107480519A (en) A kind of method and server for identifying risk application
US10078599B2 (en) Application access control method and electronic apparatus implementing the same
CN107276756A (en) A kind of method and server for obtaining root key
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN108400868B (en) Seed key storage method and device and mobile terminal
CN110245469B (en) Webpage watermark generation method, watermark analysis method, device and storage medium
CN104462965A (en) Method for verifying integrity of application program and network device
US20140258734A1 (en) Data security method and electronic device implementing the same
WO2020125134A1 (en) Customized model tamper-proof method and apparatus, terminal device and storage medium
CN107592636A (en) A kind of method of processing information, terminal and server
WO2014196964A1 (en) Application integrity protection via secure interaction and processing
CN110232021A (en) The method and device of page test
CN107169343A (en) A kind of method and terminal of control application program
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107451244A (en) File naming method, mobile terminal and computer-readable recording medium
CN109613990A (en) Soft keyboard safety input method, server, client, electronic equipment and medium
CN106603510A (en) Data processing method and terminal
CN107368735A (en) One kind applies installation method, mobile terminal and computer-readable recording medium
CN114817890A (en) Electronic signature method and device of document, terminal equipment and storage medium
CN110705985B (en) Method and apparatus for storing information
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN108289028A (en) A kind of signature authentication method, relevant device and computer readable storage medium
CN107888663A (en) A kind of method of distribution of document, equipment and computer-readable medium
CN108171063A (en) Method, terminal and the computer readable storage medium of access safety element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180330