CN107864039A - A kind of application signature method, terminal and computer-readable recording medium - Google Patents
A kind of application signature method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107864039A CN107864039A CN201711091615.XA CN201711091615A CN107864039A CN 107864039 A CN107864039 A CN 107864039A CN 201711091615 A CN201711091615 A CN 201711091615A CN 107864039 A CN107864039 A CN 107864039A
- Authority
- CN
- China
- Prior art keywords
- digest value
- server
- signature
- digest
- intended application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of application signature method, terminal and computer-readable recording medium, wherein method includes carrying out digest calculations to intended application according to default digest algorithm;Obtain the digest value for the intended application;The digest value is sent to server and signed to the digest value in the server;The digest value after signature is received from the server;Digest value after the signature is stored into the intended application.The embodiment of the present invention can protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve the effect of signature efficiency by the application signature method.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of application signature method, terminal and computer-readable deposit
Storage media.
Background technology
Application signature technology is able to verify that the effect using legitimacy, be widely used in mobile terminal, DTV,
The fields such as POS.Traditional application signature flow is in the field of business commonly known as " developer's signature ", is handled by developer's signature
Application package, application program user can therefrom extract the digital certificate of signer at any time, and use this digital certificate
The integrality of All Files in program bag is verified.But because signature private key is placed on what developer was locally stored, lead
Cause private key safeguard measure weak, in addition, application signature process needs to upload whole application to be signed, so as to cause client and service
Transmission speed between device is slow, and signature efficiency is low.
The content of the invention
The embodiment of the present invention provides a kind of application signature method, terminal and computer-readable recording medium, can protect
The data of application are not tampered with, and are reached the data volume of control signature process transmission, improved the effect of signature efficiency.
In a first aspect, the embodiments of the invention provide a kind of application signature method, this method includes:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Second aspect, the embodiments of the invention provide a kind of terminal, the terminal includes being used to perform above-mentioned first aspect
The unit of method.
The third aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch
The computer program that terminal performs the above method is held, the computer program includes programmed instruction, and the processor is configured to use
In calling described program instruction, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
In summary, the embodiment of the present invention to intended application according to default digest algorithm by carrying out digest calculations;Obtain
Digest value for the intended application, the digest value sent to server and in the server to the digest value
Signed, the digest value after signing is received from the server, stored the digest value after the signature to the target
In, so as to protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve signature
The effect of efficiency.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 2 is a kind of another schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 3 is a kind of another schematic flow diagram of application signature method provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic flow diagram for application signature method that another embodiment of the present invention provides;
Fig. 5 is a kind of schematic flow diagram for application signature method that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 8 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 9 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Figure 10 is a kind of another schematic block diagram of terminal provided in an embodiment of the present invention;
Figure 11 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
It is that the embodiment of the present invention provides a kind of schematic flow diagram of application signature method, as illustrated, the party referring to Fig. 1
Method may include S101~S105.
S101, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through
Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and
And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to
It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
Further, step S201~S202 is included referring to Fig. 2, the step S101.
S201, the All Files in the intended application in addition to META-INF files is plucked using SHA
Calculate.
In embodiments of the present invention, using SHA (SHA-256 algorithms) to removing META- in the intended application
The digest calculations of length are fixed in all message files outside INF files.
S201, generate the cryptographic Hash of 256 bytes.
In embodiments of the present invention, no matter the file size in intended application is how many, can pass through SHA-256 algorithms
Determine the 256 byte cryptographic Hash for this document, i.e. the size of digest value is 256 bytes.Therefore, it is whole compared to transmission
File, transmission quantity can be greatly lowered to reach the effect of the data volume of control signature process transmission.
S102, obtain the digest value for the intended application.
Further, step S301~S303 is included referring to Fig. 3, the step S102.
S301, described 256 cryptographic Hash is defined as the digest value for the intended application.
S302, the cryptographic Hash of 256 bytes determined by acquisition.
S303, the cryptographic Hash of 256 byte is stored into default file.
In embodiments of the present invention, the default file can be META-INF/ [filename] .SF files, wherein file
Name can be not limited thereto by user's self-defining;The cryptographic Hash by 256 bytes is stored into default file, i.e. will
The digest value of 256 bytes is stored into META-INF/ [filename] .SF files.
S103, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, in embodiments of the present invention, the digest value is sent to server, utilizes service
The private key of device is signed to the digest value.Specifically, the process signed in the server to the digest value
The digest value can be encrypted for the process that as digest value is encrypted, server, and by the summary after encryption
Value returns to user to complete to sign, wherein, server has used rivest, shamir, adelman that digest value is encrypted, asymmetric
The ciphering process of AES is needs two keys to be referred to as public key and private key, with the digest value of private key encryption/signature
Public key decryptions/sign test can be used, can only be decrypted with the data of public key encryption with private key.
S104, the digest value after signature is received from the server.
S105, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed
Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored
In META-INF file directorys, to complete to the intended application signature process.
As seen from the above, the embodiment of the present invention is by carrying out digest calculations to intended application according to default digest algorithm, obtaining
Take the digest value for the intended application, send the digest value to server and in the server to the summary
Value is signed, the digest value after signing is received from the server, is stored the digest value after the signature to the mesh
In mark application, so as to protect the data of application to be not tampered with, and reach the data volume of control signature process transmission, improve label
The effect of name efficiency.
Referring to Fig. 4, it is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention, as illustrated, being somebody's turn to do
Method includes S401~S407.
S401, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through
Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and
And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to
It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
S402, obtain the digest value for the intended application.
S403, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, the digest value is sent to server, plucked using the public key of server to described
It is worth and is signed.Specifically, the process signed in the server to the digest value is to the digest value
The process being encrypted, the digest value can be encrypted for server, and the digest value after encryption is returned into user with complete
Into signature, wherein, server has used rivest, shamir, adelman that digest value is encrypted, rivest, shamir, adelman it is encrypted
Journey is needs two keys to be referred to as public key and private key, and with private key encryption ,/digest value of signature can only use public key decryptions/tests
Label, can only be decrypted with the data of public key encryption with private key.
S404, the digest value after signature is received from the server.
S405, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed
Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored
In META-INF file directorys, to complete to the intended application signature process.
S406, receive the public key that the server is sent.
In embodiments of the present invention, because server is when digest value is encrypted, rivest, shamir, adelman has been used,
I.e. server can use the private key in server that digest value is encrypted, in such a case, it is possible to using server
Digest value is decrypted public key.
S407, the digest value after the signature is decrypted according to the public key received.
In embodiments of the present invention, user can receive public key from server, and the public key can be used for plucking after encryption
It is worth and is decrypted, so as to completes signature recognition process.
As seen from the above, the public key that the embodiment of the present invention is sent by receiving the server, according to the public key received
Digest value after the encryption is decrypted, whole process all puts key in the server, so as to ensure that public and private key
Safety.
Referring to Fig. 5, it is a kind of schematic flow diagram of application signature method provided in an embodiment of the present invention, as illustrated, being somebody's turn to do
Method includes S501~S506.
S501, public private key pair is created in the server.
In embodiments of the present invention, public private key pair is created, such as strong name instrument (Sn.exe) can be used to create one
Key pair.Key file generally all has .snk file extension.A key is created under CMD, key
Enter to issue orders:Sn-k<file name>In this order,<file name>It is an output file for including key pair
Name.If example below is one key-pair file sn-k sgKey.snk for being named as sgKey.snk of establishment, you wish to postpone
Identify procedure set and also be intended to control whole key pair, you can be issued orders with one and generate a pair of secret keys pair, then close from this
Key centering extracts public key to a single file.First, key pair is created:Then, from above sn-k keypair.snk look unfamiliar
Into key-pair file (keypair.snk) in extraction public key, and copy in an independent file:sn-p
Once you create key pair to keypair.snk public.snk, this file must just be placed on strong name marking instrument by you
Its position can be found.When a procedure set is identified with strong name, procedure set connector (Assembly
Linker (Al.exe)) key file relevant with current directory can be found, and it is output to current directory.Using order line work
When tool compiling, this key can also be easily copied under the current directory comprising code module.
S502, digest calculations are carried out to intended application according to default digest algorithm.
In embodiments of the present invention, the digest value of intended application can be calculated by default digest algorithm, specifically, passing through
Default digest algorithm calculates the digest value of each message file in intended application, and the digest value calculated is regular length, and
And there is uniqueness, the intended application such as wechat, Alipay etc. are applied, what each message file in the intended application referred to
It is the source code or resource file in intended application, file, the file of store code of word is stored in such as wechat.
S503, obtain the digest value for the intended application.
S504, the digest value is sent to server and signed to the digest value in the server.
In embodiments of the present invention, in embodiments of the present invention, the digest value is sent to server, utilizes service
The private key of device is signed to the digest value.Specifically, the process signed in the server to the digest value
The digest value can be encrypted for the process that as digest value is encrypted, server, and by the summary after encryption
Value returns to user to complete to sign, wherein, server has used rivest, shamir, adelman that digest value is encrypted, asymmetric
The ciphering process of AES is needs two keys to be referred to as public key and private key, with the digest value of private key encryption/signature
Public key decryptions/sign test can be used, can only be decrypted with the data of public key encryption with private key.
S505, the digest value after signature is received from the server.
S506, the digest value after the signature is stored into the intended application.
In embodiments of the present invention, the digest value after signature is stored into the intended application, to form what is signed
Using, and complete the signature process to intended application.Should to the target specifically, the digest value after the signature is stored
In META-INF file directorys, to complete to the intended application signature process.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 6.The terminal 100 of the present embodiment includes:
Computing unit 101, acquiring unit 102, ciphering unit 103, the first receiving unit 104, the first memory cell 105.
Wherein, the computing unit 101, for carrying out digest calculations to intended application according to default digest algorithm.
The acquiring unit 102, for obtaining the digest value for the intended application.
The signature unit 103, the digest value is sent to server and in the server to the digest value
Signed.
First receiving unit 104, for receiving the digest value after signing from the server.
First memory cell 105, the digest value after the signature is stored into the intended application.
Referring to Fig. 7, the computing unit 101, including:
Computation subunit 1011, for using SHA in the intended application in addition to META-INF files
All Files carries out digest calculations.
Generation unit 1012, for generating the cryptographic Hash of 256 bytes.
Referring to Fig. 8, the acquiring unit 102, including:
Determining unit 1021, for described 256 cryptographic Hash to be defined as to the digest value for the intended application.
Subelement 1022 is obtained, for obtaining the cryptographic Hash of identified 256 bytes.
Second memory cell 1023, for the cryptographic Hash of 256 byte to be stored into default file.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Fig. 9.The terminal 200 of the present embodiment includes:
Computing unit 201, acquiring unit 202, signature unit 203, the first receiving unit 204, the first memory cell 205, second receive
Unit 206, decryption unit 207.
Wherein, the computing unit 201, for carrying out digest calculations to intended application according to default digest algorithm.
The acquiring unit 202, for obtaining the digest value for the intended application.
The signature unit 203, for sending the digest value to server and being plucked to described in the server
It is worth and is signed.
First receiving unit 204, for receiving the digest value after signing from the server.
First memory cell 205, for the digest value after the signature to be stored into the intended application.
Second receiving unit 206, the public key sent for receiving the server.
The decryption unit 207, for the digest value after the signature to be decrypted according to the public key received.
It is a kind of schematic block diagram of terminal provided in an embodiment of the present invention referring to Figure 10.The terminal 300 of the present embodiment is wrapped
Include:Creating unit 301, computing unit 302, acquiring unit 303, signature unit 304, the storage of the first receiving unit 305, first are single
Member 306.
Wherein, the creating unit 301, for creating public private key pair in the server.
The computing unit 302, digest calculations are carried out to intended application according to default digest algorithm.
The acquiring unit 303, obtain the digest value for the intended application.
The signature unit 304, the digest value is sent to server and in the server to the digest value
Signed.
First receiving unit 305, the digest value after signature is received from the server.
First memory cell 306, the digest value after the signature is stored into the intended application.
It is a kind of terminal schematic block diagram that another embodiment of the present invention provides referring to Figure 11.This implementation as depicted
Terminal in example can include:One or more processors 801;One or more input equipments 802, one or more output are set
Standby 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805
Connection.Memory 804 is used to store computer program, and the computer program includes programmed instruction, and processor 801 is used to perform
The programmed instruction that memory 804 stores.Wherein, processor 801 is arranged to call described program instruction to perform:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Further, the basis presets digest algorithm and digest calculations is carried out to intended application, including:
Summary meter is carried out to the All Files in the intended application in addition to META-INF files using SHA
Calculate;
Generate the cryptographic Hash of 256 bytes.
Further, the digest value obtained for the intended application, including:
The cryptographic Hash of 256 byte is defined as the digest value for the intended application;
The cryptographic Hash of 256 bytes determined by acquisition;
The cryptographic Hash of 256 byte is stored into default file.
Further, it is described that the digest value is sent to server and the digest value carried out in the server
Signature, including:
The digest value is signed using the private key of the server.
Further, the digest value by after the signature is stored into the intended application, including:
Digest value after the signature is stored in the META-INF file directorys of the intended application.
Further, processor 801 is arranged to call described program instruction also to perform:
Receive the public key that the server is sent;
The digest value after the signature is decrypted according to the public key received.
Further, processor 801 is arranged to call described program instruction also to perform:
Public private key pair is created in the server.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and
Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited
Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can
The implementation described in the first embodiment and second embodiment of application signature method provided in an embodiment of the present invention is performed,
Also the implementation of the terminal described by the embodiment of the present invention is can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction is realized when being executed by processor:
Digest calculations are carried out to intended application according to default digest algorithm;
Obtain the digest value for the intended application;
The digest value is sent to server and signed to the digest value in the server;
The digest value after signature is received from the server;
Digest value after the signature is stored into the intended application.
Further, the basis presets digest algorithm and digest calculations is carried out to intended application, including:
Summary meter is carried out to the All Files in the intended application in addition to META-INF files using SHA
Calculate;
Generate the cryptographic Hash of 256 bytes.
Further, the digest value obtained for the intended application, including:
The cryptographic Hash of 256 byte is defined as the digest value for the intended application;
The cryptographic Hash of 256 bytes determined by acquisition;
The cryptographic Hash of 256 byte is stored into default file.
Further, it is described that the digest value is sent to server and the digest value carried out in the server
Signature, including:
The digest value is signed using the private key of the server.
Further, the digest value by after the signature is stored into the intended application, including:
Digest value after the signature is stored in the META-INF file directorys of the intended application.
Further, also realized when the computer program is executed by processor:
Receive the public key that the server is sent;
The digest value after the signature is decrypted according to the public key received.
Further, also realized when the computer program is executed by processor:
Public private key pair is created in the server.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
- A kind of 1. application signature method, it is characterised in that including:Digest calculations are carried out to intended application according to default digest algorithm;Obtain the digest value for the intended application;The digest value is sent to server and signed to the digest value in the server;The digest value after signature is received from the server;Digest value after the signature is stored into the intended application.
- 2. according to the method for claim 1, it is characterised in that the basis presets digest algorithm and intended application is plucked Calculate, including:Digest calculations are carried out to the All Files in the intended application in addition to META-INF files using SHA;Generate the cryptographic Hash of 256 bytes.
- 3. according to the method for claim 2, it is characterised in that the digest value obtained for the intended application, bag Include:The cryptographic Hash of 256 byte is defined as the digest value for the intended application;The cryptographic Hash of 256 bytes determined by acquisition;The cryptographic Hash of 256 byte is stored into default file.
- 4. according to the method for claim 1, it is characterised in that described to send the digest value to server and described The digest value is signed in server, including:The digest value is signed using the private key of the server.
- 5. according to the method for claim 1, it is characterised in that the digest value by after the signature is stored to the mesh In mark application, including:Digest value after the signature is stored in the META-INF file directorys of the intended application.
- 6. according to the method for claim 1, it is characterised in that methods described also includes:Receive the public key that the server is sent;The digest value after the signature is decrypted according to the public key received.
- 7. according to the method for claim 1, it is characterised in that methods described also includes:Public private key pair is created in the server.
- 8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-7 any claims Member.
- 9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store computer program, the computer Program includes programmed instruction, and the processor is arranged to call described program instruction, performed such as any one of claim 1-7 Described method.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711091615.XA CN107864039A (en) | 2017-11-08 | 2017-11-08 | A kind of application signature method, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711091615.XA CN107864039A (en) | 2017-11-08 | 2017-11-08 | A kind of application signature method, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107864039A true CN107864039A (en) | 2018-03-30 |
Family
ID=61701108
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711091615.XA Withdrawn CN107864039A (en) | 2017-11-08 | 2017-11-08 | A kind of application signature method, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107864039A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109460247A (en) * | 2018-12-17 | 2019-03-12 | 深圳创维数字技术有限公司 | Software packet upgrade method, software client, storage medium and device |
CN109981287A (en) * | 2019-03-14 | 2019-07-05 | 亚数信息科技(上海)有限公司 | A kind of code signature method and its storage medium |
CN110826034A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110830257A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN111970689A (en) * | 2020-06-29 | 2020-11-20 | 百度在线网络技术(北京)有限公司 | OTA data packet generation method and device and electronic equipment |
CN115987529A (en) * | 2023-01-31 | 2023-04-18 | 深圳市新国都支付技术有限公司 | APP signature method based on Hongmon system, electronic device and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049213A (en) * | 2015-07-27 | 2015-11-11 | 小米科技有限责任公司 | File signature method and device |
-
2017
- 2017-11-08 CN CN201711091615.XA patent/CN107864039A/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049213A (en) * | 2015-07-27 | 2015-11-11 | 小米科技有限责任公司 | File signature method and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110826034A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110830257A (en) * | 2018-08-14 | 2020-02-21 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110826034B (en) * | 2018-08-14 | 2022-09-02 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN110830257B (en) * | 2018-08-14 | 2023-01-03 | 珠海金山办公软件有限公司 | File signature method and device, electronic equipment and readable storage medium |
CN109460247A (en) * | 2018-12-17 | 2019-03-12 | 深圳创维数字技术有限公司 | Software packet upgrade method, software client, storage medium and device |
CN109460247B (en) * | 2018-12-17 | 2021-08-17 | 深圳创维数字技术有限公司 | Software package upgrading method, software client, storage medium and device |
CN109981287A (en) * | 2019-03-14 | 2019-07-05 | 亚数信息科技(上海)有限公司 | A kind of code signature method and its storage medium |
CN111970689A (en) * | 2020-06-29 | 2020-11-20 | 百度在线网络技术(北京)有限公司 | OTA data packet generation method and device and electronic equipment |
CN115987529A (en) * | 2023-01-31 | 2023-04-18 | 深圳市新国都支付技术有限公司 | APP signature method based on Hongmon system, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107864039A (en) | A kind of application signature method, terminal and computer-readable recording medium | |
CN107480519A (en) | A kind of method and server for identifying risk application | |
US10078599B2 (en) | Application access control method and electronic apparatus implementing the same | |
CN107276756A (en) | A kind of method and server for obtaining root key | |
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN108400868B (en) | Seed key storage method and device and mobile terminal | |
CN110245469B (en) | Webpage watermark generation method, watermark analysis method, device and storage medium | |
CN104462965A (en) | Method for verifying integrity of application program and network device | |
US20140258734A1 (en) | Data security method and electronic device implementing the same | |
WO2020125134A1 (en) | Customized model tamper-proof method and apparatus, terminal device and storage medium | |
CN107592636A (en) | A kind of method of processing information, terminal and server | |
WO2014196964A1 (en) | Application integrity protection via secure interaction and processing | |
CN110232021A (en) | The method and device of page test | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN107451244A (en) | File naming method, mobile terminal and computer-readable recording medium | |
CN109613990A (en) | Soft keyboard safety input method, server, client, electronic equipment and medium | |
CN106603510A (en) | Data processing method and terminal | |
CN107368735A (en) | One kind applies installation method, mobile terminal and computer-readable recording medium | |
CN114817890A (en) | Electronic signature method and device of document, terminal equipment and storage medium | |
CN110705985B (en) | Method and apparatus for storing information | |
CN110545542B (en) | Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment | |
CN108289028A (en) | A kind of signature authentication method, relevant device and computer readable storage medium | |
CN107888663A (en) | A kind of method of distribution of document, equipment and computer-readable medium | |
CN108171063A (en) | Method, terminal and the computer readable storage medium of access safety element |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180330 |