CN108847926A - A kind of client secure detection method, device and client device - Google Patents

A kind of client secure detection method, device and client device Download PDF

Info

Publication number
CN108847926A
CN108847926A CN201810647280.3A CN201810647280A CN108847926A CN 108847926 A CN108847926 A CN 108847926A CN 201810647280 A CN201810647280 A CN 201810647280A CN 108847926 A CN108847926 A CN 108847926A
Authority
CN
China
Prior art keywords
module
client
check information
module check
version
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810647280.3A
Other languages
Chinese (zh)
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810647280.3A priority Critical patent/CN108847926A/en
Publication of CN108847926A publication Critical patent/CN108847926A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of client secure detection method, device and electronic equipments.Present invention method includes:After client terminal start-up, from the first module check information of the local client for obtaining current goal version;From preset client release block chain, the second module check information of the client of target version is obtained;Information comparison is carried out to the first module check information and the second module check information;If the first module check information and the second module check information matching, it is determined that client is legal.Effectively client side can be verified, promote the safety of client, avoid the loss of user and developer since block chain data are not easy the characteristic distorted using the version information that block chain technology saves client in the embodiment of the present invention.

Description

A kind of client secure detection method, device and client device
Technical field
The present invention relates to client-side technology field, in particular to a kind of client secure detection method, device and client Equipment.
Background technique
Currently, being to combine completion, common client by functional unit one by one for a client-side program Hold developer that can carry out module division according to function, so that multi-person synergy is completed, it also can be more to the division of function Clearly.For example, for Windows software development multiple modules can be split into complete, a module is then a dynamic link ((Dynamic Link Library, DLL) file, not only improves code sharing and the division of labor, and can be by function to library file in this way It splits as far as possible, reduces the code degree of coupling.Therefore the composition of a software is then by an executable program (executable Program, EXE) file and multiple dll files composition.Such as encryption-decryption algorithm function all used in software is sealed It is attached in an independent dll file, such as by the relevant function package of all-network into an independent dll file, example Such as journal function is encapsulated into an independent dll file.
Specifically, client-side program is written as a module file for the operation of database is independent, network operation is only Vertical is written as a module file, is written as a module file for data ciphering and deciphering correlation function is independent, however existing There is hacker to pass through modification client modules to complete some illegal functions.Such as hacker can pass through the module of modification client To obtain desired data from module.Such as client-side program, for example, client by the chat record of user into It is sent to server after row encryption, then after client-side program can encrypt the chat record of user calling encrypting module It is sent to server, once then this computer virus infection, Virus then can be by modifying client encrypting module Program, to obtain the chat record of all plaintexts.
Although above-mentioned software development mode is conducive to code sharing and the division of labor, reduce the code degree of coupling, but simultaneously also can band Carry out a problem, software module is easy to be cracked by hacker, difficult to the appraisal so as to cause to software developer and user Loss.
Summary of the invention
The embodiment of the invention provides a kind of client secure detection method, device and client devices, to avoid current The problem of client modules are easy by hack, cause loss difficult to the appraisal, improves client secure.
In a first aspect, this application provides a kind of client secure detection method, this method includes:
After client terminal start-up, from the first module check information of the local client for obtaining current goal version;
From preset client release block chain, the second module verification of the client of the target version is obtained Information, the first module check information and the second module check information correspond to identical client modules;
Information comparison is carried out to the first module check information and the second module check information;
If the first module check information and the second module check information matching, it is determined that the client is closed Method.
Further, the first module check information from the local client for obtaining target version, including:
From the module check information list of the local client for obtaining target version, the module check information list In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list The check information of module.
Further, the method also includes:
After the client is installed, the client release block chain, the client edition local area are obtained from server The module check information of the list of module check information and each old version in block chain including the client current version List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, described when the client carries out version updating every time, new module check information list is generated, Including:
When the client carries out version updating every time, it is big to obtain each module file of the client currently updated It is small;
Obtain the client modules version number currently updated;
According to each module file size of the client, the verification letter of each module in the client currently updated is determined Breath;
According to the check information of module each in the client and the client modules version number currently updated, Generate new module check information list.
Further, described according to each module file size of the client, it determines in the client currently updated The check information of each module, including:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, described that information ratio is carried out to the first module check information and the second module check information It is right, including:
If include the module check information of multiple clients in the first module check information, respectively to institute The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information It compares;
If all module check informations in first correction verification module are corresponding with the second module check information Module check information matching, it is determined that the first module check information and the second module check information matching.
Second aspect, the application provide a kind of client secure detection device, which includes:
First obtains module, is used for after client terminal start-up, from the local client for obtaining current goal version First module check information;
Second obtains module, for obtaining the visitor of the target version from preset client release block chain The second module check information at family end, the first module check information and the second module check information correspond to identical visitor Family end module;
Comparison module, for carrying out information ratio to the first module check information and the second module check information It is right;
Determining module, for determining when the first module check information and the second module check information match The client is legal.
Further, the first acquisition module is specifically used for:
From the module check information list of the local client for obtaining target version, the module check information list In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list The check information of module.
Further, described device further includes update module, and the update module is used for:
After the client is installed, the client release block chain, the client edition local area are obtained from server The module check information of the list of module check information and each old version in block chain including the client current version List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, the update module is specifically used for:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, the comparison module is specifically used for:
If include the module check information of multiple clients in the first module check information, respectively to institute The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information It compares;
If all module check informations in first correction verification module are corresponding with the second module check information Module check information matching, it is determined that the first module check information and the second module check information matching.
The third aspect, the present invention also provides a kind of electronic equipment, including:Memory, processor and is stored in the storage On device and the computer program that can run on the processor, wherein the processor can when executing the computer program To realize any method in first aspect.
Fourth aspect, the present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the journey Any method in first aspect is realized when sequence is executed by processor.
The embodiment of the present invention is after client terminal start-up, from the first module school of the local client for obtaining current goal version Test information;From preset client release block chain, the second module check information of the client of target version is obtained;To One module check information and the second module check information carry out information comparison;If the first module check information and second module Check information matching, it is determined that client is legal.Believed in the embodiment of the present invention using the version that block chain technology saves client Breath, since block chain data are not easy the characteristic distorted, can effectively verify client side, promote client Safety avoids the loss of user and developer.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, institute in being described below to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is one embodiment schematic diagram of client secure detection method in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of client secure detection method in the embodiment of the present invention;
Fig. 3 is one embodiment schematic diagram of step of embodiment of the present invention S202;
Fig. 4 is one embodiment schematic diagram of step S2023 in the embodiment of the present invention;
Fig. 5 is one embodiment schematic diagram of client secure detection device in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of client secure detection device in the embodiment of the present invention;
Fig. 7 is one embodiment schematic diagram of electronic equipment in the embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
Description and claims of this specification and the (if present)s such as term " first " in above-mentioned attached drawing, " second " It is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that the number used in this way According to being interchangeable under appropriate circumstances, so as to the embodiments described herein can in addition to the content for illustrating or describing herein with Outer sequence is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover non-exclusive packet Contain, for example, what the process, method, system, product or equipment for containing a series of steps or units were not necessarily limited to be clearly listed Those step or units, but may include be not clearly listed or it is intrinsic for these process, methods, product or equipment Other step or units.
A kind of client secure detection method is applied to client secure detection device, the device position in the embodiment of the present invention In electronic equipment, which can be the electronic equipments such as mobile phone, tablet computer or PC, be also possible to future The electronic equipment etc. of appearance.
Referring to Fig. 1, a kind of client secure detection method one embodiment includes in the embodiment of the present invention:
S101, after client terminal start-up, from the first module check information of the local client for obtaining current goal version;
Specifically, in the electronic device, which corresponds to a client release, i.e., for client installation in the present embodiment Target version, such as V2.1 are locally preserved all modules of the client of the target version in electronic equipment, while also being saved There is the first module check information, which can be the check information of one module of client, be also possible to The check information of multiple modules.
S102, from preset client release block chain, obtain the client of target version the second module verification letter Breath;
Specifically, the first module check information and the second module check information correspond to identical client mould Block, for example, active client version is V2.1, the first module check information is the check information of A module in client, the second mould Block checking information is the check information of corresponding A module in V2.1 version client block in client release block chain, similarly When in the first module check information including the check information of multiple modules, for example, A module and B module, the second module verification letter It also include the check information of corresponding A module and B module in breath.
It include the client of client current version and each old version in the present embodiment, in client release block chain Block information, each client release information corresponds to a block in client release block chain, in client terminal start-up, from clothes Business device, which obtains the client release block chain or local maintenance, a client release block chain, if there is update, directly It is updated from server, it is subsequent directly in local use.
S103, information comparison is carried out to the first module check information and the second module check information;
In the present embodiment, if include the module check information of multiple client in the first module check information, distinguish To the module check information in first correction verification module, with corresponding module check information in the second module check information It is compared;Such as the A module and B module illustrated in above-mentioned steps S102, at this time respectively to the A module in the first correction verification module Corresponding A module check information is compared in check information and the second module check information, to the B mould in the first correction verification module Corresponding B module check information is compared in block checking information and the second module check information.When the first module check information In only one client modules check information when, then only need the comparison of a module check information.
If S104, the first module check information and the matching of the second module check information, it is determined that client is legal.
Specifically, if when only one client modules check information of the first module check information, the verification of the first module Information and the matching of the second module check information, then it is legal to directly determine client.
If include the module check information of multiple client in the first module check information, in only the first correction verification module All module check informations with module check information corresponding in the second module check information match, just determination the first module Check information and the second module check information matching.
The embodiment of the present invention is after client terminal start-up, from the first module school of the local client for obtaining current goal version Test information;From preset client release block chain, the second module check information of the client of target version is obtained;To One module check information and the second module check information carry out information comparison;If the first module check information and second module Check information matching, it is determined that client is legal.Believed in the embodiment of the present invention using the version that block chain technology saves client Breath, since block chain data are not easy the characteristic distorted, can effectively verify client side, promote client Safety avoids the loss of user and developer.
For more rapidly and more accurate verification client modules, in the present embodiment, in client installation directory file A module check information list has been separately configured, for official publication each client, specific number of modules, often The title of a module, the version number of each module, the file size of each module, the module contents of each module are fixed Constant, it then include it simultaneously for each module then can include then all modules in correction verification module list information The title of module, the version number of module, the file size of module, the cryptographic Hash of module (may include that one or more Hash are calculated The cryptographic Hash of method), after client is installed on an electronic device, that is, it has been locally generated each module and the module school of client Test information list.
Specifically, the first module check information can be client described at least one of the module check information list The check information of end module, the first module check information from the local client for obtaining target version, including:From The module check information list of the client of target version is locally obtained, includes described in the module check information list The check information of all modules of the client of target version.
Client (such as client of identical platform, such as struggle against fish client) in the present embodiment, in all setting ranges It is all a client of block chain, thus all functional characteristics with block chain, including generating new block, including storage All blocks have the function of distributed account book, including verifying to new block, including take out from distributed account book The module information of publication, whether the identity including verifying publisher is official's publication etc..Meanwhile each client also has to working as All modules of preceding client carry out the function of acquisition of information and verification, to prevent from having infected the client-side program fortune of virus Row, prevents information to be stolen or distort.
In the embodiment of the present invention, original block is generated by server, when official issues the version of client each time, all The block of a corresponding version can be generated, and is published in the client release block chain, each client release is in visitor Family end version block chain corresponds to a block, includes the preset data of client release in the block, is to pass through in the present embodiment The module check information list of each client release is set within a block, will include each version in the module check information list Each module file title in this, the cryptographic Hash of the file size of each module and each module.
The concrete mode of module check information list configuration module check information is exemplified below:
ModuleCheckList:{
Module1:
FileSize:0xa2465d
Version:1.2.0
MD5HASH:0x2567ade9e236a145
CRC32HASH:0xa25ac3d6
SHA1HASH:0xa25ecae63aebca256c9536edab2d5214
HEADMD5HASH:0xaab25639741defa5
TAILMD5HASH:0x35a5d2e3a6b2a123
}
Wherein, ModuleCheckList is the list of module check information, and Module1 is then the file name of module 1, table Show that the check information that module 1 is described below, FileSize are then the file size byte numbers of module, Version is then mould The version number of block 1, MD5HASH be then the cryptographic Hash that the HASH algorithm of the MD5 of this entire file of module 1 is calculated as a result, CRC32HASH be then the cryptographic Hash that the HASH algorithm of the CRC32 of this entire file of module 1 is calculated as a result, SHA1HASH then It is the cryptographic Hash that is calculated of HASH algorithm of the SHA1 of the entire file of this module as a result, HEADMD5HASH is then this module text The cryptographic Hash of the MD5 of the content of the file header 1M byte-sized of part is as a result, TAILMD5HASH is then the end-of-file of this module file The cryptographic Hash result of the MD5 of the content of 1M byte-sized.
In aforesaid way, the check information configuration of module 1 in module check information list is only described, likewise, if mould Further include other modules in block checking information list, then same configuration is also taken for other modules Module2, Module3 The mode of information is configured, so that finally can then believe comprising the verification of all modules of client in module check information list Breath.
A common block chain must include some necessary data, so that one can verify block chain itself Legitimacy, another is but also it is not easy to forge.Client release block chain data structure in the embodiment of the present invention then according to Rely in the module check information list for being herein each client release.So in the block data knot of client release block chain The information of module check information list is contained in structure, the data structure includes the Hash of the block number of block, previous block Value, current time, the number for calculating front 0 in new block cryptographic Hash, random data, the cryptographic Hash of current block and block function It can data;The block performance data includes the information of active client Version module check list, such as above-mentioned ModuleCheckList is implemented as follows:
Struct BlockData{
Int64index;
String previousHash;
Int64timestamp;
String data;
String zero;
String randdata;
String hash;
}
Wherein, index is used to indicate the block number of block, is usually incremented by since 0;PreviousHash indicates previous area The hash value (cryptographic Hash) of block;Timestamp indicates current time stamp;Zero indicates to calculate front 0 in the hash value of new block A data;Randdata then indicates random data, for being added in new block, so that its hash value calculated meets 0 number that server issues;Hash then indicates the hash value of the content of this current block;Data then indicates some data Splice (i.e. above-mentioned block performance data), the content of this data field is then according to set by the function of completing required for block Meter, is directed in the embodiment of the present invention, block performance data may include module check information list ModuleCheckList Complete information etc., after the design for having this block chain data structure, after receiving other client devices newly generated block Or it when itself starting client, then can be verified by the data to the inside.
As shown in Fig. 2, in some embodiment of the invention, it, all can be to client sheet when updating client release every time The client release block chain on ground is updated, specifically, i.e. the method also includes:
S201, after the client is installed, obtain the client release block chain from server;
Wherein, in the client release block chain including the client current version the list of module check information and The module check information list of each old version.
S202, when client carries out version updating every time, generate new module check information list;
S203, according to new module check information list, update client release block chain.
The present embodiment is after installing the client, by obtaining the client release block chain from server, in visitor When family end carries out version updating every time, new module check information list is generated, according to new module check information list, is updated Client release block chain, ensure that timely updating for client release block chain, and it is right in previous embodiment effectively to ensure Client side checking procedure promotes the safety of client.
Further, as shown in figure 3, the step S202 is specifically included:
S2021, when the client carries out version updating every time, obtain each module text of the client that currently updates Part size;
In the present embodiment, the mode for obtaining each module file size of the client currently updated is specific as follows:
(1) calling system function CreateFile first opens module file.
HANDLE CreateFile(
LPCTSTR,lpFileName,
DWORD dwDesiredAccess,
DWORD dwShareMode,
LPSECURITY_ATTRIBUTES lpSecurityAttributes,
DWORD dwCreationDisposition,
DWORD dwFlagAndAttributes,
HANDLE hTemplateFile;
Wherein crucial parameter is then the module file title that lpFileName needs to open, and dwDesiredAccess is then Incoming read module file GENERIC_READ, to obtain the handle of module file:
HFile=CreateFile (" module1 ", GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_ EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
(2) then calling system function GetFileSize obtains the size of file, specific as follows:
Int filesize=GetFileSize (hFile, NULL);
Wherein, first parameter of system function GetFileSize is then incoming file handle, and second parameter is incoming Sky, return value are then the size of file, to obtain the size filesize of this module file.
The client modules version number that S2022, acquisition currently update;
Since module file version number is that official is written in module text when issuing, so the version of each module file This number can directly acquire.
S2023, according to each module file size of the client, determine each module in the client currently updated Check information;
S2024, check information and the client modules currently updated according to module each in the client Version number generates new module check information list.
The present embodiment is when client carries out version updating every time, by obtaining each module file of client currently updated Size obtains the client modules version number currently updated, according to each module file size of client, determines the visitor currently updated The check information of each module in the end of family, according to the check information of module each in client and the client modules currently updated Version number generates new module check information list.The present embodiment is when each client release updates, by obtaining currently more Each module file size of new client obtains the contents such as the client modules version number currently updated and generates new module verification Information list, when ensure that each client release updates, the list of module check information is also corresponding to be updated, it is ensured that module verification Information timely updates, and improves the synchronism of client release and module check information.
Further, as shown in figure 4, the step S2023 is specifically included:
S20231, respectively using each module in the client as object module;
If S20232, the object module file size are less than preset threshold, with the whole Hash of the object module It is worth the check information as the object module;
It should be noted that can be used to the calculation of the whole cryptographic Hash of object module a variety of in the present embodiment Hash function calculates the hash functions such as multiple cryptographic Hash, such as MD5, SHA1, CRC32, at this time with the whole Hash of object module Be worth check information as the object module, can using in the whole cryptographic Hash of this multiple calculating at least one as target mould The check information of block.
If S20233, the object module file size are more than or equal to preset threshold, with the first of the object module The cryptographic Hash of the cryptographic Hash of preset length file header, the tail of file of the second preset length is believed as the verification of the object module Breath.
In the present embodiment, computing module top of file cryptographic Hash and tail portion cryptographic Hash can be preset same by the way of A kind of hash function calculating, such as one of hash functions such as above-mentioned MD5, SHA1, CRC32 hash function.
Respectively using module each in client as object module in the present embodiment, if object module file size is less than default threshold Value, then using the whole cryptographic Hash of object module as the check information of object module, if object module file size is more than or equal to Preset threshold, then with the cryptographic Hash of the first preset length file header of object module, the Kazakhstan of the tail of file of the second preset length Check information of the uncommon value as object module.According to the file size of module each in client modules in the present embodiment, provide Different module check information calculation methods, module lesser for file size in this way calculate check information to all files, Promote the precision of file security verification, module biggish for file size can be with using head and tail calculations check information While ensuring file security verification, reduce calculation amount, promotes computational efficiency.
It is understood that the mode taken in above-mentioned steps S20232 and S20233 is only a kind of in the embodiment of the present invention Implementation, the mode that other modes or various ways can also be taken in the present embodiment to combine, such as subsequent act herein The mode of example description, the specific embodiment of the present invention are:Then need judgment module file big each module file It is small, it only needs to calculate the HASH value of entire module file if module file is less than 1M, is needed if file size is greater than 1M Will to the HASH value of module file calculation document head, the HASH value of tail of file, and entire file file content HASH Value, and the HASH value for also needing to calculate multiple HASH algorithms is calculated for the HASH of file.It is implemented as follows:
(1) it then needs to open first and the module file verified is needed to obtain the handle of file, to obtain the handle of file hFile:
HFile=CreateFile (" module1 ", GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_ EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
(2) file size of the preceding 1M of file header is read, the system function for reading file is then ReadFile, specific function It is described as follows:
ReadFile(
HANDLE hFile,
LPVOID lpBuffer,
DWORD nNumberOfBytesToRead,
LPDWORD lpNumberOfBytesRead,
LPOVERLAPPED lpOverlapped);
Wherein, hFile is file handle, and lpBuffer is read-write data buffer zone, and nNumberOfBytesToWrite is How many data will be written, and lpNumberOfBytesWritten is to have been written into how many data, nNumberOfBytesToRead It is that how many data will be read, nNumberOfBytesToRead is to have read how many data, and lpOverlapped is asynchronous reading The structure write.
File content that is specific then reading 1M size.
ReadFile(hFile,buff,1M,&dwRead,NULL);
Wherein, the file handle for the front opening that hFile is then, buff then are used to store the file content of reading, 1M then table Show the file content size of reading, dwRead indicates the file content size actually read, calls after completing this function, then can incite somebody to action File content is read in buff caching.
(3) HASH function is next then called to calculate HASH result to file content.
HEADMD5HASH=Md5.Create (buff, 1M);
HASH result specific then that Md5 is calculated the file content of reading by the function of calling Md5.
(4) file pointer is then moved to tail of file, specifically then passes through calling system function SetFilePointer.
DWORD SetFilePointer(
HANDLE hFile,
LONG lDistanceToMove,
PLONG lpDistanceToMoveHigh,
DWORD dwMoveMethod
Then the offset for reading file can be moved to tail of file by this function, thus read the 1M of tail of file File size.
SetFilePointer(hFile,file_size-1M,NULL,FILE_BEGIN);
The tail of file for subtracting 1M from file total size is indicated herein, is then moved to tail portion and is only remained 1M file size Position.
Then the size of tail of file 1M is read again:
ReadFile(hFile,buff,1M,&dwRead,NULL);
To which file content read in buff caching.
(5) HASH function is next then called to calculate HASH result to file content.
HEADMD5HASH=Md5.Create (buff, 1M);
HASH result specific then that Md5 is calculated the file content of reading by the function of calling Md5.
To obtain the Md5 check results of tail of file.
And entire file content is verified in the present embodiment, then firstly the need of the content of the entire file of reading into caching.
ReadFile(hFile,buff,filesize,&dwRead,NULL);
Wherein, the file size of the entire file obtained before parameter filesize is then, then reads entire file now Content read in buff caching, and the content of entire file is next then verified using a variety of HASH algorithms.
MD5HASH=Md5.Create (buff, filesize);
To obtain the HASH result of the Md5 algorithm of the content of entire file.
CRC32HASH=Crc32.Create (buff, filesize);
To obtain the HASH result of the crc32 algorithm of the content of entire file.
SHA1HASH=sha1.Create (buff, filesize);
To obtain the HASH result of the sha1 algorithm of entire file.
After obtaining these data through the above way, then the check information that can construct a module file is similarly right The check information of same method then each available module is also used in other modules, to construct module verification letter Cease the information of list ModuleCheckList.
Further, it also needs to design the algorithm for generating a new block by a block in the embodiment of the present invention. The client of each block chain can then receive the original block that server issues, and then then can be generated according to original block It new block and is added in block chained list, is implemented as follows:
We have got the data structure of a upper block first, and next block is then according to a upper block Data generated.The name that a upper block is assumed in the present embodiment is prevblock, and the name of newly-generated block is newblock。
(1) block number of new block is calculated.
Newblock.index=prevblock.index+1;
Then the block number of new block is that current block number adds 1.
(2) timestamp of new block is calculated.
Newblock.timestamp=time ();
The timestamp of new block is then to obtain the current time.
(3) the hash value of a upper block for new block is calculated.
Newblock.previousHash=prevblock.hash;
The hash value of a upper block for new block is then the hash of the upper block obtained.
(4) data of new block are calculated.
Newblock.data=data+ModuleCheckList;
When official's client release is updated, then a new block can be generated, it then can be comprising new in new block The complete information of the module check information list ModuleCheckList of all modules of released version.
(5) the randdata value of new block is calculated.
This randdata value is then that client generates at random, to gather together enough before the hash value that just entire new block calculates Meet 0 number that server issues.
(6) the hash value of new block is calculated.
Newblock.hash=HASH (index+previousHash+timestamp+data+zero+randdata);
The hash value of new block is then to have the index field and previousHash field and timestamp word of new block Section and data field.
HASH algorithm used in it is usually SHA-256 algorithm, naturally it is also possible to other HASH algorithms are used, such as SHA-1, MD5 etc..
It is achieved that the algorithm that a new block is generated by a block through the above steps.In the embodiment of the present invention Step S203 updates client release block chain according to new module check information list, then can be according to above-mentioned generation new district The mode of block generates new block (previous block is the original block that server issues), updates and arrives client release block chain In.
In the embodiment of the present invention, generation for new block can be in the client by Web broadcast to all block chains It goes, and all clients are all the clients of a block chain, all has and generate new block, and verify the energy of new block Power, and all clients of block chain be can verify send block identity information, then the client of block chain for Then can all be gone when receiving a new block sender for verifying new block identity be official's client identity letter Breath, if not will not then be added in block chain, it is believed that this is the unique ID of equipment of a forgery.So each block needs Carry out completeness check.It is implemented as follows:
Common, in addition to original block, is then that client has had current block first for other blocks in client, Then a new block is had received, needs to carry out validity judgement to new block.It is implemented as follows:
The name for also assuming that a block is prevblock, then has received the name of a newly-generated block It is newblock.
(1) first determine whether its index is correct.
Newblock.index!=prevblock.index+1;
If the block index of new block is not the block number plus 1 of a upper block, illustrate that new block does not conform to Method, directly return block errors information.
(2) then judge the hash value of block.
Newblock.previousHash!=prevblock.hash
New area is thought if the hash value of a upper block for new block is not equal to the hash value of a upper block Block is illegal, directly return block errors information.
(3) judge the hash value of new block.
The hash value of new block is the hash result of the entire data of new block.
HASH(Newblock.index+Newblock.previousHash+Newblock.timestamp+ Newblock.data+Newblock.randdata+Newblock.zero)!=Newblock.hash;
If the hash value of the data of the entire block of new block is not equal to new block hash value, then it is assumed that new area Block is illegal, directly return block errors information.
(4) judge the identity information of client official publisher.
When needing to issue new client, then new client release block can be generated, and can in new block With the check information ModuleCheckList comprising all modules of entire client.In order to further ensure safety, official's publication The private key information of oneself can be used to encrypt to ModuleCheckList information in person, and all clients then all have official The public key information of square person, so that data be decrypted by public key, if the information decrypted be all it is correct complete, Be not messy code information, then illustrate that this information is the information of official publisher, if this information decrypts be messy code if say The official information for the method that makes a clear distinction between right and wrong.
Further, in the embodiment of the present invention, after client terminal start-up, active client version can be got from block chain This module check information list ModuleCheckList, so as to according to the module of verification in need remove read module It the file information and is compared with the module information inside ModuleCheckList, only correction verification module information matches are just said Bright client modules be it is legal, be otherwise then it is illegal, in the present embodiment with all clients module participate in verification said It is bright, it is implemented as follows:
(1) each of these module is then traversed for ModuleCheckList list.
The content size of read module file is read using the method as described in above-mentioned steps, and is judged Whether the size for the module that active client is read is in the same size with the ModuleCheckList in block chain, if different Cause then directly illustrates that client is illegal.
In order to improve verification speed, then its file size can be verified the first step to all modules first, as long as there is one File size is inconsistent, illustrates that client is illegal.After All Files size is all legal, then the file of file is verified Head cryptographic Hash and end-of-file cryptographic Hash, as long as the HASH for having a file verify it is inconsistent as long as illustrate client be it is illegal, only It is all consistent to illustrate that client is legal.After the file header and end-of-file HASH for having verified All Files, then to every The HASH of the entire file content of one module file is verified, and the result to a variety of HASH algorithms is needed to carry out school It tests.Including MD5, Crc32, Sha1, only all consistent module informations one that could illustrate to issue in this module and block chain It causes, is only a legal client.
As shown in figure 5, the present invention also provides a kind of client secure detection device, which includes:
First obtains module 501, is used for after client terminal start-up, from the local client for obtaining current goal version The first module check information;
Second obtains module 502, for obtaining the described of the target version from preset client release block chain Second module check information of client, the first module check information and the second module check information correspond to identical Client modules;
Comparison module 503, for carrying out information to the first module check information and the second module check information It compares;
Determining module 504 is used for when the first module check information and the second module check information match, really The fixed client is legal.
For the embodiment of the present invention after client terminal start-up, first obtains module 501 from the local visitor for obtaining current goal version The first module check information at family end;Second obtains module 502 from preset client release block chain, obtains target version Client the second module check information;Comparison module 503 to the first module check information and the second module check information into Row information compares;Determining module 504 determines client when the first module check information and the second module check information match It is legal to hold.The version information for saving client in the embodiment of the present invention using block chain technology, since block chain data are not easy to usurp The characteristic changed can effectively verify client side, promote the safety of client, avoid user and developer Loss.
Further, the first acquisition module 501 is specifically used for:
From the module check information list of the local client for obtaining target version, the module check information list In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list The check information of module.
Further, as shown in fig. 6, described device further includes update module 505, the update module 505 is used for:
After the client is installed, the client release block chain, the client edition local area are obtained from server The module check information of the list of module check information and each old version in block chain including the client current version List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, the update module 505 is specifically used for:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, the comparison module 503 is specifically used for:
If include the module check information of multiple clients in the first module check information, respectively to institute The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information It compares;
If all module check informations in first correction verification module are corresponding with the second module check information Module check information matching, it is determined that the first module check information and the second module check information matching.
A kind of electronic equipment is also provided in the embodiment of the present invention, refers to Fig. 7, the electronic equipment includes:
Memory 701, processor 702 and is stored in the computer that can be run on the memory and on the processor Program 703, wherein above-mentioned client secure detection side may be implemented in the processor 702 when executing the computer program 703 Method.
It should be noted that this application involves electronic equipment include but is not limited to be:Mobile terminal (mobile phone, intelligent hand Machine, PAD, laptop etc.), fixed terminal (computer).
For ease of description, only parts related to embodiments of the present invention are shown, disclosed by specific technical details, asks Referring to present invention method part.Memory 701 can be used for storing computer program 703, and above-mentioned computer program includes Software program, module and data, processor 702 execute the computer program 703 for being stored in memory 701 by running, thus Execute the various function application and data processing of electronic equipment.
In the specific implementation process, memory 701 can be used for storing software program and module, and processor 702 passes through Operation is stored in the software program and module of memory 701, thereby executing the various function application and data of electronic equipment Processing.Memory 701 can mainly include storing program area and storage data area, wherein storing program area can storage program area, Application program needed at least one function (such as game class application program, chat class application program) etc.;It storage data area can Storage uses created data (game configuration data, audio data) etc. according to electronic equipment.In addition, memory 701 can It can also include nonvolatile memory to include high-speed random access memory, a for example, at least disk memory is dodged Memory device or other volatile solid-state parts.Processor 702 is the control centre of electronic equipment, using various interfaces and The various pieces of the entire electronic equipment of connection, by run or execute the software program being stored in memory 701 and/or Module, and the data being stored in memory 701 are called, the various functions and processing data of electronic equipment are executed, thus right Electronic equipment carries out integral monitoring.Optionally, processor 702 may include one or more processing units;Preferably, processor 702 can integrate application processor, wherein the main processing operation system of application processor, user interface and application program etc..
The embodiment of the present invention also provides a kind of computer readable storage medium, wherein the computer readable storage medium can It is stored with program, which includes the part or complete for the client secure detection method recorded in above method embodiment when executing Portion's step.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before Stating embodiment, invention is explained in detail, those skilled in the art should understand that:It still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of client secure detection method, which is characterized in that the method includes:
After client terminal start-up, from the first module check information of the local client for obtaining current goal version;
From preset client release block chain, the second module verification letter of the client of the target version is obtained Breath, the first module check information and the second module check information correspond to identical client modules;
Information comparison is carried out to the first module check information and the second module check information;
If the first module check information and the second module check information matching, it is determined that the client is legal.
2. the method according to claim 1, wherein described from the local client for obtaining target version First module check information, including:
From the module check information list of the local client for obtaining target version, wrapped in the module check information list Include the check information of all modules of the client of the target version;
Wherein, the first module check information includes at least one described client modules in the module check information list Check information.
3. the method according to claim 1, wherein the method also includes:
After the client is installed, the client release block chain, the client release block chain are obtained from server In include the client current version the list of module check information and each old version module check information list;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
4. the method according to claim 1, wherein described when the client carries out version updating every time, New module check information list is generated, including:
When the client carries out version updating every time, each module file size of the client currently updated is obtained;
Obtain the client modules version number currently updated;
According to each module file size of the client, the check information of each module in the client currently updated is determined;
According to the check information of module each in the client and the client modules version number currently updated, generate New module check information list.
5. according to the method described in claim 4, it is characterized in that, described according to each module file size of the client, really The check information of each module in the client updated before settled, including:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as the mesh Mark the check information of module;
If the object module file size is more than or equal to preset threshold, with the first preset length file of the object module The cryptographic Hash of head, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
6. the method according to claim 1, wherein described to the first module check information and described second Module check information carries out information comparison, including:
If include the module check information of multiple clients in the first module check information, respectively to described the Module check information in one correction verification module is compared with corresponding module check information in the second module check information It is right;
If all module check informations in first correction verification module with corresponding mould in the second module check information Block checking information matching, it is determined that the first module check information and the second module check information matching.
7. a kind of client secure detection device, which is characterized in that described device includes:
First obtains module, is used for after client terminal start-up, from the first of the local client for obtaining current goal version Module check information;
Second obtains module, for obtaining the client of the target version from preset client release block chain The second module check information, the first module check information and the second module check information correspond to identical client Module;
Comparison module, for carrying out information comparison to the first module check information and the second module check information;
Determining module, described in determining when the first module check information and the second module check information match Client is legal.
8. device according to claim 7, which is characterized in that the first acquisition module is specifically used for:
From the module check information list of the local client for obtaining target version, wrapped in the module check information list Include the check information of all modules of the client of the target version;
Wherein, the first module check information includes at least one described client modules in the module check information list Check information.
9. device according to claim 7, which is characterized in that described device further includes update module, the update module For:
After the client is installed, the client release block chain, the client release block chain are obtained from server In include the client current version the list of module check information and each old version module check information list;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
10. a kind of electronic equipment, which is characterized in that including:Memory, processor and is stored on the memory and can be in institute State the computer program run on processor, wherein the processor may be implemented right when executing the computer program and want Seek 1 to 6 any method.
CN201810647280.3A 2018-06-22 2018-06-22 A kind of client secure detection method, device and client device Pending CN108847926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810647280.3A CN108847926A (en) 2018-06-22 2018-06-22 A kind of client secure detection method, device and client device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810647280.3A CN108847926A (en) 2018-06-22 2018-06-22 A kind of client secure detection method, device and client device

Publications (1)

Publication Number Publication Date
CN108847926A true CN108847926A (en) 2018-11-20

Family

ID=64203469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810647280.3A Pending CN108847926A (en) 2018-06-22 2018-06-22 A kind of client secure detection method, device and client device

Country Status (1)

Country Link
CN (1) CN108847926A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110548293A (en) * 2019-09-02 2019-12-10 腾讯科技(深圳)有限公司 information verification method and related device
CN110602241A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Service installation method, device, server and storage medium
CN111767539A (en) * 2020-05-15 2020-10-13 上海趣蕴网络科技有限公司 APK safety system and safety verification method
CN111787019A (en) * 2020-07-02 2020-10-16 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain
WO2021068519A1 (en) * 2019-10-12 2021-04-15 山东英信计算机技术有限公司 Software anti-cracking method, device, apparatus and medium
CN113037850A (en) * 2021-03-18 2021-06-25 中国第一汽车股份有限公司 Application program upgrading method and device, electronic equipment and storage medium
CN113561991A (en) * 2021-07-28 2021-10-29 浪潮卓数大数据产业发展有限公司 Dangerous driving behavior avoidance method, device and medium based on block chain
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897348A (en) * 2016-08-19 2017-06-27 阿里巴巴集团控股有限公司 A kind of data storage, data check, data source tracing method and equipment
CN107682328A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data verification method and client
WO2018109260A1 (en) * 2016-12-16 2018-06-21 Nokia Technologies Oy Secure document management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106897348A (en) * 2016-08-19 2017-06-27 阿里巴巴集团控股有限公司 A kind of data storage, data check, data source tracing method and equipment
WO2018109260A1 (en) * 2016-12-16 2018-06-21 Nokia Technologies Oy Secure document management
CN107682328A (en) * 2017-09-26 2018-02-09 武汉斗鱼网络科技有限公司 A kind of data verification method and client

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110548293A (en) * 2019-09-02 2019-12-10 腾讯科技(深圳)有限公司 information verification method and related device
CN110548293B (en) * 2019-09-02 2021-09-21 腾讯科技(深圳)有限公司 Information verification method and related device
CN110602241A (en) * 2019-09-20 2019-12-20 腾讯科技(深圳)有限公司 Service installation method, device, server and storage medium
WO2021068519A1 (en) * 2019-10-12 2021-04-15 山东英信计算机技术有限公司 Software anti-cracking method, device, apparatus and medium
CN111767539A (en) * 2020-05-15 2020-10-13 上海趣蕴网络科技有限公司 APK safety system and safety verification method
CN111787019A (en) * 2020-07-02 2020-10-16 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain
CN111787019B (en) * 2020-07-02 2023-04-14 深圳市亲邻科技有限公司 Information acquisition method and device based on block chain
CN114722356A (en) * 2021-01-04 2022-07-08 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on block chain
CN114722356B (en) * 2021-01-04 2024-10-11 武汉斗鱼鱼乐网络科技有限公司 Method, device, medium and equipment for protecting copyright based on blockchain
CN113037850A (en) * 2021-03-18 2021-06-25 中国第一汽车股份有限公司 Application program upgrading method and device, electronic equipment and storage medium
CN113561991A (en) * 2021-07-28 2021-10-29 浪潮卓数大数据产业发展有限公司 Dangerous driving behavior avoidance method, device and medium based on block chain
CN113561991B (en) * 2021-07-28 2023-02-17 浪潮卓数大数据产业发展有限公司 Dangerous driving behavior avoidance method, device and medium based on block chain

Similar Documents

Publication Publication Date Title
CN108847926A (en) A kind of client secure detection method, device and client device
CN109409122B (en) File storage method, electronic device and storage medium
CN110598448B (en) Method, device, equipment and storage medium for processing operation data based on block chain
FI3782058T3 (en) Decentralized document and entity verification engine
CN109543065B (en) Video active identification method combined with block chain
CN111444550A (en) Block chain-based service data verification method and device and readable storage medium
CN107135077B (en) Software protecting method and device
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
CN103530535A (en) Shell adding and removing method for Android platform application program protection
CN101073045A (en) Secure loading and storing of data in a data processing device
CN111340485B (en) Configuration method of digital certificate for alliance block chain, terminal and root certificate server
CN109978543B (en) Contract signing method and device, electronic equipment and storage medium
CN110826092A (en) File signature processing system
CN108141364A (en) Message authentication
CN111090386B (en) Cloud storage method, device, system and computer equipment
CN112131595B (en) Safe access method and device for SQLite database file
CN110830257A (en) File signature method and device, electronic equipment and readable storage medium
US20200382284A1 (en) Tracking, storage and authentication of documented intellectual property
US11343107B2 (en) System for method for secured logging of events
CN111709047A (en) Information management system and method thereof
CN112907375B (en) Data processing method, device, computer equipment and storage medium
CN106888094B (en) A kind of endorsement method and server
CN110493011B (en) Block chain-based certificate issuing management method and device
RU2408071C2 (en) Protected data loading and storage in data processing device
CN111400771A (en) Target partition checking method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181120