CN108847926A - A kind of client secure detection method, device and client device - Google Patents
A kind of client secure detection method, device and client device Download PDFInfo
- Publication number
- CN108847926A CN108847926A CN201810647280.3A CN201810647280A CN108847926A CN 108847926 A CN108847926 A CN 108847926A CN 201810647280 A CN201810647280 A CN 201810647280A CN 108847926 A CN108847926 A CN 108847926A
- Authority
- CN
- China
- Prior art keywords
- module
- client
- check information
- module check
- version
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of client secure detection method, device and electronic equipments.Present invention method includes:After client terminal start-up, from the first module check information of the local client for obtaining current goal version;From preset client release block chain, the second module check information of the client of target version is obtained;Information comparison is carried out to the first module check information and the second module check information;If the first module check information and the second module check information matching, it is determined that client is legal.Effectively client side can be verified, promote the safety of client, avoid the loss of user and developer since block chain data are not easy the characteristic distorted using the version information that block chain technology saves client in the embodiment of the present invention.
Description
Technical field
The present invention relates to client-side technology field, in particular to a kind of client secure detection method, device and client
Equipment.
Background technique
Currently, being to combine completion, common client by functional unit one by one for a client-side program
Hold developer that can carry out module division according to function, so that multi-person synergy is completed, it also can be more to the division of function
Clearly.For example, for Windows software development multiple modules can be split into complete, a module is then a dynamic link
((Dynamic Link Library, DLL) file, not only improves code sharing and the division of labor, and can be by function to library file in this way
It splits as far as possible, reduces the code degree of coupling.Therefore the composition of a software is then by an executable program (executable
Program, EXE) file and multiple dll files composition.Such as encryption-decryption algorithm function all used in software is sealed
It is attached in an independent dll file, such as by the relevant function package of all-network into an independent dll file, example
Such as journal function is encapsulated into an independent dll file.
Specifically, client-side program is written as a module file for the operation of database is independent, network operation is only
Vertical is written as a module file, is written as a module file for data ciphering and deciphering correlation function is independent, however existing
There is hacker to pass through modification client modules to complete some illegal functions.Such as hacker can pass through the module of modification client
To obtain desired data from module.Such as client-side program, for example, client by the chat record of user into
It is sent to server after row encryption, then after client-side program can encrypt the chat record of user calling encrypting module
It is sent to server, once then this computer virus infection, Virus then can be by modifying client encrypting module
Program, to obtain the chat record of all plaintexts.
Although above-mentioned software development mode is conducive to code sharing and the division of labor, reduce the code degree of coupling, but simultaneously also can band
Carry out a problem, software module is easy to be cracked by hacker, difficult to the appraisal so as to cause to software developer and user
Loss.
Summary of the invention
The embodiment of the invention provides a kind of client secure detection method, device and client devices, to avoid current
The problem of client modules are easy by hack, cause loss difficult to the appraisal, improves client secure.
In a first aspect, this application provides a kind of client secure detection method, this method includes:
After client terminal start-up, from the first module check information of the local client for obtaining current goal version;
From preset client release block chain, the second module verification of the client of the target version is obtained
Information, the first module check information and the second module check information correspond to identical client modules;
Information comparison is carried out to the first module check information and the second module check information;
If the first module check information and the second module check information matching, it is determined that the client is closed
Method.
Further, the first module check information from the local client for obtaining target version, including:
From the module check information list of the local client for obtaining target version, the module check information list
In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list
The check information of module.
Further, the method also includes:
After the client is installed, the client release block chain, the client edition local area are obtained from server
The module check information of the list of module check information and each old version in block chain including the client current version
List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, described when the client carries out version updating every time, new module check information list is generated,
Including:
When the client carries out version updating every time, it is big to obtain each module file of the client currently updated
It is small;
Obtain the client modules version number currently updated;
According to each module file size of the client, the verification letter of each module in the client currently updated is determined
Breath;
According to the check information of module each in the client and the client modules version number currently updated,
Generate new module check information list.
Further, described according to each module file size of the client, it determines in the client currently updated
The check information of each module, including:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute
State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module
The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, described that information ratio is carried out to the first module check information and the second module check information
It is right, including:
If include the module check information of multiple clients in the first module check information, respectively to institute
The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information
It compares;
If all module check informations in first correction verification module are corresponding with the second module check information
Module check information matching, it is determined that the first module check information and the second module check information matching.
Second aspect, the application provide a kind of client secure detection device, which includes:
First obtains module, is used for after client terminal start-up, from the local client for obtaining current goal version
First module check information;
Second obtains module, for obtaining the visitor of the target version from preset client release block chain
The second module check information at family end, the first module check information and the second module check information correspond to identical visitor
Family end module;
Comparison module, for carrying out information ratio to the first module check information and the second module check information
It is right;
Determining module, for determining when the first module check information and the second module check information match
The client is legal.
Further, the first acquisition module is specifically used for:
From the module check information list of the local client for obtaining target version, the module check information list
In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list
The check information of module.
Further, described device further includes update module, and the update module is used for:
After the client is installed, the client release block chain, the client edition local area are obtained from server
The module check information of the list of module check information and each old version in block chain including the client current version
List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, the update module is specifically used for:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute
State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module
The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, the comparison module is specifically used for:
If include the module check information of multiple clients in the first module check information, respectively to institute
The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information
It compares;
If all module check informations in first correction verification module are corresponding with the second module check information
Module check information matching, it is determined that the first module check information and the second module check information matching.
The third aspect, the present invention also provides a kind of electronic equipment, including:Memory, processor and is stored in the storage
On device and the computer program that can run on the processor, wherein the processor can when executing the computer program
To realize any method in first aspect.
Fourth aspect, the present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the journey
Any method in first aspect is realized when sequence is executed by processor.
The embodiment of the present invention is after client terminal start-up, from the first module school of the local client for obtaining current goal version
Test information;From preset client release block chain, the second module check information of the client of target version is obtained;To
One module check information and the second module check information carry out information comparison;If the first module check information and second module
Check information matching, it is determined that client is legal.Believed in the embodiment of the present invention using the version that block chain technology saves client
Breath, since block chain data are not easy the characteristic distorted, can effectively verify client side, promote client
Safety avoids the loss of user and developer.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, institute in being described below to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is one embodiment schematic diagram of client secure detection method in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of client secure detection method in the embodiment of the present invention;
Fig. 3 is one embodiment schematic diagram of step of embodiment of the present invention S202;
Fig. 4 is one embodiment schematic diagram of step S2023 in the embodiment of the present invention;
Fig. 5 is one embodiment schematic diagram of client secure detection device in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of client secure detection device in the embodiment of the present invention;
Fig. 7 is one embodiment schematic diagram of electronic equipment in the embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work
It encloses.
Description and claims of this specification and the (if present)s such as term " first " in above-mentioned attached drawing, " second "
It is to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that the number used in this way
According to being interchangeable under appropriate circumstances, so as to the embodiments described herein can in addition to the content for illustrating or describing herein with
Outer sequence is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover non-exclusive packet
Contain, for example, what the process, method, system, product or equipment for containing a series of steps or units were not necessarily limited to be clearly listed
Those step or units, but may include be not clearly listed or it is intrinsic for these process, methods, product or equipment
Other step or units.
A kind of client secure detection method is applied to client secure detection device, the device position in the embodiment of the present invention
In electronic equipment, which can be the electronic equipments such as mobile phone, tablet computer or PC, be also possible to future
The electronic equipment etc. of appearance.
Referring to Fig. 1, a kind of client secure detection method one embodiment includes in the embodiment of the present invention:
S101, after client terminal start-up, from the first module check information of the local client for obtaining current goal version;
Specifically, in the electronic device, which corresponds to a client release, i.e., for client installation in the present embodiment
Target version, such as V2.1 are locally preserved all modules of the client of the target version in electronic equipment, while also being saved
There is the first module check information, which can be the check information of one module of client, be also possible to
The check information of multiple modules.
S102, from preset client release block chain, obtain the client of target version the second module verification letter
Breath;
Specifically, the first module check information and the second module check information correspond to identical client mould
Block, for example, active client version is V2.1, the first module check information is the check information of A module in client, the second mould
Block checking information is the check information of corresponding A module in V2.1 version client block in client release block chain, similarly
When in the first module check information including the check information of multiple modules, for example, A module and B module, the second module verification letter
It also include the check information of corresponding A module and B module in breath.
It include the client of client current version and each old version in the present embodiment, in client release block chain
Block information, each client release information corresponds to a block in client release block chain, in client terminal start-up, from clothes
Business device, which obtains the client release block chain or local maintenance, a client release block chain, if there is update, directly
It is updated from server, it is subsequent directly in local use.
S103, information comparison is carried out to the first module check information and the second module check information;
In the present embodiment, if include the module check information of multiple client in the first module check information, distinguish
To the module check information in first correction verification module, with corresponding module check information in the second module check information
It is compared;Such as the A module and B module illustrated in above-mentioned steps S102, at this time respectively to the A module in the first correction verification module
Corresponding A module check information is compared in check information and the second module check information, to the B mould in the first correction verification module
Corresponding B module check information is compared in block checking information and the second module check information.When the first module check information
In only one client modules check information when, then only need the comparison of a module check information.
If S104, the first module check information and the matching of the second module check information, it is determined that client is legal.
Specifically, if when only one client modules check information of the first module check information, the verification of the first module
Information and the matching of the second module check information, then it is legal to directly determine client.
If include the module check information of multiple client in the first module check information, in only the first correction verification module
All module check informations with module check information corresponding in the second module check information match, just determination the first module
Check information and the second module check information matching.
The embodiment of the present invention is after client terminal start-up, from the first module school of the local client for obtaining current goal version
Test information;From preset client release block chain, the second module check information of the client of target version is obtained;To
One module check information and the second module check information carry out information comparison;If the first module check information and second module
Check information matching, it is determined that client is legal.Believed in the embodiment of the present invention using the version that block chain technology saves client
Breath, since block chain data are not easy the characteristic distorted, can effectively verify client side, promote client
Safety avoids the loss of user and developer.
For more rapidly and more accurate verification client modules, in the present embodiment, in client installation directory file
A module check information list has been separately configured, for official publication each client, specific number of modules, often
The title of a module, the version number of each module, the file size of each module, the module contents of each module are fixed
Constant, it then include it simultaneously for each module then can include then all modules in correction verification module list information
The title of module, the version number of module, the file size of module, the cryptographic Hash of module (may include that one or more Hash are calculated
The cryptographic Hash of method), after client is installed on an electronic device, that is, it has been locally generated each module and the module school of client
Test information list.
Specifically, the first module check information can be client described at least one of the module check information list
The check information of end module, the first module check information from the local client for obtaining target version, including:From
The module check information list of the client of target version is locally obtained, includes described in the module check information list
The check information of all modules of the client of target version.
Client (such as client of identical platform, such as struggle against fish client) in the present embodiment, in all setting ranges
It is all a client of block chain, thus all functional characteristics with block chain, including generating new block, including storage
All blocks have the function of distributed account book, including verifying to new block, including take out from distributed account book
The module information of publication, whether the identity including verifying publisher is official's publication etc..Meanwhile each client also has to working as
All modules of preceding client carry out the function of acquisition of information and verification, to prevent from having infected the client-side program fortune of virus
Row, prevents information to be stolen or distort.
In the embodiment of the present invention, original block is generated by server, when official issues the version of client each time, all
The block of a corresponding version can be generated, and is published in the client release block chain, each client release is in visitor
Family end version block chain corresponds to a block, includes the preset data of client release in the block, is to pass through in the present embodiment
The module check information list of each client release is set within a block, will include each version in the module check information list
Each module file title in this, the cryptographic Hash of the file size of each module and each module.
The concrete mode of module check information list configuration module check information is exemplified below:
ModuleCheckList:{
Module1:
FileSize:0xa2465d
Version:1.2.0
MD5HASH:0x2567ade9e236a145
CRC32HASH:0xa25ac3d6
SHA1HASH:0xa25ecae63aebca256c9536edab2d5214
HEADMD5HASH:0xaab25639741defa5
TAILMD5HASH:0x35a5d2e3a6b2a123
}
Wherein, ModuleCheckList is the list of module check information, and Module1 is then the file name of module 1, table
Show that the check information that module 1 is described below, FileSize are then the file size byte numbers of module, Version is then mould
The version number of block 1, MD5HASH be then the cryptographic Hash that the HASH algorithm of the MD5 of this entire file of module 1 is calculated as a result,
CRC32HASH be then the cryptographic Hash that the HASH algorithm of the CRC32 of this entire file of module 1 is calculated as a result, SHA1HASH then
It is the cryptographic Hash that is calculated of HASH algorithm of the SHA1 of the entire file of this module as a result, HEADMD5HASH is then this module text
The cryptographic Hash of the MD5 of the content of the file header 1M byte-sized of part is as a result, TAILMD5HASH is then the end-of-file of this module file
The cryptographic Hash result of the MD5 of the content of 1M byte-sized.
In aforesaid way, the check information configuration of module 1 in module check information list is only described, likewise, if mould
Further include other modules in block checking information list, then same configuration is also taken for other modules Module2, Module3
The mode of information is configured, so that finally can then believe comprising the verification of all modules of client in module check information list
Breath.
A common block chain must include some necessary data, so that one can verify block chain itself
Legitimacy, another is but also it is not easy to forge.Client release block chain data structure in the embodiment of the present invention then according to
Rely in the module check information list for being herein each client release.So in the block data knot of client release block chain
The information of module check information list is contained in structure, the data structure includes the Hash of the block number of block, previous block
Value, current time, the number for calculating front 0 in new block cryptographic Hash, random data, the cryptographic Hash of current block and block function
It can data;The block performance data includes the information of active client Version module check list, such as above-mentioned
ModuleCheckList is implemented as follows:
Struct BlockData{
Int64index;
String previousHash;
Int64timestamp;
String data;
String zero;
String randdata;
String hash;
}
Wherein, index is used to indicate the block number of block, is usually incremented by since 0;PreviousHash indicates previous area
The hash value (cryptographic Hash) of block;Timestamp indicates current time stamp;Zero indicates to calculate front 0 in the hash value of new block
A data;Randdata then indicates random data, for being added in new block, so that its hash value calculated meets
0 number that server issues;Hash then indicates the hash value of the content of this current block;Data then indicates some data
Splice (i.e. above-mentioned block performance data), the content of this data field is then according to set by the function of completing required for block
Meter, is directed in the embodiment of the present invention, block performance data may include module check information list ModuleCheckList
Complete information etc., after the design for having this block chain data structure, after receiving other client devices newly generated block
Or it when itself starting client, then can be verified by the data to the inside.
As shown in Fig. 2, in some embodiment of the invention, it, all can be to client sheet when updating client release every time
The client release block chain on ground is updated, specifically, i.e. the method also includes:
S201, after the client is installed, obtain the client release block chain from server;
Wherein, in the client release block chain including the client current version the list of module check information and
The module check information list of each old version.
S202, when client carries out version updating every time, generate new module check information list;
S203, according to new module check information list, update client release block chain.
The present embodiment is after installing the client, by obtaining the client release block chain from server, in visitor
When family end carries out version updating every time, new module check information list is generated, according to new module check information list, is updated
Client release block chain, ensure that timely updating for client release block chain, and it is right in previous embodiment effectively to ensure
Client side checking procedure promotes the safety of client.
Further, as shown in figure 3, the step S202 is specifically included:
S2021, when the client carries out version updating every time, obtain each module text of the client that currently updates
Part size;
In the present embodiment, the mode for obtaining each module file size of the client currently updated is specific as follows:
(1) calling system function CreateFile first opens module file.
HANDLE CreateFile(
LPCTSTR,lpFileName,
DWORD dwDesiredAccess,
DWORD dwShareMode,
LPSECURITY_ATTRIBUTES lpSecurityAttributes,
DWORD dwCreationDisposition,
DWORD dwFlagAndAttributes,
HANDLE hTemplateFile;
Wherein crucial parameter is then the module file title that lpFileName needs to open, and dwDesiredAccess is then
Incoming read module file GENERIC_READ, to obtain the handle of module file:
HFile=CreateFile (" module1 ", GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_
EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
(2) then calling system function GetFileSize obtains the size of file, specific as follows:
Int filesize=GetFileSize (hFile, NULL);
Wherein, first parameter of system function GetFileSize is then incoming file handle, and second parameter is incoming
Sky, return value are then the size of file, to obtain the size filesize of this module file.
The client modules version number that S2022, acquisition currently update;
Since module file version number is that official is written in module text when issuing, so the version of each module file
This number can directly acquire.
S2023, according to each module file size of the client, determine each module in the client currently updated
Check information;
S2024, check information and the client modules currently updated according to module each in the client
Version number generates new module check information list.
The present embodiment is when client carries out version updating every time, by obtaining each module file of client currently updated
Size obtains the client modules version number currently updated, according to each module file size of client, determines the visitor currently updated
The check information of each module in the end of family, according to the check information of module each in client and the client modules currently updated
Version number generates new module check information list.The present embodiment is when each client release updates, by obtaining currently more
Each module file size of new client obtains the contents such as the client modules version number currently updated and generates new module verification
Information list, when ensure that each client release updates, the list of module check information is also corresponding to be updated, it is ensured that module verification
Information timely updates, and improves the synchronism of client release and module check information.
Further, as shown in figure 4, the step S2023 is specifically included:
S20231, respectively using each module in the client as object module;
If S20232, the object module file size are less than preset threshold, with the whole Hash of the object module
It is worth the check information as the object module;
It should be noted that can be used to the calculation of the whole cryptographic Hash of object module a variety of in the present embodiment
Hash function calculates the hash functions such as multiple cryptographic Hash, such as MD5, SHA1, CRC32, at this time with the whole Hash of object module
Be worth check information as the object module, can using in the whole cryptographic Hash of this multiple calculating at least one as target mould
The check information of block.
If S20233, the object module file size are more than or equal to preset threshold, with the first of the object module
The cryptographic Hash of the cryptographic Hash of preset length file header, the tail of file of the second preset length is believed as the verification of the object module
Breath.
In the present embodiment, computing module top of file cryptographic Hash and tail portion cryptographic Hash can be preset same by the way of
A kind of hash function calculating, such as one of hash functions such as above-mentioned MD5, SHA1, CRC32 hash function.
Respectively using module each in client as object module in the present embodiment, if object module file size is less than default threshold
Value, then using the whole cryptographic Hash of object module as the check information of object module, if object module file size is more than or equal to
Preset threshold, then with the cryptographic Hash of the first preset length file header of object module, the Kazakhstan of the tail of file of the second preset length
Check information of the uncommon value as object module.According to the file size of module each in client modules in the present embodiment, provide
Different module check information calculation methods, module lesser for file size in this way calculate check information to all files,
Promote the precision of file security verification, module biggish for file size can be with using head and tail calculations check information
While ensuring file security verification, reduce calculation amount, promotes computational efficiency.
It is understood that the mode taken in above-mentioned steps S20232 and S20233 is only a kind of in the embodiment of the present invention
Implementation, the mode that other modes or various ways can also be taken in the present embodiment to combine, such as subsequent act herein
The mode of example description, the specific embodiment of the present invention are:Then need judgment module file big each module file
It is small, it only needs to calculate the HASH value of entire module file if module file is less than 1M, is needed if file size is greater than 1M
Will to the HASH value of module file calculation document head, the HASH value of tail of file, and entire file file content HASH
Value, and the HASH value for also needing to calculate multiple HASH algorithms is calculated for the HASH of file.It is implemented as follows:
(1) it then needs to open first and the module file verified is needed to obtain the handle of file, to obtain the handle of file
hFile:
HFile=CreateFile (" module1 ", GENERIC_READ, FILE_SHARE_READ, NULL, OPEN_
EXISTING,FILE_ATTRIBUTE_NORMAL,NULL);
(2) file size of the preceding 1M of file header is read, the system function for reading file is then ReadFile, specific function
It is described as follows:
ReadFile(
HANDLE hFile,
LPVOID lpBuffer,
DWORD nNumberOfBytesToRead,
LPDWORD lpNumberOfBytesRead,
LPOVERLAPPED lpOverlapped);
Wherein, hFile is file handle, and lpBuffer is read-write data buffer zone, and nNumberOfBytesToWrite is
How many data will be written, and lpNumberOfBytesWritten is to have been written into how many data, nNumberOfBytesToRead
It is that how many data will be read, nNumberOfBytesToRead is to have read how many data, and lpOverlapped is asynchronous reading
The structure write.
File content that is specific then reading 1M size.
ReadFile(hFile,buff,1M,&dwRead,NULL);
Wherein, the file handle for the front opening that hFile is then, buff then are used to store the file content of reading, 1M then table
Show the file content size of reading, dwRead indicates the file content size actually read, calls after completing this function, then can incite somebody to action
File content is read in buff caching.
(3) HASH function is next then called to calculate HASH result to file content.
HEADMD5HASH=Md5.Create (buff, 1M);
HASH result specific then that Md5 is calculated the file content of reading by the function of calling Md5.
(4) file pointer is then moved to tail of file, specifically then passes through calling system function SetFilePointer.
DWORD SetFilePointer(
HANDLE hFile,
LONG lDistanceToMove,
PLONG lpDistanceToMoveHigh,
DWORD dwMoveMethod
Then the offset for reading file can be moved to tail of file by this function, thus read the 1M of tail of file
File size.
SetFilePointer(hFile,file_size-1M,NULL,FILE_BEGIN);
The tail of file for subtracting 1M from file total size is indicated herein, is then moved to tail portion and is only remained 1M file size
Position.
Then the size of tail of file 1M is read again:
ReadFile(hFile,buff,1M,&dwRead,NULL);
To which file content read in buff caching.
(5) HASH function is next then called to calculate HASH result to file content.
HEADMD5HASH=Md5.Create (buff, 1M);
HASH result specific then that Md5 is calculated the file content of reading by the function of calling Md5.
To obtain the Md5 check results of tail of file.
And entire file content is verified in the present embodiment, then firstly the need of the content of the entire file of reading into caching.
ReadFile(hFile,buff,filesize,&dwRead,NULL);
Wherein, the file size of the entire file obtained before parameter filesize is then, then reads entire file now
Content read in buff caching, and the content of entire file is next then verified using a variety of HASH algorithms.
MD5HASH=Md5.Create (buff, filesize);
To obtain the HASH result of the Md5 algorithm of the content of entire file.
CRC32HASH=Crc32.Create (buff, filesize);
To obtain the HASH result of the crc32 algorithm of the content of entire file.
SHA1HASH=sha1.Create (buff, filesize);
To obtain the HASH result of the sha1 algorithm of entire file.
After obtaining these data through the above way, then the check information that can construct a module file is similarly right
The check information of same method then each available module is also used in other modules, to construct module verification letter
Cease the information of list ModuleCheckList.
Further, it also needs to design the algorithm for generating a new block by a block in the embodiment of the present invention.
The client of each block chain can then receive the original block that server issues, and then then can be generated according to original block
It new block and is added in block chained list, is implemented as follows:
We have got the data structure of a upper block first, and next block is then according to a upper block
Data generated.The name that a upper block is assumed in the present embodiment is prevblock, and the name of newly-generated block is
newblock。
(1) block number of new block is calculated.
Newblock.index=prevblock.index+1;
Then the block number of new block is that current block number adds 1.
(2) timestamp of new block is calculated.
Newblock.timestamp=time ();
The timestamp of new block is then to obtain the current time.
(3) the hash value of a upper block for new block is calculated.
Newblock.previousHash=prevblock.hash;
The hash value of a upper block for new block is then the hash of the upper block obtained.
(4) data of new block are calculated.
Newblock.data=data+ModuleCheckList;
When official's client release is updated, then a new block can be generated, it then can be comprising new in new block
The complete information of the module check information list ModuleCheckList of all modules of released version.
(5) the randdata value of new block is calculated.
This randdata value is then that client generates at random, to gather together enough before the hash value that just entire new block calculates
Meet 0 number that server issues.
(6) the hash value of new block is calculated.
Newblock.hash=HASH (index+previousHash+timestamp+data+zero+randdata);
The hash value of new block is then to have the index field and previousHash field and timestamp word of new block
Section and data field.
HASH algorithm used in it is usually SHA-256 algorithm, naturally it is also possible to other HASH algorithms are used, such as
SHA-1, MD5 etc..
It is achieved that the algorithm that a new block is generated by a block through the above steps.In the embodiment of the present invention
Step S203 updates client release block chain according to new module check information list, then can be according to above-mentioned generation new district
The mode of block generates new block (previous block is the original block that server issues), updates and arrives client release block chain
In.
In the embodiment of the present invention, generation for new block can be in the client by Web broadcast to all block chains
It goes, and all clients are all the clients of a block chain, all has and generate new block, and verify the energy of new block
Power, and all clients of block chain be can verify send block identity information, then the client of block chain for
Then can all be gone when receiving a new block sender for verifying new block identity be official's client identity letter
Breath, if not will not then be added in block chain, it is believed that this is the unique ID of equipment of a forgery.So each block needs
Carry out completeness check.It is implemented as follows:
Common, in addition to original block, is then that client has had current block first for other blocks in client,
Then a new block is had received, needs to carry out validity judgement to new block.It is implemented as follows:
The name for also assuming that a block is prevblock, then has received the name of a newly-generated block
It is newblock.
(1) first determine whether its index is correct.
Newblock.index!=prevblock.index+1;
If the block index of new block is not the block number plus 1 of a upper block, illustrate that new block does not conform to
Method, directly return block errors information.
(2) then judge the hash value of block.
Newblock.previousHash!=prevblock.hash
New area is thought if the hash value of a upper block for new block is not equal to the hash value of a upper block
Block is illegal, directly return block errors information.
(3) judge the hash value of new block.
The hash value of new block is the hash result of the entire data of new block.
HASH(Newblock.index+Newblock.previousHash+Newblock.timestamp+
Newblock.data+Newblock.randdata+Newblock.zero)!=Newblock.hash;
If the hash value of the data of the entire block of new block is not equal to new block hash value, then it is assumed that new area
Block is illegal, directly return block errors information.
(4) judge the identity information of client official publisher.
When needing to issue new client, then new client release block can be generated, and can in new block
With the check information ModuleCheckList comprising all modules of entire client.In order to further ensure safety, official's publication
The private key information of oneself can be used to encrypt to ModuleCheckList information in person, and all clients then all have official
The public key information of square person, so that data be decrypted by public key, if the information decrypted be all it is correct complete,
Be not messy code information, then illustrate that this information is the information of official publisher, if this information decrypts be messy code if say
The official information for the method that makes a clear distinction between right and wrong.
Further, in the embodiment of the present invention, after client terminal start-up, active client version can be got from block chain
This module check information list ModuleCheckList, so as to according to the module of verification in need remove read module
It the file information and is compared with the module information inside ModuleCheckList, only correction verification module information matches are just said
Bright client modules be it is legal, be otherwise then it is illegal, in the present embodiment with all clients module participate in verification said
It is bright, it is implemented as follows:
(1) each of these module is then traversed for ModuleCheckList list.
The content size of read module file is read using the method as described in above-mentioned steps, and is judged
Whether the size for the module that active client is read is in the same size with the ModuleCheckList in block chain, if different
Cause then directly illustrates that client is illegal.
In order to improve verification speed, then its file size can be verified the first step to all modules first, as long as there is one
File size is inconsistent, illustrates that client is illegal.After All Files size is all legal, then the file of file is verified
Head cryptographic Hash and end-of-file cryptographic Hash, as long as the HASH for having a file verify it is inconsistent as long as illustrate client be it is illegal, only
It is all consistent to illustrate that client is legal.After the file header and end-of-file HASH for having verified All Files, then to every
The HASH of the entire file content of one module file is verified, and the result to a variety of HASH algorithms is needed to carry out school
It tests.Including MD5, Crc32, Sha1, only all consistent module informations one that could illustrate to issue in this module and block chain
It causes, is only a legal client.
As shown in figure 5, the present invention also provides a kind of client secure detection device, which includes:
First obtains module 501, is used for after client terminal start-up, from the local client for obtaining current goal version
The first module check information;
Second obtains module 502, for obtaining the described of the target version from preset client release block chain
Second module check information of client, the first module check information and the second module check information correspond to identical
Client modules;
Comparison module 503, for carrying out information to the first module check information and the second module check information
It compares;
Determining module 504 is used for when the first module check information and the second module check information match, really
The fixed client is legal.
For the embodiment of the present invention after client terminal start-up, first obtains module 501 from the local visitor for obtaining current goal version
The first module check information at family end;Second obtains module 502 from preset client release block chain, obtains target version
Client the second module check information;Comparison module 503 to the first module check information and the second module check information into
Row information compares;Determining module 504 determines client when the first module check information and the second module check information match
It is legal to hold.The version information for saving client in the embodiment of the present invention using block chain technology, since block chain data are not easy to usurp
The characteristic changed can effectively verify client side, promote the safety of client, avoid user and developer
Loss.
Further, the first acquisition module 501 is specifically used for:
From the module check information list of the local client for obtaining target version, the module check information list
In include the target version all modules of the client check information;
Wherein, the first module check information includes at least one described client in the module check information list
The check information of module.
Further, as shown in fig. 6, described device further includes update module 505, the update module 505 is used for:
After the client is installed, the client release block chain, the client edition local area are obtained from server
The module check information of the list of module check information and each old version in block chain including the client current version
List;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
Further, the update module 505 is specifically used for:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as institute
State the check information of object module;
If the object module file size is more than or equal to preset threshold, with the first preset length of the object module
The cryptographic Hash of file header, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
Further, the comparison module 503 is specifically used for:
If include the module check information of multiple clients in the first module check information, respectively to institute
The module check information in the first correction verification module is stated, is carried out with module check information corresponding in the second module check information
It compares;
If all module check informations in first correction verification module are corresponding with the second module check information
Module check information matching, it is determined that the first module check information and the second module check information matching.
A kind of electronic equipment is also provided in the embodiment of the present invention, refers to Fig. 7, the electronic equipment includes:
Memory 701, processor 702 and is stored in the computer that can be run on the memory and on the processor
Program 703, wherein above-mentioned client secure detection side may be implemented in the processor 702 when executing the computer program 703
Method.
It should be noted that this application involves electronic equipment include but is not limited to be:Mobile terminal (mobile phone, intelligent hand
Machine, PAD, laptop etc.), fixed terminal (computer).
For ease of description, only parts related to embodiments of the present invention are shown, disclosed by specific technical details, asks
Referring to present invention method part.Memory 701 can be used for storing computer program 703, and above-mentioned computer program includes
Software program, module and data, processor 702 execute the computer program 703 for being stored in memory 701 by running, thus
Execute the various function application and data processing of electronic equipment.
In the specific implementation process, memory 701 can be used for storing software program and module, and processor 702 passes through
Operation is stored in the software program and module of memory 701, thereby executing the various function application and data of electronic equipment
Processing.Memory 701 can mainly include storing program area and storage data area, wherein storing program area can storage program area,
Application program needed at least one function (such as game class application program, chat class application program) etc.;It storage data area can
Storage uses created data (game configuration data, audio data) etc. according to electronic equipment.In addition, memory 701 can
It can also include nonvolatile memory to include high-speed random access memory, a for example, at least disk memory is dodged
Memory device or other volatile solid-state parts.Processor 702 is the control centre of electronic equipment, using various interfaces and
The various pieces of the entire electronic equipment of connection, by run or execute the software program being stored in memory 701 and/or
Module, and the data being stored in memory 701 are called, the various functions and processing data of electronic equipment are executed, thus right
Electronic equipment carries out integral monitoring.Optionally, processor 702 may include one or more processing units;Preferably, processor
702 can integrate application processor, wherein the main processing operation system of application processor, user interface and application program etc..
The embodiment of the present invention also provides a kind of computer readable storage medium, wherein the computer readable storage medium can
It is stored with program, which includes the part or complete for the client secure detection method recorded in above method embodiment when executing
Portion's step.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention
Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that:It still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of client secure detection method, which is characterized in that the method includes:
After client terminal start-up, from the first module check information of the local client for obtaining current goal version;
From preset client release block chain, the second module verification letter of the client of the target version is obtained
Breath, the first module check information and the second module check information correspond to identical client modules;
Information comparison is carried out to the first module check information and the second module check information;
If the first module check information and the second module check information matching, it is determined that the client is legal.
2. the method according to claim 1, wherein described from the local client for obtaining target version
First module check information, including:
From the module check information list of the local client for obtaining target version, wrapped in the module check information list
Include the check information of all modules of the client of the target version;
Wherein, the first module check information includes at least one described client modules in the module check information list
Check information.
3. the method according to claim 1, wherein the method also includes:
After the client is installed, the client release block chain, the client release block chain are obtained from server
In include the client current version the list of module check information and each old version module check information list;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
4. the method according to claim 1, wherein described when the client carries out version updating every time,
New module check information list is generated, including:
When the client carries out version updating every time, each module file size of the client currently updated is obtained;
Obtain the client modules version number currently updated;
According to each module file size of the client, the check information of each module in the client currently updated is determined;
According to the check information of module each in the client and the client modules version number currently updated, generate
New module check information list.
5. according to the method described in claim 4, it is characterized in that, described according to each module file size of the client, really
The check information of each module in the client updated before settled, including:
Respectively using each module in the client as object module;
If the object module file size is less than preset threshold, using the whole cryptographic Hash of the object module as the mesh
Mark the check information of module;
If the object module file size is more than or equal to preset threshold, with the first preset length file of the object module
The cryptographic Hash of head, check information of the cryptographic Hash of the tail of file of the second preset length as the object module.
6. the method according to claim 1, wherein described to the first module check information and described second
Module check information carries out information comparison, including:
If include the module check information of multiple clients in the first module check information, respectively to described the
Module check information in one correction verification module is compared with corresponding module check information in the second module check information
It is right;
If all module check informations in first correction verification module with corresponding mould in the second module check information
Block checking information matching, it is determined that the first module check information and the second module check information matching.
7. a kind of client secure detection device, which is characterized in that described device includes:
First obtains module, is used for after client terminal start-up, from the first of the local client for obtaining current goal version
Module check information;
Second obtains module, for obtaining the client of the target version from preset client release block chain
The second module check information, the first module check information and the second module check information correspond to identical client
Module;
Comparison module, for carrying out information comparison to the first module check information and the second module check information;
Determining module, described in determining when the first module check information and the second module check information match
Client is legal.
8. device according to claim 7, which is characterized in that the first acquisition module is specifically used for:
From the module check information list of the local client for obtaining target version, wrapped in the module check information list
Include the check information of all modules of the client of the target version;
Wherein, the first module check information includes at least one described client modules in the module check information list
Check information.
9. device according to claim 7, which is characterized in that described device further includes update module, the update module
For:
After the client is installed, the client release block chain, the client release block chain are obtained from server
In include the client current version the list of module check information and each old version module check information list;
When the client carries out version updating every time, new module check information list is generated;
According to the new module check information list, the client release block chain is updated.
10. a kind of electronic equipment, which is characterized in that including:Memory, processor and is stored on the memory and can be in institute
State the computer program run on processor, wherein the processor may be implemented right when executing the computer program and want
Seek 1 to 6 any method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810647280.3A CN108847926A (en) | 2018-06-22 | 2018-06-22 | A kind of client secure detection method, device and client device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810647280.3A CN108847926A (en) | 2018-06-22 | 2018-06-22 | A kind of client secure detection method, device and client device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108847926A true CN108847926A (en) | 2018-11-20 |
Family
ID=64203469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810647280.3A Pending CN108847926A (en) | 2018-06-22 | 2018-06-22 | A kind of client secure detection method, device and client device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108847926A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110548293A (en) * | 2019-09-02 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information verification method and related device |
CN110602241A (en) * | 2019-09-20 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Service installation method, device, server and storage medium |
CN111767539A (en) * | 2020-05-15 | 2020-10-13 | 上海趣蕴网络科技有限公司 | APK safety system and safety verification method |
CN111787019A (en) * | 2020-07-02 | 2020-10-16 | 深圳市亲邻科技有限公司 | Information acquisition method and device based on block chain |
WO2021068519A1 (en) * | 2019-10-12 | 2021-04-15 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, apparatus and medium |
CN113037850A (en) * | 2021-03-18 | 2021-06-25 | 中国第一汽车股份有限公司 | Application program upgrading method and device, electronic equipment and storage medium |
CN113561991A (en) * | 2021-07-28 | 2021-10-29 | 浪潮卓数大数据产业发展有限公司 | Dangerous driving behavior avoidance method, device and medium based on block chain |
CN114722356A (en) * | 2021-01-04 | 2022-07-08 | 武汉斗鱼鱼乐网络科技有限公司 | Method, device, medium and equipment for protecting copyright based on block chain |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897348A (en) * | 2016-08-19 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of data storage, data check, data source tracing method and equipment |
CN107682328A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and client |
WO2018109260A1 (en) * | 2016-12-16 | 2018-06-21 | Nokia Technologies Oy | Secure document management |
-
2018
- 2018-06-22 CN CN201810647280.3A patent/CN108847926A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106897348A (en) * | 2016-08-19 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of data storage, data check, data source tracing method and equipment |
WO2018109260A1 (en) * | 2016-12-16 | 2018-06-21 | Nokia Technologies Oy | Secure document management |
CN107682328A (en) * | 2017-09-26 | 2018-02-09 | 武汉斗鱼网络科技有限公司 | A kind of data verification method and client |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110548293A (en) * | 2019-09-02 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information verification method and related device |
CN110548293B (en) * | 2019-09-02 | 2021-09-21 | 腾讯科技(深圳)有限公司 | Information verification method and related device |
CN110602241A (en) * | 2019-09-20 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Service installation method, device, server and storage medium |
WO2021068519A1 (en) * | 2019-10-12 | 2021-04-15 | 山东英信计算机技术有限公司 | Software anti-cracking method, device, apparatus and medium |
CN111767539A (en) * | 2020-05-15 | 2020-10-13 | 上海趣蕴网络科技有限公司 | APK safety system and safety verification method |
CN111787019A (en) * | 2020-07-02 | 2020-10-16 | 深圳市亲邻科技有限公司 | Information acquisition method and device based on block chain |
CN111787019B (en) * | 2020-07-02 | 2023-04-14 | 深圳市亲邻科技有限公司 | Information acquisition method and device based on block chain |
CN114722356A (en) * | 2021-01-04 | 2022-07-08 | 武汉斗鱼鱼乐网络科技有限公司 | Method, device, medium and equipment for protecting copyright based on block chain |
CN114722356B (en) * | 2021-01-04 | 2024-10-11 | 武汉斗鱼鱼乐网络科技有限公司 | Method, device, medium and equipment for protecting copyright based on blockchain |
CN113037850A (en) * | 2021-03-18 | 2021-06-25 | 中国第一汽车股份有限公司 | Application program upgrading method and device, electronic equipment and storage medium |
CN113561991A (en) * | 2021-07-28 | 2021-10-29 | 浪潮卓数大数据产业发展有限公司 | Dangerous driving behavior avoidance method, device and medium based on block chain |
CN113561991B (en) * | 2021-07-28 | 2023-02-17 | 浪潮卓数大数据产业发展有限公司 | Dangerous driving behavior avoidance method, device and medium based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108847926A (en) | A kind of client secure detection method, device and client device | |
CN109409122B (en) | File storage method, electronic device and storage medium | |
CN110598448B (en) | Method, device, equipment and storage medium for processing operation data based on block chain | |
FI3782058T3 (en) | Decentralized document and entity verification engine | |
CN109543065B (en) | Video active identification method combined with block chain | |
CN111444550A (en) | Block chain-based service data verification method and device and readable storage medium | |
CN107135077B (en) | Software protecting method and device | |
CN109472164A (en) | The verification method and its network and electronic equipment of contract dataset | |
CN103530535A (en) | Shell adding and removing method for Android platform application program protection | |
CN101073045A (en) | Secure loading and storing of data in a data processing device | |
CN111340485B (en) | Configuration method of digital certificate for alliance block chain, terminal and root certificate server | |
CN109978543B (en) | Contract signing method and device, electronic equipment and storage medium | |
CN110826092A (en) | File signature processing system | |
CN108141364A (en) | Message authentication | |
CN111090386B (en) | Cloud storage method, device, system and computer equipment | |
CN112131595B (en) | Safe access method and device for SQLite database file | |
CN110830257A (en) | File signature method and device, electronic equipment and readable storage medium | |
US20200382284A1 (en) | Tracking, storage and authentication of documented intellectual property | |
US11343107B2 (en) | System for method for secured logging of events | |
CN111709047A (en) | Information management system and method thereof | |
CN112907375B (en) | Data processing method, device, computer equipment and storage medium | |
CN106888094B (en) | A kind of endorsement method and server | |
CN110493011B (en) | Block chain-based certificate issuing management method and device | |
RU2408071C2 (en) | Protected data loading and storage in data processing device | |
CN111400771A (en) | Target partition checking method and device, storage medium and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181120 |