CN109086063A - Oftware updating method, file encrypting method, device and storage medium - Google Patents
Oftware updating method, file encrypting method, device and storage medium Download PDFInfo
- Publication number
- CN109086063A CN109086063A CN201810845502.2A CN201810845502A CN109086063A CN 109086063 A CN109086063 A CN 109086063A CN 201810845502 A CN201810845502 A CN 201810845502A CN 109086063 A CN109086063 A CN 109086063A
- Authority
- CN
- China
- Prior art keywords
- encryption
- software installation
- software
- installation kit
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of Oftware updating method, file encrypting method, device and storage medium, wherein, the Oftware updating method is decrypted the first encryption software installation kit by using multiple groups decruption key, obtain software installation packet, further the software data in software installation packet is encrypted, obtain the second encryption software installation kit, second encryption software installation kit is sent to third-party platform, so that user equipment, which downloads the second encryption software installation kit by third-party platform, carries out software upgrading.It is decrypted by using multiple groups decruption key, the fairness effectively participated in many ways to the first encryption software installation kit identifies.In addition, third-party platform storage encryption software installation kit further improves safety, the reliability and safety that user equipment carries out software upgrading is improved.
Description
Technical field
The present invention relates to software technologies more particularly to a kind of Oftware updating method, file encrypting method, device and storage to be situated between
Matter.
Background technique
Software is the set of a series of computer datas according to particular order tissue and instruction.The function of software is a variety of more
Sample, electronic equipment can pass through its corresponding function of specific software realization.In practical applications, in the software after reparation publication
Existing defect increases new function, needs to be updated software.
In the prior art, software installation is wrapped after reaching third-party platform, user equipment is downloaded by third-party platform
Software installation packet is updated.
The reliability and safety of above-mentioned Oftware updating method can be poor.
Summary of the invention
The present invention provides a kind of Oftware updating method, file encrypting method, device and storage medium, to improve software upgrading
Reliability and safety.
In a first aspect, the present invention provides a kind of Oftware updating method, comprising:
The first encryption software installation kit is decrypted using multiple groups decruption key, obtains software installation packet;
Software data in the software installation packet is encrypted, the second encryption software installation kit is obtained;
The second encryption software installation kit is sent to third-party platform, so that user equipment is flat by the third party
Platform downloads the second encryption software installation kit and carries out software upgrading.
Further, described that the first encryption software installation kit is decrypted using multiple groups decruption key, it obtains soft
Part installation kit, comprising:
The multiple groups decruption key is sequentially connected in series, every group of decruption key includes serial number and random data, the random number
According to being obtained according to the first encryption parameter;
According to the multiple groups decruption key and the first hash function after series connection, the multiple groups decruption key corresponding one is obtained
Encryption key;
According to the inverse operation of the encryption key and Encryption Algorithm, the first encryption software installation kit is decrypted,
Obtain the software installation packet.
Further, described that the first encryption software installation kit is decrypted using multiple groups decruption key, it obtains soft
Before part installation kit, further includes:
Obtain the corresponding multiple groups decruption key of the first encryption software installation kit.
Further, the software data in the software installation packet is encrypted, and it is soft to obtain the second encryption
Part installation kit, comprising:
The software data in the software installation packet is converted into binary data by way of data flow;
Processing is grouped to the binary data using presetting digit capacity, obtains binary data group after grouping;
According to the group number of the presetting digit capacity and the binary data group, the second encryption parameter is determined;
The binary data group is encrypted using second encryption parameter, obtains encrypted binary system
Data group;
It successively combines all encrypted binary data groups in sequence, obtains the second encryption software installation
Packet.
Second aspect, the present invention provide a kind of file encrypting method, comprising:
At least two random data are obtained according to the first encryption parameter and the second hash function, wherein first encryption
Parameter includes following one or more: encryption times, password, Encryption Algorithm;
According at least two random data generate multiple groups decruption key, every group of decruption key include serial number and it is described with
Machine data;
At least two random data is sequentially connected in series according to preset numeric order, using at least two after series connection
Random data and third hash function, generate the encryption key;
Software installation packet is encrypted using the encryption key to obtain the first encryption software installation kit.
Further, described that software installation packet is encrypted using the encryption key to obtain the installation of the first encryption software
After packet, further includes:
The first encryption software installation kit and the multiple groups decruption key are sent to server.
The third aspect, the present invention provide a kind of software renewing apparatus, comprising:
Deciphering module is obtained soft for the first encryption software installation kit to be decrypted using multiple groups decruption key
Part installation kit;
First encrypting module obtains second and adds for the software data in the software installation packet to be encrypted
Mi Ruanjiananzhuanbao;
First sending module, for the second encryption software installation kit to be sent to third-party platform, so that user sets
It is standby that the second encryption software installation kit progress software upgrading is downloaded by the third-party platform.
Fourth aspect, the present invention provide a kind of document encrypting apparatus, comprising:
First obtains module, for obtaining at least two random data according to the first encryption parameter and the second hash function,
Wherein, first encryption parameter includes following one or more: encryption times, password, Encryption Algorithm;
First generation module, for generating multiple groups decruption key according at least two random data, every group of decryption is close
Key includes serial number and the random data;
Second generation module is adopted at least two random data to be sequentially connected in series according to preset numeric order
With at least two random data and third hash function after series connection, the encryption key is generated;
Second encrypting module, for software installation packet to be encrypted to obtain the first encryption using the encryption key
Software installation packet.
5th aspect, the present invention provide a kind of electronic equipment, comprising: processor and memory;
The memory stores program instruction;
The processor executes described program instruction, to execute method described in first aspect, alternatively, the processor is held
Row described program instruction, to execute method described in second aspect.
6th aspect, the present invention also provides a kind of storage mediums, comprising: program, described program is when being executed by processor
For executing method described in first aspect, alternatively, described program is when being executed by processor for executing described in second aspect
Method.
The present invention provides a kind of Oftware updating method, file encrypting method, device and storage medium, wherein the software is more
New method is decrypted the first encryption software installation kit by using multiple groups decruption key, obtains software installation packet, into
The software data in software installation packet is encrypted in one step, obtains the second encryption software installation kit, and the second encryption is soft
Part installation kit is sent to third-party platform, carries out so that user equipment downloads the second encryption software installation kit by third-party platform
Software upgrading.It is decrypted, effectively the first encryption software installation kit is carried out multi-party by using multiple groups decruption key
The fairness of participation identifies.In addition, third-party platform storage encryption software installation kit further improves safety, use is improved
The reliability and safety of family equipment progress software upgrading.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to do one simply to introduce, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram of Oftware updating method embodiment one provided by the invention;
Fig. 2 is the flow diagram of Oftware updating method embodiment two provided by the invention;
Fig. 3 is the flow diagram of file encrypting method embodiment one of the present invention;
Fig. 4 is the structural schematic diagram of software renewing apparatus embodiment one provided by the invention;
Fig. 5 is the structural schematic diagram of document encrypting apparatus embodiment one provided by the invention;
Fig. 6 is the structural schematic diagram of electronic equipment embodiment one provided by the invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Fig. 1 is the flow diagram of Oftware updating method embodiment one provided by the invention.The Oftware updating method can be with
It is realized by way of software and/or hardware.Specifically, which can be executed by software renewing apparatus, software
Updating device can be an independent equipment, also can integrate in the equipment such as server.It is with executing subject in the present embodiment
Server is illustrated.Wherein, server includes but is not limited to that single network server, multiple network servers form
Server group or cloud consisting of a large number of computers or network servers based on cloud computing.Wherein, cloud computing is distributed meter
One kind of calculation, a super virtual computer being made of the computer of a group loose couplings.
Please continue to refer to Fig. 1, the method for the present embodiment may include:
S101, the first encryption software installation kit is decrypted using multiple groups decruption key, obtains software installation packet.
It wherein, include the All Files of software installation in the first encryption software installation kit, that is to say, that the first encryption software
It include the computer program that can be run on computers, and document relevant to these computer programs in installation kit.First adds
The software version of corresponding software installed on the software version of Mi Ruanjiananzhuanbao and user equipment is different.For example, software development
Different identification informations can be arranged for the software installation packet of different software versions in personnel, to distinguish the version of software installation packet.
Software installation packet after the completion of software developer's exploitation by being stored in electronic equipment.Further, electronic equipment is to software installation
Packet is encrypted to obtain the first encryption software installation kit.
Multiple groups decruption key is the corresponding decruption key of the first encryption software installation kit.Server encrypts soft in acquisition first
After part installation kit, the first encryption software installation kit is decrypted by using multiple groups decruption key.If successful decryption,
Server can get software installation packet.If decryption failure, server can not obtain software installation packet.By using multiple groups
Operation, only successful decryption is decrypted to the first encryption software installation kit in decruption key, could obtain software installation packet.This
Sample is lost in the electronic equipment for storing the first encryption software installation kit, is stolen etc. under fortuitous events, can effectively avoid illegal point
Son directly acquires software installation packet, and carries out malice to the software data in software installation packet and distort, due to the software after distorting
Data may be damaged user equipment or cause damages to user equipment, therefore the invention can ensure that user equipment safety.
S102, the software data in software installation packet is encrypted, obtains the second encryption software installation kit.
User equipment generally passes through third-party platform or official website's downloading software installation packet, carries out software installation or software
It updates.Criminal obtains software installation packet, distorts software data therein or implantation virus infection etc., and then will
Software installation packet after distorting is uploaded to third-party platform again, and for user equipment downloading, user equipment is easily damaged.Cause
This, software data of the server in the software installation packet that will acquire carries out further encryption, to reduce software installation
A possibility that software data is tampered in packet.
In server successful decryption, after obtaining software installation packet, software data all in software installation packet is read.Into one
Step ground, server is encrypted all software datas read using preset algorithm, to obtain the second encryption software
Installation kit.S103, the second encryption software installation kit is sent to third-party platform, so that user equipment passes through under third-party platform
It carries the second encryption software installation kit and carries out software upgrading.
Wherein, third-party platform provides payment or free software installation packet download function for user equipment, specifically may be used
Open application market (Application Store, referred to as: APP Store) is thought, alternatively, third-party platform can also be
The software distribution platform of some signings.User equipment can be the terminals such as computer, smart phone, tablet computer, palm PC,
Which is not limited by the present invention.
Specifically, the second encryption software installation kit can be sent to one or more third-party platforms by server.Accordingly,
Each third-party platform receives and stores the second encryption software installation kit.
In practical application, user equipment can be inquired in third-party platform with the presence or absence of new software version, alternatively, third
Fang Pingtai actively can also send recommendation message to user equipment, remind user equipment to have new software version publication, so that user
Equipment can understand the version information of the software in time.When user equipment determines the second encryption software provided by third-party platform
It, further can be flat by third party in software version and user equipment in installation kit when mounted current software version difference
Platform downloads the second encryption software installation kit, and the second encryption software installation kit of acquisition is decrypted in user equipment, then leads to
The executable file in runs software installation kit is crossed, software upgrading is completed, to repair loophole existing for software or experience the software
The new function of providing.It should be noted that user equipment only downloads the permission of software installation packet from third-party platform, and do not have
The permission of oriented third-party platform upload software installation kit, by the limitation to user equipment permission, criminal can not will be usurped
Software installation after changing, which is wrapped, reaches third-party platform, further improves the safety of software upgrading.
The present embodiment is decrypted the first encryption software installation kit by using multiple groups decruption key, obtains soft
Part installation kit is further encrypted software installation packet, the second encryption software installation kit is obtained, by the second encryption software
Installation kit is sent to third-party platform, so that user equipment is soft by third-party platform downloading the second encryption software installation kit progress
Part updates.It is decrypted by using multiple groups decruption key, effectively the first encryption software installation kit is joined in many ways
With fairness identify.In addition, third-party platform storage encryption software installation kit further improves safety, user is improved
The reliability and safety of equipment progress software upgrading.
A kind of possible implementation, server use multiple groups decruption key to pacify the first encryption software in the following manner
Dress packet is decrypted, and obtains software installation packet.
Specifically, the multiple groups decruption key is sequentially connected in series, every group of decruption key includes serial number and random data, described
Random data is obtained according to the first encryption parameter, according to the multiple groups decruption key and the first hash function after series connection, is obtained
The corresponding encryption key of the multiple groups decruption key is taken, according to the inverse operation of the encryption key and Encryption Algorithm, to described
First encryption software installation kit is decrypted, and obtains the software installation packet.
For example, being illustrated by taking two groups of decruption keys as an example, two groups of decruption keys are (1,19), (2,52) respectively.Wherein,
At least two random data are 19,52, preset continuous serial number 1,2, by two groups of decruption keys according to preset continuous serial number
Sequence be sequentially connected in series, two after series connection group decruption key is expressed as (1,19;2,52), further according to two groups of solutions after series connection
Key (1,19;2,52) it is input to the first hash function, obtains the corresponding unique-encryption key of two groups of decruption keys.Into one
Step, according to the inverse operation of the unique-encryption key and Encryption Algorithm that get, is decrypted the first encryption software installation kit, obtains
To software installation packet.It is appreciated that hash function is that the input message string of random length can be converted into regular length by one kind
Export a kind of function of string.First hash function can be one in common hash algorithm when carrying out hash operation in the prior art
Kind.In some embodiments, server is decrypted the first encryption software installation kit using multiple groups decruption key, obtains
Before installation kit, the corresponding multiple groups decruption key of the first encryption software installation kit is obtained.
Specifically, server obtains the corresponding multiple groups decruption key of the first encryption software installation kit from electronic equipment,
In, it is stored with the first encryption software installation kit in electronic equipment and the corresponding multiple groups decryption of the first encryption software installation kit is close
Key.For example, server sends the instruction for obtaining decruption key, electronics to the electronic equipment for being stored with the first encryption software installation kit
After equipment receives the instruction for obtaining decruption key, the corresponding multiple groups decruption key of the first encryption software installation kit is sent to clothes
Business device.
Fig. 2 is the flow diagram of Oftware updating method embodiment two provided by the invention.As shown in Fig. 2, side shown in Fig. 1
S102 in method embodiment may include:
S201, the software data in software installation packet is converted into binary data by way of data flow.
Data flow represents the digitally encoded signal sequence of information used in transmission.The high speed by way of data flow
The software data in software installation packet is read, further the element in data flow is stored, to realize software installation packet
In software data be converted to corresponding binary data.
S202, processing is grouped to binary data using presetting digit capacity, obtains binary data group after grouping.
Specifically, by the corresponding binary data of software data in software installation packet according to presetting digit capacity H from the front to the back
It is grouped, the digit in last group of binary data group is less than or equal to H.Wherein, H is greater than 0.Optionally, H can for 8,
16, among 32 or 64 any one.After packet transaction, N group binary data group is obtained.Wherein, N is greater than 0.
S203, according to the group number of presetting digit capacity and binary data group, determine the second encryption parameter.
Optionally, the second encryption parameter is the phase for needing to participate in operation during binary data group is encrypted
The group number of adjacent binary data group, the second encryption parameter can be indicated with C.Illustratively, the second encryption parameter C=N/H+2, works as N/
When H=H-1, C=H, wherein H can be any one among 8,16,32 or 64.
It is, of course, understood that can also be counted by other more complicated rules to presetting digit capacity H, group number N
It calculates, to determine the second encryption parameter, which is not limited by the present invention.
S204, binary data group is encrypted using the second encryption parameter, obtains encrypted binary number
According to group.
Optionally, binary data group is encrypted according to the second encryption parameter C, to the binary data group,
The data in the binary data group of adjacent C group are successively subjected to same position or dystopy operation from the front to the back, obtain selected N-C
The corresponding encrypted binary data group of+1 group binary data group.The two of the corresponding encryption of remaining binary data group into
Data group processed is consistent with before unencryption.
Certainly, in the present invention in such a way that binary data group is encrypted in the second encryption parameter, and it is unlimited
Due to aforementioned described mode, the second encryption parameter can also be used to binary data by other more complicated algorithms
Group is encrypted, to obtain encrypted binary data group.For example, binary data group can be converted to corresponding ten
Decimal data is subtracted the second encryption parameter, obtains difference by binary data, later, difference is reconverted into binary data
Group, the binary data group after conversion are the binary data group encrypted.Wherein, the digit of the binary data group after conversion
It is identical as the digit for not converting preceding binary data group.
S205, it successively combines all encrypted binary data groups in sequence, obtains second encryption software
Installation kit.
Server when being grouped processing to binary data, can to each binary data group according to sequencing into
Row number.Further, all encrypted binary data groups are combined by server according to number, are obtained encrypted
Binary software data, and encrypted binary software data are converted, to obtain the second encryption software installation kit.
In the present embodiment, the software data in the software installation packet is converted into binary number by way of data flow
According to being grouped processing to the binary data using presetting digit capacity, binary data group after grouping obtained, according to described pre-
If the group number of digit and the binary data group, determines the second encryption parameter, further, using second encryption parameter pair
The binary data group is encrypted, and obtains encrypted binary data group, by all encrypted binary numbers
It is successively combined in sequence according to group, obtains the second encryption software installation kit.The beneficial effect of the present embodiment is: by right
Software data in software installation packet is encrypted, and the second encryption software installation kit is obtained, by using reversible encryption
Processing mode, can effectively ensure that the reliability of software data in the second encryption software installation kit, and improve software installation packet
Safety.
Fig. 3 is the flow diagram of file encrypting method embodiment one provided by the invention.File provided in this embodiment
The executing subject of encryption method can be document encrypting apparatus, can also can be realized the electronic equipment of file encrypting method for other.
Such as: computer, mobile communication equipment, media player such as MP3, MP4 etc..As shown in figure 3, the method for the present embodiment can be with
Include:
S301, at least two random data are obtained according to the first encryption parameter and the second hash function.
Wherein, first encryption parameter may include following one or more: encryption times, password, Encryption Algorithm etc..
Wherein, encryption times are to execute the personnel of cryptographic operation at the time of software installation packet is encrypted, password
To execute the character by one of number, letter, symbol or a variety of preset lengths formed that the personnel of cryptographic operation input
String.Encryption Algorithm can be Data Encryption Standard (Data Encryption Standard, referred to as: DES), international data
Encryption Algorithm (International Data Encryption Algorithm, referred to as: IDEA), Digital Signature Algorithm
(Digital Signature Algorithm, referred to as: DSA), advanced encryption algorithm (Advanced Encryption
Standard, referred to as: AES) etc..Encryption Algorithm can also be that other can be to the algorithm that data are encrypted, the present invention
It does not limit this.
A kind of possible implementation obtains one to encryption times, password, Encryption Algorithm by the second hash function
Initial value.Further, using the initial value as input, at least two random data are obtained.
S302, multiple groups decruption key is generated according at least two random data, every group of decruption key includes serial number and random
Data.
Optionally, at least two random data and preset continuous serial number are combined, generate multiple groups decruption key.It can
With understanding, the quantity of random data is identical as the quantity for presetting continuous serial number.For example, at least two random data be 19,
52, then 19,52 are combined respectively at preset continuous serial number 1,2, generate two groups of decruption keys, two groups of decruption key difference
It is (1,19), (2,52).
S303, at least two random data are sequentially connected in series according to preset numeric order, using at least two after series connection
A random data and third hash function generate encryption key.
Illustratively, if two groups of decruption keys are (1,19), (2,52) respectively, then by two random data, 19,52 bases
The sequence of preset continuous serial number 1,2 is sequentially connected in series, and two after being connected random data is represented by (19,52).Into one
Two random data (19,52) after series connection are input in third hash function by step, generate unique encryption key.
According at least two random data, the encryption key of software installation packet is generated, can be improved the safety of encryption.
S304, software installation packet is encrypted using encryption key to obtain the first encryption software installation kit.
Specifically, encryption key is set to the access key of software installation packet.It is inputted as user or developer
Encryption key is consistent with the encryption key that software installation packet is arranged, then user or developer can obtain software installation packet.If with
When the encryption key of the encryption key and the setting of software installation packet of family or developer's input is inconsistent, user or exploit person
Member can not then obtain software installation packet, can not read the software data in software installation packet.
In the present embodiment, by carrying out file encryption processing to software installation packet, set in the electronics of storage software installation packet
Under the fortuitous events such as standby loss, stolen, criminal can be effectively avoided to directly acquire software installation packet, and to software installation packet
In software data carry out malice distort, user equipment may be damaged due to the software data after distorting or user equipment is made
At harm, therefore the invention can ensure that user equipment safety.
Further, S304, software installation packet is encrypted using encryption key to obtain the first encryption software installation kit
Later, this document encryption method can also include: send the first encryption software installation kit and the multiple groups decruption key to
Server.It enables the server to execute the step in embodiment as shown in Figure 1 and Figure 2.
Fig. 4 is the structural schematic diagram of software renewing apparatus embodiment one provided by the invention.As shown in figure 4, the present embodiment
Device 40 include: deciphering module 41, the first encrypting module 42 and the first sending module 43.Wherein,
Deciphering module 41 is obtained for the first encryption software installation kit to be decrypted using multiple groups decruption key
Software installation packet.
First encrypting module 42 obtains second for the software data in the software installation packet to be encrypted
Encryption software installation kit.
First sending module 43, for the second encryption software installation kit to be sent to third-party platform, so that user
Equipment downloads the second encryption software installation kit by the third-party platform and carries out software upgrading.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1, realization principle and skill
Art effect is similar, and details are not described herein again.
In some embodiments, deciphering module 41 can be specifically used for for the multiple groups decruption key being sequentially connected in series, every group of decryption
Key includes serial number and random data, and the random data is obtained according to the first encryption parameter, according to the multiple groups after series connection
Decruption key and the first hash function obtain the corresponding encryption key of the multiple groups decruption key, close according to the encryption
The first encryption software installation kit is decrypted in the inverse operation of key and Encryption Algorithm, obtains the software installation packet.
Optionally, the first encrypting module 42 can be specifically used for will be soft in the software installation packet by way of data flow
Number of packages is grouped processing to the binary data according to binary data is converted to, using presetting digit capacity, obtains two after grouping
Binary data group determines the second encryption parameter, using described according to the group number of the presetting digit capacity and the binary data group
The binary data group is encrypted in second encryption parameter, obtains encrypted binary data group, adds all
Binary data group after close successively combines in sequence, obtains the second encryption software installation kit.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 1 and Fig. 2, realize
Principle is similar with technical effect, and details are not described herein again.
Optionally, the device 40 in this implementation can also include: the second acquisition module 44, for using multiple groups decruption key
First encryption software installation kit is encrypted, before obtaining software installation packet, obtains the first encryption software installation kit pair
The multiple groups decruption key answered.
Wherein, it is close to obtain the corresponding multiple groups decryption of the first encryption software installation kit from electronic equipment for the second acquisition module 44
Key.It is stored with the first encryption software installation kit in electronic equipment and the corresponding multiple groups decryption of the first encryption software installation kit is close
Key.
Fig. 5 is the structural schematic diagram of document encrypting apparatus embodiment one provided by the invention.As shown in figure 5, the present embodiment
Device 50 include: the first acquisition module 51, the first generation module 52, the second generation module 53 and the second encrypting module 54.
First obtains module 51, for obtaining at least two random numbers according to the first encryption parameter and the second hash function
According to.Wherein, first encryption parameter includes following one or more: encryption times, password, Encryption Algorithm.
First generation module 52, for generating multiple groups decruption key according at least two random data.Every group of decryption
Key includes serial number and the random data.
Second generation module 53, at least two random data to be sequentially connected in series according to preset numeric order,
Using at least two random data and third hash function after series connection, the encryption key is generated.
Second encrypting module 54, for using the encryption key to software installation packet be encrypted to obtain first plus
Mi Ruanjiananzhuanbao.
The device of the present embodiment can be used for executing the technical solution of embodiment of the method shown in Fig. 3, realization principle and skill
Art effect is similar, and details are not described herein again.
Optionally, the device 50 of the present embodiment can also include: the second sending module 55, for sending first encryption
Software installation packet and the multiple groups decruption key are to server.
Further, the second sending module 55 is used to be encrypted to obtain first to software installation packet using encryption key
After encryption software installation kit, the first encryption software installation kit and the corresponding multiple groups decruption key of the first software installation packet are sent
To server.
Fig. 6 is the structural schematic diagram of electronic equipment embodiment one provided by the invention.As shown in fig. 6, the electronic equipment 60
It include: memory 61, processor 62.
Wherein, memory 61 can be independent physical unit, can be connect by bus 63 with processor 62.Memory
61, processor 62 also can integrate together, pass through hardware realization etc..
Memory 61 is used to store the program for realizing above method embodiment, the calling of processor 62 program, more than execution
The operation of embodiment of the method.
Optionally, when passing through software realization some or all of in the method for above-described embodiment, above-mentioned electronic equipment 60
Processor can also be only included.Memory for storing program is located at except electronic equipment 60, and processor passes through circuit/electric wire
It is connect with memory, for reading and executing the program stored in memory.
Processor 62 can be central processing unit (Central Processing Unit, CPU), network processing unit
The combination of (Network Processor, NP) or CPU and NP.
Processor 62 can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit
(Application-Specific Integrated Circuit, ASIC), programmable logic device (Programmable
Logic Device, PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (Complex
Programmable Logic Device, CPLD), field programmable gate array (Field-Programmable Gate
Array, FPGA), Universal Array Logic (Generic Array Logic, GAL) or any combination thereof.
Memory 61 may include volatile memory (Volatile Memory), such as random access memory
(Random-Access Memory, RAM);Memory also may include nonvolatile memory (Non-volatile
), such as flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid state hard disk Memory
(Solid-state Drive, SSD);Memory can also include the combination of the memory of mentioned kind.
The present invention also provides a kind of program products, for example, computer storage medium, comprising: program, program is by processor
For executing above method when execution.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can store in computer-readable storage medium.The program
When being executed, it executes and includes the steps that above-mentioned each method embodiment;And storage medium above-mentioned include: ROM, RAM, magnetic disk or
The various media that can store program code such as CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of Oftware updating method characterized by comprising
The first encryption software installation kit is decrypted using multiple groups decruption key, obtains software installation packet;
Software data in the software installation packet is encrypted, the second encryption software installation kit is obtained;
The second encryption software installation kit is sent to third-party platform, so that user equipment passes through under the third-party platform
It carries the second encryption software installation kit and carries out software upgrading.
2. the method according to claim 1, wherein described pacify the first encryption software using multiple groups decruption key
Dress packet is decrypted, and obtains software installation packet, comprising:
The multiple groups decruption key is sequentially connected in series, every group of decruption key includes serial number and random data, and the random data is
It is obtained according to the first encryption parameter;
According to the multiple groups decruption key and the first hash function after series connection, the corresponding encryption of the multiple groups decruption key is obtained
Key;
According to the inverse operation of the encryption key and Encryption Algorithm, the first encryption software installation kit is decrypted, is obtained
The software installation packet.
3. the method according to claim 1, wherein described pacify the first encryption software using multiple groups decruption key
Dress packet is decrypted, before acquisition software installation packet, further includes:
Obtain the corresponding multiple groups decruption key of the first encryption software installation kit.
4. the method according to claim 1, wherein the software data in the software installation packet carries out
Encryption obtains the second encryption software installation kit, comprising:
The software data in the software installation packet is converted into binary data by way of data flow;
Processing is grouped to the binary data using presetting digit capacity, obtains binary data group after grouping;
According to the group number of the presetting digit capacity and the binary data group, the second encryption parameter is determined;
The binary data group is encrypted using second encryption parameter, obtains encrypted binary data
Group;
It successively combines all encrypted binary data groups in sequence, obtains the second encryption software installation kit.
5. a kind of file encrypting method characterized by comprising
At least two random data are obtained according to the first encryption parameter and the second hash function, wherein first encryption parameter
Including following one or more: encryption times, password, Encryption Algorithm;
Multiple groups decruption key is generated according at least two random data, every group of decruption key includes serial number and the random number
According to;
At least two random data is sequentially connected in series according to preset numeric order, it is random using at least two after series connection
Data and third hash function, generate the encryption key;
Software installation packet is encrypted using the encryption key to obtain the first encryption software installation kit.
6. according to the method described in claim 5, it is characterized in that, described carry out software installation packet using the encryption key
Encryption obtains after the first encryption software installation kit, further includes:
The first encryption software installation kit and the multiple groups decruption key are sent to server.
7. a kind of device of software upgrading characterized by comprising
Deciphering module obtains software peace for the first encryption software installation kit to be decrypted using multiple groups decruption key
Dress packet;
It is soft to obtain the second encryption for the software data in the software installation packet to be encrypted for first encrypting module
Part installation kit;
First sending module, for the second encryption software installation kit to be sent to third-party platform, so that user equipment is logical
It crosses the third-party platform and downloads the second encryption software installation kit progress software upgrading.
8. a kind of document encrypting apparatus characterized by comprising
First obtains module, for obtaining at least two random data according to the first encryption parameter and the second hash function, wherein
First encryption parameter includes following one or more: encryption times, password, Encryption Algorithm;
First generation module, for generating multiple groups decruption key, every group of decruption key packet according at least two random data
Include serial number and the random data;
Second generation module, at least two random data to be sequentially connected in series according to preset numeric order, using string
At least two random data and third hash function after connection, generate the encryption key;
Second encrypting module, for software installation packet to be encrypted to obtain the first encryption software using the encryption key
Installation kit.
9. a kind of electronic equipment characterized by comprising processor and memory;
The memory stores program instruction;
The processor executes described program instruction, 1~4 described in any item methods is required with perform claim, alternatively, the place
It manages device and executes described program instruction, in method described in perform claim requirement 5 or 6.
10. a kind of storage medium characterized by comprising program, described program are used for perform claim when being executed by processor
It is required that 1~4 described in any item methods, alternatively, described program requires 5 or 6 institutes for perform claim when being executed by processor
The method stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810845502.2A CN109086063A (en) | 2018-07-27 | 2018-07-27 | Oftware updating method, file encrypting method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810845502.2A CN109086063A (en) | 2018-07-27 | 2018-07-27 | Oftware updating method, file encrypting method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109086063A true CN109086063A (en) | 2018-12-25 |
Family
ID=64831201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810845502.2A Pending CN109086063A (en) | 2018-07-27 | 2018-07-27 | Oftware updating method, file encrypting method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109086063A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567320A (en) * | 2022-11-10 | 2023-01-03 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129532A (en) * | 2011-03-23 | 2011-07-20 | 阮晓迅 | Method and system for digital copyright protection |
CN102968598A (en) * | 2012-11-08 | 2013-03-13 | 四川虹微技术有限公司 | Decryption method of digital document |
JP2015097023A (en) * | 2013-11-15 | 2015-05-21 | キヤノン株式会社 | Image forming device, control method therefor, and program |
CN104965712A (en) * | 2015-07-17 | 2015-10-07 | 北京奇虎科技有限公司 | Application reinforcing protection method and apparatus and mobile terminal |
CN106598584A (en) * | 2016-12-08 | 2017-04-26 | 广州华多网络科技有限公司 | Resource file processing method, apparatus and system |
CN106845167A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The reinforcement means and device of a kind of APK, and dynamic loading method and device |
CN107179925A (en) * | 2017-04-14 | 2017-09-19 | 北京五八信息技术有限公司 | Hot update method and device |
CN107276744A (en) * | 2017-05-27 | 2017-10-20 | 上海斐讯数据通信技术有限公司 | A kind of file storage encryption method and system |
CN108173906A (en) * | 2017-12-07 | 2018-06-15 | 东软集团股份有限公司 | Installation kit method for down loading, device, storage medium and electronic equipment |
-
2018
- 2018-07-27 CN CN201810845502.2A patent/CN109086063A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102129532A (en) * | 2011-03-23 | 2011-07-20 | 阮晓迅 | Method and system for digital copyright protection |
CN102968598A (en) * | 2012-11-08 | 2013-03-13 | 四川虹微技术有限公司 | Decryption method of digital document |
JP2015097023A (en) * | 2013-11-15 | 2015-05-21 | キヤノン株式会社 | Image forming device, control method therefor, and program |
CN104965712A (en) * | 2015-07-17 | 2015-10-07 | 北京奇虎科技有限公司 | Application reinforcing protection method and apparatus and mobile terminal |
CN106598584A (en) * | 2016-12-08 | 2017-04-26 | 广州华多网络科技有限公司 | Resource file processing method, apparatus and system |
CN106845167A (en) * | 2016-12-12 | 2017-06-13 | 北京奇虎科技有限公司 | The reinforcement means and device of a kind of APK, and dynamic loading method and device |
CN107179925A (en) * | 2017-04-14 | 2017-09-19 | 北京五八信息技术有限公司 | Hot update method and device |
CN107276744A (en) * | 2017-05-27 | 2017-10-20 | 上海斐讯数据通信技术有限公司 | A kind of file storage encryption method and system |
CN108173906A (en) * | 2017-12-07 | 2018-06-15 | 东软集团股份有限公司 | Installation kit method for down loading, device, storage medium and electronic equipment |
Non-Patent Citations (1)
Title |
---|
龚进: "AES加密算法在电子系统中的优化及应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567320A (en) * | 2022-11-10 | 2023-01-03 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
CN115567320B (en) * | 2022-11-10 | 2023-03-24 | 深圳高新区信息网有限公司 | Internet of things platform data management method based on micro-service architecture |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107707347B (en) | User key backup method and device and user key importing method and device | |
CN111107066A (en) | Sensitive data transmission method and system, electronic equipment and storage medium | |
CN109474420A (en) | A kind of private key backup method and relevant device | |
CN109104724B (en) | A kind of data ciphering method and device for device upgrade | |
CN204360381U (en) | mobile device | |
WO2017006118A1 (en) | Secure distributed encryption system and method | |
CN110661748A (en) | Log encryption method, log decryption method and log encryption device | |
CN108197439A (en) | A kind of file encrypting method, device and server | |
CN112202779B (en) | Block chain based information encryption method, device, equipment and medium | |
CN108229192B (en) | File decryption method and device and client | |
CN111611621A (en) | Block chain based distributed data encryption storage method and electronic equipment | |
CN106357402A (en) | Data encryption-decryption processing method and device | |
CN108431819A (en) | Client is protected to access the method and system of the service of the DRM agent of video player | |
CN112182109A (en) | Distributed data coding storage method based on block chain and electronic equipment | |
CN111181920A (en) | Encryption and decryption method and device | |
CN108846671B (en) | Online secure transaction method and system based on block chain | |
WO2019178981A1 (en) | Password management method and device employing customized rules, terminal apparatus, and storage medium | |
US11356254B1 (en) | Encryption using indexed data from large data pads | |
CN109086063A (en) | Oftware updating method, file encrypting method, device and storage medium | |
CN110515591B (en) | Random number generation method and device based on block chain | |
CN113132484A (en) | Data transmission method and device | |
CN103605927A (en) | Encryption and decryption method based on embedded Linux system | |
CN106778227A (en) | Applied program processing method, application program launching method and device | |
CN105939192A (en) | Data encryption method and device | |
CN115277064A (en) | Data encryption method, data decryption method, data encryption device, data decryption device, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |