CN109240713A - Drive the encryption method of installation procedure, the installation method and device of driver - Google Patents
Drive the encryption method of installation procedure, the installation method and device of driver Download PDFInfo
- Publication number
- CN109240713A CN109240713A CN201810979894.1A CN201810979894A CN109240713A CN 109240713 A CN109240713 A CN 109240713A CN 201810979894 A CN201810979894 A CN 201810979894A CN 109240713 A CN109240713 A CN 109240713A
- Authority
- CN
- China
- Prior art keywords
- installation procedure
- driving installation
- driving
- driver
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000009434 installation Methods 0.000 title claims abstract description 165
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000005094 computer simulation Methods 0.000 claims description 30
- 238000004422 calculation algorithm Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
Abstract
This application provides a kind of encryption methods for driving installation procedure, the installation method and device of driver, and driving the encryption method of installation procedure includes: to write driving installation procedure;Driving installation procedure is encrypted.In this application, the safety of driving installation procedure can be improved in the above manner, and then can guarantee that driver is not easy to be illegally used.
Description
Technical field
This application involves field of computer technology, in particular to a kind of encryption method for driving installation procedure, driver
Installation method and device.
Background technique
With the development of computer technology, more and more operating systems can be easily selected by a user use, such as Windows system
System, linux system (e.g., Canaima system).
Currently, the driving installation procedure in the computer equipped with Canaima system is generally in plain text, but the driving peace of plaintext
The easily stolen use of program is filled, driver is caused easily to be illegally used.
Summary of the invention
In order to solve the above technical problems, the embodiment of the present application provides a kind of encryption method of driving installation procedure, driving journey
The installation method and device of sequence, with reach improve improve driving installation procedure safety, and then guarantee driver be not easy by
The purpose illegally used, technical solution are as follows:
A kind of encryption method driving installation procedure, comprising:
Write driving installation procedure;
The driving installation procedure is encrypted.
Preferably, it is described the driving installation procedure is encrypted before, further includes:
Computer model information is written to the driving installation procedure, the computer model information is to pacify with the driving
Fill the model information of the computer of procedure match.
It is preferably, described that the driving installation procedure is encrypted, comprising:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
A kind of installation method of driver, comprising:
Write driver and driving installation procedure;
The driving installation procedure is encrypted;
Encrypted driving installation procedure is executed, the driver is installed.
Preferably, described to execute encrypted driving installation procedure, the driver is installed, comprising:
The encrypted driving installation procedure is decrypted;
From the driving installation procedure after decryption read computer model information, and judge the computer model information with
Whether the type of the computer of the driver to be installed is consistent;
If consistent, the driving installation procedure after executing the decryption installs the driver.
A kind of encryption device driving installation procedure, comprising:
Module is write, for writing driving installation procedure;
Encrypting module, for being encrypted to the driving installation procedure.
Preferably, described device further include:
Writing module, for computer model information, the computer model information to be written to the driving installation procedure
For the model information with the driving matched computer of installation procedure.
Preferably, the encrypting module is specifically used for:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
A kind of mounting device of driver, comprising:
Module is write, for writing driver and driving installation procedure;
Encrypting module, for being encrypted to the driving installation procedure;
Module is installed, the driver is installed for executing encrypted driving installation procedure.
Preferably, the installation module is specifically used for:
The encrypted driving installation procedure is decrypted;
From the driving installation procedure after decryption read computer model information, and judge the computer model information with
Whether the type of the computer of the driver to be installed is consistent;
If consistent, the driving installation procedure after executing the decryption installs the driver.
Compared with prior art, the application has the beneficial effect that
In this application, determining installation procedure is write first, the drive after writing driving installation procedure, to completion is write
Dynamic installation procedure is encrypted, and is guaranteed in the case where being unaware of manner of decryption, can not be read and be pacified using encrypted driving
Program is filled, the safety of driving installation procedure is improved, and then can guarantee that driver is not easy to be illegally used.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those of ordinary skill in the art, without any creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of flow chart of the encryption method of driving installation procedure provided by the present application;
Fig. 2 is another flow chart of the encryption method of driving installation procedure provided by the present application;
Fig. 3 is a kind of flow chart of the installation method of driver provided by the present application;
Fig. 4 is a kind of sub-process figure of the installation method of the application driver provided by the present application;
Fig. 5 is another sub-process figure of the installation method of the application driver provided by the present application;
Fig. 6 is a kind of logical construction schematic diagram of the encryption device of driving installation procedure provided by the present application;
Fig. 7 is a kind of logical construction schematic diagram of the mounting device of driver provided by the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
The embodiment of the present application discloses a kind of encryption method for driving installation procedure, comprising: writes driving installation procedure;It is right
The driving installation procedure is encrypted.In this application, the safety of driving installation procedure can be improved, guarantee driver
It is not easy to be illegally used.
Next the encryption method of installation procedure is driven to be introduced to disclosed in the embodiment of the present application, it referring to Figure 1, can
To include:
Step S11, driving installation procedure is write.
In the present embodiment, computer can indicate file according to the programming of setting, write driving installation procedure.
Preferably, installation procedure can be driven using shell programming.It, can since shell program is succinctly efficient
Efficiency is write with promotion driving installation procedure, so as to promote the installation effectiveness of driver.
Step S12, the driving installation procedure is encrypted.
In this step, computer encrypts the step S11 driving installation procedure for writing completion, guarantees be unaware of solution
In the case where close mode, it can not read and use encrypted driving installation procedure.
Since encrypted driving installation procedure can not read and use, even if usurping driver and driving peace
Fill program after, also can not to driver carry out normal mounting, driver also can not normal use, thereby may be ensured that drive
Dynamic program is not easy to be illegally used.
In this application, determining installation procedure is write first, the drive after writing driving installation procedure, to completion is write
Dynamic installation procedure is encrypted, and is guaranteed in the case where being unaware of manner of decryption, can not be read and be pacified using encrypted driving
Program is filled, the safety of driving installation procedure is improved, and then can guarantee that driver is not easy to be illegally used.
In another embodiment of the application, the encryption method of another driving installation procedure is introduced, figure is referred to
2, may include:
Step S21, driving installation procedure is write.
Step S22, to the driving installation procedure be written computer model information, the computer model information for institute
State the model information of the driving matched computer of installation procedure.
Computer model information is written to the driving installation procedure, it is ensured that driving installation procedure is only matched
Computer in run, can not be run in the corresponding computer of model information except computer model information, improve driving
The safety of installation procedure.
Step S23, the driving installation procedure that the computer model information is written is encrypted.
The driving installation procedure that the computer model information is written is encrypted, can be further improved driving installation
The safety of program guarantees that driver is not easy to be illegally used.
In another embodiment of the application, it is situated between to the above-mentioned process encrypted to the driving installation procedure
It continues, can specifically include:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
By the driving installation procedure transcoding it is the character not directly read using Base64 encryption algorithm, is can guarantee
Driving installation procedure is not easy on the basis of being stolen, simple easily to realize.
It is understood that the driving installation procedure transcoding is not directly read using Base64 encryption algorithm
Character is a kind of preferred cipher mode provided in this embodiment, the process and limitation encrypted to the driving installation procedure
In this, other cipher modes will not enumerate herein.
In another embodiment of the application, a kind of installation method of driver is introduced, Fig. 3 is referred to, can wrap
It includes:
Step S31, driver and driving installation procedure are write.
In the present embodiment, computer can indicate file according to the programming of setting, write driver and drive respectively
Dynamic installation procedure.
The process for writing driving installation procedure is identical as the step S11 in previous embodiment, and driving is write in the present embodiment
The process of installation procedure may refer to the related introduction of step S11, and details are not described herein.
It preferably, can be using shell programming driver and driving installation procedure.Since shell program is succinct
Efficiently, therefore driver can be promoted and installation procedure is driven to write efficiency, so as to promoting the installation of driver
Efficiency.
Step S32, the driving installation procedure is encrypted.
Step S32 is identical as the step S12 in previous embodiment, and the detailed process of step S32 may refer to step S12's
Related introduction, details are not described herein.
Step S33, encrypted driving installation procedure is executed, the driver is installed.
Computer executes encrypted driving installation procedure, installs the driver, it is ensured that driver is not easy
It is illegally used.
In another embodiment of the application, to the encrypted driving installation procedure of above-mentioned execution, the driving is installed
Program is introduced, and refers to Fig. 4, may include:
Step S41, the encrypted driving installation procedure is decrypted.
In the present embodiment, computer solves the encrypted driving installation procedure according to the manner of decryption of agreement
It is close, obtain the driving installation procedure that can be executed.
Step S43, the driving installation procedure after the decryption is executed, the driver is installed.
In another embodiment of the application, to the encrypted driving installation procedure of above-mentioned execution, the driving is installed
Program is introduced, and refers to Fig. 5, may include:
Step S51, the encrypted driving installation procedure is decrypted.
It include computer model information in encrypted driving installation procedure in the present embodiment.Encrypted driving installation
The computer model information for including in program is the model information with the driving matched computer of installation procedure.
Step S52, computer model information is read from the driving installation procedure after decryption, and judges the computer machine
Whether type information is consistent with the type of the computer of the driver to be installed.
If consistent, S53 is thened follow the steps;If inconsistent, the driving installation procedure after decryption does not allow to be performed, then counts
Calculation machine can not execute the driving installation procedure after decryption.
Step S53, the driving installation procedure after the decryption is executed, the driver is installed.
Computer model information and the driving journey to be installed in the driving installation procedure that step S52 judges after decryption
Under the type unanimous circumstances of the computer of sequence, driving installation procedure after just executing the decryption installs the driving journey
Sequence, can be further improved the safety of driver, to be further ensured that driver is not easy to be illegally used.
Next the encryption device of driving installation procedure provided by the present application is introduced, the driving installation being introduced below
The encryption device of program can correspond to each other reference with the encryption method of driving installation procedure described above.
Fig. 6 is referred to, driving the encryption device of installation procedure includes: to write module 11 and encrypting module 12.
Module 11 is write, for writing driving installation procedure.
Encrypting module 12, for being encrypted to the driving installation procedure.
In the present embodiment, the encryption device of above-mentioned driving installation procedure can also include:
Writing module, for computer model information, the computer model information to be written to the driving installation procedure
For the model information with the driving matched computer of installation procedure.
In the present embodiment, encrypting module 12 specifically can be used for:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
Next the mounting device of driver provided by the present application is introduced, the peace for the driver being introduced below
Assembling device can correspond to each other reference with the installation method of driver described above.
Fig. 7 is referred to, the mounting device of driver includes: to write module 21, encrypting module 22 and installation module 23.
Module 21 is write, for writing driver and driving installation procedure.
Encrypting module 22, for being encrypted to the driving installation procedure.
Module 23 is installed, the driver is installed for executing encrypted driving installation procedure.
In the present embodiment, installation module 23 specifically can be used for:
The encrypted driving installation procedure is decrypted;
From the driving installation procedure after decryption read computer model information, and judge the computer model information with
Whether the type of the computer of the driver to be installed is consistent;
If consistent, the driving installation procedure after executing the decryption installs the driver.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can
It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application
On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product
It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment
(can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment
Method described in part.
Above to the installation method and dress of a kind of encryption method of driving installation procedure provided herein, driver
It sets and is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above
The explanation of embodiment is merely used to help understand the present processes and its core concept;Meanwhile for the general skill of this field
Art personnel, according to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion this
Description should not be construed as the limitation to the application.
Claims (10)
1. a kind of encryption method for driving installation procedure characterized by comprising
Write driving installation procedure;
The driving installation procedure is encrypted.
2. the method according to claim 1, wherein it is described the driving installation procedure is encrypted before,
Further include:
Computer model information is written to the driving installation procedure, the computer model information is to install journey with the driving
The model information of the matched computer of sequence.
3. the method according to claim 1, wherein described encrypt the driving installation procedure, comprising:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
4. a kind of installation method of driver characterized by comprising
Write driver and driving installation procedure;
The driving installation procedure is encrypted;
Encrypted driving installation procedure is executed, the driver is installed.
5. according to the method described in claim 4, it is characterized in that, described execute encrypted driving installation procedure, installation institute
State driver, comprising:
The encrypted driving installation procedure is decrypted;
From the driving installation procedure after decryption read computer model information, and judge the computer model information with wait pacify
Whether the type for filling the computer of the driver is consistent;
If consistent, the driving installation procedure after executing the decryption installs the driver.
6. a kind of encryption device for driving installation procedure characterized by comprising
Module is write, for writing driving installation procedure;
Encrypting module, for being encrypted to the driving installation procedure.
7. device according to claim 6, which is characterized in that described device further include:
Writing module, for the driving installation procedure be written computer model information, the computer model information for
The model information of the driving matched computer of installation procedure.
8. device according to claim 6, which is characterized in that the encrypting module is specifically used for:
It by the driving installation procedure transcoding is the character not directly read using Base64 encryption algorithm.
9. a kind of mounting device of driver characterized by comprising
Module is write, for writing driver and driving installation procedure;
Encrypting module, for being encrypted to the driving installation procedure;
Module is installed, the driver is installed for executing encrypted driving installation procedure.
10. device according to claim 9, which is characterized in that the installation module is specifically used for:
The encrypted driving installation procedure is decrypted;
From the driving installation procedure after decryption read computer model information, and judge the computer model information with wait pacify
Whether the type for filling the computer of the driver is consistent;
If consistent, the driving installation procedure after executing the decryption installs the driver.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810979894.1A CN109240713A (en) | 2018-08-27 | 2018-08-27 | Drive the encryption method of installation procedure, the installation method and device of driver |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810979894.1A CN109240713A (en) | 2018-08-27 | 2018-08-27 | Drive the encryption method of installation procedure, the installation method and device of driver |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109240713A true CN109240713A (en) | 2019-01-18 |
Family
ID=65068421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810979894.1A Pending CN109240713A (en) | 2018-08-27 | 2018-08-27 | Drive the encryption method of installation procedure, the installation method and device of driver |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109240713A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266641A (en) * | 2019-05-13 | 2019-09-20 | 中国联合网络通信集团有限公司 | Information-reading method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101382894A (en) * | 2007-09-05 | 2009-03-11 | 北京软通科技有限责任公司 | Method, system, computer, and server for downloading computer hardware device driver |
CN102902910A (en) * | 2011-07-28 | 2013-01-30 | 腾讯科技(深圳)有限公司 | Method and system for drive protection |
EP2669838A2 (en) * | 2012-05-31 | 2013-12-04 | Fujitsu Limited | Information processing apparatus and information processing method |
CN106599729A (en) * | 2016-12-09 | 2017-04-26 | 郑州云海信息技术有限公司 | Safety verification method and system for driving program |
CN108363580A (en) * | 2018-03-12 | 2018-08-03 | 平安普惠企业管理有限公司 | Application program installation method, device, computer equipment and storage medium |
-
2018
- 2018-08-27 CN CN201810979894.1A patent/CN109240713A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101382894A (en) * | 2007-09-05 | 2009-03-11 | 北京软通科技有限责任公司 | Method, system, computer, and server for downloading computer hardware device driver |
CN102902910A (en) * | 2011-07-28 | 2013-01-30 | 腾讯科技(深圳)有限公司 | Method and system for drive protection |
EP2669838A2 (en) * | 2012-05-31 | 2013-12-04 | Fujitsu Limited | Information processing apparatus and information processing method |
CN106599729A (en) * | 2016-12-09 | 2017-04-26 | 郑州云海信息技术有限公司 | Safety verification method and system for driving program |
CN108363580A (en) * | 2018-03-12 | 2018-08-03 | 平安普惠企业管理有限公司 | Application program installation method, device, computer equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266641A (en) * | 2019-05-13 | 2019-09-20 | 中国联合网络通信集团有限公司 | Information-reading method and device |
CN110266641B (en) * | 2019-05-13 | 2021-08-17 | 中国联合网络通信集团有限公司 | Information reading method, system, device and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170295013A1 (en) | Method for fulfilling a cryptographic request requiring a value of a private key | |
CN100449558C (en) | Sleep protection | |
US8244609B2 (en) | Payment management on mobile devices | |
CN101930508B (en) | Safety treatment system | |
CN101231622B (en) | Data storage method and equipment base on flash memory, as well as data fetch method and apparatu | |
CN103988464A (en) | System and method for key management for issuer security domain using global platform specifications | |
AU2015390172B2 (en) | Usage control method and system for medical detection device and medical detection device | |
EP2919413A2 (en) | Data security verification method and device | |
CN103617394A (en) | SDK providing and invoking method and associated device | |
CN105893837B (en) | Application program installation method, security encryption chip and terminal | |
CN103294969A (en) | File system mounting method and file system mounting device | |
CN104486355A (en) | Method and device for preventing malicious manipulation of codes | |
CN110312054B (en) | Image encryption and decryption method, related device and storage medium | |
CN109284585A (en) | A kind of script encryption method, script decryption operation method and relevant apparatus | |
CN109190401A (en) | A kind of date storage method, device and the associated component of Qemu virtual credible root | |
CN110058867A (en) | The packing of application program mirror image, installation method and computer installation, storage medium | |
CN107315945B (en) | The disk decryption method and device of a kind of electronic equipment | |
CN109240713A (en) | Drive the encryption method of installation procedure, the installation method and device of driver | |
CN104933361A (en) | Device and method for protecting login password | |
CN110472429A (en) | Data verification method, device, electronic equipment and storage medium | |
WO2011152438A1 (en) | Information generation system and method therefor | |
CN116204211A (en) | Information processing method, device, equipment and computer readable storage medium | |
CN108830095A (en) | A kind of data encryption/decryption method and device | |
KR101276217B1 (en) | Data recovery system and method for hard disk using encryption scheme | |
CN110210189B (en) | Software verification method, software and hardware binding method and programmable device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |