CN110244976A - Application version switching method and device - Google Patents

Application version switching method and device Download PDF

Info

Publication number
CN110244976A
CN110244976A CN201910421991.3A CN201910421991A CN110244976A CN 110244976 A CN110244976 A CN 110244976A CN 201910421991 A CN201910421991 A CN 201910421991A CN 110244976 A CN110244976 A CN 110244976A
Authority
CN
China
Prior art keywords
application program
data
mentioned
encryption
version number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910421991.3A
Other languages
Chinese (zh)
Inventor
许剑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910421991.3A priority Critical patent/CN110244976A/en
Publication of CN110244976A publication Critical patent/CN110244976A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a kind of application version switching method and device, this method optimizes suitable for issuing process.This method comprises: obtaining the first data in the first application program, the first encryption data is decrypted based on corresponding first decryption software of the first encryption software to obtain the first ciphertext data, and the first version configuration information based on the first application program and the first ciphertext data generate the second application program;The second data in the second application program are encrypted based on the second encryption software, to obtain the second encryption data;The second edition configuration information of the first more new information and the second application program is obtained, the second encryption data, the first more new information and second edition configuration information are based on, generates third application program.Using the embodiment of the present invention, it can be achieved that data in application program carry out the smooth transfer in version handoff procedure in application program, avoids application program and carry out the case where data after version switching cannot be read, applicability is high.

Description

Application version switching method and device
Technical field
The present invention relates to mobile communication technology field more particularly to a kind of application version switching methods and device.
Background technique
With the continuous development of mobile communication technology, the various application programs for terminal device emerge one after another, greatly The function of terminal device is enriched, provides a variety of functions abundant for user.For same application, application program producer The application program of new version is released, often to increase the mistake of new function or the original program of amendment.
Meanwhile various application programs generally can all use third-party encryption software pair to guarantee secure user data Data in application program are encrypted, to protect user information not to be leaked.However switch different versions in application program In the process, once new version replaces encryption software, then there may be answer in new version for the user data in old edition application With cannot be read in program, incompatible situation, even result in the unavailable phenomenon of new edition application, for user bring it is very poor User experience.
Summary of the invention
The embodiment of the present invention provides a kind of application version switching method and relevant apparatus, it can be achieved that in application program Data application program carry out version handoff procedure in smooth transfer, avoid application program carry out version switching after data not The case where capable of reading, applicability are high.
In a first aspect, the embodiment of the present invention provides a kind of application version switching method, this method comprises:
The first data in the first application program are obtained, include being encrypted based on the first encryption software in above-mentioned first data The first encryption data arrived;
Above-mentioned first encryption data is decrypted to obtain based on corresponding first decryption software of above-mentioned first encryption software First version configuration information and above-mentioned first ciphertext data to the first ciphertext data, and based on above-mentioned first application program generate Second application program;
The second data in above-mentioned second application program are encrypted based on the second encryption software, to obtain the second encryption Data;
The second edition configuration information for obtaining the first more new information and above-mentioned second application program, based on above-mentioned second encryption Data, the above-mentioned first more new information and above-mentioned second edition configuration information generate third application program.
In embodiments of the present invention, the first encryption data is carried out by corresponding first decryption software of the first encryption software Decryption, ensure that the integrality for the first ciphertext data that decryption obtains, and avoid due to arbitrarily decryption software being used to add to first The data corruption of first ciphertext data caused by ciphertext data is encrypted.Third application program is generated based on more new information simultaneously When, the version switching of application program had both been completed, the smooth transition of data is also completed, stability is good, and applicability is high.
With reference to first aspect, in a kind of possible embodiment, the above-mentioned first edition based on above-mentioned first application program This configuration information and above-mentioned first ciphertext data generate the second application program:
When the version updating for receiving above-mentioned first application program is requested, obtains and carried in the request of above-mentioned version updating Second updates configuration information, and updates configuration information, above-mentioned first version configuration information and above-mentioned first based on above-mentioned second Ciphertext data generates the second application program.
In embodiments of the present invention, generation the can be made by the request of version updating based on the first application program received The version switching that the second application program is realized during two application programs, so that the version number of the second application program is more more Sample, can satisfy different demands of the different application in version handoff procedure, and the scope of application is wider.
With reference to first aspect, above-mentioned to be based on above-mentioned second encryption data, above-mentioned first in a kind of possible embodiment More new information and above-mentioned second edition configuration information, generating third application program includes:
The current version number for obtaining above-mentioned second application program carried in above-mentioned second edition configuration information, judges above-mentioned Whether current version number is target version number;
If above-mentioned current version number is not above-mentioned target version number, more based on above-mentioned second encryption data, above-mentioned first New information and above-mentioned second edition configuration information generate third application program;
Wherein, the version number of above-mentioned third application program is higher than the current version number of above-mentioned second application program.
It in embodiments of the present invention, can through the current version number to the second application program compared with target version number Further determine that whether need to carry out version switch step during generating third application program, so that third application program More meet application program manufacturer and the actual demand of user.It is limited by the version number to target version number, is also kept away simultaneously The version confusion problem being likely to occur in version handoff procedure is exempted from, so that version handoff procedure more accurate and effective.
It with reference to first aspect, include updating to match confidence in a kind of possible embodiment, in the above-mentioned first more new information Breath;
It is above-mentioned to be generated based on above-mentioned second encryption data, the above-mentioned first more new information and above-mentioned second edition configuration information Third application program includes:
Based on the current version number of above-mentioned second application program, above-mentioned target version is obtained from the above-mentioned first more new information Number corresponding update configuration information, above-mentioned target version number are any version number higher than above-mentioned current version number;
Third application is generated based on above-mentioned update configuration information, above-mentioned second encryption data and above-mentioned second configuration information Program, wherein the version number of above-mentioned third application program is above-mentioned target version number.
In embodiments of the present invention, by generating third application journey when update configuration information corresponding with target version number Version switching is completed during sequence, can when the version number of third application program that generates and target version number it is consistent, enhance The stability and accuracy of application version switching, applicability are higher.
With reference to first aspect, in a kind of possible embodiment, the above-mentioned first more new information is sky;
The above method further include:
If above-mentioned current version number is above-mentioned target version number, it is based on above-mentioned second encryption data and the above-mentioned second edition Configuration information generates third application program, wherein the version number of above-mentioned third application program works as with above-mentioned second application program Preceding version number is consistent.
In embodiments of the present invention, empty under the version number of the second application program and target version unanimous circumstances First more new information can make to switch when generating third application without version, avoid by update configuration extra in more new information Application version handover failure caused by information and unnecessary performance consumption, stability are higher.
With reference to first aspect, in a kind of possible embodiment, it is above-mentioned based on above-mentioned first encryption software corresponding the After above-mentioned first encryption data is decrypted to obtain the first ciphertext data in one decryption software, the above method further include:
Above-mentioned first ciphertext data is stored into database to obtain preliminary data;
When receiving the request for obtaining the third data in above-mentioned third application program, from spare in above-mentioned database Above-mentioned first ciphertext data is obtained in data, and above-mentioned first ciphertext data is determined as above-mentioned third data.
In embodiments of the present invention, preliminary data is obtained into database by storing the first ciphertext data, can need Directly obtained from preliminary data when obtaining related data, avoid time loss brought by unnecessary operating procedure and Performance loss, while preliminary data can also data to a certain extent in the application backup number is provided when something goes wrong According to flexibility is more preferable.
Second aspect, the embodiment of the invention provides a kind of application version switching device, which includes:
Acquiring unit includes being based on first in above-mentioned first data for obtaining the first data in the first application program The first encryption data that encryption software encrypts;
Decryption unit, for being obtained based on corresponding first decryption software of above-mentioned first encryption software to above-mentioned acquiring unit Above-mentioned first encryption data be decrypted to obtain the first ciphertext data, and the first version based on above-mentioned first application program Configuration information and above-mentioned first ciphertext data generate the second application program;
Encryption unit, for being encrypted based on the second encryption software to the second data in above-mentioned second application program, To obtain the second encryption data;
Generation unit, for obtaining the second edition configuration information of the first more new information and above-mentioned second application program, base Match confidence in above-mentioned second encryption data, the above-mentioned first more new information and the above-mentioned second edition that above-mentioned encryption unit obtains Breath generates third application program.
In conjunction with second aspect, in a kind of possible embodiment, above-mentioned generation unit receives above-mentioned first for working as When the version updating request of application program, obtains second carried in above-mentioned version updating request and update configuration information, and be based on Above-mentioned second, which updates configuration information, above-mentioned first version configuration information and above-mentioned first ciphertext data, generates second using journey Sequence.
In conjunction with second aspect, in a kind of possible embodiment, above-mentioned version switching device further include:
Judging unit, for obtaining the current version of above-mentioned second application program carried in above-mentioned second edition configuration information This number, judge whether above-mentioned current version number is target version number;
Above-mentioned generation unit, for adding based on above-mentioned second when above-mentioned current version number is not above-mentioned target version Ciphertext data, the above-mentioned first more new information and above-mentioned second edition configuration information generate third application program;
Wherein, the version number of above-mentioned third application program is higher than the current version number of above-mentioned second application program.
It include updating to match confidence in a kind of possible embodiment, in the above-mentioned first more new information in conjunction with second aspect Breath;
Above-mentioned acquiring unit, for the current version number based on above-mentioned second application program, from the above-mentioned first more new information Middle to obtain the corresponding update configuration information of above-mentioned target version number, above-mentioned target version number is appointing higher than above-mentioned current version number One version number;
Above-mentioned generation unit, for being matched based on above-mentioned update configuration information, above-mentioned second encryption data and above-mentioned second Confidence breath generates third application program, wherein the version number of above-mentioned third application program is above-mentioned target version number.
In conjunction with second aspect, in a kind of possible embodiment, the above-mentioned first more new information is sky;
Above-mentioned generation unit is also used to when above-mentioned current version number is above-mentioned target version, is added based on above-mentioned second Ciphertext data and above-mentioned second edition configuration information generate third application program, wherein the version number of above-mentioned third application program with The current version number of above-mentioned second application program is consistent.
In conjunction with second aspect, in a kind of possible embodiment, above-mentioned version switching device further include:
Storage unit, for storing above-mentioned first ciphertext data into database to obtain preliminary data;
Above-mentioned acquiring unit is also used to when receiving the request for obtaining the third data in above-mentioned third application program, Above-mentioned first ciphertext data is obtained from the preliminary data that said memory cells store, and above-mentioned first ciphertext data is determined as Above-mentioned third data.
In embodiments of the present invention, the first encryption data is carried out by corresponding first decryption software of the first encryption software Decryption, ensure that the integrality for the first ciphertext data that decryption obtains, and avoid due to arbitrarily decryption software being used to add to first The data corruption of first ciphertext data caused by ciphertext data is encrypted.Third application program is generated based on more new information simultaneously When, that is, the version switching of application program is completed, the smooth transition of data is also completed, stability is good, and applicability is high.
The third aspect, the embodiment of the invention provides a kind of terminal device, which includes processor and memory, The processor and memory are connected with each other.The memory for store support the terminal device execute above-mentioned first aspect and/or The computer program for the method that any possible implementation of first aspect provides, which includes program instruction, The processor is configured for calling above procedure instruction, executes above-mentioned first aspect and/or first aspect is any possible Method provided by embodiment.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage mediums Matter is stored with computer program, which is executed by processor to realize that above-mentioned first aspect and/or first aspect are appointed A kind of method provided by possible embodiment.
In embodiments of the present invention, the first encryption data is carried out by corresponding first decryption software of the first encryption software Decryption, ensure that the integrality for the first ciphertext data that decryption obtains, and avoid due to arbitrarily decryption software being used to add to first The data corruption of first ciphertext data caused by ciphertext data is encrypted.Third application program is generated based on more new information simultaneously When, the version switching of application program had both been completed, the smooth transition of data is also completed, stability is good, and applicability is high.In this hair In bright embodiment, Backup Data can avoid time loss brought by unnecessary operating procedure and performance loss, while can also Data in the application provide Backup Data when something goes wrong to a certain extent, and flexibility is more preferable.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is the flow diagram of application version switching method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram provided in an embodiment of the present invention for generating third application program;
Fig. 3 is the structural schematic diagram of application version switching device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
(description for convenience, can the abbreviation embodiment of the present invention for application version switching method provided in an embodiment of the present invention The method of offer) it is applicable to the application program in various terminal equipment, herein with no restrictions.Side provided in an embodiment of the present invention Method can be when carrying out version switching for application program, by the data smooth transition in the application program of current version to another version Application program in, it is not simultaneous to avoid data after the completion of the error in data generated in version handoff procedure and version switch Hold, not available problem, flexibility is high, applied widely.It, below can be with a certain in a certain terminal device for convenience of description For application program, method provided in an embodiment of the present invention is illustrated.
Below in conjunction with Fig. 1 to Fig. 4 respectively to application version switching method provided in an embodiment of the present invention and correlation Device is illustrated.
It is the flow diagram of application version switching method provided in an embodiment of the present invention referring to Fig. 1, Fig. 1.This hair The method that bright embodiment provides may include following steps S11-S14.
S11, the first data in the first application program are obtained, includes being added in above-mentioned first data based on the first encryption software Close the first obtained encryption data.
It in some possible embodiments, can be from above-mentioned when obtaining the first data in above-mentioned first application program The local of above-mentioned first application program is obtained in the corresponding local storage region of terminal device of first application program where it Data.Wherein the local data of above-mentioned first application program can actively be provided by user, can also be mentioned based on third party's data Tool is taken to directly acquire, specific acquisition modes are herein with no restrictions.In addition, in the local data for obtaining above-mentioned first application program While, the network data of above-mentioned first application program can also be obtained.It optionally, can be by including but is not limited to various crawlers The packet catchers such as software, Fiddler, BurpSuite, HttpWatch and Wireshark obtain above-mentioned first application program Network data specifically obtains the implementation of the network data of first application program herein with no restrictions.Optionally, above-mentioned The local data of first application program can store for user into local storage region picture, video, historical record, personal letter Breath and the setting data of application program etc., herein with no restrictions.Optionally, the network data of above-mentioned first application program can be with For the network data generated by behaviors such as search, downloading, use, management and backups that user stores beyond the clouds, do not do herein Limitation.The local data and network data of the first application program are obtained in several ways, so that the local data and net that obtain Network data are more comprehensive, also improve the flexibility for obtaining local data and network data to a certain extent.
In some possible embodiments, since the safety of the design requirement of application program and present network data needs Ask, most of application program manufacturers when issuing the application program of a certain version, all can using this manufacturer or it is third-party plus Close software encrypts the partial data in the application program of publication.Therefore in the local data for obtaining above-mentioned first application program After network data, the encrypted data filtered out from the local data and network data got are needed, i.e., by first First encryption data of encryption software encryption.Wherein, the implementation employed in screening process is herein with no restrictions.
It should be strongly noted that since application program carries out the safety and accuracy in version handoff procedure to data There is higher requirement, therefore after the local data and network data for getting above-mentioned first application program, it can be to above-mentioned The local data and network data of one application program carry out data screening.By data screening, by above-mentioned local data and above-mentioned User in network data selects the data deleted and user in the rubbish generated on the net by behaviors such as search, browsing and downloadings Data delete, avoid because local data and/or network data the unnecessary time loss of the excessive bring of data volume and Performance loss.In addition, after the local data and network data progress data screening to above-mentioned first application program, to above-mentioned two Kind data carry out Information Security detection, to avoid the use due to caused by dangerous data in subsequent version handoff procedure User data safety problem.
S12, above-mentioned first encryption data is decrypted based on corresponding first decryption software of above-mentioned first encryption software To obtain the first ciphertext data, and the first version configuration information based on above-mentioned first application program and above-mentioned first ciphertext data Generate the second application program.
In some possible embodiments, it when above-mentioned first application program is when carrying out version switching, needs to abandon original Some cipher modes or need using new encryption software data are encrypted when, need to obtain above-mentioned first encryption data institute Corresponding first decryption software of the first encryption software used.Getting, corresponding first decryption of above-mentioned first encryption software is soft After part, above-mentioned first encryption data could be decrypted by above-mentioned first decryption software, obtain the first ciphertext data.
For example, the data in social activity APP are used A encryption software when above-mentioned first application program is a certain social activity APP After encryption, a encryption data is obtained.When needing that a encryption data is decrypted, need using the corresponding B decryption of A encryption software A encryption data is decrypted in software, obtains b ciphertext data.At this point, if being solved using C decryption software to a encryption data It is close, since the manner of decryption of C decryption software and the manner of decryption of B decryption software are different or not exactly the same, then will appear using C A encryption data can not be decrypted in decryption software, or can only carry out part decryption to a encryption data using C decryption software, To which the total data after the decryption of a encryption data can not be obtained completely.
In some possible embodiments, after getting above-mentioned first ciphertext data, above-mentioned first can be obtained and answered Configuration information and above-mentioned first is generated with the first version configuration information of program, and according to above-mentioned first version configuration information First primary application program of application-consistent.Specifically, for first primary application program in addition to not including data, remaining is each Item configuration is with above-mentioned first application program without any difference.It, can be according to data after obtaining above-mentioned first primary application program Storage rule stores above-mentioned first ciphertext data correspondence into the different storage locations of above-mentioned first application program, can also be according to Data storage rule stores above-mentioned first ciphertext data and the clear data obtained from above-mentioned first application program together To in above-mentioned first primary application program, specific storage mode is determined by real-life program, herein with no restrictions.To above-mentioned After first ciphertext data and/or clear data storage finish, i.e., above-mentioned first primary application program is determined as second and answered Use program.Optionally, it can not generated at the beginning of above-mentioned first according to above-mentioned first version configuration information and above-mentioned first ciphertext data In the case where beginning application program, above-mentioned second application program of parallel generation, specific implementation is herein with no restrictions.
In some feasible real-time modes, after obtaining above-mentioned first ciphertext data, if receiving above-mentioned at this time When the version updating request of one application program, it can first obtain second carried in above-mentioned version updating request and update configuration information. After the first primary application program after above-mentioned first ciphertext data to be obtained and/or clear data storage, according to above-mentioned Above-mentioned first primary application program is upgraded to above-mentioned second application program by the second update configuration information.Optionally, in acquisition After stating the second update configuration information carried in version updating request, configuration information can be updated according to above-mentioned second, according to upper First version configuration information and above-mentioned first ciphertext data are stated on not generating above-mentioned first primary application program and parallel generation The second application program when stating the second application program, after directly obtaining edition upgrading.The version of above-mentioned second application program at this time Number it is higher than above-mentioned first application program, i.e., the version number of above-mentioned first application program is lowest version number, above-mentioned second application program Version number be top version number.Optionally, since the second above-mentioned application program is in application version handoff procedure One intermediate application program to play a transition role, thus it is general not to user's publication in actual application version handoff procedure Above-mentioned second application program.It actively can be issued by user according to the demand of user under special circumstances and obtain above-mentioned second application The request of program simultaneously obtains above-mentioned second application program.
S13, the second data in above-mentioned second application program are encrypted based on the second encryption software, to obtain second Encryption data.
In some possible embodiments, since the data in obtained the second application program are in unencrypted state, Therefore after obtaining above-mentioned second application program, the second data in above-mentioned second application program are carried out using the second encryption software Encryption.Wherein, above-mentioned second encryption software is the target encryption software that original encryption software is substituted in version handoff procedure, and Added using the cipher mode that the second encryption software encrypts the second data in above-mentioned second application program by above-mentioned second Close software is determining, herein with no restrictions.By using the second encryption software to the second data in the second above-mentioned application program It is encrypted and obtains the second encryption data, while ensure that data integrity, realize the number in version handoff procedure According to the switching of cipher mode.
For example, above-mentioned second application program is the second shopping APP that certain shopping APP is generated in version handoff procedure, when The developer of shopping APP determines shopping APP after completing version switching, and the data in shopping APP have used D to encrypt Software is encrypted.Then after obtaining the second shopping APP, the data in the second shopping APP are added using D encryption software It is close, to obtain d encryption data.The d encryption data is obtained final version after shopping APP completes version switching at this time Shopping APP in encrypted data.
S14, the second edition configuration information for obtaining the first more new information and above-mentioned second application program are based on above-mentioned second Encryption data, the above-mentioned first more new information and above-mentioned second edition configuration information generate third application program.
In some feasible real-time modes, due to only with the second encryption software in above-mentioned second application program Two data are encrypted, and the second encryption data has been had to, and do not obtain the application program of final version handover success.Therefore After obtaining above-mentioned second encryption data, need to obtain the second edition configuration of the first more new information and above-mentioned second application program Information, and it is based on above-mentioned second encryption data, the above-mentioned first more new information and above-mentioned second edition configuration information, generate third Application program.It is the flow diagram provided in an embodiment of the present invention for generating third application program please also refer to Fig. 2, Fig. 2.This Inventive embodiments provide generations third application program method can as follows S21-S23 provide implementation progress Explanation.
S21, the current version number for obtaining the second application program carried in second edition configuration information judge above-mentioned current Whether version number is target version number.
Third application in some feasible real-time modes, due to application program manufacturer and/or user to ultimately generating The version of program has a different demands in varied situations, therefore before generating above-mentioned third application program, can first obtain the The second edition configuration information of one more new information and above-mentioned second application program, and obtain and taken in above-mentioned second edition configuration information The current version number of second application program of band.Whether the current version number for judging above-mentioned second application program at this time is target version This number, if the current version number of above-mentioned second application program is not target version number, generating above-mentioned third application program It needs to carry out edition upgrading in the process so that the version number of above-mentioned third application program is higher than the current of above-mentioned second application program Version number.If the current version number of above-mentioned second application program is target version number, above-mentioned third application program is being generated Edition upgrading is not needed to carry out in the process, that is, in the version number of the third application program generated and above-mentioned second edition configuration information The current version number of the second application program carried is consistent.Need to illustrate when, above-mentioned target version number, which can be, to be higher than Any version number of the current version number of above-mentioned second application program is not necessarily latest edition number, above-mentioned target version number It selects to be determined by the specific requirements that practical version switches, herein with no restrictions.
For example, it is assumed that the version number of above-mentioned second application program is 1.0.1, when above-mentioned target version number is 1.0.5, then Need to carry out edition upgrading during generating above-mentioned third application program, and the version number of the third application program generated is 1.0.5.When above-mentioned target version number is 1.0.1, then do not need to carry out version during generating above-mentioned third application program This upgrading, and the version number of the third application program generated is 1.0.1.Optionally, above-mentioned version number can be version number 1.0.1 Any version number into 1.0.5 (assuming that 1.0.5 is maximum version number), determines with specific reference to actual demand, does not limit herein System.
S22, when above-mentioned current version number is not above-mentioned target version, the current version based on above-mentioned second application program This number, the corresponding update configuration information of above-mentioned target version number is obtained from the above-mentioned first more new information.
It in some possible embodiments, is not above-mentioned target version in the current version number of above-mentioned second application program Number, i.e., need to carry out edition upgrading the version so that above-mentioned third application program during generating above-mentioned third application program Number be higher than above-mentioned second application program current version number in the case where, need to obtain above-mentioned mesh from the above-mentioned first more new information Mark the corresponding update configuration information of version number.
S23, third is generated based on above-mentioned update configuration information, above-mentioned second encryption data and above-mentioned second configuration information Application program.
In some possible embodiments, when needs need to carry out version during generating above-mentioned third application program It, can first basis when this upgrading is so that the version number of above-mentioned third application program is higher than the current version of above-mentioned second application program Above-mentioned second encryption data is stored to above-mentioned second after the second primary application program of above-mentioned second configuration information generation and is initially answered With program, above-mentioned second primary application program is subjected to edition upgrading further according to above-mentioned update configuration information, obtains third application Program.Optionally, after first can also generating the second primary application program according to above-mentioned second configuration information, matched according to above-mentioned update Above-mentioned second primary application program is carried out edition upgrading by confidence breath, then above-mentioned second encryption data is stored to edition upgrading The second primary application program after obtain third application program.It optionally, can also be by above-mentioned according to above-mentioned second configuration information Generate application program, above-mentioned second encryption data of storage and according to above-mentioned update configuration information carry out edition upgrading and etc. simultaneously Row carries out, and directly obtains third application program.Specific implementation determines by the actual demand that application version switches, herein With no restrictions.
In some possible embodiments, when do not needed during generating above-mentioned third application program carry out version When upgrading, at this time above-mentioned update configuration information be sky, i.e., do not needed during generating above-mentioned third application program it is any more New configuration information.At this point, can first according to above-mentioned second configuration information generate the second primary application program after, then will above-mentioned second add Ciphertext data is stored to above-mentioned second primary application program, obtains third application program.It optionally, can also be by above-mentioned according to above-mentioned Second configuration information generates application program and the parallel progress of above-mentioned second encryption data of storage, directly obtains third application Program.Specific implementation is determined by the actual demand that application version switches, and herein with no restrictions, while being passed through asynchronous Rapid different realizations sequence and different implementations, so that during generating above-mentioned third application program, it can be according to reality Version handoff environment selects the generating mode being more suitable, and adaptability is good, and flexibility is high.
In some possible embodiments, corresponding first decryption software of above-mentioned first encryption software is being based on to above-mentioned First encryption data is decrypted after obtaining the first ciphertext data, by above-mentioned first ciphertext data and can store to Data Air, Obtain preliminary data.It, can be directly from spare number when receiving the request for obtaining the third data in above-mentioned third application program According to above-mentioned first ciphertext data of middle acquisition and above-mentioned first program data is determined as the third number in above-mentioned third application program According to.Need to illustrate when, the third data in the above-mentioned above-mentioned third application program of acquisition can be used for include but is not limited to Data analysis, safety monitoring and the operation such as the 4th application program is generated based on above-mentioned third data, herein with no restrictions.
In embodiments of the present invention, the first encryption data is carried out by corresponding first decryption software of the first encryption software Decryption, ensure that the integrality for the first ciphertext data that decryption obtains, and avoid due to arbitrarily decryption software being used to add to first The data corruption of first ciphertext data caused by ciphertext data is encrypted.Both the version switching for having completed application program, is also completed The smooth transitions of data.It, can be into one simultaneously through the current version number to the second application program compared with target version number Whether step determination needs to carry out edition upgrading step during generating third application program, so that third application program more accords with The actual demand for closing application program manufacturer and user, also avoids the version confusion problem being likely to occur in version handoff procedure, So that version handoff procedure more accurate and effective.In addition, can also to a certain extent in the application by preliminary data Data provide Backup Data when something goes wrong, avoid unnecessary performance consumption, and stability is higher, and flexibility is more preferable, are applicable in Range is wider.
It is the structural schematic diagram of application version switching device provided in an embodiment of the present invention referring to Fig. 3, Fig. 3.This hair The application version switching device that bright embodiment provides includes:
Acquiring unit 31 includes based on for obtaining the first data in the first application program, in above-mentioned first data The first encryption data that one encryption software encrypts;
Decryption unit 32, for being based on corresponding first decryption software of above-mentioned first encryption software to above-mentioned acquiring unit 31 Above-mentioned first encryption data obtained is decrypted to obtain the first ciphertext data, and first based on above-mentioned first application program Version configuration information and above-mentioned first ciphertext data generate the second application program;
Encryption unit 33, for being added based on the second encryption software to the second data in above-mentioned second application program It is close, to obtain the second encryption data;
Generation unit 34, for obtaining the second edition configuration information of the first more new information and above-mentioned second application program, Above-mentioned second encryption data, the above-mentioned first more new information and the configuration of the above-mentioned second edition obtained based on above-mentioned encryption unit 33 Information generates third application program.
In some possible embodiments, above-mentioned generation unit 34 receives above-mentioned first application program for working as When version updating is requested, obtains second carried in above-mentioned version updating request and update configuration information, and more based on above-mentioned second New configuration information, above-mentioned first version configuration information and above-mentioned first ciphertext data generate the second application program.
In some possible embodiments, above-mentioned version switching device further include:
Judging unit 35, for obtaining the current of above-mentioned second application program carried in above-mentioned second edition configuration information Version number judges whether above-mentioned current version number is target version number;
Above-mentioned generation unit 34, for being based on above-mentioned second when above-mentioned current version number is not above-mentioned target version Encryption data, the above-mentioned first more new information and above-mentioned second edition configuration information generate third application program;
Wherein, the version number of above-mentioned third application program is higher than the current version number of above-mentioned second application program.
It in some possible embodiments, include updating configuration information in the above-mentioned first more new information;
Above-mentioned acquiring unit 31 updates letter from above-mentioned first for the current version number based on above-mentioned second application program The corresponding update configuration information of above-mentioned target version number is obtained in breath, above-mentioned target version number is higher than above-mentioned current version number Any version number;
Above-mentioned generation unit 34, for being based on above-mentioned update configuration information, above-mentioned second encryption data and above-mentioned second Configuration information generates third application program, wherein the version number of above-mentioned third application program is above-mentioned target version number.
In some possible embodiments, the above-mentioned first more new information is sky;
Above-mentioned generation unit 34 is also used to when above-mentioned current version number is above-mentioned target version, is based on above-mentioned second Encryption data and above-mentioned second edition configuration information generate third application program, wherein the version number of above-mentioned third application program It is consistent with the current version number of above-mentioned second application program.
In some possible embodiments, above-mentioned version switching device further include:
Storage unit 36, for storing above-mentioned first ciphertext data into database to obtain preliminary data;
Above-mentioned acquiring unit 31 is also used to when the request for receiving the third data in the above-mentioned third application program of acquisition When, above-mentioned first ciphertext data is obtained from the preliminary data that said memory cells 36 store, and by above-mentioned first ciphertext data It is determined as above-mentioned third data.
In the specific implementation, above-mentioned application version switching device can be executed as above by each functional module built in it Fig. 1 implementation provided by each step into Fig. 2.For example, above-mentioned acquiring unit 31 can be used for obtaining the first application program In the first data, include the realizations sides such as the first encryption data encrypted based on the first encryption software in above-mentioned first data Formula, for details, reference can be made to implementations provided by above-mentioned each step, and details are not described herein.Above-mentioned decryption unit 32, can be used for Above-mentioned first encryption data that above-mentioned acquiring unit 31 is obtained based on corresponding first decryption software of above-mentioned first encryption software It is decrypted to obtain the first ciphertext data, and the first version configuration information based on above-mentioned first application program and above-mentioned first Ciphertext data generates second application program and other implementations, for details, reference can be made to implementation provided by above-mentioned each step, This is repeated no more.Above-mentioned encryption unit 33 can be used for for based on the second encryption software to second in above-mentioned second application program Data are encrypted, and to obtain second encryption data and other implementations, for details, reference can be made to realize provided by above-mentioned each step Mode, details are not described herein.Above-mentioned generation unit 34 can be used for obtaining the of the first more new information and above-mentioned second application program Two version configuration informations, above-mentioned second encryption data obtained based on above-mentioned encryption unit 33, the above-mentioned first more new information and Above-mentioned second edition configuration information generates third application program and other implementations, and for details, reference can be made to above-mentioned each steps to be provided Implementation, details are not described herein.Above-mentioned judging unit 35 can be used for taking for obtaining in above-mentioned second edition configuration information The current version number of above-mentioned second application program of band judges whether above-mentioned current version number is the realizations sides such as target version number Formula, for details, reference can be made to implementations provided by above-mentioned each step, and details are not described herein.Said memory cells can be used for will be upper It states the first ciphertext data to store into database to obtain preliminary data and other implementations, for details, reference can be made to above-mentioned each step institutes The implementation of offer, details are not described herein.
In embodiments of the present invention, the first encryption data is carried out by corresponding first decryption software of the first encryption software Decryption, ensure that the integrality for the first ciphertext data that decryption obtains, and avoid due to arbitrarily decryption software being used to add to first The data corruption of first ciphertext data caused by ciphertext data is encrypted.Both the version switching for having completed application program, is also completed The smooth transitions of data.It, can be into one simultaneously through the current version number to the second application program compared with target version number Whether step determination needs to carry out version switch step during generating third application program, so that third application program more accords with The actual demand for closing application program manufacturer and user, also avoids the version confusion problem being likely to occur in version handoff procedure, So that version handoff procedure more accurate and effective.In addition, can also to a certain extent in the application by preliminary data Data provide Backup Data when something goes wrong, avoid unnecessary performance consumption, and stability is higher, and flexibility is more preferable, are applicable in Range is wider.
Referring to fig. 4, Fig. 4 is the structural schematic diagram of terminal device provided in an embodiment of the present invention.As shown in figure 4, this implementation Terminal device in example may include: one or more processors 41 and memory 42.Above-mentioned processor 41 and memory 42 are logical Cross the connection of bus 43.Memory 42 is for storing computer program, which includes program instruction, and processor 41 is used for The program instruction that memory 42 stores is executed, is performed the following operations:
The first data in the first application program are obtained, include being encrypted based on the first encryption software in above-mentioned first data The first encryption data arrived;
Above-mentioned first encryption data is decrypted to obtain based on corresponding first decryption software of above-mentioned first encryption software First version configuration information and above-mentioned first ciphertext data to the first ciphertext data, and based on above-mentioned first application program generate Second application program;
The second data in above-mentioned second application program are encrypted based on the second encryption software, to obtain the second encryption Data;
The second edition configuration information for obtaining the first more new information and above-mentioned second application program, based on above-mentioned second encryption Data, the above-mentioned first more new information and above-mentioned second edition configuration information generate third application program.
In some possible embodiments, above-mentioned processor 41 is used for:
When the version updating for receiving above-mentioned first application program is requested, obtains and carried in the request of above-mentioned version updating Second updates configuration information, and updates configuration information, above-mentioned first version configuration information and above-mentioned first based on above-mentioned second Ciphertext data generates the second application program.
In some possible embodiments, above-mentioned processor 41 is used for:
The current version number for obtaining above-mentioned second application program carried in above-mentioned second edition configuration information, judges above-mentioned Whether current version number is target version number;
If above-mentioned current version number is not above-mentioned target version number, more based on above-mentioned second encryption data, above-mentioned first New information and above-mentioned second edition configuration information generate third application program;
Wherein, the version number of above-mentioned third application program is higher than the current version number of above-mentioned second application program.
In some possible embodiments, above-mentioned processor 41 is used for:
Based on the current version number of above-mentioned second application program, above-mentioned target version is obtained from the above-mentioned first more new information Number corresponding update configuration information, above-mentioned target version number are any version number higher than above-mentioned current version number;
Third application is generated based on above-mentioned update configuration information, above-mentioned second encryption data and above-mentioned second configuration information Program, wherein the version number of above-mentioned third application program is above-mentioned target version number.
In some possible embodiments, above-mentioned processor 41 is also used to:
If above-mentioned current version number is above-mentioned target version number, it is based on above-mentioned second encryption data and the above-mentioned second edition Configuration information generates third application program, wherein the version number of above-mentioned third application program works as with above-mentioned second application program Preceding version number is consistent.
In some possible embodiments, above-mentioned processor 41 is also used to:
Above-mentioned first ciphertext data is stored into database to obtain preliminary data;
When receiving the request for obtaining the third data in above-mentioned third application program, from spare in above-mentioned database Above-mentioned first ciphertext data is obtained in data, and above-mentioned first ciphertext data is determined as above-mentioned third data.
It should be appreciated that in some possible embodiments, above-mentioned processor 41 can be central processing unit (central processing unit, CPU), which can also be other general processors, digital signal processor (digital signal processor, DSP), specific integrated circuit (application specific integrated Circuit, ASIC), ready-made programmable gate array (field-programmable gate array, FPGA) or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor Or the processor is also possible to any conventional processor etc..
The memory 42 may include read-only memory and random access memory, and provide instruction sum number to processor 41 According to.The a part of of memory 42 can also include nonvolatile RAM.It is set for example, memory 42 can also store The information of standby type.
In the specific implementation, above-mentioned terminal device can be executed by each functional module built in it if above-mentioned Fig. 1 is into Fig. 2 Implementation provided by each step, for details, reference can be made to implementations provided by above-mentioned each step, and details are not described herein.
In embodiments of the present invention, pass through the steady mistake of realization data during carrying out version switching to application program It crosses, avoids due to arbitrarily using decryption software to carry out encryption and/or arbitrarily carry out encrypting caused data using encryption software The case where imperfect and data corruption.Meanwhile the version switching mode of a variety of application programs also avoids in version handoff procedure The version confusion problem being likely to occur, so that version handoff procedure more accurate and effective.In addition, can also be one by preliminary data Determine the data in degree in the application and Backup Data is provided when something goes wrong, avoid unnecessary performance consumption, stablizes Property is higher, and flexibility is more preferable, and the scope of application is wider.
The embodiment of the present invention also provides a kind of computer readable storage medium, which has meter Calculation machine program, the computer program include program instruction, which realizes that Fig. 1 is each into Fig. 2 when being executed by processor Application version switching method provided by step, for details, reference can be made to implementations provided by above-mentioned each step, herein It repeats no more.
Above-mentioned computer readable storage medium can be the Task Processing Unit or above-mentioned that aforementioned any embodiment provides The internal storage unit of terminal device, such as the hard disk or memory of electronic equipment.The computer readable storage medium is also possible to The plug-in type hard disk being equipped on the External memory equipment of the electronic equipment, such as the electronic equipment, intelligent memory card (smart Media card, SMC), secure digital (secure digital, SD) card, flash card (flash card) etc..Above-mentioned computer Readable storage medium storing program for executing can also include magnetic disk, CD, read-only memory (read-only memory, ROM) or deposit at random Store up memory body (random access memory, RAM) etc..Further, which can also both wrap The internal storage unit for including the electronic equipment also includes External memory equipment.The computer readable storage medium is by storing based on this Other programs and data needed for calculation machine program and the electronic equipment.The computer readable storage medium can be also used for temporarily Ground stores the data that has exported or will export.
Claims of the present invention and term " first " in specification and attached drawing, " second " etc. are for distinguishing difference Object is not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It covers and non-exclusive includes.Such as it contains the process, method, system, product or equipment of a series of steps or units and does not limit Due to listed step or unit, but optionally further comprising the step of not listing or unit, or optionally further comprising it is right In the intrinsic other step or units of these process, methods, product or equipment.Referenced herein " embodiment " is it is meant that knot The a particular feature, structure, or characteristic for closing embodiment description may include at least one embodiment of the present invention.In specification In each position show that the phrase might not each mean identical embodiment, nor the independence with other embodiments mutual exclusion Or alternative embodiment.Those skilled in the art explicitly and implicitly understand, embodiment described herein can be with It is combined with other embodiments.Refer in description of the invention to term "and/or" used in the appended claims related Join any combination and all possible combinations of one or more of item listed, and including these combinations.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (10)

1. a kind of application version switching method, which is characterized in that the described method includes:
The first data in the first application program are obtained, include being encrypted based on the first encryption software in first data First encryption data;
First encryption data is decrypted based on corresponding first decryption software of first encryption software to obtain One ciphertext data, and the first version configuration information based on first application program and first ciphertext data generate second Application program;
The second data in second application program are encrypted based on the second encryption software, to obtain the second encryption number According to;
The second edition configuration information for obtaining the first more new information and second application program, based on the second encryption number According to, the described first more new information and the second edition configuration information, third application program is generated.
2. the method according to claim 1, wherein the first version based on first application program is matched Confidence breath and first ciphertext data generate the second application program:
When the version updating for receiving first application program is requested, second carried in the version updating request is obtained Configuration information is updated, and updates configuration information, the first version configuration information and first decryption based on described second Data generate the second application program.
3. method according to claim 1 or 2, which is characterized in that described to be based on second encryption data, described first More new information and the second edition configuration information, generating third application program includes:
The current version number for obtaining second application program carried in the second edition configuration information judges described current Whether version number is target version number;
If the current version number is not the target version number, letter is updated based on second encryption data, described first Breath and the second edition configuration information generate third application program;
Wherein, the version number of the third application program is higher than the current version number of second application program.
4. according to the method described in claim 3, it is characterized in that, including updating configuration information in the described first more new information;
It is described that third is generated based on second encryption data, the described first more new information and the second edition configuration information Application program includes:
Based on the current version number of second application program, it is right from the described first more new information to obtain the target version number The update configuration information answered, the target version number are any version number higher than the current version number;
Third application journey is generated based on the update configuration information, second encryption data and second configuration information Sequence, wherein the version number of the third application program is the target version number.
5. according to the method described in claim 3, it is characterized in that, the described first more new information is sky;
The method also includes:
If the current version number is the target version number, configured based on second encryption data and the second edition Information generates third application program, wherein the current version of the version number of the third application program and second application program This number consistent.
6. method according to any one of claims 1 to 5, which is characterized in that described to be based on first encryption software pair After first encryption data is decrypted to obtain the first ciphertext data in the first decryption software answered, the method is also wrapped It includes:
First ciphertext data is stored into database to obtain preliminary data;
When receiving the request for obtaining the third data in the third application program, preliminary data from the database It is middle to obtain first ciphertext data, and first ciphertext data is determined as the third data.
7. a kind of application version switching device, which is characterized in that the version switching device includes:
Acquiring unit includes based on the first encryption for obtaining the first data in the first application program, in first data The first encryption data that software cryptography obtains;
Decryption unit, the institute for being obtained based on corresponding first decryption software of first encryption software to the acquiring unit It states the first encryption data to be decrypted to obtain the first ciphertext data, and is configured based on the first version of first application program Information and first ciphertext data generate the second application program;
Encryption unit, for being encrypted based on the second encryption software to the second data in second application program, with To the second encryption data;
Generation unit is based on institute for obtaining the second edition configuration information of the first more new information and second application program Second encryption data, the described first more new information and the second edition configuration information that encryption unit obtains are stated, it is raw At third application program.
8. version switching device according to claim 7, which is characterized in that the version switching device further include:
Judging unit, for obtaining the current version of second application program carried in the second edition configuration information Number, judge whether the current version number is target version number;
The generation unit, for encrypting number based on described second when the current version number is not the target version Third application program is generated according to, the described first more new information and the second edition configuration information;
Wherein, the version number of the third application program is higher than the current version number of second application program.
9. a kind of terminal device, which is characterized in that including processor and memory, the processor and memory are connected with each other;
The memory is for storing computer program, and the computer program includes program instruction, and the processor is configured For calling described program to instruct, as the method according to claim 1 to 6 is executed.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program are executed by processor to realize method described in claim 1 to 6 any one.
CN201910421991.3A 2019-05-21 2019-05-21 Application version switching method and device Pending CN110244976A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910421991.3A CN110244976A (en) 2019-05-21 2019-05-21 Application version switching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910421991.3A CN110244976A (en) 2019-05-21 2019-05-21 Application version switching method and device

Publications (1)

Publication Number Publication Date
CN110244976A true CN110244976A (en) 2019-09-17

Family

ID=67884689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910421991.3A Pending CN110244976A (en) 2019-05-21 2019-05-21 Application version switching method and device

Country Status (1)

Country Link
CN (1) CN110244976A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1906576A (en) * 2004-09-20 2007-01-31 索尼计算机娱乐公司 Methods and apparatus for distributing software applications
CN101901160A (en) * 2010-08-11 2010-12-01 中兴通讯股份有限公司 Packing method and device of version upgrading software package
CN104965712A (en) * 2015-07-17 2015-10-07 北京奇虎科技有限公司 Application reinforcing protection method and apparatus and mobile terminal
US20160283728A1 (en) * 2015-03-26 2016-09-29 Microsoft Technology Licensing, Llc Database server and client for query processing on encrypted data
US20180060607A1 (en) * 2016-08-30 2018-03-01 Winbond Electronics Corporation Anti-Rollback Version Upgrade in Secured Memory Chip
CN109358883A (en) * 2018-11-05 2019-02-19 珠海格力电器股份有限公司 Program upgrading method, system, application system and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1906576A (en) * 2004-09-20 2007-01-31 索尼计算机娱乐公司 Methods and apparatus for distributing software applications
CN101901160A (en) * 2010-08-11 2010-12-01 中兴通讯股份有限公司 Packing method and device of version upgrading software package
WO2012019395A1 (en) * 2010-08-11 2012-02-16 中兴通讯股份有限公司 Packing method and device for version upgrade software package
US20160283728A1 (en) * 2015-03-26 2016-09-29 Microsoft Technology Licensing, Llc Database server and client for query processing on encrypted data
CN104965712A (en) * 2015-07-17 2015-10-07 北京奇虎科技有限公司 Application reinforcing protection method and apparatus and mobile terminal
US20180060607A1 (en) * 2016-08-30 2018-03-01 Winbond Electronics Corporation Anti-Rollback Version Upgrade in Secured Memory Chip
CN109358883A (en) * 2018-11-05 2019-02-19 珠海格力电器股份有限公司 Program upgrading method, system, application system and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WARREN HE ET AL.: "ShadowCrypt: Encrypted Web Applications for Everyone", 《CCS \'14: PROCEEDINGS OF THE 2014 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY》, 3 November 2014 (2014-11-03), pages 1028 - 1039, XP058696782, DOI: 10.1145/2660267.2660326 *
刘北胜;王彤;王辉麟;陈长春;白根亮;王志华;刘洋;: "铁路工地拌和站生产信息采集终端软件开发与应用", 北京交通大学学报, no. 05, 15 October 2015 (2015-10-15), pages 58 - 64 *

Similar Documents

Publication Publication Date Title
CN106981004A (en) Equipment, method and system for the autonomous selection to goods providers
CN108932410A (en) A kind of digital resource copyright method for authenticating, device, system and storage medium
CN108270739B (en) Method and device for managing encryption information
CN109669717A (en) Data processing method, device, equipment and storage medium based on deployment platform
CN108830113A (en) A kind of acquisition methods of Android device unique identification
CN114416121A (en) Firmware burning method and device, burning equipment and firmware burning system
CN102799815B (en) A kind of method and apparatus of safe loading procedure storehouse
CN109743160A (en) Prevent the Android device unique identification acquisition methods and device of Hook falsification
WO2023115996A1 (en) Model protection method and apparatus, data processing method and apparatus, and device and medium
CN109241357A (en) Chain structure model and its construction method, system and terminal device
CN113961226B (en) Software development kit repairing method, terminal, server and equipment
CN111258756A (en) Load balancing method and device, computer equipment and readable storage medium
CN108763401A (en) A kind of reading/writing method and equipment of file
CN107248910A (en) Method for security protection and equipment
CN113704818A (en) Key management method and device for encrypted data storage system and terminal equipment
CN108228218A (en) A kind of electric terminal method for upgrading system and device
CN110244976A (en) Application version switching method and device
CN115221183A (en) Data processing method and device
CN110232570B (en) Information supervision method and device
CN109240804B (en) Method and device for managing disk resources of virtual machine
CN115118520B (en) Data processing method, device and server
CN107085900B (en) Data processing method, device, system and POS terminal
CN111881474B (en) Private key management method and device based on trusted computing environment
CN114915469A (en) Method and device for smoothly switching application system secret keys
CN112311536B (en) Key hierarchical management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination