CN110278267B - Method and system for limiting use of industrial internet APP - Google Patents

Method and system for limiting use of industrial internet APP Download PDF

Info

Publication number
CN110278267B
CN110278267B CN201910542617.9A CN201910542617A CN110278267B CN 110278267 B CN110278267 B CN 110278267B CN 201910542617 A CN201910542617 A CN 201910542617A CN 110278267 B CN110278267 B CN 110278267B
Authority
CN
China
Prior art keywords
target
check code
app
installation package
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910542617.9A
Other languages
Chinese (zh)
Other versions
CN110278267A (en
Inventor
顾静军
谭彰
汪月林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lanzhuo Digital Technology Co ltd
Original Assignee
Zhejiang Lanzhuo Industrial Internet Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Lanzhuo Industrial Internet Information Technology Co ltd filed Critical Zhejiang Lanzhuo Industrial Internet Information Technology Co ltd
Priority to CN201910542617.9A priority Critical patent/CN110278267B/en
Publication of CN110278267A publication Critical patent/CN110278267A/en
Application granted granted Critical
Publication of CN110278267B publication Critical patent/CN110278267B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method for limiting the use of industrial internet APP, which comprises the following steps: when a downloading request of a user for an installation package of a target APP is received, obtaining an authorization file of the user; acquiring a discrete reversible function and a data segment length contained in an authorization file; dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment; performing flood ordering on each sub-segment according to a discrete reversible function to obtain a target installation package; carrying out check calculation on the target installation package to obtain a first check code; when the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code; and if the first check code is different from the second check code, the target APP is limited from being installed and used. According to the method, in the downloading process of the target APP, verification is required, the verification is unsuccessful, the target APP cannot be installed and used, and the use is limited.

Description

Method and system for limiting use of industrial internet APP
Technical Field
The invention relates to the technical field of industrial internet, in particular to a practical limiting method and a practical limiting system for industrial internet APP.
Background
In the field of new industrial internet APPs, there exist a large number of configurable modules, programs or modules in industrial internet APPs, these configurable APPs do not exist in a binary form after compilation, and most of the code exists in a visible configuration.
The inventor researches the existing industrial internet APP to find that the industrial internet APP is used after being downloaded through an application store at the cloud end, can be downloaded and used without authorization in the downloading process, and is not limited in use when being applied to different systems.
Disclosure of Invention
In view of this, the present invention provides a practical method and system for limiting industrial internet APPs, so as to solve the problem in the prior art that industrial internet APPs are used after being downloaded by a cloud APP store, can be exported and used without authorization during the downloading process, and are not limited when being applied to different systems. The specific scheme is as follows:
a limited use method of industrial Internet APP comprises the following steps:
when a downloading request of a user to an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs;
acquiring a discrete reversible function and a data segment length contained in the authorization file;
dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment;
performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package;
carrying out check calculation on the target installation package to obtain a first check code;
when the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code;
and if the first check code is different from the second check code, the target APP is limited from being installed and used.
The above method, optionally, further includes:
and if the first check code is the same as the second check code, allowing the target APP to be installed and used.
The above method, optionally, further includes:
when a request for exporting the target APP from the target system is received, acquiring a temporary file of the target APP;
verifying the temporary file to obtain a third verification code;
when the third check code is different from the first check code, the check fails, the target APP is tampered, and the target APP is limited from being exported to the target system.
The above method, optionally, further includes:
and when the third check code is the same as the first check code, the check is successful, and the target APP is allowed to derive the target system.
Optionally, the method for checking the target installation package to obtain the second check code includes:
dividing the target installation package into data segments with preset lengths;
dividing each data segment into subsections of the data segment length;
performing flood ordering on each sub-segment according to an inverse function of the discrete reversible function to obtain a restored file;
and carrying out check calculation on the restored file to obtain the second check code.
A limited-use system for industrial internet APP, comprising:
the device comprises a first obtaining module, a second obtaining module and a third obtaining module, wherein the first obtaining module is used for obtaining an authorization file of a user when receiving a downloading request of the user to an installation package of a target APP, and the authorization file is distributed when the user registers a cloud terminal to which the target APP belongs;
the second acquisition module is used for acquiring the discrete reversible function and the data segment length contained in the authorization file;
the dividing module is used for dividing the installation package into data segments with preset lengths and dividing each data segment into subsections of the length of the data segment;
the flood ordering module is used for performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package;
the first checking module is used for carrying out checking calculation on the target installation package to obtain a first checking code;
the second check module is used for checking the target installation package to obtain a second check code when the target installation package and the first check code are downloaded to a target system;
and the limitation installation module is used for limiting the installation and the use of the target APP if the first check code is different from the second check code.
The above system, optionally, further includes:
and the installation permission module is used for allowing the target APP to be installed and used if the first check code is the same as the second check code.
The above system, optionally, further includes:
a third obtaining module, configured to obtain a temporary file of the target APP when receiving a request for exporting the target APP from the target system;
the third checking module is used for checking the temporary file to obtain a third checking code;
and the export restriction module is used for failing to check when the third check code is different from the first check code, tampering the target APP and restricting the target APP from exporting the target system.
The above system, optionally, further includes:
and the export permission module is used for successfully checking when the third check code is the same as the first check code, and allowing the target APP to export the target system.
In the above system, optionally, the second check module includes:
the dividing unit is used for dividing the target installation package into data segments with preset lengths;
a dividing unit, configured to divide each data segment into subsections of the data segment length;
the full shot sequencing unit is used for performing full shot sequencing on each sub-segment according to an inverse function of the discrete reversible function to obtain a reduction file;
and the checking unit is used for checking and calculating the restored file to obtain the second checking code.
Compared with the prior art, the invention has the following advantages:
the invention discloses a method for limiting the use of industrial internet APP, which comprises the following steps: when a downloading request of a user to an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs; acquiring a discrete reversible function and a data segment length contained in the authorization file; dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment; performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package; and carrying out check calculation on the target installation package to obtain a first check code. When the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code; and if the first check code is different from the second check code, the target APP is limited from being installed and used. According to the method, in the downloading process of the target APP, verification is required, the verification is unsuccessful, the target APP cannot be installed and used, and the use is limited.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of a method for restricting the use of an industrial Internet APP disclosed in an embodiment of the present application;
FIG. 2 is a schematic illustration of a segmentation process disclosed in an embodiment of the present application;
FIG. 3 is another flowchart of a method for restricting usage of an industrial Internet APP disclosed in an embodiment of the present application;
FIG. 4 is another flowchart of a method for restricting usage of an industrial Internet APP disclosed in an embodiment of the present application;
fig. 5 is a block diagram of a limited-use system of an industrial internet APP according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The invention discloses a use limiting method of an industrial internet APP (application), which can be applied to an industrial internet system, wherein the industrial internet system is an industrial internet platform, an industrial big data platform and an industrial artificial intelligence platform which take an enterprise as a core. The method is characterized in that factory full information is integrated as a breakthrough, multidimensional and multi-metadata fusion application such as production control, production management and enterprise management is realized, object model modeling, big data analysis (DIY), intelligent APP configuration development, intelligent decision and analysis services are provided, comprehensive problems of generation control, production management and enterprise management are solved by integrated, digital and intelligent means, and an intelligent brain which is enabled to be industrial and is served to enterprises is created. The embodiments of the present invention are mainly described with respect to the use of industrial internet APPs, where an industrial internet APP refers to an application, an algorithm, or a module that can run on a specific industrial internet operating system.
In the embodiment of the invention, the industrial internet APP exists in an application store of a corresponding industrial internet cloud, the application store predefines a discrete reversible function set, a serial number is distributed to each discrete reversible function, when a user registers the corresponding industrial internet, a discrete reversible function and a data segment length are distributed to each user, and the discrete reversible function and the data segment length are stored in an authorization file in an encrypted form.
After the user registration is finished, the user authorization file is imported into the local system. And decrypting the authorization file by adopting the corresponding public key distributed by the application store, wherein the adopted key pair is different for each user. The local system identifies the user's discrete invertible function and data segment size from the authorization file, at which time the user's local system is injected with the discrete invertible function and data segment size. The discrete reversible function and the data segment size allocated to each user are random, so that the industrial internet App can be prevented from being copied among users. The users are prevented from distributing the industrial internet App without authorization, so that the rights and interests of industrial App developers are protected. Wherein the content of the first and second substances,
the range of the discrete invertible function y ═ f (x) (x ∈ a) is C, and if one finds that the function g (y) is equal to x everywhere g (y), such function x ═ g (y) (y ∈ C) is the inverse of the function y ═ f (x) (x ∈ a). if one is monotonic, then its inverse is also monotonic and monotonous the same as the original.
Preferably, after the configuration of the industrial internet APP is completed, the local system generates a local check code in combination with the user data. If the user does not upload the industrial internet APP to the application store, the industrial internet APP and the corresponding local check code can be copied and installed at will locally, and when the user uploads the industrial internet APP to the application store, the industrial internet APP and the corresponding local check code are uploaded together.
Based on the above process, the execution flow of the limiting method is shown in fig. 1, and includes the steps of:
s101, when a downloading request of a user for an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs;
in the embodiment of the invention, when a user downloads an installation package of a target APP, an authorization file of the user is obtained, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs, and the authorization file is respectively stored in the local system and the cloud for the same user.
S102, acquiring a discrete reversible function and a data segment length contained in the authorization file;
in the embodiment of the present invention, a discrete reversible function and a data segment length included in the authorization file are obtained, where the discrete reversible function is used for performing a flood ordering, and the data segment length is used for dividing the installation package.
S103, dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment;
in the embodiment of the present invention, the installation package is divided into data segments with preset lengths, where the preset lengths are set according to empirical values or specific situations, and each data segment is divided into sub-segments with the same length as the data segments.
S104, performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package;
in the embodiment of the invention, the sub-segments are subjected to the flood ordering according to the discrete reversible function, and the installation package is mixed to obtain the target installation package. The installation package includes a data area and a check code area, the segmentation process is shown in fig. 2, and the process is completed in a cloud.
S105, carrying out verification calculation on the target installation package to obtain a first verification code;
in the embodiment of the invention, the target installation package is subjected to verification calculation to obtain a first verification code. And the check methods comprise parity check, cyclic redundancy check, gray code check or check sum check and the like.
S106, when the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code;
in the embodiment of the present invention, the target installation package and the first check code are downloaded to a target system, where the target system is a system corresponding to the user, and the target installation package is checked to obtain a second check code, where a checking method of the second check code is the same as that of the first check code.
S107, if the first check code is different from the second check code, the target APP is limited to be installed and used.
In the embodiment of the invention, the first check code and the second check code are compared, whether the first check code is the same as the second check code is judged, and if the first check code is different from the second check code, the target APP is limited to be installed and used; and if the first check code is the same as the second check code, allowing the target APP to be installed and used.
The invention discloses a method for limiting the use of industrial internet APP, which comprises the following steps: when a downloading request of a user to an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs; acquiring a discrete reversible function and a data segment length contained in the authorization file; dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment; performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package; and carrying out check calculation on the target installation package to obtain a first check code. When the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code; and if the first check code is different from the second check code, the target APP is limited from being installed and used. According to the method, in the downloading process of the target APP, verification is required, the verification is unsuccessful, the target APP cannot be installed and used, and the use is limited.
In this embodiment of the present invention, after the target APP is installed in the target system, the target APP may be modified and run in the target system, and the target APP may also be exported from the target system, where an execution flow of the export method is shown in fig. 3, and includes the steps of:
s201, when a request for exporting the target APP from the target system is received, obtaining a temporary file of the target APP;
in the embodiment of the present invention, when a request for exporting the target APP from the target system is received, a temporary file of the target APP is obtained, where the temporary file is a file including key features of the target APP, the temporary file may be selected according to experience or actual conditions, the purpose of exporting the target APP may be to modify the target APP or install the target APP into another system, and the request may occur during installation of the target APP or after installation is completed.
S202, verifying the temporary file to obtain a third verification code;
in the embodiment of the present invention, the temporary file is divided into data segments of a preset length, where the preset length may be set according to an empirical value or may be set according to an actual situation, each data segment is divided according to a data segment length in the authorization file corresponding to the user, so as to obtain a plurality of subsegments, and different users have different numbers of obtained subsegments due to different allocated data segment lengths, and the temporary file is subjected to flood ordering according to a reversible function of the authorization file of the user. And carrying out checking calculation on the temporary file to obtain a third checking code. And the third check code adopts the same check method as the first check code and the second check code.
S203, when the third check code is different from the first check code, the check fails, the target APP is tampered, and the target APP is limited from being exported to the target system.
In the embodiment of the present invention, the third check code is compared with the first check code, whether the third check code is the same as the first check code is determined, and when the third check code is different from the first check code, the check fails, which indicates that the target APP is tampered, and the target APP is restricted from being exported to the target system, and the target APP can only be applied to the target system, and even if the target APP is exported forcibly, the target APP cannot be installed and operated in other local systems.
If the first check code is the same as the local check code, the check is successful, and the target APP is allowed to derive the target system.
In the embodiment of the present invention, a flow of a method for verifying the target installation package to obtain the second check code is shown in fig. 4, and includes the steps of:
s301, dividing the target installation package into data segments with preset lengths;
in the embodiment of the invention, the discrete reversible function and the data segment length contained in the authorization file are obtained, and the installation package is divided into the data segments with preset lengths.
S302, dividing each data segment into subsections with the data segment length;
in the embodiment of the present invention, each data segment is divided into sub-segments of the data segment length.
S303, performing flood ordering on each sub-segment according to an inverse function of the discrete reversible function to obtain a reduction file;
in the embodiment of the invention, the inverse function of the discrete reversible function is obtained, and the full shot sequencing is carried out on each sub-section according to the inverse function of the discrete reversible function to obtain the restored file.
S304, carrying out verification calculation on the restored file to obtain the second verification code.
In the embodiment of the invention, the restored file is checked and calculated to obtain the second check code.
Based on the above method for restricting the use of the industrial internet APP, in the embodiment of the present invention, a system for restricting the use of the industrial internet APP is further provided, and a structural block diagram of the system for restricting the use is shown in fig. 5, where the system for restricting the use includes:
a first obtaining module 401, a second obtaining module 402, a dividing module 403, a flood ordering module 404, a first checking module 405, a second checking module 406, and a constraint installing module 407.
Wherein the content of the first and second substances,
the first obtaining module 401 is configured to obtain an authorization file of a user when a download request of the user for an installation package of a target APP is received, where the authorization file is allocated when the user registers a cloud to which the target APP belongs;
the second obtaining module 402, configured to obtain a discrete invertible function and a data segment length included in the authorization file;
the dividing module 403 is configured to divide the installation package into data segments with preset lengths, and divide each data segment into subsections of the data segment length;
the flood ordering module 404 is configured to perform flood ordering on each sub-segment according to the discrete invertible function, so as to obtain a target installation package;
the first checking module 405 is configured to perform checking calculation on the target installation package to obtain a first checking code.
The second check module 406 is configured to check the target installation package to obtain a second check code when the target installation package and the first check code are downloaded to a target system;
the installation restriction module 407 is configured to restrict the installation and use of the target APP if the first check code is different from the second check code.
The invention discloses a limited use system of industrial internet APP, which comprises: when a downloading request of a user to an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs; acquiring a discrete reversible function and a data segment length contained in the authorization file; dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment; performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package; and carrying out check calculation on the target installation package to obtain a first check code. When the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code; and if the first check code is different from the second check code, the target APP is limited from being installed and used. According to the method, in the downloading process of the target APP, verification is required, the verification is unsuccessful, the target APP cannot be installed and used, and the use is limited.
In an embodiment of the present invention, the system for restricting usage further includes: allowing installation of the module 408.
Wherein the content of the first and second substances,
the installation allowing module 408 is configured to allow the target APP to be installed and used if the first check code is the same as the second check code.
In an embodiment of the present invention, the system for restricting usage further includes:
a third acquisition module 409, a third verification module 410 and a constraint derivation module 411.
Wherein the content of the first and second substances,
the third obtaining module 409 is configured to, when receiving a request for exporting the target APP from the target system, obtain a temporary file of the target APP;
the third checking module 410 is configured to check the temporary file to obtain a third check code;
the export restriction module 411 is configured to, when the third check code is different from the first check code, fail the check, and the target APP is tampered, so as to restrict the target APP from exporting the target system.
In an embodiment of the present invention, the system for restricting usage further includes: the export module 412 is allowed.
Wherein the content of the first and second substances,
the export permission module 412 is configured to, when the third check code is the same as the first check code, successfully check the target APP and allow the target APP to export the target system.
In this embodiment of the present invention, the second checking module 406 includes:
a dividing unit 413, a dividing unit 414, a flood ordering unit 415 and a checking unit 416.
Wherein the content of the first and second substances,
the dividing unit 413 is configured to divide the target installation package into data segments of preset lengths;
the dividing unit 414 is configured to divide each data segment into subsections of the data segment length;
the flood ordering unit 415 is configured to perform flood ordering on each sub-segment according to an inverse function of the discrete invertible function, so as to obtain a restored file;
the verification unit 416 is configured to perform verification calculation on the restored file to obtain the second verification code.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in a plurality of software and/or hardware when implementing the invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The method and the system for limiting the use of the industrial internet APP provided by the invention are described in detail, a specific example is applied in the method to explain the principle and the implementation mode of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A limited use method of industrial Internet APP is characterized by comprising the following steps:
when a downloading request of a user to an installation package of a target APP is received, obtaining an authorization file of the user, wherein the authorization file is distributed when the user registers a cloud to which the target APP belongs;
acquiring discrete reversible functions and data segment lengths contained in the authorization file, wherein the discrete reversible functions and the data segment lengths contained in the authorization file are randomly distributed;
dividing the installation package into data segments with preset lengths, and dividing each data segment into subsections of the length of the data segment;
performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package;
carrying out check calculation on the target installation package to obtain a first check code;
when the target installation package and the first check code are downloaded to a target system, checking the target installation package to obtain a second check code;
and if the first check code is different from the second check code, the target APP is limited from being installed and used.
2. The method of claim 1, further comprising:
and if the first check code is the same as the second check code, allowing the target APP to be installed and used.
3. The method of claim 1, further comprising:
when a request for exporting the target APP from the target system is received, acquiring a temporary file of the target APP;
verifying the temporary file to obtain a third verification code;
when the third check code is different from the first check code, the check fails, the target APP is tampered, and the target APP is limited from being exported to the target system.
4. The method of claim 3, further comprising:
and when the third check code is the same as the first check code, the check is successful, and the target APP is allowed to derive the target system.
5. The method of claim 1, wherein verifying the target installation package to obtain a second verification code comprises:
dividing the target installation package into data segments with preset lengths;
dividing each data segment into subsections of the data segment length;
performing flood ordering on each sub-segment according to an inverse function of the discrete reversible function to obtain a restored file;
and carrying out check calculation on the restored file to obtain the second check code.
6. A limited-use system of industrial Internet APP, comprising:
the device comprises a first obtaining module, a second obtaining module and a third obtaining module, wherein the first obtaining module is used for obtaining an authorization file of a user when receiving a downloading request of the user to an installation package of a target APP, and the authorization file is distributed when the user registers a cloud terminal to which the target APP belongs;
a second obtaining module, configured to obtain a discrete invertible function and a data segment length included in the authorization file, where the discrete invertible function and the data segment length included in the authorization file are randomly allocated;
the dividing module is used for dividing the installation package into data segments with preset lengths and dividing each data segment into subsections of the length of the data segment;
the flood ordering module is used for performing flood ordering on each sub-segment according to the discrete reversible function to obtain a target installation package;
the first checking module is used for carrying out checking calculation on the target installation package to obtain a first checking code;
the second check module is used for checking the target installation package to obtain a second check code when the target installation package and the first check code are downloaded to a target system;
and the limitation installation module is used for limiting the installation and the use of the target APP if the first check code is different from the second check code.
7. The system of claim 6, further comprising:
and the installation permission module is used for allowing the target APP to be installed and used if the first check code is the same as the second check code.
8. The system of claim 6, further comprising:
a third obtaining module, configured to obtain a temporary file of the target APP when receiving a request for exporting the target APP from the target system;
the third checking module is used for checking the temporary file to obtain a third checking code;
and the export restriction module is used for failing to check when the third check code is different from the first check code, tampering the target APP and restricting the target APP from exporting the target system.
9. The system of claim 8, further comprising:
and the export permission module is used for successfully checking when the third check code is the same as the first check code, and allowing the target APP to export the target system.
10. The system of claim 6, wherein the second verification module comprises:
the dividing unit is used for dividing the target installation package into data segments with preset lengths;
a dividing unit, configured to divide each data segment into subsections of the data segment length;
the full shot sequencing unit is used for performing full shot sequencing on each sub-segment according to an inverse function of the discrete reversible function to obtain a reduction file;
and the checking unit is used for checking and calculating the restored file to obtain the second checking code.
CN201910542617.9A 2019-06-21 2019-06-21 Method and system for limiting use of industrial internet APP Active CN110278267B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910542617.9A CN110278267B (en) 2019-06-21 2019-06-21 Method and system for limiting use of industrial internet APP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910542617.9A CN110278267B (en) 2019-06-21 2019-06-21 Method and system for limiting use of industrial internet APP

Publications (2)

Publication Number Publication Date
CN110278267A CN110278267A (en) 2019-09-24
CN110278267B true CN110278267B (en) 2021-10-29

Family

ID=67961456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910542617.9A Active CN110278267B (en) 2019-06-21 2019-06-21 Method and system for limiting use of industrial internet APP

Country Status (1)

Country Link
CN (1) CN110278267B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047150A (en) * 2019-11-22 2020-04-21 浙江蓝卓工业互联网信息技术有限公司 Method, device and system for calculating stability rate of process industrial device
CN113434561A (en) * 2021-06-24 2021-09-24 北京金山云网络技术有限公司 Live broadcast data verification method and system, electronic device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141197A (en) * 2007-10-18 2008-03-12 中兴通讯股份有限公司 Software download method
CN103646082A (en) * 2013-12-12 2014-03-19 北京奇虎科技有限公司 Method and device for checking files
CN105592091A (en) * 2015-12-30 2016-05-18 中国银联股份有限公司 Security application downloading method
CN106055341A (en) * 2016-06-14 2016-10-26 北京奇虎科技有限公司 Application installation package checking method and device
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2373067A (en) * 2000-11-29 2002-09-11 Ruslan Gennadievich Fedorovsky File transfer method and system using segmented transfer and targeted content
US9015564B2 (en) * 2009-08-19 2015-04-21 Qualcomm Incorporated Content delivery system with allocation of source data and repair data among HTTP servers
US9262643B2 (en) * 2010-02-22 2016-02-16 Sookasa Inc. Encrypting files within a cloud computing environment
US8781502B1 (en) * 2013-02-01 2014-07-15 Swirl Networks, Inc. Systems and methods for display of supplemental content responsive to location

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141197A (en) * 2007-10-18 2008-03-12 中兴通讯股份有限公司 Software download method
CN103646082A (en) * 2013-12-12 2014-03-19 北京奇虎科技有限公司 Method and device for checking files
CN105592091A (en) * 2015-12-30 2016-05-18 中国银联股份有限公司 Security application downloading method
CN106055341A (en) * 2016-06-14 2016-10-26 北京奇虎科技有限公司 Application installation package checking method and device
CN108683747A (en) * 2018-06-11 2018-10-19 华为技术有限公司 Resource acquisition, distribution, method for down loading, device, equipment and storage medium
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BitTorrent in a dynamic resource adapting peer-to-peer network;L.Rong,I.Burnett;《AXMEDIS"05》;20060213;全文 *
SDDRM:基于分段的电子文档动态版权管理;许东阳,汤帜,俞银燕;《北京大学学报》;20120224;全文 *

Also Published As

Publication number Publication date
CN110278267A (en) 2019-09-24

Similar Documents

Publication Publication Date Title
CN106408299B (en) Electronic intelligent signing payment method based on block chain technology
US9658871B2 (en) Providing configurable bootstrapping of software execution
KR101740256B1 (en) Apparatus for mobile app integrity assurance and method thereof
CN107404382B (en) Controlling licensable features of software using access tokens
CN102314578B (en) A kind of system and method realizing software protection
US20170064549A1 (en) Providing access to applications with varying enrollment levels
KR102618665B1 (en) Version history management using blockchain
CN110278267B (en) Method and system for limiting use of industrial internet APP
US20180293366A1 (en) Systems and method for securely sharing and executing data and models
He et al. Securing over-the-air IoT firmware updates using blockchain
CN103677891A (en) Method for selective software rollback
CN103620556A (en) Binding applications to device capabilities
CN103679005A (en) Method to enable development mode of a secure electronic control unit
CN111460394A (en) Copyright file verification method and device and computer readable storage medium
CN112733090A (en) Method and device for manufacturing and verifying software authorization certificate
CN111125648B (en) Equipment change method and device
CN111124591B (en) Mirror image transmission method and device, electronic equipment and storage medium
CN112101945B (en) Method and system for supervising block chain content
CN103177211A (en) Software user terminal registration method and software user terminal registration system
CN110618989A (en) Information processing method, information processing device and related product
CN116028045A (en) Third party application code rapid distribution method, device, equipment and storage medium
CN113434824B (en) Software service authorization management method, device, equipment and storage medium
CN114077721A (en) Software protection method based on disk serial number
CN110806935B (en) Application program construction method, device and system
Villegas et al. OTA updates mechanisms: a taxonomy and techniques catalog

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 1-1-180, No. 150, Changpu Road, Jishigang Town, Haishu District, Ningbo, Zhejiang 315016

Patentee after: Lanzhuo Digital Technology Co.,Ltd.

Address before: 315000 room 150 (1-1-180), Chang Po Road, Ji Shi Gang Town, Haishu District, Ningbo, Zhejiang.

Patentee before: ZHEJIANG LANZHUO INDUSTRIAL INTERNET INFORMATION TECHNOLOGY Co.,Ltd.