CN112784221A - Application program checking method and device and electronic equipment - Google Patents

Application program checking method and device and electronic equipment Download PDF

Info

Publication number
CN112784221A
CN112784221A CN202110087861.8A CN202110087861A CN112784221A CN 112784221 A CN112784221 A CN 112784221A CN 202110087861 A CN202110087861 A CN 202110087861A CN 112784221 A CN112784221 A CN 112784221A
Authority
CN
China
Prior art keywords
user equipment
license
unique identifier
application program
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110087861.8A
Other languages
Chinese (zh)
Inventor
孙伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202110087861.8A priority Critical patent/CN112784221A/en
Publication of CN112784221A publication Critical patent/CN112784221A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a verification method and device of an application program and electronic equipment, wherein the verification method comprises the following steps: acquiring a license of user equipment; decrypting the license to obtain the unique identifier of the user equipment; and verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, the license of the user equipment is obtained, the license is decrypted to obtain the unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.

Description

Application program checking method and device and electronic equipment
Technical Field
The present application relates to the field of application program verification technologies, and in particular, to a method and an apparatus for verifying an application program, an electronic device, and a storage medium.
Background
At present, with the increasing attention of people to intellectual property, some application programs need to be checked to pass before being used. In the related art, the application program is mostly verified by adopting a license verification method, however, different user devices can share the same license, secondary distribution of the license cannot be prevented, and the benefit of an application program writer cannot be guaranteed. In addition, the license needs to be checked in a networking manner, and if the customer deploying the intranet cannot be connected with the public network, the license cannot be checked, so that inconvenience is brought to normal use of the user.
Disclosure of Invention
The method and the device aim at solving one of the technical problems that the same license can be shared among different user equipment in the related technology, secondary distribution of the license cannot be prevented, and the license needs networking verification at least to a certain extent.
Therefore, an embodiment of a first aspect of the present application provides a method for verifying an application program, where a license of a user equipment is obtained, the license is decrypted to obtain a unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and an actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
The embodiment of the second aspect of the present application provides a verification apparatus for an application program.
The embodiment of the third aspect of the application provides an electronic device.
An embodiment of a fourth aspect of the present application provides a computer-readable storage medium.
An embodiment of a first aspect of the present application provides a method for verifying an application program, including: acquiring a license of user equipment; decrypting the license to obtain the unique identifier of the user equipment; and verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
According to the application program verification method, the license of the user equipment is obtained, the license is decrypted to obtain the unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
In addition, the verification method for the application program according to the above embodiment of the present application may further have the following additional technical features:
in one embodiment of the present application, further comprising: decrypting the license to obtain the expiration time of the license; the verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment includes: and verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, the expiration time and the current time of the license.
In an embodiment of the application, the verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, and the expiration time and the current time of the license includes: if the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment and the current time does not exceed the expiration time of the license, the license passes the verification; and if the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, the license is not verified.
In an embodiment of the application, the decrypting the license to obtain the unique identifier of the user equipment includes: decrypting the license to obtain the fingerprint of the user equipment; and decrypting the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
In one embodiment of the present application, further comprising: acquiring a source code of the application program, wherein the source code of the application program comprises a check logic code of the license; and encrypting the source code of the application program.
In an embodiment of the present application, the acquiring a license of a user equipment includes: and acquiring the license of the user equipment from the user equipment through a preset path.
An embodiment of a second aspect of the present application provides an apparatus for verifying an application program, including: the acquisition module is used for acquiring the license of the user equipment; the first decryption module is used for decrypting the license to obtain the unique identifier of the user equipment; and the checking module is used for checking the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
The application program verifying device obtains the license of the user equipment, decrypts the license to obtain the unique identifier of the user equipment, and verifies the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
In addition, the verification device for the application program according to the above embodiment of the present application may further have the following additional technical features:
in an embodiment of the present application, the verification device of the application further includes: the second decryption module is used for decrypting the license to obtain the expiration time of the license; the verification module is specifically configured to: and verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, the expiration time and the current time of the license.
In an embodiment of the present application, the verification module is specifically configured to: if the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment and the current time does not exceed the expiration time of the license, the license passes the verification; and if the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, the license is not verified.
In an embodiment of the application, the first decryption module is specifically configured to: decrypting the license to obtain the fingerprint of the user equipment; and decrypting the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
In an embodiment of the present application, the verification device of the application further includes: an encryption module to: acquiring a source code of the application program, wherein the source code of the application program comprises a check logic code of the license; and encrypting the source code of the application program.
In an embodiment of the present application, the obtaining module is specifically configured to: and acquiring the license of the user equipment from the user equipment through a preset path.
An embodiment of a third aspect of the present application provides an electronic device, including: the application program verification method comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the application program verification method according to the embodiment of the first aspect.
According to the electronic equipment of the embodiment of the application, the processor executes the computer program stored on the memory to obtain the license of the user equipment, the license is decrypted to obtain the unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
An embodiment of a fourth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for verifying an application program as described in the foregoing embodiment of the first aspect.
The computer-readable storage medium of the embodiment of the application, by storing a computer program and executing the computer program by a processor, acquires a license of the user equipment, decrypts the license to obtain the unique identifier of the user equipment, and verifies the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
Additional aspects and advantages of the present invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flowchart illustrating a method for verifying an application according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a process of decrypting a license to obtain a unique identifier of a user equipment in a verification method of an application according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a verification device for an application according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a verification device for an application according to another embodiment of the present application; and
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
A verification method, an apparatus, an electronic device, and a storage medium of an application program according to an embodiment of the present application are described below with reference to the drawings.
Fig. 1 is a flowchart illustrating a verification method for an application according to an embodiment of the present application.
As shown in fig. 1, the method for verifying an application program according to the embodiment of the present application includes:
s101, obtaining the license of the user equipment.
It should be noted that the execution main body of the verification method for the application program in the embodiment of the present application may be a verification apparatus for the application program, and the verification apparatus for the application program in the embodiment of the present application may be configured in any electronic device, so that the electronic device may execute the verification method for the application program in the embodiment of the present application. The electronic device may be a Personal Computer (PC), a cloud device, a mobile device, and the like, and the mobile device may be a hardware device having various operating systems, touch screens, and/or display screens, such as a mobile phone, a tablet computer, a personal digital assistant, a wearable device, and an in-vehicle device.
In an embodiment of the application, a license of a user equipment may be acquired. It is understood that the user devices correspond to the licenses one to one, that is, one user device corresponds to a unique license and one license corresponds to a unique user device.
Optionally, acquiring the license of the user equipment may include acquiring the license of the user equipment from the user equipment through a preset path. It is understood that the license of the user equipment can be preset in the user equipment, and the license of the user equipment can be acquired from the user equipment through a preset path. The preset path includes, but is not limited to, a memory space address of the user equipment.
For example, a preset storage space for storing a license may be preset in the storage space of the user equipment, an address of the preset storage space may be used as a preset path, and the license of the user equipment may be obtained from the preset storage space of the user equipment through the preset path.
In the embodiments of the present application, the form of the license is not limited. For example, the license may be a string of characters.
S102, the license is decrypted to obtain the unique identification of the user equipment.
In the embodiment of the application, the license can be decrypted to obtain the unique identifier of the user equipment. It will be appreciated that the licenses correspond one-to-one to the identities of the user devices, i.e. one license corresponds to a unique identity of a user device and one identity of a user device corresponds to a unique license.
It can be understood that different user devices may correspond to the identifiers of different user devices, and the different user devices may be distinguished through the identifiers of the user devices.
Therefore, the license of the user equipment can correspond to the unique identifier of the user equipment, namely each user equipment can correspond to the unique license, and compared with the defect that the same license can be shared among different user equipment in the related technology, the secondary distribution of the license cannot be prevented, each user equipment can be ensured to correspond to the unique license, so that the same license can be effectively prevented from being shared among different user equipment, and the benefit of an application program author is guaranteed.
It should be noted that, in the embodiment of the present application, the form of the identifier of the user equipment is not limited too much, for example, the identifier of the user equipment includes, but is not limited to, a Media Access Control (MAC) address of the user equipment, a name and a number of the user equipment, and the like.
S103, verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
In the embodiment of the application, the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. It can be understood that, in the verification method of the application program in the embodiment of the present application, the verification of the license can be achieved only according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, and compared with the defect that the license needs to be verified in a networking manner in the related art, if a client deploying an intranet cannot connect to a public network, the verification of the license cannot be performed, and the verification of the license can be achieved without the networking, so that the offline verification of the license can be achieved, which is convenient and flexible.
Optionally, the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, where the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment, which indicates that the user equipment corresponding to the license is the current user equipment, the license verification is passed, and otherwise, the unique identifier of the user equipment is inconsistent with the actual unique identifier of the user equipment, which indicates that the user equipment corresponding to the license is not the current user equipment, the license verification is not passed.
Optionally, a reminding message may be sent to the user equipment in response to the failure of the license verification, where the reminding message is used to remind the user equipment to reapply the license, and to inform the user equipment that the license verification fails and the license needs to be reapplied, so as to improve an interactive feeling with the user equipment.
In summary, according to the method for verifying the application program of the embodiment of the application program, the license of the user equipment is acquired, the license is decrypted to obtain the unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
On the basis of any of the above embodiments, as shown in fig. 2, decrypting the license in step S102 to obtain the unique identifier of the user equipment may include:
s201, the license is decrypted to obtain the fingerprint of the user equipment.
In the embodiment of the application, the license can be decrypted to obtain the fingerprint of the user equipment. It will be appreciated that the licenses correspond one-to-one to the fingerprints of the user devices, i.e. one license corresponds to a unique fingerprint of a user device and one fingerprint of a user device corresponds to a unique license.
S202, the fingerprint of the user equipment is decrypted to obtain the unique identification of the user equipment.
In the embodiment of the application, the unique identifier of the user equipment can be encrypted to obtain the fingerprint of the user equipment, and then the fingerprint of the user equipment is encrypted to obtain the license of the user equipment. Correspondingly, the license can be decrypted to obtain the fingerprint of the user equipment, and the fingerprint of the user equipment is decrypted to obtain the unique identifier of the user equipment.
Optionally, a binary file may be run on the user equipment, the unique identifier of the user equipment may be encrypted by a preset key, so as to obtain a fingerprint of the user equipment, and different user equipments may correspond to different fingerprints. And then parameters such as fingerprint of the user equipment, expiration time of the license and the like can be encrypted to obtain the license of the user equipment.
Therefore, the method can decrypt the license to obtain the fingerprint of the user equipment, and decrypt the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
On the basis of any of the above embodiments, after acquiring the license of the user equipment in step S101, decrypting the license to obtain the expiration time of the license. It will be appreciated that different licenses may correspond to different expiration times, and that the expiration times of the licenses may be preset for validation of the licenses.
Further, in step S103, the verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment may include verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, and the expiration time and the current time of the license.
Optionally, the license is verified according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, and the expiration time and the current time of the license, where the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment, and the current time does not exceed the expiration time of the license, indicating that the user equipment corresponding to the license is the current user equipment, and the current time is within the valid time of the license, the license verification is passed.
Otherwise, the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, which indicates that the user equipment corresponding to the license is not the current user equipment, or the current time is not within the valid time of the license, the license check is not passed.
Therefore, the method can comprehensively consider the unique identification of the user equipment and the actual unique identification of the user equipment, the expiration time and the current time of the license, and the influence on the license verification result, and compared with the prior art that the short-term feasibility verification is mostly considered in the license verification, the license verification result is more accurate.
In the related art, part of the application program belongs to a plaintext application program, and the client can directly modify the source code of the application program, so that a license check is skipped, that is, the client can use the application program without performing license check, which is not beneficial to guaranteeing the benefit of an application program author.
In this embodiment, the source code of the application program may be obtained, where the source code of the application program includes a check logic code of the license, and the source code of the application program is encrypted.
Optionally, the source code of the application program may be encrypted by a preset key. The preset key may be set based on an Advanced Encryption Standard (AES) algorithm.
Alternatively, the verification logic code for the license may be written in Golang.
Optionally, the checking logic code of the license may be a dynamic library, and when the application program is started or runs, the checking logic code of the license may be called to check the license, so that the checking details of the license may be hidden, and the checking of the license may be implemented more flexibly according to an application scenario.
Therefore, the method can encrypt the source code of the application program, can effectively avoid the source code from being modified by a client, and can prevent the client from directly skipping license verification, and the source code of the application program comprises the verification logic code of the license and is used for realizing the verification of the license.
Corresponding to the method for verifying the application program provided in the embodiments of fig. 1 to 2, the present disclosure also provides a device for verifying the application program, and since the device for verifying the application program provided in the embodiments of the present disclosure corresponds to the method for verifying the application program provided in the embodiments of fig. 1 to 2, the implementation manner of the method for verifying the application program is also applicable to the device for verifying the application program provided in the embodiments of the present disclosure, and will not be described in detail in the embodiments of the present disclosure.
Fig. 3 is a schematic structural diagram of a verification device for an application according to an embodiment of the present application.
As shown in fig. 3, the verification apparatus 100 for an application program according to an embodiment of the present disclosure may include: an acquisition module 110, a first decryption module 120 and a verification module 130.
The obtaining module 110 is configured to obtain a license of a user equipment;
the first decryption module 120 is configured to decrypt the license to obtain the unique identifier of the user equipment;
the verification module 130 is configured to verify the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
In an embodiment of the present application, as shown in fig. 4, the verification apparatus 100 of the application further includes: a second decryption module 140, configured to decrypt the license to obtain an expiration time of the license; the verification module 130 is specifically configured to: and verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, the expiration time and the current time of the license.
In an embodiment of the present application, the verification module 130 is specifically configured to: if the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment and the current time does not exceed the expiration time of the license, the license passes the verification; and if the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, the license is not verified.
In an embodiment of the present application, the first decryption module 120 is specifically configured to: decrypting the license to obtain the fingerprint of the user equipment; and decrypting the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
In an embodiment of the present application, as shown in fig. 4, the verification apparatus 100 of the application further includes: an encryption module 150 to: acquiring a source code of the application program, wherein the source code of the application program comprises a check logic code of the license; and encrypting the source code of the application program.
In an embodiment of the present application, the obtaining module 110 is specifically configured to: and acquiring the license of the user equipment from the user equipment through a preset path.
The application program verifying device obtains the license of the user equipment, decrypts the license to obtain the unique identifier of the user equipment, and verifies the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
In order to implement the above-mentioned embodiment, as shown in fig. 5, the present application further proposes an electronic device 200, including: the memory 210, the processor 220, and a computer program stored on the memory 210 and executable on the processor 220, when the processor 220 executes the program, the method for verifying the application program as proposed in the foregoing embodiments of the present application is implemented.
According to the electronic equipment of the embodiment of the application, the processor executes the computer program stored on the memory to obtain the license of the user equipment, the license is decrypted to obtain the unique identifier of the user equipment, and the license is verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
In order to implement the foregoing embodiments, the present application also proposes a computer-readable storage medium on which a computer program is stored, which, when executed by a processor, implements the verification method of the application program as proposed in the foregoing embodiments of the present application.
The computer-readable storage medium of the embodiment of the application, by storing a computer program and executing the computer program by a processor, acquires a license of the user equipment, decrypts the license to obtain the unique identifier of the user equipment, and verifies the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment. Therefore, each user equipment can correspond to the unique license, and the license can be verified according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, so that the same license is effectively prevented from being shared among different user equipment, the benefit of an application program author is guaranteed, the license can be verified without networking, and the method is convenient and flexible.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (14)

1. A method for verifying an application program, comprising:
acquiring a license of user equipment;
decrypting the license to obtain the unique identifier of the user equipment;
and verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
2. The verification method of claim 1, further comprising:
decrypting the license to obtain the expiration time of the license;
the verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment includes:
and verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, the expiration time and the current time of the license.
3. The method for verifying according to claim 2, wherein said verifying the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment, and the expiration time and the current time of the license comprises:
if the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment and the current time does not exceed the expiration time of the license, the license passes the verification;
and if the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, the license is not verified.
4. The verification method of claim 1, wherein decrypting the license to obtain the unique identifier of the user equipment comprises:
decrypting the license to obtain the fingerprint of the user equipment;
and decrypting the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
5. The verification method of claim 1, further comprising:
acquiring a source code of the application program, wherein the source code of the application program comprises a check logic code of the license;
and encrypting the source code of the application program.
6. The verification method of claim 1, wherein the obtaining of the license of the user equipment comprises:
and acquiring the license of the user equipment from the user equipment through a preset path.
7. An apparatus for verifying an application program, comprising:
the acquisition module is used for acquiring the license of the user equipment;
the first decryption module is used for decrypting the license to obtain the unique identifier of the user equipment;
and the checking module is used for checking the license according to the unique identifier of the user equipment and the actual unique identifier of the user equipment.
8. The verification apparatus of claim 7, further comprising: the second decryption module is used for decrypting the license to obtain the expiration time of the license;
the verification module is specifically configured to: and verifying the license according to the unique identifier of the user equipment, the actual unique identifier of the user equipment, the expiration time and the current time of the license.
9. The verification apparatus according to claim 8, wherein the verification module is specifically configured to:
if the unique identifier of the user equipment is consistent with the actual unique identifier of the user equipment and the current time does not exceed the expiration time of the license, the license passes the verification;
and if the unique identifier of the user equipment is not consistent with the actual unique identifier of the user equipment, or the current time exceeds the expiration time of the license, the license is not verified.
10. The verification apparatus according to claim 7, wherein the first decryption module is specifically configured to:
decrypting the license to obtain the fingerprint of the user equipment;
and decrypting the fingerprint of the user equipment to obtain the unique identifier of the user equipment.
11. The verification apparatus of claim 7, further comprising: an encryption module to:
acquiring a source code of the application program, wherein the source code of the application program comprises a check logic code of the license;
and encrypting the source code of the application program.
12. The verification apparatus according to claim 7, wherein the obtaining module is specifically configured to:
and acquiring the license of the user equipment from the user equipment through a preset path.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of verifying an application program as claimed in any one of claims 1 to 6 when executing the program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method for verifying an application program according to any one of claims 1 to 6.
CN202110087861.8A 2021-01-22 2021-01-22 Application program checking method and device and electronic equipment Pending CN112784221A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110087861.8A CN112784221A (en) 2021-01-22 2021-01-22 Application program checking method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110087861.8A CN112784221A (en) 2021-01-22 2021-01-22 Application program checking method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112784221A true CN112784221A (en) 2021-05-11

Family

ID=75758594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110087861.8A Pending CN112784221A (en) 2021-01-22 2021-01-22 Application program checking method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112784221A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277017A (en) * 2017-06-22 2017-10-20 北京洋浦伟业科技发展有限公司 Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN110704814A (en) * 2018-07-09 2020-01-17 中移物联网有限公司 Anti-copy method and device, and storage medium
CN112149066A (en) * 2020-09-23 2020-12-29 深兰人工智能芯片研究院(江苏)有限公司 Activation verification method and device for software
CN112187704A (en) * 2019-07-02 2021-01-05 中国电信股份有限公司 Method, system and network equipment for checking valid time of license
CN112187783A (en) * 2020-09-25 2021-01-05 京东方科技集团股份有限公司 Authentication method and device, electronic equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107277017A (en) * 2017-06-22 2017-10-20 北京洋浦伟业科技发展有限公司 Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN110704814A (en) * 2018-07-09 2020-01-17 中移物联网有限公司 Anti-copy method and device, and storage medium
CN112187704A (en) * 2019-07-02 2021-01-05 中国电信股份有限公司 Method, system and network equipment for checking valid time of license
CN112149066A (en) * 2020-09-23 2020-12-29 深兰人工智能芯片研究院(江苏)有限公司 Activation verification method and device for software
CN112187783A (en) * 2020-09-25 2021-01-05 京东方科技集团股份有限公司 Authentication method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110968743B (en) Data storage and data reading method and device for private data
CN111539813B (en) Method, device, equipment and system for backtracking processing of business behaviors
CN106302379B (en) Authentication method, system and device for vehicle-mounted electric appliance
CN109257374B (en) Security control method and device and computer equipment
KR101010040B1 (en) File encryption/decryption method, device, program, and computer-readable recording medium containing the program
US8364965B2 (en) Optimized integrity verification procedures
US20130268754A1 (en) Secure software file transfer systems and methods for vehicle control modules
US20080025503A1 (en) Security method using self-generated encryption key, and security apparatus using the same
CN103947151A (en) Information processing device, information storage device, server, information processing system, information processing method, and program
JP2010517448A (en) Secure file encryption
JPWO2011152065A1 (en) Controller, control method, computer program, program recording medium, recording apparatus, and manufacturing method of recording apparatus
US20130019110A1 (en) Apparatus and method for preventing copying of terminal unique information in portable terminal
CN110740128A (en) off-line data encryption method and device
CN113365097B (en) Live broadcast information stream processing method, device and system, electronic equipment and storage medium
CN110704814B (en) Anti-copy method and device, and storage medium
CN106992978B (en) Network security management method and server
CN114189862A (en) Wireless terminal and interface access authentication method of wireless terminal in Uboot mode
KR20190112959A (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
CN112784221A (en) Application program checking method and device and electronic equipment
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN116011042A (en) Data storage method, device, system, computer equipment and storage medium
CN115442046A (en) Signature method, signature device, electronic equipment and storage medium
CN110602121B (en) Network key obtaining method and device and computer readable storage medium
CN109543367B (en) Quantum encryption-based software authorization method and device and storage medium
CN114223176A (en) Certificate management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: Jingdong Digital Technology Holding Co., Ltd

CB02 Change of applicant information