CN112947967B - Software updating method, blockchain application store and software uploading terminal - Google Patents
Software updating method, blockchain application store and software uploading terminal Download PDFInfo
- Publication number
- CN112947967B CN112947967B CN202110251872.5A CN202110251872A CN112947967B CN 112947967 B CN112947967 B CN 112947967B CN 202110251872 A CN202110251872 A CN 202110251872A CN 112947967 B CN112947967 B CN 112947967B
- Authority
- CN
- China
- Prior art keywords
- software
- data
- software update
- update data
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present disclosure provides a software update method, a blockchain application store, a software upload terminal, a computer device, and a readable storage medium, the method comprising: the block chain application store receives software update data uploaded by the software uploading terminal; encrypting and storing the software update data; when the user terminal accesses the blockchain application store to download the software update data, decrypting the stored encrypted software update data; and sending the decrypted software update data to the user terminal. The technical scheme of the present disclosure can make the software update safe and reliable, and can not be tampered at will.
Description
Technical Field
The present disclosure belongs to the field of communication technology, and in particular relates to a software updating method, a blockchain application store, a software uploading terminal, a computer device, and a computer readable storage medium.
Background
Software is a collection of computer data and instructions organized in a particular order. Because of logic problems or function expansion, the software often needs to be updated, but at present, when updating the software, a user usually downloads the latest software version on a server or a website to install or update, the method may simultaneously download other applications or virus programs bundled on the website, and software files are easy to tamper, so that the reliability and the security are lower when updating the software.
Disclosure of Invention
The present disclosure provides a software update method, a blockchain application store, a software upload terminal, a computer device, and a computer-readable storage medium, which make software update safe and reliable without being tampered with at will.
In a first aspect, an embodiment of the present disclosure provides a software update method applied to a blockchain application store, the method including:
receiving software update data uploaded by a software uploading terminal;
encrypting and storing the software update data;
when a user terminal accesses a blockchain application store for a software update data download,
decrypting the stored encrypted software update data;
and sending the decrypted software update data to the user terminal.
Further, the encrypting the software update data includes:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
Further, the first encryption algorithm is a digital signature algorithm, and the second encryption algorithm is a hash algorithm.
Further, the receiving software update data uploaded by the software uploading terminal specifically includes:
receiving software update data uploaded by a software uploading terminal through a 5G network;
the decrypted software update data is sent to the user terminal, specifically:
and sending the decrypted software update data to the user terminal through the 5G network.
In a second aspect, an embodiment of the present disclosure provides a software update method, applied to a software upload terminal, where the method includes:
acquiring software update data;
and uploading the software updating data to a blockchain application store, so that the blockchain application store encrypts and stores the software updating data, decrypts the stored encrypted software updating data when the user terminal accesses the blockchain application store to download the software updating data, and then sends the decrypted software updating data to the user terminal.
Further, the software uploading terminal is connected with an electronic medium, and pre-encrypted software updating data is stored in the electronic medium;
the acquiring the software update data includes:
acquiring pre-encrypted software update data from the electronic medium;
and decrypting the pre-encrypted software update data to obtain the software update data.
Further, the decrypting the pre-encrypted software update data to obtain software update data includes:
obtaining a deformed key in a software development terminal, wherein the deformed key is obtained by the software development terminal by adopting a message digest algorithm to operate software update data to generate an encryption key and carrying out position replacement on an n+1th bit and an n-1th bit of the encryption key;
decrypting the pre-encrypted software update data by adopting a preset software decryption mechanism to obtain a ciphertext data block;
and decrypting the ciphertext data block by using the deformed key through a data encryption standard algorithm to obtain software update data.
In a third aspect, embodiments of the present disclosure provide a blockchain application store, comprising:
the receiving module is used for receiving the software update data uploaded by the software uploading terminal;
the encryption module is used for encrypting and storing the software update data;
a decryption module configured to decrypt stored encrypted software update data when the user terminal accesses the blockchain application store for software update data download;
and a transmitting module configured to transmit the decrypted software update data to the user terminal.
In a fourth aspect, an embodiment of the present disclosure provides a software uploading terminal, including:
an acquisition module configured to acquire software update data;
and the uploading module is used for uploading the software updating data to the blockchain application store, so that the blockchain application store encrypts and stores the software updating data, decrypts the stored encrypted software updating data when the user terminal accesses the blockchain application store to download the software updating data, and then sends the decrypted software updating data to the user terminal.
In a fifth aspect, embodiments of the present disclosure further provide a computer device, including a memory and a processor, where the memory stores a computer program, and where the processor performs the software updating method according to any of the first aspects when the processor runs the computer program stored in the memory.
In a sixth aspect, embodiments of the present disclosure also provide a computer-readable storage medium, comprising: a computer program which, when run on a computer, causes the computer to perform the software update method as described in any one of the first and second aspects.
The beneficial effects are that:
the software updating method, the blockchain application store, the software uploading terminal, the computer equipment and the computer readable storage medium provided by the disclosure receive software updating data uploaded by the software uploading terminal through the blockchain application store; encrypting and storing the software update data; when the user terminal accesses the blockchain application store to download the software update data, decrypting the stored encrypted software update data; and sending the decrypted software update data to the user terminal. According to the technical scheme, the software can be safely and reliably updated, and data is prevented from being tampered during software updating.
Drawings
Fig. 1 is a flowchart of a software updating method according to a first embodiment of the disclosure;
fig. 2 is a flow chart of a software updating method according to a second embodiment of the disclosure;
FIG. 3 is a block chain application store architecture diagram provided in accordance with a third embodiment of the present disclosure;
fig. 4 is a architecture diagram of a software uploading terminal according to a fourth embodiment of the present disclosure;
fig. 5 is a schematic diagram of a computer device according to a fifth embodiment of the disclosure.
Detailed Description
In order that those skilled in the art will better understand the technical solutions of the present disclosure, the present disclosure will be described in further detail with reference to the accompanying drawings and examples.
Wherein the terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure of embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
At present, when the software is updated, a user usually downloads the latest software version on a server or a website to install or update the software, other applications or virus programs bound on the website may be downloaded at the same time, and software files are easy to tamper, so that the reliability and the security are lower when the software is updated.
The following describes the technical solutions of the present disclosure and how the technical solutions of the present disclosure solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 1 is a flowchart of a software updating method applied to a blockchain application store according to an embodiment of the present disclosure, where the method includes:
step S101: receiving software update data uploaded by a software uploading terminal;
step S102: encrypting and storing the software update data;
step S103: when the user terminal accesses the blockchain application store to download the software update data, decrypting the stored encrypted software update data;
step S104: and sending the decrypted software update data to the user terminal.
Almost every moment in the world new software is created, either large or small applications, and even if designed very perfectly, no BUGs are possible or no extensions are needed. When the released software has problems or new functions need to be added, the software needs to be updated; after the software is developed or when the software needs to be updated, the internet uploading is generally carried out through a specific software uploading terminal, and software updating data comprises all files of the software installation, including computer programs which can be run on a computer and documents related to the computer programs; by creating a blockchain of software updates, the blockchain includes a software upload terminal node, a blockchain application store node, and a user node.
Blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The blockchain is an important concept of bitcoin, is essentially a decentralised database, and serves as a bottom technology of bitcoin, and is a series of data blocks which are generated by correlating a cryptography method, wherein each data block contains information of a batch of bitcoin network transactions and is used for verifying the validity (anti-counterfeiting) of the information and generating a next block. In a narrow sense, a blockchain is a distributed ledger that combines blocks of data in a sequential manner in time order into a chain data structure, and that is cryptographically secured against tampering and counterfeiting. In broad terms, blockchain technology is a completely new distributed infrastructure and computing paradigm that utilizes blockchain data structures to validate and store data, distributed node consensus algorithms to generate and update data, cryptography to secure data transfer and access, and intelligent contracts composed of automated script code to program and manipulate data.
And the characteristics of decentralization, non-falsification of information, openness and traceability of the blockchain are utilized to ensure the safety and reliability of the software update data uploaded to the blockchain. Then encrypting the software update data in the application store, further ensuring the safety of the data in the blockchain network, and decrypting the encrypted software update data in the application store when the user terminal accesses the blockchain application store to download the software update data; and sending the decrypted software update data to the user terminal. And enabling the user to acquire the update data and updating the software.
Further, the encrypting the software update data includes:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
The software data can be better protected through twice encryption, the software data in the software update data can be prevented from being tampered after the software update data are acquired by other people, viruses are implanted, and the like, and then the tampered software installation package is uploaded to an application store again, so that the influence on a user is caused after the user downloads the software installation package. Therefore, the server performs encryption processing on the acquired software update data for a plurality of times, so that the possibility of tampering of the software update data can be reduced.
The process of decrypting stored encrypted software update data at the blockchain application store is a reverse operation of the encryption process, including:
grouping the software updating data after secondary encryption according to a preset method to obtain a plurality of sections of block chain data after secondary encryption;
decrypting the secondarily encrypted multi-segment blockchain data by adopting the inverse operation corresponding to the encryption of the second encryption algorithm to obtain a plurality of ciphertext blocks;
decrypting the plurality of ciphertext blocks through a private key to obtain decrypted multi-segment block chain data; the private key corresponds to a key for encrypting the multi-segment blockchain data after primary encryption;
decrypting the decrypted multi-segment block chain data by adopting the inverse operation corresponding to the encryption of the first encryption algorithm to obtain the multi-segment block chain data
And combining the multi-segment block chain data to obtain complete software updating data.
Preferably, the encryption parameters can be inserted into the block chain data after the secondary encryption, so that the update data can be better protected.
Further, the first encryption algorithm is a digital signature algorithm, and the second encryption algorithm is a hash algorithm.
The first encryption algorithm adopts a DSA digital signature algorithm; the second encryption algorithm adopts a hash algorithm. And data tampering caused by only adopting a hash encryption algorithm in the blockchain is prevented.
Further, the receiving software update data uploaded by the software uploading terminal specifically includes:
receiving software update data uploaded by a software uploading terminal through a 5G network;
the decrypted software update data is sent to the user terminal, specifically:
and sending the decrypted software update data to the user terminal through the 5G network.
The data transmission is performed through the high speed, low time delay and large bandwidth of the 5G network, so that the transmission efficiency can be improved, and the safety is improved.
The software updating method of the embodiment of the disclosure has simple operation and high updating efficiency, and is based on the blockchain sharing technology and the multiple encryption algorithm, so that the safety performance of the software updating data is high, the characteristics of being unable to be tampered at will, and the software updating is realized safely and reliably.
Fig. 2 is a flow chart of a software updating method provided in a second embodiment of the present disclosure, which is applied to a software uploading terminal, as shown in fig. 2, and the method includes:
step S201: acquiring software update data;
step S202: and uploading the software updating data to a blockchain application store, so that the blockchain application store encrypts and stores the software updating data, decrypts the stored encrypted software updating data when the user terminal accesses the blockchain application store to download the software updating data, and then sends the decrypted software updating data to the user terminal.
The software uploading terminal can be connected with a plurality of blockchain application shops, has strong safety protection performance, uploads the software updating data to the blockchain application shops through a specific port after the software updating data is acquired from the software development terminal, and stores the updating data after being encrypted in the blockchain, so that the possibility of tampering the data is reduced, and the data safety is ensured.
Further, the software uploading terminal is connected with an electronic medium, and pre-encrypted software updating data is stored in the electronic medium;
the acquiring the software update data includes:
acquiring pre-encrypted software update data from the electronic medium;
and decrypting the pre-encrypted software update data to obtain the software update data.
For some special requirement software, the developed or updated files need to be transferred to a specific terminal through an electronic medium for internet uploading, and the risk of losing and being stolen exists in the process. Pre-encrypting the software update data on the development terminal; storing the software updating data into an electronic medium, and after the electronic medium is connected to a software uploading terminal, decrypting the software updating data in the electronic medium to obtain the software updating data.
Pre-encrypting the software update data in the software development terminal includes:
encrypting the software update data by adopting an MD5 algorithm to generate an encryption key;
performing position replacement processing on the (n+1) th bit and the (n-1) th bit of the encryption key to obtain a string of deformed keys;
encrypting the software update data by using the deformed key through a DES algorithm to obtain a corresponding ciphertext data block;
and encrypting the ciphertext data block by adopting a preset software encryption mechanism to form ciphertext data, and completing pre-encryption of software update data.
MD5, which is known as Message-Digest algorism 5, the fifth edition of the Message Digest Algorithm, is one of the widely used hash algorithms in the current computer field for ensuring complete consistency of information transfer. The MD5 algorithm is used for changing data operation into another fixed length value, which is the basic principle of the hash algorithm, the MD5 algorithm is used for encrypting the software update data to generate a 128-bit encryption key with 32 characters, the n+1th bit and the n-1th bit of the encryption key are subjected to position replacement to obtain a string of deformed keys, n is more than or equal to 2, n can be set by oneself,
the DES algorithm uses a 64-bit key to change a 64-bit plaintext input block into a 64-bit ciphertext output block, and divides the output block into two parts, L0 and R0, each of which is 32 bits. Specifically, 64-bit plaintext data is input, and initial substitution IP is performed; after the IP is replaced initially, the plaintext data is divided into a left part and a right part, and each part is 32 bits and is represented by L0 and R0; under the control of the secret key, carrying out 16 rounds of operation; after 16 rounds, the left part and the right part are exchanged and connected together, and then reverse replacement is carried out; and outputting 64-bit ciphertext. And encrypting the ciphertext data block by adopting a preset software encryption mechanism to form ciphertext data, and completing pre-encryption of software update data. The preset software encryption mechanism may be a common encryption mechanism, and may be an ECB: electronic Code Book (electronic codebook mode), CBC: cipher Block Chaining (cipher block chain mode), CTR: counter (Counter mode), CFB: cipher Feedback (Cipher Feedback mode) or OFB: output Feedback (Output Feedback mode). After the pre-encryption of the software update data is completed, the software update data is stored in an electronic medium.
Further, the decrypting the pre-encrypted software update data to obtain software update data includes:
obtaining a deformed key in a software development terminal, wherein the deformed key is obtained by the software development terminal by adopting a message digest MD5 algorithm to operate software update data to generate an encryption key and carrying out position replacement on an n+1th bit and an n-1th bit of the encryption key;
decrypting the pre-encrypted software update data by adopting a preset software decryption mechanism to obtain a ciphertext data block;
and decrypting the ciphertext data block by using the deformed key through a data encryption standard DES algorithm to obtain software updating data.
The decryption process is the inverse of the encryption process, as the decryption process for DES is in principle the same as the encryption process, with few differences:
if the use sequence of the subkeys is K1, K2 … … K16 during encryption, the use sequence of the subkeys is K16, K15 … … K1 during decryption;
the input is 64-bit ciphertext, and the output is 64-bit plaintext;
the encryption algorithm is rotated left while the key is generated, but the decryption algorithm is rotated right.
The deformed key in the software development terminal can be transmitted to the software uploading terminal through another electronic medium, and when decryption is carried out, the software uploading terminal obtains the encryption parameters during encryption, and the software updating data is obtained after decryption. The software updating data is stored in the electronic medium after being encrypted, so that the data is prevented from being stolen caused by the loss of the electronic medium, and the safety of the data is better ensured.
According to the technical scheme, the software can be safely and reliably updated, and data is prevented from being tampered during software updating.
Fig. 3 is an architecture diagram of a blockchain application store provided in a third embodiment of the present disclosure, as shown in fig. 3, where the blockchain application store includes:
a receiving module 11 configured to receive the software update data uploaded by the software uploading terminal;
an encryption module 12 configured to encrypt and store the software update data;
a decryption module 13 configured to decrypt stored encrypted software update data when the user terminal accesses the blockchain application store for software update data download;
a transmitting module 14 arranged to transmit the decrypted software update data to the user terminal.
Further, the encryption module 12 is specifically configured to:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
Further, the first encryption algorithm is a digital signature algorithm, and the second encryption algorithm is a hash algorithm.
Further, the receiving module 11 is specifically configured to:
receiving software update data uploaded by a software uploading terminal through a 5G network;
the transmitting module 14 is specifically configured to:
and sending the decrypted software update data to the user terminal through the 5G network.
Fig. 4 is a schematic diagram of a software uploading terminal according to a fourth embodiment of the present disclosure, as shown in fig. 4, including:
an acquisition module 21 arranged to acquire software update data;
and the uploading module 22 is configured to upload the software update data to the blockchain application store, so that the blockchain application store encrypts and stores the software update data, decrypt the stored encrypted software update data when the user terminal accesses the blockchain application store to download the software update data, and send the decrypted software update data to the user terminal.
Further, the software uploading terminal further comprises a connection module 23
The connection module 23 is shown arranged to be connected to an electronic medium in which pre-encrypted software update data is stored;
the acquisition module 21 includes:
an acquisition unit arranged to acquire pre-encrypted software update data from the electronic medium via the connection module 23;
and the decryption unit is used for decrypting the pre-encrypted software updating data to obtain the software updating data.
Further, the decryption unit is specifically configured to:
the method comprises the steps that a deformed key in a software development terminal is obtained through the obtaining unit, the deformed key is obtained by the software development terminal through adopting an MD5 algorithm to operate software update data to generate an encryption key, and the n+1th bit and the n-1th bit of the encryption key are subjected to position replacement; the method comprises the steps of,
decrypting the pre-encrypted software update data by adopting a preset software decryption mechanism to obtain a ciphertext data block; and, in addition, the processing unit,
and decrypting the ciphertext data block by using the deformed key through a DES algorithm to obtain software updating data.
The blockchain application store and the software uploading terminal in the embodiments of the present disclosure are used to implement the software updating method in the first embodiment and the second embodiment of the method, so that the description is simpler, and specific reference may be made to the related description in the first embodiment and the second embodiment of the method, which is not repeated here.
In addition, as shown in fig. 5, a fifth embodiment of the present disclosure further provides a computer device, including a memory 10 and a processor 20, where the memory 10 stores a computer program, and when the processor 20 runs the computer program stored in the memory 10, the processor 20 executes the above-mentioned possible software update determination methods.
Furthermore, embodiments of the present disclosure provide a computer-readable storage medium having stored therein computer-executable instructions that, when executed by at least one processor of a user device, perform the various possible methods described above.
Among them, computer-readable media include computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC (Application Specific Integrated Circuit ). In addition, the ASIC may reside in a user device. The processor and the storage medium may reside as discrete components in a communication device.
It is to be understood that the above embodiments are merely exemplary embodiments employed to illustrate the principles of the present disclosure, however, the present disclosure is not limited thereto. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the disclosure, and are also considered to be within the scope of the disclosure.
Claims (10)
1. A software updating method applied to a blockchain application store, the method comprising:
receiving software update data uploaded by a software uploading terminal;
encrypting and storing the software update data;
when the user terminal accesses the blockchain application store to download the software update data, decrypting the stored encrypted software update data;
transmitting the decrypted software update data to the user terminal;
wherein encrypting the software update data comprises:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
2. The method of claim 1, wherein the first encryption algorithm is a digital signature algorithm and the second encryption algorithm is a hash algorithm.
3. The method according to claim 1, wherein the receiving the software update data uploaded by the software uploading terminal is specifically:
receiving software update data uploaded by a software uploading terminal through a 5G network;
the decrypted software update data is sent to the user terminal, specifically:
and sending the decrypted software update data to the user terminal through the 5G network.
4. A software updating method applied to a software uploading terminal, the method comprising:
acquiring software update data;
uploading the software update data to a blockchain application store, so that the blockchain application store encrypts and stores the software update data, decrypts the stored encrypted software update data when a user terminal accesses the blockchain application store to download the software update data, and then sends the decrypted software update data to the user terminal;
wherein encrypting the software update data comprises:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
5. The method of claim 4, wherein the software uploading terminal is connected to an electronic medium, and wherein the electronic medium stores pre-encrypted software updating data;
the acquiring the software update data includes:
acquiring pre-encrypted software update data from the electronic medium;
and decrypting the pre-encrypted software update data to obtain the software update data.
6. The method of claim 5, wherein decrypting the pre-encrypted software update data results in software update data, comprising:
obtaining a deformed key in a software development terminal, wherein the deformed key is obtained by the software development terminal by adopting a message digest algorithm to operate software update data to generate an encryption key and carrying out position replacement on an n+1th bit and an n-1th bit of the encryption key;
decrypting the pre-encrypted software update data by adopting a preset software decryption mechanism to obtain a ciphertext data block;
and decrypting the ciphertext data block by using the deformed key through a data encryption standard algorithm to obtain software update data.
7. A blockchain application store, comprising:
the receiving module is used for receiving the software update data uploaded by the software uploading terminal;
the encryption module is used for encrypting and storing the software update data;
a decryption module configured to decrypt stored encrypted software update data when the user terminal accesses the blockchain application store for software update data download;
a transmitting module configured to transmit the decrypted software update data to the user terminal;
wherein encrypting the software update data comprises:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
8. A software uploading terminal, comprising:
an acquisition module configured to acquire software update data;
the uploading module is used for uploading the software updating data to the blockchain application store, so that the blockchain application store encrypts and stores the software updating data, decrypts the stored encrypted software updating data when the user terminal accesses the blockchain application store to download the software updating data, and then sends the decrypted software updating data to the user terminal;
wherein encrypting the software update data comprises:
grouping the software update data uploaded by the software uploading terminal and generating multi-segment block chain data;
encrypting the multi-segment blockchain data by adopting a first encryption algorithm to obtain multi-segment blockchain data after primary encryption;
encrypting the multi-segment blockchain data after primary encryption through a key to obtain a plurality of ciphertext blocks;
encrypting the plurality of ciphertext blocks by adopting a second encryption algorithm to obtain multi-segment blockchain data after secondary encryption;
and merging the two-time encrypted multi-segment blockchain data to obtain encrypted software update data.
9. A computer device comprising a memory and a processor, the memory having a computer program stored therein, which when executed by the processor performs the software updating method according to any of claims 1-3 and 4-6.
10. A computer-readable storage medium, comprising: computer program which, when run on a computer, causes the computer to perform the software update method according to any of claims 1-3 and claims 4-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110251872.5A CN112947967B (en) | 2021-03-08 | 2021-03-08 | Software updating method, blockchain application store and software uploading terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110251872.5A CN112947967B (en) | 2021-03-08 | 2021-03-08 | Software updating method, blockchain application store and software uploading terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112947967A CN112947967A (en) | 2021-06-11 |
CN112947967B true CN112947967B (en) | 2023-09-26 |
Family
ID=76228875
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110251872.5A Active CN112947967B (en) | 2021-03-08 | 2021-03-08 | Software updating method, blockchain application store and software uploading terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112947967B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113419769B (en) * | 2021-06-23 | 2024-02-20 | 中国信息通信研究院 | Application software management method and device |
CN113486361B (en) * | 2021-07-27 | 2024-04-16 | 中国银行股份有限公司 | APP management system and method based on block chain |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109375944A (en) * | 2018-08-28 | 2019-02-22 | 苏州浪潮智能软件有限公司 | A kind of terminal software distribution verification method based on block chain data structure |
CN109889589A (en) * | 2019-02-18 | 2019-06-14 | 闪联信息技术工程中心有限公司 | One kind realizing embedded hardware OTA upgrade-system and method based on block chain |
WO2019148050A1 (en) * | 2018-01-25 | 2019-08-01 | Fortress Cyber Security, LLC | Secure storage of data and hashes via a distributed ledger system |
CN110493345A (en) * | 2019-08-23 | 2019-11-22 | 北京智芯微电子科技有限公司 | Internet-of-things terminal method for upgrading software and system based on block chain |
CN111259418A (en) * | 2018-09-05 | 2020-06-09 | 贝富(广州)新技术有限公司 | Anti-counterfeiting method, system and storage medium based on block chain |
KR20200071226A (en) * | 2018-12-11 | 2020-06-19 | 조윤서 | The method of safe and convenient transaction based on master password and public key |
CN111399867A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Software upgrading method, device, equipment and computer readable storage medium |
CN111787093A (en) * | 2020-06-29 | 2020-10-16 | 腾讯科技(深圳)有限公司 | Application management method, application management device, related equipment and medium |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200234003A1 (en) * | 2017-02-27 | 2020-07-23 | Alex Bakman | Method, system and apparatus for generating, editing, and deploying native mobile apps and utilizing deep learning for instant digital conversion |
US20190303623A1 (en) * | 2018-04-02 | 2019-10-03 | Ca, Inc. | Promotion smart contracts for software development processes |
-
2021
- 2021-03-08 CN CN202110251872.5A patent/CN112947967B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019148050A1 (en) * | 2018-01-25 | 2019-08-01 | Fortress Cyber Security, LLC | Secure storage of data and hashes via a distributed ledger system |
CN109375944A (en) * | 2018-08-28 | 2019-02-22 | 苏州浪潮智能软件有限公司 | A kind of terminal software distribution verification method based on block chain data structure |
CN111259418A (en) * | 2018-09-05 | 2020-06-09 | 贝富(广州)新技术有限公司 | Anti-counterfeiting method, system and storage medium based on block chain |
KR20200071226A (en) * | 2018-12-11 | 2020-06-19 | 조윤서 | The method of safe and convenient transaction based on master password and public key |
CN111399867A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Software upgrading method, device, equipment and computer readable storage medium |
CN109889589A (en) * | 2019-02-18 | 2019-06-14 | 闪联信息技术工程中心有限公司 | One kind realizing embedded hardware OTA upgrade-system and method based on block chain |
CN110493345A (en) * | 2019-08-23 | 2019-11-22 | 北京智芯微电子科技有限公司 | Internet-of-things terminal method for upgrading software and system based on block chain |
CN111787093A (en) * | 2020-06-29 | 2020-10-16 | 腾讯科技(深圳)有限公司 | Application management method, application management device, related equipment and medium |
Non-Patent Citations (4)
Title |
---|
EtherTwin: Blockchain-based Secure Digital Twin Information Management;Benedikt Putz等;Information Processing & Management;第58卷(第1期);第1-23页 * |
Secure over-the-air software updates in connected vehicles: A survey;Subir Halder等;Computer Networks;第178卷;第1-19页 * |
对云网融合技术创新的相关思考;史凡;电信科学;第36卷(第7期);第63-70页 * |
新时代、新挑战、新机遇——全球数字化转型大潮中的智慧互联与协作;陈蔚;通信世界(第6期);第46-47页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112947967A (en) | 2021-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11818262B2 (en) | Method and system for one-to-many symmetric cryptography and a network employing the same | |
CN108259169B (en) | File secure sharing method and system based on block chain cloud storage | |
US9537657B1 (en) | Multipart authenticated encryption | |
CN101753292B (en) | Methods and devices for a chained encryption mode | |
US10937339B2 (en) | Digital cryptosystem with re-derivable hybrid keys | |
EP1876748B1 (en) | Privacy-preserving concatenation of strings | |
KR100259179B1 (en) | Process of communication cryptograph | |
CN112947967B (en) | Software updating method, blockchain application store and software uploading terminal | |
CN112738051B (en) | Data information encryption method, system and computer readable storage medium | |
CN111526197A (en) | Cloud data secure sharing method | |
KR102282788B1 (en) | Blockchain system for supporting change of plain text data included in transaction | |
CN115277064A (en) | Data encryption method, data decryption method, data encryption device, data decryption device, electronic equipment and medium | |
CN110611674B (en) | Protocol interaction method, system and storage medium between different computer systems | |
CN114143098A (en) | Data storage method and data storage device | |
JP6631989B2 (en) | Encryption device, control method, and program | |
WO2021044465A1 (en) | Encrypting device, decrypting device, computer program, encryption method, decryption method, and data structure | |
Sri et al. | Concealing the Data Using Cryptography | |
Srinadh et al. | Data security and recovery approach using elliptic curve cryptography | |
CN102474413A (en) | Private key compression | |
Zou | Data Secure Communication System Based on OpenABE | |
Vaidya et al. | Data Leakage Detection and Dependable Storage Service in Cloud Computing | |
Preethi et al. | Enabling Data Integrity Protection in Cloud Storage Using Cryptography | |
Simpson et al. | High-Assurance Cryptography for Web-Based Enterprises | |
CN118503492A (en) | Ciphertext retrieval method, ciphertext retrieval device, ciphertext retrieval equipment and ciphertext storage medium | |
CN114676452A (en) | Data secure storage method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |