CN113779543A - Software authentication method and device - Google Patents
Software authentication method and device Download PDFInfo
- Publication number
- CN113779543A CN113779543A CN202110182029.6A CN202110182029A CN113779543A CN 113779543 A CN113779543 A CN 113779543A CN 202110182029 A CN202110182029 A CN 202110182029A CN 113779543 A CN113779543 A CN 113779543A
- Authority
- CN
- China
- Prior art keywords
- software
- preset
- identification information
- preset software
- target identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000004044 response Effects 0.000 claims abstract description 20
- 230000015654 memory Effects 0.000 claims description 17
- 238000001514 detection method Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 6
- 238000004590 computer program Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a software authentication method and device, and relates to the technical field of computers. The method comprises the following steps: in response to detecting an instruction indicating authentication of the preset software, acquiring target identification information of the preset software from an executable program of the preset software; acquiring preset identification information of preset software; in response to determining that the target identification information matches the preset identification information, determining the preset software as authenticated software. The method can improve the accuracy of the authentication software.
Description
Technical Field
The disclosure relates to the technical field of computers, in particular to a software authentication method and device.
Background
The signature information of the software can be used for determining the identity of the software, the authenticity of the software, whether the software is tampered or not, and the like. At present, the method for authenticating software according to signature information of software mainly comprises the following steps: and performing software authentication based on the software signature information acquired from the software information recording file.
The existing method for authenticating software based on software signature information acquired from a software information recording file has the problem of inaccurate authentication result.
Disclosure of Invention
The disclosure provides a software authentication method, a software authentication device, an electronic device and a computer-readable storage medium.
According to a first aspect of the present disclosure, there is provided a software authentication method, including: in response to detecting an instruction indicating authentication of the preset software, acquiring target identification information of the preset software from an executable program of the preset software; acquiring preset identification information of preset software; in response to determining that the target identification information matches the preset identification information, determining the preset software as authenticated software.
In some embodiments, obtaining target identification information of the preset software from an executable program of the preset software includes: acquiring target identification information from a first program package of an executable program of preset software; acquiring preset identification information of preset software, including: and acquiring preset identification information from a second package of the executable program of the preset software.
In some embodiments, the software authentication method further comprises: and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the software authentication method further comprises: and sending information for representing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
According to a second aspect of the present disclosure, there is provided a software authentication apparatus including: a first acquisition unit configured to acquire target identification information of preset software from an executable program of the preset software in response to detection of an instruction indicating authentication of the preset software; a second acquisition unit configured to acquire preset identification information of preset software; a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
In some embodiments, the first obtaining unit includes: the first acquisition module is configured to acquire target identification information from a first package of an executable program of preset software; a second acquisition unit comprising: and the second acquisition module is configured to acquire the preset identification information from a second package of the executable program of the preset software.
In some embodiments, the apparatus further comprises: a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the apparatus further comprises: a transmitting unit configured to transmit information for characterizing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
According to a third aspect of the present disclosure, an embodiment of the present disclosure provides an electronic device, including: one or more processors: a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement the software authentication method as provided in the first aspect.
According to a fourth aspect of the present disclosure, an embodiment of the present disclosure provides a computer-readable storage medium on which a computer program is stored, wherein the program, when executed by a processor, implements the software authentication method provided by the first aspect.
According to the software authentication method and device, when the instruction indicating authentication of the preset software is detected, the target identification information of the preset software is obtained from the executable program of the preset software, the preset identification information of the preset software is obtained, and if the target identification information is matched with the preset identification information, the preset software is determined to be the authenticated software, so that the accuracy of software authentication can be improved.
The technology of the application solves the problem that the authentication result of the existing software authentication method is inaccurate.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is an exemplary system architecture diagram in which embodiments of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a software authentication method according to the present application;
FIG. 3 is a flow chart of a specific application of the software authentication method according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a software authentication device according to the present application;
fig. 5 is a block diagram of an electronic device for implementing the software authentication method according to the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the software authentication method or software authentication apparatus of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various client applications installed thereon, such as a chat-type application, a shopping-type application, a financial-type application, an image-type application, a video-type application, a browser-type application, etc.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting receiving of server messages, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, and 103 are hardware, various electronic devices may be used, and when the terminal devices 101, 102, and 103 are software, the electronic devices may be installed in the above-listed electronic devices. It may be implemented as multiple pieces of software or software modules (e.g., multiple software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
When the terminal device 101, 102, 103 detects an instruction indicating authentication of the preset software, the terminal device 101, 102, 103 may obtain target identification information of the preset software from an executable program of the preset software, and obtain preset identification information of the preset software. If the terminal device 101, 102, 103 determines that the target identification information matches the preset identification information, it may determine that the preset software is authenticated software.
It should be noted that the software authentication method provided by the embodiment of the present disclosure is generally executed by the terminal devices 101, 102, and 103, and accordingly, the software authentication apparatus is generally disposed in the terminal devices 101, 102, and 103.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a software authentication method according to the present disclosure is shown, comprising the steps of:
in step 201, in response to detecting an instruction indicating authentication of the preset software, target identification information of the preset software is acquired from an executable program of the preset software.
In this embodiment, when an execution subject of the software authentication method (for example, the terminal device 101, 102, 103 shown in fig. 1) detects an instruction indicating authentication of the preset software, an executable program of the preset software may be acquired, and target identification information of the preset software may be acquired from the executable program. The target identification information refers to information obtained from an executable program/file of the software and used for characterizing the identity of the software, for example, software signature information in a loaded file in the executable file, or a software serial number in the executable file.
In this embodiment, the instruction indicating to authenticate the preset software may be an instruction generated by the terminal device before downloading the preset software, while downloading the preset software, after downloading the preset software, before installing the preset software, or before starting the preset software; the instruction indicating the authentication of the preset software may also be an instruction received by the terminal device and sent by the server before the preset software is sent, while the preset software is sent, after the preset software is sent, or before the terminal device performs data transmission with the server through the preset software.
In this embodiment, the preset identification information of the preset software may be acquired from the server; preset identification information of the preset software may be acquired from a provider of the preset software (e.g., a software vendor or a software developer, etc.); the preset identification information of the preset software can also be acquired from a certification platform (such as a software detection mechanism) of the preset software. The preset identification information refers to information that is set by a developer of the preset software (a developer of the software or an operating/managing organization of the software) and is used for representing the identity of the software.
In this embodiment, if it is determined that the target identification information matches the preset identification information, that is, if it is determined that the information for characterizing the identity of the preset software, which is acquired from the executable program of the preset software, matches the information for characterizing the identity of the preset software, which is set by the developer, the preset software may be determined to be the authentication software that has not been invaded, tampered, or passed the detection.
In this embodiment, when the target identification information is the same as the preset identification information, it may be determined that the target identification information matches the preset identification information; when the target identification information and the preset identification information can form a preset information pair, it can be determined that the target identification information matches with the preset identification information, for example, the target identification information may be a public key encapsulated in a software package, the preset identification information may be a private key set by a developer, and when the public key is used to decrypt the private key to obtain reserved information, it can be determined that the target identification information matches with the preset identification information.
It should be noted that, after the executable program of the software is modified, the original identification information assembled in the executable program may be tampered during the repackaging/repackaging process, and therefore, the original identification information may be updated after the executable program of the software is modified.
In the software authentication method provided by this embodiment, when an instruction indicating authentication of the preset software is detected, the target identification information of the preset software is obtained from the executable program of the preset software, and the preset identification information of the preset software is obtained, and if it is determined that the target identification information matches the preset identification information, the preset software is determined as authenticated software, so that a condition of performing spoofing detection by using identification information obtained by an unauthorized approach based on a software system information interception method and the like can be avoided, and thus, the accuracy of software authentication can be improved.
Optionally, the obtaining target identification information of the preset software from an executable program of the preset software includes: acquiring target identification information from a first program package of an executable program of preset software; acquiring preset identification information of preset software, including: and acquiring preset identification information from a second package of the executable program of the preset software.
In this embodiment, the target identification information may be obtained from a first package of an executable program of the preset software, for example, the target identification information is obtained from a load command in the executable program, or the target identification information is obtained from a script of the executable program; and obtaining the preset identification information from a second package of the executable program of the preset software, for example, obtaining the preset identification information from a configuration file of the executable program.
In this embodiment, the target identification information and the preset identification information are stored in different positions in the executable program, so that the terminal device can acquire the information through one-time acquisition operation and perform software authentication, thereby improving the efficiency of software authentication.
Optionally, the software authentication method further includes: and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
In this embodiment, in the running process of the preset software or when the preset software is triggered to be started, if it is determined that the target identification information does not match the preset identification information, that is, if it is determined that the information for characterizing the identity of the preset software, which is acquired from the executable program of the preset software, does not match the information for characterizing the identity of the preset software, which is set by the developer, the preset software may be stopped from running.
In this embodiment, before acquiring the preset software, during acquiring the preset software, or after acquiring the preset software, if it is determined that the target identification information is not matched with the preset identification information, the acquisition of the preset software may be stopped, or the acquired preset software may be deleted or uninstalled from the local computer.
In this embodiment, if it is determined that the target identification information of the preset software is not matched with the preset identification information of the preset software, the operation is stopped or the acquisition/installation of the preset software is stopped, so that the situation that the intrusive, tampered or counterfeit software is installed/operated on the terminal device can be avoided, and the risk that property loss or information leakage occurs to a user of the terminal device is avoided. In addition, the rights and interests loss of copyright and the like of the owner of the legal software caused by installing and using the pirated software by the user can be avoided.
Optionally, the software authentication method further includes: and sending information for representing that the preset software is tampered.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, information for representing that the preset software has been maliciously tampered may be sent to the server, so as to prompt an administrator or an operator of the preset program to know the information, so that the administrator or the operator can upgrade the preset program to ensure rights and interests of the user and the operator.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, the terminal device may send information indicating that the preset software has been tampered to the user, so that the user knows that the preset software is unauthorized counterfeit software or tampered software, and stops using the software to guarantee the rights and interests of the user.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, information for representing that the preset software is tampered is sent, so that the use safety of the software can be improved.
In some alternative implementations of the embodiment described above with respect to fig. 2, the identification information includes a package identification of the application.
In this embodiment, the identification information indicated in the target identification information or the preset identification information may be a package identification/package identifier of the software program, for example, a unique identifier (bundle identifier) of an application installed on the mobile terminal, a unique identifier (bundle version) of an application installed in the android system, or the like.
With continued reference to FIG. 3, a specific application flow 300 of a software authentication method according to the present disclosure is shown.
First, an executable file of preset software in the user equipment is read, and header information of the executable file (i.e., information including a processor architecture of the executable file, a type of the executable file, and a load command of the executable file) is acquired. The method includes the steps of obtaining a SIGNATURE instruction (for example, LC _ CODE _ SIGNATURE instruction) for storing SIGNATURE information in a loading command of an executable file, obtaining a storage location pointer of the SIGNATURE information of preset software and an information data amount of the SIGNATURE information in the SIGNATURE instruction, reading data from a storage space pointed by the storage location pointer according to the storage location pointer of the SIGNATURE information of the preset software, and stopping reading the data until the data with the data amount equal to the information data amount is obtained.
And then, analyzing the data containing the signature information of the preset software by using an analysis method such as data decryption or field analysis, and obtaining a target signature character string of the preset software.
Finally, matching the target signature character string of the preset software obtained from the executable file with the preset signature character string of the preset software set by a developer, and if the target signature character string and the preset signature character string are the same, determining the preset software currently running by the preset user equipment or the preset software acquired by the user equipment as authenticated software; if the current running preset software of the preset user equipment is not matched with the current running preset software of the user equipment, or the preset software acquired by the user equipment is tampered software or fake software.
With further reference to fig. 4, as an implementation of the methods shown in the above-mentioned figures, the present disclosure provides an embodiment of a software authentication apparatus, which corresponds to the method embodiment shown in fig. 2, and which can be applied in various electronic devices.
As shown in fig. 4, the software authentication apparatus 400 of the present embodiment includes: a first acquisition unit 401, a second acquisition unit 402, a determination unit 403. The first obtaining unit is configured to obtain target identification information of the preset software from an executable program of the preset software in response to detecting an instruction indicating authentication of the preset software; a second acquisition unit configured to acquire preset identification information of preset software; a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
In some embodiments, the first obtaining unit includes: the first acquisition module is configured to acquire target identification information from a first package of an executable program of preset software; a second acquisition unit comprising: and the second acquisition module is configured to acquire the preset identification information from a second package of the executable program of the preset software.
In some embodiments, the apparatus further comprises: a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the apparatus further comprises: a transmitting unit configured to transmit information for characterizing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
The units in the apparatus 400 described above correspond to the steps in the method described with reference to fig. 2. Thus, the operations, features and technical effects described above for the software authentication method are also applicable to the apparatus 400 and the units included therein, and are not described herein again.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
As shown in fig. 5, is a block diagram of an electronic device 500 for a method of extracting a video segment according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 5, the electronic apparatus includes: one or more processors 501, memory 502, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 5, one processor 501 is taken as an example.
The memory 502, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method for extracting video segments in the embodiments of the present application (e.g., the first obtaining unit 401, the second obtaining unit 402, and the determining unit 403 shown in fig. 4). The processor 501 executes various functional applications of the server and data processing, namely, implements the method for extracting a video clip in the above-described method embodiment, by running non-transitory software programs, instructions, and modules stored in the memory 502.
The memory 502 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device for extracting the video clip, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 502 optionally includes memory located remotely from processor 501, which may be connected to an electronic device for retrieving video clips over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device for the method of extracting a video clip may further include: an input device 503, an output device 504, and a bus 505. The processor 501, the memory 502, the input device 503 and the output device 504 may be connected by a bus 505 or other means, and fig. 5 illustrates an example in which these are connected by the bus 505.
The input device 503 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus for extracting the video clip, such as an input device of a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or the like. The output devices 504 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, and the present invention is not limited herein.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (12)
1. A software authentication method, comprising:
in response to detecting an instruction indicating authentication of preset software, acquiring target identification information of the preset software from an executable program of the preset software;
acquiring preset identification information of the preset software;
in response to determining that the target identification information matches the preset identification information, determining that the preset software is authenticated software.
2. The method of claim 1, wherein the obtaining target identification information of the preset software from an executable program of the preset software comprises:
acquiring the target identification information from a first program package of the executable program of the preset software;
the acquiring of the preset identification information of the preset software includes:
and acquiring the preset identification information from a second program package of the executable program of the preset software.
3. The method of claim 1, wherein the method further comprises:
and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
4. The method of claim 3, wherein the method further comprises:
and sending information for representing that the preset software is tampered.
5. The method of any of claims 1-4, wherein the identification information comprises a package identification of the application.
6. A software authentication apparatus comprising:
a first acquisition unit configured to acquire target identification information of preset software from an executable program of the preset software in response to detection of an instruction indicating authentication of the preset software;
a second acquisition unit configured to acquire preset identification information of the preset software;
a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
7. The apparatus of claim 6, wherein the first obtaining unit comprises:
a first obtaining module configured to obtain the target identification information from a first package of an executable program of the preset software;
the second acquisition unit includes:
a second obtaining module configured to obtain the preset identification information from a second package of the executable program of the preset software.
8. The apparatus of claim 6, wherein the apparatus further comprises:
a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
9. The apparatus of claim 8, wherein the apparatus further comprises:
a transmitting unit configured to transmit information for characterizing the preset software is tampered.
10. The apparatus according to one of claims 6 to 9, wherein the identification information comprises a package identification of the application.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110182029.6A CN113779543A (en) | 2021-02-10 | 2021-02-10 | Software authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110182029.6A CN113779543A (en) | 2021-02-10 | 2021-02-10 | Software authentication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113779543A true CN113779543A (en) | 2021-12-10 |
Family
ID=78835689
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110182029.6A Pending CN113779543A (en) | 2021-02-10 | 2021-02-10 | Software authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113779543A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170257361A1 (en) * | 2016-03-03 | 2017-09-07 | F-Secure Corporation | Authenticating or Controlling Software Application on End User Device |
EP3299984A1 (en) * | 2016-09-21 | 2018-03-28 | Alcatel Lucent | Authentication of a software entity by another software entity |
CN111274563A (en) * | 2020-01-07 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Security authentication method and related device |
-
2021
- 2021-02-10 CN CN202110182029.6A patent/CN113779543A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170257361A1 (en) * | 2016-03-03 | 2017-09-07 | F-Secure Corporation | Authenticating or Controlling Software Application on End User Device |
EP3299984A1 (en) * | 2016-09-21 | 2018-03-28 | Alcatel Lucent | Authentication of a software entity by another software entity |
CN111274563A (en) * | 2020-01-07 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Security authentication method and related device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11687653B2 (en) | Methods and apparatus for identifying and removing malicious applications | |
US10127057B2 (en) | Method and apparatus for dynamically implementing application function | |
CN105940654B (en) | Franchise static web application in trust | |
US8667487B1 (en) | Web browser extensions | |
US9608881B2 (en) | Service compliance enforcement using user activity monitoring and work request verification | |
US9367695B2 (en) | Software vulnerability notification via icon decorations | |
WO2018208669A1 (en) | Systems and methods for providing user interfaces based on actions associated with untrusted emails | |
US9195809B1 (en) | Automated vulnerability and error scanner for mobile applications | |
WO2021254075A1 (en) | Application login method and apparatus | |
CN103329093A (en) | Updating software | |
KR20160100151A (en) | Processing for secure information | |
CN111163095B (en) | Network attack analysis method, network attack analysis device, computing device, and medium | |
CN106682491B (en) | Application downloading method and device | |
US11347519B2 (en) | Systems and methods for detecting short-term changes to BIOS setup | |
CN109995523B (en) | Activation code management method and device and activation code generation method and device | |
CN110070360B (en) | Transaction request processing method, device, equipment and storage medium | |
CN111695166A (en) | Disk encryption protection method and device | |
US9021596B2 (en) | Correcting workflow security vulnerabilities via static analysis and virtual patching | |
CN114363088B (en) | Method and device for requesting data | |
CN114048506A (en) | Application control method, device, equipment and storage medium | |
US20150278055A1 (en) | Pluggable component tracking program | |
CN111666567A (en) | Detection method, device, computer program and medium for malicious modification of application program | |
US10831883B1 (en) | Preventing application installation using system-level messages | |
CN113612756B (en) | Shared login method and device, computer readable storage medium and electronic equipment | |
CN113779543A (en) | Software authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |