CN113779543A - Software authentication method and device - Google Patents

Software authentication method and device Download PDF

Info

Publication number
CN113779543A
CN113779543A CN202110182029.6A CN202110182029A CN113779543A CN 113779543 A CN113779543 A CN 113779543A CN 202110182029 A CN202110182029 A CN 202110182029A CN 113779543 A CN113779543 A CN 113779543A
Authority
CN
China
Prior art keywords
software
preset
identification information
preset software
target identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110182029.6A
Other languages
Chinese (zh)
Inventor
庞超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN202110182029.6A priority Critical patent/CN113779543A/en
Publication of CN113779543A publication Critical patent/CN113779543A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a software authentication method and device, and relates to the technical field of computers. The method comprises the following steps: in response to detecting an instruction indicating authentication of the preset software, acquiring target identification information of the preset software from an executable program of the preset software; acquiring preset identification information of preset software; in response to determining that the target identification information matches the preset identification information, determining the preset software as authenticated software. The method can improve the accuracy of the authentication software.

Description

Software authentication method and device
Technical Field
The disclosure relates to the technical field of computers, in particular to a software authentication method and device.
Background
The signature information of the software can be used for determining the identity of the software, the authenticity of the software, whether the software is tampered or not, and the like. At present, the method for authenticating software according to signature information of software mainly comprises the following steps: and performing software authentication based on the software signature information acquired from the software information recording file.
The existing method for authenticating software based on software signature information acquired from a software information recording file has the problem of inaccurate authentication result.
Disclosure of Invention
The disclosure provides a software authentication method, a software authentication device, an electronic device and a computer-readable storage medium.
According to a first aspect of the present disclosure, there is provided a software authentication method, including: in response to detecting an instruction indicating authentication of the preset software, acquiring target identification information of the preset software from an executable program of the preset software; acquiring preset identification information of preset software; in response to determining that the target identification information matches the preset identification information, determining the preset software as authenticated software.
In some embodiments, obtaining target identification information of the preset software from an executable program of the preset software includes: acquiring target identification information from a first program package of an executable program of preset software; acquiring preset identification information of preset software, including: and acquiring preset identification information from a second package of the executable program of the preset software.
In some embodiments, the software authentication method further comprises: and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the software authentication method further comprises: and sending information for representing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
According to a second aspect of the present disclosure, there is provided a software authentication apparatus including: a first acquisition unit configured to acquire target identification information of preset software from an executable program of the preset software in response to detection of an instruction indicating authentication of the preset software; a second acquisition unit configured to acquire preset identification information of preset software; a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
In some embodiments, the first obtaining unit includes: the first acquisition module is configured to acquire target identification information from a first package of an executable program of preset software; a second acquisition unit comprising: and the second acquisition module is configured to acquire the preset identification information from a second package of the executable program of the preset software.
In some embodiments, the apparatus further comprises: a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the apparatus further comprises: a transmitting unit configured to transmit information for characterizing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
According to a third aspect of the present disclosure, an embodiment of the present disclosure provides an electronic device, including: one or more processors: a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement the software authentication method as provided in the first aspect.
According to a fourth aspect of the present disclosure, an embodiment of the present disclosure provides a computer-readable storage medium on which a computer program is stored, wherein the program, when executed by a processor, implements the software authentication method provided by the first aspect.
According to the software authentication method and device, when the instruction indicating authentication of the preset software is detected, the target identification information of the preset software is obtained from the executable program of the preset software, the preset identification information of the preset software is obtained, and if the target identification information is matched with the preset identification information, the preset software is determined to be the authenticated software, so that the accuracy of software authentication can be improved.
The technology of the application solves the problem that the authentication result of the existing software authentication method is inaccurate.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
FIG. 1 is an exemplary system architecture diagram in which embodiments of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a software authentication method according to the present application;
FIG. 3 is a flow chart of a specific application of the software authentication method according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a software authentication device according to the present application;
fig. 5 is a block diagram of an electronic device for implementing the software authentication method according to the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the software authentication method or software authentication apparatus of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various client applications installed thereon, such as a chat-type application, a shopping-type application, a financial-type application, an image-type application, a video-type application, a browser-type application, etc.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting receiving of server messages, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, and 103 are hardware, various electronic devices may be used, and when the terminal devices 101, 102, and 103 are software, the electronic devices may be installed in the above-listed electronic devices. It may be implemented as multiple pieces of software or software modules (e.g., multiple software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
When the terminal device 101, 102, 103 detects an instruction indicating authentication of the preset software, the terminal device 101, 102, 103 may obtain target identification information of the preset software from an executable program of the preset software, and obtain preset identification information of the preset software. If the terminal device 101, 102, 103 determines that the target identification information matches the preset identification information, it may determine that the preset software is authenticated software.
It should be noted that the software authentication method provided by the embodiment of the present disclosure is generally executed by the terminal devices 101, 102, and 103, and accordingly, the software authentication apparatus is generally disposed in the terminal devices 101, 102, and 103.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a software authentication method according to the present disclosure is shown, comprising the steps of:
in step 201, in response to detecting an instruction indicating authentication of the preset software, target identification information of the preset software is acquired from an executable program of the preset software.
In this embodiment, when an execution subject of the software authentication method (for example, the terminal device 101, 102, 103 shown in fig. 1) detects an instruction indicating authentication of the preset software, an executable program of the preset software may be acquired, and target identification information of the preset software may be acquired from the executable program. The target identification information refers to information obtained from an executable program/file of the software and used for characterizing the identity of the software, for example, software signature information in a loaded file in the executable file, or a software serial number in the executable file.
In this embodiment, the instruction indicating to authenticate the preset software may be an instruction generated by the terminal device before downloading the preset software, while downloading the preset software, after downloading the preset software, before installing the preset software, or before starting the preset software; the instruction indicating the authentication of the preset software may also be an instruction received by the terminal device and sent by the server before the preset software is sent, while the preset software is sent, after the preset software is sent, or before the terminal device performs data transmission with the server through the preset software.
Step 202, acquiring preset identification information of preset software.
In this embodiment, the preset identification information of the preset software may be acquired from the server; preset identification information of the preset software may be acquired from a provider of the preset software (e.g., a software vendor or a software developer, etc.); the preset identification information of the preset software can also be acquired from a certification platform (such as a software detection mechanism) of the preset software. The preset identification information refers to information that is set by a developer of the preset software (a developer of the software or an operating/managing organization of the software) and is used for representing the identity of the software.
Step 203, in response to determining that the target identification information matches the preset identification information, determining the preset software as authenticated software.
In this embodiment, if it is determined that the target identification information matches the preset identification information, that is, if it is determined that the information for characterizing the identity of the preset software, which is acquired from the executable program of the preset software, matches the information for characterizing the identity of the preset software, which is set by the developer, the preset software may be determined to be the authentication software that has not been invaded, tampered, or passed the detection.
In this embodiment, when the target identification information is the same as the preset identification information, it may be determined that the target identification information matches the preset identification information; when the target identification information and the preset identification information can form a preset information pair, it can be determined that the target identification information matches with the preset identification information, for example, the target identification information may be a public key encapsulated in a software package, the preset identification information may be a private key set by a developer, and when the public key is used to decrypt the private key to obtain reserved information, it can be determined that the target identification information matches with the preset identification information.
It should be noted that, after the executable program of the software is modified, the original identification information assembled in the executable program may be tampered during the repackaging/repackaging process, and therefore, the original identification information may be updated after the executable program of the software is modified.
In the software authentication method provided by this embodiment, when an instruction indicating authentication of the preset software is detected, the target identification information of the preset software is obtained from the executable program of the preset software, and the preset identification information of the preset software is obtained, and if it is determined that the target identification information matches the preset identification information, the preset software is determined as authenticated software, so that a condition of performing spoofing detection by using identification information obtained by an unauthorized approach based on a software system information interception method and the like can be avoided, and thus, the accuracy of software authentication can be improved.
Optionally, the obtaining target identification information of the preset software from an executable program of the preset software includes: acquiring target identification information from a first program package of an executable program of preset software; acquiring preset identification information of preset software, including: and acquiring preset identification information from a second package of the executable program of the preset software.
In this embodiment, the target identification information may be obtained from a first package of an executable program of the preset software, for example, the target identification information is obtained from a load command in the executable program, or the target identification information is obtained from a script of the executable program; and obtaining the preset identification information from a second package of the executable program of the preset software, for example, obtaining the preset identification information from a configuration file of the executable program.
In this embodiment, the target identification information and the preset identification information are stored in different positions in the executable program, so that the terminal device can acquire the information through one-time acquisition operation and perform software authentication, thereby improving the efficiency of software authentication.
Optionally, the software authentication method further includes: and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
In this embodiment, in the running process of the preset software or when the preset software is triggered to be started, if it is determined that the target identification information does not match the preset identification information, that is, if it is determined that the information for characterizing the identity of the preset software, which is acquired from the executable program of the preset software, does not match the information for characterizing the identity of the preset software, which is set by the developer, the preset software may be stopped from running.
In this embodiment, before acquiring the preset software, during acquiring the preset software, or after acquiring the preset software, if it is determined that the target identification information is not matched with the preset identification information, the acquisition of the preset software may be stopped, or the acquired preset software may be deleted or uninstalled from the local computer.
In this embodiment, if it is determined that the target identification information of the preset software is not matched with the preset identification information of the preset software, the operation is stopped or the acquisition/installation of the preset software is stopped, so that the situation that the intrusive, tampered or counterfeit software is installed/operated on the terminal device can be avoided, and the risk that property loss or information leakage occurs to a user of the terminal device is avoided. In addition, the rights and interests loss of copyright and the like of the owner of the legal software caused by installing and using the pirated software by the user can be avoided.
Optionally, the software authentication method further includes: and sending information for representing that the preset software is tampered.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, information for representing that the preset software has been maliciously tampered may be sent to the server, so as to prompt an administrator or an operator of the preset program to know the information, so that the administrator or the operator can upgrade the preset program to ensure rights and interests of the user and the operator.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, the terminal device may send information indicating that the preset software has been tampered to the user, so that the user knows that the preset software is unauthorized counterfeit software or tampered software, and stops using the software to guarantee the rights and interests of the user.
In this embodiment, if it is determined that the target identification information does not match the preset identification information, information for representing that the preset software is tampered is sent, so that the use safety of the software can be improved.
In some alternative implementations of the embodiment described above with respect to fig. 2, the identification information includes a package identification of the application.
In this embodiment, the identification information indicated in the target identification information or the preset identification information may be a package identification/package identifier of the software program, for example, a unique identifier (bundle identifier) of an application installed on the mobile terminal, a unique identifier (bundle version) of an application installed in the android system, or the like.
With continued reference to FIG. 3, a specific application flow 300 of a software authentication method according to the present disclosure is shown.
First, an executable file of preset software in the user equipment is read, and header information of the executable file (i.e., information including a processor architecture of the executable file, a type of the executable file, and a load command of the executable file) is acquired. The method includes the steps of obtaining a SIGNATURE instruction (for example, LC _ CODE _ SIGNATURE instruction) for storing SIGNATURE information in a loading command of an executable file, obtaining a storage location pointer of the SIGNATURE information of preset software and an information data amount of the SIGNATURE information in the SIGNATURE instruction, reading data from a storage space pointed by the storage location pointer according to the storage location pointer of the SIGNATURE information of the preset software, and stopping reading the data until the data with the data amount equal to the information data amount is obtained.
And then, analyzing the data containing the signature information of the preset software by using an analysis method such as data decryption or field analysis, and obtaining a target signature character string of the preset software.
Finally, matching the target signature character string of the preset software obtained from the executable file with the preset signature character string of the preset software set by a developer, and if the target signature character string and the preset signature character string are the same, determining the preset software currently running by the preset user equipment or the preset software acquired by the user equipment as authenticated software; if the current running preset software of the preset user equipment is not matched with the current running preset software of the user equipment, or the preset software acquired by the user equipment is tampered software or fake software.
With further reference to fig. 4, as an implementation of the methods shown in the above-mentioned figures, the present disclosure provides an embodiment of a software authentication apparatus, which corresponds to the method embodiment shown in fig. 2, and which can be applied in various electronic devices.
As shown in fig. 4, the software authentication apparatus 400 of the present embodiment includes: a first acquisition unit 401, a second acquisition unit 402, a determination unit 403. The first obtaining unit is configured to obtain target identification information of the preset software from an executable program of the preset software in response to detecting an instruction indicating authentication of the preset software; a second acquisition unit configured to acquire preset identification information of preset software; a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
In some embodiments, the first obtaining unit includes: the first acquisition module is configured to acquire target identification information from a first package of an executable program of preset software; a second acquisition unit comprising: and the second acquisition module is configured to acquire the preset identification information from a second package of the executable program of the preset software.
In some embodiments, the apparatus further comprises: a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
In some embodiments, the apparatus further comprises: a transmitting unit configured to transmit information for characterizing that the preset software is tampered.
In some embodiments, the identification information includes a package identification of the application.
The units in the apparatus 400 described above correspond to the steps in the method described with reference to fig. 2. Thus, the operations, features and technical effects described above for the software authentication method are also applicable to the apparatus 400 and the units included therein, and are not described herein again.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
As shown in fig. 5, is a block diagram of an electronic device 500 for a method of extracting a video segment according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 5, the electronic apparatus includes: one or more processors 501, memory 502, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 5, one processor 501 is taken as an example.
Memory 502 is a non-transitory computer readable storage medium as provided herein. Wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method for extracting video segments provided herein. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to perform the method for extracting a video segment provided by the present application.
The memory 502, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method for extracting video segments in the embodiments of the present application (e.g., the first obtaining unit 401, the second obtaining unit 402, and the determining unit 403 shown in fig. 4). The processor 501 executes various functional applications of the server and data processing, namely, implements the method for extracting a video clip in the above-described method embodiment, by running non-transitory software programs, instructions, and modules stored in the memory 502.
The memory 502 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the electronic device for extracting the video clip, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 502 optionally includes memory located remotely from processor 501, which may be connected to an electronic device for retrieving video clips over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device for the method of extracting a video clip may further include: an input device 503, an output device 504, and a bus 505. The processor 501, the memory 502, the input device 503 and the output device 504 may be connected by a bus 505 or other means, and fig. 5 illustrates an example in which these are connected by the bus 505.
The input device 503 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus for extracting the video clip, such as an input device of a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or the like. The output devices 504 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present application can be achieved, and the present invention is not limited herein.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (12)

1. A software authentication method, comprising:
in response to detecting an instruction indicating authentication of preset software, acquiring target identification information of the preset software from an executable program of the preset software;
acquiring preset identification information of the preset software;
in response to determining that the target identification information matches the preset identification information, determining that the preset software is authenticated software.
2. The method of claim 1, wherein the obtaining target identification information of the preset software from an executable program of the preset software comprises:
acquiring the target identification information from a first program package of the executable program of the preset software;
the acquiring of the preset identification information of the preset software includes:
and acquiring the preset identification information from a second program package of the executable program of the preset software.
3. The method of claim 1, wherein the method further comprises:
and stopping running the preset software in response to determining that the target identification information does not match the preset identification information.
4. The method of claim 3, wherein the method further comprises:
and sending information for representing that the preset software is tampered.
5. The method of any of claims 1-4, wherein the identification information comprises a package identification of the application.
6. A software authentication apparatus comprising:
a first acquisition unit configured to acquire target identification information of preset software from an executable program of the preset software in response to detection of an instruction indicating authentication of the preset software;
a second acquisition unit configured to acquire preset identification information of the preset software;
a determination unit configured to determine the preset software as authenticated software in response to determining that the target identification information matches the preset identification information.
7. The apparatus of claim 6, wherein the first obtaining unit comprises:
a first obtaining module configured to obtain the target identification information from a first package of an executable program of the preset software;
the second acquisition unit includes:
a second obtaining module configured to obtain the preset identification information from a second package of the executable program of the preset software.
8. The apparatus of claim 6, wherein the apparatus further comprises:
a shutdown unit configured to stop running the preset software in response to determining that the target identification information does not match the preset identification information.
9. The apparatus of claim 8, wherein the apparatus further comprises:
a transmitting unit configured to transmit information for characterizing the preset software is tampered.
10. The apparatus according to one of claims 6 to 9, wherein the identification information comprises a package identification of the application.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-5.
CN202110182029.6A 2021-02-10 2021-02-10 Software authentication method and device Pending CN113779543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110182029.6A CN113779543A (en) 2021-02-10 2021-02-10 Software authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110182029.6A CN113779543A (en) 2021-02-10 2021-02-10 Software authentication method and device

Publications (1)

Publication Number Publication Date
CN113779543A true CN113779543A (en) 2021-12-10

Family

ID=78835689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110182029.6A Pending CN113779543A (en) 2021-02-10 2021-02-10 Software authentication method and device

Country Status (1)

Country Link
CN (1) CN113779543A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170257361A1 (en) * 2016-03-03 2017-09-07 F-Secure Corporation Authenticating or Controlling Software Application on End User Device
EP3299984A1 (en) * 2016-09-21 2018-03-28 Alcatel Lucent Authentication of a software entity by another software entity
CN111274563A (en) * 2020-01-07 2020-06-12 腾讯科技(深圳)有限公司 Security authentication method and related device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170257361A1 (en) * 2016-03-03 2017-09-07 F-Secure Corporation Authenticating or Controlling Software Application on End User Device
EP3299984A1 (en) * 2016-09-21 2018-03-28 Alcatel Lucent Authentication of a software entity by another software entity
CN111274563A (en) * 2020-01-07 2020-06-12 腾讯科技(深圳)有限公司 Security authentication method and related device

Similar Documents

Publication Publication Date Title
US11687653B2 (en) Methods and apparatus for identifying and removing malicious applications
US10127057B2 (en) Method and apparatus for dynamically implementing application function
CN105940654B (en) Franchise static web application in trust
US8667487B1 (en) Web browser extensions
US9608881B2 (en) Service compliance enforcement using user activity monitoring and work request verification
US9367695B2 (en) Software vulnerability notification via icon decorations
WO2018208669A1 (en) Systems and methods for providing user interfaces based on actions associated with untrusted emails
US9195809B1 (en) Automated vulnerability and error scanner for mobile applications
WO2021254075A1 (en) Application login method and apparatus
CN103329093A (en) Updating software
KR20160100151A (en) Processing for secure information
CN111163095B (en) Network attack analysis method, network attack analysis device, computing device, and medium
CN106682491B (en) Application downloading method and device
US11347519B2 (en) Systems and methods for detecting short-term changes to BIOS setup
CN109995523B (en) Activation code management method and device and activation code generation method and device
CN110070360B (en) Transaction request processing method, device, equipment and storage medium
CN111695166A (en) Disk encryption protection method and device
US9021596B2 (en) Correcting workflow security vulnerabilities via static analysis and virtual patching
CN114363088B (en) Method and device for requesting data
CN114048506A (en) Application control method, device, equipment and storage medium
US20150278055A1 (en) Pluggable component tracking program
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program
US10831883B1 (en) Preventing application installation using system-level messages
CN113612756B (en) Shared login method and device, computer readable storage medium and electronic equipment
CN113779543A (en) Software authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination