WO2021244020A1 - 资源加密及展示方法及系统 - Google Patents

资源加密及展示方法及系统 Download PDF

Info

Publication number
WO2021244020A1
WO2021244020A1 PCT/CN2020/140993 CN2020140993W WO2021244020A1 WO 2021244020 A1 WO2021244020 A1 WO 2021244020A1 CN 2020140993 W CN2020140993 W CN 2020140993W WO 2021244020 A1 WO2021244020 A1 WO 2021244020A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
time
resource
hidden
encryption
Prior art date
Application number
PCT/CN2020/140993
Other languages
English (en)
French (fr)
Inventor
许兴旺
Original Assignee
上海哔哩哔哩科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海哔哩哔哩科技有限公司 filed Critical 上海哔哩哔哩科技有限公司
Priority to EP20938969.1A priority Critical patent/EP4068087A4/en
Publication of WO2021244020A1 publication Critical patent/WO2021244020A1/zh
Priority to US17/844,825 priority patent/US20220321344A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Definitions

  • This application relates to the field of data processing technology, in particular to a resource encryption and display method, system, electronic device, and computer-readable storage medium.
  • the splash screen is a transitional page displayed to the user every time an application is started, and is generally used to conceal the fact that the startup speed is slow.
  • the splash screen page has the largest display area and the most abundant displayable content, it exists as the first advertising spot in all major applications.
  • the splash screen page is the first launch interface, there may be situations where the network is not available when displaying splash screen resources.
  • the abundance of resources also means an increase in size, so the general splash screen resources are downloaded and stored in advance , And show it when you need it.
  • resources need to be encrypted there will be many problems, and they cannot be displayed quickly and safely.
  • the main implementation method is to deliver it on the day when the splash screen resource needs to be displayed, or to directly display the online resource on the same day.
  • the inventor realizes that the first method will lose the real-time performance and success rate of the display, and the user may never open the splash screen page after the resource is downloaded that day.
  • the second method can circumvent the above problems, it has the defect of resource display fluency. In severe cases, resource loading may block application usage due to network problems.
  • these two methods both involve communication with the server, and the time required is at least 100 milliseconds or more. Some scenarios are still blocking. The client needs to wait for the completion of the communication before deciding what to do next, bringing users Experience the problem. If the loading time of the splash screen resource is too long, it will cause delays in entering the application.
  • the main purpose of this application is to propose a resource encryption and display method, system, electronic device, and computer-readable storage medium, aiming to solve the problem of how to ensure the safe and efficient display of splash screen resources without blocking the startup of the application program .
  • an embodiment of the present application provides a resource encryption and display method, and the method includes:
  • the resource file is obtained through decryption and splicing and displayed.
  • the file cutting and partial encryption of the pre-downloaded resource file includes:
  • At least one component is removed from the hidden file, and the removed component is encrypted.
  • the file cutting and partial encryption of the pre-downloaded resource file includes:
  • the header information is removed from the hidden file, and the header information is written into the corresponding field of the resource management file.
  • the calculating the current real time according to the difference between the correct time obtained from the server and the device startup duration of the client, and judging whether the current time of the device is credible according to the real time includes:
  • the current real time is calculated according to the difference between the correct time obtained from the server last time and the device startup time, where the device startup time difference is the last time the device startup time has been acquired from the server The difference between the first startup duration of the device at the correct time and the currently acquired second startup duration of the device;
  • the calculating the current real time according to the difference between the correct time obtained from the server and the device startup duration of the client, and judging whether the current time of the device is credible according to the real time further includes:
  • the device When the device has restarted after obtaining the correct time from the server last time or the system time is not equal to the real time, it is determined that the current time of the device is not credible.
  • the real time is the difference between the correct time and the start-up duration of the device.
  • the obtaining and displaying the resource file through decryption and splicing includes:
  • the obtaining and displaying the resource file through decryption and splicing includes:
  • the header information and the remaining part are spliced to obtain the complete resource file and displayed.
  • the method further includes:
  • a timeline is randomly recorded during the operation of the application program corresponding to the resource file, and when it is found that the timeline does not conform to a normal time law, the current time of the device is set as untrustworthy.
  • the resource is a splash screen resource.
  • an embodiment of the present application also proposes a resource encryption and display system, and the system includes:
  • the encryption module is used to perform file cutting and partial encryption on the pre-downloaded resource file, where the partial encryption is to encrypt at least one component of the resource file.
  • the judgment module is used to calculate the current real time according to the difference between the correct time obtained from the server and the device startup time of the client, and to judge whether the current time of the device is credible according to the real time.
  • the display module is used to obtain and display the resource file through decryption and splicing when the current time of the device is credible.
  • an embodiment of the present application also provides an electronic device, the electronic device including: a memory, a processor, and computer-readable instructions stored on the memory and running on the processor, the When the computer-readable instructions are executed by the processor, the following steps are implemented:
  • the resource file is obtained through decryption and splicing and displayed.
  • embodiments of the present application further provide a computer-readable storage medium, on which computer-readable instructions are stored, and when the computer-readable instructions are executed by a processor, the following steps are implemented:
  • the resource file is obtained through decryption and splicing and displayed.
  • the resource encryption and display method, system, electronic device, and computer-readable storage medium proposed in the embodiments of this application can ensure that the current time of the device is true and effective without waiting for synchronization with the server, and can be the first time for most users Display splash screen resources; and guarantee the safety of splash screen resources and prevent resource leakage without performing a large number of encryption and decryption operations. Therefore, the embodiments of the present application can ensure the safe and efficient display of splash screen resources without blocking the startup of the application program.
  • FIG. 1 is a diagram of an application environment architecture for implementing various embodiments of the present application
  • Figure 2 is a flowchart of a resource encryption and display method proposed in the first embodiment of this application
  • FIG. 3 is a detailed flowchart of step S200 in FIG. 2;
  • FIG. 4 is a schematic diagram of the detailed flow of step S202 in FIG. 2;
  • FIG. 5 is a schematic diagram of the detailed flow of step S204 in FIG. 2;
  • FIG. 6 is a schematic diagram of the hardware architecture of an electronic device proposed in the second embodiment of this application.
  • FIG. 7 is a schematic diagram of modules of a resource encryption and display system proposed by the third embodiment of this application.
  • FIG. 1 is an architecture diagram of an application environment for implementing various embodiments of the present application. This application can be applied to an application environment including, but not limited to, the client 2, the server 4, and the network 6.
  • the client 2 is used to download resource files from the server 4 and perform cutting, encryption, decryption, and display.
  • the client 2 may be a terminal device such as a mobile phone, a tablet computer, a PC (Personal Computer, personal computer), a portable computer, and a wearable device.
  • the server 4 is used to provide the client 2 with resource files and correct time.
  • the server 4 may be a computing device such as a rack server, a blade server, a tower server, or a cabinet server, and may be an independent server or a server cluster composed of multiple servers.
  • the network 6 may be an intranet, the Internet, a global system of mobile communication (GSM), a wideband code division multiple access (WCDMA), a 4G network, 5G network, Bluetooth (Bluetooth), Wi-Fi and other wireless or wired networks.
  • GSM global system of mobile communication
  • WCDMA wideband code division multiple access
  • 4G network 4G network
  • 5G network 5G network
  • Bluetooth Bluetooth
  • Wi-Fi wireless or wired networks.
  • the server 4 and one or more of the clients 2 are communicatively connected through the network 6 for data transmission and interaction.
  • splash screen resource is taken as an example to illustrate the resource encryption and display solution of the present application.
  • other resources with similar characteristics to splash screen resources such as any resources that can be downloaded through preloading, can be encrypted and displayed using a similar scheme in this application.
  • FIG. 2 it is a flowchart of a resource encryption and display method proposed in the first embodiment of this application. It can be understood that the flowchart in this method embodiment is not used to limit the order of execution of the steps.
  • the client 2 is used as the main execution subject for exemplary description.
  • the method includes the following steps:
  • the splash screen resource file is used to provide loaded content to the splash screen page of the application, and is downloaded from the server 4 by the client 2 in advance.
  • the client terminal 2 downloads the splash screen resource file, it needs to perform file cutting and partial encryption on the splash screen resource file, specifically including resource hiding (transferring the downloaded splash screen resource file to Modify the format), path encryption (record the hidden path in the encrypted resource management file), file cutting (remove the header information), partial encryption (write the header information into the corresponding field of the resource management file), etc.
  • the partial encryption refers to encrypting at least one component of the cut screen resource file.
  • step S200 specifically includes:
  • the splash screen resource file After downloading the splash screen resource file corresponding to a certain application from the server 4, transfer the downloaded splash screen resource file to a specific location for storage, for example, in a random directory under the application that will not be automatically cleaned up . Then remove the file name suffix of the splash screen resource file, and modify the file name to be similar to the name of the file name in the directory. For example, in most directories, the file name is in base64 format.
  • the splash screen resource file obtained after the above transfer and modification is the hidden file.
  • the hidden path is the path of the storage location after the transfer of the splash screen resource file, that is, the storage path of the hidden file. After the hidden file is obtained, the hidden path is recorded in a resource management file, and the resource management file is an encrypted file.
  • the hidden file is cut.
  • the cutting strategy includes how many copies of the hidden file are cut into, and where to cut the hidden document.
  • the hidden file is cut into two parts, including header information and the remaining part.
  • the header information is information with a fixed byte length, and the byte length or information content can be configured in advance.
  • the remaining part is the remaining content after removing the header information from the hidden file.
  • the header information in the hidden file is removed, only the remaining part is retained, and the removed header information is written into the resource management file Corresponding field. Since the resource management file is an encrypted file, the header information is encrypted, that is, the hidden file (the splash screen resource file) is partially encrypted.
  • the step S200 may also include: transferring the downloaded splash screen resource file and modifying the file format to obtain a hidden file; encrypting the hidden path corresponding to the hidden file; The hidden file is cut into multiple components; at least one component is removed from the hidden file, and the removed component is encrypted.
  • the splash screen resource file is a zip file
  • the file header information (information of the beginning byte of the file) occupies 512 bytes, which respectively represent information such as file type and modification time.
  • the 512-byte information is used as the header information, and the hidden file is removed.
  • Header information can also be set to 1024 bytes of information (file header information plus part of the content information, or directly part of the content information), or even more bytes.
  • the header information (or other removed components) is written into the content field of the encrypted resource management file, and the hidden path is written into the file field of the resource management file.
  • the encryption method may be simple AES (Advanced Encryption Standard, Advanced Encryption Standard) encryption, or a stronger encryption algorithm such as 3DES (Triple Data Encryption Algorithm) encryption.
  • this embodiment uses partial encryption instead of encrypting all files, and the resource consumption required for encryption is greatly reduced.
  • file cutting and encryption in the above-mentioned way can be realized with and without network.
  • the current real time is calculated according to the difference between the correct time obtained from the server 4 last time and the device startup time, and whether the current time of the device is credible is judged according to the real time.
  • this embodiment can be based on the difference between the correct time obtained from the server 4 last time and the device startup time when the device is disconnected from the network. Determine whether the current time of the device is credible.
  • the processing method adopted in this embodiment depends on the current user's usage habits: not shutting down or restarting the device for a long time. In the case of not restarting after synchronizing with the server 4 at the correct time, this embodiment can directly calculate the current real time and display the splash screen resources. In the case where the client terminal 2 has restarted, it is necessary to re-judgment and calculate the time at startup.
  • step S202 specifically includes:
  • step S2020 Determine whether the device restarts after obtaining the correct time from the server 4 last time. If it has not been restarted, step S2022 is performed, and if it has been restarted, step S2028 is performed.
  • the client 2 can synchronize from the server 4 to the correct time (server time at the time of synchronization) serverTime.
  • the correct time can be updated by directly requesting time synchronization from the server 4 or other timestamps returned when requesting the server 4.
  • the client 2 can directly obtain the current system time systemTime and the device startup duration poweronTime through the system interface, if the acquired device startup duration is very short (lower than the preset value) or is longer than the previously recorded device startup duration Short, it means that the device startup time has been reset, that is, it means that the client terminal 2 has restarted.
  • the time point at which the client 2 restarts can be obtained, and it is further determined whether the time point is before or after the correct time was obtained from the server 4 last time, so as to determine Whether the client 2 is restarted after obtaining the correct time from the server 4 last time.
  • S2022 Calculate the current real time according to the difference between the correct time obtained from the server 4 last time and the device startup time.
  • the device startup duration difference is the difference between the first startup duration poweronTime1 of the device when the correct time was acquired from the server 4 last time and the currently acquired second startup duration poweronTime2 of the device.
  • the current real time trueTime can be calculated based on the difference between the correct time and the device startup time.
  • the real time formula described in the technology is:
  • step S2024 Compare whether the current system time is equal to the real time. If they are equal, go to step S2026; if they are not equal, go to step S2028.
  • the client 2 may obtain the current system time systemTime through a system interface, and then compare whether the system time is equal to the calculated real time.
  • the client 2 It is determined that the current time of the device is not credible, and the correct time needs to be obtained from the server 4 again.
  • the authenticity of the current time of the device can be guaranteed even when the device is disconnected from the network, eliminating the time consumed to communicate with the server 4 when the application is started, and giving priority to display in a very short time (for example, 1 millisecond) Splash screen resources are given to trusted devices.
  • the synchronization time operation is triggered, and the correct time is forcibly retrieved from the server 4 and updated.
  • the above steps can be used to determine whether the current time of the device is credible without restarting the device.
  • the client 2 will also randomly record the timeline (including but not limited to the correct time, device startup time, and system time) during the running of the application.
  • the timeline does not conform to the normal time law
  • the current time of the device will be set as untrusted, and then the correct time will be retrieved from the server 4 and updated.
  • the recorded system time is 8 o'clock, 9 o'clock, and 10 o'clock. If the system time obtained next time is 6 o'clock, it means that the time has been modified, and the current time of the device is set as unreliable.
  • the client 2 determines that the current time of the device is credible, it can directly obtain and display the splash screen resource file without waiting for communication with the server 4.
  • step S204 specifically includes:
  • S2040 Decrypt the resource management file to obtain the hidden path and the header information.
  • the hidden path and header information corresponding to the splash screen resource file have been written into the encrypted resource management file before, the hidden path and the header information can be obtained by decrypting the resource management file .
  • the header information can be obtained from the content field, and the hidden path can be obtained from the file field.
  • the header information corresponding to this part of the data in the content field is combined with the remaining part corresponding to the hidden path of the file field, and the splash screen resource file can be re-spliced completely .
  • the hidden path indicates the storage location of the remaining part of the hidden file after header information is removed.
  • the client 2 can find the storage location and obtain the remaining part. For example, according to the hidden path obtained from the file field, the remaining part of the hidden file after 512 bytes of header information is removed can be obtained.
  • S2044 Join the header information and the remaining part to obtain the complete splash screen resource file, and display it.
  • the splash screen resource file was previously cut into the header information and the remaining part, after the header information and the remaining part are obtained, the two can be spliced together to obtain the complete Splash screen resource file. Then, according to the splash screen resource file, the corresponding splash screen resource is displayed to the user on the splash screen page of the currently started application.
  • the step S204 may also include: decrypting the hidden path of the hidden file and the removed components Obtain the remaining components of the hidden file according to the hidden path; splicing the removed components and the remaining components to obtain the complete splash screen resource file, and display it.
  • the resource encryption and display method proposed in this embodiment can ensure that splash screen resources are not leaked without requiring a large amount of encryption and decryption computing resources; it can ensure the authenticity of the current time of the device to the greatest extent without relying on the network. Waiting to reconfirm the time with the server to decide whether to show the splash screen resource to the user, ensuring that most normal users can see the splash screen resource display for the first time.
  • FIG. 6 a schematic diagram of the hardware architecture of an electronic device 20 proposed in the second embodiment of this application.
  • the electronic device 20 may include, but is not limited to, a memory 21, a processor 22, and a network interface 23 that can be communicatively connected to each other through a system bus.
  • FIG. 6 only shows the electronic device 20 with the components 21-23, but it should be understood that it is not required to implement all the illustrated components, and more or fewer components may be implemented instead.
  • the electronic device 20 may be the client 2.
  • the memory 21 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory, etc.), random access memory (RAM), static memory Random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disks, optical disks, etc.
  • the memory 21 may be an internal storage unit of the electronic device 20, such as a hard disk or a memory of the electronic device 20.
  • the memory 21 may also be an external storage device of the electronic device 20, such as a plug-in hard disk equipped on the electronic device 20, a smart media card (SMC), and a secure digital device. (Secure Digital, SD) card, Flash Card, etc.
  • the memory 21 may also include both an internal storage unit of the electronic device 20 and an external storage device thereof.
  • the memory 21 is generally used to store the operating system and various application software installed in the electronic device 20, such as the program code of the resource encryption and display system 60.
  • the memory 21 can also be used to temporarily store various types of data that have been output or will be output.
  • the processor 22 may be a central processing unit (Central Processing Unit, CPU), a controller, a microcontroller, a microprocessor, or other data processing chips.
  • the processor 22 is generally used to control the overall operation of the electronic device 20.
  • the processor 22 is used to run the program code or process data stored in the memory 21, for example, to run the resource encryption and display system 60.
  • the network interface 23 may include a wireless network interface or a wired network interface, and the network interface 23 is generally used to establish a communication connection between the electronic device 20 and other electronic devices.
  • FIG. 7 a schematic diagram of modules of a resource encryption and display system 60 proposed in the third embodiment of this application.
  • the resource encryption and display system 60 may be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to complete the embodiments of the present application.
  • the program modules referred to in the embodiments of the present application refer to a series of computer-readable instruction segments that can complete specific functions. The following description will specifically introduce the functions of the program modules in this embodiment.
  • the resource encryption and display system 60 includes:
  • the encryption module 600 is used to perform file cutting and partial encryption on the pre-downloaded splash screen resource files.
  • the splash screen resource file is used to provide loaded content to the splash screen page of the application, and is downloaded from the server 4 by the client 2 in advance.
  • the client terminal 2 downloads the splash screen resource file, it needs to perform file cutting and partial encryption on the splash screen resource file, specifically including resource hiding (transferring the downloaded splash screen resource file to Modify the format), path encryption (record the hidden path in the encrypted resource management file), file cutting (remove the header information), partial encryption (write the header information into the corresponding field of the resource management file), etc.
  • the partial encryption refers to encrypting at least one component of the cut screen resource file.
  • the specific process of the encryption module 600 performing file cutting and partial encryption of the splash screen resource file includes:
  • the focus of the embodiments of this application is file cutting and partial encryption, so that the splash screen resource file cannot be identified, and how many copies of the file are cut and the method used for encryption does not affect the encryption effect , You can decide how to divide and encrypt based on the actual scene and file type. That is, in other embodiments, the foregoing process may also include: transferring the downloaded splash screen resource file and modifying the file format to obtain a hidden file; encrypting the hidden path corresponding to the hidden file; The hidden file is cut into multiple components; at least one component is removed from the hidden file, and the removed component is encrypted.
  • this embodiment uses partial encryption instead of encrypting all files, and the resource consumption required for encryption is greatly reduced.
  • file cutting and encryption in the above-mentioned way can be realized with and without network.
  • the judging module 602 is configured to calculate the current real time according to the difference between the last correct time obtained from the server and the device startup duration, and judge whether the current time of the device is credible according to the real time.
  • the client 2 When the application is started and the splash screen resource needs to be displayed, the client 2 needs to compare with the correct time obtained from the server 4 in order to determine the authenticity of the current time of the device.
  • this embodiment can be based on the difference between the correct time obtained from the server 4 last time and the device startup time when the device is disconnected from the network. Determine whether the current time of the device is credible.
  • the specific process includes:
  • the authenticity of the current time of the device can be guaranteed even when the device is disconnected from the network, saving the time it takes to communicate with the server 4 when the application is started, and giving priority to display in a very short time (for example, 1 millisecond) Splash screen resources are given to trusted devices.
  • the synchronization time operation is triggered, and the correct time is forcibly retrieved from the server 4 and updated.
  • the above steps can be used to determine whether the current time of the device is credible without restarting the device.
  • the client 2 will also randomly record the timeline (including but not limited to the correct time, device startup time, and system time) during the running of the application.
  • the timeline does not conform to the normal time law
  • the current time of the device will be set as untrusted, and then the correct time will be retrieved from the server 4 and updated.
  • the recorded system time is 8 o'clock, 9 o'clock, and 10 o'clock. If the system time obtained next time is 6 o'clock, it means that the time has been modified, and the current time of the device is set as unreliable.
  • the display module 604 is configured to directly obtain and display the splash screen resource file through decryption and splicing when the current time of the device is credible.
  • the client 2 determines that the current time of the device is credible, it can directly obtain and display the splash screen resource file without waiting for communication with the server 4.
  • the specific process includes:
  • the above process may also include: decrypting the hidden path of the hidden file and the removed components; The hidden path obtains the remaining component parts of the hidden file; splicing the removed component parts and the remaining component parts to obtain the complete splash screen resource file, and display it.
  • the resource encryption and display system proposed in this embodiment can ensure that splash screen resources are not leaked without requiring a large amount of encryption and decryption computing resources; it does not rely on the network to ensure the authenticity of the current time of the device to the greatest extent. Waiting to reconfirm the time with the server to decide whether to show the splash screen resource to the user, ensuring that most normal users can see the splash screen resource display for the first time.
  • the present application also provides another implementation manner, that is, a computer-readable storage medium is provided with computer-readable instructions stored thereon, and the computer-readable instructions can be executed by at least one processor to Make the at least one processor execute the following steps:
  • the partial encryption is to encrypt at least one component of the resource file; it is calculated according to the difference between the correct time obtained from the server and the device startup time of the client The current real time, and judge whether the current time of the device is credible according to the real time; if the current time of the device is credible, the splash screen resource file is obtained through decryption and splicing and displayed.
  • modules or steps of the embodiments of the present application described above can be implemented by a general computing device, and they can be concentrated on a single computing device, or distributed among multiple computing devices.
  • they can be implemented by the program code executable by the computing device, so that they can be stored in the storage device for execution by the computing device, and in some cases, they can be different from here
  • the steps shown or described are executed in the order of, or they are respectively fabricated into individual integrated circuit modules, or multiple modules or steps of them are fabricated into a single integrated circuit module to achieve. In this way, the embodiments of the present application are not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

一种资源加密及展示方法,该方法包括:对预先下载的闪屏资源文件进行文件切割和局部加密(S200);根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信(S202);当设备当前时间可信时,直接通过解密和拼接得到所述闪屏资源文件并进行展示(S204)。由此,能够在不阻塞应用程序启动的前提下,保证闪屏资源安全高效的展示。

Description

资源加密及展示方法及系统
本申请要求于2020年06月05日提交中国专利局、申请号为202010507936.9、发明名称为“资源加密及展示方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据处理技术领域,尤其涉及一种资源加密及展示方法、系统、电子装置及计算机可读存储介质。
背景技术
闪屏是应用程序每次启动过程中展示给用户的过渡页面,一般用于掩盖启动速度慢的事实。目前,由于闪屏页面展示面积最大、可展示内容最丰富,在各大应用程序中都是作为第一广告位存在。但是,因为闪屏页面是第一启动界面,在展示闪屏资源时可能存在网络还不可用的情况,另外资源的丰富也意味着体积的增加,所以一般闪屏的资源都是提前下载并存储,在需要的时候再做展示。但是,如果涉及资源需要加密的情况就会出现很多问题,无法又快又安全的进行展示。
目前主要的实现方式是在闪屏资源需要展示的当天再做下发,或者当天直接显示在线资源。然而,发明人意识到,第一种方式会丧失展示的实时性和成功率,可能当天在资源下载之后用户再也未曾打开闪屏页面。而第二种方式虽然可以规避以上问题,但是存在资源展示流畅度的缺陷,严重时可能出现因为网络问题导致资源加载阻塞应用程序使用的情况。另外,这两种方式都涉及到与服务器之间的通讯,所需要的耗时至少是百毫秒以上,有些场景还是阻塞式的,客户端需要等待通讯完成才能决定下一步怎么做,带来用户体验问题。如果闪屏资源加载时长过长,将导致迟迟无法进入应用程序。
需要说明的是,上述内容并不用于限制申请保护范围。
发明内容
本申请的主要目的在于提出一种资源加密及展示方法、系统、电子装置及计算机可读存储介质,旨在解决如何在不阻塞应用程序启动的前提下,保证闪屏资源安全高效的展示的问题。
为实现上述目的,本申请实施例提供了一种资源加密及展示方法,所述方法包括:
对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
可选地,所述对预先下载的资源文件进行文件切割和局部加密包括:
将所述资源文件进行转移并修改文件格式,得到隐藏文件;
对所述隐藏文件对应的隐藏路径进行加密;
将所述隐藏文件切割为多个组成部分;
在所述隐藏文件中去掉至少一个组成部分,并对去掉的组成部分进行加密。
可选地,所述对预先下载的资源文件进行文件切割和局部加密包括:
将所述资源文件进行转移并修改文件格式,得到隐藏文件;
将所述隐藏文件对应的隐藏路径记录到加密的资源管理文件中;
将所述隐藏文件切割为头部信息和剩余部分;
在所述隐藏文件中去掉所述头部信息,并将所述头部信息写入所述资源管理文件的对应字段。
可选地,所述根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信包括:
判断上次从服务器获取正确时间后设备是否重启;
当所述设备未重启过时,根据上次从所述服务器获取的所述正确时间与所述设备启动时长差值计算当前真实时间,其中所述设备启动时长差值为上次从所述服务器获取所述正确时间时所述设备的第一启动时长与当前获取到的所述设备的第二启动时长之间的差值;
比较当前系统时间与所述真实时间是否相等;
当所述系统时间与所述真实时间相等时,确定所述设备的当前时间为可信的。
可选地,所述根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信还包括:
当所述设备在上次从所述服务器获取所述正确时间后重启过或所述系统时间与所述真实时间不相等时,确定所述设备的当前时间不可信。
可选地,所述真实时间为所述正确时间加上所述设备启动时长差值。
可选地,所述通过解密和拼接得到所述资源文件并进行展示包括:
解密所述隐藏文件的隐藏路径和去掉的组成部分;
根据所述隐藏路径获取所述隐藏文件剩下的组成部分;
将所述去掉的组成部分和所述剩下的组成部分拼接得到完整的所述资源文件,并进行展示。
可选地,所述通过解密和拼接得到所述资源文件并进行展示包括:
解密所述资源管理文件,得到所述隐藏路径和所述头部信息;
根据所述隐藏路径获取所述隐藏文件的剩余部分;
将所述头部信息和所述剩余部分拼接得到完整的所述资源文件,并进行展示。
可选地,该方法还包括:
在所述资源文件对应的应用程序运行过程中随机记录时间线,当发现所述时间线不符合正常时间规律时,将所述设备的当前时间设置为不可信。
可选地,所述资源为闪屏资源。
此外,为实现上述目的,本申请实施例还提出一种资源加密及展示系统,所述系统包括:
加密模块,用于对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密。
判断模块,用于根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信。
展示模块,用于当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
为实现上述目的,本申请实施例还提出一种电子装置,所述电子装置包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机可读指令,所述计算机可读指令被所述处理器执行时实现以下步骤:
对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
为实现上述目的,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机可读指令,所述计算机可读指令被处理器执行时实现以下步骤:
对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
本申请实施例提出的资源加密及展示方法、系统、电子装置及计算机可读存储介质,能够在不等待与服务器同步的情况下确保设备当前时间真实有效,保证能够为绝大多数用户第一时间展示闪屏资源;并且在不进行大量加解密运算的前提下,保障闪屏资源的安全性,防止资源泄露。因此,本申请实施例可以在不阻塞应用程序启动的前提下,保证闪屏资源安全高效的展示。
附图说明
图1为实现本申请各个实施例的一种应用环境架构图;
图2为本申请第一实施例提出的一种资源加密及展示方法的流程图;
图3为图2中步骤S200的细化流程示意图;
图4为图2中步骤S202的细化流程示意图;
图5为图2中步骤S204的细化流程示意图;
图6为本申请第二实施例提出的一种电子装置的硬件架构示意图;
图7为本申请第三实施例提出的一种资源加密及展示系统的模块示意图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
需要说明的是,在本申请实施例中涉及“第一”、“第二”等的描述仅用于描述目的,而不能理解为指示或暗示其相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。
请参阅图1,图1为实现本申请各个实施例的一种应用环境架构图。本申请可应用于包括,但不仅限于客户端2、服务器4、网络6的应用环境中。
其中,所述客户端2用于从所述服务器4下载资源文件并进行切割、加密、解密和展示等。所述客户端2可以为手机、平板电脑、PC(Personal Computer,个人电脑)、便携计算机、可穿戴设备等终端设备。
所述服务器4用于为所述客户端2提供资源文件和正确时间。所述服务器4可以是机架式服务器、刀片式服务器、塔式服务器或机柜式服务器等计算设备,可以是独立的服务器,也可以是多个服务器所组成的服务器集群。
所述网络6可以是企业内部网(Intranet)、互联网(Internet)、全球移动通讯系统(Global System of Mobile communication,GSM)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、4G网络、5G网络、蓝牙(Bluetooth)、Wi-Fi等无线或有线网络。所述服务器4和一个或多个所述客户端2之间通过所述网络6通信连接,以进行数据传输和交互。
值得注意的是,在以下各个实施例中,以闪屏资源为例对本申请的资源加密及展示方案进行说明。但是,应该理解的是,其他与闪屏资源特性相似的资源,例如任何可以通过预加载的方式下载的资源,均可利用本申请类似的方案进行资源加密及展示。
实施例一
如图2所示,为本申请第一实施例提出的一种资源加密及展示方法的流程图。可以理解,本方法实施例中的流程图不用于对执行步骤的顺序进行限定。在本实施例中,以所述客户端2为主要执行主体进行示例性描述。
该方法包括以下步骤:
S200,对预先下载的闪屏资源文件进行文件切割和局部加密。
所述闪屏资源文件用于向应用程序的闪屏页面提供加载的内容,由客户端2预先从服务器4中下载。在本实施例中,当客户端2下载完所述闪屏资源文件后,需要先对所述闪屏资源文件进行文件切割和局部加密,具体包括资源隐藏(将下载的闪屏资源文件转移并修改格式)、路径加密(将隐藏路径记录到加密的资源管理文件中)、文件切割(去掉头部信息)、部分加密(将头部信息写入资源管理文件对应字段)等操作。其中,所述局部加密是指对切割后的所述闪屏资源文件的至少一个组成部分进行加密。
具体而言,进一步参阅图3,为上述步骤S200的细化流程示意图。可以理解,该流程 图不用于对执行步骤的顺序进行限定。根据需要,还可以对该流程图中的部分步骤进行添加或删减。在本实施例中,所述步骤S200具体包括:
S2000,将下载的所述闪屏资源文件进行转移并修改文件格式,得到隐藏文件。
当从服务器4下载某个应用程序对应的所述闪屏资源文件后,将下载到的所述闪屏资源文件转移到特定位置进行存储,例如该应用程序下不会被自动清理的随机目录下。然后去掉所述闪屏资源文件的文件名后缀,修改文件名为该目录下文件名类似命名风格的名称,例如在大多数目录下都是base64格式的文件名。经过上述转移和修改后得到的所述闪屏资源文件,即为所述隐藏文件。
S2002,将所述隐藏文件对应的隐藏路径记录到加密的资源管理文件中。
所述隐藏路径为将所述闪屏资源文件转移后的存储位置的路径,即所述隐藏文件的存储路径。在得到所述隐藏文件后,将所述隐藏路径记录到资源管理文件中,所述资源管理文件为加密文件。
S2004,将所述隐藏文件切割为头部信息和剩余部分。
按照预先设置的切割策略,对所述隐藏文件进行切割。所述切割策略包括将所述隐藏文件切割为多少份,以及从何处进行切割等。在本实施例中,将所述隐藏文件切割为两个部分,包括头部信息和剩余部分。所述头部信息为固定字节长度的信息,所述字节长度或信息内容可以预先进行配置。所述剩余部分为将所述隐藏文件去掉所述头部信息后剩下的内容。
S2006,在所述隐藏文件中去掉所述头部信息,并将所述头部信息写入所述资源管理文件的对应字段。
在对所述隐藏文件进行切割后,将所述隐藏文件中的所述头部信息去掉,只保留所述剩余部分,并将所去掉的所述头部信息写入所述资源管理文件中的对应字段。由于所述资源管理文件为加密文件,则所述头部信息被加密,也就是所述隐藏文件(所述闪屏资源文件)被局部加密。
值得注意的是,本申请实施例的重点为文件切割和局部加密,从而让所述闪屏资源文件不可被识别,而具体将文件切割为多少份以及采用何种方式进行加密,不影响加密效果,可以根据实际场景和文件类型决策如何分割、如何加密。也就是说,在其他实施例中,所述步骤S200也可以包括:将下载的所述闪屏资源文件进行转移并修改文件格式,得到隐藏文件;对所述隐藏文件对应的隐藏路径进行加密;将所述隐藏文件切割为多个组成部分;在所述隐藏文件中去掉至少一个组成部分,并对去掉的组成部分进行加密。
举例而言,假设所述闪屏资源文件为一个zip文件,文件头信息(文件的开头字节的信息)占据了512个字节,分别表示文件类型、修改时间之类的信息。在对所述闪屏资源文件进行转移和修改得到对应的隐藏文件和隐藏路径后,进行文件切割时将该512个字节的信息作为所述头部信息,在所述隐藏文件中去掉所述头部信息。当然,也可以将去掉的组成部分设置为1024个字节的信息(文件头信息加上部分内容信息,或者直接为部分内容信息),甚至更多的字节。所述头部信息(或者其他去掉的组成部分)被写入加密的所述资源管理文件的content字段,而所述隐藏路径被写入所述资源管理文件的file字段。在后续需要展示闪屏资源时,将content字段的这部分数据对应的所述头部信息(或者其他去掉的组成部分)与file字段的隐藏路径对应的所述剩余部分结合到一起,可以将所述闪屏资源文件重新拼接完整。所述加密的方式可以是简单的AES(Advanced Encryption Standard,高级加密标准)加密,也可以采用3DES(Triple Data Encryption Algorithm,三重数据加密算法)加密之类更强的加密算法。
在缺失头部信息和后缀,并且文件路径(所述隐藏路径)不固定的情况下,所述闪屏资源文件无法被打开,保证了闪屏资源的安全性。并且,本实施例采用的是局部加密,不是对文件全部加密,加密需要的资源消耗大大降低。另外,采用上述方式进行文件切割和加密,在有网络和无网络的情况下都可以实现。
回到图2,S202,根据上次从服务器4获取的正确时间与设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信。
在启动应用程序并需要展示闪屏资源时,所述客户端2为了确定设备当前时间的真实性,需要与从所述服务器4获取的正确时间进行对比。但是,为了节省在启动该应用程序时再去与所述服务器4进行通讯的时间消耗,本实施例可以在脱离网络的情况下,根据上次从服务器4获取的正确时间与设备启动时长差值判断设备当前时间是否可信。
本实施例所采用的处理方式依赖目前用户的使用习惯:长时间不关机或重启设备。在与所述服务器4同步过正确时间之后未重启的情况下,本实施例可以直接计算出当前真实时间,并展示闪屏资源。在所述客户端2发生过重启的情况下,则需要在启动时重新判断并计算时间。
具体而言,进一步参阅图4,为上述步骤S202的细化流程示意图。可以理解,该流程图不用于对执行步骤的顺序进行限定。根据需要,还可以对该流程图中的部分步骤进行添加或删减。在本实施例中,所述步骤S202具体包括:
S2020,判断上次从服务器4获取正确时间后设备是否重启。若未重启则执行步骤S2022, 若重启过则执行步骤S2028。
所述客户端2通过与所述服务器4通讯,可以从所述服务器4同步到正确时间(同步时的服务器时间)serverTime。具体地,可以通过直接向服务器4请求时间同步或者其他对服务器4请求时返回的时间戳来更新所述正确时间。并且,所述客户端2可以通过系统接口直接获取当前的系统时间systemTime和设备启动时长poweronTime,如果所获取到的设备启动时长很短(低于预设值)或者比之前已记录的设备启动时长短,则说明所述设备启动时长已重置,也就是表示所述客户端2重启过。
然后,根据所述系统时间和所述设备启动时长,可以得到所述客户端2重启的时间点,并进一步判断该时间点在上次从所述服务器4获取正确时间之前还是之后,从而确定所述客户端2在上次从所述服务器4获取正确时间后是否重启。
S2022,根据上次从服务器4获取的正确时间与设备启动时长差值计算当前真实时间。
所述设备启动时长差值为上次从服务器4获取所述正确时间时所述设备的第一启动时长poweronTime1与当前获取到的所述设备的第二启动时长poweronTime2之间的差值。在所述客户端2上次从服务器4获取到所述正确时间之后未曾重启的情况下,通过所述正确时间与所述设备启动时长差值,可以计算出当前真实时间trueTime。其中,技术所述真实时间的公式为:
trueTime=serverTime+(poweronTime2-poweronTime1)
S2024,比较当前系统时间与所述真实时间是否相等。若相等,则执行步骤S2026;若不相等,则执行步骤S2028。
所述客户端2可以通过系统接口获取当前的系统时间systemTime,然后比较所述系统时间与计算得到的所述真实时间是否相等。
S2026,确定设备当前时间为可信的。
所述客户端2判断设备当前时间可信的条件为:设备在上次从服务器4获取正确时间后未重启过且systemTime==trueTime。若满足上述条件,则所述客户端2确定设备当前时间为可信的。
S2028,确定设备当前时间不可信。
若计算出的所述真实时间与所述系统时间不相等,或者设备在上次从服务器4获取正确时间后重启过(即设备重启后未从服务器4获取过正确时间),则所述客户端2确定设备当前时间不可信,需要重新从服务器4获取正确时间。
本实施例在脱离网络的情况下也可以保证设备当前时间的真实性,省去应用程序启动 时再去与服务器4通讯所消耗的时间,在非常短的时间(例如1毫秒)内决策优先展示闪屏资源给可信设备。
如果确定设备当前时间不可信,则触发同步时间操作,强制从服务器4中重新获取正确时间并进行更新,后续在不重启设备的情况下可以采用上述步骤判断设备当前时间是否可信。
另外,所述客户端2在应用程序运行过程中还会随机记录时间线(包括但不限于所述正确时间、设备启动时长、系统时间),当发现所述时间线不符合正常时间规律的时候,会将设备当前时间设置为不可信,然后重新从服务器4获取正确时间并进行更新。例如,已记录系统时间为8点、9点、10点,如果下一次获取到的系统时间为6点,说明该时间被修改了,则将设备当前时间设置为不可信。
回到图2,S204,若设备当前时间可信,直接通过解密和拼接得到所述闪屏资源文件并进行展示。
当所述客户端2确定设备当前时间为可信时,可以直接获取所述闪屏资源文件并进行展示,而不用等待与所述服务器4的通讯。
具体而言,进一步参阅图5,为上述步骤S204的细化流程示意图。可以理解,该流程图不用于对执行步骤的顺序进行限定。根据需要,还可以对该流程图中的部分步骤进行添加或删减。在本实施例中,所述步骤S204具体包括:
S2040,解密所述资源管理文件,得到所述隐藏路径和所述头部信息。
由于之前已将所述闪屏资源文件对应的隐藏路径和头部信息写入加密的所述资源管理文件中,因此可以通过解密所述资源管理文件,得到所述隐藏路径和所述头部信息。
例如,在采用与所述资源管理文件的加密方式相对应的解密方式解密所述资源管理文件后,可以从content字段中得到所述头部信息,从file字段中得到所述隐藏路径。在后续需要展示闪屏资源时,将content字段的这部分数据对应的所述头部信息与file字段的隐藏路径对应的所述剩余部分结合到一起,可以将所述闪屏资源文件重新拼接完整。
S2042,根据所述隐藏路径获取所述隐藏文件的剩余部分。
所述隐藏路径指示了所述隐藏文件去掉头部信息后的剩余部分的存储位置,根据所述隐藏路径,所述客户端2可以找到该存储位置并获取到所述剩余部分。例如,根据从file字段中得到的所述隐藏路径,可以获取到所述隐藏文件去掉512个字节的头部信息后的剩余部分。
S2044,将所述头部信息和所述剩余部分拼接得到完整的所述闪屏资源文件,并进行 展示。
由于所述闪屏资源文件之前被切割为所述头部信息和所述剩余部分,因此在获取到所述头部信息和所述剩余部分后,可以通过将两者拼接,得到完整的所述闪屏资源文件。然后根据所述闪屏资源文件在当前启动的该应用程序的闪屏页面向用户展示相应的闪屏资源。
同样地,由于具体将文件切割为多少份以及采用何种方式进行加密可以不做限制,在其他实施例中,所述步骤S204也可以包括:解密所述隐藏文件的隐藏路径和去掉的组成部分;根据所述隐藏路径获取所述隐藏文件剩下的组成部分;将所述去掉的组成部分和所述剩下的组成部分拼接得到完整的所述闪屏资源文件,并进行展示。
本实施例提出的资源加密及展示方法,可以在不需要大量加解密运算资源的情况下,保证闪屏资源不泄漏;在不依赖网络的情况下最大程度的确保设备当前时间的真实性,无需等待与服务器再次确认时间即可决策是否展示闪屏资源给用户,保证绝大多数正常用户能够第一时间看到闪屏资源展示。
实施例二
如图6所示,为本申请第二实施例提出一种电子装置20的硬件架构示意图。本实施例中,所述电子装置20可包括,但不仅限于,可通过系统总线相互通信连接的存储器21、处理器22、网络接口23。需要指出的是,图6仅示出了具有组件21-23的电子装置20,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多或者更少的组件。在本实施例中,所述电子装置20可以是所述客户端2。
所述存储器21至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器21可以是所述电子装置20的内部存储单元,例如该电子装置20的硬盘或内存。在另一些实施例中,所述存储器21也可以是所述电子装置20的外部存储设备,例如该电子装置20上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。当然,所述存储器21还可以既包括所述电子装置20的内部存储单元也包括其外部存储设备。本实施例中,所述存储器21通常用于存储安装于所述电子装置20的操作系统和各类应用软件,例如资源加密及展示系统60的程序代码等。此外,所 述存储器21还可以用于暂时地存储已经输出或者将要输出的各类数据。
所述处理器22在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器22通常用于控制所述电子装置20的总体操作。本实施例中,所述处理器22用于运行所述存储器21中存储的程序代码或者处理数据,例如运行所述资源加密及展示系统60等。
所述网络接口23可包括无线网络接口或有线网络接口,该网络接口23通常用于在所述电子装置20与其他电子设备之间建立通信连接。
实施例三
如图7所示,为本申请第三实施例提出一种资源加密及展示系统60的模块示意图。所述资源加密及展示系统60可以被分割成一个或多个程序模块,一个或者多个程序模块被存储于存储介质中,并由一个或多个处理器所执行,以完成本申请实施例。本申请实施例所称的程序模块是指能够完成特定功能的一系列计算机可读指令段,以下描述将具体介绍本实施例各程序模块的功能。
在本实施例中,所述资源加密及展示系统60包括:
加密模块600,用于对预先下载的闪屏资源文件进行文件切割和局部加密。
所述闪屏资源文件用于向应用程序的闪屏页面提供加载的内容,由客户端2预先从服务器4中下载。在本实施例中,当客户端2下载完所述闪屏资源文件后,需要先对所述闪屏资源文件进行文件切割和局部加密,具体包括资源隐藏(将下载的闪屏资源文件转移并修改格式)、路径加密(将隐藏路径记录到加密的资源管理文件中)、文件切割(去掉头部信息)、部分加密(将头部信息写入资源管理文件对应字段)等操作。其中,所述局部加密是指对切割后的所述闪屏资源文件的至少一个组成部分进行加密。
加密模块600对所述闪屏资源文件进行文件切割和局部加密的具体过程包括:
(1)将下载的所述闪屏资源文件进行转移并修改文件格式,得到隐藏文件。
(2)将下载的所述闪屏资源文件进行转移并修改文件格式,得到隐藏文件。
(3)将所述隐藏文件切割为头部信息和剩余部分。
(4)在所述隐藏文件中去掉所述头部信息,并将所述头部信息写入所述资源管理文件的对应字段。
上述过程的具体细节参见图3及其相关说明,在此不再赘述。
值得注意的是,本申请实施例的重点为文件切割和局部加密,从而让所述闪屏资源文 件不可被识别,而具体将文件切割为多少份以及采用何种方式进行加密,不影响加密效果,可以根据实际场景和文件类型决策如何分割、如何加密。也就是说,在其他实施例中,上述过程也可以包括:将下载的所述闪屏资源文件进行转移并修改文件格式,得到隐藏文件;对所述隐藏文件对应的隐藏路径进行加密;将所述隐藏文件切割为多个组成部分;在所述隐藏文件中去掉至少一个组成部分,并对去掉的组成部分进行加密。
在缺失头部信息和后缀,并且文件路径(所述隐藏路径)不固定的情况下,所述闪屏资源文件无法被打开,保证了闪屏资源的安全性。并且,本实施例采用的是局部加密,不是对文件全部加密,加密需要的资源消耗大大降低。另外,采用上述方式进行文件切割和加密,在有网络和无网络的情况下都可以实现。
判断模块602,用于根据上次从服务器获取的正确时间与设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信。
在启动应用程序并需要展示闪屏资源时,所述客户端2为了确定设备当前时间的真实性,需要与从所述服务器4获取的正确时间进行对比。但是,为了节省在启动该应用程序时再去与所述服务器4进行通讯的时间消耗,本实施例可以在脱离网络的情况下,根据上次从服务器4获取的正确时间与设备启动时长差值判断设备当前时间是否可信。具体过程包括:
(1)判断上次从服务器4获取正确时间后设备是否重启。
(2)若未重启过,根据上次从服务器4获取的正确时间与设备启动时长差值计算当前真实时间。
(3)比较当前系统时间与所述真实时间是否相等。
(4)若相等,确定设备当前时间为可信的。
(5)若设备再上次从服务器4获取正确时间后重启过或所述系统时间与所述真实时间不相等,确定设备当前时间不可信。
上述过程的具体细节参见图4及其相关说明,在此不再赘述。
本实施例在脱离网络的情况下也可以保证设备当前时间的真实性,省去应用程序启动时再去与服务器4通讯所消耗的时间,在非常短的时间(例如1毫秒)内决策优先展示闪屏资源给可信设备。
如果确定设备当前时间不可信,则触发同步时间操作,强制从服务器4中重新获取正确时间并进行更新,后续在不重启设备的情况下可以采用上述步骤判断设备当前时间是否可信。
另外,所述客户端2在应用程序运行过程中还会随机记录时间线(包括但不限于所述正确时间、设备启动时长、系统时间),当发现所述时间线不符合正常时间规律的时候,会将设备当前时间设置为不可信,然后重新从服务器4获取正确时间并进行更新。例如,已记录系统时间为8点、9点、10点,如果下一次获取到的系统时间为6点,说明该时间被修改了,则将设备当前时间设置为不可信。
展示模块604,用于当设备当前时间可信时,直接通过解密和拼接得到所述闪屏资源文件并进行展示。
当所述客户端2确定设备当前时间为可信时,可以直接获取所述闪屏资源文件并进行展示,而不用等待与所述服务器4的通讯。具体过程包括:
(1)解密所述资源管理文件,得到所述隐藏路径和所述头部信息。
(2)根据所述隐藏路径获取所述隐藏文件的剩余部分。
(3)将所述头部信息和所述剩余部分拼接得到完整的所述闪屏资源文件,并进行展示。
上述过程的具体细节参见图5及其相关说明,在此不再赘述。
同样地,由于具体将文件切割为多少份以及采用何种方式进行加密可以不做限制,在其他实施例中,上述过程也可以包括:解密所述隐藏文件的隐藏路径和去掉的组成部分;根据所述隐藏路径获取所述隐藏文件剩下的组成部分;将所述去掉的组成部分和所述剩下的组成部分拼接得到完整的所述闪屏资源文件,并进行展示。
本实施例提出的资源加密及展示系统,可以在不需要大量加解密运算资源的情况下,保证闪屏资源不泄漏;在不依赖网络的情况下最大程度的确保设备当前时间的真实性,无需等待与服务器再次确认时间即可决策是否展示闪屏资源给用户,保证绝大多数正常用户能够第一时间看到闪屏资源展示。
实施例四
本申请还提供了另一种实施方式,即提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令可被至少一个处理器执行,以使所述至少一个处理器执行以下步骤:
对预先下载的闪屏资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;若设备当前 时间可信,通过解密和拼接得到所述闪屏资源文件并进行展示。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
显然,本领域的技术人员应该明白,上述的本申请实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本申请实施例不限制于任何特定的硬件和软件结合。
以上仅为本申请实施例的优选实施例,并非因此限制本申请实施例的专利范围,凡是利用本申请实施例说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请实施例的专利保护范围内。

Claims (20)

  1. 一种资源加密及展示方法,所述方法包括:
    对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
    根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
    当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
  2. 根据权利要求1所述的资源加密及展示方法,所述对预先下载的资源文件进行文件切割和局部加密包括:
    将所述资源文件进行转移并修改文件格式,得到隐藏文件;
    对所述隐藏文件对应的隐藏路径进行加密;
    将所述隐藏文件切割为多个组成部分;
    在所述隐藏文件中去掉至少一个组成部分,并对去掉的组成部分进行加密。
  3. 根据权利要求1或2所述的资源加密及展示方法,所述对预先下载的资源文件进行文件切割和局部加密包括:
    将所述资源文件进行转移并修改文件格式,得到隐藏文件;
    将所述隐藏文件对应的隐藏路径记录到加密的资源管理文件中;
    将所述隐藏文件切割为头部信息和剩余部分;
    在所述隐藏文件中去掉所述头部信息,并将所述头部信息写入所述资源管理文件的对应字段。
  4. 根据权利要求1所述的资源加密及展示方法,所述根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信包括:
    判断上次从服务器获取正确时间后设备是否重启;
    当所述设备未重启过时,根据上次从所述服务器获取的所述正确时间与所述设备启动时长差值计算当前真实时间,其中所述设备启动时长差值为上次从所述服务器获取所述正确时间时所述设备的第一启动时长与当前获取到的所述设备的第二启动时长之间的差值;
    比较当前系统时间与所述真实时间是否相等;
    当所述系统时间与所述真实时间相等时,确定所述设备的当前时间为可信的。
  5. 根据权利要求4所述的资源加密及展示方法,所述根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信还包括:
    当所述设备在上次从所述服务器获取所述正确时间后重启过或所述系统时间与所述真实时间不相等时,确定所述设备的当前时间不可信。
  6. 根据权利要求4或5所述的资源加密及展示方法,所述真实时间为所述正确时间加上所述设备启动时长差值。
  7. 根据权利要求2所述的资源加密及展示方法,所述通过解密和拼接得到所述资源文件并进行展示包括:
    解密所述隐藏文件的隐藏路径和去掉的组成部分;
    根据所述隐藏路径获取所述隐藏文件剩下的组成部分;
    将所述去掉的组成部分和所述剩下的组成部分拼接得到完整的所述资源文件,并进行展示。
  8. 根据权利要求3所述的资源加密及展示方法,所述通过解密和拼接得到所述资源文件并进行展示包括:
    解密所述资源管理文件,得到所述隐藏路径和所述头部信息;
    根据所述隐藏路径获取所述隐藏文件的剩余部分;
    将所述头部信息和所述剩余部分拼接得到完整的所述资源文件,并进行展示。
  9. 根据权利要求1、4、5任一项所述的资源加密及展示方法,该方法还包括:
    在所述资源文件对应的应用程序运行过程中随机记录时间线,当发现所述时间线不符合正常时间规律时,将所述设备的当前时间设置为不可信。
  10. 根据权利要求1所述的资源加密及展示方法,所述资源为闪屏资源。
  11. 一种资源加密及展示系统,所述系统包括:
    加密模块,用于对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
    判断模块,用于根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;
    展示模块,用于当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
  12. 一种电子装置,所述电子装置包括:存储器、处理器及存储在所述存储器上并可 在所述处理器上运行的计算机可读指令,所述计算机可读指令被所述处理器执行时实现以下步骤:
    对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
    根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
    当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
  13. 根据权利要求12所述的电子装置,所述对预先下载的资源文件进行文件切割和局部加密包括:
    将所述资源文件进行转移并修改文件格式,得到隐藏文件;
    对所述隐藏文件对应的隐藏路径进行加密;
    将所述隐藏文件切割为多个组成部分;
    在所述隐藏文件中去掉至少一个组成部分,并对去掉的组成部分进行加密。
  14. 根据权利要求12或13所述的电子装置,所述对预先下载的资源文件进行文件切割和局部加密包括:
    将所述资源文件进行转移并修改文件格式,得到隐藏文件;
    将所述隐藏文件对应的隐藏路径记录到加密的资源管理文件中;
    将所述隐藏文件切割为头部信息和剩余部分;
    在所述隐藏文件中去掉所述头部信息,并将所述头部信息写入所述资源管理文件的对应字段。
  15. 根据权利要求12所述的电子装置,所述根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信包括:
    判断上次从服务器获取正确时间后设备是否重启;
    当所述设备未重启过时,根据上次从所述服务器获取的所述正确时间与所述设备启动时长差值计算当前真实时间,其中所述设备启动时长差值为上次从所述服务器获取所述正确时间时所述设备的第一启动时长与当前获取到的所述设备的第二启动时长之间的差值;
    比较当前系统时间与所述真实时间是否相等;
    当所述系统时间与所述真实时间相等时,确定所述设备的当前时间为可信的。
  16. 根据权利要求15所述的电子装置,所述根据从服务器获取的正确时间与客户端的 设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信还包括:
    当所述设备在上次从所述服务器获取所述正确时间后重启过或所述系统时间与所述真实时间不相等时,确定所述设备的当前时间不可信。
  17. 根据权利要求15或16所述的电子装置,所述真实时间为所述正确时间加上所述设备启动时长差值。
  18. 根据权利要求13所述的电子装置,所述通过解密和拼接得到所述资源文件并进行展示包括:
    解密所述隐藏文件的隐藏路径和去掉的组成部分;
    根据所述隐藏路径获取所述隐藏文件剩下的组成部分;
    将所述去掉的组成部分和所述剩下的组成部分拼接得到完整的所述资源文件,并进行展示。
  19. 根据权利要求14所述的电子装置,所述通过解密和拼接得到所述资源文件并进行展示包括:
    解密所述资源管理文件,得到所述隐藏路径和所述头部信息;
    根据所述隐藏路径获取所述隐藏文件的剩余部分;
    将所述头部信息和所述剩余部分拼接得到完整的所述资源文件,并进行展示。
  20. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机可读指令,所述计算机可读指令被处理器执行时实现以下步骤:
    对预先下载的资源文件进行文件切割和局部加密,所述局部加密为对所述资源文件的至少一个组成部分进行加密;
    根据从服务器获取的正确时间与客户端的设备启动时长差值计算出当前真实时间,并根据所述真实时间判断设备当前时间是否可信;及
    当所述设备的当前时间可信时,通过解密和拼接得到所述资源文件并进行展示。
PCT/CN2020/140993 2020-06-05 2020-12-29 资源加密及展示方法及系统 WO2021244020A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP20938969.1A EP4068087A4 (en) 2020-06-05 2020-12-29 Resource encryption and display method and system
US17/844,825 US20220321344A1 (en) 2020-06-05 2022-06-21 Resource Encryption and Display

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010507936.9A CN112416450B (zh) 2020-06-05 2020-06-05 资源加密及展示方法及系统
CN202010507936.9 2020-06-05

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/844,825 Continuation US20220321344A1 (en) 2020-06-05 2022-06-21 Resource Encryption and Display

Publications (1)

Publication Number Publication Date
WO2021244020A1 true WO2021244020A1 (zh) 2021-12-09

Family

ID=74844168

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/140993 WO2021244020A1 (zh) 2020-06-05 2020-12-29 资源加密及展示方法及系统

Country Status (4)

Country Link
US (1) US20220321344A1 (zh)
EP (1) EP4068087A4 (zh)
CN (1) CN112416450B (zh)
WO (1) WO2021244020A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11818431B2 (en) * 2021-12-14 2023-11-14 Dish Network L.L.C. Systems and methods for efficient processing and presentation of advertisement based on content re-encoding
CN115510473A (zh) * 2022-11-24 2022-12-23 广州市千钧网络科技有限公司 保密资源的处理方法、处理装置和电子设备
CN115567328B (zh) * 2022-12-06 2023-03-14 杭州菲助科技有限公司 一种视频资源地址的安全加密传输方法、装置及应用

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050135613A1 (en) * 2002-05-10 2005-06-23 Karlheinz Brandenburg Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data
CN102025490A (zh) * 2009-12-18 2011-04-20 华为终端有限公司 一种文件分段保护的方法、装置及系统
CN106331763A (zh) * 2016-09-12 2017-01-11 北京小度互娱科技有限公司 无缝播放分片媒体文件的方法及实现该方法的装置
CN108038075A (zh) * 2017-12-07 2018-05-15 湖北三新文化传媒有限公司 电子书文档的展示方法、电子书阅读设备及可读存储介质
CN110138716A (zh) * 2018-02-09 2019-08-16 网宿科技股份有限公司 一种密钥的提供、视频播放方法、服务器及客户端

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020057795A1 (en) * 2000-11-10 2002-05-16 Spurgat Jeffrey Jonathan Content protection through the audio and video decrypting and decoding device
US7653897B2 (en) * 2003-07-21 2010-01-26 Autodesk, Inc. Displaying user operation data
US7861308B2 (en) * 2005-11-28 2010-12-28 Sony Corporation Digital rights management using trusted time
JP4753398B2 (ja) * 2006-03-11 2011-08-24 株式会社日立ソリューションズ 位置情報付きファイル暗号化システム及び復号化システム、並びにその方法
CN103294961A (zh) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 一种文件加/解密方法以及文件加/解密装置
CN107153794B (zh) * 2016-03-03 2020-07-21 腾讯科技(深圳)有限公司 文件加密方法和装置、文件解密方法和装置
CN107341368B (zh) * 2017-06-06 2019-11-05 广州视源电子科技股份有限公司 许可证有效时间校验方法及装置
CN109428912B (zh) * 2017-08-24 2020-07-10 阿里巴巴集团控股有限公司 一种分布式系统资源分配方法、装置及系统
CN109995735A (zh) * 2017-12-31 2019-07-09 中国移动通信集团重庆有限公司 下载和使用方法、服务器、客户端、系统、设备及介质
CN108923875B (zh) * 2018-05-31 2020-11-06 北京五八信息技术有限公司 时间同步方法和装置
US10939173B2 (en) * 2018-07-19 2021-03-02 Cox Communications, Inc. Systems and methods for encrypting video
CN110381061A (zh) * 2019-07-19 2019-10-25 广东省新一代通信与网络创新研究院 文件的多云存储方法、下载方法、装置及存储介质
CN110838885B (zh) * 2019-11-20 2021-11-05 金蝶软件(中国)有限公司 系统时间同步方法以及相关装置
CN111212065B (zh) * 2019-12-31 2021-08-27 海信集团有限公司 一种家电设备通信加密的方法、家电设备和服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050135613A1 (en) * 2002-05-10 2005-06-23 Karlheinz Brandenburg Device and method for generating encrypted data, for decrypting encrypted data and for generating re-signed data
CN102025490A (zh) * 2009-12-18 2011-04-20 华为终端有限公司 一种文件分段保护的方法、装置及系统
CN106331763A (zh) * 2016-09-12 2017-01-11 北京小度互娱科技有限公司 无缝播放分片媒体文件的方法及实现该方法的装置
CN108038075A (zh) * 2017-12-07 2018-05-15 湖北三新文化传媒有限公司 电子书文档的展示方法、电子书阅读设备及可读存储介质
CN110138716A (zh) * 2018-02-09 2019-08-16 网宿科技股份有限公司 一种密钥的提供、视频播放方法、服务器及客户端

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4068087A4

Also Published As

Publication number Publication date
CN112416450A (zh) 2021-02-26
CN112416450B (zh) 2023-02-17
EP4068087A4 (en) 2023-06-28
EP4068087A1 (en) 2022-10-05
US20220321344A1 (en) 2022-10-06

Similar Documents

Publication Publication Date Title
WO2021244020A1 (zh) 资源加密及展示方法及系统
JP7001843B2 (ja) データバックアップ方法並びに、そのコンピュータプログラム及びコンピューティングデバイス
US8924739B2 (en) System and method for in-place encryption
US10204235B2 (en) Content item encryption on mobile devices
WO2019201039A1 (zh) 一种更新应用程序的方法、系统及应用服务器
WO2013133916A1 (en) Tiers of data storage for web applications and browser extensions
CN110083399B (zh) 小程序运行方法、计算机设备及存储介质
WO2014155229A1 (en) Secure execution of software modules on a computer
EP3313041B1 (en) Application download method and device
CN110032321B (zh) 应用程序处理方法和装置、电子设备、计算机可读存储介质
US20150198998A1 (en) Intelligent selection of operating state upon change of power state
WO2021164462A1 (zh) 一种数据加密方法、数据解密方法、计算机设备和介质
CN106569917B (zh) 一种数据备份方法及移动移动终端
US9122766B2 (en) Replacement time based caching for providing server-hosted content
WO2020155591A1 (zh) 一种bios和bmc下电策略实时同步的方法、装置、终端及存储介质
WO2016107219A1 (zh) 数据恢复方法及装置
CN110046510B (zh) 跨云的数据迁移方法、装置和系统
JPH11316727A (ja) セキュリティシステム
WO2022083190A1 (zh) 数据下载方法、装置、计算机设备和存储介质
US7725670B2 (en) System and method of imaging a memory module while in functional operation
US11288361B1 (en) Systems and methods for restoring applications
CN114731272B (zh) 一种安全处理装置、安全处理方法及相关设备
RU2746570C1 (ru) Способ управления службой доступа и отображения конфиденциальной информации и данных с помощью виртуального рабочего стола
CN114239091B (zh) 基于可信芯片的磁盘加密方法及系统
WO2022006810A1 (zh) 一种数据管理方法、装置、电子元件以及终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20938969

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2020938969

Country of ref document: EP

Effective date: 20220628

NENP Non-entry into the national phase

Ref country code: DE