Patents
Literature

83results about How to "Prevent cracking" patented technology

Installation management method, server and terminal for application program

The invention provides an installation management method, a server and a terminal for an application program. The installation management method includes: receiving installation request sent by the terminal when a user installs the application program on the terminal, acquiring user identification of the user and application program identification of the application program, judging whether the relationship between the user identification and the application program identification meets a first predetermined condition and acquiring a first judgment result, acquiring installation history recorded information of the application program when the first judgment result indicates that the relationship between the user identification and the application program identification meets the first predetermined condition, judging whether the installation history recorded information meets a second predetermined condition and acquiring a second judgment result, sending feedback information which is used for indicating that the terminal is allowed to be installed with the application program when the second judgment result indicates that the installation history recorded information meets the second predetermined condition so as to enable the terminal to be installed with the application program according to the feedback information. By means of the installation management method, the server and the terminal for the application program, an anti-piracy mechanism can be effectively prevented from being broken, thereby having high reliability.
Owner:LENOVO (BEIJING) CO LTD

Vehicle node certificate updating method based on Vehicle to X (V2X) network

ActiveCN105812131APrevent crackingEnsure communication security and non-repudiationKey distribution for secure communicationUser identity/authority verificationPublic key infrastructureComputer security
The invention discloses a vehicle node certificate updating method based on a Vehicle to X (V2X) network. A vehicle node applies for an updated certificate from a PKI (Public Key Infrastructure) system via a roadside node; the PKI system sends part of private keys to the vehicle node; the vehicle node generates a new public key and a new private key using the part of private keys and part of private keys generated per se, generates a certificate using the new private key, and sends the certificate to the PKI system; the PKI system verifies the validity and the accuracy of the certificate; and after the certificate passes the verification, the PKI system updates the certificate of the vehicle node using the public key generated by the vehicle node, and issues the updated certificate to the whole network. The updated certificate, the new public key and the new private key are all generated using part of private keys of the PKI system and part of private keys of the vehicle node, and only the vehicle node has node private keys, so the information issued by the vehicle node can be effectively prevented from being decrypted by the PKI system, and the security and the non-repudiation of communication of the vehicle node in the V2X network are guaranteed.
Owner:DATANG GOHIGH INTELLIGENT & CONNECTED TECH (CHONGQING) CO LTD

Verification code data processing method and device

The invention provides a verification code data processing method. The method comprises the following steps: sending a verification code request for a user to a server; receiving first verification code data generated by the server in response to the verification code request; according to the first verification code data, drawing a dial on a page and displaying a verification hint, wherein the dial indicates a first parameter, and the verification hint is corresponding to a second parameter; in response to verification code input operation of the user, determining a first parameter or a second parameter at present; in response to verification code submit operation of the user, generating second verification code data according to the determined first parameter or the second parameter, andsubmitting the second verification code data to the server to enable the server to carry out verification processing according to the first verification code data and the second verification code data and obtain a verification result; and receiving the verification result from the server and displaying the verification result. The invention also provides a corresponding device. According to the scheme, decoding of the verification code can be prevented, and meanwhile, efficiency is improved.
Owner:TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products