Program file verification methods and devices, server and terminal

A technology of program files and verification methods, which is applied in the direction of safety communication devices, electrical components, digital transmission systems, etc., and can solve the problems of low accuracy of integrity verification

Inactive Publication Date: 2016-02-03
KINGSOFT
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, because the existing program file verification executes the code locally, the attacker can see the relevant code and prevent the code from running effectively in various ways, which leads to a lo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program file verification methods and devices, server and terminal
  • Program file verification methods and devices, server and terminal
  • Program file verification methods and devices, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0129] First, in order to improve the accuracy of verifying the integrity of the program file, from the perspective of the server, an embodiment of the present invention provides a method for verifying the program file, wherein the server is: used for running in the terminal The application software of the application package provides network services to the server.

[0130] Wherein, the application package can be a file suitable for the Android operating syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide program file verification methods and devices, a server and a terminal. The program file verification method applied to the server can comprise steps of after a communication connection with the terminal is established, acquiring a version number of an application package; acquiring a random number corresponding to the application package; generating a first Hash value by use of a preset Hash algorithm according to the random number and file content of a preset to-be-verified file in an application package with a version number prestored by the server; sending the random number to the terminal, so as to enable the terminal to generate a second Hash value by use of the preset Hash algorithm according to the random number and file content of a preset to-be-verified file in a local application package of the terminal; acquiring related information of the second Hash value generated by the terminal; and determining a verification result of integrity of the preset to-be-verified file in the terminal. Through adoption of the method, the accuracy of integrity verification of the program file can be improved.

Description

technical field [0001] The invention relates to the technical field of file detection, in particular to a program file verification method and device, a server and a terminal. Background technique [0002] Because the application software used in some operating systems adopts a common coding language, some files in the application package as the carrier of the application software are easily decompiled, modified, and repackaged and released by attackers, which makes pirated software For example, the application software applicable to the Android system is mainly written in the Java language, making the APK (Android Package) as the carrier of this type of application software very easy to be decompiled, modified, and repackaged for release by attackers. [0003] In order to prevent the secondary packaging of the application package, it is necessary to check the integrity of certain files in the application package, that is, check whether they have been modified. The existing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L9/40
Inventor 秦皓
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products