Application file verification method and system

A technology for application programs and files, which is applied in the field of application program file security, and can solve problems such as difficulty in entering mobile terminals, long activation codes or registration codes, and easy piracy

Inactive Publication Date: 2016-11-09
BEIJING ERENEBEN INFORMATION TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Among the above-mentioned methods for ensuring the security of Android applications, on the one hand, the activation code or registration code is relative

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application file verification method and system
  • Application file verification method and system
  • Application file verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0030] refer to figure 1 , figure 1 It is a flowchart of an embodiment of the method for verifying application program files in the present invention, including:

[0031] Step S101: The mobile device obtains the first verification code and the second verification code of the application program file, wherein the first verification code is obtained according to the first authorization file information carried by the application program file itself, and the second verification code It is obtained according to the second authorization file information carried by the genuine version of the application program file, and the second authorization file information carried by the genuine version of the application program file is the authorization file information corresponding to the genuine version of the application program file. The acquisition of the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application file verification method and system. The method comprises the steps that a mobile device obtains a first check code and a second check code of an application file, wherein the first check code is obtained according to first authorization file information carried by the application file, and the second check code is obtained according to second authorization file information carried by an authorized edition of the application file; and the mobile device determines that the application file passes the verification when the first check code is consistent with the second check code. Through the method and the system, the security of the application file can be determined at a mobile terminal and relatively long codes do not need to be input.

Description

technical field [0001] The invention relates to the technical field of application program file security, in particular to a method and system for verifying application program files. Background technique [0002] Android (Android) applications are facing a serious problem of piracy. Pirated applications may be implanted with viruses, advertisements, and may be repackaged and tampered with, which seriously damage the rights and interests of application developers and consumers. . [0003] In response to this situation, various industry chains of the mobile Internet are making some efforts to protect the security of Android applications. At present, the commonly used software authorization method is to enter the activation code or registration code on the software authorization interface to complete the registration. The activation code or registration code is generally separated by "-", such as Windows, Office, etc. For example, Office2013: the activation code is GQKNX-C6 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44
CPCG06F21/44
Inventor 韩鹏程任靖周佳冯继超
Owner BEIJING ERENEBEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products