Method and device for loading code signatures to applications

An application and code technology, applied in the Internet field, can solve the problems of user terminal security threats, code signature tampering, and unclear attribution of applications, so as to avoid malicious tampering or theft of code signatures, prevent private key leakage, and ensure security. Effects of dissemination and use

Inactive Publication Date: 2016-11-23
ZTE CORP
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there may be a risk of tampering with the code signature. The application publisher will forcibly delete the original code signature in the application developed by others, and then re-write it with its own code signature before releasing it, so that the applica...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for loading code signatures to applications
  • Method and device for loading code signatures to applications
  • Method and device for loading code signatures to applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0054] like figure 1 as shown, figure 1 A flow chart of the first embodiment of the method for loading a code signature for an application program of the present invention. The method for loading code signatures for applications proposed in this embodiment includes:

[0055] Step S10, receiving the code signing request sent by the requesting party;

[0056] In this embodiment, in order to improve the security of the code signature, the code signature for the application program to be released is implemented uniformly through the server. Specifically, the application publisher needs to send a code signing request to the server as a request before publishing the application, and the code signing request includes the identity information of the requesting party and the application to be signed. The requester may conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for loading a code signature to an application. The method includes the steps that a code signature request sent by a requester is received, wherein the code signature request comprises identity information of the requester and the to-be-signed application; the identity information of the requester is verified; after the identity information of the requester passes verification, a signature private key authenticated by a certification mechanism loads the code signature to the application; the application obtained after the signature and signature information of the application are backed up in a backup record. The invention further discloses a device for loading the code signature to the application. The private key authenticated by the certification mechanism is stored in a server, code signatures are loaded to applications needing signatures in a unified mode through the server, the situation that the code signatures are maliciously tampered or stolen by illegal users is avoided, leakage of the private key is avoided, unified management of the code signatures is promoted, the security of the signatures is further improved, and security propagation and use of the applications are guaranteed.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and a device for loading code signatures of application programs. Background technique [0002] With the development of terminal technology, more and more application programs are developed, installed and used. While providing convenience to users, it also brings many security risks. In order to avoid terminal security problems caused by users downloading and installing unsafe and illegal applications, the system program installed on the terminal verifies the application program downloaded to the terminal. The verification method is that the terminal system program verifies the downloaded application program The code signature is verified to identify the source of the software and the real identity of the software developer. The code signature is usually authorized by the certification authority of the terminal system program to the application publisher, and loaded...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/44G06F21/12
CPCG06F9/44G06F21/12
Inventor 杜金芳
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products