Unlock instant, AI-driven research and patent intelligence for your innovation.

Application signature method, device, system, computing device and storage medium

A technology for applying signatures and signed files, applied in user identity/authority verification, digital data protection, etc., can solve the problems of malicious replacement of the author's original application, stealing user data, attacks, etc., to avoid server-side consumption, improve processing efficiency, The effect of improving safety

Active Publication Date: 2021-08-13
ALIBABA (CHINA) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, if a third party manages to obtain the author's private key without the author's knowledge or authorization, the third party may sign and distribute the application, thereby maliciously replacing the author's original application or damaging them
In addition, a third party who obtains the private key can also use the identity of the author to sign and distribute the application, thereby attacking other applications or the system itself, damaging or stealing user data
[0004] At present, most of the application signature work is done by the author on the local client, which can easily cause the leakage of the private key. Therefore, a more secure application signature scheme is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application signature method, device, system, computing device and storage medium
  • Application signature method, device, system, computing device and storage medium
  • Application signature method, device, system, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0040] Before describing the present invention, a brief description of the background knowledge involved in the present invention will be made first.

[0041] 1. Data summary

[0042] Data Digest Algorithm (Message Digest Algorithm) is an algorithm that can produce a special output format. Its principle is to extract some form of information from the original data according to certain operation rules. The extracted information is called the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application signature method, device, system, computing equipment and storage medium. In response to receiving the application signature request for the target application sent by the client, it is checked whether there is a signature file corresponding to the target application in the signature file database. If found, send the signature file to the client. If it cannot be found, use the preset private key to generate a signature file for the target application, save the generated signature file in the signature file database, and send it to the client. Therefore, by handing over the signing work of the application to the server side, the risk of private key leakage during the application signing process can be reduced, and the security of the signing process can be improved.

Description

technical field [0001] The present invention relates to the field of application signatures, in particular to an application signature method, device, system, computing equipment and storage medium. Background technique [0002] Application signature means that after the application development or update is completed, the application file is digitally signed with the private key to obtain the signature file. A trust relationship can be established between the author of the application and the application by signing the file. [0003] The software installation package of the application is only allowed to be put on the market or installed in the terminal device after being signed. Therefore, maintaining the security of the private key is of paramount importance to the author of the application. If the signature private key is leaked and obtained and used by a third party, it will damage the authorship of the application and the user's trust in the author. For example, if a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/64
Inventor 杨文亮刘泽文祝中良杨瑾
Owner ALIBABA (CHINA) CO LTD