Supercharge Your Innovation With Domain-Expert AI Agents!

Verification information generation and file integrity verification method, system and device, and medium

A technology for integrity verification and verification information, applied in the direction of platform integrity maintenance, digital data protection, etc., can solve problems such as easy cracking, low security level, and replacement of key file Trojans, etc., to improve security and stability. Effect

Inactive Publication Date: 2019-06-25
SUZHOU KEDA TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the integrity verification method in the prior art often has a very low security level and is easy to be cracked, so it cannot be used for the integrity check of application files with higher confidentiality requirements, such as the relevant national departments that require to meet the national secret standard , they require installed applications to be able to detect virus intrusion with a secure algorithm
In addition, for banking or securities applications, if the encryption of the application is cracked, key files may be replaced by Trojan horses, resulting in a major hidden danger of user information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification information generation and file integrity verification method, system and device, and medium
  • Verification information generation and file integrity verification method, system and device, and medium
  • Verification information generation and file integrity verification method, system and device, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar structures in the drawings, and thus their repeated descriptions will be omitted.

[0050] Such as figure 1 As shown, the embodiment of the present invention provides a method for generating verification information for generating verification information of an application file, and the method includes the following steps:

[0051] S110: Obtain a file to be processed;

[0052] S120: Perform a hash operation on the file to be processed to obtain a hash value;

[0053] S130: Encrypt the hash value with a key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification information generation and file integrity verification method, system and device, and a medium, and the method comprises the steps: obtaining the verification information of an application program file, and enabling the verification information to comprise a first encryption value of a to-be-verified file; obtaining a file to be verified; executing a hash operation on the to-be-verified file to obtain a hash value; encrypting the hash value by using a key to obtain a second encrypted value; and comparing the first encryption value with the second encryption value, and if the first encryption value and the second encryption value are inconsistent, determining that the verification fails. Through the adoption of the method and the device, the hash operation and the key encryption are adopted to carry out integrity verification on the application program, and the security and the stability of the application program are greatly improved through a secondary encryption mechanism.

Description

technical field [0001] The invention relates to the technical field of file verification, in particular to a method, system, device and medium for generating verification information and verifying file integrity. Background technique [0002] Integrity verification of application files is usually used in occasions that require high security and stability. If the application files are infected by viruses or Trojan horses, some malicious codes are implanted, which may seriously affect the important information of users (such as payment passwords, etc.) or system security; therefore, after the program files are infected or tampered with, timely Notifying the user that the program file is damaged and making the program unable to execute can avoid the above-mentioned major losses and realize the self-testing function of the software. [0003] However, the integrity verification method in the prior art often has a very low security level and is easy to be cracked, so it cannot be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/64G06F21/56
Inventor 刘晓静刘晓航刘以恒
Owner SUZHOU KEDA TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More