CN102271130A - Method for safely delivering and distributing software - Google Patents

Method for safely delivering and distributing software Download PDF

Info

Publication number
CN102271130A
CN102271130A CN2011102066936A CN201110206693A CN102271130A CN 102271130 A CN102271130 A CN 102271130A CN 2011102066936 A CN2011102066936 A CN 2011102066936A CN 201110206693 A CN201110206693 A CN 201110206693A CN 102271130 A CN102271130 A CN 102271130A
Authority
CN
China
Prior art keywords
software
publisher
kit
certificate
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102066936A
Other languages
Chinese (zh)
Other versions
CN102271130B (en
Inventor
杨金峰
刘贤洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201110206693.6A priority Critical patent/CN102271130B/en
Publication of CN102271130A publication Critical patent/CN102271130A/en
Application granted granted Critical
Publication of CN102271130B publication Critical patent/CN102271130B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a safety protocol technology of software application programs. A safety problem existing in delivery and distribution of current software is solved. A method for safely delivering and distributing software is provided. The technical scheme provided by the invention is generalized as follows: a software developer is encrypted and authenticated in the event of providing the software to a software release operator; and, after the software release operator is also encrypted and authenticated, the software is downloaded by a terminal user. The method disclosed by the invention has the beneficial effects that the safety in a transmission process is ensured, and the integrity and the source validity of the software to be transmitted are also verified; and the method is applicable to delivering and distributing the software.

Description

Realize that software security is paid and the method for distribution
Technical field
The present invention relates to the security protocol techniques of software application, particularly the safety payment of software and the method for distribution.
Background technology
Continuous development along with Internet technology and embedded software technology, terminal networkization, intelligent trend are obvious, disposal ability, the storage capacity of various built-in terminals constantly promote, and a lot of terminals have become people's work and amusement platform gradually such as smart mobile phone, various PAD series products and intelligent television etc.Be accompanied by day by day popularizing of various intelligent terminals, also occur in a large number, occurred numerous software developer team, software issue operator independently thus at the software of various intelligent terminals.Because each side's interests appeal point difference, use at payment, issue and the terminal of software to have many safety problems.Concerning the software developer, the software of high value needs safety to be delivered in the software issue operator hand; Concerning software issue operator, also exist the numerous software of paying by the free software developer of how effectively checking, and the safe controlled problem that software is offered the terminal use how; Simultaneously, for the terminal use, should can be safe and reliable obtain the software of wanting, can confirm the source legitimacy and the integrality of software again; In addition, in case occur security breaches in the software running process, the terminal use is difficult to define the responsibility between software issue operator and the third party software developer.
Summary of the invention
The present invention seeks to overcome the payment of present software and the shortcoming that there is safety problem in distribution, provide a kind of and realize that software security is paid and the method for distribution.
The present invention solves the problems of the technologies described above the technical scheme that is adopted to be, realizes that software security is paid and the method for distribution, it is characterized in that, may further comprise the steps:
A. after software developers develop is finished certain application software, enter the software security program of paying this software is carried out package, signature, obtain original development person's software kit, through encrypting, form developer's software kit again, and consign to software issue operator;
B. after software issue operator received developer's software kit, deciphering obtained original development person's software kit, and this original development person's software kit is carried out signature verification, if then enter next step by signature verification, as if then not pointing out failure by signature verification and withdrawing from;
C. software issue operator test the software in this original development person's software kit on suitable terminal platform, if test is by then entering next step, if test is not failed and withdrawed from by prompting then;
D. software issue operator uses the software cryptography key to encrypt this software or this software and relevant information, and carries out the package signature, obtains publisher's software kit, and publishes on the corresponding software issuing service platform;
When e. the terminal use downloads certain publisher's software kit on corresponding software issuing service platform, software issuing service platform authenticates and downloads authority to this terminal and identifies, if the authentication by and confirm that this terminal has the authority of downloading this publisher's software kit after, the software cryptography key that uses in this publisher's software kit is sent to terminal after encrypting, enter next step again, if do not have authority by authentication or this terminal, then prompt terminal, and cut-out is connected with terminal;
F. terminal obtains behind this publisher's software kit this publisher's software kit to be carried out signature verification, if signature verification is by then entering next step, if not by then pointing out this publisher's software kit of user by signature verification;
G. this publisher's software kit of software cryptography secret key decryption that uses in this publisher's software kit that terminal uses the e step to obtain is installed this software.
Concrete, among the described step a, the software developer is before generating developer's software kit, the developer's software signature certificate and private key and the software issue operator public key certificate thereof that must have self, and the developer's software signature certificate of self and software issue operator public key certificate can be trusted mutually by certificate chain authentication or cross-certification.
Further, step a may further comprise the steps:
A1. after software developers develop is finished certain application software, enter software security and pay program, treat signing messages and organize package, the package content comprises this software self and encapsulation indication information at least;
A2. the signing messages for the treatment of after using developer's software signature certificate private key to this package is signed, obtain signing messages, generate the priginal soft certificate then, and signing messages encapsulated in the priginal soft certificate, the priginal soft certificate that to treat signing messages and generation again makes up, and obtains original development person's software kit;
A3. use software issue operator PKI that original development person's software kit is encrypted, obtain developer's software kit, consign to software issue operator again.
Further again, the described package content of step a1 comprises this software self, encapsulation indication information, distributor information and certificate chain.
Concrete, among the described step b, software issue operator is before carrying out signature verification to original development person's software kit, publisher's software signature certificate and private key and software developer's public key certificate that must have self, and the publisher's software signature certificate of self and software developer's public key certificate can be trusted mutually by certificate chain authentication or cross-certification.
Further again, described step b may further comprise the steps:
B1. after software issue operator receives developer's software kit, use publisher's software signature certificate private key that developer's software kit is decrypted, obtain original development person's software kit;
B2. original development person's software kit is carried out signature verification, the integrality of checking original development person software kit and source legitimacy are if signature verification is by then entering next step, if not by then pointing out failure and withdrawing from;
Described step c may further comprise the steps:
C1. software issue operator obtains this software self according to the encapsulation indication information of original development person's software kit;
C2. this software self is installed on suitable terminal platform and tests, if test is by then entering next step, if test is not by then pointing out failure and withdrawing from;
Described steps d may further comprise the steps:
D1. software issue operator uses the software cryptography key that software self or software self and relevant information are encrypted, and obtains the ciphertext software information;
D2. treat signing messages and organize package, the package content comprises ciphertext software information and encapsulation indication information at least;
D3. the signing messages for the treatment of after using software issue operator software signature certificate private key to this package is signed, and obtains signing messages;
D4. generate publisher's software certificate, and signing messages is encapsulated in publisher's software certificate, will treat that again publisher's software certificate of signing messages and generation makes up, obtain publisher's software kit;
D5. software issue operator is published to this publisher's software kit on the corresponding software issuing service platform.
Concrete, among the described step b2, in the signature verification to original development person's software kit, the legitimacy of checking priginal soft certificate is verified the integrality for the treatment of signing messages more earlier.
Further, steps d 2 described package contents comprise ciphertext software information, encapsulation indication information, distributor information and certificate chain.
Concrete, among the described step e, the terminal use is before downloading certain publisher's software kit on the corresponding software issuing service platform, the unique end-user certificate and the private key thereof that must have self, and and software issue operator public key certificate between can trust mutually by certificate chain authentication or cross-certification.
Further again, step e is described to send to terminal with the software cryptography key that uses in this publisher's software kit after encrypting, its concrete steps are, use terminal use's PKI to encrypt the software cryptography key that uses in this publisher's software kit, obtain ciphertext software cryptography key, be transferred to terminal again.
Concrete, described step f may further comprise the steps:
F1. terminal obtains behind this publisher's software kit the publisher's software certificate in this publisher's software kit to be verified by the publisher's software certificate on the software issuing service platform, if checking is by then entering next step, if not by then pointing out this publisher's software kit of user by signature verification.
The invention has the beneficial effects as follows, method by above-mentioned realization software security payment and distribution, owing to when software issue operator provides software, encrypt and authenticate the software developer, and software issue operator has also carried out being downloaded by the terminal use after encryption and the authentication again, and because the existence of ciphertext software information, the terminal use also need just can install after the authentication and authorization that obtains software issue operator, guaranteed the safety of above-mentioned transmission course, and software issue operator is when treating signing messages and carry out package, developer's information can be encapsulated in the inside, the Liability Retroact identification when being convenient to security breaches occur in the down-stream running.
Embodiment
Realization software security of the present invention is paid and the method for distribution is: after at first software developers develop is finished certain application software, enter the software security program of paying this software is carried out package, signature, obtain original development person's software kit, again through encrypting, form developer's software kit, and consign to software issue operator, software issue operator is after receiving developer's software kit, deciphering obtains original development person's software kit, and this original development person's software kit carried out signature verification, as if then not pointing out failure and withdrawing from by signature verification, as if the software of then on suitable terminal platform, testing by signature verification in this original development person's software kit, if test is not by then pointing out failure and withdrawing from, if test is by then using the software cryptography key to encrypt this software or this software and relevant information, and carry out package and sign, obtain publisher's software kit, and publish on the corresponding software issuing service platform, when the terminal use downloads certain publisher's software kit on corresponding software issuing service platform, software issuing service platform authenticates and downloads authority to this terminal and identifies, if do not have authority by authentication or this terminal, prompt terminal then, and being connected of cut-out and terminal, if the authentication by and confirm that this terminal has the authority of downloading this publisher's software kit after, the software cryptography key that uses in this publisher's software kit is sent to terminal after encrypting, terminal obtains behind this publisher's software kit this publisher's software kit to be carried out signature verification, if not by then pointing out this publisher's software kit of user by signature verification, if signature verification this publisher's software kit of software cryptography secret key decryption by using in this publisher's software kit that then terminal obtains before using is installed this software and use.
Embodiment
This routine software developer is before generating developer's software kit, the developer's software signature certificate and private key and the software issue operator public key certificate thereof that must have self, and the developer's software signature certificate of self and software issue operator public key certificate can be trusted mutually by certificate chain authentication or cross-certification; Software issue operator is before carrying out signature verification to original development person's software kit, publisher's software signature certificate and private key and software developer's public key certificate that must have self, and the publisher's software signature certificate of self and software developer's public key certificate can be trusted mutually by certificate chain authentication or cross-certification; The terminal use is before downloading certain publisher's software kit on the corresponding software issuing service platform, the unique end-user certificate and the private key thereof that must have self, and and software issue operator public key certificate between can trust mutually by certificate chain authentication or cross-certification.
After at first software developers develop is finished certain application software, enter the software security program of paying this software is carried out package, signature, obtain original development person's software kit, again through encrypting, form developer's software kit, and consign to software issue operator, software issue operator is after receiving developer's software kit, deciphering obtains original development person's software kit, and this original development person's software kit carried out signature verification, as if then not pointing out failure and withdrawing from by signature verification, as if the software of then on suitable terminal platform, testing by signature verification in this original development person's software kit, if test is not by then pointing out failure and withdrawing from, if test is by then using the software cryptography key to encrypt this software or this software and relevant information, and carry out package and sign, obtain publisher's software kit, and publish on the corresponding software issuing service platform, when the terminal use downloads certain publisher's software kit on corresponding software issuing service platform, software issuing service platform authenticates and downloads authority to this terminal and identifies, if do not have authority by authentication or this terminal, prompt terminal then, and being connected of cut-out and terminal, if the authentication by and confirm that this terminal has the authority of downloading this publisher's software kit after, the software cryptography key that uses in this publisher's software kit is sent to terminal after encrypting, terminal obtains behind this publisher's software kit this publisher's software kit to be carried out signature verification, if not by then pointing out this publisher's software kit of user by signature verification, if signature verification this publisher's software kit of software cryptography secret key decryption by using in this publisher's software kit that then terminal obtains before using is installed this software and use.
Wherein, software developers develop finish after certain application software to pay between the software issue operator concrete steps can for: after software developers develop is finished certain application software, enter software security and pay program, treat signing messages and organize package, the package content comprises this software self and encapsulation indication information at least, can also comprise relevant informations such as distributor information and certificate chain, re-using the treat signing messages of developer's software signature certificate private key after to this package signs, obtain signing messages, generate the priginal soft certificate then, and signing messages encapsulated in the priginal soft certificate, the priginal soft certificate that to treat signing messages and generation again makes up, obtain original development person's software kit, use software issue operator PKI that original development person's software kit is encrypted then, obtain developer's software kit, consign to software issue operator again.
Software issue operator receive developer's software kit to publisher's software kit is published between the software issuing service platform concrete steps can for: when software is issued after operator receives developer's software kit, use publisher's software signature certificate private key that developer's software kit is decrypted, obtain original development person's software kit, again original development person's software kit is carried out signature verification, the integrality of checking original development person software kit and source legitimacy, if not by then pointing out failure and withdrawing from, if signature verification is obtained this software self by the encapsulation indication information according to original development person's software kit then, again this software self is installed on suitable terminal platform and tests, if test is not by then pointing out failure and withdrawing from, if test is encrypted software self or software self and relevant information by then using the software cryptography key, obtain the ciphertext software information, treat signing messages again and organize package, the package content comprises ciphertext software information and encapsulation indication information at least, can also comprise relevant informations such as distributor information and certificate chain, the signing messages for the treatment of after using software issue operator software signature certificate private key to this package is then signed, obtain signing messages, regeneration publisher software certificate, and signing messages encapsulated in publisher's software certificate, the publisher's software certificate that to treat signing messages and generation again makes up, obtain publisher's software kit, this publisher's software kit is published on the corresponding software issuing service platform at last, wherein, in the signature verification to original development person's software kit, the legitimacy of checking priginal soft certificate is verified the integrality for the treatment of signing messages more earlier.
With the software cryptography key that uses in this publisher's software kit after encrypting, send to terminal concrete steps can for: the software cryptography key that uses at first with this publisher's software kit uses terminal use's PKI to encrypt, obtain ciphertext software cryptography key, be transferred to terminal again.
Terminal obtain behind this publisher's software kit to this publisher's software kit carry out signature verification concrete steps can for: terminal is verified by the publisher's software certificate on the software issuing service platform the publisher's software certificate in this publisher's software kit after obtaining this publisher's software kit, if not by then pointing out this publisher's software kit of user by signature verification, if checking this publisher's software kit of software cryptography secret key decryption by using in this publisher's software kit that then terminal obtains before using is installed this software and is also used.

Claims (10)

1. realize that software security is paid and the method for distribution, it is characterized in that, may further comprise the steps:
A. after software developers develop is finished certain application software, enter the software security program of paying this software is carried out package, signature, obtain original development person's software kit, through encrypting, form developer's software kit again, and consign to software issue operator;
B. after software issue operator received developer's software kit, deciphering obtained original development person's software kit, and this original development person's software kit is carried out signature verification, if then enter next step by signature verification, as if then not pointing out failure by signature verification and withdrawing from;
C. software issue operator test the software in this original development person's software kit on suitable terminal platform, if test is by then entering next step, if test is not failed and withdrawed from by prompting then;
D. software issue operator uses the software cryptography key to encrypt this software or this software and relevant information, and carries out the package signature, obtains publisher's software kit, and publishes on the corresponding software issuing service platform;
When e. the terminal use downloads certain publisher's software kit on corresponding software issuing service platform, software issuing service platform authenticates and downloads authority to this terminal and identifies, if the authentication by and confirm that this terminal has the authority of downloading this publisher's software kit after, the software cryptography key that uses in this publisher's software kit is sent to terminal after encrypting, enter next step again, if do not have authority by authentication or this terminal, then prompt terminal, and cut-out is connected with terminal;
F. terminal obtains behind this publisher's software kit this publisher's software kit to be carried out signature verification, if signature verification is by then entering next step, if not by then pointing out this publisher's software kit of user by signature verification;
G. this publisher's software kit of software cryptography secret key decryption that uses in this publisher's software kit that terminal uses the e step to obtain is installed this software.
2. pay according to the described realization software security of claim 1 and the method for distribution, it is characterized in that, among the described step a, the software developer is before generating developer's software kit, the developer's software signature certificate and private key and the software issue operator public key certificate thereof that must have self, and the developer's software signature certificate of self and software issue operator public key certificate can be trusted mutually by certificate chain authentication or cross-certification.
3. the method for paying and distributing according to the described realization software security of claim 2 is characterized in that, rapid step by step a may further comprise the steps:
A1. after software developers develop is finished certain application software, enter software security and pay program, treat signing messages and organize package, the package content comprises this software self and encapsulation indication information at least;
A2. the signing messages for the treatment of after using developer's software signature certificate private key to this package is signed, obtain signing messages, generate the priginal soft certificate then, and signing messages encapsulated in the priginal soft certificate, the priginal soft certificate that to treat signing messages and generation again makes up, and obtains original development person's software kit;
A3. use software issue operator PKI that original development person's software kit is encrypted, obtain developer's software kit, consign to software issue operator again.
4. the method for paying and distributing according to the described realization software security of claim 3 is characterized in that, the described package content of step a1 comprises this software self, encapsulation indication information, distributor information and certificate chain.
5. according to claim 1 or 2 or 3 or 4 described realization software securities are paid and the method for distribution, it is characterized in that, among the described step b, software issue operator is before carrying out signature verification to original development person's software kit, publisher's software signature certificate and private key and software developer's public key certificate that must have self, and the publisher's software signature certificate of self and software developer's public key certificate can be trusted mutually by certificate chain authentication or cross-certification.
6. according to the method for described realization software security payment of claim 5 and distribution, it is characterized in that described step b may further comprise the steps:
B1. after software issue operator receives developer's software kit, use publisher's software signature certificate private key that developer's software kit is decrypted, obtain original development person's software kit;
B2. original development person's software kit is carried out signature verification, the integrality of checking original development person software kit and source legitimacy are if signature verification is by then entering next step, if not by then pointing out failure and withdrawing from;
Described step c may further comprise the steps:
C1. software issue operator obtains this software self according to the encapsulation indication information in original development person's software kit;
C2. this software self is installed on suitable terminal platform and tests, if test is by then entering next step, if test is not by then pointing out failure and withdrawing from;
Described steps d may further comprise the steps:
D1. software issue operator uses the software cryptography key that software self or software self and relevant information are encrypted, and obtains the ciphertext software information;
D2. treat signing messages and organize package, the package content comprises ciphertext software information and encapsulation indication information at least;
D3. the signing messages for the treatment of after using software issue operator software signature certificate private key to this package is signed, and obtains signing messages;
D4. generate publisher's software certificate, and signing messages is encapsulated in publisher's software certificate, will treat that again publisher's software certificate of signing messages and generation makes up, obtain publisher's software kit;
D5. software issue operator is published to this publisher's software kit on the corresponding software issuing service platform.
7. the method for paying and distributing according to the described realization software security of claim 6 is characterized in that, steps d 2 described package contents comprise ciphertext software information, encapsulation indication information, distributor information and certificate chain.
8. pay according to the described realization software security of claim 6 and the method for distribution, it is characterized in that, among the described step e, the terminal use is before downloading certain publisher's software kit on the corresponding software issuing service platform, the unique end-user certificate and the private key thereof that must have self, and and software issue operator public key certificate between can trust mutually by certificate chain authentication or cross-certification.
9. the method that described according to Claim 8 realization software security is paid and distributed, it is characterized in that, step e is described to send to terminal with the software cryptography key that uses in this publisher's software kit after encrypting, its concrete steps are, use terminal use's PKI to encrypt the software cryptography key that uses in this publisher's software kit, obtain ciphertext software cryptography key, be transferred to terminal again.
10. according to the method for described realization software security payment of claim 6 and distribution, it is characterized in that described step f may further comprise the steps:
F1. terminal obtains behind this publisher's software kit the publisher's software certificate in this publisher's software kit to be verified by the publisher's software certificate on the software issuing service platform, if checking is by then entering next step, if not by then pointing out this publisher's software kit of user by signature verification.
CN201110206693.6A 2011-07-22 2011-07-22 Method for safely delivering and distributing software Expired - Fee Related CN102271130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110206693.6A CN102271130B (en) 2011-07-22 2011-07-22 Method for safely delivering and distributing software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110206693.6A CN102271130B (en) 2011-07-22 2011-07-22 Method for safely delivering and distributing software

Publications (2)

Publication Number Publication Date
CN102271130A true CN102271130A (en) 2011-12-07
CN102271130B CN102271130B (en) 2014-09-10

Family

ID=45053293

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110206693.6A Expired - Fee Related CN102271130B (en) 2011-07-22 2011-07-22 Method for safely delivering and distributing software

Country Status (1)

Country Link
CN (1) CN102271130B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750491A (en) * 2012-06-05 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and system for restricting terminals from mounting or upgrading third-party application programs
CN102800153A (en) * 2012-07-17 2012-11-28 武汉天喻信息产业股份有限公司 Service downloading method and system of card swiping terminal
CN103297816A (en) * 2013-05-08 2013-09-11 深圳创维数字技术股份有限公司 Safety downloading method and digital television receiving terminal
CN105095696A (en) * 2015-06-25 2015-11-25 三星电子(中国)研发中心 Method, system and apparatus for carrying out safety authentication on application programs
WO2015192796A1 (en) * 2014-06-20 2015-12-23 ***股份有限公司 Automatic application release method and system based on trusted service manager
CN105404812A (en) * 2015-10-30 2016-03-16 中国民生银行股份有限公司 Safety certification method and device of smart POS (Point Of Sale) machine
CN105940403A (en) * 2014-02-06 2016-09-14 索尼公司 Information processing device, information processing method, program, and server
CN106161825A (en) * 2015-04-15 2016-11-23 ***通信集团江苏有限公司 A kind of application program charging method and device
CN106446612A (en) * 2016-09-12 2017-02-22 珠海市魅族科技有限公司 Subject trial method and device
CN107632932A (en) * 2017-09-11 2018-01-26 天津麒麟信息技术有限公司 A kind of software storage reliability checking method of multistage verification
CN108418833A (en) * 2018-03-23 2018-08-17 中科创达软件股份有限公司 A kind of management method of software, cloud server and terminal
CN109309645A (en) * 2017-07-26 2019-02-05 中国人民解放军装备学院 A kind of software distribution security guard method
CN112579989A (en) * 2020-12-23 2021-03-30 杭州安司源科技有限公司 Anti-piracy method for network service software
CN112751825A (en) * 2020-12-07 2021-05-04 湖南麒麟信安科技股份有限公司 Software source issuing authority control method and system based on SSL certificate
CN113268716A (en) * 2020-02-17 2021-08-17 杭州海康威视数字技术股份有限公司 Authorization verification system, method and device for application and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144298A1 (en) * 2002-03-05 2005-06-30 Samuel Subodh A. System and method for enterprise software distribution
CN101938468A (en) * 2010-08-06 2011-01-05 四川长虹电器股份有限公司 Digital content protecting system
CN102035653A (en) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 Controllable distributing method and system used in software examining and verifying stage
CN102065077A (en) * 2010-11-11 2011-05-18 中国联合网络通信集团有限公司 Method and system for distributing application software to terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144298A1 (en) * 2002-03-05 2005-06-30 Samuel Subodh A. System and method for enterprise software distribution
CN101938468A (en) * 2010-08-06 2011-01-05 四川长虹电器股份有限公司 Digital content protecting system
CN102065077A (en) * 2010-11-11 2011-05-18 中国联合网络通信集团有限公司 Method and system for distributing application software to terminal
CN102035653A (en) * 2010-11-30 2011-04-27 中国联合网络通信集团有限公司 Controllable distributing method and system used in software examining and verifying stage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
蔡皖东等: "基于DRM的电子文档保护***设计与实现", 《基于DRM的电子文档保护***设计与实现》, vol. 22, no. 7, 31 July 2005 (2005-07-31) *

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750491B (en) * 2012-06-05 2016-03-09 宇龙计算机通信科技(深圳)有限公司 The method and system of a kind of limiting terminal installation or upgrading third party application
CN102750491A (en) * 2012-06-05 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Method and system for restricting terminals from mounting or upgrading third-party application programs
CN102800153A (en) * 2012-07-17 2012-11-28 武汉天喻信息产业股份有限公司 Service downloading method and system of card swiping terminal
CN102800153B (en) * 2012-07-17 2015-09-23 武汉天喻信息产业股份有限公司 The service downloading method and system of card swiping terminal
CN103297816A (en) * 2013-05-08 2013-09-11 深圳创维数字技术股份有限公司 Safety downloading method and digital television receiving terminal
CN103297816B (en) * 2013-05-08 2016-09-14 深圳创维数字技术有限公司 A kind of method for safely downloading and receiving terminal for digital television
CN105940403B (en) * 2014-02-06 2019-09-06 索尼公司 Information processing equipment, information processing method, program and server
CN105940403A (en) * 2014-02-06 2016-09-14 索尼公司 Information processing device, information processing method, program, and server
CN105279670B (en) * 2014-06-20 2020-11-24 ***股份有限公司 Application automatic publishing method and system based on trusted service management platform
WO2015192796A1 (en) * 2014-06-20 2015-12-23 ***股份有限公司 Automatic application release method and system based on trusted service manager
CN105279670A (en) * 2014-06-20 2016-01-27 ***股份有限公司 Automatic application publishing method and system based on trusted service management platform
CN106161825B (en) * 2015-04-15 2019-11-12 ***通信集团江苏有限公司 A kind of application program charging method and device
CN106161825A (en) * 2015-04-15 2016-11-23 ***通信集团江苏有限公司 A kind of application program charging method and device
CN105095696B (en) * 2015-06-25 2018-10-16 三星电子(中国)研发中心 Method, system and the equipment of safety certification are carried out to application program
CN105095696A (en) * 2015-06-25 2015-11-25 三星电子(中国)研发中心 Method, system and apparatus for carrying out safety authentication on application programs
CN105404812A (en) * 2015-10-30 2016-03-16 中国民生银行股份有限公司 Safety certification method and device of smart POS (Point Of Sale) machine
CN106446612A (en) * 2016-09-12 2017-02-22 珠海市魅族科技有限公司 Subject trial method and device
CN109309645A (en) * 2017-07-26 2019-02-05 中国人民解放军装备学院 A kind of software distribution security guard method
CN107632932A (en) * 2017-09-11 2018-01-26 天津麒麟信息技术有限公司 A kind of software storage reliability checking method of multistage verification
CN108418833A (en) * 2018-03-23 2018-08-17 中科创达软件股份有限公司 A kind of management method of software, cloud server and terminal
CN108418833B (en) * 2018-03-23 2022-01-07 中科创达软件股份有限公司 Software management method, cloud server and terminal
CN113268716A (en) * 2020-02-17 2021-08-17 杭州海康威视数字技术股份有限公司 Authorization verification system, method and device for application and storage medium
CN112751825A (en) * 2020-12-07 2021-05-04 湖南麒麟信安科技股份有限公司 Software source issuing authority control method and system based on SSL certificate
CN112579989A (en) * 2020-12-23 2021-03-30 杭州安司源科技有限公司 Anti-piracy method for network service software
CN112579989B (en) * 2020-12-23 2022-06-24 杭州安司源科技有限公司 Anti-piracy method for network service software

Also Published As

Publication number Publication date
CN102271130B (en) 2014-09-10

Similar Documents

Publication Publication Date Title
CN102271130B (en) Method for safely delivering and distributing software
CN106327184B (en) A kind of mobile intelligent terminal payment system and method based on secure hardware isolation
CN103905207B (en) Method and system for unifying APK signature
CN108513704B (en) Remote distribution method and system of terminal master key
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
CN111698225B (en) Application service authentication encryption method suitable for power dispatching control system
CN107743067B (en) Method, system, terminal and storage medium for issuing digital certificate
CN104580250A (en) System and method for authenticating credible identities on basis of safety chips
CN109257328B (en) Safe interaction method and device for field operation and maintenance data
CN101464932B (en) Cooperation method and system for hardware security units, and its application apparatus
CN103679062A (en) Intelligent electric meter main control chip and security encryption method
CN106027503A (en) Cloud storage data encryption method based on TPM
CN102024107A (en) Application software control platform, developer terminal as well as application software distribution system and method
CN110855426B (en) Method for software use authorization
EP1999680A2 (en) Method and system for obtaining assurance that a content control key is securely stored in a remote security module for further secure communications between a content provider and said security module.
CN114697040B (en) Electronic signature method and system based on symmetric key
CN107104795B (en) Method, framework and system for injecting RSA key pair and certificate
CN109478214A (en) Device and method for certificate registration
CN114692218A (en) Electronic signature method, equipment and system for individual user
CN105847000A (en) Token generation method and communication system based on same
CN110417808A (en) Tamper resistant method, device, system and terminal
CN101227276B (en) Method and system for public key safety transfer of digital mobile certificate
CN114765534A (en) Private key distribution system based on national password identification cryptographic algorithm
CN102377758B (en) A kind of authentication method and system of personal network equipment being carried out to certification
CN100465979C (en) CPK based digital copyright authentication protection system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140910