CN110071940A - Software package encipher-decipher method, server, user equipment and storage medium - Google Patents

Software package encipher-decipher method, server, user equipment and storage medium Download PDF

Info

Publication number
CN110071940A
CN110071940A CN201910372114.1A CN201910372114A CN110071940A CN 110071940 A CN110071940 A CN 110071940A CN 201910372114 A CN201910372114 A CN 201910372114A CN 110071940 A CN110071940 A CN 110071940A
Authority
CN
China
Prior art keywords
key
encryption
software package
software
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910372114.1A
Other languages
Chinese (zh)
Inventor
尹欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Onething Technology Co Ltd
Original Assignee
Shenzhen Onething Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Onething Technology Co Ltd filed Critical Shenzhen Onething Technology Co Ltd
Priority to CN201910372114.1A priority Critical patent/CN110071940A/en
Publication of CN110071940A publication Critical patent/CN110071940A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/603Digital right managament [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of software package encipher-decipher methods, which comprises the server obtains asymmetric key pair, wherein the asymmetric key pair includes public key and private key;The server encrypts the private key using encryption chip, obtains encryption key, and the encryption key is sent to the user equipment;The server is encrypted using the public key to sent software package, obtains encryption software packet, and the encryption software packet is sent to the user equipment;The user equipment is decrypted the encryption key using the encryption chip, obtains the private key;The user equipment is decrypted the encryption software packet using the private key, obtains the software package.The invention also discloses a kind of server, user equipment and storage medium, the present invention can guarantee the safety and integrality of software package.

Description

Software package encipher-decipher method, server, user equipment and storage medium
Technical field
The present invention relates to field of communication technology more particularly to a kind of software package encipher-decipher method, server, user equipment and Storage medium.
Background technique
Currently, mobile terminal has become the indispensable life of most people with the rapid development in mobile terminal market Tool living.User can be in application market downloading software packet, and on mobile terminals by software installation, and user passes through installation Software can obtain various services.
However, finding in practice, hacker can crack mobile terminal by various means, so that mobile terminal is in not Safe condition, the safety of the software package of user installation and integrality are by very big threat.
Therefore, mobile terminal is when installing software package, how to guarantee the safety of software package and integrality be one urgently Technical problem to be solved.
Summary of the invention
The main purpose of the present invention is to provide a kind of software package encipher-decipher method, server, user equipment and storages to be situated between Matter can guarantee the safety and integrality of software package.
To achieve the above object, the present invention provides a kind of software package encipher-decipher method, is applied to encrypting and deciphering system, described to add Decryption system includes server and user equipment, which comprises
The server obtains asymmetric key pair, wherein the asymmetric key pair includes public key and private key;The clothes Business device encrypts the private key using encryption chip, obtains encryption key, and the encryption key is sent to the use Family equipment;The server is encrypted using the public key to sent software package, obtains encryption software packet, and will be described Encryption software packet is sent to the user equipment;
The user equipment is decrypted the encryption key using the encryption chip, obtains the private key;It is described User equipment is decrypted the encryption software packet using the private key, obtains the software package.
To achieve the above object, the present invention provides a kind of software package encipher-decipher method, is applied to server, the method packet It includes:
Obtain the first asymmetric key pair, wherein first asymmetric key pair includes the first public key and the first private key;
First private key is encrypted using the first encryption chip, obtains the first encryption key;
It is encrypted using first public key to sent software package, obtains the first encryption software packet;
First encryption key and the first encryption software packet are sent to user equipment.
Optionally, the method also includes:
Receive the key updating request that the user equipment is sent;
The key updating request is responded, obtains the second asymmetric key pair, wherein the second asymmetric key pair packet Include the second public key and the second private key;
Second private key is encrypted using first encryption chip, obtains the second encryption key;
The software package is encrypted using second public key, obtains the second encryption software packet;
Second encryption key and the second encryption software packet are sent to the user equipment.
Optionally, key used by different software packages is different, and the second encryption is provided on the user equipment Chip, the key built in first encryption chip need matching used with the key composition built in second encryption chip Multiple groups key.
To achieve the above object, the present invention provides a kind of software package encipher-decipher method, is applied to user equipment, the method Include:
Receive the first encryption key and the first encryption software packet that server is sent;
First encryption key is decrypted using the second encryption chip, obtains the first private key;
The first encryption software packet is decrypted using first private key, obtains software package.
Optionally, first private key carries time identifier, the method also includes:
If current time is more than the effective time of time identifier instruction, Xiang Suoshu server sends key updating and asks It asks;
Receive the second encryption key and the second encryption software that the server responds the key updating request and sends Packet;
Second encryption key is decrypted using second encryption chip, obtains the second private key;
The second encryption software packet is decrypted using second private key, obtains the software package.
Optionally, key used by different software packages is different, and the first encryption core is provided on the server Piece, it is matching used more that the key built in key and second encryption chip built in first encryption chip constitutes needs Group key.
To achieve the above object, the present invention further provides a kind of server, the server includes memory and processing Device, being stored on the memory can be by the software package encryption and decryption program that the processor executes, the software package encryption and decryption journey The software package encipher-decipher method is realized when sequence is executed by the processor.
To achieve the above object, the present invention further provides a kind of user equipment, the user equipment include memory and Processor is stored with and can add solution by the software package encryption and decryption program that the processor executes, the software package on the memory The software package encipher-decipher method is realized when close program is executed by the processor.
To achieve the above object, the present invention further provides a kind of computer readable storage mediums, described computer-readable Software package encryption and decryption program is stored on storage medium, the software package encryption and decryption program can be held by one or more processor Row, to realize the software package encipher-decipher method.
To achieve the above object, the present invention further provides a kind of computer program products, including computer instruction, when it When running on computers, computer is allowed to execute the software package encipher-decipher method.
The present invention realized the utility model has the advantages that
In the present invention, the server can first obtain asymmetric key pair, wherein the asymmetric key pair includes public affairs Key and private key encrypt the private key using encryption chip, obtain encryption key, and the encryption key is sent to institute User equipment is stated, further, is encrypted using the public key to sent software package, obtains encryption software packet, and will The encryption software packet is sent to the user equipment;The user equipment receives the encryption key and the encryption is soft After part packet, the encryption chip can be used, the encryption key is decrypted, obtain described in the private key and use The encryption software packet is decrypted in private key, obtains the software package.As it can be seen that in entire encryption process, server can be with Combining encryption chip and asymmetric key pair are encrypted, meanwhile, user equipment is also required to combining encryption chip and non-right Claim key pair to be decrypted, is just able to achieve the encryption process of software package, this hardware enciphering and deciphering is combined with software encryption and decryption Mode, it can be ensured that the safety and integrality of software package, meanwhile, also make encrypting and deciphering system more safety flexibly it is controllable.
Detailed description of the invention
Fig. 1 is a kind of system architecture diagram of encrypting and deciphering system disclosed in one embodiment of the invention;
Fig. 2 is a kind of flow diagram of software package encipher-decipher method disclosed in one embodiment of the invention;
Fig. 3 is the flow diagram of another kind software package encipher-decipher method disclosed in one embodiment of the invention;
Fig. 4 is the flow diagram of another kind software package encipher-decipher method disclosed in one embodiment of the invention;
Fig. 5 is a kind of schematic diagram of internal structure of server disclosed in one embodiment of the invention;
Fig. 6 is a kind of schematic diagram of internal structure of user equipment disclosed in one embodiment of the invention;
Fig. 7 is a kind of the functional block diagram of software package ciphering and deciphering device disclosed in one embodiment of the invention;
Fig. 8 is the functional block diagram of another kind software package ciphering and deciphering device disclosed in one embodiment of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be in addition to illustrating herein Or the sequence other than the content of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process, method, system, product or equipment of a series of steps or units need not limit In step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, produce The other step or units of product or equipment inherently.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as its relative importance of indication or suggestion or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection scope within.
Referring to Fig.1, Fig. 1 is a kind of system architecture diagram of encrypting and deciphering system disclosed in one embodiment of the invention.Such as Fig. 1 institute Show, the encrypting and deciphering system includes server and user equipment, and the server and the user equipment can be mutual by network It communicates, the network can include but is not limited to local area network, Metropolitan Area Network (MAN) and wide area network.
Wherein, the server, which can refer to, to provide the computer of service to equipment (such as user equipment) other in network System.If personal computer can externally provide File Transfer Protocol (File Transfer Protocol, abbreviation FTP) Service, can also be server.From narrow scope, server refers exclusively to certain high-performance computers, can be by network, externally There is provided service, for common PC, stability, safety, performance etc. require it is higher, therefore The hardware such as CPU, chipset, memory, disk system, network and common PC are different.The server be used for User equipment provides service (such as data transport service).The server can include but is not limited to PC (Personal Computer, PC), smart phone, tablet computer, palm PC, portable computer, intelligent router, mine machine, network Equipment etc..
Wherein, user equipment be it is a kind of can according to the instruction for being previously set or store, automatic progress numerical value calculating and/or The equipment of information processing, hardware include but is not limited to microprocessor, specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), number Word processing device (Digital Signal Processor, DSP), embedded device etc..The user equipment includes but is not limited to Any one can carry out the electronics of human-computer interaction with user by modes such as keyboard, mouse, remote controler, touch tablet or voice-operated devices Product, for example, personal computer, tablet computer, smart phone, personal digital assistant (Personal Digital Assistant, PDA), it is Interactive Internet TV (Internet Protocol Television, IPTV), intellectual wearable Equipment etc..
In the encrypting and deciphering system described in Fig. 1, the server can first obtain asymmetric key pair, wherein described Asymmetric key pair includes public key and private key, is encrypted using encryption chip to the private key, obtains encryption key, and by institute It states encryption key and is sent to the user equipment, further, encrypted, obtained to sent software package using the public key Encryption software packet is obtained, and the encryption software packet is sent to the user equipment;The user equipment receives the encryption After private key and the encryption software packet, the encryption chip can be used, the encryption key is decrypted, obtains institute Private key is stated, and the encryption software packet is decrypted using the private key, obtains the software package.As it can be seen that entire plus solution During close, server can be encrypted with combining encryption chip and asymmetric key pair, meanwhile, user equipment is also required to tie It closes encryption chip and asymmetric key pair is decrypted, be just able to achieve the encryption process of software package, this hardware enciphering and deciphering With the mode that software encryption and decryption combines, it can be ensured that the safety and integrality of software package, meanwhile, also make encrypting and deciphering system More safety is flexibly controllable.
It is a kind of flow diagram of software package encipher-decipher method disclosed in one embodiment of the invention referring to Fig. 2, Fig. 2.Its In, software package encipher-decipher method shown in Fig. 2 is applied in encrypting and deciphering system.As shown in Fig. 2, this method comprises:
S201, the server are obtained asymmetric key pair, are encrypted, added to the private key using encryption chip Close private key, and the encryption key is sent to the user equipment;Added using the public key to sent software package It is close, encryption software packet is obtained, and the encryption software packet is sent to the user equipment.
Wherein, server can first pass through in advance rivest, shamir, adelman (such as RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC) multiple asymmetric key pairs are generated at random, the asymmetric key pair includes public key (public key) and private key (private key).Public key and private key are a pair, if encrypted with public key to data, only with corresponding private key ability Decryption.
The multiple asymmetric key pair can be stored in database or cloud by server.When needing using non-right When claiming key pair, server can be obtained from database or cloud.
Wherein, encryption chip can also be set on the server in advance, fixed key built in the encryption chip and added Close algorithm, for being encrypted to the private key of unsymmetrical key centering.Optionally, which also can provide multiple groups code key, It is equivalent to and is grouped, can also reduce and whole crack risk.
Wherein, encryption chip is that all kinds of symmetric and unsymmetric algorithms are integrated with to inside, itself has high security level, The key and information data that can guarantee storage inside will not be by the illegal general designations read with a kind of safety chip distorted.
In the embodiment of the present invention, server encrypts the private key using encryption chip, obtains encryption key, and It is encrypted using public key to sent software package, obtains encryption software packet, and then by encryption key and encryption software packet It is sent to user equipment together, this hardware encryption combines the mode of software cryptography, so that the difficulty of attack greatly improves, thus It can ensure the safety of software package.
S202, the user equipment are decrypted the encryption key using the encryption chip, obtain the private key; The user equipment is decrypted the encryption software packet using the private key, obtains the software package.
Wherein it is possible to encryption chip is arranged on a user device in advance, fixed key built in the encryption chip and add Close algorithm, for the encryption key received to be decrypted.Wherein, the key and user built in the encryption chip on server The key built in encryption chip in equipment can be the same or different, i.e., the key built in the encryption chip on server with The key built in encryption chip on user equipment can be symmetric key pair, or asymmetric key pair, the present invention are real Apply example without limitation.
Optionally, for different software packages, it can choose different key pairs to be encrypted or be decrypted, for example, needle To software package A, using asymmetric key pair 1, for software package B, using asymmetric key pair 2.In addition, server and user set Multiple groups key can be set in standby upper encryption chip, and every group key needs carry out mating make on server and user equipment With realizing the encryption process of private key jointly.
In the method flow described in Fig. 2, the server can first obtain asymmetric key pair, wherein described non- Symmetric key encrypts the private key using encryption chip to including public key and private key, obtains encryption key, and will be described Encryption key is sent to the user equipment, further, is encrypted using the public key to sent software package, obtains Encryption software packet, and the encryption software packet is sent to the user equipment;It is private that the user equipment receives the encryption After key and the encryption software packet, the encryption chip can be used, the encryption key is decrypted, described in acquisition Private key, and the encryption software packet is decrypted using the private key, obtain the software package.As it can be seen that entire encryption and decryption In the process, server can be encrypted with combining encryption chip and asymmetric key pair, meanwhile, user equipment is also required to combine Encryption chip and asymmetric key pair are decrypted, and are just able to achieve the encryption process of software package, this hardware enciphering and deciphering with The mode that software encryption and decryption combines, it can be ensured that the safety and integrality of software package, meanwhile, also make encrypting and deciphering system more Add safety flexibly controllable.
It is the flow diagram of another kind software package encipher-decipher method disclosed in one embodiment of the invention referring to Fig. 3, Fig. 3. As shown in figure 3, this method comprises:
S301, server obtain the first asymmetric key pair.
Wherein, first asymmetric key pair includes the first public key and the first private key.
Wherein, server can first pass through in advance rivest, shamir, adelman (such as RSA, Elgamal, knapsack algorithm, Rabin, D-H, ECC) multiple asymmetric key pairs are generated at random, the asymmetric key pair includes public key (public key) and private key (private key).Public key and private key are a pair, if encrypted with public key to data, only with corresponding private key ability Decryption.
The multiple asymmetric key pair can be stored in database or cloud by server.When needing using non-right When claiming key pair, server can be obtained from database or cloud.
S302, server encrypt first private key using the first encryption chip, obtain the first encryption key.
Wherein, the first encryption chip can also be set on the server in advance, and that fixes built in first encryption chip is close Key and Encryption Algorithm, for being encrypted to the private key of unsymmetrical key centering.Optionally, which can also mention It for multiple groups code key, is equivalent to and is grouped, can also reduce and whole crack risk.
Wherein, encryption chip is that all kinds of symmetric and unsymmetric algorithms are integrated with to inside, itself has high security level, The key and information data that can guarantee storage inside will not be by the illegal general designations read with a kind of safety chip distorted.
S303, server are encrypted using first public key to sent software package, and the first encryption software is obtained Packet.
Wherein, software package is the installation kit that various files integrate required for installing software.Server uses described the One public key is encrypted to sent software package, obtains the first encryption software packet, i.e., using the mode of software cryptography to software Packet is authenticated and is encrypted, to prevent hacker from attacking the software package.
First encryption key and the first encryption software packet are sent to user equipment by S304, server.
Wherein, key used by different software packages is different, and the second encryption core is provided on the user equipment Piece, it is matching used more that the key built in key and second encryption chip built in first encryption chip constitutes needs Group key.Specifically, the key built in first encryption chip may be constructed with the key built in second encryption chip Symmetric key pair, alternatively, the key built in first encryption chip can be with structure with the key built in second encryption chip At asymmetric key pair.
As an alternative embodiment, the method also includes:
Receive the key updating request that the user equipment is sent;
The key updating request is responded, obtains the second asymmetric key pair, wherein the second asymmetric key pair packet Include the second public key and the second private key;
Second private key is encrypted using first encryption chip, obtains the second encryption key;
The software package is encrypted using second public key, obtains the second encryption software packet;
Second encryption key and the second encryption software packet are sent to the user equipment.
In the optional embodiment, the private key for the unsymmetrical key centering that server generates has validity period, passes through The validity period of private key is set, asymmetric key pair is constantly updated, the difficulty that hacker intercepts private key can be increased, so as to more The safety of good guarantee software package.
If the time for the private key that user equipment receives has been more than the validity period of the private key, which is at failure State, namely be not available the private key and be decrypted.In this case, user equipment can send key updating to server Request;After key updating request is for requesting more new key, server to receive key updating request, institute can be responded Key updating request is stated, obtains the second asymmetric key pair, wherein the first asymmetric key pair and the second asymmetric key pair are not Together, second asymmetric key pair includes the second public key and the second private key;First encryption chip can be used in server Second private key is encrypted, the second encryption key is obtained;The software package is encrypted using second public key, The second encryption software packet is obtained, and second encryption key and the second encryption software packet are sent to the user and set It is standby.In this way, the second encryption key and the second encryption software packet that user equipment receives are exactly use after re-encrypted Family equipment is in effective status by the second private key that acquisition is decrypted to the second encryption key in encryption chip, not by hacker It cracks.
In the method flow described in Fig. 3, server can be realized with combining encryption chip and asymmetric key pair Encryption to private key and software package, this hardware encrypt the mode combined with software cryptography, it can be ensured that the peace of software package Full property and integrality.
It is the flow diagram of another kind software package encipher-decipher method disclosed in one embodiment of the invention referring to Fig. 4, Fig. 4. Wherein, software package encipher-decipher method described in Fig. 4 is applied in user equipment, as shown in figure 4, this method comprises:
S401, user equipment receive the first encryption key and the first encryption software packet that server is sent.
Wherein, first encryption key is server by the first encryption chip to obtaining after private key encryption, described First encryption software packet is to obtain after server encrypts software package by public key.
S402, user equipment are decrypted first encryption key using the second encryption chip, obtain the first private key.
Wherein, it is provided with the first encryption chip on the server, the second encryption chip is provided on the user equipment, The key built in key and second encryption chip built in first encryption chip, which is constituted, needs matching used multiple groups Key.Specifically, key built in first encryption chip and the key built in second encryption chip may be constructed pair Claim key pair, alternatively, the key built in first encryption chip may be constructed with the key built in second encryption chip Asymmetric key pair.
S403, user equipment are decrypted the first encryption software packet using first private key, obtain software package.
Wherein, key used by different software packages is different, this can increase the difficulty of hacker attack software package, Improve the safety of software package.User equipment can install the software package after obtaining software package on a user device.
As an alternative embodiment, first private key carries time identifier, the method also includes:
If current time is more than the effective time of time identifier instruction, Xiang Suoshu server sends key updating and asks It asks;
Receive the second encryption key and the second encryption software that the server responds the key updating request and sends Packet;
Second encryption key is decrypted using second encryption chip, obtains the second private key;
The second encryption software packet is decrypted using second private key, obtains the software package.
In the optional embodiment, the private key for the unsymmetrical key centering that server generates has validity period, passes through The validity period of private key is set, asymmetric key pair is constantly updated, the difficulty that hacker intercepts private key can be increased, so as to more The safety of good guarantee software package.
First private key that server is sent to user equipment carries time identifier, if current time is more than described Between identify effective time of instruction, show that first private key is currently at failure state namely user equipment is not available this First private key is decrypted.In this case, user equipment can send key updating request to server;The key updating After request is for requesting more new key, server to receive key updating request, the key updating request can be responded, The second encryption key is sent to user equipment and the second encryption software packet, second encryption key and the second encryption software packet are What server was obtained after being encrypted using new asymmetric key pair, user equipment receive second encryption key and After second encryption software packet, that is, second encryption chip can be used that second encryption key is decrypted, obtains the Two private keys, wherein second private key is in effective status, and second private key can be used to second encryption in user equipment Software package is decrypted, and obtains the software package.Accordingly even when hacker intercepts the first private key, software package can not be also captured, from And substantially increase the safety of software package.
In the method flow described in Fig. 4, user equipment can be come real with combining encryption chip and asymmetric key pair The mode that now decryption of encryption key and encryption software packet, this hardware decryption are combined with software decryption, it can be ensured that The safety and integrality of software package.
Referring to Fig. 5, Fig. 5 is a kind of schematic diagram of internal structure of server disclosed in one embodiment of the invention, such as Fig. 5 institute Show, the server 1 may include memory 11, processor 12 and bus 13.
In the present embodiment, the server 1 can be PC (Personal Computer, PC), be also possible to Smart phone, tablet computer, palm PC, portable computer.
Wherein, memory 11 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory, Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Memory 11 It can be the internal storage unit of server 1, such as the hard disk of the server 1 in some embodiments.Memory 11 is another It is also possible to the External memory equipment of server 1 in a little embodiments, such as the plug-in type hard disk being equipped on server 1, intelligently deposits Card storage (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) Deng.Further, memory 11 can also both including server 1 internal storage unit and also including External memory equipment.Storage Device 11 can be not only used for storage and be installed on the application software and Various types of data of server 1, such as software package encryption and decryption program Code etc. can be also used for temporarily storing the data that has exported or will export.
Processor 12 can be in some embodiments a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, the program for being stored in run memory 11 Code or processing data, such as software package executable encryption and decryption program etc..
The bus 13 can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA) Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, in Fig. 5 only with one slightly Line indicates, it is not intended that an only bus or a type of bus.Further, server can also connect including network Mouthful, network interface optionally may include wireline interface and/or wireless interface (such as WI-FI interface, blue tooth interface), usually use It is communicated to connect in being established between the server 1 and other servers.
Optionally, which can also include user interface, and user interface may include display (Display), defeated Enter unit such as keyboard (Keyboard), optional user interface can also include standard wireline interface and wireless interface.It is optional Ground, in some embodiments, display can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display and OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..Wherein, display can also be appropriate Referred to as display screen or display unit, for showing the information handled in the server 1 and for showing visual user circle Face.
Fig. 5 illustrates only the server 1 with component 11 to 13 and software package encryption and decryption program, those skilled in the art It is understood that the structure shown in Fig. 5 does not constitute the restriction to server 1, it may include less or more than illustrating Component, perhaps combine certain components or different component layouts.
In conjunction with Fig. 2 or Fig. 3, the memory 11 in the server 1 stores multiple instruction to realize a kind of software package The multiple instruction can be performed to realize in encipher-decipher method, the processor 12:
Obtain the first asymmetric key pair, wherein first asymmetric key pair includes the first public key and the first private key;
First private key is encrypted using the first encryption chip, obtains the first encryption key;
It is encrypted using first public key to sent software package, obtains the first encryption software packet;
First encryption key and the first encryption software packet are sent to user equipment.
In a kind of optional embodiment, the multiple instruction is can be performed to realize in the processor 12:
Receive the key updating request that the user equipment is sent;
The key updating request is responded, obtains the second asymmetric key pair, wherein the second asymmetric key pair packet Include the second public key and the second private key;
Second private key is encrypted using first encryption chip, obtains the second encryption key;
The software package is encrypted using second public key, obtains the second encryption software packet;
Second encryption key and the second encryption software packet are sent to the user equipment.
Wherein, key used by different software packages is different, and the second encryption core is provided on the user equipment Piece, it is matching used more that the key built in key and second encryption chip built in first encryption chip constitutes needs Group key.
Specifically, the processor 12 can refer in Fig. 2 or Fig. 3 corresponding embodiment the concrete methods of realizing of above-metioned instruction The description of correlation step, this will not be repeated here.
In the server described in Fig. 5, server can be realized pair with combining encryption chip and asymmetric key pair The encryption of private key and software package, this hardware encrypt the mode combined with software cryptography, it can be ensured that the safety of software package Property and integrality.
Referring to Fig. 6, Fig. 6 is a kind of schematic diagram of internal structure of user equipment disclosed in one embodiment of the invention, such as Fig. 6 institute Show, the user equipment 2 may include memory 21, processor 22 and bus 23.
In the present embodiment, the user equipment 2 can be personal computer, tablet computer, smart phone, individual digital Assistant (Personal Digital Assistant, PDA), Interactive Internet TV (Internet Protocol Television, IPTV), intellectual wearable device etc..
Wherein, memory 21 include at least a type of readable storage medium storing program for executing, the readable storage medium storing program for executing include flash memory, Hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), magnetic storage, disk, CD etc..Memory 21 It can be the internal storage unit of user equipment 2, such as the hard disk of the user equipment 2 in some embodiments.Memory 21 exists It is hard to be also possible to the plug-in type being equipped on the External memory equipment of user equipment 2, such as user equipment 2 in other embodiments Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, memory 21 can also both including user equipment 2 internal storage unit and also including outside Store equipment.Memory 21 can be not only used for the application software and Various types of data that storage is installed on user equipment 2, such as software The code etc. of packet encryption and decryption program can be also used for temporarily storing the data that has exported or will export.
Processor 22 can be in some embodiments a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips, the program for being stored in run memory 21 Code or processing data, such as software package executable encryption and decryption program etc..
The bus 23 can be Peripheral Component Interconnect standard (peripheral component interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard architecture, abbreviation EISA) Bus etc..The bus can be divided into address bus, data/address bus, control bus etc..For convenient for indicating, in Fig. 6 only with one slightly Line indicates, it is not intended that an only bus or a type of bus.Further, server can also connect including network Mouthful, network interface optionally may include wireline interface and/or wireless interface (such as WI-FI interface, blue tooth interface), usually use It is communicated to connect in being established between the user equipment 2 and other servers.
Optionally, the user equipment 2 can also include user interface, user interface may include display (Display), Input unit such as keyboard (Keyboard), optional user interface can also include standard wireline interface and wireless interface.It can Selection of land, in some embodiments, display can be light-emitting diode display, liquid crystal display, touch-control liquid crystal display and OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) touches device etc..Wherein, display can also be appropriate Referred to as display screen or display unit, for being shown in the information handled in user equipment 2 and for showing visual user Interface.
Fig. 6 illustrates only the user equipment 2 with component 21 to 23 and software package encryption and decryption program, those skilled in the art Member it is understood that the structure shown in Fig. 6 does not constitute the restriction to user equipment 2, may include than illustrate it is less or More components perhaps combine certain components or different component layouts.
In conjunction with Fig. 2 or Fig. 4, the memory 21 in the user equipment 2 stores multiple instruction to realize a kind of software The multiple instruction can be performed to realize in packet encipher-decipher method, the processor 22:
Receive the first encryption key and the first encryption software packet that server is sent;
First encryption key is decrypted using the second encryption chip, obtains the first private key;
The first encryption software packet is decrypted using first private key, obtains software package.
In a kind of optional embodiment, first private key carries time identifier, and the processor 22 is executable The multiple instruction is to realize:
If current time is more than the effective time of time identifier instruction, Xiang Suoshu server sends key updating and asks It asks;
Receive the second encryption key and the second encryption software that the server responds the key updating request and sends Packet;
Second encryption key is decrypted using second encryption chip, obtains the second private key;
The second encryption software packet is decrypted using second private key, obtains the software package.
Wherein, key used by different software packages is different, and the first encryption chip is provided on the server, The key built in key and second encryption chip built in first encryption chip, which is constituted, needs matching used multiple groups Key.
Specifically, the processor 22 can refer in Fig. 2 or Fig. 4 corresponding embodiment the concrete methods of realizing of above-metioned instruction The description of correlation step, this will not be repeated here.
In the user equipment described in Fig. 6, user equipment can be come real with combining encryption chip and asymmetric key pair The mode that now decryption of encryption key and encryption software packet, this hardware decryption are combined with software decryption, it can be ensured that The safety and integrality of software package.
Referring to Fig. 7, Fig. 7 is a kind of functional module signal of software package ciphering and deciphering device disclosed in one embodiment of the invention Figure.
In some embodiments, the software package ciphering and deciphering device is run in server.The software package encryption and decryption dress Setting may include multiple functional modules as composed by program code segments.Each program segment in the software package ciphering and deciphering device Program code can store in memory, and as performed by least one processor, to execute described in Fig. 2 or Fig. 3 Step some or all of in software package encipher-decipher method, specifically correlation step is retouched referring to figure 2. or in Fig. 3 corresponding embodiment It states, this will not be repeated here.
In the present embodiment, function of the software package ciphering and deciphering device according to performed by it can be divided into multiple function It can module.The functional module may include: to obtain module 701, encrypting module 702 and sending module 703.Alleged by the present invention Module refer to and a kind of performed by least one processor and can complete the series of computation machine journey of fixed function Sequence section, storage is in memory.In some embodiments, it will be described in detail in subsequent embodiment about the function of each module.
As shown in fig. 7, the software package ciphering and deciphering device includes:
Module 701 is obtained, for obtaining the first asymmetric key pair, wherein first asymmetric key pair includes the One public key and the first private key;
It is private to obtain the first encryption for encrypting using the first encryption chip to first private key for encrypting module 702 Key;
The encrypting module 702 is also used for first public key and is encrypted to sent software package, obtains the One encryption software packet;
Sending module 703, for first encryption key and the first encryption software packet to be sent to user and set It is standby.
Optionally, the software package ciphering and deciphering device further includes
Receiving module, the key updating request sent for receiving the user equipment;
The acquisition module 701 is also used to respond the key updating request, obtains the second asymmetric key pair, wherein Second asymmetric key pair includes the second public key and the second private key;
The encrypting module 702 is also used for first encryption chip and encrypts to second private key, obtains Second encryption key;
The encrypting module 702 is also used for second public key and encrypts to the software package, obtains second and adds Close software package;
The sending module 703 is also used to for second encryption key and the second encryption software packet being sent to The user equipment.
Wherein, key used by different software packages is different, and the second encryption core is provided on the user equipment Piece, it is matching used more that the key built in key and second encryption chip built in first encryption chip constitutes needs Group key.
In the server described in Fig. 7, server can be realized pair with combining encryption chip and asymmetric key pair The encryption of private key and software package, this hardware encrypt the mode combined with software cryptography, it can be ensured that the safety of software package Property and integrality.
Referring to the functional module signal that Fig. 8, Fig. 8 are another kind software package ciphering and deciphering device disclosed in one embodiment of the invention Figure.
In some embodiments, the software package ciphering and deciphering device is run in user equipment.The software package encryption and decryption Device may include multiple functional modules as composed by program code segments.Each program in the software package ciphering and deciphering device The program code of section can store in memory, and as performed by least one processor, to execute described by Fig. 2 or Fig. 4 Software package encipher-decipher method in some or all of step, specific correlation step referring to figure 2. or in Fig. 4 corresponding embodiment Description, this will not be repeated here.
In the present embodiment, function of the software package ciphering and deciphering device according to performed by it can be divided into multiple function It can module.The functional module may include: receiving module 801 and deciphering module 802.The so-called module of the present invention refers to one Kind performed by least one processor and the series of computation machine program segment of fixed function can be completed, be stored in In memory.In some embodiments, it will be described in detail in subsequent embodiment about the function of each module.
As shown in figure 8, the software package ciphering and deciphering device includes:
Receiving module 801, for receiving the first encryption key and the first encryption software packet of server transmission;
It is private to obtain first for first encryption key to be decrypted using the second encryption chip for deciphering module 802 Key;
Deciphering module 802 obtains software for the first encryption software packet to be decrypted using first private key Packet.
Optionally, first private key carries time identifier, the software package ciphering and deciphering device further include:
Sending module, if being more than the effective time that the time identifier indicates, Xiang Suoshu server hair for current time Key updating is sent to request;
The receiving module 801, be also used to receive the server respond key updating request and send second Encryption key and the second encryption software packet;
The deciphering module 802 is also used for second encryption chip and second encryption key is decrypted, Obtain the second private key;
The deciphering module 802 is also used for second private key and the second encryption software packet is decrypted, obtains Obtain the software package.
Wherein, key used by different software packages is different, and the first encryption chip is provided on the server, The key built in key and second encryption chip built in first encryption chip, which is constituted, needs matching used multiple groups Key.
In the user equipment described in Fig. 8, user equipment can be come real with combining encryption chip and asymmetric key pair The mode that now decryption of encryption key and encryption software packet, this hardware decryption are combined with software decryption, it can be ensured that The safety and integrality of software package.
The above-mentioned integrated unit realized in the form of software function module, can store in a computer-readable storage In medium.Wherein, which can store computer program, which is being executed by processor When, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the computer program includes computer program code, described Computer program code can be source code form, object identification code form, executable file or certain intermediate forms etc..The meter Calculation machine readable storage medium storing program for executing may include: can carry the computer program code any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read-Only Memory), arbitrary access Memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It needs Bright, the content that the computer readable storage medium includes can be according to making laws in jurisdiction and patent practice is wanted It asks and carries out increase and decrease appropriate, such as in certain jurisdictions, do not include according to legislation and patent practice, computer-readable medium Electric carrier signal and telecommunication signal.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.
The computer program product includes one or more computer instructions.Load and execute on computers the meter When calculation machine program instruction, entirely or partly generate according to process or function described in the embodiment of the present invention.The computer can To be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction can be deposited Storage in a computer-readable storage medium, or from a computer readable storage medium to another computer readable storage medium Transmission, for example, the computer instruction can pass through wired (example from a web-site, computer, server or data center Such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave) mode to another website Website, computer, server or data center are transmitted.The computer readable storage medium can be computer and can deposit Any usable medium of storage either includes that the data storages such as one or more usable mediums integrated server, data center are set It is standby.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or partly lead Body medium (such as solid state hard disk Solid State Disk (SSD)) etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
It should be noted that the serial number of the above embodiments of the invention is only for description, do not represent the advantages or disadvantages of the embodiments.And The terms "include", "comprise" herein or any other variant thereof is intended to cover non-exclusive inclusion, so that packet Process, device, article or the method for including a series of elements not only include those elements, but also including being not explicitly listed Other element, or further include for this process, device, article or the intrinsic element of method.Do not limiting more In the case where, the element that is limited by sentence "including a ...", it is not excluded that including process, device, the article of the element Or there is also other identical elements in method.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of software package encipher-decipher method is applied to encrypting and deciphering system, the encrypting and deciphering system includes that server and user set It is standby, which is characterized in that the described method includes:
The server obtains asymmetric key pair, wherein the asymmetric key pair includes public key and private key;The server The private key is encrypted using encryption chip, obtains encryption key, and the encryption key is sent to the user and is set It is standby;The server is encrypted using the public key to sent software package, obtains encryption software packet, and by the encryption Software package is sent to the user equipment;
The user equipment is decrypted the encryption key using the encryption chip, obtains the private key;The user Equipment is decrypted the encryption software packet using the private key, obtains the software package.
2. a kind of software package encipher-decipher method is applied to server, which is characterized in that the described method includes:
Obtain the first asymmetric key pair, wherein first asymmetric key pair includes the first public key and the first private key;
First private key is encrypted using the first encryption chip, obtains the first encryption key;
It is encrypted using first public key to sent software package, obtains the first encryption software packet;
First encryption key and the first encryption software packet are sent to user equipment.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
Receive the key updating request that the user equipment is sent;
Key updating request is responded, the second asymmetric key pair is obtained, wherein second asymmetric key pair includes the Two public keys and the second private key;
Second private key is encrypted using first encryption chip, obtains the second encryption key;
The software package is encrypted using second public key, obtains the second encryption software packet;
Second encryption key and the second encryption software packet are sent to the user equipment.
4. according to the method in claim 2 or 3, which is characterized in that key used by different software packages is different, The second encryption chip is provided on the user equipment, the key built in first encryption chip and second encryption chip Built-in key, which is constituted, needs matching used multiple groups key.
5. a kind of software package encipher-decipher method is applied to user equipment, which is characterized in that the described method includes:
Receive the first encryption key and the first encryption software packet that server is sent;
First encryption key is decrypted using the second encryption chip, obtains the first private key;
The first encryption software packet is decrypted using first private key, obtains software package.
6. according to the method described in claim 5, it is characterized in that, first private key carries time identifier, the method Further include:
If current time is more than the effective time of time identifier instruction, Xiang Suoshu server sends key updating request;
Receive the second encryption key and the second encryption software packet that the server responds the key updating request and sends;
Second encryption key is decrypted using second encryption chip, obtains the second private key;
The second encryption software packet is decrypted using second private key, obtains the software package.
7. method according to claim 5 or 6, which is characterized in that key used by different software packages is different, The first encryption chip is provided on the server, in the key built in first encryption chip and second encryption chip The key set, which is constituted, needs matching used multiple groups key.
8. a kind of server, which is characterized in that the server includes memory and processor, and being stored on the memory can The software package encryption and decryption program executed by the processor, the software package encryption and decryption program are realized when being executed by the processor Such as claim 1, the described in any item software package encipher-decipher methods of 2-4.
9. a kind of user equipment, which is characterized in that the user equipment includes memory and processor, is stored on the memory Having can be by the software package encryption and decryption program that the processor executes, when the software package encryption and decryption program is executed by the processor Realize such as claim 1, the described in any item software package encipher-decipher methods of 5-7.
10. a kind of computer readable storage medium, which is characterized in that be stored with software package on the computer readable storage medium Encryption and decryption program, the software package encryption and decryption program can be executed by one or more processor, with realize as claim 1, Software package encipher-decipher method described in any one of 2-4 or 5-7.
CN201910372114.1A 2019-05-06 2019-05-06 Software package encipher-decipher method, server, user equipment and storage medium Pending CN110071940A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910372114.1A CN110071940A (en) 2019-05-06 2019-05-06 Software package encipher-decipher method, server, user equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910372114.1A CN110071940A (en) 2019-05-06 2019-05-06 Software package encipher-decipher method, server, user equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110071940A true CN110071940A (en) 2019-07-30

Family

ID=67369957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910372114.1A Pending CN110071940A (en) 2019-05-06 2019-05-06 Software package encipher-decipher method, server, user equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110071940A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110768831A (en) * 2019-10-24 2020-02-07 黎剑猛 Method and system for acquiring monitoring plug-in
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN111382397A (en) * 2020-02-26 2020-07-07 浙江大华技术股份有限公司 Configuration method of upgrade software package, software upgrade method, equipment and storage device
RU2727025C1 (en) * 2019-09-17 2020-07-17 Федеральное государственное казенное военное образовательное учреждение высшего образования "Краснодарское высшее военное орденов Жукова и Октябрьской Революции Краснознаменное училище имени генерала армии С.М.Штеменко" Министерства обороны Российской Федерации Method for asymmetric message encryption based on modified backpack task
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112597517A (en) * 2020-12-25 2021-04-02 携程旅游网络技术(上海)有限公司 Encrypted communication method, system, device and medium for installing client
CN112929871A (en) * 2019-12-05 2021-06-08 上海艾拉比智能科技有限公司 OTA upgrade package acquisition method, electronic device and storage medium
CN113127814A (en) * 2019-12-31 2021-07-16 杭州海康威视数字技术股份有限公司 Software copy prevention method and device, electronic equipment and readable storage medium
CN113452654A (en) * 2020-03-25 2021-09-28 深圳法大大网络科技有限公司 Data decryption method
CN113840262A (en) * 2020-06-23 2021-12-24 京东方科技集团股份有限公司 Over-the-air updating method, updating server, terminal equipment and Internet of things system
CN114329510A (en) * 2021-11-16 2022-04-12 深圳市江波龙电子股份有限公司 Digital authorization method, device, terminal equipment and storage medium
CN115935388A (en) * 2022-12-05 2023-04-07 广州通则康威智能科技有限公司 Software package safety sending method, device, equipment and storage medium
WO2024120051A1 (en) * 2022-12-08 2024-06-13 亿咖通(湖北)技术有限公司 Permission control method for software program, and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170413A (en) * 2007-12-06 2008-04-30 华为技术有限公司 A digital certificate and private key acquisition, distribution method and device
CN106063183A (en) * 2014-03-27 2016-10-26 英特尔公司 Method and apparatus for cloud-assisted cryptography
CN108401494A (en) * 2018-02-27 2018-08-14 福建联迪商用设备有限公司 A kind of method and system of transmission data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170413A (en) * 2007-12-06 2008-04-30 华为技术有限公司 A digital certificate and private key acquisition, distribution method and device
CN106063183A (en) * 2014-03-27 2016-10-26 英特尔公司 Method and apparatus for cloud-assisted cryptography
CN108401494A (en) * 2018-02-27 2018-08-14 福建联迪商用设备有限公司 A kind of method and system of transmission data

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2727025C1 (en) * 2019-09-17 2020-07-17 Федеральное государственное казенное военное образовательное учреждение высшего образования "Краснодарское высшее военное орденов Жукова и Октябрьской Революции Краснознаменное училище имени генерала армии С.М.Штеменко" Министерства обороны Российской Федерации Method for asymmetric message encryption based on modified backpack task
CN110768831A (en) * 2019-10-24 2020-02-07 黎剑猛 Method and system for acquiring monitoring plug-in
CN112929871A (en) * 2019-12-05 2021-06-08 上海艾拉比智能科技有限公司 OTA upgrade package acquisition method, electronic device and storage medium
CN111107066A (en) * 2019-12-06 2020-05-05 中国联合网络通信集团有限公司 Sensitive data transmission method and system, electronic equipment and storage medium
CN113127814B (en) * 2019-12-31 2023-03-14 杭州海康威视数字技术股份有限公司 Software anti-copying method and device, electronic equipment and readable storage medium
CN113127814A (en) * 2019-12-31 2021-07-16 杭州海康威视数字技术股份有限公司 Software copy prevention method and device, electronic equipment and readable storage medium
CN111382397A (en) * 2020-02-26 2020-07-07 浙江大华技术股份有限公司 Configuration method of upgrade software package, software upgrade method, equipment and storage device
CN111382397B (en) * 2020-02-26 2023-03-24 浙江大华技术股份有限公司 Configuration method of upgrade software package, software upgrade method, equipment and storage device
CN113452654B (en) * 2020-03-25 2023-04-28 深圳法大大网络科技有限公司 Data decryption method
CN113452654A (en) * 2020-03-25 2021-09-28 深圳法大大网络科技有限公司 Data decryption method
CN113840262A (en) * 2020-06-23 2021-12-24 京东方科技集团股份有限公司 Over-the-air updating method, updating server, terminal equipment and Internet of things system
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112257093A (en) * 2020-11-09 2021-01-22 天冕信息技术(深圳)有限公司 Authentication method of data object, terminal and storage medium
CN112257093B (en) * 2020-11-09 2024-03-26 天冕信息技术(深圳)有限公司 Authentication method, terminal and storage medium for data object
CN112597517A (en) * 2020-12-25 2021-04-02 携程旅游网络技术(上海)有限公司 Encrypted communication method, system, device and medium for installing client
CN114329510A (en) * 2021-11-16 2022-04-12 深圳市江波龙电子股份有限公司 Digital authorization method, device, terminal equipment and storage medium
CN115935388B (en) * 2022-12-05 2023-06-23 广州通则康威智能科技有限公司 Software package safe sending method, device, equipment and storage medium
CN115935388A (en) * 2022-12-05 2023-04-07 广州通则康威智能科技有限公司 Software package safety sending method, device, equipment and storage medium
WO2024120051A1 (en) * 2022-12-08 2024-06-13 亿咖通(湖北)技术有限公司 Permission control method for software program, and device

Similar Documents

Publication Publication Date Title
CN110071940A (en) Software package encipher-decipher method, server, user equipment and storage medium
CN111143890B (en) Calculation processing method, device, equipment and medium based on block chain
CN111683071B (en) Private data processing method, device, equipment and storage medium of block chain
CN108632284B (en) User data authorization method, medium, device and computing equipment based on block chain
CN110892672B (en) Key authentication assertion generation providing device anonymity
CN111737366B (en) Private data processing method, device, equipment and storage medium of block chain
CN108900464A (en) Electronic device, data processing method and computer storage medium based on block chain
US20190190954A1 (en) Policy Deployment Method, Apparatus, System and Computing System of Trusted Server
CN109361704A (en) Cloud storage data encryption and transmission method, system, equipment and storage medium
EP3869366A1 (en) Method and apparatus for updating password of electronic device, device and storage medium
WO2015094245A1 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
CN109635581A (en) A kind of data processing method, equipment, system and storage medium
US20220224720A1 (en) Link detection method and apparatus, electronic device, and storage medium
CN116980230B (en) Information security protection method and device
CN111475832B (en) Data management method and related device
WO2023155696A1 (en) Database operation method and system, and storage medium and computer terminal
CN111291414A (en) Data storage method and device, computer device and storage medium
CN111586142A (en) Safe multi-party computing method and system
CN109510711A (en) A kind of network communication method, server, client and system
CN116781425A (en) Service data acquisition method, device, equipment and storage medium
CN110347557A (en) Node resource monitoring method, electronic equipment, medium and acquisition method
CN111343150B (en) Transaction data transmission method and system based on block chain and related components
US11934568B2 (en) Cable security
CN115599959A (en) Data sharing method, device, equipment and storage medium
CN111209544B (en) Web application security protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190730

RJ01 Rejection of invention patent application after publication