Nothing Special   »   [go: up one dir, main page]

CN109977632A - Prevent pirate method, mobile terminal and the computer readable storage medium applied - Google Patents

Prevent pirate method, mobile terminal and the computer readable storage medium applied Download PDF

Info

Publication number
CN109977632A
CN109977632A CN201910127385.0A CN201910127385A CN109977632A CN 109977632 A CN109977632 A CN 109977632A CN 201910127385 A CN201910127385 A CN 201910127385A CN 109977632 A CN109977632 A CN 109977632A
Authority
CN
China
Prior art keywords
public key
packet name
name
application program
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910127385.0A
Other languages
Chinese (zh)
Inventor
王雅依
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201910127385.0A priority Critical patent/CN109977632A/en
Publication of CN109977632A publication Critical patent/CN109977632A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Pirate method, mobile terminal and the computer readable storage medium applied is prevented the present invention provides a kind of, which comprises obtains the first application name and the first packet name of the application program that user is currently installed on;The corresponding second packet name of the first application name of the application program is obtained on Platform Server;The first packet name and the second packet name are subjected to matching verification;When the first packet name is matched with the second packet name, verification passes through.Technical solution provided by the invention, which passes through, carries out matching verification for the Bao Mingyu for the needing application program to be mounted included packet name obtained from Platform Server, if it is legal that matching explanation, which needs application program to be mounted, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.

Description

Prevent pirate method, mobile terminal and the computer readable storage medium applied
Technical field
The present embodiments relate to prevent the pirate field applied, and in particular to a kind of to prevent the pirate method applied, move Dynamic terminal and computer readable storage medium.
Background technique
With the development of internet, various information are propagated in a network.Application program also receives the extensive use of people, User can meet relevant information required for oneself by downloading all kinds of app (Application, application program).
But it is hot with mobile application, pirate application is also more and more, it is many be packaged parties be packaged it is well-known on the market App increases ad plug-in or malicious code, and then signature uploads again, endangers from the point of view of user and enterprise all very Greatly.
Therefore, pirate method, mobile terminal and the computer readable storage medium applied is prevented the present invention provides a kind of To solve the deficiencies in the prior art.
The description of the above-mentioned discovery procedure to problem, is only used to facilitate the understanding of the technical scheme, and does not represent and holds Recognizing above content is the prior art.
Summary of the invention
In order to solve the above-mentioned technical problem or it at least is partially solved above-mentioned technical problem, the embodiment of the invention provides It is a kind of to prevent pirate method, mobile terminal and the computer readable storage medium applied.
In a first aspect, the embodiment of the present invention provides a kind of method for preventing pirate application, which comprises
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
Further, further includes:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
Further, the first packet name and the second packet name are subjected to matching verification, further includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
Further, after the first packet name is matched with the second packet name, the method also includes:
Obtain the first public key information of the application program;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
It is further, described that first public key information and second public key information are subjected to matching verification, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
Further, the method also includes:
By the synchronizing information that the developer of blacklist is added to applying distribution platform;
The developer is forbidden to upload application program to applying distribution platform.
Second aspect, this application provides a kind of mobile terminal, the mobile terminal includes memory and processor;It is described Memory, which is stored with, prevents the pirate computer program applied, and the processor executes the computer program, above-mentioned to realize The pirate method applied is prevented described in any one.
The third aspect, this application provides a kind of computer readable storage mediums, which is characterized in that the storage medium is deposited Containing prevents the pirate computer program applied, and the computer program can be executed by least one processor, above-mentioned to realize The pirate method applied is prevented described in any one.
Above-mentioned technical proposal provided by the embodiments of the present application has the advantages that compared with prior art
What the embodiment of the present invention proposed prevents pirate method, apparatus, mobile terminal and the computer-readable storage medium applied Matter obtains the application name and packet name of user's application to be installed program first, then obtains and the application on Platform Server again The corresponding packet name of name, then the packet name in the packet name and Platform Server of application program to be mounted is matched, if matching Verification passes through.Technical solution provided by the invention passes through Bao Mingyu that application program to be mounted will be needed included from Platform Server The packet name of upper acquisition carries out matching verification, if matching explanation need application program to be mounted be it is legal, can be led to normal mounting The verification to application program is crossed, to prevent application program from being occurred by pirate situation.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the invention Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these Figure obtains other attached drawings.
The hardware configuration signal of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the communication system schematic diagram of mobile terminal in Fig. 1;
Fig. 3 is a kind of flow chart for preventing the pirate method applied provided in an embodiment of the present invention;
Fig. 4 is a kind of flow chart for preventing the pirate method applied provided by Embodiment 2 of the present invention;
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiments of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving Phone, smart phone, laptop, digit broadcasting receiver, PDA (PersonalDigital Assistant, a number Word assistant), PAD (Portable Android Device, tablet computer), PMP (Portable Media Player, it is portable Formula multimedia player), the mobile terminal of navigation device etc. and such as number TV, desktop computer etc. it is fixed eventually End.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for mobile purpose Element except, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication system Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module 112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB) Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast Receiving module 111 can receive signal broadcast by using various types of broadcast systems.Particularly, broadcasting reception module 111 It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video It broadcasts-holds (DVB-H), the Radio Data System of forward link media (MediaFLO), received terrestrial digital broadcasting integrated service (ISDB-T) etc. digit broadcasting system receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via the received broadcast singal of broadcasting reception module 111 and/ Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant Tooth TM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybee TM etc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, the calculating of location information module 115 is from three or more The range information and correct time information of more satellites and Information application triangulation for calculating, thus according to warp Degree, latitude and highly accurately calculate three-dimensional current location information.Currently, it is used for the method for calculating position and temporal information Three satellites and the error that calculated position and temporal information are corrected by using an other satellite.In addition, position Information module 115 can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121 Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110 It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can telephone calling model, Sound (audio data) is received via microphone 122 in logging mode, speech recognition mode etc. operational mode, and can be incited somebody to action Such acoustic processing is audio data.Audio that treated (voice) data can be converted in the case where telephone calling model For the format output that can be sent to mobile communication base station via mobile communication module 112.Various types can be implemented in microphone 122 Noise eliminate (or inhibit) algorithm with eliminate noise that (or inhibition) generates during sending and receiving audio signal or Person's interference.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, touch Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc. Deng.Particularly, when touch tablet is superimposed upon in the form of layer on display unit 151, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal 100 orientation, the acceleration or deceleration movement of mobile terminal 100 and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include proximity sensor 141.
Interface unit 170 is used as mobile terminal 100 and connect at least one external device (ED).For example, external device (ED) can wrap Include wired or wireless headphone port, external power supply (or battery charger) port, wired or wireless data port, storage Card port, port, the port audio input/output (I/O), video i/o port, ear for connecting the device with identification module Generator terminal mouth etc..Identification module can be storage for verifying user using the various information of mobile terminal 100 and can wrap Include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc..Know in addition, having The device (hereinafter referred to as " identification device ") of other module can take the form of smart card, and therefore, identification device can be via end Mouth or other attachment devices are connect with mobile terminal 100.Interface unit 170 can be used for receiving the input from external device (ED) (for example, data information, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 Or it can be used for transmitting data between mobile terminal and external device (ED).In addition, when mobile terminal 100 is connect with external base When, interface unit 170 may be used as allowing by its by electric power from pedestal provide to mobile terminal 100 path or can use Make the various command signals for allowing to input from pedestal and passes through its path for being transferred to mobile terminal.The various orders inputted from pedestal Signal or electric power may be used as whether mobile terminal for identification is accurately fitted within the signal on pedestal.
Output unit 150 is configured to provide output signal with vision, audio and/or tactile manner (for example, audio is believed Number, vision signal, alarm signal, vibration signal etc.).Output unit 150 may include display unit 151, audio output mould Block 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and touch tablet in the form of layer it is superposed on one another to form touch screen when, display unit 151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detecting touch Input pressure and touch input position and touch input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160 The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes. Audio output module 152 may include loudspeaker, buzzer etc..
Alarm unit 153 can provide output, and event is notified to mobile terminal 100.Typical event can To include calling reception, message sink, key signals input, touch input etc..Other than audio or video output, alarm list Member 153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be with the shape of vibration Formula provides output, when receiving calling, message or some other entrance communications (incoming communication), alarm Unit 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can also be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And memory 160 can store about the vibrations of various modes and audio signal exported when touching and being applied to touch screen Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on the touchscreen or picture It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any Line and wireless communication system and satellite-based communication system operate.
Referring now to Fig. 2 description communication system that wherein mobile terminal according to the present invention can operate.
Different air interface and/or physical layer can be used in such communication system.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (particularly, long term evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such introduction is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system may include multiple mobile terminals 100, multiple base stations (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link. Back haul link can be constructed according to any in several known interfaces, and the interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system may include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of direction specific direction Each subregion of line covering is radially far from BS270.Alternatively, each subregion can be by two or more for diversity reception Antenna covering.Each BS270, which may be constructed such that, supports multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly indicating single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Alternatively, each subregion of specific BS270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to the mobile terminal operated in system by broadcsting transmitter (BT) 295 100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 100 to receive the broadcast sent by BT295 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.The help of satellite 300 positions multiple mobile terminals At least one of 100.
In Fig. 2, multiple satellites 300 are depicted, it is understood that, it is useful to can use any number of satellite acquisition Location information.Location information module 115 as shown in Figure 1 is generally configured to cooperate with satellite 300 desired to obtain Location information.It substitutes GPS tracking technique or except GPS tracking technique, the position that can track mobile terminal can be used Other technologies.In addition, at least one 300 property of can choose of satellite or extraly processing satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100 Signal.Mobile terminal 100 usually participates in call, information receiving and transmitting and other types of communication.Specific BS270 is received each reversed Link signal is handled in specific BS270.The data of acquisition are forwarded to relevant BSC275.BSC275 provides call money The mobile management function of source distribution and the coordination including the soft switching process between BS270.The data that BSC275 will also be received It is routed to MSC280, the additional route service for forming interface with PSTN290 is provided.Similarly, PSTN290 with MSC280 forms interface, and MSC280 and BSC275 form interface, and BSC275 controls BS270 correspondingly to believe forward link Number it is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each embodiment of the method for the present invention is proposed.
Embodiment one
A kind of method preventing pirate application provided by one embodiment of the present invention, as shown in Figure 3, comprising the following steps:
S101 obtains the first application name and the first packet name of the application program that user is currently installed on;
S102 obtains the corresponding second packet name of the first application name of the application program on Platform Server;
The first packet name and the second packet name are carried out matching verification by S103;
S104, when the first packet name is matched with the second packet name, verification passes through.
In the embodiment of the present application, the application name and packet name for obtaining user's application to be installed program first, then put down again Packet name corresponding with the application name is obtained on platform server, then will be in the packet name and Platform Server of application program to be mounted Packet name is matched, and is verified and is passed through if matching.Technical solution provided by the invention will be by that will need application program to be mounted certainly The packet name that the Bao Mingyu of band is obtained from Platform Server carries out matching verification, illustrates to need application program to be mounted to be if matching Legal, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.
In some embodiments of the present application, this method further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
In the embodiment of the present application, a multi-party shared platform is established, application when all enterprise development persons issue application Name and packet name, are uploaded to the platform there are also the public signature key of enterprise development person and put on record.One blacklist mechanism of Platform Designing simultaneously, Label is packaged the signature of party.
In some embodiments of the present application, the first packet name and the second packet name are subjected to matching verification, also wrapped It includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
It is, in some embodiments, when user downloads an app from Platform Server, terminal first reads app's Then application name reads the corresponding packet name of this application name on Platform Server, if applying packet name with what is currently installed Unanimously, then pass through verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, prompt is used at this time Then the public key information of current application installation kit is uploaded to Platform Server by family risk, blacklist is added in this developer.
Embodiment two
A kind of method preventing pirate application provided by one embodiment of the present invention, as shown in figure 4, should include following step It is rapid:
S201 obtains the first application name and the first packet name of the application program that user is currently installed on;
S202 obtains the corresponding second packet name of the first application name of the application program on Platform Server;
The first packet name and the second packet name are carried out matching verification by S203;
S204 obtains the first public key letter of the application program when the first packet name is matched with the second packet name Breath;
S205 obtains the second public key of the application program on Platform Server;
First public key information and second public key information are carried out matching verification by S206;
S207, when first public key information is matched with second public key information, verification passes through.
It is, the application name and packet name of user's application to be installed program are obtained first, then again on Platform Server Obtain corresponding with application name packet name, then by the packet name progress in the packet name and Platform Server of application program to be mounted Match, if matching, then the public key information for needing application program to be mounted is obtained, and the public key letter obtained on tired state server Two public key informations are carried out matching verification by breath, if successful match, it is legal program that illustrating, which needs application program to be mounted, It can be installed, otherwise cannot be installed.By double verification, so that the application program of installation is safer, moreover it is possible to preferably It combats copyright piracy.
In some embodiments of the present application, first public key information and second public key information are subjected to matching school It tests, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
It is, in some embodiments, first step verification, when user is from one app of installation, terminal reads app's Application name reads the corresponding packet name of this application name on Platform Server, if consistent with the application packet name currently installed, Then by verification, continue second step verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, Consumer's risk is prompted at this time, the public key information of current application installation kit is then uploaded to Platform Server, by this developer Blacklist is added.
Second step verification, after being verified by the first step, reading be currently installed on packet in developer's public key information, then with platform The public key of the current application owner of server storage compares, if public key is consistent, illustrate this application be it is legal, if public Key is inconsistent, illustrates that this application is packaged party and signs again, consumer's risk is prompted at this time, by the public key information of current developer Upload Platform Server.
In some embodiments of the present application, this method further include: after platform runs a period of time, blacklist list includes Many information for being packaged parties, by this information, if the signature of packing party when signing using discovery when installation in blacklist, directly Connect prompt consumer's risk.
Blacklist real-time synchronization to distribution platform is applied, put down when packing party uploads to be applied to distribute by such as application shop etc. When platform, forbid its upload.
This programme passes through the platform of a diversification, carry out partially transparentization for public key information upload, has reached prevention and control Effect, be capable of the bad behavior of control malicious third parties software.
Embodiment three
The embodiment of the present invention provides a kind of mobile terminal, and the mobile terminal includes memory and processor;The storage Device, which is stored with, prevents the pirate computer program applied, and the processor executes the computer program, is as above implemented with realizing The step of two the method for example one or embodiment.
For example, the processor executes the computer program, to realize following steps:
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
In the embodiment of the present application, the application name and packet name for obtaining user's application to be installed program first, then put down again Packet name corresponding with the application name is obtained on platform server, then will be in the packet name and Platform Server of application program to be mounted Packet name is matched, and is verified and is passed through if matching.Technical solution provided by the invention will be by that will need application program to be mounted certainly The packet name that the Bao Mingyu of band is obtained from Platform Server carries out matching verification, illustrates to need application program to be mounted to be if matching Legal, it can be with normal mounting, by the verification to application program, to prevent application program from being occurred by pirate situation.
In some embodiments of the present application, this method further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
In the embodiment of the present application, a multi-party shared platform is established, application when all enterprise development persons issue application Name and packet name, are uploaded to the platform there are also the public signature key of enterprise development person and put on record.One blacklist mechanism of Platform Designing simultaneously, Label is packaged the signature of party.
In some embodiments of the present application, the first packet name and the second packet name are subjected to matching verification, also wrapped It includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
It is, in some embodiments, when user downloads an app from Platform Server, terminal first reads app's Then application name reads the corresponding packet name of this application name on Platform Server, if applying packet name with what is currently installed Unanimously, then pass through verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, prompt is used at this time Then the public key information of current application installation kit is uploaded to Platform Server by family risk, blacklist is added in this developer.
In some embodiments of the present application, this method further include:
When the first packet name is matched with the second packet name, the first public key information of the application program is obtained;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
It is, the application name and packet name of user's application to be installed program are obtained first, then again on Platform Server Obtain corresponding with application name packet name, then by the packet name progress in the packet name and Platform Server of application program to be mounted Match, if matching, then the public key information for needing application program to be mounted is obtained, and the public key letter obtained on tired state server Two public key informations are carried out matching verification by breath, if successful match, it is legal program that illustrating, which needs application program to be mounted, It can be installed, otherwise cannot be installed.By double verification, so that the application program of installation is safer, moreover it is possible to preferably It combats copyright piracy.
In some embodiments of the present application, first public key information and second public key information are subjected to matching school It tests, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to black name It is single.
It is, in some embodiments, first step verification, when user is from one app of installation, terminal reads app's Application name reads the corresponding packet name of this application name on Platform Server, if consistent with the application packet name currently installed, Then by verification, continue second step verification;If inconsistent, illustrate that current application is the packet name for being packaged party and beating again packet and updating, Consumer's risk is prompted at this time, the public key information of current application installation kit is then uploaded to Platform Server, by this developer Blacklist is added.
Second step verification, after being verified by the first step, reading be currently installed on packet in developer's public key information, then with platform The public key of the current application owner of server storage compares, if public key is consistent, illustrate this application be it is legal, if public Key is inconsistent, illustrates that this application is packaged party and signs again, consumer's risk is prompted at this time, by the public key information of current developer Upload Platform Server.
In some embodiments of the present application, this method further include: after platform runs a period of time, blacklist list includes Many information for being packaged parties, by this information, if the signature of packing party when signing using discovery when installation in blacklist, directly Connect prompt consumer's risk.
Blacklist real-time synchronization to distribution platform is applied, put down when packing party uploads to be applied to distribute by such as application shop etc. When platform, forbid its upload.
This programme passes through the platform of a diversification, carry out partially transparentization for public key information upload, has reached prevention and control Effect, be capable of the bad behavior of control malicious third parties software.
Example IV
The embodiment of the present invention provides a kind of computer readable storage medium, and the storage medium, which is stored with, prevents pirate application Computer program, the computer program can be executed by least one processor, to realize embodiment one or embodiment as above The step of two the methods.
The embodiment of the present invention in specific implementation, can have corresponding technical effect refering to above-mentioned each embodiment.
Fig. 5 is the structural schematic diagram for the mobile terminal that another embodiment of the present invention provides.Mobile terminal shown in fig. 5 400 include: at least one processor 401, memory 402, at least one network interface 404 and other users interface 403.It is mobile Various components in terminal 400 are coupled by bus system 405.It is understood that bus system 405 is for realizing these groups Connection communication between part.Bus system 405 further includes power bus, control bus and state in addition to including data/address bus Signal bus.But for the sake of clear explanation, various buses are all designated as bus system 405 in Fig. 5.
Wherein, user interface 403 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 402 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).Memory 402 described herein is intended to include but is not limited to these and any other suitable type Memory.
In some embodiments, memory 402 stores following element, and unit or data structure can be performed, or Their subset of person or their superset: operating system 4021 and application program 4022.
Wherein, operating system 4021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 4022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 4022.
In embodiments of the present invention, by the program or instruction of calling memory 402 to store, specifically, can be application The program or instruction stored in program 4022, processor 401 are used to execute method and step provided by each method embodiment, such as Include:
Obtain initial exposure value corresponding to each camera in multiple cameras of image acquisition component;
According to initial exposure value corresponding to each camera, automatic exposure is carried out respectively to the multiple camera Convergence;
When any one camera restrains completion, the human face region that will identify that is transmitted to processor, obtains face figure Picture;
It carries out preventing pirate application using the facial image.
The method that the embodiments of the present invention disclose can be applied in processor 401, or be realized by processor 401. Processor 401 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 401 or the instruction of software form.Above-mentioned processing Device 401 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software unit combination executes completion.Software unit can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 402, processor 401 reads the information in memory 402, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, the techniques described herein can be realized by executing the unit of function described herein.Software generation Code is storable in memory and is executed by processor.Memory can in the processor or portion realizes outside the processor.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the embodiment of the present invention is substantially The part of the part that contributes to existing technology or the technical solution can embody in the form of software products in other words Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can To be personal computer, server or the network equipment etc.) execute all or part of each embodiment the method for the present invention Step.And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program The medium of code.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Herein, the relational terms of such as " first " and " second " or the like are used merely to an entity or operation It is distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation, there are any this Actual relationship or sequence.
Through the above description of the embodiments, those skilled in the art can be understood that each reality of the present invention Applying method described in example can realize by means of software and necessary general hardware platform, naturally it is also possible to by hardware, But the former is more preferably embodiment in many cases.Based on this understanding, technical solution of the present invention is substantially in other words The part that contributes to existing technology can be embodied in the form of software products, which is stored in one In a storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be hand Machine, computer, server, air conditioner or network equipment etc.) execute method or implementation described in each embodiment of the present invention Method described in certain parts of example.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (8)

1. a kind of prevent the pirate method applied, which is characterized in that the described method includes:
Obtain the first application name and the first packet name of the application program that user is currently installed on;
The corresponding second packet name of the first application name of the application program is obtained on Platform Server;
The first packet name and the second packet name are subjected to matching verification;
When the first packet name is matched with the second packet name, verification passes through.
2. according to claim 1 prevent the pirate method applied, which is characterized in that further include:
According to the application name of the application program of developer's publication, packet name and public key information building verification library;
Verification library information is uploaded to Platform Server.
3. according to claim 1 prevent the pirate method applied, which is characterized in that will the first packet name and described the Two packet names carry out matching verification, further includes:
When the first packet name and the second packet name mismatch, indicating risk is issued;
Obtain the first public key of the application program;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to blacklist.
4. according to claim 1 prevent the pirate method applied, which is characterized in that in the first packet name and described the After the matching of two packet names, the method also includes:
Obtain the first public key information of the application program;
The second public key of the application program is obtained on Platform Server;
First public key information and second public key information are subjected to matching verification;
When first public key information is matched with second public key information, verification passes through.
5. according to claim 4 prevent the pirate method applied, which is characterized in that described by first public key information Matching verification is carried out with second public key information, further includes:
When first public key and second public key mismatch, indicating risk is issued;
First public key is uploaded to Platform Server, and the corresponding developer of the application program is added to blacklist.
6. -5 any method for preventing pirate application according to claim 1, which is characterized in that the method also includes:
By the synchronizing information that the developer of blacklist is added to applying distribution platform;
The developer is forbidden to upload application program to applying distribution platform.
7. a kind of mobile terminal, which is characterized in that the mobile terminal includes memory and processor;The memory is stored with The pirate computer program applied is prevented, the processor executes the computer program, any in claim 1-6 to realize The pirate method applied is prevented described in one.
8. a kind of computer readable storage medium, which is characterized in that the storage medium, which is stored with, prevents the pirate calculating applied Machine program, the computer program can be executed by least one processor, to realize as described in any one of claim 1-6 Prevent the pirate method applied.
CN201910127385.0A 2019-02-20 2019-02-20 Prevent pirate method, mobile terminal and the computer readable storage medium applied Pending CN109977632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910127385.0A CN109977632A (en) 2019-02-20 2019-02-20 Prevent pirate method, mobile terminal and the computer readable storage medium applied

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910127385.0A CN109977632A (en) 2019-02-20 2019-02-20 Prevent pirate method, mobile terminal and the computer readable storage medium applied

Publications (1)

Publication Number Publication Date
CN109977632A true CN109977632A (en) 2019-07-05

Family

ID=67077145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910127385.0A Pending CN109977632A (en) 2019-02-20 2019-02-20 Prevent pirate method, mobile terminal and the computer readable storage medium applied

Country Status (1)

Country Link
CN (1) CN109977632A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
CN104123493A (en) * 2014-07-31 2014-10-29 百度在线网络技术(北京)有限公司 Method and device for detecting safety performance of application program
US20150288528A1 (en) * 2014-04-07 2015-10-08 Samsung Electronics Co., Ltd. Method for application installation, electronic device, and certificate system
US20160218882A1 (en) * 2015-01-23 2016-07-28 Canon Kabushiki Kaisha Methods and systems for installing software
CN106293779A (en) * 2015-05-11 2017-01-04 广州爱九游信息技术有限公司 A kind of method and device identifying application installation kit
CN107241298A (en) * 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 One kind application management-control method, terminal and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779257A (en) * 2012-06-28 2012-11-14 奇智软件(北京)有限公司 Security detection method and system of Android application program
US20150288528A1 (en) * 2014-04-07 2015-10-08 Samsung Electronics Co., Ltd. Method for application installation, electronic device, and certificate system
CN104123493A (en) * 2014-07-31 2014-10-29 百度在线网络技术(北京)有限公司 Method and device for detecting safety performance of application program
US20160218882A1 (en) * 2015-01-23 2016-07-28 Canon Kabushiki Kaisha Methods and systems for installing software
CN106293779A (en) * 2015-05-11 2017-01-04 广州爱九游信息技术有限公司 A kind of method and device identifying application installation kit
CN107241298A (en) * 2016-03-29 2017-10-10 阿里巴巴集团控股有限公司 One kind application management-control method, terminal and system

Similar Documents

Publication Publication Date Title
CN105376062B (en) A kind of communication security exchange method, apparatus and system
CN104915582B (en) unlocking method and device
CN105099669B (en) Recording encipher-decipher method and device
CN105138400B (en) Application program self-starting management method and device
CN106850976B (en) Using update method and terminal
CN105278995B (en) Management method, system, server and the mobile terminal of application program
CN108965727A (en) A kind of image-pickup method, terminal and computer readable storage medium
CN105100477B (en) Terminal notifying device and method
CN104731456B (en) Desktop widget display methods and device
CN109033263A (en) A kind of application recommended method and terminal
CN106102086A (en) Data processing equipment and method
CN110109528A (en) Management-control method, mobile terminal and the computer readable storage medium of application program
CN105764085A (en) Abnormal electricity consumption detection method and terminal
CN105867749B (en) A kind of menu interface display methods and terminal
CN105049582B (en) A kind of save set of calling record, method and display methods
CN106991014A (en) A kind of method, device and mobile terminal for handling user's incoming event
CN104954582B (en) A kind of method and device for initiating speed dialling according to pressing touch-control
CN104735254B (en) terminal screen locking method and system
CN106775336A (en) A kind of content duplication method, device and terminal
CN106412328B (en) A kind of method and apparatus obtaining field feedback
CN105187621B (en) The method, apparatus and terminal of message notifying
CN107071161A (en) The aggregation display method and mobile terminal of icon in a kind of status bar
CN104837122B (en) Multi-party communications method, terminal and system
CN106791016A (en) A kind of photographic method and terminal
CN106227454B (en) A kind of touch trajectory detection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705

RJ01 Rejection of invention patent application after publication