Movatterモバイル変換


[0]ホーム

URL:


CN102982263A - Application program protection method and equipment - Google Patents

Application program protection method and equipment
Download PDF

Info

Publication number
CN102982263A
CN102982263ACN2012104689527ACN201210468952ACN102982263ACN 102982263 ACN102982263 ACN 102982263ACN 2012104689527 ACN2012104689527 ACN 2012104689527ACN 201210468952 ACN201210468952 ACN 201210468952ACN 102982263 ACN102982263 ACN 102982263A
Authority
CN
China
Prior art keywords
application program
user
sign
module
decrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104689527A
Other languages
Chinese (zh)
Inventor
郑明�
王志军
王蓉
张尼
刘镝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co LtdfiledCriticalChina United Network Communications Group Co Ltd
Priority to CN2012104689527ApriorityCriticalpatent/CN102982263A/en
Publication of CN102982263ApublicationCriticalpatent/CN102982263A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

Translated fromChinese

本发明提供了一种应用程序的保护方法和设备,该方法包括:读取需要运行应用程序的第二移动终端的第二用户标识;将所述第二用户标识与已经存储的第一用户标识进行比对;其中,所述第一用户标识是购买所述应用程序的用户标识;如果比对结果为一致,则根据所述第一用户标识对所述应用程序进行解密,并允许所述第二移动终端运行所述应用程序;如果比对结果为不一致,则拒绝对所述应用程序进行解密。本发明提供的技术方案,由于应用程序的解密与购买该应用程序的用户标识相关联,所以在应用程序被成功解密之后,也无法被用户转移安装到其它终端中使用,有利于应用程序的版权保护。

Figure 201210468952

The present invention provides an application program protection method and device, the method comprising: reading the second user identification of the second mobile terminal that needs to run the application program; combining the second user identification with the stored first user identification performing a comparison; wherein, the first user ID is the user ID that purchased the application program; if the comparison result is consistent, the application program is decrypted according to the first user ID, and the second user ID is allowed to The second mobile terminal runs the application program; if the comparison result is inconsistent, it refuses to decrypt the application program. In the technical solution provided by the present invention, since the decryption of the application program is associated with the identity of the user who purchased the application program, after the application program is successfully decrypted, it cannot be transferred and installed by the user to other terminals for use, which is beneficial to the copyright of the application program. Protect.

Figure 201210468952

Description

Application program guard method and equipment
Technical field
The embodiment of the invention relates to software protection, relates in particular to a kind of application program guard method and equipment.
Background technology
Along with the fast development of mobile Internet, the application program that is applicable to portable terminal becomes increasingly abundant, and the user is more and more for the use of application program.But have at present some problems, such as the portable terminal of Android platform, the user often can avoid using the charge channel in shop, downloads and installs application program by other various channels, thereby causes the rights and interests loss in developer and application shop.Equally also can run into problems in the mobile terminal operating system platform of other types.Therefore, receive publicity gradually about the guarantee of application developer economic interests and the anti-problem that cracks protection of application program.
For the problems referred to above; in the existing Software Protection Technique; normally the developer is encrypted by software cryptography device application programs; then by on terminal, also moving by safe operation device decryption application; the password that encryption method of the prior art is normally fixing or the password that arranges with unalterable rules; after application program once is decrypted successfully; owing to obtained this password; can be shifted when being installed to that unrestricted operation is used in other terminal by the user, still be unfavorable for the copyright protection of application program.
Summary of the invention
The invention provides a kind of application program guard method and equipment, in order to the protection of the copyright that improves application programs.
Of the present inventionly provide a kind of application program guard method, having comprised:
Read the second user ID of second portable terminal that need to run application;
Described the second user ID and the first user sign of having stored are compared; Wherein, described first user sign is to buy the user ID of described application program;
If comparison result is consistent, then according to described first user sign described application program is decrypted, and allows the described application program of described the second running of mobile terminal;
If comparison result is inconsistent, then refuse described application program is decrypted.
The present invention also provides a kind of application program protection equipment, comprising:
Identity reading module is for the second user ID that reads second portable terminal that need to run application;
The sign comparing module is connected with described identity reading module, is used for described the second user ID and the first user sign of having stored are compared; Wherein, described first user sign is to buy the user ID of described application program;
Deciphering module is connected with described sign contrast module, is consistent if be used for comparison result, then according to described first user sign described application program is decrypted, and allows the described application program of described the second running of mobile terminal;
Processing module is connected with described sign contrast module, is inconsistent if be used for comparison result, then refuses described application program is decrypted.
Application program guard method provided by the invention and equipment after the second user ID that reads second portable terminal that need to run application, are compared described the second user ID and the first user sign of having stored; Wherein, described first user sign is to buy the user ID of described application program; If comparison result is consistent, then according to described first user sign described application program is decrypted, and allows the described application program of described the second running of mobile terminal; If comparison result is inconsistent, then refuse described application program is decrypted.Technical scheme provided by the invention; because the deciphering of application program is associated with the user ID of buying this application program; so after application program is successfully deciphered, also can't be shifted to be installed in other terminal by the user and use, be conducive to the copyright protection of application program.
Description of drawings
The schematic flow sheet of a kind of application program guard method that Fig. 1 provides for one embodiment of the invention;
A kind of application program that Fig. 2 provides for further embodiment of this invention is protected the schematic flow sheet of equipment.
Embodiment
Usually usually finish in developer's side for the encryption of application program in the prior art, cryptographic means differs, and has increased the weight of developer's work load; The application program of utilizing simultaneously prior art to encrypt just can be transferred to be installed in other terminal and use after being cracked successfully once, serious infringement developer's copyright rights and interests, and be unfavorable for using the shop application programs and unify toll administration.The schematic flow sheet of a kind of application program guard method that Fig. 1 provides for one embodiment of the invention, as shown in Figure 1, present embodiment provides a kind of application program guard method, comprising:
Step 110: the second user ID that reads second portable terminal that need to run application.
Concrete, after some the second acquisition for mobile terminals arrive this application program, when needs move this application program, at first obtain the second user ID of this second portable terminal, for example the second portable terminal is mobile phone, then the second user ID of the second portable terminal can be the SIM(Subscriber Identity Module of its phone number such as 135*******49 or the second portable terminal, client identification module) the IMSI(International Mobile SubscriberIdentification Number of card, international mobile subscriber identity) information etc.The obtain manner of the second portable terminal application programs both can be to download from server that to obtain also can be to transmit from other portable terminals to obtain.
Step 120: the second user ID and the first user sign of having stored are compared; Wherein, the first user sign is the user ID of purchase applications.If comparison result is consistent, then execution in step 130; If comparison result is inconsistent, then execution in step 140.
Use the user ID of the portable terminal of purchase applications that the application program of downloading is encrypted in the present embodiment, when the second portable terminal need to move this application program, need the second user ID by second portable terminal at comparison current application program place, whether identical with the user ID of buying and download this application program.Can guarantee like this to wish to use the user of this application program for buying the user of this application program.The user who has stopped other portable terminals uses this application program in the situation of purchase applications not.The first portable terminal of for example buying this application program is the cellphone subscriber, its first user is designated this cellphone subscriber's phone number such as 135*******49, itself and current hope is moved the second user ID of the second portable terminal of this application program and compares.
Step 130: be decrypted according to first user sign application programs, and allow the second running of mobile terminal application program;
Step 140: the refusal application programs is decrypted.
Process accordingly according to the comparison result application programs, concrete, if wishing the second user ID of the second portable terminal of this application program of use is exactly to buy the first user sign of this application program, for example through comparison, the second user ID of this second portable terminal also is 132*******49, identical with the first user sign, then can the application program in this second portable terminal be decrypted, thereby allow this application program of this running of mobile terminal.Opposite, if wish to use the second portable terminal of this application program by the comparison user ID, for example, through comparison, the second user ID of this second portable terminal is 131*******31, and is not identical with the first user sign 132*******49 that buys this application program, is not the first user sign of buying this application program, then refuse application programs and be decrypted, prevent this application program of the second running of mobile terminal.
The application program guard method that present embodiment provides after the second user ID that reads second portable terminal that need to run application, is compared the second user ID and the first user sign of having stored; Wherein, the first user sign is the user ID of purchase applications; If comparison result is consistent, then is decrypted according to first user sign application programs, and allows the second running of mobile terminal application program; If comparison result is inconsistent, then refuses application programs and be decrypted.Technical scheme provided by the invention; because the deciphering of application program is associated with the user ID of buying this application program; so after application program is successfully deciphered, also can't be shifted in the terminal that is installed to other unpaid expense family by the user and use, be conducive to the copyright protection of application program.
The application program guard method that present embodiment proposes is applicable to mobile phone and uses; encrypt by developer, the interlock of application shop simultaneously; and can be encrypted by user's unique identification; so that after the user buys this application program; only can also can't move even carry out unloading with its user ID for an one user, this technical scheme can strengthen the protection to Software Intellectual Property Rights; stop the use of unpaid expense family application programs, can prevent effectively that application program is cracked simultaneously.Realized the developer, used shop interlock encryption, the shop application programs is carried out unified toll administration.
Preferred as technique scheme, step 110: comprise before reading the second user ID of second portable terminal that need to run application:
Step 101: obtain the first user sign that signs in to application shop purchase applications.
Step 102: be encrypted according to first user sign application programs.
Identify for obtaining the first user of having bought this application program before downloading in application program, and automatically encrypt according to this first user sign application programs, is downloaded by the first portable terminal after encrypting.After the download, whether the user ID of relatively encrypting is identical with the user ID of current portable terminal, if the same shows this portable terminal for having bought application program, then is decrypted operation and operation.If these application passes of approach such as process download or copy transmissions are in other portable terminal, for example, another portable terminal, it is the mobile phone of purchase applications not, during the application program of directly sending by reception other-ends such as bluetooths, then should limit this mobile phone to the use of this application program.
Preferred as technique scheme, step 102 is encrypted according to first user sign application programs and comprises: carry out segmentation according to default Cipher Strength application programs and form a plurality of application program fragments, and use the preset-key generating algorithm that the first user sign is processed the generation encryption key, be encrypted according to encryption key and default cryptographic algorithm application programs fragment.Above-mentioned Cipher Strength refers to that application program is divided into several sections to be encrypted, as application program being divided into the n section, and need to be respectively preset-key generating algorithm Fa (the x) (a=1 that every section application program arranges correspondence, 2..n), parameter x is for buying the first user sign of this application program herein, and default cryptographic algorithm Ga (y)=Ga (Fa (x)) (a=1,2..n), in the present embodiment, when first user is designated the phone number of first terminal, parameter x is the phone number of portable terminal, and the parameter y of default cryptographic algorithm is the key that is generated by the preset-key generating algorithm according to this phone number.Default cryptographic algorithm and key schedule can be: the symmetric encipherment algorithms such as data encryption standards (DataEncryption Standard, vehicle economy S), Advanced Encryption Standard (Advanced EncryptionStandard is called for short AES) or 3-DES.
It is more then to encrypt hop count owing to the level of encryption of selecting is higher, and safety coefficient is also higher, but can cause the application program travelling speed also to reduce, so concrete Cipher Strength size should appropriately be selected in conjunction with complexity and the operational efficiency of this application program.
Preferred as technique scheme, be decrypted specifically according to first user sign application programs in the step 130 and comprise: according to the preset-key generating algorithm first user sign is processed the generation key, be decrypted according to cryptographic algorithm and Cipher Strength application programs fragment.That is, if in ciphering process, use the des encryption algorithm to be encrypted, then in decrypting process, also should use corresponding des encryption algorithm to be decrypted.
This decrypting process is the inverse operation of the ciphering process of above-mentioned steps 102, and the encrypting and decrypting process is all relevant with the first user sign of buying this application program.
Preferred as technique scheme, first user is designated phone number; The second user ID is the phone number of the second portable terminal.Because portable terminal is normally bound with phone number using the shop purchase applications by network in the time of at present mostly, and pay by the phone number related account, so preferred phone number is as user ID, application programs is encrypted decryption oprerations.
Preferred as technique scheme, the application program guard method that present embodiment provides also comprises: after application programs is decrypted, remove in the internal memory of the second portable terminal the interim fragment for the decryption application generation.Can further guarantee the security of application program by the interim fragment of removing the decryption application generation, avoid illegal program by reading interim frag info this application program to be carried out password cracking, can also greatly improve in addition the travelling speed of application program.In the interim fragment that in the internal memory of removing the second portable terminal, produces for decryption application simultaneously, also can remove the interim fragment of other the program of having carried out in the internal memory, can further improve the application program travelling speed like this.
Preferred as technique scheme, the application program guard method that present embodiment provides also comprises: after application programs is decrypted, monitor the application program operation, if having unusually, then withdraw from application program.Can find timely to exist the abnormal process of potential safety hazard by the operation that monitors application program, if there is abnormal process, can affect the security of this application program, then should timely this application program be withdrawed from, be cracked to prevent this application program.
The developer is submitted to and uses on the shop after application program is finished in exploitation, concrete can submit the submission of carrying out application program in the administration module of module to by the application program of using the shop.Application program submits to the administration module of module for the unique number of the application assigned server end of submission, is convenient to developer's management.
Necessary register account number before the application program downloading service in user application shop in using present embodiment, when registration, need to submit the user ID of own mobile phone to, the user ID of mobile phone is preferably phone number in the present embodiment, for ease of management, a phone number can only be registered an account in addition.After the user logs in account, download in the shop and required application program is bought in payment using, when finishing payment, the user uses access customer is write in the shop automatically in this application program phone number information, application programs is carried out the body segmentation and according to the generation key of user's phone number information, again according to key combining encryption algorithm encrypt applications.Certainly the out of Memory of user mobile phone also can be used as user ID, such as the IMSI information of mobile phone, uses the IMSI information that the shop can obtain by alternate manner user mobile phone.Similarly, an IMSI information can only account of corresponding registration.
Application program is installed also and is started behind mobile phone, at first reads the user ID phone number of mobile phone during startup, and the phone number whether checking writes when buying this application program is identical, if consistent, then by checking, is decrypted according to this phone number; If inconsistent, then refusal deciphering can be selected to withdraw from this application program or give corresponding refusal prompting.
A kind of application program that Fig. 2 provides for further embodiment of this invention is protected the schematic flow sheet of equipment, and as shown in Figure 2, the embodiment of the invention also provides a kind of application program protection equipment, comprising:
Identity reading module 12 is for the second user ID that reads second portable terminal that need to run application;
Signcomparing module 13 is connected withidentity reading module 12, is used for the second user ID thatidentity reading module 12 is read and compares with the first user of having stored sign; Wherein, the first user sign is the user ID of purchase applications;
Deciphering module 14 is connected withsign comparing module 13, is consistent if be used for the comparison result ofsign comparing module 13, then is decrypted according to first user sign application programs, and allows the second running of mobile terminal application program;
Processing module 15 is connected withsign comparing module 13, is inconsistent if be used for the comparison result ofsign comparing module 13, then refuses application programs and is decrypted.
The application program protection equipment that present embodiment provides, read the second user ID of second portable terminal that need to run application byidentity reading module 12 after, signcomparing module 13 is compared the second user ID and the first user sign of having stored; Wherein, the first user sign is the user ID of purchase applications; If comparison result is consistent, then is decrypted according to first user sign application programs by deciphering module 14, and allows the second running of mobile terminal application program; If comparison result is inconsistent, then be decrypted byprocessing module 15 refusal application programs.Technical scheme provided by the invention; because the deciphering of application program is associated with the user ID of buying this application program; so after application program is successfully deciphered, also can't be shifted to be installed in other terminal by the user and use, be conducive to the copyright protection of application program.
The specific implementation process of this apparatus embodiments is identical with the implementation process of above-mentioned application program guard method embodiment, sees also in detail embodiment of the method, does not repeat them here.
Preferred as technique scheme, equipment also comprises:
Identifier acquisition module 10 is used for obtaining the first user sign that signs in to application shop purchase applications;
Encrypting module 11 is connected withidentifier acquisition module 10, is used for being encrypted according to first user sign application programs.
Preferred as technique scheme, encrypting module 11 specifically is used for:
Carry out segmentation according to default Cipher Strength application programs and form a plurality of application program fragments, and use the preset-key generating algorithm that the first user sign is processed the generation encryption key, be encrypted according to encryption key and default cryptographic algorithm application programs fragment.
Preferred as technique scheme, deciphering module 14 specifically is used for:
According to the preset-key generating algorithm described first user sign is processed the generation key, according to cryptographic algorithm and Cipher Strength described application program fragment is decrypted.
Preferred as technique scheme, first user is designated phone number; The second user ID is the phone number of the second portable terminal.
Preferred as technique scheme, the equipment of present embodiment also comprises: wash module 16, is connected with deciphering module 14, be used for after application programs is decrypted, remove in the internal memory of the second portable terminal the interim fragment for the decryption application generation.This wash module 16, be optional module, after the program start operation, bring into operation, be mainly used in removing the interim fragment that decryption application produces, can further guarantee the security of application program, avoid illegal program by reading interim frag info this application program to be carried out password cracking, can also greatly improve in addition the travelling speed of application program.In the interim fragment that in the internal memory of removing the second portable terminal, produces for decryption application simultaneously, also can remove the interim fragment of other the program of having carried out in the internal memory, can further improve the application program travelling speed like this.
Preferred as technique scheme, the equipment of present embodiment also comprises: attack and monitor module 17, is connected with deciphering module 14, be used for after application programs is decrypted, monitor the application program operation, if having unusually, then withdraw from application program.This attack monitors that module 17 is optional module, after the program start operation, bring into operation, can find timely to exist the abnormal process of potential safety hazard by the operation that monitors application program, if there is abnormal process, can affect the words of the security of this application program, then should timely this application program be withdrawed from, be cracked to prevent this application program.
The exploitation of application program is uploaded the concrete steps of encryption and is in the concrete present embodiment:
The developer submits the submission of carrying out application program in the device at a kind of software that the application shop provides after application program is finished in exploitation.Software submits to device for the unique number of application assigned this locality of submission, is convenient to developer's management;
After application program was submitted to and to be finished, it was that application program writes one section code that above-mentioned software is submitted device to, and implanted this application program and become safety insert.The application program protection equipment that provides in the present embodiment is provided this safety insert, comprisesidentity reading module 12,sign comparing module 13; deciphering module 14; processingmodule 15,identifier acquisition module 10 and encrypting module 11, and two alternative wash module that arrange 16 monitor module 17 with attacking.Each module that comprises in the application program protection equipment can submit to the upgrading of device to expand with software in the future.After application programs had been added above-mentioned application program protection equipment, the application program of using software to submit to the upper transmission module of device will write again application program protection equipment was uploaded to the application shop server.
And the user from the process of using shop down load application program encryption deciphering is in the present embodiment:
Necessary register account number before the application program downloading service in the application shop that the user mentions in using present embodiment need to be submitted the phone number of oneself or the user ID of other types to when registration, a phone number can only be registered an account;
After the user logged in account, the payment function purchase applications of shop download module was used in use, used theidentifier acquisition module 10 of this application program protection equipment in the shop when finishing payment, obtained the first user sign that signs in to application shop purchase applications; Encrypting module 11 is encrypted according to first user sign application programs.
In mobile phone, install and operation after application program is downloaded, at first start theidentity reading module 12 in the application program protection equipment during operation, read the second user ID of second portable terminal that need to run application;Sign comparing module 13 is comparedidentity reading module 12 the second user ID that reads and the first user sign of having stored; Deciphering module 14 if the comparison result ofsign comparing module 13 is consistent, then is decrypted according to first user sign application programs, and allows the second running of mobile terminal application program;Processing module 15 if the comparison result ofsign comparing module 13 is inconsistent, is then refused application programs and is decrypted.
One of ordinary skill in the art will appreciate that: all or part of step that realizes above-mentioned each embodiment of the method can be finished by the relevant hardware of programmed instruction.Aforesaid program can be stored in the computer read/write memory medium.This program is carried out the step that comprises above-mentioned each embodiment of the method when carrying out; And aforesaid storage medium comprises: the various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above each embodiment is not intended to limit only in order to technical scheme of the present invention to be described; Although with reference to aforementioned each embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment puts down in writing, and perhaps some or all of technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the scope of various embodiments of the present invention technical scheme.

Claims (10)

1. an application program guard method is characterized in that, comprising:
Read the second user ID of second portable terminal that need to run application;
Described the second user ID and the first user sign of having stored are compared; Wherein, described first user sign is to buy the user ID of described application program;
If comparison result is consistent, then according to described first user sign described application program is decrypted, and allows the described application program of described the second running of mobile terminal;
If comparison result is inconsistent, then refuse described application program is decrypted.
2. application program guard method according to claim 1 is characterized in that, described the second user ID that reads second portable terminal that need to run application comprises before:
Obtain to sign in to and use the described first user sign that described application program is bought in the shop;
According to described first user sign described application program is encrypted.
3. application program guard method according to claim 2 is characterized in that, described described application program being encrypted according to described first user sign comprises:
According to default Cipher Strength described application program is carried out segmentation and form a plurality of application program fragments, and use the preset-key generating algorithm that described first user sign is processed the generation encryption key, according to described encryption key and default cryptographic algorithm described application program fragment is encrypted.
4. application program guard method according to claim 3 is characterized in that, described described application program being decrypted specifically according to described first user sign comprises:
According to the preset-key generating algorithm described first user sign is processed the generation key, according to cryptographic algorithm and Cipher Strength described application program fragment is decrypted.
5. according to claim 1 each described application program guard method in 4 is characterized in that described first user is designated phone number; Described the second user ID is the phone number of described the second portable terminal.
6. application program guard method according to claim 1 is characterized in that, also comprises:
After described application program is decrypted, remove the interim fragment that produces for deciphering described application program in the internal memory of described the second portable terminal.
7. application program guard method according to claim 1 is characterized in that, also comprises:
After described application program is decrypted, monitor described application program operation, if having unusually, then withdraw from described application program.
8. an application program protection equipment is characterized in that, comprising:
Identity reading module is for the second user ID that reads second portable terminal that need to run application;
The sign comparing module is connected with described identity reading module, is used for described the second user ID and the first user sign of having stored are compared; Wherein, described first user sign is to buy the user ID of described application program;
Deciphering module is connected with described sign contrast module, is consistent if be used for the comparison result of described sign comparing module, then according to described first user sign described application program is decrypted, and allows the described application program of described the second running of mobile terminal;
Processing module is connected with described sign contrast module, is inconsistent if be used for the comparison result of described sign comparing module, then refuses described application program is decrypted.
9. application program protection equipment according to claim 8 is characterized in that, also comprises:
Identifier acquisition module is used for obtaining signing in to and uses the described first user sign that described application program is bought in the shop;
Encrypting module is connected with described identifier acquisition module, is used for according to described first user sign described application program being encrypted.
10. application program according to claim 9 is protected equipment, it is characterized in that described encrypting module specifically is used for:
According to default Cipher Strength described application program is carried out segmentation and form a plurality of application program fragments, and use the preset-key generating algorithm that described first user sign is processed the generation encryption key, according to described encryption key and default cryptographic algorithm described application program fragment is encrypted;
Described deciphering module specifically is used for:
According to the preset-key generating algorithm described first user sign is processed the generation key, according to cryptographic algorithm and Cipher Strength described application program fragment is decrypted;
Described equipment also comprises:
Wash module is connected with described deciphering module, is used for after described application program is decrypted, and removes the interim fragment that produces for deciphering described application program in the internal memory of described the second portable terminal;
Attack and monitor module, be connected with described deciphering module, be used for after described application program is decrypted, monitor described application program operation, if having unusually, then withdraw from described application program.
CN2012104689527A2012-11-192012-11-19Application program protection method and equipmentPendingCN102982263A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN2012104689527ACN102982263A (en)2012-11-192012-11-19Application program protection method and equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN2012104689527ACN102982263A (en)2012-11-192012-11-19Application program protection method and equipment

Publications (1)

Publication NumberPublication Date
CN102982263Atrue CN102982263A (en)2013-03-20

Family

ID=47856269

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN2012104689527APendingCN102982263A (en)2012-11-192012-11-19Application program protection method and equipment

Country Status (1)

CountryLink
CN (1)CN102982263A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103235906A (en)*2013-03-272013-08-07广东欧珀移动通信有限公司Method and device for encrypting and decrypting application program
CN104102717A (en)*2014-07-172014-10-15广东欧珀移动通信有限公司Method and system for exclusively playing music at terminal
CN104866476A (en)*2014-02-202015-08-26联想(北京)有限公司Information processing method and server
CN109165029A (en)*2018-08-272019-01-08北京奇虎科技有限公司Realize method, server and the device of downloading-running payment applications
CN109190335A (en)*2018-09-172019-01-11北京市计算中心A kind of software copyright protecting method and system
CN110162959A (en)*2019-05-312019-08-23北京顶象技术有限公司Data processing method and device based on device-fingerprint
CN110178114A (en)*2017-01-252019-08-27日立汽车系统株式会社 Vehicle control device and program update system
CN112988913A (en)*2021-05-112021-06-18腾讯科技(深圳)有限公司Data processing method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2003021403A1 (en)*2001-09-042003-03-13Nokia CorporationMethod to protect software against unauthorized use
CN1556943A (en)*2002-07-152004-12-22������������ʽ���� Client terminal, software control method and control program
CN101203000A (en)*2007-05-242008-06-18深圳市德诺通讯技术有限公司Method and system for downloading mobile terminal applied software
CN102118512A (en)*2011-03-282011-07-06阮晓迅Method and system for preventing application program of mobile phone from being cracked

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2003021403A1 (en)*2001-09-042003-03-13Nokia CorporationMethod to protect software against unauthorized use
CN1556943A (en)*2002-07-152004-12-22������������ʽ���� Client terminal, software control method and control program
CN101203000A (en)*2007-05-242008-06-18深圳市德诺通讯技术有限公司Method and system for downloading mobile terminal applied software
CN102118512A (en)*2011-03-282011-07-06阮晓迅Method and system for preventing application program of mobile phone from being cracked

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103235906A (en)*2013-03-272013-08-07广东欧珀移动通信有限公司Method and device for encrypting and decrypting application program
CN103235906B (en)*2013-03-272016-01-13广东欧珀移动通信有限公司A kind of application program encryption, decryption method and encryption, decryption device
CN104866476A (en)*2014-02-202015-08-26联想(北京)有限公司Information processing method and server
CN104102717A (en)*2014-07-172014-10-15广东欧珀移动通信有限公司Method and system for exclusively playing music at terminal
CN104102717B (en)*2014-07-172019-12-27Oppo广东移动通信有限公司Method and system for exclusively playing music on terminal
CN110178114A (en)*2017-01-252019-08-27日立汽车系统株式会社 Vehicle control device and program update system
CN110178114B (en)*2017-01-252023-05-12日立安斯泰莫株式会社 Vehicle control device and program update system
CN109165029A (en)*2018-08-272019-01-08北京奇虎科技有限公司Realize method, server and the device of downloading-running payment applications
CN109190335A (en)*2018-09-172019-01-11北京市计算中心A kind of software copyright protecting method and system
CN109190335B (en)*2018-09-172020-05-05北京市计算中心Software copyright protection method and system
CN110162959A (en)*2019-05-312019-08-23北京顶象技术有限公司Data processing method and device based on device-fingerprint
CN112988913A (en)*2021-05-112021-06-18腾讯科技(深圳)有限公司Data processing method and related device

Similar Documents

PublicationPublication DateTitle
CN102982263A (en)Application program protection method and equipment
CN106656488B (en) Key download method and device for POS terminal
EP1942430B1 (en)Token Passing Technique for Media Playback Devices
JP4392672B2 (en) Software defined radio communication apparatus, software update method, and software defined radio communication system
CN101094062B (en)Method for implementing safe distribution and use of digital content by using memory card
CN102065148A (en)Memory system access authorizing method based on communication network
CN103457733A (en)Data sharing method and system under cloud computing environment
CN114175574B (en) Wireless Security Protocols
CN103246850A (en)Method and device for processing file
CN101014944A (en)Method and apparatus for digital rights management
CN101350718A (en) A protection method for playing content authority range based on user identification module
KR102645542B1 (en)Apparatus and method for in-vehicle network communication
CN103237010B (en)The server end of digital content is cryptographically provided
CN104394467B (en) Method for downloading set-top box application program and set-top box
CN103237011B (en)Digital content encryption transmission method and server end
US20120321088A1 (en)Method And System For The Accelerated Decryption Of Cryptographically Protected User Data Units
CN112507296A (en)User login verification method and system based on block chain
CN104392153B (en)A kind of method for protecting software and system
KR101711024B1 (en)Method for accessing temper-proof device and apparatus enabling of the method
CN106878010A (en)Encryption and decryption method and device based on security chip key pair
KR101532763B1 (en)System and method for preventing illegal copy of application
US8755521B2 (en)Security method and system for media playback devices
CN114297673B (en) A password verification method, solid state hard disk and host computer
CN108076352A (en)A kind of video theft preventing method and system
CN115510401A (en)Software authorization implementation method in cloud scene

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C12Rejection of a patent application after its publication
RJ01Rejection of invention patent application after publication

Application publication date:20130320


[8]ページ先頭

©2009-2025 Movatter.jp