Movatterモバイル変換


[0]ホーム

URL:


CN111177707A - Method and system for carrying out security inspection on application installation and application server - Google Patents

Method and system for carrying out security inspection on application installation and application server
Download PDF

Info

Publication number
CN111177707A
CN111177707ACN201911375646.7ACN201911375646ACN111177707ACN 111177707 ACN111177707 ACN 111177707ACN 201911375646 ACN201911375646 ACN 201911375646ACN 111177707 ACN111177707 ACN 111177707A
Authority
CN
China
Prior art keywords
application
encryption
original
byte array
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911375646.7A
Other languages
Chinese (zh)
Inventor
戴帅军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhicheauto Technology Beijing Co ltd
Original Assignee
Zhicheauto Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhicheauto Technology Beijing Co ltdfiledCriticalZhicheauto Technology Beijing Co ltd
Priority to CN201911375646.7ApriorityCriticalpatent/CN111177707A/en
Publication of CN111177707ApublicationCriticalpatent/CN111177707A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The invention provides a method and a system for carrying out security check on application installation and an application server, wherein the method comprises the following steps: initiating an application downloading request from an application webpage end, responding the downloading request by an application server end and downloading a target application from the application server end, wherein the target application is obtained by encrypting an original application according to a preset encryption algorithm; after the target application is downloaded, calling an application installation safety inspection system to decrypt the target application according to a preset decryption algorithm, and determining whether the original application can be obtained through restoration; and when the original application is determined to be obtained through reduction, installing the original application. The method and the device can install the original application when the original application is determined to be restored, can limit the installation of the third-party application, and ensure that the system runs more stably, safely and reliably.

Description

Method and system for carrying out security inspection on application installation and application server
Technical Field
The present invention relates to the field of network application installation, and in particular, to a method and system for performing security check on application installation, an application server, an electronic device, and a computer-readable storage medium.
Background
The vehicle-mounted intelligent system is realized based on Android, and in order to meet the requirements of users, the users need to install third-party applications. However, due to the hardware limitation of the vehicle-mounted intelligent system and the difference in the quality of third-party software, in order to enable the system to run stably and follow the user experience, the unlimited installation of third-party applications needs to be limited.
Therefore, it is desirable to provide an application installation security verification method to verify that all applications to be installed originate from a predetermined application object, so as to improve the operation stability of the system after the applications are installed.
Disclosure of Invention
The present invention is directed to a method and system for security verification of application installation, and an application server, an electronic device and a computer-readable storage medium, so as to improve the problem of operation stability of the prior art system after a third-party application is installed.
According to a first aspect of the invention, a method for security verification of an application installation comprises: initiating an application downloading request from an application webpage end, responding the downloading request by an application server end and downloading a target application from the application server end, wherein the target application is obtained by encrypting an original application according to a preset encryption algorithm; after the target application is downloaded, calling an application installation safety inspection system to decrypt the target application according to a preset decryption algorithm, and determining whether the original application can be obtained through restoration; and when the original application is determined to be obtained through reduction, installing the original application.
Further, the step of encrypting the original application according to a preset encryption algorithm includes: acquiring an MD5 value of an original application; converting the MD5 value of the original application into a first byte array; encrypting the first byte array according to a preset algorithm to obtain a second byte array; calculating the length of the second byte array, and splicing the second byte array after the original application to obtain a first encryption application; converting the length of the second byte array into short type data and converting the short type data into a third byte array; and splicing the third byte number group after the first encryption application to obtain a second encryption application, wherein the second encryption application is obtained after encryption.
Further, the step of decrypting the target application according to a preset decryption algorithm and determining whether the original application can be restored comprises the following steps; taking out the last two bytes of the second encryption application, and judging whether the last two bytes can be converted into short type data or not; if the last two bytes cannot be converted into short type data, determining that the original application cannot be obtained through reduction; if the last two bytes can be converted into short type data, deleting the last two bytes of the second encryption application to obtain the first encryption application, determining the value B of the short type data, taking B bytes from the back of the first encryption application, and decrypting the B bytes according to the preset algorithm; and if the decryption is unsuccessful, determining that the original application cannot be restored, and if the decryption is successful, deleting the last 32 bits of the first encrypted application to obtain the original application.
Further, the preset algorithm is an RSA algorithm.
Further, the application webpage end is an application shop end of the intelligent vehicle, the application server end is an application server end of the intelligent vehicle, and the application installation safety inspection system is an on-board controller of the intelligent vehicle.
According to a second aspect of the invention, an electronic device comprises:
a memory for storing a computer program;
a processor for executing the computer program stored in the memory, and when the computer program is executed, implementing any of the methods described above.
According to a third aspect of the invention, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements any of the methods described above.
According to a fourth aspect of the invention, a system for security verification of application installation comprises: the verification unit is used for decrypting the target application according to a preset decryption algorithm after the target application is downloaded, and determining whether the original application can be obtained through restoration; the target application is obtained by encrypting the original application according to a preset encryption algorithm; and the installation unit is used for installing the original application when the original application is restored.
Further, the preset encryption algorithm specifically includes: acquiring an MD5 value of an original application; converting the MD5 value of the original application into a first byte array; encrypting the first byte array according to a preset algorithm to obtain a second byte array; calculating the length of the second byte array, and splicing the second byte array after the original application to obtain a first encryption application; converting the length of the second byte array into short type data and converting the short type data into a third byte array; and splicing the third byte number group after the first encryption application to obtain a second encryption application, wherein the second encryption application is obtained after encryption.
Further, the verification unit is specifically configured to take out the last two bytes of the second encryption application, and determine whether the last two bytes can be converted into short-type data; if the last two bytes cannot be converted into short type data, determining that the original application cannot be obtained through reduction; if the last two bytes can be converted into short type data, deleting the last two bytes of the second encryption application to obtain the first encryption application, determining the value B of the short type data, taking B bytes from the back of the first encryption application, and decrypting the B bytes according to the preset algorithm; and if the decryption is unsuccessful, determining that the original application cannot be restored, and if the decryption is successful, deleting the last 32 bits of the first encrypted application to obtain the original application.
Further, the preset algorithm is an RSA algorithm.
According to a fifth aspect of the present invention, an application server of the present invention comprises: the storage module is used for storing the application obtained by encrypting the original application according to a preset encryption algorithm; and the download response module is used for responding the download request of the application webpage end and issuing the target application to the application webpage end.
Further, the preset encryption algorithm specifically includes: acquiring an MD5 value of an original application; converting the MD5 value of the original application into a first byte array; encrypting the first byte array according to a preset algorithm to obtain a second byte array; calculating the length of the second byte array, and splicing the second byte array after the original application to obtain a first encryption application; converting the length of the second byte array into short type data and converting the short type data into a third byte array; and splicing the third byte number group after the first encryption application to obtain a second encryption application, wherein the second encryption application is obtained after encryption.
The application installation safety inspection method, the application installation safety inspection system and the application server decrypt the target application according to a preset decryption algorithm by calling the application installation safety inspection system, and determine whether the original application can be obtained by restoration; and only when the original application is determined to be restored, the original application is installed, so that the installation of the third-party application can be limited, the system can run more stably, and the method is safe and reliable.
Other characteristic features and advantages of the invention will become apparent from the following description of exemplary embodiments, which is to be read in connection with the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. In the drawings, like reference numerals are used to indicate like elements. The drawings in the following description are directed to some, but not all embodiments of the invention. For a person skilled in the art, other figures can be derived from these figures without inventive effort.
FIG. 1 is a flow diagram of a first embodiment of a method for security verification of an application installation of the present invention;
FIG. 2 is a flow chart of a second embodiment of a method for security verification of an application installation of the present invention;
FIG. 3 is a block diagram of an embodiment of a system for security verification of application installation in accordance with the present invention;
fig. 4 is a block diagram of an application server according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
As shown in fig. 1, the present invention provides a method for security verification of application installation, comprising:
step 101: and initiating an application downloading request from the application webpage end, and responding to the downloading request by the application server end and downloading the target application from the application server end. It should be understood that the target application is an application obtained by encrypting the original application according to a preset encryption algorithm.
Step 102: after the target application is downloaded, calling an application installation safety inspection system to decrypt the target application according to a preset decryption algorithm, and determining whether the original application can be obtained through restoration. The original application is, for example, an unencrypted or encrypted previous original application.
Step 103: and when the original application is determined to be obtained through reduction, installing the original application.
The embodiment of the application installation safety inspection method comprises the steps of decrypting a target application according to a preset decryption algorithm by calling an application installation safety inspection system, and determining whether an unencrypted original application can be obtained through restoration; and only installing the original application when the original application is determined to be restored. Therefore, the embodiment of the invention can realize that the intelligent system limits the installation of the third-party application, so that the system can run more stably, and is safe and reliable.
As shown in fig. 2, the present invention provides an application installation security inspection method, which is a preferred implementation manner of the embodiment of the method shown in fig. 1, and the explanation of the embodiment shown in fig. 1 can be applied to this embodiment, and the application installation security inspection method of this embodiment includes:
step 201: the application A which can be installed in manual review specifically comprises the following steps: the method comprises the following steps that a test maintainer firstly installs and tests a third-party application on an intelligent vehicle machine, so that the third-party application is prevented from influencing the stability of an intelligent system of the vehicle machine, phenomena such as obvious display blockage, flash retreat and the like do not exist in the running process, and the application meeting the requirements of the intelligent vehicle machine system is screened out.
Step 202: and the application server side builds a management background, uploads the matched application and realizes encryption operation. The specific encryption operation is as follows:
firstly, obtaining the MD5 value of each original application, and converting the MD5 value of the original application into byte [ ] (namely a first byte array);
secondly, carrying out RSA2 encryption on the first byte array, acquiring a new byte [ ] (namely, a second byte array), calculating the byte length of the byte [ ] (namely, the second byte array), and splicing the byte [ ] (namely, the second byte array) after the original application to obtain a first encryption application;
and thirdly, converting the length into short type data, converting the short into byte [ ] (namely a third byte array) because the short type data is fixed 2 bytes, and splicing the third byte array after the first encryption application to obtain a final encryption application (namely a second encryption application).
Then, uploading the second encrypted application to an application server end through a management background, adding related application information by background maintenance personnel, and uploading the application; when the user clicks on the online application at the application store end, the application store is responsible for downloading the application. And after the downloading is finished, calling an installation instruction of an application installation safety verification system (such as an on-board controller of the intelligent vehicle) for installation. A series of verification operations are performed prior to installation. The method specifically comprises the following steps:
step 203: firstly, taking out the last two bytes of the downloaded application, converting the last two bytes into short type data, and if the conversion into short type data is successful, carrying out the next installation and verification, namely executingstep 204; if the conversion of the short type data is not successful, then an installation failure is prompted (step 209).
Step 204: removing the last two bytes of the downloaded application to obtain an application a, acquiring a value B of short type data, taking out B bytes from the back of the application a, and then decrypting by using RSA;
step 205, judging whether the decryption is successful, if the decryption is failed, prompting an installation error (step 209); if the decryption is successful, thenext operation 206 is performed.
Step 206: removing the fixed 32-bit length of MD5 from the back of application b to obtain an original application, and comparing the MD5 value of the original application with the MD5 value obtained by RSA decryption instep 204;
step 207: and (4) judging whether the MD5 value of the original application is consistent with the MD5 value obtained by RSA decryption in thestep 204, if so, executing thestep 208, and otherwise, prompting that the installation is failed (step 209).
Step 208: and (4) handing the original application to a system application program for installation, and ending the flow when the installation is successful.
It should be noted that, the installation of the application in the intelligent system needs to perform corresponding security verification on the application, and only trusted applications need to be installed, including but not limited to using the encryption and decryption method (such as RSA algorithm) described above.
In the embodiment, the MD5 value is combined with the RSA algorithm, so that cracking can be effectively prevented, the intelligent system can limit the installation of third-party application, and the system can run more stably. Meanwhile, the encrypted application is spliced by adding bytes, the original application is obtained by deleting partial bytes through a decryption algorithm, safety and reliability are achieved, all encryption processes are that the encrypted bytes are added at the tail of the original application, the corresponding tail bytes are intercepted in the decryption process, the original application cannot be modified, and the running stability of the original application is guaranteed. In addition, through the automatic operation of the application verification mechanism, a user only needs to click the application to download, does not need to pay attention to background verification operation, only installs the allowed application, and can improve the experience of the user in the process of using the system.
As shown in fig. 3, the present invention provides a system for performing security check on application installation, which is a preferred implementation of the application installation security check system in the method embodiments shown in fig. 1 and fig. 2, and the explanation of the embodiments shown in fig. 1 and fig. 2 can be applied to this embodiment, and the application installation security check system of this embodiment includes:
the verification unit 301 is configured to decrypt the target application according to a preset decryption algorithm after the target application is downloaded, and determine whether the original application can be restored; the target application is obtained by encrypting the original application according to a preset encryption algorithm;
an installation unit 302, configured to install the original application when the original application is restored.
In a specific operation, the preset encryption algorithm specifically comprises:
acquiring an MD5 value of an original application;
converting the MD5 value of the original application into a first byte array;
encrypting the first byte array according to a preset algorithm to obtain a second byte array;
calculating the length of the second byte array, and splicing the second byte array after the original application to obtain a first encryption application;
converting the length of the second byte array into short type data and converting the short type data into a third byte array;
and splicing the third byte number group after the first encryption application to obtain a second encryption application, wherein the second encryption application is obtained after encryption.
Preferably, the checking unit 301 is specifically configured to take out the last two bytes of the second encryption application, and determine whether the last two bytes can be converted into short-type data; if the last two bytes cannot be converted into short type data, determining that the original application cannot be obtained through reduction; if the last two bytes can be converted into short type data, deleting the last two bytes of the second encryption application to obtain the first encryption application, determining the value B of the short type data, taking B bytes from the back of the first encryption application, and decrypting the B bytes according to the preset algorithm; and if the decryption is unsuccessful, determining that the original application cannot be restored, and if the decryption is successful, deleting the last 32 bits of the first encrypted application to obtain the original application.
In specific operation, the preset algorithm is an RSA algorithm.
According to the method and the device, the original application is obtained by deleting part of bytes through a decryption algorithm, the method and the device are safe and reliable, all decryption is to intercept corresponding tail bytes, the original application is not modified, the intelligent system can limit the installation of the third-party application, and the system can run more stably. In addition, through the automatic operation of the application verification mechanism, a user only needs to click the application to download, does not need to pay attention to background verification operation, only installs the allowed application, and can improve the experience of the user in the process of using the system.
As shown in fig. 4, the present invention provides an application server, which is a preferred implementation manner of the application server in the method embodiments shown in fig. 1 and fig. 2, and the explanation of the embodiment shown in fig. 1 and fig. 2 can be applied to this embodiment, where the application server of this embodiment includes:
the storage module 401 is configured to store an application obtained by encrypting an original application according to a preset encryption algorithm;
and adownload response module 402, configured to respond to a download request of the application web page, and issue the target application to the application web page.
Preferably, the preset encryption algorithm specifically includes:
acquiring an MD5 value of an original application;
converting the MD5 value of the original application into a first byte array;
encrypting the first byte array according to a preset algorithm to obtain a second byte array;
calculating the length of the second byte array, and splicing the second byte array after the original application to obtain a first encryption application;
converting the length of the second byte array into short type data and converting the short type data into a third byte array;
and splicing the third byte number group after the first encryption application to obtain a second encryption application, wherein the second encryption application is obtained after encryption.
The embodiment can effectively prevent the encryption application from being cracked by combining the MD5 value with the RSA algorithm, is safe and reliable, adds the encryption bytes at the tail of the original application in all encryption processes, does not modify the original application, and ensures the running stability of the original application.
An embodiment of the present invention further provides an electronic device, including:
a memory for storing a computer program;
a processor for executing the computer program stored in the memory, and when the computer program is executed, implementing any of the methods described above.
Embodiments of the present invention also provide a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements any of the methods described above.
The above-described aspects may be implemented individually or in various combinations, and such variations are within the scope of the present invention.
Finally, it should be noted that: the above examples are only for illustrating the technical solutions of the present invention, and are not limited thereto. Although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

CN201911375646.7A2019-12-272019-12-27Method and system for carrying out security inspection on application installation and application serverPendingCN111177707A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201911375646.7ACN111177707A (en)2019-12-272019-12-27Method and system for carrying out security inspection on application installation and application server

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911375646.7ACN111177707A (en)2019-12-272019-12-27Method and system for carrying out security inspection on application installation and application server

Publications (1)

Publication NumberPublication Date
CN111177707Atrue CN111177707A (en)2020-05-19

Family

ID=70650413

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201911375646.7APendingCN111177707A (en)2019-12-272019-12-27Method and system for carrying out security inspection on application installation and application server

Country Status (1)

CountryLink
CN (1)CN111177707A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6675201B1 (en)*1999-03-032004-01-06Nokia Mobile Phones Ltd.Method for downloading software from server to terminal
CN101090452A (en)*2007-07-182007-12-19中国网络通信集团公司 Set-top box software upgrade method and upgrade system
CN102082784A (en)*2010-11-112011-06-01广东欧珀电子工业有限公司 A method for online software upgrade
US20140068598A1 (en)*2012-08-302014-03-06Sony CorporationInformation processing apparatus, information processing method, and program
CN108304722A (en)*2017-12-212018-07-20广州小鹏汽车科技有限公司A kind of software installation packet and its generation method, upgrade method and system
CN109840395A (en)*2017-11-242019-06-04航天信息股份有限公司A kind of method and system based on Java card downloading application program
CN110135149A (en)*2019-05-132019-08-16深圳大趋智能科技有限公司A kind of method and relevant apparatus of application installation

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6675201B1 (en)*1999-03-032004-01-06Nokia Mobile Phones Ltd.Method for downloading software from server to terminal
CN101090452A (en)*2007-07-182007-12-19中国网络通信集团公司 Set-top box software upgrade method and upgrade system
CN102082784A (en)*2010-11-112011-06-01广东欧珀电子工业有限公司 A method for online software upgrade
US20140068598A1 (en)*2012-08-302014-03-06Sony CorporationInformation processing apparatus, information processing method, and program
CN109840395A (en)*2017-11-242019-06-04航天信息股份有限公司A kind of method and system based on Java card downloading application program
CN108304722A (en)*2017-12-212018-07-20广州小鹏汽车科技有限公司A kind of software installation packet and its generation method, upgrade method and system
CN110135149A (en)*2019-05-132019-08-16深圳大趋智能科技有限公司A kind of method and relevant apparatus of application installation

Similar Documents

PublicationPublication DateTitle
US10754634B1 (en)Customized application package with context specific token
US10157050B2 (en)Method for confirming correction program and information processing apparatus
CN104573435A (en)Method for terminal authority management and terminal
CN107797854B (en)Transaction file processing method and device, storage medium and computer equipment
CN112231702B (en) Application protection method, device, equipment and medium
CN107038353B (en)Software program checking protection method and system
CN113849212B (en)Software upgrading control method and device and electronic equipment
CN106709281B (en)Patch granting and acquisition methods, device
CN107786520B (en) Method and system for controlling resource access
CN114168108A (en) Code merging method, apparatus, electronic device, and computer-readable storage medium
CN110069415B (en)Software integrity checking and software testing method used in software testing process
CN111835504B (en)Identification code generation method and server
CN111338674A (en)Instruction processing method, device and equipment
CN109033818B (en)Terminal, authentication method, and computer-readable storage medium
CN104572169B (en)A kind of software distribution and installation system based on UEFI
CN111177707A (en)Method and system for carrying out security inspection on application installation and application server
CN117914588A (en)Data encryption method, data decryption method, device and storage medium
CN115185551A (en)Application program installation method, device, system and storage medium
CN107295078A (en)A kind of patch distribution tracking and control system and method
CN112464225A (en)Request processing method, request processing device and computer readable storage medium
CN118646595B (en)Method, equipment and storage medium for repairing server to avoid secret mutual trust
CN115421779B (en)Object storage method and device, electronic equipment and computer readable storage medium
CN105320853B (en)Information monitoring method and device and terminal
CN114268624B (en)Version file transmission method and device and server
CN114245183B (en)Push data authentication method and device

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
AD01Patent right deemed abandoned

Effective date of abandoning:20230825

AD01Patent right deemed abandoned

[8]ページ先頭

©2009-2025 Movatter.jp