CN103441848A - Application authentication method and system of mobile terminal - Google Patents
Application authentication method and system of mobile terminal Download PDFInfo
- Publication number
- CN103441848A CN103441848A CN201310360462XA CN201310360462A CN103441848A CN 103441848 A CN103441848 A CN 103441848A CN 201310360462X A CN201310360462X A CN 201310360462XA CN 201310360462 A CN201310360462 A CN 201310360462A CN 103441848 A CN103441848 A CN 103441848A
- Authority
- CN
- China
- Prior art keywords
- application
- signature
- legal
- mobile terminal
- authentication result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an application authentication method of a mobile terminal. The method comprises the steps of acquiring the name of an application installed in the mobile terminal, extracting a signature file from an installation folder of the application, acquiring enciphered data in the signature file, obtaining the signature of the application, searching for a preset genuine application signature set according to the name of the application, and comparing the signature of the application with the genuine signature to obtain an authentication result. The invention further provides an application authentication system of the mobile terminal. The application authentication system of the mobile terminal is capable of confirming whether the application installed in the mobile terminal is genuine fast.
Description
Technical field
The present invention relates to the application authorization technical field, particularly relate to a kind of application authentication method of mobile terminal, and a kind of application authorization system of mobile terminal.
Background technology
At present, various built-in ROM, software store on smart mobile phone market, dragons and fishes jumbled together for software market, and the good and the bad differs, and is difficult to fail safe, the reliability of third party's application are checked, can't ensure user's mobile phone safety.The malicious application of the overwhelming majority all can be carried out various malicious acts, makes many users therefore suffer the puzzlement of privacy and loss economically, therefore needs whether correctly identification software is legal official software badly, the technology of protection handset safety.
Summary of the invention
Based on this, the invention provides a kind of application authentication method of mobile terminal, whether legally can detect rapidly in mobile terminal mounted application.
A kind of application authentication method of mobile terminal, comprise the steps:
Obtain the title that application has been installed in mobile terminal, and extract signature file from the installation folder of application, obtain the enciphered data in signature file, the signature be applied;
The legal application signature collection of presetting according to the name lookup of described application, mated the signature of described application and legal signature, obtains authentication result.
A kind of application authorization system of mobile terminal comprises:
The first acquisition module, installed the title of application, and extracted signature file from the installation folder of application for obtaining mobile terminal, obtain the enciphered data in signature file, the signature be applied;
The first inspection module, the legal application signature collection of presetting for the name lookup according to described application, mated the signature of described application and legal signature, obtains authentication result.
The application authentication method of above-mentioned mobile terminal and system, by obtaining title and the signature that application has been installed in mobile terminal, be preset with legal application signature collection simultaneously, legal application signature is concentrated and is prestored a plurality of Apply Nameses commonly used, and corresponding legal copy signature, to be mated from the signature of acquisition for mobile terminal the authentication result that can be applied with legal signature; The present invention, by default legal application signature collection, can check whether application is legal rapidly, ensures the fail safe of mobile terminal.
The accompanying drawing explanation
The application authentication method that Fig. 1 is mobile terminal of the present invention schematic flow sheet in one embodiment.
The application authorization system structural representation in one embodiment that Fig. 2 is mobile terminal of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited to this.
As shown in Figure 1, the schematic flow sheet for the application authentication method of a kind of mobile terminal of the present invention, comprise the steps:
S11, obtain the title that application has been installed in mobile terminal, and extract signature file from the installation folder of application, obtain the enciphered data in signature file, the signature be applied;
S12, the legal application signature collection of presetting according to the name lookup of described application, mated the signature of described application and legal signature, obtains authentication result;
The identify label that the signature of application is application developer, all application programs that are installed to system all must be through digital certificate signature, in the application development stage, the developer comes to the program signature by the digital certificate generated with a suitable private key, and private key is kept in the hand of program developer; The mechanism that the present embodiment is relevant by digital certificate is added a cover digital certificate to application, and this digital certificate does not need authoritative digital certificate signature mechanism to authenticate, and it just is used for allowing the installation folder of scanning application of application package self identity;
The present embodiment allly in mobile terminal has been installed application by detecting, and obtains the title of application, reads the installation folder of each application, extracts signature file from installation folder, obtains the enciphered data in signature file, obtains the signature of described application;
Legal application signature is concentrated and is prestored a plurality of Apply Nameses commonly used, and corresponding legal copy signature; The legal copy of applying reads after legal copy is applied the signing messages in installation kit and obtains signing and can downloading legal application from the official website of each application;
According to the title of application has been installed in the mobile terminal got, search legal application signature collection, obtain this and apply corresponding legal copy signature, with the signature obtained from mobile terminal, mated, obtain the authentication result of this application; If with legal signatures match, can judge that this is applied as legal application, if do not mate, can judge that this is applied as non-legal application.
Above-mentioned legal application signature collection can be pre-stored in mobile terminal, and processing procedure can be arranged in mobile terminal carries out, and can identify rapidly the application in mobile terminal.
In a preferred embodiment, whether above-mentioned is that legal checkout procedure can be arranged on Cloud Server and processed to application, to reduce taking up room of mobile terminal; Its processing procedure can be as follows:
After the step of the described title of obtaining application and signature, described mobile terminal is committed to high in the clouds by the title of application and signature;
The legal application signature collection that described high in the clouds is default according to the name lookup of described application, mated the signature of described application and legal signature, obtains authentication result and return to described user side;
Wherein, described the signature of described application and legal signature are mated, the step that obtains authentication result and return to described mobile terminal is:
If the signature of described application and legal signatures match, be applied as legal authentication result, return to described mobile terminal;
If the signature of described application does not mate with legal signature, be applied as the authentication result of non-legal copy, when returning to described authentication result, push legal application download link to described mobile terminal;
After finding non-legal application, in the time of the return authentication result, push legal application download link to described mobile terminal, for the user, select whether to download to replace the non-legal application in mobile terminal, further ensure the fail safe of mobile terminal.
In a preferred embodiment, legal application signature collection can be arranged on Cloud Server, to reduce taking up room of mobile terminal; After the title of obtaining application and signature thereof, described mobile terminal is committed to high in the clouds by the title of application;
The legal application signature collection that described high in the clouds is default according to the name lookup of described application, return to described mobile terminal by the legal copy of described application signature;
Described mobile terminal is mated the legal copy of the signature of described application and described application signature, obtains authentication result.
In a preferred embodiment, in the name lookup according to described application during default legal application signature collection, if search less than described Apply Names, according to described Apply Names, pass through the official website of the described application of search engine retrieving, obtain its legal signature after downloading legal application, upgrade described default legal application signature collection; In the present embodiment, concentrate Apply Names and the signature of not storage for legal application signature, by the method for network search, retrieve in the ,Cong official website, official website of this application and download legal application, legal application signature collection upgrades in time.
As shown in Figure 2, the present invention also provides a kind of application authorization system of mobile terminal, comprising:
The first acquisition module 21, installed the title of application, and extracted signature file from the installation folder of application for obtaining mobile terminal, obtain the enciphered data in signature file, the signature be applied;
The first inspection module 22, the legal application signature collection of presetting for the name lookup according to described application, mated the signature of described application and legal signature, obtains authentication result;
The identify label that the signature of application is application developer, all application programs that are installed to system all must be through digital certificate signature, in the application development stage, the developer comes to the program signature by the digital certificate generated with a suitable private key, and private key is kept in the hand of program developer; The mechanism that the present embodiment is relevant by digital certificate is added a cover digital certificate to application, and this digital certificate does not need authoritative digital certificate signature mechanism to authenticate, and it just is used for allowing the installation folder of scanning application of application package self identity;
The present embodiment allly in mobile terminal has been installed application by detecting, and obtains the title of application, reads the installation folder of each application, extracts signature file from installation folder, obtains the enciphered data in signature file, obtains the signature of described application;
Legal application signature is concentrated and is prestored a plurality of Apply Nameses commonly used, and corresponding legal copy signature; The legal copy of applying is signed and can, from legal application is downloaded in the website, official website of each application, be read after legal copy is applied the signing messages in installation kit and obtain;
According to the title of application has been installed in the mobile terminal got, search legal application signature collection, obtain this and apply corresponding legal copy signature, with the signature obtained from mobile terminal, mated, obtain the authentication result of this application; If with legal signatures match, can judge that this is applied as legal application, if do not mate, can judge that this is applied as non-legal application.
Above-mentioned legal application signature collection can be pre-stored in mobile terminal, and processing procedure can be arranged in mobile terminal carries out, and can identify rapidly the application in mobile terminal.
In a preferred embodiment, can comprise mobile terminal and high in the clouds;
Described mobile terminal also comprises the first submission module, and for described the first acquisition module, after the described title of obtaining application and signature, described first submits to module for the title of application and signature are committed to high in the clouds;
Described high in the clouds comprises checking returns to module, and the legal application signature collection of presetting for the name lookup according to described application is mated the signature of described application and legal signature, obtains authentication result and returns to described mobile terminal.
Wherein, the check in described high in the clouds return module also for:
If the signature of described application and legal signatures match, be applied as legal authentication result, return to described mobile terminal;
If the signature of described application does not mate with legal signature, be applied as the authentication result of non-legal copy, when returning to described authentication result, push legal application download link to described mobile terminal;
After finding non-legal application, in the time of the return authentication result, push legal application download link to described mobile terminal, for the user, select whether to download to replace the non-legal application in mobile terminal, further ensure the fail safe of mobile terminal.
In a preferred embodiment, comprise mobile terminal and high in the clouds;
Described mobile terminal comprises the second submission module, and after the title obtaining application and signature thereof, described mobile terminal is committed to high in the clouds by the title of application;
Described high in the clouds comprises that signature returns to module, and the legal application signature collection of presetting for the name lookup according to described application returns to described mobile terminal by the legal copy of described application signature;
Described mobile terminal comprises the second inspection module, for the legal copy of the signature by described application and described application, signs and is mated, and obtains authentication result.
In a preferred embodiment, described high in the clouds also comprises update module, while being used for the legal application signature collection default in the name lookup according to described application, if search less than described Apply Names, according to described Apply Names, pass through the official website of the described application of search engine retrieving, obtain its legal signature after downloading legal application, upgrade described default legal application signature collection; In the present embodiment, concentrate Apply Names and the signature of not storage for legal application signature, by the method for network search, retrieve in the ,Cong official website, official website of this application and download legal application, legal application signature collection upgrades in time.
The application authentication method of mobile terminal of the present invention and system, by obtaining title and the signature that application has been installed in mobile terminal, be preset with legal application signature collection simultaneously, legal application signature is concentrated and is prestored a plurality of Apply Nameses commonly used, and corresponding legal copy signature, to be mated from the signature of acquisition for mobile terminal the authentication result that can be applied with legal signature; The present invention, by default legal application signature collection, can check whether application is legal rapidly, ensures the fail safe of mobile terminal.
The above embodiment has only expressed several execution mode of the present invention, and it describes comparatively concrete and detailed, but can not therefore be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, without departing from the inventive concept of the premise, can also make some distortion and improvement, these all belong to protection scope of the present invention.Therefore, the protection range of patent of the present invention should be as the criterion with claims.
Claims (10)
1. the application authentication method of a mobile terminal, is characterized in that, comprises the steps:
Obtain the title that application has been installed in mobile terminal, and extract signature file from the installation folder of application, obtain the enciphered data in signature file, the signature be applied;
The legal application signature collection of presetting according to the name lookup of described application, mated the signature of described application and legal signature, obtains authentication result.
2. the application authentication method of mobile terminal according to claim 1, is characterized in that,
After the step of the described title of obtaining application and signature, described mobile terminal is committed to high in the clouds by the title of application and signature;
The legal application signature collection that described high in the clouds is default according to the name lookup of described application, mated the signature of described application and legal signature, obtains authentication result and return to described mobile terminal.
3. the application authentication method of mobile terminal according to claim 2, is characterized in that, described the signature of described application and legal signature mated, and the step that obtains authentication result and return to described mobile terminal is:
If the signature of described application and legal signatures match, be applied as legal authentication result, return to described mobile terminal;
If the signature of described application does not mate with legal signature, be applied as the authentication result of non-legal copy, when returning to described authentication result, push legal application download link to described mobile terminal.
4. the application authentication method of mobile terminal according to claim 1, is characterized in that, after the title of obtaining application and signature thereof, described mobile terminal is committed to high in the clouds by the title of application;
The legal application signature collection that described high in the clouds is default according to the name lookup of described application, return to described mobile terminal by the legal copy of described application signature;
Described mobile terminal is mated the legal copy of the signature of described application and described application signature, obtains authentication result.
5. according to the application authentication method of claim 3 or 4 described mobile terminals, it is characterized in that, in the name lookup according to described application during default legal application signature collection, if search less than described Apply Names, according to described Apply Names, pass through the official website of the described application of search engine retrieving, obtain its legal signature after downloading legal application, upgrade described default legal application signature collection.
6. the application authorization system of a mobile terminal, is characterized in that, comprising:
The first acquisition module, installed the title of application, and extracted signature file from the installation folder of application for obtaining mobile terminal, obtain the enciphered data in signature file, the signature be applied;
The first inspection module, the legal application signature collection of presetting for the name lookup according to described application, mated the signature of described application and legal signature, obtains authentication result.
7. the application authorization system of mobile terminal according to claim 6, is characterized in that, comprises mobile terminal and high in the clouds;
Described mobile terminal comprises described the first acquisition module, also comprises the first submission module, and for described the first acquisition module, after the described title of obtaining application and signature, described first submits to module for the title of application and signature are committed to high in the clouds;
Described high in the clouds comprises checking returns to module, and the legal application signature collection of presetting for the name lookup according to described application is mated the signature of described application and legal signature, obtains authentication result and returns to described mobile terminal.
8. the application authorization system of mobile terminal according to claim 7, is characterized in that, the check in described high in the clouds return module also for:
If the signature of described application and legal signatures match, be applied as legal authentication result, return to described mobile terminal;
If the signature of described application does not mate with legal signature, be applied as the authentication result of non-legal copy, when returning to described authentication result, push legal application download link to described mobile terminal.
9. the application authorization system of mobile terminal according to claim 8, is characterized in that, comprises mobile terminal and high in the clouds;
Described mobile terminal comprises the second submission module, and after the title obtaining application and signature thereof, described mobile terminal is committed to high in the clouds by the title of application;
Described high in the clouds comprises that signature returns to module, and the legal application signature collection of presetting for the name lookup according to described application returns to described mobile terminal by the legal copy of described application signature;
Described mobile terminal comprises the second inspection module, for the legal copy of the signature by described application and described application, signs and is mated, and obtains authentication result.
10. the application authorization system of mobile terminal according to claim 8 or claim 9, it is characterized in that, described high in the clouds also comprises update module, while being used for the legal application signature collection default in the name lookup according to described application, if search less than described Apply Names, according to described Apply Names, pass through the official website of the described application of search engine retrieving, download after legal copy is applied and obtain its legal signature, upgrade described default legal application signature collection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310360462XA CN103441848A (en) | 2013-08-16 | 2013-08-16 | Application authentication method and system of mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310360462XA CN103441848A (en) | 2013-08-16 | 2013-08-16 | Application authentication method and system of mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103441848A true CN103441848A (en) | 2013-12-11 |
Family
ID=49695517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310360462XA Pending CN103441848A (en) | 2013-08-16 | 2013-08-16 | Application authentication method and system of mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103441848A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104133832A (en) * | 2014-05-15 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Pirate application identification method and device |
CN104298522A (en) * | 2014-09-22 | 2015-01-21 | 联想(北京)有限公司 | Information processing method and first electronic device |
CN104392168A (en) * | 2014-11-27 | 2015-03-04 | 上海斐讯数据通信技术有限公司 | Application program verification method |
CN104951675A (en) * | 2014-03-31 | 2015-09-30 | 北京金山网络科技有限公司 | Pirate application recognition method and system |
CN105447377A (en) * | 2014-08-22 | 2016-03-30 | 中国移动通信集团公司 | Method and apparatus for dynamically adjusting terminal enterprise domain applications |
CN105488361A (en) * | 2015-11-20 | 2016-04-13 | 北京奇虎科技有限公司 | Pirate application detection method, device and system |
WO2016062199A1 (en) * | 2014-10-21 | 2016-04-28 | 阿里巴巴集团控股有限公司 | Method, apparatus, client, server, and system for checking security of account |
CN107330321A (en) * | 2017-07-21 | 2017-11-07 | 广东欧珀移动通信有限公司 | One kind application installation method, mobile terminal and computer-readable recording medium |
CN109660353A (en) * | 2018-12-12 | 2019-04-19 | 新华三技术有限公司 | A kind of application program installation method and device |
CN110399135A (en) * | 2018-06-05 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of method and device for installing application program |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333122A (en) * | 2011-09-28 | 2012-01-25 | 奇智软件(北京)有限公司 | Downloaded resource provision method, device and system |
US20120240236A1 (en) * | 2008-10-21 | 2012-09-20 | Lookout, Inc. | Crawling multiple markets and correlating |
CN102843681A (en) * | 2012-08-15 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Information interaction method and information interaction device |
CN102891843A (en) * | 2012-09-18 | 2013-01-23 | 北京深思洛克软件技术股份有限公司 | Method for authorizing application program at android client side through local service unit |
CN103092653A (en) * | 2013-01-16 | 2013-05-08 | 珠海市君天电子科技有限公司 | Method and device capable of providing official application program in application market |
CN103198243A (en) * | 2013-03-12 | 2013-07-10 | 百度在线网络技术(北京)有限公司 | Method and device for identifying emulational application programs |
-
2013
- 2013-08-16 CN CN201310360462XA patent/CN103441848A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120240236A1 (en) * | 2008-10-21 | 2012-09-20 | Lookout, Inc. | Crawling multiple markets and correlating |
CN102333122A (en) * | 2011-09-28 | 2012-01-25 | 奇智软件(北京)有限公司 | Downloaded resource provision method, device and system |
CN102843681A (en) * | 2012-08-15 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Information interaction method and information interaction device |
CN102891843A (en) * | 2012-09-18 | 2013-01-23 | 北京深思洛克软件技术股份有限公司 | Method for authorizing application program at android client side through local service unit |
CN103092653A (en) * | 2013-01-16 | 2013-05-08 | 珠海市君天电子科技有限公司 | Method and device capable of providing official application program in application market |
CN103198243A (en) * | 2013-03-12 | 2013-07-10 | 百度在线网络技术(北京)有限公司 | Method and device for identifying emulational application programs |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104951675A (en) * | 2014-03-31 | 2015-09-30 | 北京金山网络科技有限公司 | Pirate application recognition method and system |
CN104951675B (en) * | 2014-03-31 | 2018-05-08 | 北京金山网络科技有限公司 | A kind of method and system for identifying pirate application |
CN104133832A (en) * | 2014-05-15 | 2014-11-05 | 腾讯科技(深圳)有限公司 | Pirate application identification method and device |
CN104133832B (en) * | 2014-05-15 | 2016-07-13 | 腾讯科技(深圳)有限公司 | The recognition methods of pirate application and device |
CN105447377B (en) * | 2014-08-22 | 2018-07-27 | 中国移动通信集团公司 | A kind of method and device of dynamic adjustment terminal enterprise domain application program |
CN105447377A (en) * | 2014-08-22 | 2016-03-30 | 中国移动通信集团公司 | Method and apparatus for dynamically adjusting terminal enterprise domain applications |
CN104298522A (en) * | 2014-09-22 | 2015-01-21 | 联想(北京)有限公司 | Information processing method and first electronic device |
CN104298522B (en) * | 2014-09-22 | 2018-08-31 | 联想(北京)有限公司 | A kind of information processing method and the first electronic equipment |
WO2016062199A1 (en) * | 2014-10-21 | 2016-04-28 | 阿里巴巴集团控股有限公司 | Method, apparatus, client, server, and system for checking security of account |
CN104392168A (en) * | 2014-11-27 | 2015-03-04 | 上海斐讯数据通信技术有限公司 | Application program verification method |
CN105488361B (en) * | 2015-11-20 | 2018-09-25 | 北京奇虎科技有限公司 | Piracy applies detection method and device, system |
CN105488361A (en) * | 2015-11-20 | 2016-04-13 | 北京奇虎科技有限公司 | Pirate application detection method, device and system |
CN107330321A (en) * | 2017-07-21 | 2017-11-07 | 广东欧珀移动通信有限公司 | One kind application installation method, mobile terminal and computer-readable recording medium |
CN110399135A (en) * | 2018-06-05 | 2019-11-01 | 腾讯科技(深圳)有限公司 | A kind of method and device for installing application program |
CN110399135B (en) * | 2018-06-05 | 2021-08-03 | 腾讯科技(深圳)有限公司 | Method and device for installing application program |
CN109660353A (en) * | 2018-12-12 | 2019-04-19 | 新华三技术有限公司 | A kind of application program installation method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103441848A (en) | Application authentication method and system of mobile terminal | |
US11188635B2 (en) | File authentication method and apparatus | |
CN104715196B (en) | The Static Analysis Method and system of smart mobile phone application program | |
CN104468531B (en) | The authorization method of sensitive data, device and system | |
US9571474B2 (en) | Method for providing a service based on tag information, and corresponding tag and tag reading device | |
US10231124B2 (en) | Anti-theft method and client for a mobile terminal | |
US11165793B2 (en) | Method and system for detecting credential stealing attacks | |
RU2008141089A (en) | APPLICATION AUTHENTICATION | |
CN107026836B (en) | Service implementation method and device | |
US20140258128A1 (en) | Method for managing fund security and mobile terminal | |
CN105554137B (en) | A kind of standby system and method | |
CN105763520A (en) | Network account password recovery method and device, client terminal device and server | |
CN107113614B (en) | Method and system for remotely handling SIM card | |
US10621335B2 (en) | Method and device for verifying security of application | |
CN107301343A (en) | Secure data processing method, device and electronic equipment | |
WO2017067381A1 (en) | Payment method, terminal and payment server | |
US20160360401A1 (en) | Fingerprint based communication terminal and method, server and method thereof | |
CN111062256B (en) | Data extraction and input method and device | |
CN106559419A (en) | The application and identification method and identification terminal of short message verification code | |
CN112818352B (en) | Database detection method and device, storage medium and electronic device | |
CN103973652A (en) | Login method and login system | |
US20130102285A1 (en) | Mobile communication terminal, startup method thereof, and network communication system | |
CN103001934A (en) | Terminal application login method and terminal application login system | |
CN106503527A (en) | A kind of method and apparatus of electronic document fingerprint signature | |
CN103246846A (en) | Method and device for detecting safety of customized ROM (read only memory) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20131211 |