[go: up one dir, main page]

CN101179378B - Method and system for executing plug-in unit - Google Patents

Method and system for executing plug-in unit Download PDF

Info

Publication number
CN101179378B
CN101179378B CN200610167677XA CN200610167677A CN101179378B CN 101179378 B CN101179378 B CN 101179378B CN 200610167677X A CN200610167677X A CN 200610167677XA CN 200610167677 A CN200610167677 A CN 200610167677A CN 101179378 B CN101179378 B CN 101179378B
Authority
CN
China
Prior art keywords
unit
plug
sign
document table
hash algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN200610167677XA
Other languages
Chinese (zh)
Other versions
CN101179378A (en
Inventor
伍海君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Tencent Cloud Computing Beijing Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN200610167677XA priority Critical patent/CN101179378B/en
Publication of CN101179378A publication Critical patent/CN101179378A/en
Application granted granted Critical
Publication of CN101179378B publication Critical patent/CN101179378B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for executing a plug-in, which ensures that a digital certificate is not needed for the publishing and downloading of the plug-in. The method of the invention comprises the following steps: the plug-in and a first abstract of the plug-in are published on a server and the first abstract is obtained by utilizing the encryption algorithm; a user terminal downloads the plug-in and the first abstract from the server and utilizes the encryption algorithm to obtain a second abstract of the plug-in; when the second abstract is the same with the first abstract, the plug-in is executed. The invention also discloses a system for executing the plug-in. The invention is used for executing the plug-in, simplifies the process of publishing and downloading the plug-in and lowers the cost.

Description

A kind of method and system of carrying out plug-in unit
Technical field
The present invention relates to networking technology area, relate in particular to a kind of method and system of carrying out plug-in unit.
Background technology
The software developer design a kind of have new functional programs module after, need this plug-in unit is issued on a website, during prior art issue plug-in unit; After plug-in card program is developed to the ActiveX plug-in unit and obtains digital certificate, said plug-in unit is carried out digital signature, again the plug-in unit after the digital signature is embedded the WEB webpage and issue through said digital certificate; Wherein, Said ActiveX plug-in unit also is called object linking and embedding (OLE, Object Linking and Embedding) control or OLE expansion (OCX, OLE Control Extension) control; It is some component softwares, can these component softwares be inserted in WEB webpage or other application program.
The plug-in unit of user terminal downloads must all be through the plug-in unit after the described digital certificate signature; And said digital certificate is issued by authoritative institution; Before the issue plug-in unit, need the application digital certificate; And need pay certain expense to this mechanism, and the time that the wait digital certificate issues is generally longer.
Correspondingly, user terminal downloads adopts the plug-in unit after the digital certificate signature, and utilizes this digital certificate that the plug-in unit of being downloaded is carried out verification.
Summary of the invention
The invention provides a kind of method and system of carrying out plug-in unit, make the issue of plug-in unit and downloading process not need digital certificate.
The inventive method comprises step:
First summary of plug-in unit and this plug-in unit is distributed on the server, and said first summary utilizes hash algorithm to obtain, and said server is the server with the restriction of writing;
User terminal is downloaded said plug-in unit and said first summary from said server, utilizes said hash algorithm to obtain second summary of said plug-in unit;
When said second summary is identical with said first summary, carry out said plug-in unit;
Said first summary is encrypted;
Said user terminal when carrying out said plug-in unit once more, utilizes hash algorithm to obtain the 3rd summary of said plug-in unit, deciphers said first summary, afterwards first makes a summary when identical when said the 3rd summary and said deciphering, carries out said plug-in unit.
Be provided with the document table of encryption in advance at said user terminal, comprise the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract.
The step that said first summary is encrypted comprises:
Decipher said document table;
Said plug-in unit sign and corresponding said first summary of this sign are write said document table;
Encrypt said document table and preserve this document abstract.
The step of carrying out said plug-in unit once more comprises:
Said user terminal obtains the 3rd summary of said plug-in unit through hash algorithm, deciphers said document table, and obtains and corresponding first summary of said sign through said sign, makes a summary when identical when this first summary and the said the 3rd, carries out said plug-in unit.
When in the said document table with corresponding first summary of said sign and said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
System of the present invention comprises:
Server is used to issue first of plug-in unit and this plug-in unit and makes a summary, and said first summary utilizes hash algorithm to obtain, and said server is the server with the restriction of writing;
User terminal is used for downloading said plug-in unit and said first summary from said server, utilizes said hash algorithm to obtain second summary of said plug-in unit; When this second summary is identical with said first summary, carries out said plug-in unit, and said first summary is encrypted; When carrying out said plug-in unit once more, utilize hash algorithm to obtain the 3rd summary of said plug-in unit, decipher said first summary; When said the 3rd summary is identical with said deciphering back first summary, carry out said plug-in unit.
Said user terminal comprises:
Download unit is used for downloading said plug-in unit and said first summary from said server;
Verification unit; Be used to utilize hash algorithm to obtain second summary of said plug-in unit; And relatively whether this second summary is identical with said first summary; When said second summary is identical with said first summary, send triggering signal to said performance element, and when carrying out said plug-in unit once more; Utilize hash algorithm to obtain the 3rd summary of said plug-in unit; Decipher said first summary, when said the 3rd summary is identical with said deciphering back first summary, send triggering signal to said performance element;
Encrypt the first summary unit, be used for when said second summary is identical with said first summary, said first summary being encrypted;
Performance element when being used to receive said triggering signal, is carried out said plug-in unit.
Said verification unit comprises:
Relatively second summary and the first summary unit is used to utilize hash algorithm to obtain second summary of said plug-in unit, when said second summary is identical with said first summary, sends triggering signal to sending the triggering signal unit;
Relatively the 3rd make a summary and the first summary unit; When being used for carrying out once more said plug-in unit, utilize hash algorithm to obtain the 3rd summary of said plug-in unit, decipher said first summary; When said the 3rd summary is identical with said deciphering back first summary, send triggering signal to sending the triggering signal unit;
Send the triggering signal unit, be used to receive said triggering signal after, send triggering signal to said performance element.
Said comparison the 3rd summary comprises with the first summary unit:
The 3rd summary unit when being used for carrying out once more said plug-in unit, utilizes hash algorithm to obtain the 3rd summary of said plug-in unit;
Decipher the first summary unit, be used to decipher said first summary;
Send signal element, be used for when said the 3rd summary is identical with said deciphering back first summary, sending triggering signal to sending the triggering signal unit.
Said user terminal also comprises:
Memory cell is used for the document table of storage encryption in advance, comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract.
Said user terminal also comprises:
Encrypt file abstract unit is used for when said second summary is identical with said first summary, deciphering said document table, and the sign of said plug-in unit and first summary of this sign correspondence are write said document table, encrypts said document table.
The said deciphering first summary unit is used to decipher said document table, obtains and corresponding first summary of said sign through said sign.
Said user terminal also comprises:
Delete cells, be used for when said document table with corresponding first summary of said sign, with said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
The present invention is distributed on the server through first summary with plug-in unit and this plug-in unit; Said first summary utilizes AES to obtain, and user terminal is downloaded said plug-in unit and said first summary from said server, utilizes said AES to obtain second summary of said plug-in unit; When said second summary is identical with said first summary; Carry out the technical scheme of said plug-in unit, the plug-in unit that user terminal is downloaded the time does not need the digital signature of digital certificate in issue; Simplify the issue and the downloading process of plug-in unit, practiced thrift cost.
Description of drawings
Fig. 1 is the schematic flow sheet of the inventive method;
Fig. 2 is the schematic flow sheet of the inventive method specific embodiment;
Fig. 3 is the structural representation of system of the present invention specific embodiment.
Embodiment
Core concept of the present invention is: the method for execution plug-in unit of the present invention comprises the issue of plug-in unit, download and implementation; Summary through AES acquisition plug-in unit is distributed on said plug-in unit and said summary on the server, and wherein, said server has the authority of writing, and has guaranteed the issue fail safe of said plug-in unit; The summary of the said plug-in unit of user terminal downloads and this plug-in unit; Utilize hash algorithm to obtain the summary of said plug-in unit, when the summary of this summary and said download is identical, carry out said plug-in unit; The plug-in unit that user terminal is downloaded; The time do not need the digital signature of digital certificate in issue, simplified the issue and the downloading process of plug-in unit, practiced thrift cost;
Wherein, be provided with the document table in advance at said user terminal, this document abstract is through a password encryption, comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract;
The step that the summary of this plug-in unit is encrypted comprises:
Through the said document table of said password to decipher;
The summary of the plug-in unit of said plug-in unit sign and this sign correspondence is write said document table;
Through the said document table of said password encryption and preserve this document abstract;
In addition; After the summary of said plug-in unit encrypted, when carrying out said plug-in unit once more, said user terminal obtained the summary of said plug-in unit through hash algorithm; Through the said document table of said password to decipher; And obtain and the corresponding summary of said sign through said sign, when the summary of this summary and said said plug-in unit through the hash algorithm acquisition is identical, carry out said plug-in unit.
Referring to Fig. 1, the method for carrying out plug-in unit in the embodiment of the invention comprises:
S101, first summary of plug-in unit and this plug-in unit is distributed on the server, said first summary utilizes AES to obtain;
Said algorithm is a hash algorithm;
S102, user terminal are downloaded said plug-in unit and said first summary from said server, utilize said AES to obtain second summary of said plug-in unit;
Wherein, said second summary is the summary through the said plug-in unit of hash algorithm acquisition;
Preferably, said user terminal is through the sign of said plug-in unit, and search this locality and whether exist with this and identify corresponding plug-in unit, when not existing this to identify pairing plug-in unit, said plug-in unit of said user terminal downloads and said first summary;
Employed hash algorithm was identical when the issue plug-in unit was made a summary on the said hash algorithm that said user terminal adopts and the said server;
S103, make a summary when identical, carry out said plug-in unit when said second summary and said first;
Preferably, when said second summary is identical with said first summary, said first summary is encrypted, said encryption is that user terminal is encrypted said first summary through a password default;
Preferably, be provided with the document table of encryption in advance, comprise the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract at said user terminal;
The step of so, said first summary being encrypted comprises:
Decipher said document table;
Said plug-in unit sign and corresponding said first summary of this sign are write said document table;
Encrypt said document table and preserve this document abstract;
In addition, after the summary of said plug-in unit encrypted, the step of carrying out said plug-in unit once more comprised:
Said user terminal obtains the 3rd summary of said plug-in unit through hash algorithm, deciphers said document table, and obtains and corresponding first summary of said sign through said sign, makes a summary when identical when this first summary and the said the 3rd, carries out said plug-in unit;
When in the said document table with corresponding first summary of said sign and said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
As shown in Figure 2, the method for user terminal execution plug-in unit comprises in the embodiment of the invention:
S201, acquisition numbering N;
After user terminal starts browser, logined release numbering and be the website of plug-in unit of N after, can obtain numbering N automatically;
Whether S202, judges terminal program exist the plug-in unit that is numbered N in the storehouse, if, then carry out step S211, otherwise, carry out step S203;
S203, user terminal are downloaded the plug-in unit that is numbered N from server;
Said server is the server with the restriction of writing;
Whether the plug-in unit that is numbered N is downloaded in S204, judgement successful, if, then carry out step S205, otherwise, carry out step S215;
S205, user terminal are downloaded the summary of the plug-in unit that is numbered N from server;
Said server is the server with the restriction of writing;
S206, the whether success of summary of judge downloading the said plug-in unit that is numbered N, if, carrying out step S207, otherwise, carry out step S215;
S207, obtain the summary C2 of said plug-in unit through hash algorithm;
S208, judge whether C1 is identical with C2, if, then carry out step S209, otherwise, carry out step S215;
S209, said plug-in unit is kept in the local program storehouse, and said summary is kept in the local file abstract;
Wherein, described document table is encrypted through said password default, comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract,
So, the step that said summary is kept in the local file abstract comprises: through the said document table of said password to decipher; The summary of the plug-in unit of said plug-in unit sign and this sign correspondence is write said document table; Through the said document table of said password encryption and preserve this document abstract;
S210, carry out said plug-in unit;
S211, acquisition and the corresponding summary of numbering N C from local files stored abstract;
Said user terminal obtains and the corresponding summary of said numbering N C from said document table through the said document table of said password to decipher;
S212, obtain the summary C3 of said plug-in unit through hash algorithm;
Obtain the summary C3 of the corresponding plug-in unit of said numbering N through hash algorithm;
S213, judge whether C is identical with C3, if, then carry out step S210, otherwise, carry out step S214;
S214, from the local program storehouse deletion with the corresponding plug-in unit of said numbering N, and in the document table with the corresponding summary of said numbering N;
S215, end.
Referring to Fig. 3, the system that carries out plug-in unit in the embodiment of the invention comprises: server 30 and user terminal 31;
Said user terminal 31 comprises: download unit 311, verification unit 312, performance element 313, encrypt the first summary unit 314, memory cell 315, encrypt file abstract unit 316 and delete cells 317;
Said verification unit 312 comprises: relatively second summary is made a summary with the first summary unit 3122 with the said first summary unit the 3121, the relatively the 3rd and is sent triggering signal unit 3123;
Said comparison the 3rd summary comprises with the first summary unit 3122: the 3rd summary unit 31221, the deciphering first summary unit 31222 and send signal element 31223;
Said server 30 is used to issue first of plug-in unit and this plug-in unit and makes a summary, and said first summary utilizes AES to obtain;
Said user terminal 31 is used for downloading said plug-in unit and said first summary from said server, utilizes said AES to obtain second summary of said plug-in unit, when this second summary is identical with said first summary, carries out said plug-in unit;
Wherein, said AES is a hash algorithm;
Said download unit 311 is used for downloading said plug-in unit and said first summary from said server 31;
Said verification unit 312; Be used to utilize hash algorithm to obtain second summary of said plug-in unit; And relatively whether this second summary is identical with said first summary, when said second summary is identical with said first summary, sends triggering signal to said performance element 313;
Wherein, said comparison second summary and the said first summary unit 3121 is used to utilize hash algorithm to obtain second summary of said plug-in unit, when said second summary is identical with said first summary, sends triggering signal to sending triggering signal unit 3123;
Send triggering signal unit 3123, be used to receive said triggering signal after, send triggering signals to said performance element 313;
Said performance element 313 when being used to receive said triggering signal, is carried out said plug-in unit;
Preferably, the said encryption first summary unit 314 when said second summary is identical with said first summary, is encrypted said first summary; Said comparison the 3rd summary and the first summary unit 3122; When carrying out said plug-in unit once more; Utilize hash algorithm to obtain the 3rd summary of said plug-in unit; Decipher said first summary; When said the 3rd summary is identical with said deciphering back first summary, send triggering signal to sending triggering signal unit 3123;
Wherein, said the 3rd summary unit 31221 when being used for carrying out once more said plug-in unit, utilizes hash algorithm to obtain the 3rd summary of said plug-in unit;
The said deciphering first summary unit 31222 is used to decipher said first summary, and deciphers said document table, obtains and corresponding first summary of said sign through said sign;
Said transmission signal element 31223 is used for when said the 3rd summary is identical with said deciphering back first summary, sending triggering signal to sending triggering signal unit 3123;
Said memory cell 315, storage file abstract in advance comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract;
Said document table when said second summary is identical with said first summary, is deciphered in encrypt file abstract unit 316, and the sign of said plug-in unit and first summary of this sign correspondence are write said document table, encrypts said document table;
Said delete cells 317, in said document table with corresponding first summary of said sign, with said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, belong within the scope of claim of the present invention and equivalent technologies thereof if of the present invention these are revised with modification, then the present invention also is intended to comprise these changes and modification interior.

Claims (13)

1. method of carrying out plug-in unit is characterized in that the method comprising the steps of:
First summary of plug-in unit and this plug-in unit is distributed on the server, and said first summary utilizes hash algorithm to obtain, and said server is the server with the restriction of writing;
User terminal is downloaded said plug-in unit and said first summary from said server, utilizes said hash algorithm to obtain second summary of said plug-in unit;
When said second summary is identical with said first summary, carry out said plug-in unit;
Said first summary is encrypted;
Said user terminal when carrying out said plug-in unit once more, utilizes hash algorithm to obtain the 3rd summary of said plug-in unit, deciphers said first summary, afterwards first makes a summary when identical when said the 3rd summary and said deciphering, carries out said plug-in unit.
2. the method for execution plug-in unit as claimed in claim 1 is characterized in that, is provided with the document table of encryption in advance at said user terminal, comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract.
3. the method for execution plug-in unit as claimed in claim 2 is characterized in that, the step that said first summary is encrypted comprises:
Decipher said document table;
Said plug-in unit sign and corresponding said first summary of this sign are write said document table;
Encrypt said document table and preserve this document abstract.
4. the method for execution plug-in unit as claimed in claim 3 is characterized in that, the step of carrying out said plug-in unit once more comprises:
Said user terminal obtains the 3rd summary of said plug-in unit through hash algorithm, deciphers said document table, and obtains and corresponding first summary of said sign through said sign, makes a summary when identical when this first summary and the said the 3rd, carries out said plug-in unit.
5. the method for execution plug-in unit as claimed in claim 4; It is characterized in that; When in the said document table with corresponding first summary of said sign and said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
6. a system that carries out plug-in unit is characterized in that, this system comprises:
Server is used to issue first of plug-in unit and this plug-in unit and makes a summary, and said first summary utilizes hash algorithm to obtain, and said server is the server with the restriction of writing;
User terminal is used for downloading said plug-in unit and said first summary from said server, utilizes said hash algorithm to obtain second summary of said plug-in unit; When this second summary is identical with said first summary, carries out said plug-in unit, and said first summary is encrypted; When carrying out said plug-in unit once more, utilize hash algorithm to obtain the 3rd summary of said plug-in unit, decipher said first summary; When said the 3rd summary is identical with said deciphering back first summary, carry out said plug-in unit.
7. the system of execution plug-in unit as claimed in claim 6 is characterized in that,
Said user terminal comprises:
Download unit is used for downloading said plug-in unit and said first summary from said server;
Verification unit; Be used to utilize hash algorithm to obtain second summary of said plug-in unit; And relatively whether this second summary is identical with said first summary; When said second summary is identical with said first summary, send triggering signal to performance element, and when carrying out said plug-in unit once more; Utilize hash algorithm to obtain the 3rd summary of said plug-in unit; Decipher said first summary, when said the 3rd summary is identical with said deciphering back first summary, send triggering signal to performance element;
Encrypt the first summary unit, be used for when said second summary is identical with said first summary, said first summary being encrypted;
Performance element when being used to receive said triggering signal, is carried out said plug-in unit.
8. the system of execution plug-in unit as claimed in claim 7 is characterized in that, said verification unit comprises:
Relatively second summary and the first summary unit is used to utilize hash algorithm to obtain second summary of said plug-in unit, when said second summary is identical with said first summary, sends triggering signal to sending the triggering signal unit;
Relatively the 3rd make a summary and the first summary unit; When being used for carrying out once more said plug-in unit, utilize hash algorithm to obtain the 3rd summary of said plug-in unit, decipher said first summary; When said the 3rd summary is identical with said deciphering back first summary, send triggering signal to sending the triggering signal unit;
Send the triggering signal unit, be used to receive said triggering signal after, send triggering signal to said performance element.
9. the system of execution plug-in unit as claimed in claim 8 is characterized in that, said comparison the 3rd summary comprises with the first summary unit:
The 3rd summary unit when being used for carrying out once more said plug-in unit, utilizes hash algorithm to obtain the 3rd summary of said plug-in unit;
Decipher the first summary unit, be used to decipher said first summary;
Send signal element, be used for when said the 3rd summary is identical with said deciphering back first summary, sending triggering signal to sending the triggering signal unit.
10. the system of execution plug-in unit as claimed in claim 9 is characterized in that, said user terminal also comprises:
Memory cell is used for the document table of storage encryption in advance, comprises the summary of the plug-in unit that sign and this sign of plug-in unit is corresponding in this document abstract.
11. the system of execution plug-in unit as claimed in claim 10 is characterized in that, said user terminal also comprises:
Encrypt file abstract unit is used for when said second summary is identical with said first summary, deciphering said document table, and the sign of said plug-in unit and first summary of this sign correspondence are write said document table, encrypts said document table.
12. the system of execution plug-in unit as claimed in claim 11 is characterized in that, the said deciphering first summary unit is used to decipher said document table, obtains and corresponding first summary of said sign through said sign.
13. the system of execution plug-in unit as claimed in claim 12 is characterized in that, said user terminal also comprises:
Delete cells, be used for when said document table with corresponding first summary of said sign, with said the 3rd summary when inequality, delete in said plug-in unit and the said document table with corresponding first summary of said sign.
CN200610167677XA 2006-12-21 2006-12-21 Method and system for executing plug-in unit Active CN101179378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200610167677XA CN101179378B (en) 2006-12-21 2006-12-21 Method and system for executing plug-in unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200610167677XA CN101179378B (en) 2006-12-21 2006-12-21 Method and system for executing plug-in unit

Publications (2)

Publication Number Publication Date
CN101179378A CN101179378A (en) 2008-05-14
CN101179378B true CN101179378B (en) 2012-06-13

Family

ID=39405479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200610167677XA Active CN101179378B (en) 2006-12-21 2006-12-21 Method and system for executing plug-in unit

Country Status (1)

Country Link
CN (1) CN101179378B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883324A (en) * 2012-10-19 2013-01-16 广州市动景计算机科技有限公司 Security verification method, security verification device and mobile terminal for plugin call in mobile terminal
CN105138351B (en) * 2015-07-31 2019-10-18 百度在线网络技术(北京)有限公司 A kind of method and apparatus for host's configuration plug-in packet
CN109309917B (en) * 2018-10-24 2021-11-02 上海收付宝科技有限公司 eID digital identity authentication method and system based on mobile terminal software cryptographic module
CN110569088A (en) * 2019-09-09 2019-12-13 五八有限公司 client plug-in management method and device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN1713573A (en) * 2004-06-22 2005-12-28 腾讯科技(深圳)有限公司 Realization and realizing device for selective download from webpage inserted piece

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556449A (en) * 2004-01-08 2004-12-22 中国工商银行 Device and method for proceeding encryption and identification of network bank data
CN1713573A (en) * 2004-06-22 2005-12-28 腾讯科技(深圳)有限公司 Realization and realizing device for selective download from webpage inserted piece

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
唐鸿儒等.基于Internet的远程监控系统开发技术研究.测控技术22 4.2003,22(4),48-51.
唐鸿儒等.基于Internet的远程监控系统开发技术研究.测控技术22 4.2003,22(4),48-51. *
杨以光.密码技术在信息安全中的应用研究.计算机与网络 23.2005,(23),54-55.
杨以光.密码技术在信息安全中的应用研究.计算机与网络 23.2005,(23),54-55. *

Also Published As

Publication number Publication date
CN101179378A (en) 2008-05-14

Similar Documents

Publication Publication Date Title
CN108322461B (en) Method, system, device, equipment and medium for automatically logging in application program
CN101924607B (en) Firmware processing method based on firmware air transmission technology, device and system thereof
RU2542930C2 (en) Booting and configuring subsystem securely from non-local storage
CN107743115B (en) Identity authentication method, device and system for terminal application
CN111262910B (en) Wireless equipment firmware protection method and system
CN111404682B (en) Android environment key segmentation processing method and device
CN103514000B (en) Browser plug-in installation method and device
CN111209558B (en) Internet of things equipment identity authentication method and system based on block chain
KR102376229B1 (en) Method of loading files into random access memory in an electronic device and associated electronic device
KR101756978B1 (en) Method and System for Protecting application program in trusted execution environment
CN108880859B (en) Configuration method, device, server, terminal and storage medium of upgrade file
EP3516575B1 (en) Technologies for user-mode persistence of certificates and keys in resource-constrained devices
CN107870793B (en) Method and device for loading SO file in application program
CN108229144B (en) Verification method of application program, terminal equipment and storage medium
CN102819704A (en) Document copyright protection method for intelligent terminal
US9405939B2 (en) Data processing on a non-volatile mass storage device
CN101179378B (en) Method and system for executing plug-in unit
CN111835505A (en) Activation code generation method and device and computer storage medium
JP2007233426A (en) Application execution device
CN114791834B (en) Application program starting method and device, electronic equipment and storage medium
CN108416193B (en) Authentication method and device and vehicle
CN108512824B (en) Management method of home cloud files and mobile terminal
KR100458515B1 (en) System and method that can facilitate secure installation of JAVA application for mobile client through wireless internet
JP5056995B1 (en) Application program distribution execution method that can detect falsification
CN105786641A (en) Method, equipment and intelligent card for back-upping and recovery of intelligent card application data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190807

Address after: 518057 Nanshan District science and technology zone, Guangdong, Zhejiang Province, science and technology in the Tencent Building on the 1st floor of the 35 layer

Co-patentee after: Tencent cloud computing (Beijing) limited liability company

Patentee after: Tencent Technology (Shenzhen) Co., Ltd.

Address before: 2, 518044, East 410 room, SEG science and Technology Park, Zhenxing Road, Shenzhen, Guangdong, Futian District

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.

TR01 Transfer of patent right