CN101968839A - Method for binding computer aid equipment and PC end software - Google Patents

Method for binding computer aid equipment and PC end software Download PDF

Info

Publication number
CN101968839A
CN101968839A CN2010105150914A CN201010515091A CN101968839A CN 101968839 A CN101968839 A CN 101968839A CN 2010105150914 A CN2010105150914 A CN 2010105150914A CN 201010515091 A CN201010515091 A CN 201010515091A CN 101968839 A CN101968839 A CN 101968839A
Authority
CN
China
Prior art keywords
computer
end software
software
aided equipment
fragment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105150914A
Other languages
Chinese (zh)
Inventor
周湘辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Shenzhen ZTE Mobile Telecom Co Ltd
Original Assignee
Shenzhen ZTE Mobile Telecom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen ZTE Mobile Telecom Co Ltd filed Critical Shenzhen ZTE Mobile Telecom Co Ltd
Priority to CN2010105150914A priority Critical patent/CN101968839A/en
Publication of CN101968839A publication Critical patent/CN101968839A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method for binding computer aid equipment and PC end software. The method comprises the following steps of: a, calculating data summary corresponding to a key file of the PC end software in advance, and saving the data summary in an installation package of the PC end software; b, downloading the data summary to a storage position designated by the computer aid equipment when the PC end software is installed; c, releasing the data summary corresponding to the key file of the PC end software to the computer aid equipment when the PC end software requests service of the computer aid equipment, and reading the data summary saved on the equipment and comparing the data summary with received data summary by the computer aid equipment; and d, continuously providing service if the data summary saved on the equipment is completely matched with the received data summary and passes authentication, otherwise, failing to authenticate and never answering the PC end software subsequently. The method performs encrypting authentication on the PC end software and the key file in the computer aid equipment to ensure that the computer aid equipment is just matched with the customized PC end software.

Description

The method of a kind of computer-aided equipment and PC end software binding
Technical field
The present invention relates to communication technique field, relate in particular to the method for a kind of computer-aided equipment and PC end software binding.
Background technology
Computer-aided equipment (refer to rely on the equipment that computing machine could be worked, as printer, wireless Internet card etc.) generally except equipment itself, operates in PC (computing machine) end software, for example UI (User Interface user interface) software in addition.PC end software utilizes computer-aided equipment that respective service is provided, and calls, dials up on the telephone, sends note, GPS (Global Positioning System) location etc. as wireless data card by UI software.Because the standardization of PC end UI software and computer-aided equipment communication interface at present, make the UI software of A carrier customization like this, might be used by B operator, also may exist the signed client (client that the telephone expenses that prestore are made arrangements for his funeral and held) of A operator that the terminal of giving is gone to use under the B carrier network, cause the loss of A operator like this.
SHA (Secure Hash Algorithm) is a kind of data ciphering method, and this method is perfect day by day through encrypting expert's development and improvement for many years, has now become one of generally acknowledged safest ashing technique, and be widely used.The principle of this method is to receive one section plaintext, convert it to one section (littler usually) ciphertext in a kind of irreversible mode (promptly utilizing one-way hash function) then, also can simply be interpreted as and get a string input code (being called pre-mapping or information), and be the output sequence that they are converted into that length is short, figure place is fixed (20 bytes) process of hashed value (being also referred to as data summarization or authentification of message code).Hash functional value can be described as a kind of " fingerprint " or " summary " expressly, so the data summarization of corresponding hashed value just can be considered as this digital signature expressly.
Summary of the invention
The object of the present invention is to provide the method for a kind of computer-aided equipment and PC end software binding, prevent that PC end software or computer-aided equipment from not matching use, also will accomplish to be difficult for being cracked simultaneously.
For addressing the above problem, the present invention is achieved through the following technical solutions:
The method of a kind of computer-aided equipment and PC end software binding may further comprise the steps:
A: calculate the data summarization of PC end software critical file correspondence in advance, leave in the installation kit of PC end software;
B: when PC end software is installed, described data summarization is downloaded to the memory location of computer-aided equipment appointment;
C: when the service of PC end software asks computer-aided equipment, issue the corresponding data summarization of PC end software critical file to computer-aided equipment, by the computer-aided equipment reading and saving on equipment data summarization and compare with the data summarization that receives;
D:, continue to provide service if mate fully then authentication is passed through; Otherwise, failed authentication, the follow-up PC end software that no longer responds.
Wherein, described step a further comprises: holding the software critical file to be divided into N(N PC is 1.2.3 ... the N natural number) individual fragment, the beginning and the end of N fragment of record; And utilize fragment computations to go out the corresponding data summary, and generate the data summarization record of N part beginning and end and homologous segment, form a data file.
Wherein, the beginning of described fragment and end up being the skew that relative file begins.
Wherein, step c further comprises: PC end software requirement utilize m fragment (authentication of m<N), the beginning and the end mark of m fragment of selection transmission are held software to PC to computer-aided equipment at random in N fragment; PC end software utilization beginning and end mark read fragment and calculate corresponding data summarization, form that m fragment begins and end and corresponding data summarization record, be handed down to computer-aided equipment, computer-aided equipment contrasts beginning and end and the corresponding data summarization record that issues and preserve again one by one.
Wherein, described computer-aided equipment is the computer-aided equipment that contains PC end software, especially refers to printer, wireless Internet card or the GPS steady arm that shows with PC.
Wherein, described PC end software is user interface software.
The embodiment of the invention compared with prior art, beneficial effect is: the present invention is by carrying out encrypted authentication to a critical file in PC end software and the computer-aided equipment, make computer-aided equipment only hold the supporting use of software with the PC that customizes, thereby can prevent that the contracted user of operator is run off and PC end software pirate usefulness, guarantee the normal upgrading of PC end software simultaneously again.
Description of drawings
Fig. 1 is the inventive method process flow diagram.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
The present invention utilizes PC end software to adopt one-way hash function to calculate corresponding data summarization (raw data is a critical file of PC end software) by the SHA method, same computer-aided equipment also can make to use the same method and calculate data summarization (raw data is a same critical file, and before dispatching from the factory, be preset in the computer-aided equipment, if do not revise this critical file, these two parts of raw data must be the same; Will cause two parts of raw data different if PC end critical file modified), then two data summaries are compared, if two data summaries are identical, then continue follow-up service; Otherwise utility appliance no longer responds follow-up request.In other words, the utility appliance that use a computer must be carried out this step authentication, but if upgrade software can cause authentication not pass through, can not provide service; If utility appliance does not have enough memory headroom storage critical files, will can't preset critical file very little because of memory headroom.
Solve software upgrade problem and computer-aided equipment memory headroom problem: on PC, calculate earlier the data summarization of raw data correspondence, leave in the installation kit, when PC end software is installed, download to the utility appliance appointed positions.When PC end software requirement utility appliance provides service, must issue the corresponding data summarization of critical file to utility appliance, compare by the data summarization of utility appliance reading and saving on equipment and the data summarization that receives, report PC software comparing result.So promptly can solve the upgrade problem of PC end software, solve utility appliance memory headroom problem again.But can bring a problem like this, be exactly that the data summarization of depositing is in advance revealed easily.
Solving the easy leakage problem of data summarization, PC is held critical file is divided into N section (N is 500 above natural numbers preferably) in the software, can be to divide equally or be divided at random the N section that differs in size; Extract the N section out after can also being divided into the N+M section, the beginning of record segment and end (beginning and end all are the starting points of relative file), and utilize fragment computations to go out the corresponding data summary, and form the data summarization record of N part beginning and end and homologous segment, form a file.When being installed, PC end software downloads to the computer-aided equipment assigned address, when PC end software requirement computer-aided equipment provides service, claim and utilize the m section (m is less relatively, less than 20 natural numbers) authentication, beginning and end mark that computer-aided equipment is selected to send the m section in the N section are at random held software to PC, PC end software utilization beginning and end mark read fragment computations and go out corresponding data summarization, form the beginning of m section and end and corresponding data summarization record, be handed down to computer-aided equipment, computer-aided equipment contrasts beginning and end and the corresponding data summarization that issues and preserve again one by one, if coupling then think that authentication passes through continues to provide service fully; Otherwise think that the user is illegal, the follow-up PC end software that no longer responds.
For ease of understanding,, be described further below in conjunction with accompanying drawing.
See also shown in Figure 1ly, comprising:
Step 101: certain file at PC end UI software therefrom arbitrarily is divided into N fragment, the beginning of record N fragment and end (beginning of fragment and end all are the skews that relative file begins).
Step 102: utilize one-way hash function to calculate the data summarization (beginning of fragment of N fragment by the SHA algorithm, finish and record of corresponding data summarization composition), form a dat (also can be other name) file (comprising N record), this dat file of in the packing of PC end software, packing.
Step 103: when PC end UI software is installed, download the storage location of this dat file simultaneously to the computer-aided equipment instruction.
Step 104: when requiring computer-aided equipment that service is provided, PC end UI software claims and utilizes m (m<20) section authentication, and beginning and end mark that computer-aided equipment is selected to send the m section in the N section are at random held software to PC.
Step 105:PC end software utilization beginning and end mark read fragment computations and go out corresponding data summarization, form the beginning of m section and end and corresponding data summarization record, are handed down to computer-aided equipment.
Step 106: computer-aided equipment contrasts beginning and end and corresponding data summarization more one by one, if coupling then think that authentication passes through fully continues to provide service; Otherwise think that the user is illegal, the follow-up PC end software that no longer responds.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. the method for computer-aided equipment and PC end software binding is characterized in that, may further comprise the steps:
A: calculate the data summarization of PC end software critical file correspondence in advance, leave in the installation kit of PC end software;
B: when PC end software is installed, described data summarization is downloaded to the memory location of computer-aided equipment appointment;
C: when the service of PC end software asks computer-aided equipment, issue the corresponding data summarization of PC end software critical file to computer-aided equipment, by the computer-aided equipment reading and saving on equipment data summarization and compare with the data summarization that receives;
D:, continue to provide service if mate fully then authentication is passed through; Otherwise, failed authentication, the follow-up PC end software that no longer responds.
2. the method for computer-aided equipment as claimed in claim 1 and PC end software binding, it is characterized in that, described step a further comprises: holding the software critical file to be divided into N(N PC is 1.2.3 ... the N natural number) individual fragment, the beginning and the end of N fragment of record; And utilize fragment computations to go out the corresponding data summary, and generate the data summarization record of N part beginning and end and homologous segment, form a data file.
3. the method for computer-aided equipment as claimed in claim 2 and PC end software binding is characterized in that, the beginning of described fragment and end up being the skew that relative file begins.
4. the method for computer-aided equipment as claimed in claim 2 and PC end software binding, it is characterized in that, step c further comprises: PC end software requirement utilize m fragment (authentication of m<N), the beginning and the end mark of m fragment of selection transmission are held software to PC to computer-aided equipment at random in N fragment; PC end software utilization beginning and end mark read fragment and calculate corresponding data summarization, form that m fragment begins and end and corresponding data summarization record, be handed down to computer-aided equipment, computer-aided equipment contrasts beginning and end and the corresponding data summarization record that issues and preserve again one by one.
5. as the method for each described computer-aided equipment of claim 1 to 4 and PC end software binding, it is characterized in that described computer-aided equipment is printer, wireless Internet card or the GPS steady arm that shows with PC.
6. as the method for each described computer-aided equipment of claim 1 to 4 and PC end software binding, it is characterized in that described PC end software is user interface software.
CN2010105150914A 2010-10-22 2010-10-22 Method for binding computer aid equipment and PC end software Pending CN101968839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105150914A CN101968839A (en) 2010-10-22 2010-10-22 Method for binding computer aid equipment and PC end software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105150914A CN101968839A (en) 2010-10-22 2010-10-22 Method for binding computer aid equipment and PC end software

Publications (1)

Publication Number Publication Date
CN101968839A true CN101968839A (en) 2011-02-09

Family

ID=43547992

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105150914A Pending CN101968839A (en) 2010-10-22 2010-10-22 Method for binding computer aid equipment and PC end software

Country Status (1)

Country Link
CN (1) CN101968839A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504327A (en) * 2014-12-31 2015-04-08 株洲南车时代电气股份有限公司 Software attachment method and device
CN104636659A (en) * 2014-12-31 2015-05-20 株洲南车时代电气股份有限公司 Register data generation method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1348130A (en) * 2000-10-11 2002-05-08 卓信科技有限公司 Secreting and/or discriminating documents remote-controlling printing
CN1445693A (en) * 2002-03-19 2003-10-01 微软公司 Safety digital data form and code forced implement policy

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1348130A (en) * 2000-10-11 2002-05-08 卓信科技有限公司 Secreting and/or discriminating documents remote-controlling printing
CN1445693A (en) * 2002-03-19 2003-10-01 微软公司 Safety digital data form and code forced implement policy

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104504327A (en) * 2014-12-31 2015-04-08 株洲南车时代电气股份有限公司 Software attachment method and device
CN104636659A (en) * 2014-12-31 2015-05-20 株洲南车时代电气股份有限公司 Register data generation method and device
CN104636659B (en) * 2014-12-31 2018-03-27 株洲南车时代电气股份有限公司 A kind of log-on data generation method and device
CN104504327B (en) * 2014-12-31 2018-04-24 株洲南车时代电气股份有限公司 A kind of method and device of attaching troops to a unit of software

Similar Documents

Publication Publication Date Title
CN107194242B (en) Firmware upgrade method and device
US10223096B2 (en) Logging operating system updates of a secure element of an electronic device
CN107682159B (en) Trusted application management method and trusted application management system of intelligent terminal
US10936719B2 (en) Preserving trust data during operating system updates of a secure element of an electronic device
CN104503745B (en) A kind of method and apparatus generated using channel packet
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
US20150222426A1 (en) Method and System for Transferring Firmware or Software to a Plurality of Devices
CN101316168B (en) Authentification device and method
WO2013033816A1 (en) Method and system for credential management and data encryption for ios based devices
CN104052818A (en) Version upgrade method and device for mobile terminal
CN106357402A (en) Data encryption-decryption processing method and device
US20140201316A1 (en) Streaming zip
CN102523095A (en) User digital certificate remote update method with intelligent card protection function
CN105468472A (en) iOS operation system based data backup and recovery method and apparatus
CN103905557A (en) Data storage method and device used for cloud environment and downloading method and device
CN102622251A (en) Method and server for managing navigation software upgrading
CN104978542A (en) Secure data storage and data access method and system
CN110046000A (en) Small routine operation method and device
CN101968839A (en) Method for binding computer aid equipment and PC end software
CN104079610A (en) Cloud server, and method and system for cloud synchronization of application software
CN105159797A (en) Oracle database based backup and recovery method
US20130332734A1 (en) Process and system for data transmission
CN102215131B (en) Management method and device of functional License
CN103532712A (en) Digital media file protection method, system and client
CN112580101B (en) Data decryption method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110209