CN102087689A - Method and device for protecting software reused module - Google Patents

Method and device for protecting software reused module Download PDF

Info

Publication number
CN102087689A
CN102087689A CN2009102417352A CN200910241735A CN102087689A CN 102087689 A CN102087689 A CN 102087689A CN 2009102417352 A CN2009102417352 A CN 2009102417352A CN 200910241735 A CN200910241735 A CN 200910241735A CN 102087689 A CN102087689 A CN 102087689A
Authority
CN
China
Prior art keywords
reuse module
encrypted result
key
module
reuse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009102417352A
Other languages
Chinese (zh)
Other versions
CN102087689B (en
Inventor
纪永凤
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Original Assignee
Peking University Founder Group Co Ltd
Beijing Founder Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Founder Group Co Ltd, Beijing Founder Electronics Co Ltd filed Critical Peking University Founder Group Co Ltd
Priority to CN2009102417352A priority Critical patent/CN102087689B/en
Publication of CN102087689A publication Critical patent/CN102087689A/en
Application granted granted Critical
Publication of CN102087689B publication Critical patent/CN102087689B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for protecting a software reused module so as to solve the problem that the corresponding protection scheme is not proposed at a level of the software reused module in the prior art. The method disclosed by the invention comprises the following steps of: generating a first encryption result and a reused module registration code according to a first secret key and an identifier of an application program with the right of using the reused module; when the application program of the reused module is needed to be operated, acquiring the reused module registration code, the identifier of the application program, and a reused module check code acquired according to the first secret key; acquiring the first secret key by using the reused module check code, and generating a second encryption result according to the first secret key and the acquired identifier; and acquiring the first encryption result according to the registration code, comparing the first encryption result with the second encryption result, and then determining whether the application program has the right of using the reused module. Authority verification is realized through the registration code and the check code, so software is protected at the level of the software reused module.

Description

A kind of guard method of software reuse module and device
Technical field
The invention belongs to the digital-scrambling techniques field, particularly a kind of guard method of software reuse module and device.
Background technology
Software repeated usage is the basic thought and the method for software development in the soft project, the multiplexing achievement that means that use has existed.In the process of software development, the most contents during we find to develop all is a comparative maturity, has only the work of small part to be only novelty.We can think ripe work high-quality and can be multiplexing can improve our throughput rate by the work of multiplexing these maturations.
With comparative maturity in the exploitation, can multiplexing work reasonably split, form the module of high cohesion, low coupling, so as in other software development, to use these independently, the module of complete function can be provided, these modules are called as reuse module.The software module that extracts is constantly added in the reuse module storehouse, when some reuse module of needs, directly from the module library, extract the reuse module that oneself needs and carry out the accumulation of similar " building blocks ", just can conveniently form software commonly used.
Fast development along with computer software; software modularity will get more and more, and many reuse modules will use in software product, how protect these reuse modules not abused; on software reuse module level, software is protected, also do not had corresponding solution at present.
Summary of the invention
Also do not have the problem of corresponding protection scheme in order to solve prior art on software reuse module level, the embodiment of the invention provides a kind of guard method of software reuse module, comprising:
According to first key and sign with application program of using the reuse module authority, utilize cryptographic algorithm to generate first encrypted result, generate the reuse module registration code according to first encrypted result, first key is for to obtain key according to the reuse module private cipher key;
When needs use the application program operation of reuse module, obtain the reuse module check code that obtains according to first key that adds in the sign of reuse module registration code, this application program and the reuse module;
Obtain first key by the reuse module check code, the sign of obtaining during according to first key and application program operation utilizes cryptographic algorithm to generate second encrypted result;
Obtain first encrypted result by the reuse module registration code, identical with second encrypted result according to first encrypted result, determining needs to use the application program of reuse module to have the authority of using reuse module, otherwise, there are not rights of using.
The embodiment of the invention also provides a kind of protective device of software reuse module simultaneously, comprising:
First generation module: be used for according to first key and sign with application program of using the reuse module authority, utilize cryptographic algorithm to generate first encrypted result, generate the reuse module registration code according to first encrypted result, first key is for to obtain key according to the reuse module private cipher key;
Acquisition module: be used for when needs use the application program operation of reuse module, obtain the reuse module check code that obtains according to first key that adds in the sign of reuse module registration code, this application program and the reuse module;
Second generation module: be used for obtaining first key by the reuse module check code, the sign of obtaining during according to first key and application program operation utilizes cryptographic algorithm to generate second encrypted result;
Authority determination module: be used for obtaining first encrypted result by the reuse module registration code, identical according to first encrypted result with second encrypted result, determining needs to use the application program of reuse module to have the authority of using reuse module, otherwise, there are not rights of using.
By specific embodiments provided by the invention as can be seen, just because of having realized Authority Verification, and then be implemented on the software reuse module level software is protected by reuse module registration code and reuse module check code.
Description of drawings
Fig. 1 is the first embodiment method flow diagram provided by the invention;
Fig. 2 is that first embodiment registration code provided by the invention and check code generate method flow diagram;
Fig. 3 is that first embodiment, second encrypted result provided by the invention generates method flow diagram;
Fig. 4 is that first embodiment, first encrypted result provided by the invention generates method flow diagram;
Fig. 5 is the second embodiment device structural drawing provided by the invention.
Embodiment
In order to solve the problem that on software reuse module level, does not also have the corresponding protection scheme in the prior art; embodiments of the invention provide a kind of guard method of software reuse module; when certain application program need be used certain reuse module; then need to apply for the reuse module registration code; when using reuse module; then need to provide the sign of this application program, as: program process title etc.The generation of reuse module registration code needs following steps, obtain sign ID1 with application program of using the reuse module authority, according to KEY1 and ID1, utilize cryptographic algorithm to generate the first encrypted result crytoText, generate reuse module registration code licenseCode according to crytoText.Wherein key K EY1 can directly adopt reuse module private cipher key moduleKey, also can adopt and carry out after the encryption that irreversible encryption obtains moduleKeyHash as a result to reusing module private cipher key moduleKey.No matter adopting moduleKey still to adopt moduleKeyHash as KEY1, all is to obtain key K EY1 according to reuse module private cipher key moduleKey.After generating reuse module registration code licenseCode, application program 1 and licenseCode incidence relation between the two need be set up, licenseCode can be obtained when moving with convenient application program 1.Reuse module check code moduleCode and checking routine section are added in use porch at reuse module, so that by the moduleCode that carries the application program rights of using of calling it are carried out verification when it is employed program 1 and calls, moduleCode can directly adopt moduleKey, can also adopt the moduleKeyHash behind the character code, when application program 1 operation, obtain the sign ID1 ' of licenseCode, application program 1 and the moduleCode that reuse module carries.After application program 1 is called reuse module, by the moduleCode that carries the application program rights of using of calling it are carried out verification, checking procedure is, reuse module obtains key K EY1 (moduleKey or moduleKeyHash) by moduleCode, and the ID1 ' that obtains during according to key K EY1 and application program 1 operation utilizes cryptographic algorithm to generate the second encrypted result hcNumber.
The licenseCode that obtains during according to application program 1 operation obtains crytoText, and is identical with licNumber according to crytoText, determines that application program 1 has the authority of using reuse module, otherwise, there are not rights of using.
First embodiment provided by the invention is a kind of guard method of software reuse module, and xml editor is a multimedia text editor, uses as application program.One of nucleus module in the xml editor is to revise the vestige module, as a module independently, not only in xml editor, use, also frequent use in other application module, revise the vestige module in embodiments of the present invention as reuse module, below at xml editor to be application program with use reuse module authority, after modification vestige reuse module is used by an application program, the application program of using it is verified, judge whether this program is that the xml editor with rights of using describes in detail, method flow comprises as shown in Figure 1:
Step 101: adopt the private cipher key moduleA that revises vestige reuse module A, sign XMLEditor to xml editor carries out symmetric cryptography generation crytoText, with crytoText as revising vestige reuse module A registration code licenseCode, with moduleA as the check code moduleCode that revises vestige reuse module A.
Step 102: moduleCode is added on the use porch of revising vestige reuse module A, so that it carries out authorization check by moduleCode to the application program of calling it when being called.
Step 103: when application program 1 operation, obtain the moduleA that adds among the sign ID1 ' of crytoText as licenseCode, application program 1 and the modification vestige reuse module A as moduleCode.
Step 104: the moduleA that adopts modification vestige reuse module A to carry carries out symmetric cryptography to sign ID1 ' and generates the second encrypted result licNumber.
Step 105: identical according to crytoText with licNumber, determine that application program 1 has the authority of using reuse module, otherwise, there are not rights of using.
Wherein in the step 101, generating licenseCode and moduleCode can also be as shown in Figure 2, particularly, the process that generates crytoText can also be the private cipher key moduleA that revises vestige reuse module A to be carried out irreversible encryption (One-Way Encryption) obtain moduleKeyHash, the sign XMLEditor of xml editor is carried out irreversible encryption obtain appIdHash, moduleKeyHash is carried out symmetric cryptography as key to appIdHash, generate crytoText.Adopt in the present embodiment and breathe out western computing realization irreversible encryption.Being that moduleKey or moduleKeyHash effect in the present embodiment all is all to be as a key, promptly all is the key K EY1 that obtains according to reuse module private cipher key moduleKey.The effect of key K EY1 is exactly and sign XMLEditor can generate crytoText together.To XMLEditor and moduleA encryption is unidirectional, guarantees that crytoText can not be cracked, and has strengthened the security of revising vestige reuse module A.Further, can also obtain licenseCode and moduleCode in the following way, use random number as key crytoText to be carried out symmetric cryptography, the result of encryption uses cryptoRandKey to represent.Use random number that crytoText is encrypted, it is all different to guarantee to revise the each registration code that generates of vestige reuse module A.The random number that the cryptoRandKey and the previous step of generation are used is spliced to form licCode, uses character-coded mode to generate character visible licCode and moduleKeyHash, forms licenseCode and moduleCode.
Step 102 wherein, can also be, the moduleCode that uses character-coded mode to generate moduleKeyHash is added on the use porch of revising vestige reuse module A, no matter be directly as the check code moduleCode that revises vestige reuse module A with moduleA, still using character-coded mode to generate moduleCode moduleKeyHash, all is to obtain moduleCode according to key K EY1.
Step 103 wherein, obtain and revise the moduleA that adds among the vestige reuse module A as moduleCode, can also be, if in the abovementioned steps be the moduleCode that moduleKeyHash uses character-coded mode to generate is added on the use porch of revising vestige reuse module A, that then the modification vestige reuse module A that calls this moment carries is the moduleCode that generates after using character-coded mode to encode moduleKeyHash, and the licenseCode that obtains equally carries out the licenseCode that obtains after the encryption for using random number.
Owing to establish the incidence relation of application program 1 and licenseCode before, as licenseCode being added in the relevant configuration file of application program 1, or licenseCode is added in the string resource of the relevant resource file of application program 1, or the porch of licenseCode being write application program 1.Therefore obtaining the concrete enforcement of licenseCode can be, during application program 1 operation, the module such as the softdog that carry out follow-up Authority Verification can obtain licenseCode by reading the configuration file that carries licenseCode.Perhaps, softdog reads the resource file that is added with licenseCode in the string resource, obtains licenseCode.Perhaps, with the porch that licenseCode writes application program 1, during application program 1 operation, softdog directly obtains licenseCode by application program 1.Softdog is registered in the licenseCode that obtains and offers the subsequent step use in the internal memory.
Step 104 wherein, the process that the second encrypted result licNumber generates can also be, as shown in Figure 3, moduleCode (moduleCode generates after moduleKeyHash the uses character-coded mode to encode) decoding that vestige reuse module A carries will be revised, obtain moduleKeyHash, sign ID1 ' is carried out irreversible encryption obtain appIdHash ', adopt moduleKeyHash that appIdHash ' is carried out symmetric cryptography and generate the second encrypted result licNumber.No matter adopting which kind of mode finally to obtain the second encrypted result licNumber, all is to obtain key K EY1 and identify ID1 ' obtaining the second encrypted result licNumber together by moduleCode.Here no matter key K EY1 is moduleKeyHash or moduleA, and effect all is and identifies ID1 ' and obtain the second encrypted result licNumber together.
Carry out the licenseCode that obtains after the encryption if use random number, before step 105, also need to obtain crytoText according to licenseCode, as shown in Figure 4, be specially licenseCode is decoded, be converted into licCode by licenseCode, isolate random code and cryptoRandKey from licCode, random code is decrypted computing as key to cryptoRandKey, generates crytoText.CrytoText can be inserted in the registration code sequence of application program during concrete enforcement, use when wait and licNumber compare.
For step 105, determine that crytoText is identical with licNumber, can be by crytoText and licNumber being carried out determine relatively that directly both are identical, also can be, before step 105, use random number (identical) licNumber to be carried out symmetric cryptography as key with the random number of encrypting crytoText, with the result and the random number splicing of encrypting, obtain a splicing result, to splice the result and use character-coded mode to generate character visible, form last registration comparison code, will register comparison code and licenseCode compares, identical according to comparative result, determine that crytoText is identical with licNumber.
Second embodiment provided by the invention is a kind of protective device of software reuse module, and its structure comprises as shown in Figure 5:
First generation module 201: be used for according to first key and sign with application program of using the reuse module authority, utilize cryptographic algorithm to generate first encrypted result, generate the reuse module registration code according to first encrypted result, first key is for to obtain key according to the reuse module private cipher key;
Acquisition module 202: be used for when needs use the application program operation of reuse module, obtain the reuse module check code that obtains according to first key that adds in the sign of reuse module registration code, this application program and the reuse module;
Second generation module 203: be used for obtaining first key by the reuse module check code, the sign of obtaining during according to first key and application program operation utilizes cryptographic algorithm to generate second encrypted result;
Authority determination module 204: be used for obtaining first encrypted result by the reuse module registration code, identical according to first encrypted result with second encrypted result, determining needs to use the application program of reuse module to have the authority of using reuse module, otherwise, there are not rights of using.
Further, first generation module 201: also be used to adopt the reuse module private cipher key that carries out after the One-Way Encryption as first key, carry out symmetric cryptography and obtain first encrypted result to carrying out sign after the One-Way Encryption with application program of using the reuse module authority.
Further, also comprise:
Check code generation module 205: be used for the reuse module private cipher key after the One-Way Encryption of carrying out, use character visible that character-coded mode generates as the reuse module check code as first key;
Second generation module 203: be used for the reuse module check code is carried out reuse module private cipher key after character decoding obtains carrying out One-Way Encryption, adopt the reuse module private cipher key after the One-Way Encryption, the sign of obtaining when carrying out the application program operation after the One-Way Encryption is carried out symmetric cryptography and is obtained second encrypted result.
Further, first generation module 201: also be used to use random number first encrypted result to be carried out symmetric cryptography and obtain the 3rd encrypted result as key;
The 3rd encrypted result and random number are spliced, use character visible that character-coded mode generates as the reuse module registration code splicing result;
Authority determination module 204: also be used for carrying out the character decoding to reusing the module registration code, isolate the 3rd encrypted result and random number from decoded reuse module registration code, random number is decrypted the 3rd encrypted result as key, obtains first encrypted result.
Further, first generation module 201: also be used for using character visible that character-coded mode generates as the reuse module registration code first encrypted result;
Authority determination module 204: be used for that also the reuse module registration code is carried out the character decoding and obtain first encrypted result.
Further, first generation module 201: also be used to adopt the reuse module private cipher key as first key, sign with application program of using the reuse module authority is carried out symmetric cryptography obtains first encrypted result, with first encrypted result as the reuse module registration code;
Authority determination module 204: also be used for the reuse module registration code as first encrypted result.
Further, also comprise:
Check code generation module 205: be used for the reuse module private cipher key as the reuse module check code;
Second generation module 203: be used for the reuse module private cipher key as first key, the sign of obtaining when adopting the operation of reuse module private cipher key application programs is carried out symmetric cryptography and is obtained second encrypted result.
Further, acquisition module 202: when also being used for the application program operation of needs use reuse module, read the configuration file that carries the reuse module registration code, obtain the reuse module registration code; Or
When needing to use the application program operation of reuse module, read the resource file that is added with the reuse module registration code in the string resource, obtain the reuse module registration code; Or
When needing to use the application program operation of reuse module, read in reuse module registration code newly-increased in the application program that needs the use reuse module, obtain the reuse module registration code.
Further, the authority determination module 204: also be used for determining that with second encrypted result both are identical according to directly comparing first encrypted result.
Further, the authority determination module 204: also be used to use random number as key second encrypted result to be carried out symmetric cryptography and obtain the 4th encrypted result;
The 4th encrypted result and random number are spliced, the character visible that the splicing result uses character-coded mode to generate is registered comparison code as reuse module; According to comparing reuse module registration code and reuse module registration comparison code, determine that first encrypted result is identical with second encrypted result.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (16)

1. the guard method of a software reuse module is characterized in that, comprising:
According to first key and sign with application program of using the reuse module authority, utilize cryptographic algorithm to generate first encrypted result, generate the reuse module registration code according to first encrypted result, the key of first key for obtaining according to the reuse module private cipher key;
When needs use the application program operation of reuse module, obtain the reuse module check code that obtains according to first key that adds in the sign of reuse module registration code, this application program and the reuse module;
Obtain first key by the reuse module check code, the sign of obtaining during according to first key and application program operation utilizes cryptographic algorithm to generate second encrypted result;
Obtain first encrypted result by the reuse module registration code, identical with second encrypted result according to first encrypted result, determining needs to use the application program of reuse module to have the authority of using reuse module, otherwise, there are not rights of using.
2. the method for claim 1 is characterized in that, according to first key and the sign with application program of using the reuse module authority, utilizes cryptographic algorithm to generate first encrypted result and is specially:
Employing is carried out reuse module private cipher key after the One-Way Encryption as first key, carries out symmetric cryptography and obtains first encrypted result carrying out the sign with application program of using the reuse module authority after the One-Way Encryption.
3. method as claimed in claim 2 is characterized in that, obtains the reuse module check code according to first key and is specially:
Will be as the reuse module private cipher key after the One-Way Encryption of carrying out of first key, use character visible that character-coded mode generates as the reuse module check code;
Obtain first key by the reuse module check code, the sign of obtaining during according to first key and application program operation is utilized cryptographic algorithm to generate second encrypted result and is specially:
The reuse module check code is carried out reuse module private cipher key after character decoding obtains carrying out One-Way Encryption, adopt the reuse module private cipher key after the One-Way Encryption, the sign of obtaining when carrying out the application program operation after the One-Way Encryption is carried out symmetric cryptography and is obtained second encrypted result.
4. method as claimed in claim 3 is characterized in that, generates the reuse module registration code according to first encrypted result and is specially: use random number as key first encrypted result to be carried out symmetric cryptography and obtain the 3rd encrypted result;
The 3rd encrypted result and random number are spliced, use character visible that character-coded mode generates as the reuse module registration code splicing result;
Obtaining first encrypted result by the reuse module registration code is specially:
Carry out the character decoding to reusing the module registration code, isolate the 3rd encrypted result and random number, random number is decrypted the 3rd encrypted result as key, obtain first encrypted result from decoded reuse module registration code.
5. method as claimed in claim 3 is characterized in that, generates the reuse module registration code according to first encrypted result and is specially: use character visible that character-coded mode generates as the reuse module registration code first encrypted result;
Obtaining first encrypted result by the reuse module registration code is specially:
The reuse module registration code is carried out the character decoding obtain first encrypted result.
6. the method for claim 1 is characterized in that, according to first key and the sign with application program of using the reuse module authority, utilizes cryptographic algorithm to generate first encrypted result, generates the reuse module registration code according to first encrypted result and is specially:
Adopt the reuse module private cipher key as first key, the sign with application program of using the reuse module authority carried out symmetric cryptography obtain first encrypted result, with first encrypted result as the reuse module registration code;
Obtaining first encrypted result by the reuse module registration code is specially:
With the reuse module registration code as first encrypted result.
7. method as claimed in claim 6 is characterized in that, obtains the reuse module check code according to first key and is specially:
With the reuse module private cipher key as the reuse module check code;
Obtain first key by the reuse module check code, the sign of obtaining during according to first key and application program operation is utilized cryptographic algorithm to generate second encrypted result and is specially:
As first key, the sign of obtaining when adopting the operation of reuse module private cipher key application programs is carried out symmetric cryptography and is obtained second encrypted result with the reuse module private cipher key.
8. the method for claim 1 is characterized in that, when needs use the application program operation of reuse module, obtains the reuse module registration code and is specially:
When needing to use the application program operation of reuse module, read the configuration file that carries the reuse module registration code, obtain the reuse module registration code; Or
When needing to use the application program operation of reuse module, read the resource file that is added with the reuse module registration code in the string resource, obtain the reuse module registration code; Or
When needing to use the application program operation of reuse module, read in reuse module registration code newly-increased in the application program that needs the use reuse module, obtain the reuse module registration code.
9. the method for claim 1 is characterized in that, is specially according to first encrypted result is identical with second encrypted result: determine that with second encrypted result both are identical according to direct comparison first encrypted result.
10. method as claimed in claim 4 is characterized in that, is specially according to first encrypted result is identical with second encrypted result:
Use random number second encrypted result to be carried out symmetric cryptography and obtain the 4th encrypted result as key;
The 4th encrypted result and random number are spliced, the character visible that the splicing result uses character-coded mode to generate is registered comparison code as reuse module; According to comparing reuse module registration code and reuse module registration comparison code, determine that first encrypted result is identical with second encrypted result.
11. the protective device of a software reuse module is characterized in that, comprising:
First generation module: be used for according to first key and sign with application program of using the reuse module authority, utilize cryptographic algorithm to generate first encrypted result, generate the reuse module registration code according to first encrypted result, first key is for to obtain key according to the reuse module private cipher key;
Acquisition module: be used for when needs use the application program operation of reuse module, obtain the reuse module check code that obtains according to first key that adds in the sign of reuse module registration code, this application program and the reuse module;
Second generation module: be used for obtaining first key by the reuse module check code, the sign of obtaining during according to first key and application program operation utilizes cryptographic algorithm to generate second encrypted result;
Authority determination module: be used for obtaining first encrypted result by the reuse module registration code, identical according to first encrypted result with second encrypted result, determining needs to use the application program of reuse module to have the authority of using reuse module, otherwise, there are not rights of using.
12. device as claimed in claim 11, it is characterized in that, first generation module: also be used to adopt the reuse module private cipher key that carries out after the One-Way Encryption as first key, carry out symmetric cryptography and obtain first encrypted result to carrying out sign after the One-Way Encryption with application program of using the reuse module authority.
13. device as claimed in claim 12 is characterized in that, also comprises:
Check code generation module: be used for the reuse module private cipher key after the One-Way Encryption of carrying out, use character visible that character-coded mode generates as the reuse module check code as first key;
Second generation module: be used for the reuse module check code is carried out reuse module private cipher key after character decoding obtains carrying out One-Way Encryption, adopt the reuse module private cipher key after the One-Way Encryption, the sign of obtaining when carrying out the application program operation after the One-Way Encryption is carried out symmetric cryptography and is obtained second encrypted result.
14. device as claimed in claim 13 is characterized in that, first generation module: also be used to use random number first encrypted result to be carried out symmetric cryptography and obtain the 3rd encrypted result as key;
The 3rd encrypted result and random number are spliced, use character visible that character-coded mode generates as the reuse module registration code splicing result;
Authority determination module: also be used for carrying out the character decoding, isolate the 3rd encrypted result and random number, random number is decrypted the 3rd encrypted result as key, obtain first encrypted result from decoded reuse module registration code to reusing the module registration code.
15. device as claimed in claim 11, it is characterized in that, first generation module: also be used to adopt the reuse module private cipher key as first key, sign with application program of using the reuse module authority is carried out symmetric cryptography obtains first encrypted result, with first encrypted result as the reuse module registration code;
Authority determination module: also be used for the reuse module registration code as first encrypted result.
16. device as claimed in claim 15 is characterized in that, also comprises:
Check code generation module: be used for the reuse module private cipher key as the reuse module check code;
Second generation module: be used for the reuse module private cipher key as first key, the sign of obtaining when adopting the operation of reuse module private cipher key application programs is carried out symmetric cryptography and is obtained second encrypted result.
CN2009102417352A 2009-12-04 2009-12-04 Method and device for protecting software reused module Expired - Fee Related CN102087689B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102417352A CN102087689B (en) 2009-12-04 2009-12-04 Method and device for protecting software reused module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102417352A CN102087689B (en) 2009-12-04 2009-12-04 Method and device for protecting software reused module

Publications (2)

Publication Number Publication Date
CN102087689A true CN102087689A (en) 2011-06-08
CN102087689B CN102087689B (en) 2013-04-03

Family

ID=44099496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102417352A Expired - Fee Related CN102087689B (en) 2009-12-04 2009-12-04 Method and device for protecting software reused module

Country Status (1)

Country Link
CN (1) CN102087689B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523240A (en) * 2012-01-06 2012-06-27 北京邮电大学 Sensor resource integration mechanism based on internet of things
CN103378971A (en) * 2012-04-27 2013-10-30 厦门雅迅网络股份有限公司 Data encryption system and method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030135823A1 (en) * 2002-01-14 2003-07-17 Richard Marejka Loader and provider configuration for remotely provided services
CN1541350A (en) * 2000-09-21 2004-10-27 ��Ѷ�о����޹�˾ Software code signing system and method
CN1889425A (en) * 2005-09-12 2007-01-03 华为技术有限公司 Method and system for realizing H.323 network internodal safety calling
CN101145173A (en) * 2006-09-12 2008-03-19 国际商业机器公司 System and method for securely saving and restoring a context of a secure program loader

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1541350A (en) * 2000-09-21 2004-10-27 ��Ѷ�о����޹�˾ Software code signing system and method
US20030135823A1 (en) * 2002-01-14 2003-07-17 Richard Marejka Loader and provider configuration for remotely provided services
CN1889425A (en) * 2005-09-12 2007-01-03 华为技术有限公司 Method and system for realizing H.323 network internodal safety calling
CN101145173A (en) * 2006-09-12 2008-03-19 国际商业机器公司 System and method for securely saving and restoring a context of a secure program loader

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523240A (en) * 2012-01-06 2012-06-27 北京邮电大学 Sensor resource integration mechanism based on internet of things
CN102523240B (en) * 2012-01-06 2016-08-03 北京邮电大学 A kind of sensor resource integrated mechanism based on Internet of Things
CN103378971A (en) * 2012-04-27 2013-10-30 厦门雅迅网络股份有限公司 Data encryption system and method
CN103378971B (en) * 2012-04-27 2017-10-13 厦门雅迅网络股份有限公司 A kind of data encryption system and method

Also Published As

Publication number Publication date
CN102087689B (en) 2013-04-03

Similar Documents

Publication Publication Date Title
CN108055125B (en) Method and device for encrypting and decrypting product information
CN110110548B (en) Method for storing files in trusted execution environment in encrypted manner based on encryption chip
CN105683990B (en) Method and apparatus for protecting dynamic base
CN105956456A (en) Realization method for performing quadruple shared signature verification on Android system
CN104636444B (en) A kind of encryption and decryption method and device of database
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN105162797A (en) Bidirectional authentication method based on video surveillance system
CN106341228A (en) Migration method, migration system, immigration end and emigration end of virtual machine
CN104680061A (en) Method and system for verifying code signing during startup of application in Android environment
CN104732159A (en) File processing method and file processing device
CN111859415A (en) Neural network model encryption system and method
CN111435390A (en) Safety protection method for operation and maintenance tool of power distribution terminal
CN110674515A (en) Multilevel security storage chip framework
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN104200137A (en) Method for guaranteeing self-security of JAVA program
Jung et al. A secure platform model based on ARM platform security architecture for IoT devices
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
CN105825142A (en) Method and device for encrypting and decrypting documents in mobile terminal
KR102585404B1 (en) Data security apparatus
CN102087689B (en) Method and device for protecting software reused module
CN103457723B (en) A kind of encryption method and the encryption device based on it
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
WO2015154469A1 (en) Database operation method and device
Loftus et al. Android 7 file based encryption and the attacks against it
CN103605927A (en) Encryption and decryption method based on embedded Linux system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130403

Termination date: 20191204