CN104348615A - Encryption method based on server hardware information and RAS algorithm - Google Patents

Encryption method based on server hardware information and RAS algorithm Download PDF

Info

Publication number
CN104348615A
CN104348615A CN201310317871.1A CN201310317871A CN104348615A CN 104348615 A CN104348615 A CN 104348615A CN 201310317871 A CN201310317871 A CN 201310317871A CN 104348615 A CN104348615 A CN 104348615A
Authority
CN
China
Prior art keywords
server
hardware information
algorithm
software
hardware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310317871.1A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Yction Software Co Ltd
Original Assignee
Zhenjiang Yction Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Yction Software Co Ltd filed Critical Zhenjiang Yction Software Co Ltd
Priority to CN201310317871.1A priority Critical patent/CN104348615A/en
Publication of CN104348615A publication Critical patent/CN104348615A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to an encryption method based on server hardware information and an RAS algorithm. The server hardware information is added into an encryption algorithm, thus the uniqueness and safety of encryption information are improved. When a user logs on software, server hardware information (such as CPU serial number, hard disk serial number) is obtained, thus the decryption is carried out through the RAS algorithm, and the login is available when the decryption is successful. If hardware equipment is replaced, the decryption can not be carried out. On one hand, the security of login and software is ensured, on the other hand, the hook with the server hardware is achieved, and one key is ensured to be only used in one server. If one server generates a key for one time, once the hardware is replaced or damaged, the decryption can be not carried out in login and the user can not log on the software, and the loss, leakage and manipulation of data are avoided.

Description

A kind of encryption method based on server hardware information and RAS algorithm
Technical field
The present invention relates to a kind of encryption method to realize, especially based on the encryption method of server hardware information and RAS algorithm realization.The invention belongs to field of computer technology.
Background technology
At present, the encryption technology kind used in worldwide is very many, and the cryptographic algorithm of main flow has: MD5, DSA, RSA, SHA-1, DES, HAVAL-128 and RIPEMD.These have quite high fail safe when being encrypted in algorithm design, and to teach and team has carried out after she reports the achievement in research of the bump test of the several Hash function of MD4, MD5, HAVAL-128 and RIPEMD, having caused the great disturbance of password educational circles in the international cryptography conference that California, USA St Babara is held at China Wang little Yun in 2004.Can be collided out in a short period of time because her research is the cipher modes such as MD5.And in 2005 afterwards year, professor Wang little Yun is flat has again cracked SHA-1, make can forge electronic signature in theory.These inventions all make a lot of algorithm lose now fail safe in the past.And RSA Algorithm wherein remains good fail safe always, the method effectively attacking RSA Algorithm is not also had to occur so far.So utilize RSA Algorithm to be encrypted computer software etc., there is higher fail safe.
Summary of the invention
Goal of the invention:
Multiplely to be cracked owing to having in the cryptographic means that used in the past, security performance reduces greatly.And the encryption that RSA Algorithm realizes has good fail safe, so invention describes a kind of method of carrying out being encrypted computer software based on server hardware information in conjunction with RSA Algorithm always.Ensure that fail safe on the one hand, link up with again on the one hand with server hardware, once hardware occurs with changing or damaging, software also can be simultaneously out of service, avoids the loss of data, reveals and distort.
Concrete steps are as follows:
Step 1: the information (as CPU sequence number, hard disk serial number) obtaining multiple hardware of server, after "-" is wherein removed, English alphabet is changed into ASC code, the carrying out not doing any mathematical operation is spliced, connect into a very large numeral like this, like this as the parameter e of in RAS algorithm.
Step 2: according to RAS algorithm, and the server parameter e obtained before, setting p, q parameter, ensures that private key and (p-1) (q-1) are relatively prime, then using p, q product as the n in key, finally obtain PKI and private key.Thus be encrypted according to each parameter and the private key that gets.
Step 3: add in software systems and obtain the program that server hardware formulates parameter, get parms when making to log in, thus transform acquisition private key, be decrypted.If hardware device has change or damages, then obtain less than correct parameter, thus also cannot be decrypted.Ensure that the fail safe of software data.
Embodiment
Embodiment one
1. use Myeclips 8.6 development platform to develop design, use expert data library software MySql to carry out data management.
2. this adopts CPU sequence number and hard disk serial number as the hardware information of server.Carry out by JNI the program calling the acquisition CPU sequence number that C language is write, platform shows, then obtains hard disk serial number.Remove after "-", English alphabet is converted into ASC code and splices, and obtains a very large digital e.
3. find two very large prime number p, q, n be p, q product, (q-1) (p-1) must be relatively prime with e, and e and n is as PKI (KU), and d is (mod((q-1) (p-1)) value of/e, n is with originally identical.D and n is as private key (KR).E the factorial of m obtains encrypting C to n delivery.D the factorial of c obtains deciphering c to n delivery.
4. when software brings into operation, when user logs in, meeting Automatically invoked obtains the program of hardware information, thus acquisition e is decrypted, if hardware information is consistent, that can log in.When generating a key mistake on a station server, if hardware device is changed or change server, because hardware information is all uniqueness, the parameter got must be deciphered, thus stops login, well protects the fail safe of software and data.
In addition to the implementation, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of application claims.

Claims (3)

1. obtain server hardware information, remove the symbol in its result and ASCII character conversion is carried out to English alphabet, be spliced into a very large numeral as encryption parameter.
2., for the hardware information parameter got, calculated by RSA Algorithm and generate PKI and private key is encrypted and decryption oprerations.
3. during logging in system by user, blocker carries out work, get the specific hardware information of active user's server, be decrypted after conversion, after generated key on a station server, when changing hardware or change server, cannot be decrypted thus cannot software be logged in.
CN201310317871.1A 2013-07-26 2013-07-26 Encryption method based on server hardware information and RAS algorithm Pending CN104348615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310317871.1A CN104348615A (en) 2013-07-26 2013-07-26 Encryption method based on server hardware information and RAS algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310317871.1A CN104348615A (en) 2013-07-26 2013-07-26 Encryption method based on server hardware information and RAS algorithm

Publications (1)

Publication Number Publication Date
CN104348615A true CN104348615A (en) 2015-02-11

Family

ID=52503499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310317871.1A Pending CN104348615A (en) 2013-07-26 2013-07-26 Encryption method based on server hardware information and RAS algorithm

Country Status (1)

Country Link
CN (1) CN104348615A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812125A (en) * 2016-03-28 2016-07-27 北京信安世纪科技有限公司 Private key generation method and device
CN109086089A (en) * 2018-08-27 2018-12-25 郑州云海信息技术有限公司 A kind of method, system and equipment that hardware configuration limits

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149775A (en) * 2006-09-20 2008-03-26 展讯通信(上海)有限公司 Encryption and decryption method for realizing hardware and software binding
US20090300362A1 (en) * 2008-05-29 2009-12-03 Cheman Shaik Password self encryption method and system and encryption by keys generated from personal secret information
CN101789866A (en) * 2010-02-03 2010-07-28 国家保密科学技术研究所 High-reliability safety isolation and information exchange method
CN101873331A (en) * 2010-07-07 2010-10-27 中国工商银行股份有限公司 Safety authentication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101149775A (en) * 2006-09-20 2008-03-26 展讯通信(上海)有限公司 Encryption and decryption method for realizing hardware and software binding
US20090300362A1 (en) * 2008-05-29 2009-12-03 Cheman Shaik Password self encryption method and system and encryption by keys generated from personal secret information
CN101789866A (en) * 2010-02-03 2010-07-28 国家保密科学技术研究所 High-reliability safety isolation and information exchange method
CN101873331A (en) * 2010-07-07 2010-10-27 中国工商银行股份有限公司 Safety authentication method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
范涛,毛继曙,王国中: "《基于硬件信息的软件加密系统在数字电视中的应用》", 《电视技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105812125A (en) * 2016-03-28 2016-07-27 北京信安世纪科技有限公司 Private key generation method and device
CN105812125B (en) * 2016-03-28 2019-01-11 北京信安世纪科技股份有限公司 The generation method and device of private key
CN109086089A (en) * 2018-08-27 2018-12-25 郑州云海信息技术有限公司 A kind of method, system and equipment that hardware configuration limits

Similar Documents

Publication Publication Date Title
CN105939191B (en) The client secure De-weight method of ciphertext data in a kind of cloud storage
Vorobiev et al. Organization of the entrusted calculations in crucial objects of informatization under uncertainty
US9673975B1 (en) Cryptographic key splitting for offline and online data protection
US9774591B2 (en) Password manipulation for secure account creation and verification through third-party servers
CN105450620A (en) Information processing method and device
CN104917617B (en) A kind of encryption group ranking obscures method
CN104657630A (en) Integrated circuit provisioning using physical unclonable function
CN103179129B (en) A kind of remote certification method based on cloud computing IaaS environment
US20150215117A1 (en) White box encryption apparatus and method
CN102986161B (en) For carrying out the method and system of cryptoguard to application
CN101950347A (en) Method and system for encrypting data
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
CN104268447A (en) Encryption method of embedded software
CN104168116A (en) Database identity authentication method and system
CN105468940A (en) Software protection method and apparatus
CN105812146A (en) MD5-based two-way encryption data protection method
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN105141631A (en) Terminal, server and account security login method, device and system
CN104348615A (en) Encryption method based on server hardware information and RAS algorithm
CN106452754B (en) Multi-user online dynamic encryption method and device
CN106257859A (en) A kind of password using method
US20230239144A1 (en) Deterministic chaos-based quantum computer resistant data encryption for large scale wide area network solutions
CN104868994A (en) Collaboration secret key management method, device and system
CN105681027A (en) HSM encrypted information synchronization method, device and system
CN114553566A (en) Data encryption method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150211

WD01 Invention patent application deemed withdrawn after publication