CN101082950A - Software encrypting registration piracy-preventing method - Google Patents

Software encrypting registration piracy-preventing method Download PDF

Info

Publication number
CN101082950A
CN101082950A CNA200710018225XA CN200710018225A CN101082950A CN 101082950 A CN101082950 A CN 101082950A CN A200710018225X A CNA200710018225X A CN A200710018225XA CN 200710018225 A CN200710018225 A CN 200710018225A CN 101082950 A CN101082950 A CN 101082950A
Authority
CN
China
Prior art keywords
code
software
key word
user
word table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200710018225XA
Other languages
Chinese (zh)
Other versions
CN100576227C (en
Inventor
侯同济
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200710018225A priority Critical patent/CN100576227C/en
Publication of CN101082950A publication Critical patent/CN101082950A/en
Application granted granted Critical
Publication of CN100576227C publication Critical patent/CN100576227C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a pirate edition resisting method of coded register software, which comprises the following steps: making user end code to generate sequence code with implicit applying software and computer hardware information at the first time; regarding the sequence code as user's mark code to apply for credit to use register code; coding the legal user to generate a new sequence code through credit end; analyzing the implicit limit information of software and user mark code into the information of applying software and computer hardware; feedbacking the information as register code to the user end; using software user end to store the register code to analyze and detect the register code during operating stage; affirming whether the software is stopped. The invention adopts key character list to group, rearrange and repair to code the random number, which increases the decoding difficulty of code to prevent software edition from embezzling.

Description

A kind of software encrypting registration piracy-preventing method
Technical field
The present invention relates to a kind of application software encrypting registration piracy-preventing method on Windows operating system, adopt, belong to the encryption technology field the method for information by cryptographic algorithm generation enciphered message plain code.
Background technology
Computer application software anti-piracy technique, method and product are very many at present, but the anti-piracy mode of application software can be divided into two big classes on the whole: hardware mode and software mode.
Hardware mode generally is professional anti-piracy encrypted card (the being commonly called as dongle) product that provides by the anti-piracy company of purchase third party software, and the applied software development person adds the relevant information of application software in encrypted card, encrypted card is sold with application software.This software anti-theft platemaking technology does not limit the computer hardware system of application software operation, the user is very convenient for application software, but it need take the computing machine external interface slot, when on a computing machine, more encrypted card being installed, also can make the user feel inconvenient, and this mode need extra cost for applied software marketing.
Software mode generally is by the application software operation or registration code or sequence code in installing, the parsing that in the working procedure of application software or installation procedure, adds registration code or sequence code with check code, whether the correctness decision application software by check result continues to install or operation.Use the anti-piracy mode of registration code to be divided into two kinds: mounting means and feedback system.
The anti-piracy mounting means of registration code is in the copy of the working procedure of application software or installation procedure different sequence codes and registration code to be set, only when the registration code of relevant information and setting in application software or its installation procedure copy was complementary, application software can install or move.The same with anti-piracy encrypted card mode, this mode does not limit the computer hardware system of application software operation yet, and applied software marketing does not need the encrypted card that adds yet.But the bootlegger is as long as obtaining the application software installation procedure just can unrestrictedly duplicate and copy with its registration code that is complementary, and in fact the applied software development person is difficult to stop the bootlegger to obtain application software installation procedure and its registration code that is complementary.
The anti-piracy feedback system of registration code is that the application software user at first moves the special software that application software or applied software development person provide, thereby generate the information data that comprises the computer system hardware message code, these information datas that the applied software development person provides according to the user generate corresponding use registration code and feed back to the user.This mode does not need the encrypted card that adds, and prevented that very effectively application software from being used by bootlegger's bootlegging, this mode needs the definite one by one user identity of developer to go forward side by side enforcement with authorizing, and the software encrypting registration piracy-preventing method that we provide belongs to feedback system.
Summary of the invention
At above-mentioned the deficiencies in the prior art, the invention provides a kind of software encrypting registration piracy-preventing method that increases the password cracking difficulty.
To achieve these goals, the technical solution used in the present invention is: a kind of software encrypting registration piracy-preventing method is characterized in that this method may further comprise the steps:
Generate user identification code: do not use registration if computer system is also carried out application software, then select a key word table characteristic number at random, and the computer system hardware message code is converted to the encryption plain code, again with key word table characteristic number with encrypt plain code and mix as user identification code.
Validated user is determined: the user is by phone, and email faxes, and modes such as over-network registration are issued the software business man with user identification code and other subscriber information message, and registration code is used in application, and the software business man holds the legitimacy of determining the user.
Generate registration code: the software business man judges applicant's legitimacy by application software request for utilization person's subscriber data, and from legal request for utilization person's user identification code, obtain its computer system hardware message code, adopt then cryptographic algorithm select a key word table at random and with the hardware information code conversion for encrypting plain code, will use restricted information to mix use registration code with the encryption plain code again as application software.
The user who obtains the usage license registers user identification code and the corresponding registration code that uses.
Application software initiated back operation registration scrutiny program, at first obtain the system hardware message code of current computer, from registration table, read application software then and use registration code, from use registration code, parse the computer system hardware message code of permission to use and use restricted information, restricted information is used in comparison system hardware information code, inspection, determines at last whether application software continues operation.
Cryptographic algorithm in the described software encrypting registration piracy-preventing method step is:
1. adopt binary digit with the computer hardware information code segmentation, each segment information is converted into a numerical value of N, this numerical value of N is smaller or equal to maximum character ordinal number M in the key word table.
The hardware information code of computer system finally shows as one group of data in computer system, these data are repartitioned a series of new unsigned int data of generation by binary digit, the span of data is no more than the number of the character in the key word table that uses, these integer data are called the plain code character ordinal number, each is using the corresponding character of key word table, and the plain code of the hidden information of wanting formed in all these characters.
Computer system disk partition reel number is the integer of 32 4 bytes, this integer is repartitioned by binary digit can be generated one group of data, and the part of binary digit number deficiency is filled polishing with 0 value in repartitioning.
As: be one group by per 5 binary digits and generate 7 new integers (Ni, i=1,7), the numeric representation scope of these integers is: 0-31.As shown in Figure 3.
As: be one group by per 4 binary digits and generate 8 new integers (Ni, i=1,8), the numeric representation scope of these integers is: 0-15.As shown in Figure 4.
As: be one group by per 3 binary digits and generate 11 new integers (Ni, i=1,11), the numeric representation scope of these integers is: 0-7.As shown in Figure 5.
2. use random number K to revise the numerical value of N that decomposites, make numerical range that K adds N at 0~M, the value that adds N according to K is searched corresponding characters in the key word table, and the computer hardware information code is converted into the encryption plain code;
For the key word table of determining, information data is a part in the counterpart keys word table regularly always, and the plain code that is generated does not change.As: dividing the integer span that generates by 5 binary digits is 0-31, and the character of plain code only is preceding 32 characters in the key word table; In like manner, dividing the integer span that generates by 4 binary digits is 0-15, and the plain code character only is preceding 16 characters in the key word table.For this adds the random number correction to the plain code character ordinal number, make the plain code character in whole key word table, float, may use all characters in the key word table, and the each plain code character that generates of same encrypted feature data is all different, has increased the decoding difficulty of information plain code.
Each binary bit value that generates the data number at random is a random value in 0 to 1 integer; Per 2 binary bit value are random values in 0 to 3 integer; Per 3 binary bit value are random values in 0 to 7 integer, and the like, can in very large range select.The random number correction is exactly the binary digit generation with the random number proper number, perhaps increase some computings again and generate an integer number at random, the maximum occurrences scope of this number equals key word literary name symbol number and the enciphered message maximum possible is used the poor of number of characters.As new plain code sequence number, then any character in the key word table all may become the plain code character with this number and the addition of plain code sequence number, and the randomness of data makes that the each plain code character that generates of same encrypted feature data all may be inequality.
Generate a plurality of 1 bytes (8 binary digits at random, the numeric representation scope is: integer 0-255) is counted Code1, Code2 etc., it also can be the random number of other type, value on these random number binary bits also is uncertain, at random undoubtedly, use the binary bit of these random numbers that the plain code sequence number is carried out the polishing computing, make each code in the key word table all might occur, and the each plain code that generates of enciphered message data is all inequality.
As: to dividing the plain code sequence number span that generates by 5 binary digits is 0 to 31, and then the random number domain of walker should be between 1 to 4.Use among integer Code1, the Code2 preceding 7 numerical value in 8 binary digits (0 or 1, suppose to be respectively: B1 (i) and B2 (i), i=1 ..., 7).Calculate: A (i)=1+B1 (i)+2*B2 (i) i=1 ..., 7, A (i) is the random number between 1 to 4, i plain code sequence number adds that A (i) value is as its last value.Then: the span of plain code sequence number is 0 to 35.
For dividing the plain code sequence number span that generates by 4 binary digits is 0 to 15, and then the random number domain of walker should be between 1 to 20.
A(i)=1+B1(i)+2*B2(i)+C
C is the integer between 0 to 16, can adopt a generating mode acquisition new random number (as: Code3) at random, and this mode need increase the information of this number in encrypting plain code; Also can from the binary digit of Code1, Code2, take out 5 binary digits and obtain according to certain fixed form, as: C=B3 (i)+B4 (i)+2*B5 (i)+4*B6 (i)+8*B7 (i).
For dividing the plain code sequence number span that generates by 3 binary digits is 0 to 7, and then the random number domain of walker should be between 1 to 28.
A(i)=1+B1(i)+2*B2(i)+C
C is the integer between 0 to 24, can adopt a generating mode acquisition new random number (as: Code3) at random equally, and this mode need increase the information of this number in encrypting plain code; Also can from the binary digit of Code1, Code2, take out 6 binary digits and obtain according to certain fixed form, as: C=B3 (i)+B4 (i)+2*B5 (i)+4*B6 (i)+8*B7 (i)+16*B8 (i).
By the random number adjustment, make the hardware information code segmentation after value corresponding scope character in the password word table of correspondence can occur.
3. all characters grouping in the key word table is reset, key word table rearrangement mode with one or several data as key word table characteristic number L;
The arrangement mode of character is different in the key word table generates different types of key word table, and the character that uses in the key word table is many more, and the mode that character is arranged is also many more, and the kind of key word table is also many more, at most can have Kind, identical hardware information uses identical binary digit decomposition method, and uses different types of key word table, and the final encryption plain code that generates is also inequality.With character arrangement mode in or the one group of integer representation key word table, this number or this group number are called the characteristic number of this key word table, select the characteristic number of key word table also just to select a kind of key word table at random at random.Key word table characteristic number and the encryption plain code that uses the corresponding secret key word table to generate are mixed together the complete enciphered message plain code of generation, generate the user identification code of application software in this way and use registration code.
If choose A-Z and 0-9 is the character of key word table, have 36 characters, the key word table that this natural order is arranged is called the initial key word table, and any one key word table can be as the initial key word table.Other key word table then generates by the character position of resetting in the initial key word table, then arrangement mode at most can have (surpass 3.7199E+41) plants, can generate at most 36! Plant the key word table.Key word table range of choice extensively and the decoding difficulty that will increase the information plain code at random of choosing mode.
Too many by the key word table kind that simple rearrangement can generate, make that the integer number in the computer system can't be represented the characteristic number that they are reset, and difference is less between the key word table of many simple rearrangement generations.The grouping of character in the key word table (as is divided into 4 groups, every group comprises 9 characters or is divided into 6 groups, every group comprises 6 characters, be divided into 5 groups after perhaps giving up one of alphabetical O or numeral 0, every group comprises 7 characters), with the group is that unit carries out random alignment to group, simultaneously the character in each group is also carried out random alignment.Can adopt the aligned identical mode or adopt different arrangement modes between each group, adopt different arrangement modes to need more characteristic number to represent arrangement mode between each group; And adopt the aligned identical mode to need less characteristic number.
Code in the initial key word table is divided into m group, one group of picked at random is as first group that rearranges in m group, and then one group of conduct of picked at random rearranges in m-1 remaining group second group, carry out successively up to remaining last group, the arranged in groups mode has m! Kind.The character that can comprise similar number in each group, the character that also can comprise different numbers, suppose to comprise k character in certain group, first that conduct of picked at random rearranges in k character, and then conduct of picked at random rearranges in k-1 remaining character second, carry out successively up to being left last, the character arrangement mode of this group has k! Kind.If each the group comprise respectively k1, k2 ..., a km character, then have ... km! Kind arrange, feature numerical representation digital scope need greater than ... km! If to comprise number of characters identical for each group, and adopt the aligned identical mode, then have m! Kind arrange, feature numerical representation digital scope need greater than According to the size of arrangement mode number, in other words according to what of key word table kind, characteristic number can be selected different data types.The data that binary digit in the different intervals of characteristic number generates are illustrated in group sequence number or the character ordinal number of choosing in the homogeneous picked at random not.
As: five character ABCDE that arrange naturally reset the data representation of a characteristic number BYTE type of employing (8 binary digits) of mode.With 0 as 1 of position numeration, then range of choice is 0-4 for the first time; Range of choice is 0-3 for the second time; Range of choice is 0-2 for the third time; The 4th time range of choice is 0-1;
The binary data figure place is divided as shown in Figure 2:
1,2, No. 33 binary digits can be represented the data between the 0-7, and select the first time that record is arranged, and is assumed to 3, then selects D; 4, No. 52 binary digits can be represented the data between the 0-3, and select the second time that record is arranged, and is assumed to 2, then selects C; 6, No. 72 binary digits can be represented the data between the 0-3, and the selection for the third time that record is arranged then is assumed to 1, select B; No. 81 binary digits can be represented the data between the 0-1, and the 4th time of arranging of record selected, and is assumed to 1, then selects E.Rearrange the result and be DCBEA, characteristic number is 179 (binary number is 10110011).
Any rearrangement of five characters of arranging naturally can be represented with a BYTE categorical data; If do some restrictions (as: primary selective value was greater than 4 o'clock, and value is 4, and selective value for the third time was greater than 2 o'clock, and value is 2), the then all corresponding a kind of arrangement of any one BYTE categorical data to arranging the character ordinal number of selecting.
If it is more to need to reset number of characters in the group, the data type of characteristic number can be selected short (16) data or long (32) data, also can select double-precision floating points (64), makes integer for floating number by the binary digit segmentation and uses.
The characteristic number of grouping rearrangement mode is fixed in the application software, the characteristic number that the corresponding different grouping of different application software is reset, and the rearrangement mode of character is used in encryption at random in the group, can carry out the encrypting registration piracy-preventing protection simultaneously to a plurality of application software.
4. will represent that the L of key word table characteristic number and the random number K of correction plain code sneak in the user computer hardware information encryption plain code.Can be inserted into the method for encrypting certain position of plain code and sneak into the encryption plain code with the L of key word table characteristic number and the random number K that revises plain code by converting sexadecimal to.
The present invention compared with prior art has the following advantages: adopting binary digit decomposition computation machine hardware information code to generate on the basis of information plain code, use random number to revise and decompose the information plain code that generates, make that the each plain code that generates of same hardware information code is all inequality, increased and cracked difficulty.Also adopt the grouping of key word table to reset simultaneously, made the key word table reset the data representation that mode can be called key word table characteristic number with one or several, and with in these characteristic number drop-in plain codes.The key word table characteristic number of selection use is just selected the key word table of use at random at random, and this will further increase the randomness of information plain code and crack difficulty.
Description of drawings
Fig. 1 is the FB(flow block) of software encrypting registration piracy-preventing method of the present invention.
Fig. 2 is i.e. 8 the binary digit data types of a BYTE type.
Fig. 3 is with 32 binary digits from low to high, and per 5 binary digits are one group and divide synoptic diagram.
Fig. 4 is with 32 binary digits from low to high, and per 4 binary digits are one group and divide synoptic diagram.
Fig. 5 is with 32 binary digits from low to high, and per 3 binary digits are one group and divide synoptic diagram.
Embodiment
As example, as shown in Figure 1, also can use this encrypting registration piracy-preventing method with the method for preventing piracy implementation procedure of carrying out encrypting registration for other hardware characteristics code based on the disk partition reel number.Computer system disk partition reel number is one 4 a byte integer at random, and this integer generates when being the conducting disk partition format, and it is very low to repeat rate, is taken as the sign of disk partition usually.Carry out encryption of software system by computer system disk partition reel number, become a kind of method of protection software copyright.
After application software initiated, at first from the computer system registration table, read the log-on message of application software and check.If subscriber computer does not carry out application software registration or log-on message when making a mistake, application software generates a character string that is called the letter and number composition of user identification code with user computer hardware information (disk reel number) and encrypting for information about of application software, both: user ID.Application software ejects login dialog frame prompting user and carries out the application software registration.The user uses this user identification code to use registration code to application software developer's application, the user identification code that application software developer provides according to legal applicant, encrypt once more and generate a character string that is called the letter and number composition that uses registration code, and will use registration code to feed back to legal application user, the user application software system is written to these user's registration informations in the system for computer registration table, carries out the validity checking of application software system during system afterwards uses.
The generation of user ID:
Application software system generates the characteristic number of several random numbers as the key word table at first at random, and both: application software system has selected to encrypt the key word table that uses at random.The number of characteristic number and type depend on the employed key word table grouping rearrangement mode of encrypting.Adopt A-Z and 0-9 and remove with the digital 0 alphabetical O that obscures easily after 35 characters accord with as the key word literary name, with the key word table is 5 groups, every group comprises 7 characters, and character adopts identical arrangement mode in each group, by the difference of application software developer, then only need the characteristic number of the random number of one 2 byte as if the arrangement mode that will organize as the key word table as the different software product.The data type of the number decision characteristic number of character in the group, the arrangement mode data number of identical decision characteristic number whether in the group.
Computer system disk partition reel number is the integer of 32 4 bytes, 32 binary digits of this integer are divided into groups from the low level to a high position as shown in Figure 3, and per 5 binary digits are one group and generate 7 new integers (Ni, i=1,7), the numeric representation scope of these integers is: 0 to 31.These integers are adopted the random number correction, they are floated between 0 to 35, and obtain 7 characters in the key word table as index, both: the information plain code of disk partition reel number with these integers.Equally, again application software is generated the enciphered message plain code for information about.At last, the key word table being reset the characteristic number of mode represents (to be 0-9 with sexadecimal number respectively with the random number of carrying out the plain code correction, A-F), they and the information plain code that is generated are mixed the complete plain code of forming the enciphered message data, as: W0A3P-DX99J-J9ICB.In this complete plain code, comprised employed key word table characteristic number, float number and information plain code at random, and can parse real enciphered message data with it.Use the user ID of this complete enciphered message plain code as application software.
Registration code produces:
Developer's end of application software system has encrypting and decrypting method identical with user side and mechanism, that is: the sneak into mode of the random number of the characteristic number of key word table and plain code correction in user ID and the binary bit segmented mode of encrypted code information.It at first will be blended in the characteristic number of the key word table in the user ID and the random number of plain code correction is searched out, obtain employed key word table, thereby obtain the index value of plain code character, carry out the segment data that reverse correction obtains encrypted code with the random number of plain code correction again, at last these segment data combinations are obtained user computer hardware feature code information and application software for information about.The information data that will solve from user ID is added using the use restricted information of software users, that uses the cipher mode identical with user ID to generate to have comprised user computer hardware feature code information and application software reaches the complete plain code that uses restricted information for information about, as: W3I9QC-9XBJBF-F3YHA9.Equally, employed key word table characteristic number, float number and information plain code at random in this complete plain code, have been comprised, and can parse real enciphered message data with it, the key word table characteristic number in the registration code, the number that floats is different from the user ID at random.Use the registration code of this complete enciphered message plain code as application software.The user side of application software system has with the developer holds identical encrypting and decrypting method and mechanism, therefore, can parse the use restricted information that reaches application software for information about of user computer hardware feature code information and application software from registration code.
The application software system development person will use registration code to authorize the legal applicant that application software is used, and legal applicant inserts the user identification code that obtains in the corresponding input field of application software system login dialog frame with corresponding registration code.Accreditation process in the application software system compares inspection with the hardware characteristics code that is included in user identification code and the use registration code respectively with the computer system hardware feature code, and comparison check by after corresponding contents and other various information datas are write in application software request for utilization person's the computer system registration table, in the system registry of subscriber computer, generate log-on data.After registration is finished, the application software hardware characteristics code that from the computer system registration table, reads the log-on message of application software system and parse the computer system of mandate in service afterwards, obtain then application software operation computer system the hardware characteristics code and carry out comparison check, determine at last whether application software continues operation.
It should be noted last that, above example is only unrestricted in order to technical scheme of the present invention to be described, only the present invention is had been described in detail with reference to example, those of ordinary skill in the art is to be understood that, can make amendment or be equal to replacement technical scheme of the present invention, and not break away from the spirit and scope of technical solution of the present invention.

Claims (2)

1. software encrypting registration piracy-preventing method is characterized in that this method may further comprise the steps:
(1) generates user identification code: application software and user computer hardware information are interrelated, generate user identification code by cryptographic algorithm;
(2) validated user is determined: the software business man uses public communication modes to obtain the data information of particular user, and determines user's legitimacy by manual type or webserver mode;
(3) generate registration code: the software business man holds program or network server program to resolve user identification code and obtains computer hardware information, and this program uses cryptographic algorithm that computer hardware information is encrypted, and adds that using the restricted information combination to generate uses registration code.
2. according to described a kind of software encrypting registration piracy-preventing method of claim 1, it is characterized in that the cryptographic algorithm in described step (1) and the step (3) is:
(1) adopt binary digit with the computer hardware information code segmentation, each segment information is converted into a numerical value of N, this numerical value of N is smaller or equal to maximum character ordinal number M in the key word table;
(2) use random number K to revise the numerical value of N that decomposites, make numerical range that K adds N at 0~M, the value that adds N according to K is searched corresponding characters in the key word table, and the computer hardware information code is converted into the encryption plain code;
(3) all characters grouping in the key word table is reset, key word table rearrangement mode with one or several data as key word table characteristic number L;
(4) will represent that the L of key word table characteristic number and random number K sneak in the user computer hardware information encryption plain code.
CN200710018225A 2007-07-10 2007-07-10 A kind of software encrypting registration piracy-preventing method Expired - Fee Related CN100576227C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710018225A CN100576227C (en) 2007-07-10 2007-07-10 A kind of software encrypting registration piracy-preventing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710018225A CN100576227C (en) 2007-07-10 2007-07-10 A kind of software encrypting registration piracy-preventing method

Publications (2)

Publication Number Publication Date
CN101082950A true CN101082950A (en) 2007-12-05
CN100576227C CN100576227C (en) 2009-12-30

Family

ID=38912513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710018225A Expired - Fee Related CN100576227C (en) 2007-07-10 2007-07-10 A kind of software encrypting registration piracy-preventing method

Country Status (1)

Country Link
CN (1) CN100576227C (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119588B (en) * 2007-07-25 2010-08-18 宇龙计算机通信科技(深圳)有限公司 Cipher key generating method and system for enrollment code and login method and system for software
CN101917433A (en) * 2010-08-17 2010-12-15 上海交通大学 Network remote registration localization reappearing protection system
CN102609650A (en) * 2012-02-06 2012-07-25 上海易罗信息科技有限公司 System and method for realizing software encrypting and downloading in electronic equipment
CN102763046A (en) * 2010-02-12 2012-10-31 三菱电机株式会社 Programmable controller and programming device
CN103530551A (en) * 2012-07-06 2014-01-22 天讯天网(福建)网络科技有限公司 Software restriction method and system based on mobile Internet and cloud computing
CN104346543A (en) * 2013-07-29 2015-02-11 长沙微观信息科技有限公司 Encryption method for identifying computer intelligently
CN105095700A (en) * 2015-09-29 2015-11-25 苏州谷夫道自动化科技有限公司 Online authorization method of CNC (computer numerical control) system
CN106446616A (en) * 2016-09-14 2017-02-22 金蝶软件(中国)有限公司 Software protecting method and device
CN106778085A (en) * 2016-11-22 2017-05-31 中铁第五勘察设计院集团有限公司 A kind of software encryption and protection and the method for automatically renewed
CN107368711A (en) * 2016-05-11 2017-11-21 徐国庆 A kind of implementation method for the code protection system that business model support is provided
CN108052804A (en) * 2018-01-09 2018-05-18 江苏徐工信息技术股份有限公司 A kind of implementation method of the software registration code based on high in the clouds management and control
CN108920911A (en) * 2018-06-19 2018-11-30 陕西师范大学 Anti-copy belleville software authorization method and device
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN112565245A (en) * 2020-12-02 2021-03-26 深圳市汇顶科技股份有限公司 Data transmission method, production line end tool, chip, server and storage medium
CN112818383A (en) * 2021-01-14 2021-05-18 内蒙古蒙商消费金融股份有限公司 Table registration method and device
CN114024665A (en) * 2021-09-14 2022-02-08 天聚地合(苏州)数据股份有限公司 Random key and card number generation method and device

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119588B (en) * 2007-07-25 2010-08-18 宇龙计算机通信科技(深圳)有限公司 Cipher key generating method and system for enrollment code and login method and system for software
CN102763046A (en) * 2010-02-12 2012-10-31 三菱电机株式会社 Programmable controller and programming device
CN102763046B (en) * 2010-02-12 2015-12-16 三菱电机株式会社 Programmable Logic Controller
CN101917433A (en) * 2010-08-17 2010-12-15 上海交通大学 Network remote registration localization reappearing protection system
CN101917433B (en) * 2010-08-17 2012-09-19 上海交通大学 Protection system for network remote registration and localized reappearing
CN102609650A (en) * 2012-02-06 2012-07-25 上海易罗信息科技有限公司 System and method for realizing software encrypting and downloading in electronic equipment
CN102609650B (en) * 2012-02-06 2016-08-03 北京合众思壮科技股份有限公司 Realize the system and method that in electronic equipment, software cryptography is downloaded
CN103530551A (en) * 2012-07-06 2014-01-22 天讯天网(福建)网络科技有限公司 Software restriction method and system based on mobile Internet and cloud computing
CN104346543A (en) * 2013-07-29 2015-02-11 长沙微观信息科技有限公司 Encryption method for identifying computer intelligently
CN105095700A (en) * 2015-09-29 2015-11-25 苏州谷夫道自动化科技有限公司 Online authorization method of CNC (computer numerical control) system
CN107368711A (en) * 2016-05-11 2017-11-21 徐国庆 A kind of implementation method for the code protection system that business model support is provided
CN106446616A (en) * 2016-09-14 2017-02-22 金蝶软件(中国)有限公司 Software protecting method and device
CN106778085A (en) * 2016-11-22 2017-05-31 中铁第五勘察设计院集团有限公司 A kind of software encryption and protection and the method for automatically renewed
CN108052804A (en) * 2018-01-09 2018-05-18 江苏徐工信息技术股份有限公司 A kind of implementation method of the software registration code based on high in the clouds management and control
CN108920911A (en) * 2018-06-19 2018-11-30 陕西师范大学 Anti-copy belleville software authorization method and device
CN110096849A (en) * 2019-04-02 2019-08-06 深圳市中博科创信息技术有限公司 A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN112565245A (en) * 2020-12-02 2021-03-26 深圳市汇顶科技股份有限公司 Data transmission method, production line end tool, chip, server and storage medium
CN112565245B (en) * 2020-12-02 2023-04-18 深圳市汇顶科技股份有限公司 Data transmission method, production line end tool, chip, server and storage medium
CN112818383A (en) * 2021-01-14 2021-05-18 内蒙古蒙商消费金融股份有限公司 Table registration method and device
CN114024665A (en) * 2021-09-14 2022-02-08 天聚地合(苏州)数据股份有限公司 Random key and card number generation method and device

Also Published As

Publication number Publication date
CN100576227C (en) 2009-12-30

Similar Documents

Publication Publication Date Title
CN100576227C (en) A kind of software encrypting registration piracy-preventing method
US11853171B2 (en) Systems and methods for quorum-based data processing
US11042791B2 (en) Method and apparatus for generating and reading composite two-dimensional code
US9514330B2 (en) Meta-complete data storage
EP2301185B1 (en) Format-preserving cryptographic systems
US9489521B2 (en) Format preserving encryption methods for data strings with constraints
US5504818A (en) Information processing system using error-correcting codes and cryptography
US9208491B2 (en) Format-preserving cryptographic systems
CN1326353C (en) Method and system for integrated protection of data distributed processing in computer networks
US20170149565A9 (en) Format-preserving cryptographic systems
CN104392197B (en) Method for increasing reading rate and encryption of website two-dimensional code tags
Dumas et al. Foundations of coding: compression, encryption, error correction
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
CN110365468A (en) Anonymization processing method, device, equipment and storage medium
US20020136400A1 (en) R-conversion encryption method and system
GB2479074A (en) A key server selects policy rules to apply to a key request based on an identifier included in the request
CN102185897B (en) Safe distributed virtual storage pool system
RU2259639C2 (en) Method for complex protection of distributed information processing in computer systems and system for realization of said method
CN112613018A (en) Block chain-based digital certificate using system
RU2338248C1 (en) Method for marking and method for marking check of lines of answers to user database requests using digital watermarks
CN117744128B (en) E-commerce transaction data security management method based on block chain
Hammer Higher-order homophonic ciphers
CN113656816B (en) Text encryption method
CN116484407B (en) Data security protection method and device, electronic equipment and storage medium
CN1142654C (en) Method for realizing network accreditation by encipher clobber generating

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091230

Termination date: 20100710