CN101447009A - Method, device and system for installing software - Google Patents

Method, device and system for installing software Download PDF

Info

Publication number
CN101447009A
CN101447009A CNA2008102473856A CN200810247385A CN101447009A CN 101447009 A CN101447009 A CN 101447009A CN A2008102473856 A CNA2008102473856 A CN A2008102473856A CN 200810247385 A CN200810247385 A CN 200810247385A CN 101447009 A CN101447009 A CN 101447009A
Authority
CN
China
Prior art keywords
software
computing machine
characteristic information
intelligent key
key apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008102473856A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNA2008102473856A priority Critical patent/CN101447009A/en
Publication of CN101447009A publication Critical patent/CN101447009A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method, a device and a system for installing software, relates to the technical field of computers, and solves the problem that after being installed on one computer, the software can be easily copied to another computer for use in the prior art. The embodiment of the invention comprises the following steps: acquiring the characteristic information of computer hardware when the software is run; generating keys based on the acquired characteristic information; then, encrypting the software by the generated keys; and finally, installing the encrypted software on the computer. The embodiment of the invention is suitable for running various software, particularly the software requiring copyright protection and classified information protection.

Description

Software installation method, Apparatus and system
Technical field
The present invention relates to field of computer technology, relate in particular to method, the Apparatus and system of install software on computers.
Background technology
After generally need correctly being installed in the computing machine, could correctly use by software in the computing machine.At present software is installed to and generally needs list entries number in the process of computing machine, and under the well correct situation of sequence of input with software registration in the registration table of computer operating system, make software and computer association, to avoid just directly using software without installation process.So, if installed software in computing machine is therein directly copied in another computing machine, the software after duplicating can not directly use in another computing machine, has reached the purpose of protecting software copyright.
In practice process, the inventor finds that there are the following problems at least in the prior art: exist because the registration table of computer operating system is a form with operating system software, be easy to just be cracked, if installed software in computing machine is therein directly copied in another computing machine, and correspondingly revise the registration table of an other computer operating system, make the software after duplicating in another computing machine, directly to use, cause software by bootlegging.
Because the data that comprise in a lot of softwares may relate to individual privacy and secret of the trade,, bring loss also can for the software user in case software by bootlegging, not only can bring loss to software manufacturer.For example: at present, some user need carry out financial accounting with financial software, has the standardization that drives financial management, the work efficiency that improves financial accounting, reduce the mistake of financial accounting, be convenient to the advantage of finance inquiry, simultaneously, include a large amount of secrets of user in the financial software.Carry out the installation of software if adopt prior art, in case the financial software that is installed in computing machine is by fraudulent copying, this financial software just may use on an other computing machine, simultaneously can see the user's secret that comprises the financial software from another computing machine, cause user's secret to reveal, bring loss to the user.
Summary of the invention
The invention provides a kind of software installation method, Apparatus and system, the software after make installing is difficult for being illegally copied in the other computing machine and uses.
For achieving the above object, the present invention adopts following technical scheme:
A kind of software installation method comprises:
Obtain the characteristic information of computer hardware;
Generate key according to described characteristic information;
Utilize the key that generates that software is carried out encryption;
To be installed to computing machine through the software of described encryption.
A kind of software erecting device comprises:
Acquiring unit is used to obtain the characteristic information of computer hardware;
Generation unit is used for generating key according to described characteristic information;
Processing unit is used to utilize the key of generation that software is carried out encryption;
Installation unit is used for the software through described encryption is installed to computing machine.
A kind of software installation system, comprise computing machine and software erecting device, described software erecting device is used to obtain the characteristic information of computer hardware, generate key according to described characteristic information, utilize the key that generates that software is carried out encryption, will be installed to described computing machine through the software of described encryption.
Software installation method provided by the invention, Apparatus and system, in the process of install software, obtain the characteristic information of computer hardware, and utilize the characteristic information of computer hardware to generate key, utilize the key that generates that software is carried out encryption then, the software that is installed at last in the computing machine is through the software after the encryption.Because the key that the encryption process in the present embodiment is used generates according to the computer hardware characteristic information; and the characteristic information of computer hardware is unique; so when the software after installing is copied to another computing machine; because the characteristic information difference of computer hardware; another computing machine can't generate can be with the key of software decryption; thereby the software of avoiding copying to another computing machine is used, and has realized the copyright protection of software.
By such scheme as can be known, if comprised user's confidential information in the installed software because software can not normally use when being illegally copied to other computing machines, thus the confidential information of having avoided being comprised in the software revealed, protected user's interests.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the process flow diagram of software installation method in the embodiment of the invention 1;
Fig. 2 is the schematic diagram of software erecting device in the embodiment of the invention 1;
Fig. 3 is the process flow diagram of software installation method in the embodiment of the invention 2;
Fig. 4 is the schematic diagram of software erecting device in the embodiment of the invention 2;
Fig. 5 is the block diagram of the embodiment of the invention 2 software installation systems.
Embodiment
Need to use intelligent key apparatus among the present invention, in order to understand the effect of intelligent key apparatus more exactly, following mask body is introduced the partial function of intelligent key apparatus: intelligent key apparatus is by USB (UniversalSerial Bus, USB (universal serial bus)) interface links to each other with computing machine, has anti-physical characteristics of attacking, be widely used in the identification, as the identification in Web bank and VPN fields such as (Virtual Private Network, VPN (virtual private network)).Can store data in the intelligent key apparatus, and can carry out encryption/decryption process to the data of storage, for example: important informations such as password, digital certificates, electronic signature and electronic stamp are stored in the intelligent key apparatus, in order to guarantee the safety of important information.
In order to be illustrated more clearly in technical scheme of the present invention, below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Embodiment 1:
Use in order to make the software that is installed in computing machine be difficult for being illegally copied on other computing machines, the embodiment of the invention provides a kind of software installation method, and as shown in Figure 1, this method comprises:
101, obtain the characteristic information of computer hardware behind the installation procedure that starts software, said here installation procedure generally all needs complete execution installation process, and for example: setup.exe program commonly used at present is exactly a said installation procedure in the present embodiment.
102, according to the characteristic information generation key of certain rule according to the computer hardware that gets access to.
103, utilizing the key of above-mentioned generation that software is carried out encryption, mainly is that significant data in the software is carried out encryption, as: the secret to user in the kernel of software or the software is carried out encryption.
104, will be installed to through the software of above-mentioned encryption on the computing machine; after having only deciphering, the feasible software that is installed on the computing machine could move; and because the key of its deciphering is related with computer hardware; and then guarantee to use after installed software directly copies to other computing machines; protect the copyright of software, protected user's secret in the software simultaneously.
The embodiment of the invention also provides a kind of software erecting device, and as shown in Figure 2, this software erecting device comprises acquiring unit 21, generation unit 22, processing unit 23 and installation unit 24.
Installation procedure generally all needs complete execution installation process, and for example: setup.exe program commonly used at present is exactly a said installation procedure in the present embodiment, and behind the installation procedure that starts software, acquiring unit 21 is used to obtain the characteristic information of computer hardware; Generation unit 22 is used for generating key according to the characteristic information that gets access to; Processing unit 23 is used to utilize the key of generation that software is carried out encryption; Installation unit 24 is used for the software through above-mentioned encryption is installed to computing machine.
The embodiment of the invention also provides a kind of software installation system, comprise computing machine and the software erecting device (the top installation procedure of mentioning is exactly a kind of of software erecting device) that moves on computers, the software erecting device is used to obtain the characteristic information of computer hardware, generate key according to the characteristic information that gets access to, utilize the key that generates that software is carried out encryption, will be installed to computing machine through the software of this encryption.
Because the key that the encryption process in the present embodiment is used generates according to the computer hardware characteristic information; and the characteristic information of computer hardware is unique; so when the software after installing is copied to another computing machine; because the characteristic information difference of computer hardware; another computing machine can't generate can be with the key of software decryption; thereby the software of avoiding copying to another computing machine is used, and has realized the copyright protection of software.
By such scheme as can be known, if comprised user's confidential information in the installed software because software can not normally use when being illegally copied to other computing machines, thus the confidential information of having avoided being comprised in the software revealed, protected user's interests.
Embodiment 2:
In order more clearly to introduce the technical solution adopted in the present invention, install below in conjunction with the software under the situation that is connected with intelligent key apparatus on the computing machine, further the present invention is described in detail.As shown in Figure 3, the software installation method that provides of present embodiment comprises:
301, start the installation procedure of software, said here installation procedure generally all needs complete execution installation process, and for example: setup.exe program commonly used at present is exactly a said installation procedure in the present embodiment.
302, whether be connected with intelligent key apparatus on the detection computations machine,, then carry out 303 processes if be connected with intelligent key apparatus on the computing machine; If do not connect intelligent key apparatus on the computing machine, then carry out 310 processes.
By whether connecting intelligent key apparatus on the detection computations machine, can prevent preferably that software illegally is installed in the computing machine, protected the copyright of software further.
303, judge whether the permission installation number of times that prestores in the intelligent key apparatus is 0, is 0 if allow number of times is installed, and then withdraws from the installation of software; If allowing number of times is installed is not 0, then carry out 304 processes.
304, number of times is installed in the permission in the intelligent key apparatus and subtracted 1, continue the installation of software, promptly carry out 305 processes.
By checking number of times is installed, can be prevented that software from unrestrictedly being installed, also make things convenient for software vendor to come selling software according to the installation number of times of software.But, only have under the situation that the number of times restriction is installed at software, just need to carry out above-mentioned 303 processes and 304 processes; For the software that the number of times restriction is not installed, can not carry out 303 processes and 304 processes, but in 302 processes, detect when being connected with intelligent key apparatus on the computing machine, directly carry out 305 processes.
305, read binding information table in the intelligent key apparatus, the binding information table is that the demand according to software users is kept in the intelligent key apparatus in advance, and this binding information table is used for stating the characteristic information with this software binding computer hardware together.Because the binding information table can change according to user's request, so, state that by the binding information table in the intelligent key apparatus characteristic information of computer hardware has adaptive faculty preferably.
306, obtain the characteristic information of the computer hardware of stating in the above-mentioned binding information table, so that in follow-up flow process, can utilize this characteristic information to handle accordingly.
The characteristic information of computer hardware can be for: the characteristic information of computing machine self hardware or be connected to the subscriber identity information that the characteristic information or be connected to of the intelligent key apparatus of computing machine stores in the intelligent key apparatus of computing machine or the combination of above-mentioned information in the present embodiment.
Wherein, the characteristic information of computing machine self hardware can be MAC (FDDI sublayer protocol) address of the sequence number of computer motherboard, computing machine network interface card, the sequence number of hard disc of computer, the sequence number of computer CPU etc.; The characteristic information of intelligent key apparatus can be the sequence number of intelligent key apparatus, user's ID (identify label) etc.; The subscriber identity information of storing in the intelligent key apparatus can write the data of its identity of sign among the USB Key for software users, such as various certificate numberings.
Specifically be listed below the realization situation of two kinds of characteristic informations in the present embodiment:
The first, the sequence number of computer motherboard, the sequence number of intelligent key apparatus have been stated at the binding information table.The sequence number of supposing the computer motherboard that specifically reads is: 63-011-0000010-00101111-071706-INTE L$C 94GD011-CONRE945G-DVIBIOSP1.00; The sequence number that specifically reads intelligent key apparatus is: FBC80754.
The second, the sequence number of computer motherboard, the MAC Address of computing machine network interface card and the sequence number of intelligent key apparatus have been stated at the binding information table.Suppose: the sequence number of the computer motherboard that specifically reads is: 63-011-0000010-00101111-071706-INTEL$C94GD011-CONRE945G-DVIBIOSP1.00; The MAC Address that specifically reads the computing machine network interface card is: 00-50-5C-06-00-01; The sequence number that specifically reads intelligent key apparatus is: FBC80754.
307, according to the characteristic information generation key of certain rule according to the computer hardware that gets access to above, the rule that generates key can be a key algorithm, for example: informative abstract 5 algorithms, hash algorithm or other hashing algorithm (HMAC).
The rule that generates key in the present embodiment is self-defined and write intelligent key apparatus in advance according to user's request.So, when this process of execution, need read the rule that generates key in the intelligent key apparatus, and generate key according to reading the rule that obtains.Certainly, when specific implementation, the rule that generates key also can be kept in the computing machine in advance, and directly calls the rule that generates key in the computing machine when this process of execution.
Realization situation at two kinds of characteristic informations enumerating in 306 processes illustrates the key generative process below:
The first, the sequence number of computer motherboard, the sequence number of intelligent key apparatus have been stated at the binding information table.If adopt Hash (Hash) algorithm to generate key, the process that then generates key is divided into following two steps:
1, the sequence number of computer motherboard and the sequence number of intelligent key apparatus are carried out exclusive disjunction, promptly calculate the result of 63-011-0000010-00101111-071706-INTEL$C94GD011-CONRE945G-DVIBIOSP1.00^FBC80754.
2, the result of exclusive disjunction is carried out Hash operation and obtain 20 bytes summary, promptly calculate: Hash (63-011-0000010-00101111-071706-INTEL$C94GD011-CONRE945G-DVIBIOSP1.00^FBC80754), and 20 bytes that will obtain summary is as the last key that generates.
The second, the sequence number of computer motherboard, the MAC Address of computing machine network interface card and the sequence number of intelligent key apparatus have been stated at the binding information table.If adopt MD5 (informative abstract 5) algorithm to generate key, the process that then generates key is divided into following two steps:
1, the sequence number of computer motherboard, the MAC Address of computing machine network interface card and the sequence number of intelligent key apparatus are carried out and computing, that is, calculate the result of 63-011-0000010-00101111-071706-INTEL$C94GD011-CONRE945G-DVIBIOSP1.00+00-50-5C-06-00-01+FBC80754.
2, the result with computing is carried out the 16 bytes summary that the MD5 computing obtains, promptly calculate MD5 (" 63-011-0000010-00101111-071706-INTEL$C94GD011_CONROE945G-DVI BI0S P1.00 "+" 00-50-5c-06-00-01 "+" FBC80754 "), and 16 bytes that will obtain summary is as the last key that generates.
Certainly, above-mentioned two kinds of situations all can adopt other modes to generate key in the present embodiment, as: also can adopt MD5 algorithm or other hashing algorithms under first kind of situation; Second situation also can adopt hash algorithm or other hashing algorithms;
The process of utilizing the computer hardware characteristic information to carry out the key computing in this process can be finished in computing machine; Also can in intelligent key apparatus, finish, by intelligent key apparatus the key that computing draws be returned to computing machine then, finish follow-up process by computing machine;
308, utilize the key of above-mentioned generation that software is carried out encryption.Added block with the PE file is that example specifies this encryption process below:
This added block is encrypted by default key " 0,000 0,000 0,000 0000 " in installation procedure, if directly will be installed to computing machine by the added block that default key is encrypted, after software after then will installing copied to other computing machines, other computing machines can crack default key very like a cork and use this software.Use for the software after preventing to install copies to other computing machines, utilize default key that added block is decrypted in the present embodiment earlier; Utilize the key that generates with the additional data block encryption that decrypts then.
Just describe with added block in the present embodiment, when actual motion, can carry out encryption to other significant datas of software, for example: the secret to user in the kernel of software or the software is carried out encryption.
309, will utilize the added block after the secret key encryption that generates to be installed in the computing machine, finish software installation process then as the part of software.Be installed to and move after software on the computing machine has only deciphering; and because the key of its deciphering is related with computer hardware; and then guarantee can not use after installed software directly copies to other computing machines, protected the copyright of software, protected user's secret in the software simultaneously.
310, the prompting user is connected to computing machine with intelligent key apparatus, and carries out 302 processes.
The embodiment of the invention also provides a kind of software erecting device, and as shown in Figure 4, in order to finish basic installation process, this software erecting device comprises acquiring unit 41, generation unit 42, processing unit 43, installation unit 44; Behind the installation procedure that starts software, acquiring unit 41 is used to obtain the characteristic information of computer hardware, and the characteristic information of computer hardware can be for: the characteristic information of computing machine self hardware or be connected to the subscriber identity information that the characteristic information or be connected to of the intelligent key apparatus of computing machine stores in the intelligent key apparatus of computing machine or the combination of above-mentioned information in the present embodiment; Generation unit 42 is used for generating key according to the characteristic information that gets access to, and generation unit 42 can adopt MD5 algorithm, hash algorithm to generate key in the present embodiment; Processing unit 43 is used to utilize the key of generation that software is carried out encryption; Installation unit 44 is used for the software through above-mentioned encryption is installed to computing machine.
In order to prevent that preferably software illegally is installed in the computing machine, protected the copyright of software further, the software erecting device in the present embodiment also comprises: detecting unit 45 and Tip element 46; Wherein detecting unit 45 is used for whether being connected with on the detection computations machine intelligent key apparatus; When Tip element 46 was used for not connecting intelligent key apparatus on computers, the prompting user was connected to computing machine with intelligent key apparatus, and stops corresponding software installation procedure and up to the user intelligent key apparatus is connected to computing machine.
Prevent that software from unrestrictedly being installed, also make things convenient for software vendor to come selling software according to the installation number of times of software, the software erecting device in the present embodiment also comprises: judging unit 47, withdraw from control module 48, control module 49 is installed; Wherein, judging unit 47 is used for judging whether the permission installation number of times that intelligent key apparatus prestores is 0; Withdraw from control module 48 and be used for to be, to withdraw from the installation of software at 0 o'clock allowing that number of times is installed; It is not 0 o'clock that installation control module 49 is used for allowing that number of times is installed, and continues the installation of software, and it can be the characteristic information that is continued to obtain computer hardware by acquiring unit 41 that the continuation of mentioning is here installed, and the installation of the permission in intelligent key apparatus number of times is subtracted 1.
As shown in Figure 4, acquiring unit 41 specifically comprises read module 411 and acquisition module 412 in the present embodiment, and wherein, read module 411 is used for reading the binding information table that pre-deposits intelligent key apparatus; Acquisition module 412 is used for obtaining the characteristic information of the computer hardware that above-mentioned binding information table states.
Processing unit 43 in the present embodiment specifically comprises deciphering module 431 and encrypting module 432, and wherein, deciphering module 431 is used to utilize default key that the significant data of software is decrypted; Encrypting module 432 is used to utilize the key of generation that the significant data that decrypts is encrypted.
Through after the processing of above-mentioned processing unit 43, installation unit 44 will utilize the significant data after the secret key encryption of generation to be installed in the computing machine as the part of software.
The embodiment of the invention also provides a kind of software installation system, as shown in Figure 5, this software installation system comprises computing machine 51 and is connected to the intelligent key apparatus 52 of computing machine 51, intelligent key apparatus 52 can be connected to computing machine 51 by USB interface, and on computing machine 51 the operating software erecting device.Intelligent key apparatus 52 is used for providing to the software erecting device characteristic information of this intelligent key apparatus 52, perhaps will provide the subscriber identity information of storage in the intelligent key apparatus 52 to the software erecting device.
The software erecting device is used to obtain the characteristic information of computer hardware, generates key according to the characteristic information that gets access to then, and utilizes the key that generates that software is carried out encryption, will be installed to computing machine through the software of above-mentioned encryption at last.
The wherein subscriber identity information of storage or the combination of above-mentioned information in the characteristic information of the characteristic information of the computer hardware that obtains of the software erecting device intelligent key apparatus 52 that can provide or the intelligent key apparatus 52 for the characteristic information of: computing machine 51 self hardware or by intelligent key apparatus 52.
In order to prevent that preferably software illegally is installed in the computing machine; protected the copyright of software further; software erecting device in the present embodiment also is used for whether being connected with on the detection computations machine intelligent key apparatus; and when not connecting intelligent key apparatus on computers; the prompting user is connected to computing machine with intelligent key apparatus, stops corresponding software installation procedure simultaneously and up to the user intelligent key apparatus is connected to computing machine.
When the characteristic information of computer hardware in the present embodiment only is the subscriber identity information of storing in the intelligent key apparatus, explanation with this software just with intelligent key apparatus in the subscriber identity information stored, for any computing machine that needs to install this software, as long as insert this intelligent key apparatus, can correctly install and use this software as required.
Because the key that the encryption process in the present embodiment is used generates according to the computer hardware characteristic information; and the characteristic information of computer hardware is unique (all is unique as the sequence number of mainboard, the MAC Address of network interface card, the sequence number of intelligent key apparatus etc.); so when the software after installing is copied to another computing machine; because the characteristic information difference of computer hardware; another computing machine can't generate can be with the key of software decryption; thereby the software of avoiding copying to another computing machine is used, and has realized the copyright protection of software.
After the software installation method, the Apparatus and system that adopt the embodiment of the invention to provide carry out the software installation, be installed in software in the computing machine at last through encryption, and the key of encrypting usefulness generates according to the computer hardware characteristic information, and the characteristic information of computer hardware is unique.When this software of operation, need read the hardware characteristics information of computing machine earlier, and generate key according to predetermined mode, utilize key that the encryption of software partly is decrypted then, so just can carry out next step running software.
But; if being copied in other computing machines, the software after installing moves; because the hardware characteristics information in other computing machines can not be identical with the computing machine of original install software; so the last key that generates is the encryption section of software can not be deciphered; like this; other computing machines just can not carry out next step running software, thereby have protected the copyright of software, and the customer information of carrying in software can not revealed.
By such scheme as can be known, if comprised user's confidential information in the installed software because software can not normally use when being illegally copied to other computing machines, thus the confidential information of having avoided being comprised in the software revealed, protected user's interests.
The embodiment of the invention mainly is used in the installation of various softwares, is specially adapted to need carry out in the software installation of the copyright protection or the user's secret that needs protection.
Through the above description of the embodiments, the those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential common hardware, can certainly pass through hardware, but the former is better embodiment under a lot of situation.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in the storage medium that can read, floppy disk as computing machine, hard disk or CD etc., comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the method for each embodiment of the present invention.
The above; only be the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by described protection domain with claim.

Claims (18)

1, a kind of software installation method is characterized in that, comprising:
Obtain the characteristic information of computer hardware;
Generate key according to described characteristic information;
Utilize the key of described generation that software is carried out encryption;
To be installed to computing machine through the software of described encryption.
2, software installation method according to claim 1 is characterized in that, before obtaining the characteristic information of computer hardware, this method also comprises:
Whether be connected with intelligent key apparatus on the detection computations machine;
If do not connect intelligent key apparatus on the computing machine, then point out the user that intelligent key apparatus is connected on the computing machine.
3, software installation method according to claim 2 is characterized in that, this method also comprises:
Judge whether the permission installation number of times that prestores in the described intelligent key apparatus is 0;
If it is 0 that number of times is installed in described permission, then withdraw from the installation of described software;
If it is not 0 that number of times is installed in described permission, then continues the installation of described software, and the installation of the permission in described intelligent key apparatus number of times is subtracted 1.
According to claim 1,2 or 3 described software installation methods, it is characterized in that 4, the described characteristic information that obtains computer hardware comprises:
Read the binding information table that pre-deposits in the intelligent key apparatus;
Obtain the characteristic information of the computer hardware of stating in the described binding information table.
5, software installation method according to claim 4, it is characterized in that the characteristic information of described computer hardware is: the characteristic information of computing machine self hardware or be connected to subscriber identity information that the characteristic information or be connected to of the intelligent key apparatus of computing machine stores in the intelligent key apparatus of computing machine or the combination of above-mentioned information.
According to claim 1,2 or 3 described software installation methods, it is characterized in that 6, described algorithm according to described characteristic information generation key is: informative abstract 5 algorithms or hash algorithm.
According to claim 1,2 or 3 described software installation methods, it is characterized in that 7, described utilization generation key carries out encryption to software and comprises:
Utilize default key that the significant data of described software is decrypted;
Utilize the key that generates that the significant data that decrypts is encrypted.
8, software installation method according to claim 7 is characterized in that, describedly will be installed to computing machine through the software of described encryption and be: will utilize the significant data after the secret key encryption that generates to be installed in the computing machine as the part of software.
9, a kind of software erecting device is characterized in that, comprising:
Acquiring unit is used to obtain the characteristic information of computer hardware;
Generation unit is used for generating key according to described characteristic information;
Processing unit is used to utilize the key of generation that software is carried out encryption;
Installation unit is used for the software through described encryption is installed to computing machine.
10, software erecting device according to claim 9 is characterized in that, this software erecting device also comprises:
Detecting unit is used for whether being connected with on the detection computations machine intelligent key apparatus;
Tip element, when being used for not connecting intelligent key apparatus on computers, the prompting user is connected to computing machine with intelligent key apparatus.
11, software erecting device according to claim 9 is characterized in that, this software erecting device also comprises:
Judging unit is used for judging whether the permission installation number of times that described intelligent key apparatus prestores is 0;
Withdraw from control module, being used in described permission number of times being installed is 0 o'clock, withdraws from the installation of described software;
Control module is installed, and being used in described permission number of times being installed is not 0 o'clock, continues the installation of described software, and the installation of the permission in intelligent key apparatus number of times is subtracted 1.
12, according to claim 9,10 or 11 described software erecting devices, it is characterized in that described acquiring unit comprises:
Read module is used for reading the binding information table that pre-deposits intelligent key apparatus;
Acquisition module is used for obtaining the characteristic information of the computer hardware that described binding information table states.
13, software erecting device according to claim 12, it is characterized in that the characteristic information of described computer hardware is: the characteristic information of computing machine self hardware or be connected to subscriber identity information that the characteristic information or be connected to of the intelligent key apparatus of computing machine stores in the intelligent key apparatus of computing machine or the combination of above-mentioned information.
14, according to claim 9,10 or 11 described software erecting devices, it is characterized in that described processing unit comprises:
Deciphering module is used to utilize default key that the significant data of described software is decrypted;
Encrypting module is used to utilize the key of generation that the significant data that decrypts is encrypted.
15, software erecting device according to claim 14 is characterized in that, described installation unit will utilize the significant data after the secret key encryption that generates to be installed in the computing machine as the part of software.
16, a kind of software installation system, comprise computing machine and software erecting device, it is characterized in that, described software erecting device is used to obtain the characteristic information of computer hardware, generate key according to described characteristic information, utilize the key that generates that software is carried out encryption, will be installed to described computing machine through the software of described encryption.
17, software installation system according to claim 16, it is characterized in that, this software installation system also comprises the intelligent key apparatus that is connected to computing machine, be used for providing the characteristic information of this intelligent key apparatus, perhaps will provide the subscriber identity information of storing in the intelligent key apparatus to the software erecting device to the software erecting device;
The characteristic information of described computer hardware is: the subscriber identity information of storing in the characteristic information of computing machine self hardware or the characteristic information of described intelligent key apparatus or the intelligent key apparatus or the combination of above-mentioned information.
18, according to claim 16 or 17 described software installation systems, it is characterized in that, described software erecting device also is used for whether being connected with on the detection computations machine intelligent key apparatus, and when not connecting intelligent key apparatus on computers, the prompting user is connected to computing machine with intelligent key apparatus.
CNA2008102473856A 2008-12-29 2008-12-29 Method, device and system for installing software Pending CN101447009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008102473856A CN101447009A (en) 2008-12-29 2008-12-29 Method, device and system for installing software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008102473856A CN101447009A (en) 2008-12-29 2008-12-29 Method, device and system for installing software

Publications (1)

Publication Number Publication Date
CN101447009A true CN101447009A (en) 2009-06-03

Family

ID=40742685

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008102473856A Pending CN101447009A (en) 2008-12-29 2008-12-29 Method, device and system for installing software

Country Status (1)

Country Link
CN (1) CN101447009A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device
CN103177211A (en) * 2011-12-22 2013-06-26 苏州威世博知识产权服务有限公司 Software user terminal registration method and software user terminal registration system
CN103870301A (en) * 2012-12-15 2014-06-18 国际商业机器公司 Software Installation Method, Apparatus and Program Product
CN104994078A (en) * 2015-06-10 2015-10-21 杭州海康威视数字技术股份有限公司 Information sending method, information acquisition method, information sending device, information acquisition device, and information processing system in local area network
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
CN107944233A (en) * 2017-12-11 2018-04-20 北京深思数盾科技股份有限公司 A kind of guard method of executable file and device
CN111222101A (en) * 2018-11-27 2020-06-02 北京数安鑫云信息技术有限公司 Method and device for preventing software from being illegally copied and used and method and device for collecting software behavior information

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177211A (en) * 2011-12-22 2013-06-26 苏州威世博知识产权服务有限公司 Software user terminal registration method and software user terminal registration system
CN102760214A (en) * 2012-06-13 2012-10-31 上海方正数字出版技术有限公司 Novel software copyright protecting method and device
CN102760214B (en) * 2012-06-13 2015-11-18 北大方正集团有限公司 A kind of novel software copyright protecting method and device
CN103870301A (en) * 2012-12-15 2014-06-18 国际商业机器公司 Software Installation Method, Apparatus and Program Product
CN103870301B (en) * 2012-12-15 2017-04-12 国际商业机器公司 Software Installation Method and Apparatus
CN104994078A (en) * 2015-06-10 2015-10-21 杭州海康威视数字技术股份有限公司 Information sending method, information acquisition method, information sending device, information acquisition device, and information processing system in local area network
CN104994078B (en) * 2015-06-10 2019-07-19 杭州海康威视数字技术股份有限公司 Information transmission, acquisition methods and device, information processing system in local area network
CN105681039A (en) * 2016-04-15 2016-06-15 上海上讯信息技术股份有限公司 Method and device for secret key generation and corresponding decryption
CN107944233A (en) * 2017-12-11 2018-04-20 北京深思数盾科技股份有限公司 A kind of guard method of executable file and device
CN111222101A (en) * 2018-11-27 2020-06-02 北京数安鑫云信息技术有限公司 Method and device for preventing software from being illegally copied and used and method and device for collecting software behavior information
CN111222101B (en) * 2018-11-27 2022-06-03 北京数安鑫云信息技术有限公司 Method and device for preventing software from being illegally copied and used and method and device for collecting software behavior information

Similar Documents

Publication Publication Date Title
CN100449558C (en) Sleep protection
EP3326105B1 (en) Technologies for secure programming of a cryptographic engine for secure i/o
CN103210396B (en) Comprise the method and apparatus of the framework for the protection of sensitive code and data
US7475254B2 (en) Method for authenticating software using protected master key
US20170277898A1 (en) Key management for secure memory address spaces
CN100437618C (en) Portable information safety device
US20110131418A1 (en) Method of password management and authentication suitable for trusted platform module
CN101447009A (en) Method, device and system for installing software
US20080263542A1 (en) Software-Firmware Transfer System
CN101447013A (en) Method, device and system for running software
AU2010258234B2 (en) System and method for protecting information and related encryption keys
US8972745B2 (en) Secure data handling in a computer system
CN109889334A (en) Embedded firmware encrypting method, apparatus, wifi equipment and storage medium
US11533172B2 (en) Apparatus and method for securely managing keys
CN112749383A (en) Software authentication method and related product
CN101403985B (en) Software permission backup method for software protection apparatus
Lee et al. Classification and analysis of security techniques for the user terminal area in the internet banking service
CN102117394A (en) Method and device for detecting whether a computer file has been copied and method and device for enabling such detection
CN111639353B (en) Data management method and device, embedded equipment and storage medium
CN110837627A (en) Software copyright authentication method, system and equipment based on hard disk serial number
JP2009169868A (en) Storage area access device and method for accessing storage area
CN113343265B (en) Key configuration method, device and related equipment
CN112564888B (en) Method and equipment for deploying private cloud
CN116451188B (en) Software program operation safety protection method, system and storage medium
CN114816549B (en) Method and system for protecting bootloader and environment variable thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20090603