CN101471915A - Encipher method and encipher device - Google Patents

Encipher method and encipher device Download PDF

Info

Publication number
CN101471915A
CN101471915A CNA2007101256284A CN200710125628A CN101471915A CN 101471915 A CN101471915 A CN 101471915A CN A2007101256284 A CNA2007101256284 A CN A2007101256284A CN 200710125628 A CN200710125628 A CN 200710125628A CN 101471915 A CN101471915 A CN 101471915A
Authority
CN
China
Prior art keywords
equipment
checking
result
unique signature
external equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101256284A
Other languages
Chinese (zh)
Inventor
罗富强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jun Kang Electronics (shenzhen) Co Ltd
Original Assignee
Jun Kang Electronics (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jun Kang Electronics (shenzhen) Co Ltd filed Critical Jun Kang Electronics (shenzhen) Co Ltd
Priority to CNA2007101256284A priority Critical patent/CN101471915A/en
Publication of CN101471915A publication Critical patent/CN101471915A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses an encryption method and an encryption device. The encryption method comprises the following steps: first equipment sends the content to be verified to second equipment; the second equipment verifies the received content to be verified according to the unique signature identification of the second equipment and obtains a verification result; the second equipment sends the verification result to the first equipment; the first equipment judges whether the verification result is correct, and, if yes, the first equipment carries out the program corresponding to the case that the verification result is correct; and if not, the first equipment carries out the program corresponding to the case that the verification result is incorrect. The embodiment of the invention verifies the data communications between peripheral equipment and a mainframe by using the unique signature identification of the peripheral equipment, and carries out normal data communications only when the peripheral equipment is judged to be legal, so as to reduce appearance probability of illegal peripheral equipment.

Description

A kind of encryption method and encryption device
Technical field
The present invention relates to the encryption technology field, relate to a kind of encryption method and device particularly.
Background technology
The most frequently used equipment or software protection hardware encryption product is to be connected on serial ports, parallel port or USB (Universal Serial Bus at present; USB) softdog on the mouth (encryption lock, dongle); or be inserted in encrypted card in the main frame; carrying out anti-piracy with hardware is a kind of safer technology; but; produce safer hardware encipher dog and need very high cost; simultaneously; because on string product, parallel port or the USB mouth that the hardware encryption product all is the standard of being connected on externally develops formula, non-standard interface more helps cracker's analysis relatively.And the soft encryption realization is fairly simple, and purchasing process is also realized fully on the internet, but a lot of hackers utilize leak can calculate the legal sequence number that can normally use equipment or software, make that pirate equipment or software can both be as legal normal uses, and this sequence number that calculates can spread and effectively, make and the equipment of encryption or the password useless of software cause a large amount of pirate equipment or the appearance of software.
Now, a kind of technology of utilizing external equipment to encrypt is also arranged, but this technology also is the comparison easy crack, and in case be cracked, no matter internal unit or software, or external equipment, can substitute with same product or the product with identical authorization code, simultaneously, external equipment does not have unique signature identification, more can not upgrade, so just make pirate thing to produce in a large number or to exist signature identification, cipher mode.
Summary of the invention
Technical problem to be solved by this invention is, a kind of encryption method and device are provided, utilize the unique signature identification of external equipment to participate in the proof procedure of data communication between external equipment and the main frame, games or the corresponding CD of application software are encrypted by external equipment.
In order to solve the problems of the technologies described above, the embodiment of the invention has proposed a kind of encryption method, and this method comprises:
First equipment sends required checking content to second equipment;
The result is verified and obtained to verify to described second equipment in conjunction with unique signature identification of described second equipment to received described required checking content;
Described second equipment sends described checking result to described first equipment;
Described first equipment judges whether described checking result is correct, if judged result is for being, then described first equipment is carried out the correct corresponding program of described checking result; If judged result is that then described first equipment is not carried out the corresponding program of described checking erroneous results.
Accordingly, the embodiment of the invention provides a kind of encryption device, and this device comprises:
First transmitting element is used to send required checking content to second equipment;
Judging unit is used for judging according to local data base or network data base whether the checking result is correct;
First memory cell is used to store described local data base.
Implement the embodiment of the invention, utilize the unique signature identification of external equipment that the process of data communication between external equipment and the main frame is verified, determine just can carry out normal data communication when external equipment is legitimate device, reduced the appearance of illegal external equipment.
Description of drawings
Fig. 1 is the concrete steps flow chart of the encryption method of the embodiment of the invention;
Fig. 2 is the structural representation of the encryption device of the embodiment of the invention;
Fig. 3 is the structural representation that the encryption device of Fig. 2 is installed in an embodiment in the device talk establishment of connection system;
Fig. 4 is the structural representation that the encryption device of Fig. 2 is installed in another embodiment in the device talk establishment of connection system.
Embodiment
Below in conjunction with accompanying drawing to the embodiment of the invention do further in detail, clearly explanation.
The embodiment of the invention provides a kind of encryption method, as shown in Figure 1, comprising:
Step S101, first equipment send required checking content to described second equipment;
Step S102, the result is verified and obtained to verify to described second equipment in conjunction with unique signature identification of described second equipment to received described required checking content.
In addition, also comprised before step S101: first equipment sends certificate parameter to second equipment.
In inventive embodiments, first equipment is main frame, second equipment is external equipment such as electric handle, electronic keyboard, because the game optical disk of main frame institute load operating or software program and external equipment exist corresponding relation, when main frame load operating game optical disk or software program, need be when external equipment be set up data communication and is connected, main frame sends certificate parameter and general data simultaneously to external equipment, this certificate parameter is data at random a string or agreement, when needs are verified external equipment, main frame sends required checking content to external equipment, required checking content can be the data of enciphered data or main frame and external equipment agreement, when verification msg is enciphered data, external equipment must be decrypted enciphered data after receiving, the data that data base call from external equipment is relevant, and verify that according to certificate parameter and in conjunction with unique signature identification of external equipment required checking content after to deciphering the data that the data base call from external equipment is relevant also obtain the checking result.For example: main frame sends a string data: " what this is? " these data can be encrypted by cryptographic algorithm, will access related data from other storage list the inside of database or similar database after external equipment is decrypted, draw Validation Answer Key according to certificate parameter and in conjunction with unique signature identification of external equipment: " this is a book." checking result that Here it is, and this database or other storage list can upgrade by variety of way.
Certainly, in the above-mentioned process of verifying according to certificate parameter and in conjunction with unique signature identification of external equipment required checking content after to deciphering also can be the enabling decryption of encrypted process, according to certificate parameter and in conjunction with unique signature identification of external equipment relevant checking result is encrypted, send to main frame.
In addition, above-mentioned also can be to utilize other verification mode to realize the proof procedure that is connected between main frame and the external equipment according to certificate parameter and in conjunction with the process that unique signature identification of external equipment required checking content after to deciphering is verified.
In addition, first equipment is that main frame also can not sent out certificate parameter to external equipment in embodiments of the present invention, and external equipment is then only verified in conjunction with unique signature identification of external equipment when generation is verified as a result like this.
Step S103, described second equipment send described checking result to described first equipment;
Step S104, described first equipment judge whether described checking result is correct, if judged result is for being, and execution in step S105 then; If judged result is not, then execution in step S106;
Step S105, described first equipment carry out the correct corresponding program of described checking result;
Step S106, described first equipment carry out the corresponding program of described checking erroneous results.
External equipment sends to main frame to the checking result who produces, verify that the result also can be encrypted this moment, as encrypted, must be decrypted it after then main frame is received, after main frame is received the checking result, call the related data in the local data base, judge according to unique signature identification of external equipment whether the checking result is correct, if correct, then its unique signature identification is correct, then corresponding software of first equipment operation or games.When a plurality of external equipment, each external equipment all has own corresponding unique signature identification, when main frame requires checking, the capital sends relevant checking content for each external equipment, and each external equipment can produce the checking result in conjunction with the unique signature identification of oneself after receiving, main frame can judge whether to exist a plurality of identical unique signature identifications according to the checking result after receiving the checking result, if exist a plurality of identical unique signature identifications to use simultaneously, then explanation has puppet to emit external equipment and legitimate device to use simultaneously, then stop the normal use of this unique signature identification, accordingly, main frame corresponding software out of service or games, perhaps, the main frame warning, unique signature identification existing problems of prompting external equipment, and while software out of service; Perhaps, can corresponding software not out of service in the embodiment of the invention, just shielded the partial function of software, reach the effect of protection software equally.
Above-mentioned main frame is judged described checking result, and whether correct mode is specially: be connected or when unit operation game optical disk or software program when described main frame and network disconnect, main frame will call the related data of local data base, judge according to related data whether the checking result is correct, and whether unique signature identification of judging external equipment is legal, when a plurality of external equipments connect main frame, can judge whether to exist a plurality of identical unique characteristic scalars in conjunction with the checking result simultaneously according to related data; When described main frame is connected with network, main frame is after judging the checking result according to the related data of local data base, can judge whether described checking result is correct according to network data base, have only a legal unique signature identification using when in network, judging, then allow normal running game CD of main frame or software program, occurring a plurality of identical unique signature identifications in network uses simultaneously, then explanation has puppet to emit external equipment and legitimate device to use simultaneously, then stop the normal use of this unique signature identification, accordingly, first equipment corresponding software out of service or games.
Also comprise step in the encryption method of the embodiment of the invention: the unique signature identification that upgrades described second equipment.The mode of upgrading unique signature identification of external equipment can be to upgrade by network, patch or other form.When external equipment can not normally use, or unique signature identification of this legal external equipment is stopped use, cause main frame corresponding game CD out of service or software program, if recover normal, then to upgrade unique signature identification of external equipment, this can upgrade by network, patch or other form, can guarantee the legitimacy of unique signature identification of external equipment like this, avoided the appearance of illegality equipment, also made the games of external equipment correspondence or software can recover normal use simultaneously.
Above-mentioned first equipment sends to the certificate parameter of second equipment or needs the checking content can be at random, can be arbitrarily, it perhaps can be prior and the external equipment agreement, the time interval of Fa Songing can be timing or not timing simultaneously, and the checking result of the second equipment loopback is based on unique signature identification of second equipment, in the general data exchange, can confirm the legitimacy of second equipment so at any time, can guarantee the normal operation of corresponding game optical disk or software program like this.
Such as, first equipment is main frame, second equipment is external equipment, as electric handle, during electronic keyboard, main frame loaded disc storage medium, main frame or optical disc storage and the relevant database of the unique signature identification of external equipment, after main frame reads data of optical disk, generate appointment data and send to external equipment, external equipment generates the checking result in conjunction with unique signature identification of external equipment, sends to main frame, main frame judges according to relevant database whether the checking result is correct, whether the unique signature identification that is to say external equipment is legal, if then normally be connected with external equipment, if not, then disconnect connection.Simultaneously, main frame can be connected with network, can cross the unique signature identification of network with detection external equipments such as far-end server or remote data storehouses, and this also reaches identical effect.
Other storage list of the local data base of above-mentioned main frame or the database of external equipment or similar database all is renewable, and the mode of renewal can be upgraded database by network or by patch.
In embodiments of the present invention, it can be regularly or not timing to external equipment that main frame sends required checking content, then be after step S105 and S106 main frame regularly or not timing ground to outside device request checking.Promptly moving corresponding software at main frame continues simultaneously to outside device request checking, and main frame also continues behind corresponding software out of service outside device request checking, the number of times of requests verification can be unlimited or limited number of times in this process, for example 10 times.
Accordingly, the embodiment of the invention also provides a kind of encryption device, Fig. 2 is the structural representation of the encryption device of the embodiment of the invention, as shown in Figure 2, the encryption device of the embodiment of the invention comprises top part 1 and terminal part 2, top part 1 is first equipment in embodiments of the present invention, and terminal part 2 is second equipment.
Top part 1 further comprises:
First transmitting element 11 is used to send required checking content to second equipment;
Judging unit 12 is used for judging according to local data base or network data base whether the checking result is correct;
First memory cell 14 is used for the store local data storehouse;
Performance element 13 is used to carry out the correct corresponding program of described checking result or carries out the corresponding program of described checking erroneous results.
Terminal part 2 further comprises:
Authentication unit 21 is used for according to described verification msg and in conjunction with unique signature identification of described second equipment result is verified and obtained to verify to received described required checking content;
Second transmitting element 22 is used to send described checking result to described first equipment;
Second memory cell 23 is used for the store local data storehouse;
Updating block 24 is used to unique signature identification of second equipment that upgrades and upgrades local data base.
As shown in Figure 2, the certificate parameter that top part 1 in the encryption device of the embodiment of the invention produces at random, send to terminal part 2 by first transmitting element 11, tentatively be connected with terminal part 2 foundation, local data library call related data in first memory cell 14 produces simultaneously needs the checking content, send to the authentication unit 21 of terminal part 2 by first transmitting element 11, this need verify that content can encrypt or not encrypt, the related data of the database of terminal part 2 in calling second memory cell 23, the result is verified and obtained to verify to authentication unit 21 according to described verification msg and in conjunction with unique signature identification of described terminal part 2 to received described required checking content, 2 pairs of these checkings of terminal part are the result encrypt or do not encrypt, to verify that by second transmitting element 22 result sends to the judging unit 12 in the top part 1, simultaneously, if encrypt, then the checking result after 1 pair of this encryption of top part is decrypted, if do not take to encrypt, then do not require deciphering; To verify that the result sends to judging unit 12, judging unit 12 judges whether this checking result is correct, if should verify that the result was correct, then carries out the correct corresponding program of described checking result by performance element 13; If should verify erroneous results, then carry out the corresponding program of described checking erroneous results.
When above-mentioned top part 1 is a main frame, when terminal part 2 is external equipment, when a plurality of external equipment, each external equipment all has own corresponding unique signature identification, when main frame requires checking, the capital sends relevant checking content for each external equipment, and each external equipment can produce the checking result in conjunction with the unique signature identification of oneself after receiving, main frame can judge whether to exist a plurality of identical unique signature identifications according to the checking result after receiving the checking result, if exist a plurality of identical unique signature identifications to use simultaneously, then explanation has puppet to emit external equipment and legitimate device to use simultaneously, then stop the normal use of this unique signature identification, accordingly, main frame corresponding software out of service or games, perhaps, the main frame warning, unique signature identification existing problems of prompting external equipment, and while software out of service; Perhaps, can corresponding software not out of service in the embodiment of the invention, just shielded the partial function of software, reach the effect of protection software equally.
Above-mentioned main frame is judged described checking result, and whether correct mode is specially: be connected or when unit operation game optical disk or software program when described main frame and network disconnect, main frame will call the related data of local data base, judge according to related data whether the checking result is correct, and whether unique signature identification of judging external equipment is legal, when a plurality of external equipments connect main frame, can judge whether to exist a plurality of identical unique characteristic scalars in conjunction with the checking result simultaneously according to related data; When described main frame is connected with network, main frame is after judging the checking result according to the related data of local data base, can judge whether described checking result is correct according to network data base, have only a legal unique signature identification using when in network, judging, then allow normal running game CD of main frame or software program, occurring a plurality of identical unique signature identifications in network uses simultaneously, then explanation has puppet to emit external equipment and legitimate device to use simultaneously, then stop the normal use of this unique signature identification, accordingly, first equipment corresponding software out of service or games.
Other storage list of the local data base of above-mentioned main frame or the database of external equipment or similar database all is renewable, and the mode of renewal can be upgraded database by network or by patch.
Certificate parameter or need checking content that first transmitting element 11 of top part 1 sends can be at random, can be arbitrarily, it perhaps can be prior and the external equipment agreement, the time interval of Fa Songing can be timing or not timing simultaneously, and the checking result of terminal part 2 loopbacks is based on unique signature identification of terminal part 2, in the general data exchange, can confirm the legitimacy of terminal part 2 so at any time, can guarantee the normal operation of corresponding game optical disk or software program like this.
Accordingly, the encryption device of the embodiment of the invention can be installed in as shown in Figure 3 the device talk establishment of connection system, as shown in Figure 3, comprises main frame 31 and external equipment 32, is connected by data communication method between main frame 31 and the external equipment 32.The game optical disk of 31 load operatings of main frame or software program and external equipment 32 exist corresponding relation, when main frame 31 load operating game optical disk or software programs, need be when external equipment 32 be set up data communication and is connected, main frame sends certificate parameter and general data simultaneously to external equipment 32, this certificate parameter is data at random a string or agreement, when needs are verified external equipment 32, main frame 31 sends required checking content to external equipment 32, required checking content can be the data of enciphered data or main frame 31 and external equipment 32 agreements, when verification msg is enciphered data, after receiving, external equipment 32 must be decrypted enciphered data, the data that data base call from external equipment 32 is relevant, and verify that according to certificate parameter and in conjunction with unique signature identification of external equipment 32 required checking content after to deciphering the data that the data base call from external equipment 32 is relevant also obtain the checking result.For example: main frame 31 sends a string data: " what this is? " these data can be encrypted by cryptographic algorithm, will access related data from other storage list the inside of database or similar database after external equipment 32 is decrypted, draw Validation Answer Key according to certificate parameter and in conjunction with unique signature identification of external equipment 32: " this is a book." checking result that Here it is, and this database or other storage list can upgrade by variety of way.So just can verify the legitimacy of the CD that main frame 31 is moved, when checking response result for mistake, unique signature identification mistake of external equipment 32 may occur or occur the normal situation about using of a plurality of identical unique signature identifications simultaneously, then stop the normal use of this unique signature identification, pirate CD or external equipment 32 can not normally be used.
Mainly carry out transfer of data between main frame 31 and the external equipment 32, also can adopt the mode of wired connection to carry out transfer of data by bluetooth, wireless mode such as infrared.Main frame 31 can be regularly or not timing ground send and need the checking content, make external equipment 32 legitimacies confirm that process can follow in data transmission procedure, in this process, can carry out communication at any time again and confirm identity, in case note abnormalities then stop communication.
Fig. 4 is installed in the structural representation of another embodiment of device talk establishment of connection system for the encryption device of the embodiment of the invention, as shown in Figure 4, device talk establishment of connection system comprises main frame 41, receiver 42 and external equipment 43, and main frame 41 carries out data communication method by receiver 42 with external equipment 43 and is connected.
The running of this system is just added 42 pairs of data of receiver and is transmitted as mentioned above.
Receiver 42 can be a Bluetooth transmission equipment, and LPT, USB or other the wired mode by main frame 41 between main frame 01 and the receiver 42 is connected, and receiver 42 is connected with external equipment 43 by wireless modes such as infrared, bluetooths.
Implement the embodiment of the invention, utilize the unique signature identification of external equipment that the process of data communication between external equipment and the main frame is verified, determine just can carry out normal data communication when external equipment is legitimate device, reduced the appearance of illegal external equipment.
Above disclosed only is preferred embodiment of the present invention, can not limit the present invention's interest field certainly with this, and therefore the equivalent variations of doing according to claim of the present invention still belongs to the scope that the present invention is contained.

Claims (10)

1, a kind of encryption method is characterized in that, this method comprises:
First equipment sends required checking content to second equipment;
The result is verified and obtained to verify to described second equipment in conjunction with unique signature identification of described second equipment to received described required checking content;
Described second equipment sends described checking result to described first equipment;
Described first equipment judges whether described checking result is correct, if judged result is for being, then described first equipment is carried out the correct corresponding program of described checking result; If judged result is that then described first equipment is not carried out the corresponding program of described checking erroneous results.
2, encryption method as claimed in claim 1 is characterized in that, described first equipment is judged described checking result, and whether correct mode is specially:
Described first equipment judges according to local data base or network data base whether described checking result is correct.
3, encryption method as claimed in claim 1 is characterized in that, the step that described first equipment is carried out the correct corresponding program of described checking result also comprises afterwards:
Described first equipment sends required checking content to described second equipment.
4, encryption method as claimed in claim 1 is characterized in that, the step that described first equipment is carried out the corresponding program of described checking erroneous results also comprises afterwards:
Described first equipment sends required checking content to described second equipment.
5, as claim 1,3 or 4 any described encryption methods, it is characterized in that, described first equipment send required checking content to described second equipment can be regularly or not timing.
6, encryption method as claimed in claim 3 is characterized in that, the step that described first equipment is carried out the corresponding program of described checking erroneous results also comprises afterwards:
Upgrade unique signature identification of described second equipment.
7, encryption method as claimed in claim 6 is characterized in that, the mode of unique signature identification of described second equipment of described renewal can be to upgrade by network, patch or other form.
8, a kind of encryption device is characterized in that, this device comprises:
First transmitting element is used to send required checking content to second equipment;
Judging unit is used for judging according to local data base or network data base whether the checking result is correct;
First memory cell is used to store described local data base.
9, encryption device as claimed in claim 8 is characterized in that, further comprises:
Authentication unit is used in conjunction with unique signature identification of described second equipment result is verified and obtained to verify to received described required checking content;
Second transmitting element is used to send described checking result to described first equipment;
Second memory cell is used for the store local data storehouse;
Updating block is used to unique signature identification of second equipment that upgrades and upgrades local data base.
10, encryption device as claimed in claim 8 is characterized in that, described device also comprises:
Performance element is used to carry out the correct corresponding program of described checking result or carries out the corresponding program of described checking erroneous results.
CNA2007101256284A 2007-12-29 2007-12-29 Encipher method and encipher device Pending CN101471915A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101256284A CN101471915A (en) 2007-12-29 2007-12-29 Encipher method and encipher device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101256284A CN101471915A (en) 2007-12-29 2007-12-29 Encipher method and encipher device

Publications (1)

Publication Number Publication Date
CN101471915A true CN101471915A (en) 2009-07-01

Family

ID=40829040

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101256284A Pending CN101471915A (en) 2007-12-29 2007-12-29 Encipher method and encipher device

Country Status (1)

Country Link
CN (1) CN101471915A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN103389694A (en) * 2012-05-11 2013-11-13 北京北方微电子基地设备工艺研究中心有限责任公司 Factory automation verification system and method
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method
CN103538561A (en) * 2012-07-12 2014-01-29 鸿富锦精密工业(深圳)有限公司 Automobile starting control system and method
CN105376253A (en) * 2015-12-04 2016-03-02 上海斐讯数据通信技术有限公司 Flashing prevention method and system for router
CN105597306A (en) * 2014-11-25 2016-05-25 中国移动通信集团江苏有限公司 Game pad and authentication method thereof
CN105678115A (en) * 2015-12-31 2016-06-15 北京神州绿盟信息安全科技股份有限公司 Software authentication method and related device and system
CN108990169A (en) * 2017-09-08 2018-12-11 西安中兴新软件有限责任公司 A kind of transmission of data, resource share method and user terminal, access point apparatus
CN109067523A (en) * 2018-07-28 2018-12-21 杭州电子科技大学 A kind of data ciphering method of encrypted card
CN109104275A (en) * 2018-07-28 2018-12-28 杭州电子科技大学 A kind of HSM equipment

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710588A (en) * 2011-09-23 2012-10-03 新奥特(北京)视频技术有限公司 Method, device, server and system for identifying code in data safety monitoring and controlling
CN103389694B (en) * 2012-05-11 2016-04-27 北京北方微电子基地设备工艺研究中心有限责任公司 factory automation verification system and method
CN103389694A (en) * 2012-05-11 2013-11-13 北京北方微电子基地设备工艺研究中心有限责任公司 Factory automation verification system and method
CN103538561A (en) * 2012-07-12 2014-01-29 鸿富锦精密工业(深圳)有限公司 Automobile starting control system and method
CN103530161A (en) * 2013-10-22 2014-01-22 北京深思数盾科技有限公司 Wireless information security equipment system and security protection method
CN105597306A (en) * 2014-11-25 2016-05-25 中国移动通信集团江苏有限公司 Game pad and authentication method thereof
CN105376253A (en) * 2015-12-04 2016-03-02 上海斐讯数据通信技术有限公司 Flashing prevention method and system for router
CN105678115A (en) * 2015-12-31 2016-06-15 北京神州绿盟信息安全科技股份有限公司 Software authentication method and related device and system
CN105678115B (en) * 2015-12-31 2018-05-25 北京神州绿盟信息安全科技股份有限公司 A kind of software authentication method and relevant device and system
CN108990169A (en) * 2017-09-08 2018-12-11 西安中兴新软件有限责任公司 A kind of transmission of data, resource share method and user terminal, access point apparatus
CN108990169B (en) * 2017-09-08 2022-01-21 西安中兴新软件有限责任公司 Data transmission and resource sharing method, user terminal and access point equipment
CN109067523A (en) * 2018-07-28 2018-12-21 杭州电子科技大学 A kind of data ciphering method of encrypted card
CN109104275A (en) * 2018-07-28 2018-12-28 杭州电子科技大学 A kind of HSM equipment

Similar Documents

Publication Publication Date Title
CN101471915A (en) Encipher method and encipher device
CN103995991B (en) Method for binding hardware information and secret keys in software copyright protection
CN103067333B (en) The method of proof machine top box access identity and certificate server
KR100980831B1 (en) Method and apparatus for deterrence of secure communication using One Time Password
JP4712871B2 (en) Method for comprehensive authentication and management of service provider, terminal and user identification module, and system and terminal apparatus using the method
CN101005361B (en) Server and software protection method and system
CN101006725B (en) Methods and apparatuses for configuring products
CN102299930B (en) Method for ensuring security of client software
CN110572804B (en) Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal
US20150180662A1 (en) Software key updating method and device
CN102595213B (en) Security certificate method and system of credible TV terminal
JP2012530311A5 (en)
CN109618334B (en) Control method and related equipment
WO2019051776A1 (en) Key transmission method and device
KR101314751B1 (en) Apparatus for managing installation of DRM and method thereof
CN108650261B (en) Mobile terminal system software burning method based on remote encryption interaction
CN106027251A (en) Identity card reading terminal and cloud authentication platform data transmission method and system
CN101582896A (en) Third-party network authentication system and authentication method thereof
JP2017152880A (en) Authentication system, key processing coordination method, and key processing coordination program
CN115527292B (en) Mobile phone terminal remote vehicle unlocking method of security chip and security chip device
CN102246535B (en) Method, apparatus and system for employing a secure content protection system
CN104486322A (en) Terminal access authentication authorization method and terminal access authentication authorization system
CN111489462B (en) Personal Bluetooth key system
CN101438564B (en) Device, system and method for service delivery with anti-emulation mechanism
KR20130100032A (en) Method for distributting smartphone application by using code-signing scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20090701