CN102289630B - A kind of copy-right protection method for CEMS system - Google Patents
A kind of copy-right protection method for CEMS system Download PDFInfo
- Publication number
- CN102289630B CN102289630B CN201110215104.0A CN201110215104A CN102289630B CN 102289630 B CN102289630 B CN 102289630B CN 201110215104 A CN201110215104 A CN 201110215104A CN 102289630 B CN102289630 B CN 102289630B
- Authority
- CN
- China
- Prior art keywords
- byte
- information
- cems system
- numbers
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a kind of copy-right protection method for CEMS system, according to CEMS system instrument hardware information, adulterate certain random information in conjunction with shipment information, customer information simultaneously, generate 32 byte hardware device numbers and 32 byte software installation series numbers;Prompting user input systems instrument hardware information, customer information, number is adopted instrument shipment information, and is write in computer registration table together with 32 byte software installation series numbers;By 32 byte hardware device number write CEMS system instrument hardware core circuit boards, it is pasted on software fixing disc packing box after 32 byte software installation series numbers are printed label;Verifying 32 byte hardware device numbers and 32 byte software installation series numbers, when upchecking, CEMS system is properly functioning;When 32 byte software installation series numbers, by inspection, 32 byte hardware device numbers verifications send the prompting of hardware connection error not over, CEMS system.
Description
Technical field
The present invention relates to the copy-right protection method in flue gas automatic monitoring technical field, specifically a kind of for CEMS system
The copy-right protection method of system.
Background technology
CEMS system development cycle is long, and Innovation Input is big, and to the imitated difficulty of the CEMS system hardware and software of shaping with become
This puts into far below exploitation.Agent the most illegally distorts product export letter for the more interests of acquisition in terms of free quality guarantee simultaneously
Breath.And CEMS software kit has and is prone to copy, the feature such as easy duplication.Therefore, the exploitation of CEMS system in prior art
The interests of business and manufacturer have suffered the biggest loss.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of copy-right protection method for CEMS system, and the method is used
In dynamically generating customer information, CEMS instrument software and hardware identification information and warranty data, it is therefore prevented that string goods, matter between each agent
Duration of insurance limit is illegally distorted, the own intellectual property of protection and corresponding commercial interest, described below:
The invention provides a kind of copy-right protection method for CEMS system, said method comprising the steps of:
(1) according to CEMS system instrument hardware information, adulterate in conjunction with shipment information, customer information simultaneously and believe the most at random
Breath, generates 32 byte hardware device numbers and 32 byte software installation series numbers;
(2) in CEMS systems soft ware installation process, pointing out user input systems instrument hardware information, customer information, number is adopted
Instrument shipment information, and write in computer registration table together with described 32 byte software installation series numbers;
(3) by described 32 byte hardware device number write CEMS system instrument hardware core circuit boards, by described 32 bytes
Software installation series number is pasted on software fixing disc packing box after printing label;
(4) described 32 byte hardware device numbers and described 32 byte software installation series numbers are verified, when inspection is logical
Crossing, CEMS system is properly functioning;When described 32 byte software installation series numbers are by checking and described 32 byte hardware device numbers
Verify and send the prompting of hardware connection error not over, CEMS system;When described 32 byte hardware device number verifications are passed through, described
32 byte software installation series numbers verifications are not passed through, then CEMS system gives a warning information.
Described according to CEMS system instrument hardware information in step (1), adulterates in conjunction with shipment information, customer information simultaneously
Certain random information, generates 32 byte hardware device numbers and 32 byte software installation series numbers, specifically includes:
According to CEMS system instrument hardware information, raw in conjunction with shipment information, customer information certain random information that adulterates simultaneously
Become copyright information in plain text;
Described copyright information is encrypted in plain text generation copyright information ciphertext;
Pluck according to 256 bit digital that disclosed free Digital Signature Algorithm MD5 calculates copyright information the most corresponding respectively
Want and copyright information ciphertext corresponding 256 bit digital summary;
256 corresponding for described copyright information ciphertext bit digital are made a summary as 32 byte hardware device numbers, simultaneously by described
32 byte hardware device number write CEMS system instrument hardware;
The 256 bit digital summarization generation 32 byte software installation series numbers the most corresponding by described copyright information.
The described generation copyright information ciphertext that is encrypted copyright information in plain text specifically includes:
Described copyright information is carried out in plain text 256 block encodings, byte replacement, non-linearization and key superposition, generates
Described version information ciphertext.
Described 256 block encodings particularly as follows:
It is in plain text 1 group with continuous 32 bytes by described copyright information, is divided into some groups, if the multiple of byte number inadequate 32,
Then add ASC code " 0 " by described copyright information end in plain text to supply.
Described byte is replaced particularly as follows: set byte aI, jWith byte bI, jBinary system be x7 x6 x5 x4 x3 x2 x1 x0With
y7 y6 y5 y4 y3 y2 y1 y0, there are following mapping relations between the two:
Described non-linearization particularly as follows: line displacement conversion and mixcolumns,
Wherein, the mapping relations of described mixcolumns are:
Described key superposition is particularly as follows: 256 carry out displacement and XOR between key and state matrix.
What the present invention provided compared with prior art has the advantage that
The present invention is replaced by illegal Counterfeit Item during preventing CEMS hardware system core by software and hardware verification;Prevent voluntarily
The CEMS systems soft ware of exploitation is illegally applied to CEMS Counterfeit Item;Prevent string goods between different agent;Prevent agents from business to usurp
Modification duration of insurance information, illegally extends free quality guarantee period thus encroaches on company trade interests;This method is only by displacement and XOR equipotential
Operative combination forms, and calculates process simple and quick.
Accompanying drawing explanation
The structural representation of the copyright protection that Fig. 1 provides for the present invention;
The schematic diagram that Fig. 2 replaces for the byte that the present invention provides;
The nonlinearized line displacement conversion schematic diagram that Fig. 3 provides for the present invention;
The nonlinearized mixcolumns schematic diagram that Fig. 4 provides for the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
101: according to CEMS system instrument hardware information, adulterate in conjunction with shipment information, customer information simultaneously and believe the most at random
Breath, generates 32 byte hardware device numbers and 32 byte software installation series numbers;
Seeing Fig. 1, CEMS system instrument hardware information is spectrometer exclusive identification code, when shipment information is particularly as follows: dispatch from the factory
Between, product batches, product serial number and shipment provider;Customer information includes: title and contact person, and adulterate certain random information simultaneously,
Generation CEMS system instrument hardware device number and therewith corresponding software installation series number.
Wherein, this step specifically includes:
(1) according to CEMS system instrument hardware information, adulterate certain random information in conjunction with shipment information, customer information simultaneously
Generate copyright information in plain text;
Wherein, copyright information in plain text in strict accordance with order by CEMS system instrument hardware information (spectrometer exclusive identification code,
Do not allow sky), customer information (title, contact person's neither of which allow sky), generation copyright information time (form " xxxx xx
Month x day ", such as " on 01 01st, 2011, mustn't be empty), each several part of shipment information (time of making the product, shipment provider, product batches)
Information element separates with ", ") generate.
(2) copyright information is encrypted in plain text generation copyright information ciphertext;
(3) calculate, according to disclosed free Digital Signature Algorithm MD5,256 bit digital that copyright information is the most corresponding respectively
Summary and copyright information ciphertext corresponding 256 bit digital summary;
(4) 256 corresponding for copyright information ciphertext bit digital are made a summary as 32 byte hardware device numbers, simultaneously by 32 bytes
Hardware device number write CEMS system instrument hardware;
(5) by 256 bit digital summarization generation 32 byte software installation series numbers of copyright information correspondence in plain text.
Wherein, in plain text and copyright information is close to calculate copyright information respectively according to disclosed free Digital Signature Algorithm MD5
The 256 bit digital summaries that literary composition is corresponding, wherein copyright 256 bit digital summaries in plain text are 32 byte software installation series numbers, version
256 bit digital summaries of power ciphertext are 32 byte hardware device numbers.
Wherein, copyright information is encrypted generation copyright information ciphertext in plain text to specifically include: bright to copyright information
Literary composition carries out 256 block encodings, byte replacement, non-linearization and key superposition, generates version information ciphertext.
Wherein, particularly as follows: be 1 group by plaintext to be encrypted with continuous 32 bytes, (1 byte 8 is total to 256 block encodings
Count 256), it is divided into some groups, if the multiple of byte number inadequate 32, then adds ASC code " 0 " by end in plain text and supply.
Wherein, seeing Fig. 2, byte is replaced particularly as follows: set byte aI, jWith byte bI, jBinary system be x7 x6 x5x4 x3
x2 x1 x0And y7 y6 y5 y4 y3 y2 y1 y0, there are following mapping relations between the two:
Wherein, seeing Fig. 3 and Fig. 4, non-linearization is particularly as follows: line displacement converts and mixcolumns.
Wherein, the mapping relations of mixcolumns are:
Wherein, participate in table 1, give key superposition particularly as follows: carry out between 256 keys (32 byte) and state matrix
Displacement and XOR.
Table 1
In 102:CEMS systems soft ware installation process, pointing out user input systems instrument hardware information, customer information, number is adopted
Instrument shipment information, and write in computer registration table together with 32 byte software installation series numbers;
103: by 32 byte hardware device number write CEMS system instrument hardware core circuit boards, 32 byte softwares are installed
Sequence number is pasted on software fixing disc packing box after printing label;
32 byte hardware device number write CEMS system instrument hardware core circuit boards are answered one-time write, it is not possible to more
Change.
Wherein, copyright 256 bit digital summaries in plain text should be identical with 32 byte software installation series numbers, copyright ciphertext
256 bit digital summaries should be identical with 32 byte hardware device numbers.
104: 32 byte hardware device numbers and 32 byte software installation series numbers are verified, when upchecking, CEMS
System is properly functioning;When 32 byte software installation series numbers by inspection and 32 byte hardware device numbers verification not over,
CEMS system sends the prompting of hardware connection error;When 32 byte hardware device number verifications are passed through, 32 byte software installation series numbers
Verification is not passed through, then CEMS system gives a warning information.
Wherein, when CEMS system sends the prompting of hardware connection error, CEMS system can only operate in function presentation pattern,
Such as: be not connected with instrument hardware or instrument hardware, then " CEMS hardware connection error, system can only operate in function presentation in prompting
Pattern, automatically exited from system after 20 minutes ".
Wherein, when CEMS system gives a warning information, then prompting software version is illegal, it is proposed that reinstall this software defeated
Enter validated user information, and immediately close off CEMS system.
In sum, embodiments providing a kind of copy-right protection method for CEMS system, the present invention passes through
Software and hardware verification is replaced by illegal Counterfeit Item during preventing CEMS hardware system core;Prevent independently developed CEMS systems soft ware
Illegally it is applied to CEMS Counterfeit Item;Prevent string goods between different agent;Prevent agents from business and distort information quality guarantee period, illegally prolong
Grow free quality guarantee period thus encroach on company trade interests;This method is only formed by displacement and XOR equipotential operative combination, calculates
Journey is simple and quick.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment
Sequence number, just to describing, does not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all spirit in the present invention and
Within principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (6)
1. the copy-right protection method for CEMS system, it is characterised in that said method comprising the steps of:
(1) according to CEMS system instrument hardware information, adulterate certain random information in conjunction with shipment information, customer information simultaneously, raw
Become 32 byte hardware device numbers and 32 byte software installation series numbers;
(2) in CEMS systems soft ware installation process, pointing out user input systems instrument hardware information, customer information, number is adopted instrument and is gone out
Goods information, and write in computer registration table together with described 32 byte software installation series numbers;
(3) by described 32 byte hardware device number write CEMS system instrument hardware core circuit boards, by described 32 byte softwares
Installation series number is pasted on software fixing disc packing box after printing label;
(4) described 32 byte hardware device numbers and described 32 byte software installation series numbers are verified, when upchecking,
CEMS system is properly functioning;When described 32 byte software installation series numbers, by inspection, described 32 byte hardware device numbers verify
Not over, CEMS system sends the prompting of hardware connection error;When described 32 byte hardware device number verifications are passed through, described 32 words
Joint software installation series number verification is not passed through, then CEMS system gives a warning information;
Wherein, described according to CEMS system instrument hardware information in step (1), mix in conjunction with shipment information, customer information simultaneously
Miscellaneous certain random information, generates 32 byte hardware device numbers and 32 byte software installation series numbers, specifically includes:
According to CEMS system instrument hardware information, generate version in conjunction with shipment information, customer information certain random information that adulterates simultaneously
Power information is in plain text;
Described copyright information is encrypted in plain text generation copyright information ciphertext;
According to disclosed free Digital Signature Algorithm MD5 calculate respectively 256 in plain text corresponding bit digital summaries of copyright information and
The 256 bit digital summaries that copyright information ciphertext is corresponding;
256 corresponding for described copyright information ciphertext bit digital are made a summary as 32 byte hardware device numbers, simultaneously by described 32 words
Joint hardware device number write CEMS system instrument hardware;
The 256 bit digital summarization generation 32 byte software installation series numbers the most corresponding by described copyright information.
A kind of copy-right protection method for CEMS system the most according to claim 1, it is characterised in that described to described
Copyright information is encrypted generation copyright information ciphertext in plain text and specifically includes:
Described copyright information is carried out in plain text 256 block encodings, byte replacement, non-linearization and key superposition, generates described
Copyright information ciphertext.
A kind of copy-right protection method for CEMS system the most according to claim 2, it is characterised in that described 256
Block encoding particularly as follows:
It is in plain text 1 group with continuous 32 bytes by described copyright information, is divided into some groups, if the multiple of byte number inadequate 32, then leads to
Cross described copyright information end interpolation ASC code " 0 " in plain text to supply.
A kind of copy-right protection method for CEMS system the most according to claim 2, it is characterised in that described byte is replaced
Change particularly as follows: set byte ai,jWith byte bi,jBinary system be x7 x6 x5 x4 x3 x2 x1 x0And y7 y6 y5 y4 y3 y2 y1
y0, there are following mapping relations between the two:
A kind of copy-right protection method for CEMS system the most according to claim 2, it is characterised in that described non-linear
Change particularly as follows: line displacement converts and mixcolumns,
Wherein, the mapping relations of described mixcolumns are:
A kind of copy-right protection method for CEMS system the most according to claim 2, it is characterised in that described key is folded
Add particularly as follows: 256 carry out displacement and XOR between key and state matrix.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110215104.0A CN102289630B (en) | 2011-07-29 | 2011-07-29 | A kind of copy-right protection method for CEMS system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110215104.0A CN102289630B (en) | 2011-07-29 | 2011-07-29 | A kind of copy-right protection method for CEMS system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102289630A CN102289630A (en) | 2011-12-21 |
CN102289630B true CN102289630B (en) | 2016-09-07 |
Family
ID=45336045
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110215104.0A Active CN102289630B (en) | 2011-07-29 | 2011-07-29 | A kind of copy-right protection method for CEMS system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102289630B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102542204A (en) * | 2012-01-19 | 2012-07-04 | 天津大学 | Method for protecting local data storage file of environment-protective data acquisition and transmission instrument |
CN102750479B (en) * | 2012-06-12 | 2018-08-07 | 北京英华高科科技有限公司 | A kind of delamination software copy-right protection method |
CN102760214B (en) * | 2012-06-13 | 2015-11-18 | 北大方正集团有限公司 | A kind of novel software copyright protecting method and device |
CN103914635A (en) * | 2012-12-29 | 2014-07-09 | 中国航空工业集团公司第六三一研究所 | Eclipse software product authorization permission management method |
CN105589933A (en) * | 2015-12-10 | 2016-05-18 | 北京奇虎科技有限公司 | Hardware code writing method and apparatus for mobile device |
CN107992737A (en) * | 2017-11-27 | 2018-05-04 | 广东欧珀移动通信有限公司 | Examine method, apparatus, terminal and the readable storage medium storing program for executing of comprehensive test instrument |
CN108171523B (en) * | 2017-12-28 | 2021-03-23 | 杭州和利时自动化有限公司 | Hardware tracking method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1514375A (en) * | 2003-07-21 | 2004-07-21 | 蒋正华 | Software protection method |
CN1575446A (en) * | 2001-10-26 | 2005-02-02 | 皇家飞利浦电子股份有限公司 | Method for binding a software data domain to specific hardware |
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
CN1794258A (en) * | 2005-12-23 | 2006-06-28 | 左长进 | Method of preoenting software non-authorized use by using network card physical address |
CN101149775A (en) * | 2006-09-20 | 2008-03-26 | 展讯通信(上海)有限公司 | Encryption and decryption method for realizing hardware and software binding |
-
2011
- 2011-07-29 CN CN201110215104.0A patent/CN102289630B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1575446A (en) * | 2001-10-26 | 2005-02-02 | 皇家飞利浦电子股份有限公司 | Method for binding a software data domain to specific hardware |
CN1514375A (en) * | 2003-07-21 | 2004-07-21 | 蒋正华 | Software protection method |
CN1621992A (en) * | 2004-12-20 | 2005-06-01 | 四川大学 | Method for software copyright protection |
CN1794258A (en) * | 2005-12-23 | 2006-06-28 | 左长进 | Method of preoenting software non-authorized use by using network card physical address |
CN101149775A (en) * | 2006-09-20 | 2008-03-26 | 展讯通信(上海)有限公司 | Encryption and decryption method for realizing hardware and software binding |
Also Published As
Publication number | Publication date |
---|---|
CN102289630A (en) | 2011-12-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102289630B (en) | A kind of copy-right protection method for CEMS system | |
Koushanfar | Hardware metering: A survey | |
CN111092737B (en) | Digital certificate management method and device and block link points | |
US8839459B2 (en) | Product authentication using end-to-end cryptographic scheme | |
CN101098229B (en) | Method for checking integrality of standby information | |
US20070175974A1 (en) | System and method of code generation and authentication | |
CN105229965A (en) | Equipment identification system and equipment authenticating method | |
CN108206831A (en) | Implementation method and server, the client and readable storage medium storing program for executing of E-seal | |
CN101968834A (en) | Encryption method and device for anti-copy plate of electronic product | |
CN114154987B (en) | Meta-universe safety system based on NFR and inter-link network and operation method | |
CN1818966B (en) | Electronic seal realization | |
CN100589385C (en) | Measurement authentication method based on digital signature | |
CN106656471B (en) | A kind of guard method and system of user sensitive information | |
Urbanovich et al. | Theoretical Model of a Multi-Key Steganography System | |
CN103218723A (en) | Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure | |
MXPA02007837A (en) | Paperless records in aircraft maintenance. | |
CN109325787A (en) | The electronic contract of a kind of " blind verifying " signs verifying system | |
CN109768853A (en) | A kind of key component verification method, device and terminal device | |
CN108667610A (en) | A kind of equipment authentication method | |
CN101246576A (en) | Trade platform for integrated circuit IP market | |
CN109558341A (en) | Calculator memory data guard method and computer | |
CN109756344A (en) | The digital signature and its verification method and device of a kind of document | |
CN109446831A (en) | Key generation and verification method and system based on hardware device | |
WO2022118358A1 (en) | Currency management system and electronic signature device | |
CN107749085A (en) | Ticket card, method and machinable medium using ticket card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |