Summary of the invention
The objective of the invention is to have overcome above-mentioned shortcoming of the prior art; A kind of extra hardware that need not to increase is provided; Can realize to the encryption of software section and with the binding of hardware components, thereby prevent effectively that hardware is identical but equipment that software is different is upgraded each other, further can limit to each equipment through the equipment unique identifier of distinguishing each equipment; Thereby can effectively prevent bootlegging; Application mode is easy, and is with low cost, and range of application realizes the system and method that software cryptography is downloaded in the electronic equipment comparatively widely.
In order to realize above-mentioned purpose, the system that software cryptography is downloaded in the realization electronic equipment of the present invention has following formation:
It comprises softdog unit, software unit and download unit; Described softdog unit all is connected described download unit with software unit; Described download unit also connects an electronic equipment; Described softdog unit and software unit all store original encryption information, and described software unit also stores system software, and described electronic equipment has unique device number.
The method of utilizing described system to realize that software cryptography is downloaded in the electronic equipment comprises the operation of software cryptography download process, and this software cryptography download process operation may further comprise the steps:
(11) described download unit reads described original encryption information as the first original encryption information from described softdog unit;
(12) described download unit reads described original encryption information as the second original encryption information from described software unit;
(13) whether the more described first original encryption information of described download unit is consistent with the described second original encryption information, if consistent, then gets into step (15), if inconsistent, then gets into step (14);
(14) described download unit is pointed out error message and is withdrawed from this method;
(15) described download unit reads described unique device number from described electronic equipment;
(16) described download unit is combined into unique encryption device identifier with described original encryption information and described unique device number;
(17) described download unit reads described system software from described software unit;
(18) described download unit writes described unique encryption device identifier in the described system software;
(19) described download unit is with described system software and original encryption download of information to the described electronic equipment that has write unique encryption device identifier.
This realizes that described method also comprises the electronic equipment start-up operation in the method for software cryptography download in the electronic equipment, and described electronic equipment start-up operation may further comprise the steps:
(21) described electronic equipment reads described unique encryption device identifier as the first encryption device identifier from described system software;
(22) described electronic equipment is combined into an encryption device identifier as the second encryption device identifier with described original encryption information and described unique device number;
(23) described electronic equipment judges whether the described first encryption device identifier is consistent with the described second encryption device identifier, if consistent, then gets into step (24), if inconsistent, then gets into step (25);
(24) described electronic equipment starts;
(25) described electronic equipment shuts down or reports that this electronic equipment is an illegality equipment.
This is realized in the method for software cryptography download in the electronic equipment, before described software cryptography download process operation, also comprises the systemic presupposition operation, may further comprise the steps:
(01) according to user's operation described original encryption information is write described softdog unit;
(02) according to user's operation described original encryption information is write described software unit.
This realizes that it is further comprising the steps of afterwards that described systemic presupposition operates in described step (02) in the method for software cryptography download in the electronic equipment:
(03) according to user's operation, in described softdog unit, deposits preset encryption device quantity in.
This is realized in the method for software cryptography download in the electronic equipment, and is in the described software cryptography download process operation, further comprising the steps of before in described step (11):
(10) described download unit reads the encryption device quantity in the described softdog unit, and judges whether it is 0, if, then get into step (14), if not, then get into step (11);
In the described software cryptography download process operation, further comprising the steps of afterwards in described step (19):
(20) to reset the encryption device quantity in the described softdog unit be that former quantity subtracts 1 to described download unit.
Adopted the system and method that software cryptography is downloaded in the realization electronic equipment of this invention; Its system comprises softdog unit, software unit and download unit; Softdog unit and software unit all store original encryption information; Download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention; Download unit is combined into unique encryption device identifier with described original encryption information and described unique device number; And it is write in the system software that downloads to electronic equipment, make electronic equipment can judge whether this system software is bootlegging according to described unique encryption device identifier and unique device number, realize to the encryption of software section and with the binding of hardware components; Prevent effectively that hardware is identical but equipment that software is different is upgraded each other; And assurance equipment can be by bootlegging, and the system and method that software cryptography is downloaded in the realization electronic equipment of this invention need not to increase extra hardware, and application mode is easy; With low cost, range of application is comparatively extensive.
Embodiment
In order more to be expressly understood technology contents of the present invention, the special following examples of lifting specify.
In one embodiment; The system that software cryptography is downloaded in the realization electronic equipment of the present invention comprises softdog unit, software unit and download unit; Described softdog unit all is connected described download unit with software unit, and described download unit also connects an electronic equipment, and described softdog unit and software unit all store original encryption information; Described software unit also stores system software, and described electronic equipment has unique device number.
The method of utilizing the described system of this embodiment to realize that software cryptography is downloaded in the electronic equipment comprises operation of software cryptography download process and electronic equipment start-up operation, and described software cryptography download process operation is as shown in Figure 1, may further comprise the steps:
(11) described download unit reads described original encryption information as the first original encryption information from described softdog unit;
(12) described download unit reads described original encryption information as the second original encryption information from described software unit;
(13) whether the more described first original encryption information of described download unit is consistent with the described second original encryption information, if consistent, then gets into step (15), if inconsistent, then gets into step (14);
(14) described download unit is pointed out error message and is withdrawed from this method;
(15) described download unit reads described unique device number from described electronic equipment;
(16) described download unit is combined into unique encryption device identifier with described original encryption information and described unique device number;
(17) described download unit reads described system software from described software unit;
(18) described download unit writes described unique encryption device identifier in the described system software;
(19) described download unit is with described system software and original encryption download of information to the described electronic equipment that has write unique encryption device identifier.
Described electronic equipment start-up operation, as shown in Figure 2, may further comprise the steps:
(21) described electronic equipment reads described unique encryption device identifier as the first encryption device identifier from described system software;
(22) described electronic equipment is combined into an encryption device identifier as the second encryption device identifier with described original encryption information and described unique device number;
(23) described electronic equipment judges whether the described first encryption device identifier is consistent with the described second encryption device identifier, if consistent, then gets into step (24), if inconsistent, then gets into step (25);
(24) described electronic equipment starts;
(25) described electronic equipment shuts down or reports that this electronic equipment is an illegality equipment.
In a kind of more preferably embodiment, also comprise the systemic presupposition operation in the described method before the operation of software cryptography download process, this systemic presupposition operation may further comprise the steps:
(01) according to user's operation described original encryption information is write described softdog unit;
(02) according to user's operation described original encryption information is write described software unit.
In a progress preferred embodiment, it is further comprising the steps of afterwards that described systemic presupposition operates in described step (02):
(03) according to user's operation, in described softdog unit, deposits preset encryption device quantity in.
In preferred embodiment, in the described software cryptography download process operation, further comprising the steps of before in described step (11):
(10) described download unit reads the encryption device quantity in the described softdog unit, and judges whether it is 0, if, then get into step (14), if not, then get into step (11);
In the described software cryptography download process operation, further comprising the steps of afterwards in described step (19):
(20) to reset the encryption device quantity in the described softdog unit be that former quantity subtracts 1 to described download unit.
In practical application, the system that software cryptography is downloaded in the realization electronic equipment of the present invention mainly comprises softdog unit, download unit, unit, software unit.Above-mentioned each unit comprises following characteristics:
1, the softdog unit has computing power, can calculate the number of devices of having encrypted;
2, the softdog unit has storage capacity, can store original encryption information;
3, comprise original encryption information in the software unit, and headspace storage encryption device identification number;
4, original encryption information in the download unit reading encrypted dog unit and the original encryption information in the software unit contrast, if unanimity then encrypt download;
5, the unique device number in the download unit fetch equipment unit becomes unique encryption device identifier through after the encryption, is stored in the headspace in the software unit;
6, the software unit that will handle of download unit downloads in the equipment, and notice softdog unit subtracts one with quantity wherein;
7, the software in the equipment can remove to read unique encryption device identifier in the headspace when starting; And the unique device number in the unit carried out comparing after the encryption; If it is unanimity then software startup, if inconsistent then explain that this unit is an illegality equipment, the inaccurate startup.
Wherein, the softdog unit can use the blank softdog of often seeing in the market, develops a cover software voluntarily and is stored in the softdog, and the equipment that also can use independent development is developed a cover software above that as the softdog unit.This cover software needs following function and interface at least:
1, can deposit original encryption information A 1 in;
2, can set the number of devices B1 that needs encryption;
3, can the number of devices of need encrypting be subtracted one automatically, if return error message when being zero.
It is following to encrypt the pre-treatment flow process of downloading:
1, in the softdog unit, deposits original encryption information A 1 in;
2, in the softdog unit, deposit the number of devices B1 that needs encryption in;
3, deposit original encryption information A 2 in the software unit in;
4, reserve the space of the unique encryption device identifier D1 of storage in the software unit.
Encrypt and download main treatment scheme, as shown in Figure 3, comprise the steps:
1, download unit reads the number of devices B1 that needs encryption from the softdog unit, if B1 is 0, then withdraws to encrypt and downloads;
2, download unit reads original encryption information A 1 from the softdog unit;
3, download unit reads original encryption information A 2 from software unit;
4, contrast A1 and A2, if identical then continue to download, if difference then withdraw from download;
5, fetch equipment unique identifier C1 in the download unit slave unit unit;
6, equipment unique identifier C1 and original encryption information A 1 are combined into unique encryption device identifier D1;
7, download unit reads in software unit;
8, deposit unique encryption device identifier D1 in reserve in the software unit space;
9, download unit notice softdog subtracts 1 with the number of devices B1 that needs in the softdog unit to encrypt;
The software unit that 10, will deposit D1 in downloads to unit.
11, accomplishing encryption downloads
Through encryption the device start flow process after downloading, as shown in Figure 4, comprise the steps:
1, software unit starts
2, software unit reads unique encryption device identifier D1;
3, software unit fetch equipment unique identifier C1;
4, software unit is combined into unique encryption device identifier D2 with equipment unique identifier C1 and original encryption information A 2;
5, relatively D1 and D2, if identical then continue to start, if difference then shut down or point out illegality equipment.
The equipment that this encryption method of process was handled; If there is the lawless person to take or copy unit through means such as flights; And read the software unit among some equipment E1 through reading software, then this software unit is burnt to unit on a large scale and forms illegality equipment.The software unit of this illegality equipment can read unique encryption device identifier D1 and equipment unique identifier C1, and equipment unique identifier C1 and original encryption information A 2 are combined into unique encryption device identifier D2 when starting.Because unique encryption device D1 is the unique encryption device D1 among some equipment E1, the unique encryption device D2 that calculates with this machine is also inequality, so software unit can normally not start, thus the use of having stopped illegality equipment.
In the unit downloaded software unit first time; Just be written to unique encryption device identifier in the unit; And unique encryption device identifier comprises the equipment unique identifier of the original encryption information of distinguishing unit type and each equipment of differentiation; Therefore download again after or the upgrade software unit time, just need not re-use the softdog unit, can make things convenient for after-sales service and customer upgrade.Simultaneously owing to contain the original encryption information of distinguishing unit type in unique encryption device identifier; Can prevent the identical device unit but the different equipment of software unit is upgraded each other; Even can accomplish to be directed against each equipment through the equipment unique identifier of distinguishing each equipment and limit, thereby make market sale that better dirigibility arranged.
Adopted the system and method that software cryptography is downloaded in the realization electronic equipment of this invention; Its system comprises softdog unit, software unit and download unit; Softdog unit and software unit all store original encryption information; Download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention; Download unit is combined into unique encryption device identifier with described original encryption information and described unique device number; And it is write in the system software that downloads to electronic equipment, make electronic equipment can judge whether this system software is bootlegging according to described unique encryption device identifier and unique device number, realize to the encryption of software section and with the binding of hardware components; Prevent effectively that hardware is identical but equipment that software is different is upgraded each other; And assurance equipment can be by bootlegging, and the system and method that software cryptography is downloaded in the realization electronic equipment of this invention need not to increase extra hardware, and application mode is easy; With low cost, range of application is comparatively extensive.
In this instructions, the present invention is described with reference to its certain embodiments.But, still can make various modifications and conversion obviously and not deviate from the spirit and scope of the present invention.Therefore, instructions and accompanying drawing are regarded in an illustrative, rather than a restrictive.