Summary of the invention
It is an object of the invention to overcome above-mentioned shortcoming of the prior art, there is provided a kind of without increasing extra hardware cost, the encryption to software section and the binding with hardware components can be realized, thus effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, further can be limited for each equipment by the equipment unique identifier of each equipment of differentiation, it is thus possible to effectively prevent bootlegging, application mode is easy, with low cost, and range of application relatively broad realize the system and method that software cryptography in electronic equipment is downloaded.
In order to realize above-mentioned purpose, the system that software cryptography in electronic equipment downloads that realizes of the present invention has a following composition:
It includes softdog unit, software unit and download unit, described softdog unit and software unit are all connected with described download unit, described download unit is also connected with an electronic equipment, described softdog unit and software unit have all stored original encryption information, described software unit also stores systems soft ware, and described electronic equipment has unique device number;Described download unit is used for from the unique device number described in described electronic equipment reading, and described original encryption information and described unique device number are combined into unique encryption device identifier.
System described in utilization realizes the method that in electronic equipment, software cryptography is downloaded and includes that software cryptography download process operates, and the operation of this software cryptography download process comprises the following steps:
(11) download unit described in from described softdog unit read described in original encryption information as the first original encryption information;
(12) download unit described in from described software unit read described in original encryption information as the second original encryption information;
(13) relatively described the first original encryption information of the download unit described in is the most consistent with the second described original encryption information, if unanimously, then enters step (15), if inconsistent, then enters step (14);
(14) download unit described in is pointed out error message and exits this method;
(15) download unit described in is from the unique device number described in described electronic equipment reading;
(16) described original encryption information and described unique device number are combined into unique encryption device identifier by the download unit described in;
(17) download unit described in is from the systems soft ware described in described software unit reading;
(18) download unit described in is by the systems soft ware described in described unique encryption device identifier write;
(19) the described systems soft ware being written with unique encryption device identifier and original encryption information are downloaded to described electronic equipment by the download unit described in.
This realizes in the method that in electronic equipment, software cryptography is downloaded, and described method also includes that electronic equipment starts operation, and described electronic equipment starts operation and comprises the following steps:
(21) electronic equipment described in read from described systems soft ware described in unique encryption device identifier as the first encryption device identifier;
(22) described original encryption information and described unique device number are combined into an encryption device identifier as the second encryption device identifier by the electronic equipment described in;
(23) the first encryption device identifier described in electronic equipment judgement described in is the most consistent with the second described encryption device identifier, if unanimously, then enters step (24), if inconsistent, then enters step (25);
(24) electronic equipment described in starts;
(25) electronic equipment described in shuts down or reports that this electronic equipment is illegality equipment.This realizes in the method that in electronic equipment, software cryptography is downloaded, and also includes that systemic presupposition operates, and comprised the following steps before described software cryptography download process operation:
(01) according to user operation by the softdog unit described in described original encryption information write;
(02) according to user operation by the software unit described in described original encryption information write.
This realizes in the method that in electronic equipment, software cryptography is downloaded, and described systemic presupposition operation is further comprising the steps of after described step (02):
(03) according to user operation, described softdog unit is stored in default encryption device quantity.
This realizes in the method that in electronic equipment, software cryptography is downloaded, in described software cryptography download process operation, further comprising the steps of before described step (11):
(10) the encryption device quantity in the softdog unit described in download unit reading described in, and judge whether it is 0, the most then enter step (14), if it is not, then enter step (11);
In described software cryptography download process operation, further comprising the steps of after described step (19):
(20) it is that former quantity subtracts 1 that the download unit described in resets the encryption device quantity in described softdog unit.
Have employed this invention realizes the system and method that in electronic equipment, software cryptography is downloaded, its system includes softdog unit, software unit and download unit, softdog unit and software unit have all stored original encryption information, download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention, described original encryption information and described unique device number are combined into unique encryption device identifier by download unit, and be written into downloading in the systems soft ware of electronic equipment, make electronic equipment can judge whether this systems soft ware is bootlegging according to described unique encryption device identifier and unique device number, realize the encryption to software section and the binding with hardware components, effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, and ensure that equipment will not be copied illegally, this invention realize system and method that software cryptography in electronic equipment downloads without increasing extra hardware cost, and application mode is easy, with low cost, range of application is relatively broad.
Detailed description of the invention
In order to be more clearly understood that the technology contents of the present invention, describe in detail especially exemplified by following example.
In one embodiment, the system that in electronic equipment, software cryptography is downloaded that realizes of the present invention includes softdog unit, software unit and download unit, described softdog unit and software unit are all connected with described download unit, described download unit is also connected with an electronic equipment, described softdog unit and software unit have all stored original encryption information, described software unit also stores systems soft ware, and described electronic equipment has unique device number.
Utilize the system described in this embodiment to realize the method that in electronic equipment, software cryptography is downloaded and include that the operation of software cryptography download process and electronic equipment startup operate, described software cryptography download process operation, as it is shown in figure 1, comprise the following steps:
(11) download unit described in from described softdog unit read described in original encryption information as the first original encryption information;
(12) download unit described in from described software unit read described in original encryption information as the second original encryption information;
(13) relatively described the first original encryption information of the download unit described in is the most consistent with the second described original encryption information, if unanimously, then enters step (15), if inconsistent, then enters step (14);
(14) download unit described in is pointed out error message and exits this method;
(15) download unit described in is from the unique device number described in described electronic equipment reading;
(16) described original encryption information and described unique device number are combined into unique encryption device identifier by the download unit described in;
(17) download unit described in is from the systems soft ware described in described software unit reading;
(18) download unit described in is by the systems soft ware described in described unique encryption device identifier write;
(19) the described systems soft ware being written with unique encryption device identifier and original encryption information are downloaded to described electronic equipment by the download unit described in.
Described electronic equipment starts operation, as in figure 2 it is shown, comprise the following steps:
(21) electronic equipment described in read from described systems soft ware described in unique encryption device identifier as the first encryption device identifier;
(22) described original encryption information and described unique device number are combined into an encryption device identifier as the second encryption device identifier by the electronic equipment described in;
(23) the first encryption device identifier described in electronic equipment judgement described in is the most consistent with the second described encryption device identifier, if unanimously, then enters step (24), if inconsistent, then enters step (25);
(24) electronic equipment described in starts;
(25) electronic equipment described in shuts down or reports that this electronic equipment is illegality equipment.
In one more preferably embodiment, also including that systemic presupposition operates in described method before the operation of software cryptography download process, the operation of this systemic presupposition comprises the following steps:
(01) according to user operation by the softdog unit described in described original encryption information write;
(02) according to user operation by the software unit described in described original encryption information write.In a progress preferred embodiment, described systemic presupposition operation is further comprising the steps of after described step (02):
(03) according to user operation, described softdog unit is stored in default encryption device quantity.
In preferred embodiment, in described software cryptography download process operation, further comprising the steps of before described step (11):
(10) the encryption device quantity in the softdog unit described in download unit reading described in, and judge whether it is 0, the most then enter step (14), if it is not, then enter step (11);
In described software cryptography download process operation, further comprising the steps of after described step (19):
(20) it is that former quantity subtracts 1 that the download unit described in resets the encryption device quantity in described softdog unit.
In actual applications, the system that in electronic equipment, software cryptography is downloaded that realizes of the present invention mainly includes softdog unit, download unit, unit, software unit.Above-mentioned each unit includes following characteristics:
1, softdog unit has computing capability, can calculate the most encrypted number of devices;
2, softdog unit has storage capacity, can store original encryption information;
3, software unit comprises original encryption information, and headspace storage encryption device identifier;
4, the original encryption information during download unit reads softdog unit compares with the original encryption information in software unit, if consistent, is encrypted download;
5, the unique device number during download unit reads unit, becomes unique encryption device identifier, the headspace being stored in software unit after encryption;
6, the software unit processed is downloaded in equipment by download unit, and notifies that quantity therein is subtracted one by softdog unit;
7, the software in equipment can go to read unique encryption device identification number in headspace starting when, and the unique device number in unit is encrypted compares afterwards, if consistent, software starts, if inconsistent, illustrates that this unit is illegality equipment, inaccurate startup.
Wherein, softdog unit can use and compare common blank softdog in the market, and a set of software of self-developing is stored in softdog, it is possible to use the equipment of independent development, as softdog unit, develops a set of software thereon.This set software at least needs following functions and interface:
1, original encryption information A1 can be stored in;
2, the number of devices B1 needing to encrypt can be set;
3, the number of devices needing encryption can be subtracted one automatically, if returning error message when of zero.
The pre-treatment flow process that encryption is downloaded is as follows:
1, in softdog unit, original encryption information A1 it is stored in;
2, in softdog unit, it is stored in the number of devices B1 needing to encrypt;
3, software unit is stored in original encryption information A2;
4, the space of reserved storage unique encryption device identification number D1 in software unit.
Main handling process is downloaded in encryption, as it is shown on figure 3, comprise the steps:
1, download unit reads the number of devices B1 needing encryption from softdog unit, if B1 is 0, then exits encryption and downloads;
2, download unit reads original encryption information A1 from softdog unit;
3, download unit reads original encryption information A2 from software unit;
4, contrast A1 and A2, if the same continues to download, if difference, exits download;
5, download unit reads equipment unique identifier C1 from unit;
6, equipment unique identifier C1 and original encryption information A1 are combined into unique encryption device identification number D1;
7, download unit reads in software unit;
8, unique encryption device identification number D1 is stored in software unit reserved space;
9, download unit notice softdog, subtracts 1 by the number of devices B1 needing encryption in softdog unit;
10, the software unit being stored into D1 downloads to unit.
11, complete encryption to download
Equipment Booting sequence after encryption is downloaded, as shown in Figure 4, comprises the steps:
1, software unit starts
2, software unit reads unique encryption device identification number D1;
3, software unit reads equipment unique identifier C1;
4, equipment unique identifier C1 and original encryption information A2 are combined into unique encryption device identification number D2 by software unit;
5, compare D1 and D2, if the same continue to start, if difference, shut down or point out illegality equipment.
Through the equipment that this encryption method processed, if there being lawless person to take or copy unit by means such as flights, and read the software unit in some equipment E1 by reading software, then this software unit is burnt to unit on a large scale and forms illegality equipment.The software unit of this illegality equipment, starting when, can read unique encryption device identification number D1 and equipment unique identifier C1, and equipment unique identifier C1 and original encryption information A2 are combined into unique encryption device identification number D2.Owing to unique encryption device number D1 is the unique encryption device number D1 in some equipment E1, the unique encryption device number D2 calculated with the machine also differs, and therefore software unit will not normally start, thus has stopped the use of illegality equipment.
Unit downloaded software unit for the first time when, the most unique encryption device identification number is written in unit, and unique encryption device identification number comprises the original encryption information distinguishing unit type and the equipment unique identifier distinguishing each equipment, therefore after download again or upgrade software unit when, avoid the need for re-using softdog unit, after-sales service and customer upgrade can be facilitated.Simultaneously because containing the original encryption information distinguishing unit type in unique encryption device identification number, it is possible to prevent identical device unit but the different equipment of software unit is mutually upgraded, can accomplish to limit for each equipment, so that market sale has more preferable motility even with the equipment unique identifier distinguishing each equipment.
Have employed this invention realizes the system and method that in electronic equipment, software cryptography is downloaded, its system includes softdog unit, software unit and download unit, softdog unit and software unit have all stored original encryption information, download unit connects an electronic equipment, and this electronic equipment has unique device number.In the method for the invention, described original encryption information and described unique device number are combined into unique encryption device identifier by download unit, and be written into downloading in the systems soft ware of electronic equipment, make electronic equipment can judge whether this systems soft ware is bootlegging according to described unique encryption device identifier and unique device number, realize the encryption to software section and the binding with hardware components, effectively prevent that hardware is identical but equipment that software is different is mutually upgraded, and ensure that equipment will not be copied illegally, this invention realize system and method that software cryptography in electronic equipment downloads without increasing extra hardware cost, and application mode is easy, with low cost, range of application is relatively broad.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that still may be made that various modifications and alterations are without departing from the spirit and scope of the present invention.Therefore, specification and drawings is regarded in an illustrative, rather than a restrictive.