CN103473486B - Method for protecting software based on electric signing tools, device and electric signing tools - Google Patents

Method for protecting software based on electric signing tools, device and electric signing tools Download PDF

Info

Publication number
CN103473486B
CN103473486B CN201310400186.5A CN201310400186A CN103473486B CN 103473486 B CN103473486 B CN 103473486B CN 201310400186 A CN201310400186 A CN 201310400186A CN 103473486 B CN103473486 B CN 103473486B
Authority
CN
China
Prior art keywords
data
electric signing
signing tools
software
time interval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310400186.5A
Other languages
Chinese (zh)
Other versions
CN103473486A (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201310400186.5A priority Critical patent/CN103473486B/en
Publication of CN103473486A publication Critical patent/CN103473486A/en
Application granted granted Critical
Publication of CN103473486B publication Critical patent/CN103473486B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

nullThe present invention relates to a kind of method for protecting software based on electric signing tools、Device and electric signing tools,Choose electric signing tools and obtain the first response time interval of the first data that protected software is sent by this electric signing tools,Obtain this electric signing tools the response time of other data that protected software sends is spaced,And calculate the instant ratio between time interval corresponding to each other data described and described first response time interval respectively,The instant ratio got is compared with the typical ratio preset,Performance and the running environment of the terminal do not carried by software are affected,Make the judgement whether software is hacked more accurate,More preferable to the protected effect of software,And the method is realized by electric signing tools,Assailant cannot contact and get involved,The most just cannot walk around protection,Improve the protection intensity to software.

Description

Method for protecting software based on electric signing tools, device and electric signing tools
Technical field
The present invention relates to Software Protection Technique field, particularly relate to a kind of software based on electric signing tools Guard method, device and electric signing tools.
Background technology
Debugging and analysis software flow are the important means that bootlegger cracks, if it is possible to stop piracy Software is debugged by person, then the risk of software pirate version will be substantially reduced, general in prior art Software is protected by the mode using software shelling and Code obfuscation, and it is substantially to utilize software engineering Dis-assembling decompiling and trace debug to assailant raise obstacles.If software to be employed shell adding means, Although assailant cannot directly carry out dis-assembling and decompiling, but have to run shelling owing to running software Program, assailant can obtain, by the decompiling of shelling program and trace debug, the algorithm that shells, thus will Program shelling is tracked debugging;For using Code obfuscation to carry out the software protected, attacked time the most only The person of hitting arranges certain obstacle, and by coordinating the methods such as dynamic tracking debugging, assailant is equally to soft Part is debugged.
For above-mentioned technical problem, prior art proposes a solution, in software and electronic signature work During tool carries out data interaction, preset multiple pass points, obtain time interval between pass point with Error between the standard time interval preset, if when the time interval between pass point and the standard preset Between error between interval more than pre-set threshold value, then it is assumed that software is hacked, but owing to being carried by software The performance of terminal and the restriction of running environment, the time interval between the pass point got has bigger Error, then the judgement whether being hacked for software is not accurate enough.
Summary of the invention
The main object of the present invention is to provide a kind of method for protecting software based on electric signing tools, device And electric signing tools so that the judgement whether being hacked software is more accurate.
The present invention proposes a kind of method for protecting software based on electric signing tools, and the method includes:
Electric signing tools obtains the first of the first data that protected software is sent by this electric signing tools Response time is spaced;
Electric signing tools obtains the response to other data that protected software sends of this electric signing tools Time interval, and when calculating time interval corresponding to each other data described respectively with described first response Between interval between instant ratio;
Electric signing tools is according to each described the reflecting between other data and corresponding typical ratio preset Penetrate relation, obtain the typical ratio that each other data described are corresponding;
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is more than presetting Threshold values, then electric signing tools is out of service or sends control instruction to control protected software stopping fortune OK.
Preferably, described electric signing tools obtain that protected software is sent by this electric signing tools Before the step at the first response time interval of one data, the method also includes:
Electric signing tools obtains the second of the first data that protected software is sent by this electric signing tools Response time is spaced;
Obtain this electric signing tools the response time of other data that protected software sends is spaced, and Calculate respectively between time interval corresponding to each other data described and described second response time interval Ratio, using calculated described ratio as typical ratio;
Preserve described typical ratio.
Preferably, electric signing tools is according to each other data described preset and corresponding typical ratio Between mapping relations, after obtaining the step of typical ratio corresponding to each other data described, the party Method also includes:
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is less than or equal to Pre-set threshold value, then judge whether to have obtained all data that protected software is sent by this electric signing tools Response time interval;
If not obtained between the response time of all data that protected software is sent by this electric signing tools Every, then continue to obtain between this electric signing tools response time to other data that protected software sends Every.
The present invention also proposes a kind of software protecting equipment based on electric signing tools, and described software protection fills Putting and run in described electric signing tools, described software protecting equipment includes:
Acquisition module, obtains the first sound of the first data that protected software is sent by this electric signing tools Answer time interval, and obtain the response to other data that protected software sends of this electric signing tools Time interval;
Computing module, for calculating time interval corresponding to each other data described and described first response Instant ratio between time interval;
Described acquisition module be additionally operable to according to each other data described preset and corresponding typical ratio it Between mapping relations, obtain the typical ratio that each other data described are corresponding;
Control module, if between instant ratio and the corresponding typical ratio that other data described are corresponding Difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with control Protected software processed is out of service.
Preferably, described acquisition module is additionally operable to electric signing tools and obtains this electric signing tools to being protected Protect the second response time interval of the first data that software sends;Obtain this electric signing tools to being protected The response time interval of other data that software sends;Computing module be additionally operable to calculate respectively each described its Ratio between time interval and described second response time interval that his data are corresponding, by calculated Described ratio is as typical ratio;This software protecting equipment also includes memory module, is used for preserving described mark Quasi-ratio.
Preferably, this device also includes judge module, if being used for the instant ratio that other data described are corresponding And the difference between corresponding typical ratio is less than or equal to pre-set threshold value, then judge whether to have obtained this electronics The response time interval of all data that protected software is sent by signature instrument;Described acquisition module is also used If in not obtained between the response time of all data that protected software is sent by this electric signing tools Every, then continue to obtain between this electric signing tools response time to other data that protected software sends Every.
The present invention also proposes a kind of electric signing tools, comprises above-described software protecting equipment.
Method for protecting software based on electric signing tools, device and the electronic signature work that the present invention proposes Tool, chooses electric signing tools and obtains the first data that protected software sends by this electric signing tools First response time interval, obtains this electric signing tools sound to other data that protected software sends Answer time interval, and calculate time interval corresponding to each other data described and described first response respectively Instant ratio between time interval, compares the instant ratio got with the typical ratio preset, Performance and the running environment of the terminal do not carried by software are affected so that whether be hacked software Judgement more accurate, more preferable to the protected effect of software, and the method realized by electric signing tools, Assailant cannot contact and get involved, and the most just cannot walk around protection, improves the protection intensity to software.
Accompanying drawing explanation
Fig. 1 is that the flow process of the first embodiment of present invention method for protecting software based on electric signing tools is shown It is intended to;
Fig. 2 is that the flow process of the second embodiment of present invention method for protecting software based on electric signing tools is shown It is intended to;
Fig. 3 is that the flow process of the 3rd embodiment of present invention method for protecting software based on electric signing tools is shown It is intended to;
Fig. 4 is the stream of the first embodiment of a kind of software protecting equipment based on electric signing tools of the present invention Journey schematic diagram;
Fig. 5 is the stream of the second embodiment of a kind of software protecting equipment based on electric signing tools of the present invention Journey schematic diagram;
Fig. 6 is the stream of the 3rd embodiment of a kind of software protecting equipment based on electric signing tools of the present invention Journey schematic diagram.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further Explanation.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment is described further with regard to technical scheme.Should Understanding, specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
With reference to the first embodiment that Fig. 1, Fig. 1 are present invention method for protecting software based on electric signing tools Schematic flow sheet.
The present embodiment proposes a kind of method for protecting software based on electric signing tools, including:
Step S10, electric signing tools obtains the first number that protected software is sent by this electric signing tools According to first response time interval;
Software operationally and carries out data interaction, such as USBkey and bank between electric signing tools Between client software, conducting transmission line protects the process of the data interactions such as negotiation, trading signature certification.Should First data preferably carry out being sent to during for the first time data interaction soft between electric signing tools and software The data of part, such as the route protection negotiation data between USBkey and client software so that electronics label Mutual the safest between name instrument and software.
First response time interval refers to that electric signing tools sends the time point of the first data to software and connects Receive the time interval between the corresponding data of software feedback, can be by arranging meter in electric signing tools Time device, obtain the first time point that sends of data and the second time point receiving feedback data, obtain Protected software is sent out by the time interval between first time point and the second time point as electric signing tools The response time interval of the data sent, this first response time is spaced apart between software and terminal and carries out arbitrarily The time interval of data interaction successively, and when being not specific between software and terminal carry out data interaction for the first time Time interval, for the security consideration of software, the very first time is preferably spaced between software and terminal and carries out Response time interval during data interaction for the first time.
Step S20, electric signing tools obtains other numbers that protected software is sent by this electric signing tools According to response time interval, and when calculating time interval corresponding to other data described with described first response Between interval between instant ratio;
These other data and the first data belong to terminal that protected software carried with the most once run into Interaction data in journey, the response time interval of other data and the acquisition principle at the first response time interval Identical, do not repeat them here, be once sent to software protecting equipment on electric signing tools getting When the response time of data is spaced, calculates the response time interval got and the first response time is spaced it Between instant ratio.The response time of these other data is spaced time interval corresponding to first and is electronics label The time interval of data interaction is carried out between the software carried on name instrument and same terminal.
Step S30, electric signing tools is described between other data and corresponding typical ratio according to preset Mapping relations, obtain the typical ratio that other data described are corresponding;
Can be prestored correspondingly typical ratio corresponding to other data, removes the first data electric signing tools The response time of other data that protected software sends is spaced all to having a typical ratio, this mark Quasi-ratio can be obtained by many experiments.
Step S40, it is judged that the difference between instant ratio and corresponding typical ratio that other data described are corresponding Whether value is more than pre-set threshold value;
Step S50, if the difference between corresponding instant ratio and the corresponding typical ratio of other data described More than pre-set threshold value, then electric signing tools is out of service or transmission control instruction is soft to control by protection Part is out of service.
Error between typical ratio and the instant ratio corresponding to other data got can be set, make For confidence interval, if the corresponding time interval that electric signing tools is to other data that protected software sends And the difference between instant ratio and the typical ratio between very first time interval is more than threshold values, i.e. beyond putting When letter is interval, then it is assumed that now software has debugged risk, then controls this electric signing tools and stop fortune Row or transmission control instruction are out of service to control protected software, control this electric signing tools and stop Operation can be not responding to any of software transmission by this electric signing tools is set to refusal responsive state Instruction the most not and carries out any data exchange process between software, or controls this electric signing tools power-off; Send control instruction out of service to control protected software, control instruction software can be sent by phase software, After the terminal at software place receives this control instruction, close with prompting user in terminal demonstration information This software, it is possible to send interrupt instruction to software, directly terminate the operation of software.
This electric signing tools can be communicated with client by any communication mode, such as USBkey, audio frequency Key or bluetooth Key etc., communication mode is not construed as limiting by the present invention.USBkey、 Audio frequency Key and the functional similarity of bluetooth Key, be used to protect the number between user and client software According to interaction, USBkey is connected with terminal by the USB interface of terminal, and audio frequency Key passes through terminal Audio interface be connected with terminal, bluetooth Key is connected with terminal by blue-tooth device, by USBkey, Audio frequency Key or bluetooth Key protect the client software that it is corresponding, it is achieved a Key is dual-purpose, with joint Cost-saving.
Illustrate as a example by audio frequency Key, by audio frequency Key, both for certification, it is possible in the dark to this Audio frequency Key carries out the client software of data interaction and protects, and its safety and disguise are preferably; And need not in client software the special timing point that adds to obtain the time interval of data interaction, this Can be obtained by the data exchange process between the terminal at audio frequency Key and software place completely in embodiment Take corresponding data interaction time interval, the most hidden, and owing to data interaction inherently software is transported The essential condition of row, then cannot walk around and distort, and protected effect is more preferable;And owing to audio frequency Key is with soft It is online operation between the terminal at part place, when finding that software is debugged or attacks, then can pass through audio frequency The Key terminal to software place sends control instruction to terminate the operation of software.
When protected software receives continual command attack, the electric signing tools got is to being protected The response time interval of other data that software sends diminishes, then the time interval that other data are corresponding and the Instant ratio between one response time interval diminishes, and the difference between this instant ratio and typical ratio becomes Greatly;When protected software meets with reverse Commissioning Analysis, the electric signing tools got is to soft by protection The response time interval of other data that part sends becomes big, then the time interval and first that other data are corresponding Instant ratio between response time interval becomes big, and the difference between this instant ratio and typical ratio becomes big, When the difference between instant ratio and typical ratio being described more than pre-set threshold value, software may meet with continuously Attack or inversely debug, then all situations about being hacked of software all can find, security performance is high.
The method for protecting software based on electric signing tools that the present embodiment proposes, chooses electric signing tools Obtain the first response time interval of the first data that protected software is sent by this electric signing tools, obtain Take this electric signing tools the response time of other data that protected software sends is spaced, and count respectively Calculate between time interval corresponding to each other data described and described first response time interval immediately than Value, compares the instant ratio got with the typical ratio preset, the end do not carried by software The performance of end and the impact of running environment so that the judgement whether being hacked software is more accurate, right The protected effect of software is more preferable, and the method realizes by electric signing tools, assailant cannot contact with Get involved, the most just cannot walk around protection, improve the protection intensity to software.
With reference to the second embodiment that Fig. 2, Fig. 2 are present invention method for protecting software based on electric signing tools Schematic flow sheet.
Based on first embodiment proposition present invention method for protecting software based on electric signing tools second in fact Execute example, also include before step S10 in the present embodiment:
Step S60, electric signing tools obtains the first number that protected software is sent by this electric signing tools According to second response time interval;
Step S70, obtains this electric signing tools response time to other data that protected software sends Interval, and calculate respectively between time interval corresponding to each other data described and described second response time Ratio between every, using calculated described ratio as typical ratio;
Step S80, preserves described typical ratio.
Protected software can be run in same terminal, between this terminal and electric signing tools, carry out data Alternately, calculate organize between time interval corresponding to other data and described second response time interval i.e. Time ratio, and calculate the meansigma methods of instant ratio corresponding between the instant ratio often organized, use try to achieve many Individual meansigma methods, as typical ratio, preserves this typical ratio got, with use this typical ratio with after The continuous instant ratio got is compared and is judged that band protection software is the most debugged.
With reference to the 3rd embodiment that Fig. 3, Fig. 3 are present invention method for protecting software based on electric signing tools Schematic flow sheet.
Based on first embodiment and the second embodiment, present invention software protection based on electric signing tools is proposed 3rd embodiment of method, in the present embodiment after step S40, the method also includes:
Step S90, if the difference between corresponding instant ratio and the corresponding typical ratio of other data described Less than or equal to pre-set threshold value, then judge whether to have obtained what protected software was sent by this electric signing tools The response time interval of all data;
If not obtained between the response time of all data that protected software is sent by this electric signing tools Every, then continue executing with step S20, obtain other data that protected software is sent by this electric signing tools Response time interval.
If the difference between instant ratio and corresponding typical ratio that other data got are corresponding is less than Equal to pre-set threshold value, then judge whether that having obtained this electric signing tools owns protected software transmission The response time interval of data, owns protected software transmission if not obtained this electric signing tools The response time interval of data, then continue executing with step S20 and i.e. obtain this electric signing tools to being protected The response time interval of other data that software sends, if corresponding instant of other data got next time Difference between ratio and corresponding typical ratio is more than pre-set threshold value, then electric signing tools is out of service Or it is out of service to control protected software to send control instruction;If having obtained this electric signing tools pair The response time interval of all data that protected software sends, can point out user's running environment good, also Can continue to detect whether electric signing tools sends the first data to first terminal, if detecting electronic signature Instrument sends the first data to first terminal and then proceeds step S10.
Third embodiment of the invention is illustrated below by way of citing:
Can be by experiment, the second response of the first data that protected software is sent by electric signing tools Time interval is set to T1, when this electric signing tools is to the response of other data that protected software sends Between interval be respectively T2, T3 ... Tn, at calculated electric signing tools, protected software is sent Ratio T2/T1, T3/T1 between response time interval and the second response time interval of other data ... Tn / T1, can detect and organize T1, T2, T3 more ... Tn, organizes T2/T1, T3/T1 to obtain ... Tn/T1, then more Calculate the meansigma methods organizing ratio more, and the average of relatives value got is preserved as typical ratio;At electricity Sub-signature instrument be connected to terminal that protected software carried and and this terminal between carry out data interaction Time, obtain the first response time interval T1 ' of the first data that protected software is sent by electric signing tools, Then obtain this electric signing tools and the response time of other data that protected software sends be spaced T2 ', And calculate between time interval corresponding to each other data described and described first response time interval i.e. Time ratio T2 '/T1 ', obtain the difference of T2 '/between T1 ' and the T2/T1 prestored, when protected software receives To continual command attack time T2 ' diminish, then T2 '/T1 ' diminishes, and when protected software meets with reverse debugging During analysis, T2 ' becomes big so that T2 '/T1 ' becomes big, the most no matter T2 '/T1 ' diminish or become greatly can according to T2/ Difference between T1 judges that protected software is the most debugged, then says when this difference is more than pre-set threshold value This software bright is debugged, then electric signing tools is out of service or sends control instruction to control to be protected Software is out of service;If the difference of T2 '/between T1 ' and the T2/T1 prestored is less than or equal to pre-set threshold value, then Continue to obtain T3 ' and be also calculated T3 '/T1 ', if the difference of T3 '/between T1 ' and T3/T1 less than with in advance If threshold values, then continue to obtain T4, until the Tn ' got/T1 ' is less than or equal to Tn/T1, or calculate Instant ratio between time interval and described first response time interval that other data of certain arrived are corresponding More than typical ratio.
Real with reference to first that Fig. 4, Fig. 4 are a kind of software protecting equipment based on electric signing tools of the present invention Execute the schematic flow sheet of example.
The present embodiment proposes a kind of software protecting equipment based on electric signing tools, including:
Acquisition module 10, obtains the first of the first data that protected software is sent by this electric signing tools Response time is spaced, and obtains this electric signing tools sound to other data that protected software sends Answer time interval;
Software operationally and carries out data interaction, such as USBkey and bank between electric signing tools Between client software, conducting transmission line protects the process of the data interactions such as negotiation, trading signature certification.Should First data preferably carry out being sent to during for the first time data interaction soft between electric signing tools and software The data of part, such as the route protection negotiation data between USBkey and client software so that electronics label Mutual the safest between name instrument and software.
First response time interval refers to that electric signing tools sends the time point of the first data to software and connects Receive the time interval between the corresponding data of software feedback, can be by arranging meter in electric signing tools Time device, obtain the first time point that sends of data and the second time point receiving feedback data, obtain Protected software is sent out by the time interval between first time point and the second time point as electric signing tools The response time interval of the data sent.
These other data and the first data belong to terminal that protected software carried with the most once run into Interaction data in journey, the response time interval of other data and the acquisition principle at the first response time interval Identical, do not repeat them here, be once sent to software protecting equipment on electric signing tools getting When the response time of data is spaced, calculates the response time interval got and the first response time is spaced it Between instant ratio.The response time of these other data is spaced time interval corresponding to first and is electronics label The time interval of data interaction is carried out, this first response between the software carried on name instrument and same terminal Time interval is the time interval carrying out data interaction the most successively between software and terminal, and is not specific to soft Time interval during for the first time data interaction is carried out between part and terminal, for the security consideration of software, first Time interval preferably carries out response time interval during data interaction for the first time between software and terminal.
Computing module 20, for calculating time interval corresponding to each other data described and described first sound Answer the instant ratio between time interval;
Described acquisition module 10 is additionally operable to according to each other data described preset and corresponding typical ratio Between mapping relations, obtain the typical ratio that each other data described are corresponding;
Can be prestored correspondingly typical ratio corresponding to other data, removes the first data electric signing tools The response time of other data that protected software sends is spaced all to having a typical ratio, this mark Quasi-ratio can be obtained by many experiments.
Control module 30, if for the corresponding instant ratio and corresponding typical ratio of other data described it Between difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with Control protected software out of service.
Error between typical ratio and the instant ratio corresponding to other data got can be set, make For confidence interval, if the corresponding time interval that electric signing tools is to other data that protected software sends And the difference between instant ratio and the typical ratio between very first time interval is more than threshold values, i.e. beyond putting When letter is interval, then it is assumed that now software has debugged risk, then control module 30 controls this electronic signature Instrument is out of service or transmission control instruction is out of service to control protected software, and control module 30 is controlled Make this electric signing tools out of service by this electric signing tools being set to refusal responsive state, Any instruction being not responding to software transmission the most not and carries out any data exchange process between software, or controls This electric signing tools power-off;It is out of service to control protected software that control module 30 sends control instruction, Can be by sending control instruction software to software, after the terminal at software place receives this control instruction, Terminal demonstration information closes this software with prompting user, it is possible to send interrupt instruction to software, directly Terminate the operation of software.
This electric signing tools can be communicated with client by any communication mode, such as USBkey, audio frequency Key or bluetooth Key etc., communication mode is not construed as limiting by the present invention.USBkey、 Audio frequency Key and the functional similarity of bluetooth Key, be used to protect the number between user and client software According to interaction, USBkey is connected with terminal by the USB interface of terminal, and audio frequency Key passes through terminal Audio interface be connected with terminal, bluetooth Key is connected with terminal by blue-tooth device, by USBkey, Audio frequency Key or bluetooth Key protect the client software that it is corresponding, it is achieved a Key is dual-purpose, with joint Cost-saving.
Illustrate as a example by audio frequency Key, by audio frequency Key, both for certification, it is possible in the dark to this Audio frequency Key carries out the client software of data interaction and protects, and its safety and disguise are preferably; And need not in client software the special timing point that adds to obtain the time interval of data interaction, this Can be obtained by the data exchange process between the terminal at audio frequency Key and software place completely in embodiment Take corresponding data interaction time interval, the most hidden, and owing to data interaction inherently software is transported The essential condition of row, then cannot walk around and distort, and protected effect is more preferable;And owing to audio frequency Key is with soft It is online operation between the terminal at part place, when finding that software is debugged or attacks, then can pass through audio frequency The Key terminal to software place sends control instruction to terminate the operation of software.
When protected software receives continual command attack, the electric signing tools got is to being protected The response time interval of other data that software sends diminishes, then the time interval that other data are corresponding and the Instant ratio between one response time interval diminishes, and the difference between this instant ratio and typical ratio becomes Greatly;When protected software meets with reverse Commissioning Analysis, the electric signing tools got is to soft by protection The response time interval of other data that part sends becomes big, then the time interval and first that other data are corresponding Instant ratio between response time interval becomes big, and the difference between this instant ratio and typical ratio becomes big, When the difference between instant ratio and typical ratio being described more than pre-set threshold value, software may meet with continuously Attack or inversely debug, then all situations about being hacked of software all can find, security performance is high.
The software protecting equipment based on electric signing tools that the present embodiment proposes, chooses electric signing tools Obtain the first response time interval of the first data that protected software is sent by this electric signing tools, obtain Take this electric signing tools the response time of other data that protected software sends is spaced, and count respectively Calculate between time interval corresponding to each other data described and described first response time interval immediately than Value, compares the instant ratio got with the typical ratio preset, the end do not carried by software The performance of end and the impact of running environment so that the judgement whether being hacked software is more accurate, right The protected effect of software is more preferable, and the method realizes by electric signing tools, assailant cannot contact with Get involved, the most just cannot walk around protection, improve the protection intensity to software.
Real with reference to second that Fig. 5, Fig. 5 are a kind of software protecting equipment based on electric signing tools of the present invention Execute the schematic flow sheet of example.
Based on first embodiment proposition present invention software protecting equipment based on electric signing tools second in fact Executing example, the most described acquisition module 10 is additionally operable to electric signing tools and obtains this electronic signature work Has the second response time interval to the first data that protected software sends;Obtain this electric signing tools Response time interval to other data that protected software sends;Computing module 20 is additionally operable to calculate respectively Ratio between time interval and described second response time interval that each other data described are corresponding, will Calculated described ratio is as typical ratio;This software protecting equipment also includes memory module 40, uses In preserving described typical ratio.
Protected software can be run in same terminal, between this terminal and electric signing tools, carry out data Alternately, calculate organize between time interval corresponding to other data and described second response time interval i.e. Time ratio, and calculate the meansigma methods of instant ratio corresponding between the instant ratio often organized, use try to achieve many Individual meansigma methods, as typical ratio, preserves this typical ratio got, with use this typical ratio with after The continuous instant ratio got is compared and is judged that band protection software is the most debugged.
Real with reference to the 3rd that Fig. 6, Fig. 6 are a kind of software protecting equipment based on electric signing tools of the present invention Execute the schematic flow sheet of example.
Based on first embodiment proposition present invention software protecting equipment based on electric signing tools second in fact Execute example, in the present embodiment, also include judge module 50, if for corresponding instant of other data described Difference between ratio and corresponding typical ratio is less than or equal to pre-set threshold value, then judge whether to have obtained this The response time interval of all data that protected software is sent by electric signing tools;Described acquisition module If 10 when being additionally operable to the response not obtained all data that protected software is sent by this electric signing tools Between be spaced, then when continuing to obtain this electric signing tools to the response of other data that protected software sends Between be spaced.
If the difference between instant ratio and corresponding typical ratio that other data got are corresponding is less than Equal to pre-set threshold value, then judge module 50 judges whether to have obtained this electric signing tools to protected software The response time interval of all data sent, if judge module 50 is thought has not obtained this electronic signature work Have the response time interval to all data that protected software sends, then acquisition module 10 continuation acquisition should The response time of other data that protected software sends is spaced, if getting next time by electric signing tools Corresponding instant ratio and the corresponding typical ratio of other data between difference more than pre-set threshold value, then Control module 30 control electric signing tools out of service or send control instruction to control protected software Out of service;If judge module 50 judges to have obtained the institute that protected software is sent by this electric signing tools The response time having data is spaced, and user's running environment can be pointed out good, it is possible to continue detecting electronic signature Whether instrument sends the first data to first terminal, sends to first terminal if detecting electric signing tools First data then acquisition module 10 obtains the first data that protected software sends by this electric signing tools First response time interval.
Third embodiment of the invention is illustrated below by way of citing:
Can be by experiment, the second response of the first data that protected software is sent by electric signing tools Time interval is set to T1, when this electric signing tools is to the response of other data that protected software sends Between interval be respectively T2, T3 ... Tn, the calculated electric signing tools of computing module 20 is to being protected Software send other data response time interval with the second response time be spaced between ratio T2/T1, T3/T1 ... Tn/T1, can detect and organize T1, T2, T3 more ... Tn, organizes T2/T1, T3/T1 to obtain more ... Tn/T1, then calculate the meansigma methods organizing ratio more, and the average of relatives value got protected as typical ratio Exist in memory module 40;Electric signing tools be connected to terminal that protected software carried and with this When carrying out data interaction between terminal, acquisition module 10 obtains electric signing tools and sends protected software The first data first response time interval T1 ', then obtain this electric signing tools to protected software The response time interval T2 ' of other data sent, computing module 20 calculates each other data pair described Instant ratio T2 '/T1 ' between time interval and the described first response time interval answered, acquisition module 10 Obtain the difference of T2 '/between T1 ' and the T2/T1 prestored, attack when protected software receives continual command Time T2 ' diminish, then T2 '/T1 ' diminishes, and T2 ' becomes big when protected software meets with reverse Commissioning Analysis, Making T2 '/T1 ' become big, the most no matter T2 '/T1 ' diminishes or becomes to come according to the difference between T2/T1 greatly Judge that protected software is the most debugged, then illustrate that this software is debugged when this difference is more than pre-set threshold value, Then control module 30 electric signing tools is out of service or transmission control instruction is stopped to control protected software Only run;If the difference of T2 '/between T1 ' and the T2/T1 prestored is less than or equal to pre-set threshold value, then obtain mould Block 10 continues to obtain T3 ' and is also calculated T3 '/T1 ', if the difference of T3 '/between T1 ' and T3/T1 is less than With pre-set threshold value, then continue to obtain T4, until the Tn ' got/T1 ' is less than or equal to Tn/T1, or Calculate between time interval corresponding to certain other data of arriving and described first response time interval is instant Ratio is more than typical ratio.
The present invention also proposes a kind of electric signing tools, comprises the software protecting equipment described in above example.
The foregoing is only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, Every equivalent structure transformation utilizing description of the invention and accompanying drawing content to be made, or directly or indirectly use In the technical field that other are relevant, the most in like manner it is included in the scope of patent protection of the present invention.

Claims (5)

1. a method for protecting software based on electric signing tools, it is characterised in that the method includes:
Electric signing tools obtains the second of the first data that protected software is sent by this electric signing tools Response time is spaced;
Obtain this electric signing tools the response time of other data that protected software sends is spaced, and Calculate respectively between time interval corresponding to each other data described and described second response time interval Ratio, using calculated described ratio as typical ratio;
Preserve described typical ratio;
Electric signing tools obtains the first of the first data that protected software is sent by this electric signing tools Response time is spaced;
Electric signing tools obtains the response to other data that protected software sends of this electric signing tools Time interval, and calculate respectively between time interval corresponding to other data described and described first response time Instant ratio between every;
Electric signing tools closes according to the described mapping between other data and corresponding typical ratio preset System, obtains the typical ratio that each other data described are corresponding;
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding is more than presetting Threshold values, then electric signing tools is out of service or sends control instruction to control protected software stopping fortune OK.
Method the most according to claim 1, it is characterised in that electric signing tools according to preset Each described mapping relations between other data and corresponding typical ratio, obtain each other numbers described After step according to corresponding typical ratio, the method also includes:
If the difference between instant ratio and corresponding typical ratio that other data described are corresponding less than or etc. In pre-set threshold value, then judge whether to have obtained all numbers that protected software is sent by this electric signing tools According to response time interval;
If not obtained between the response time of all data that protected software is sent by this electric signing tools Every, then continue to obtain between this electric signing tools response time to other data that protected software sends Every.
3. a software protecting equipment based on electric signing tools, it is characterised in that described software protection Plant running is in described electric signing tools, and described software protecting equipment includes:
Acquisition module, obtains what protected software was sent by this electric signing tools for electric signing tools Second response time interval of the first data;Obtain that protected software sends by this electric signing tools its The response time interval of his data;It is corresponding that computing module is additionally operable to calculate each other data described respectively Time interval and described second response time interval between ratio, using calculated described ratio as Typical ratio;This software protecting equipment also includes memory module, is used for preserving described typical ratio;Obtain First response time interval of the first data that protected software is sent by this electric signing tools, and obtain Take this electric signing tools the response time of other data that protected software sends is spaced;
Computing module, for calculating time interval corresponding to other data described and described first response time Instant ratio between interval;
Described acquisition module be additionally operable to according to each other data described preset and corresponding typical ratio it Between mapping relations, obtain the typical ratio that other data described are corresponding;
Control module, if between instant ratio and the corresponding typical ratio that other data described are corresponding Difference more than pre-set threshold value, then control electric signing tools out of service or send control instruction with control Protected software processed is out of service.
Device the most according to claim 3, it is characterised in that this device also includes judge module, If for the difference between instant ratio and corresponding typical ratio that other data described are corresponding less than or etc. In pre-set threshold value, then judge whether to have obtained all numbers that protected software is sent by this electric signing tools According to response time interval;If described acquisition module is additionally operable to not obtain this electric signing tools to being protected Protect the response time interval of all data that software sends, then continue to obtain this electric signing tools to being protected Protect the response time interval of other data that software sends.
5. an electric signing tools, it is characterised in that comprise the software protection described in claim 3-4 Device.
CN201310400186.5A 2013-09-04 2013-09-04 Method for protecting software based on electric signing tools, device and electric signing tools Expired - Fee Related CN103473486B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310400186.5A CN103473486B (en) 2013-09-04 2013-09-04 Method for protecting software based on electric signing tools, device and electric signing tools

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310400186.5A CN103473486B (en) 2013-09-04 2013-09-04 Method for protecting software based on electric signing tools, device and electric signing tools

Publications (2)

Publication Number Publication Date
CN103473486A CN103473486A (en) 2013-12-25
CN103473486B true CN103473486B (en) 2016-09-28

Family

ID=49798333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310400186.5A Expired - Fee Related CN103473486B (en) 2013-09-04 2013-09-04 Method for protecting software based on electric signing tools, device and electric signing tools

Country Status (1)

Country Link
CN (1) CN103473486B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1912882A (en) * 2005-08-12 2007-02-14 李东声 Electronic signature control device and control method
CN101261667A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A software protection method
CN101290649A (en) * 2008-05-19 2008-10-22 北京深思洛克数据保护中心 Software protector with time valve protection and its realization method
CN101561858A (en) * 2008-04-17 2009-10-21 爱特梅尔公司 Cryptographic authentication apparatus, systems and methods

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8181244B2 (en) * 2006-04-20 2012-05-15 Webroot Inc. Backward researching time stamped events to find an origin of pestware

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1912882A (en) * 2005-08-12 2007-02-14 李东声 Electronic signature control device and control method
CN101261667A (en) * 2008-04-10 2008-09-10 北京深思洛克数据保护中心 A software protection method
CN101561858A (en) * 2008-04-17 2009-10-21 爱特梅尔公司 Cryptographic authentication apparatus, systems and methods
CN101290649A (en) * 2008-05-19 2008-10-22 北京深思洛克数据保护中心 Software protector with time valve protection and its realization method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于USB Key加解密技术的软件保护方案研究;王玮;《信息网络安全》;20120531;全文 *
软件防篡改技术综述;王朝坤等;《计算机研究与发展》;20110630;全文 *

Also Published As

Publication number Publication date
CN103473486A (en) 2013-12-25

Similar Documents

Publication Publication Date Title
CN106534160B (en) Identity authentication method and system based on block chain
WO2006074294A3 (en) Methods and apparatus providing security to computer systems and networks
WO2009117445A3 (en) Method and system for protection against information stealing software
WO2006130874A3 (en) Comprehensive identity protection system
CN105471815A (en) Internet-of-things data security method and Internet-of-things data security device based on security authentication
CN105827405A (en) Remotely-controlled safety lock device and remote control method thereof
CN113722683B (en) Model protection method, device, equipment, system and storage medium
CN104104687A (en) Safe login method and system
CN105045695A (en) Method and system for protecting chips in process of entering test mode
CN104349313A (en) Service authorization method, equipment and system
Eyisi et al. Energy-based attack detection in networked control systems
CN105306202A (en) Identity verification method and device, server
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN104994115A (en) Login authentication method and system
CN105653908B (en) A kind of implicit anti-debug guard method
CN103336918B (en) Electronic hard disk system authorization method and device
CN103473486B (en) Method for protecting software based on electric signing tools, device and electric signing tools
CN104636662B (en) A kind of data processing method and terminal device
CN104298908A (en) Information processing method and electronic equipment
CN106203119B (en) Hide processing method, device and the electronic equipment of cursor
CN105897401A (en) Bit-based universal differential power consumption analysis method and system
CN102647415A (en) Audio-interface-based method and system for providing identity authentication
CN115913572A (en) Data verification method, device, equipment, medium and system for mimicry storage system
CN105160256A (en) Web page vulnerability detection method and system
CN105897429A (en) Authentication method, authentication device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160928

CF01 Termination of patent right due to non-payment of annual fee