CN103488919A - Protection method and device for executable programs - Google Patents

Protection method and device for executable programs Download PDF

Info

Publication number
CN103488919A
CN103488919A CN201310437740.7A CN201310437740A CN103488919A CN 103488919 A CN103488919 A CN 103488919A CN 201310437740 A CN201310437740 A CN 201310437740A CN 103488919 A CN103488919 A CN 103488919A
Authority
CN
China
Prior art keywords
usb flash
flash disk
executable program
encryption lock
disk encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310437740.7A
Other languages
Chinese (zh)
Other versions
CN103488919B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201310437740.7A priority Critical patent/CN103488919B/en
Publication of CN103488919A publication Critical patent/CN103488919A/en
Application granted granted Critical
Publication of CN103488919B publication Critical patent/CN103488919B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Remote Sensing (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a protection method and device for executable programs. The method comprises writing information of the executable programs in hidden areas of storage devices, generating mapped icons corresponding to the information of the executable programs; starting monitoring apparatuses automatically when the storage devices and hosts are connected, wherein the monitoring apparatuses monitor double click of icons in common areas or Enter key operations; reading program data information corresponding to the icons form the hidden areas according to mapping relations; executing executable files in a debugger mode. By the aid of the method, data leakage caused by program copying can be prevented, debugging and cracking difficulties are increased, and the security is improved.

Description

A kind of guard method of executable program and device
Technical field
The present invention relates to information security field, particularly a kind of guard method of executable program and device.
Background technology
USB flash disk (USB Flash Disk), full name USB flash memory driver, be a kind of miniature high power capacity mobile storage product without phisical drive that uses USB interface, by USB interface, with computer, is connected, and realizes plug and play.Because USB flash disk has small and exquisite portable, the characteristics such as memory capacity is large, speed is fast, volume is little, in daily life and work, obtain applying more and more widely.
Common U disk is a transparent mobile memory medium equipment, to the access of data, without any access control, as long as have the access side of USB interface, can unhinderedly use.Therefore USB flash disk, bringing to people easily simultaneously, has also brought a major issue: information-leakage.
The reason of USB flash disk information-leakage mainly comprises: because the user arbitrarily copies by USB flash disk the leakage that software, file or other data cause individual or enterprise's confidential information, and the one of the main reasons of information-leakage Internet era that this mode having become.
Also there are at present some solutions or product to solve these problems; such as the modes such as encrypted U disk, fingerprint, password, authority are protected data message by secure way; but these solutions are after the illegal user of USB flash disk obtains legal password or authority; or can be copied the data in USB flash disk and be shifted, still can be caused the leakage of data message.
Encrypted U disk, encrypted U disk comprises hardware encipher and two kinds of technology of software cryptography, and hardware-based cryptographic generally is encrypted by the main control chip of USB flash disk, and level of security is high, is not easy to be cracked, cost is higher; Software is by external service end or embedded software operation, and the USB flash disk file is encrypted, and security is different because of work, and cost is relatively low.
The USB flash disk encryption lock of Elite series is safe U disc encryption lock products of deep thinking Lip river, Beijing gram research and development; corresponding network address is http://www.sense.com.cn/product_4.html, wherein discloses in detail design parameter performance and the principle of work of the Elite series USB flash disk encryption lock software protecting equipment of the applicant's exploitation.This series USB flash disk encryption lock is the security product of integrated flash memory function on the basis of smart card techniques, the USB flash disk encryption lock had both possessed the repertoire of encryption lock, simultaneously integrated a large amount of memory functions, be equivalent to an encryption lock and USB flash disk are packaged together, there is strong security, rapid communication, do not interfere with each other, the feature that reliability is high.The core security chip that the USB flash disk encryption lock adopts is based on the high safety grade CC EAL5+ design in the whole world, and the USB flash disk part can realize minute Division of difference in functionality, for example: virtual CDROM, password memory block, API Calls private area.Products characteristics: hardware is not reproducible; The programming of support standard C language, software code can " be transplanted " in encryption lock; The telesecurity of safe and convenient is controlled function, fast data in the remote update encryption lock; The security algorithm of built-in standard (RSA, AES, DES and 3DES, SHA-1); USB flash disk can be realized the flexible Application of the multi partitions such as CDROM, password area, hidden area, general memory area.
USB flash disk in the USB flash disk encryption lock partly comprises four subregions:
The CD-ROM:CD-ROM subregion is mainly used in depositing system data (file), or is used for software publishing by this subregion substitute disc;
Public area: the similar common U disk in open memory block has memory function;
Hidden area: do not show on computers drive, can't directly access the data that read wherein, for the protection of private data.
Executable program/file (EXE File) is a kind of program that can directly move of the location of can floating in operating system space.In MS-DOS and MS-Windows operating system, executable program refers to that file suffixes is called the file of .exe .com .bat.
In other operating systems, the file suffixes name of executable program can be different, but it does not affect the application of USB flash disk encryption lock in these operating systems, because this instructions is only the exemplary description to content of the present invention, rather than restriction, those skilled in the art is content according to the present invention, can the executable program in other operating system similarly be operated and process fully, its implementation procedure and MSDOS, implementation procedure in the WINDOWS system is similar, for for simplicity, because this instructions is described in detail process of the present invention and device, therefore the application for the USB flash disk encryption lock under other operating system no longer is described in greater detail.
Summary of the invention
In view of this, the invention provides the method and system of executable program anti-copy in a kind of USB flash disk encryption lock, to solve the security hidden trouble that in memory device, data message is easily revealed.
The invention provides the system of executable program anti-copy in a kind of USB flash disk encryption lock, described system comprises:
Setting device and USB flash disk encryption lock,
Described setting device, be arranged in main frame, and described main frame is connected with described USB flash disk encryption lock by interface; Described setting device is for being set to the data content of executable program the hidden area of USB flash disk encryption lock, and mapping icon that will be corresponding with described executable program is set in the public area of USB flash disk encryption lock;
Described USB flash disk encryption lock, at least comprise public area and hidden area, for the data content of stores executable programs and the mapping icon corresponding with described executable program, and for the executive software defencive function.
According to an aspect of the present invention, in described USB flash disk encryption lock, also comprise:
Supervising device, for monitoring described in the USB flash disk encryption lock corresponding with described the executable program double-click of mapping graph target or "enter" key", operate the public area in, and, according to double-clicking or executable program data content corresponding with described mapping icon in hidden area is read described in the USB flash disk encryption lock in the "enter" key" operation, load also and carry out executable program in the debugger mode.
According to an aspect of the present invention, described in the executable program data content of hidden area described in described USB flash disk encryption lock and described USB flash disk encryption lock between the mapping icon of public area, be mapping relations one to one.
According to an aspect of the present invention, described setting device has the shell of adding function, after described executable program is added to shell, again the data content of executable program is set in the hidden area of USB flash disk encryption lock, and mapping icon that will be corresponding with described executable program is set in the public area of USB flash disk encryption lock.
According to an aspect of the present invention, described setting device has encryption function, for the some or all of critical data to executable program or described executable program, by cryptographic algorithm, be encrypted, and then write the hidden area in the USB flash disk encryption lock, when reading, the more described executable program through encryption or the some or all of critical data in described executable program are decrypted.
According to an aspect of the present invention, described cryptographic algorithm comprises symmetric encipherment algorithm or rivest, shamir, adelman, and wherein cryptographic algorithm comprises AES, DES, TDES; Asymmetric arithmetic comprises RSA, ECC.
According to an aspect of the present invention, when the USB flash disk encryption lock is connected by interface with main frame, described supervising device moves automatically.
According to another aspect of the present invention, the method of executable program anti-copy in a kind of USB flash disk encryption lock is provided, be provided with setting device in main frame, described main frame is connected with described USB flash disk encryption lock by interface, there is hidden area and public area in described USB flash disk encryption lock, have supervising device in described public area, described method comprises the steps:
Step 1: by described setting device, executable program is write to the hidden area in the USB flash disk encryption lock, generate the mapping icon corresponding with executable program in the public area of USB flash disk encryption lock;
Step 2: the USB flash disk encryption lock set is connected with main frame, automatically moves the supervising device in the USB flash disk encryption lock;
Step 3: described supervising device automatic monitoring user is double-clicked for described mapping icon or the operation of "enter" key";
Step 4: described supervising device according to described mapping icon and with it the mapping relations of corresponding executable program read the data content of executable program corresponding with described mapping icon in described hidden area;
Step 5: described supervising device loads the data content of described executable program, then in the debugger mode, moves described executable program.
The present invention is stored in routine data in USB flash disk encryption lock hidden area, the mapping icon is only deposited in public area, while double-clicking the public area icon, supervising device is from the hidden area reading out data, then with the debud mode operation, Program data of the present invention are stored in hidden area and rely on supervising device and carry out, and can't outwards copy, and supervising device moves with debud mode, can prevent internal memory DUMP.By method provided by the present invention, the program that can prevent the caused leakage of data that is copied, increase debugging and crack difficulty, improves security.
The accompanying drawing explanation
Fig. 1 is the device cut-away view according to a preferred embodiment of the present invention.
Fig. 2 is the overall flow schematic diagram according to a preferred embodiment of the present invention.
Fig. 3 is the basic flow sheet according to a preferred embodiment of the present invention 1.
Fig. 4 is the basic flow sheet according to a preferred embodiment of the present invention 2.
Embodiment
For making purpose of the present invention, technical scheme and advantage clearer, referring to the accompanying drawing embodiment that develops simultaneously, the present invention is described in more detail.
Fig. 1 is the device cut-away view according to a preferred embodiment of the present invention.
As shown in Figure 1, in order more clearly to show content of the present invention, the USB flash disk encryption lock in Fig. 1 has only shown public area and hidden area, does not draw CDROM subregion and executable program/file.
As shown in Figure 1, stored the icon of a plurality of programs in public area.In Fig. 1, with the form mark of program 1 icon, program 2 icons, program 3 icons, program N icon, it corresponds respectively to program 1, program 2, program N.
In addition, also there is supervising device in public area.
According to one embodiment of present invention, supervising device is that software form realizes.The software program that supervising device is built-in USB flash disk encryption lock, for the self-starting state, just be connected with main frame when the USB flash disk encryption lock and automatically start, be mainly used in monitoring the action of mouse double-click or keyboard "enter" key" USB flash disk encryption lock public area program icon, and reading corresponding USB flash disk encryption lock hidden area executable program data content according to the mapping relations of the program icon of user operation, the loading data content is also moved executable program in the debugger mode.As shown in Figure 1, program 1 icon and hidden area Program 1 data content in public area have the mapping corresponding relation, supervising device monitors double-click or the "enter" key" action of program 1 icon, according to mapping relations, read hidden area Program 1 data content, load module 1 data content, and move executable program 1 in the debugger mode.
But those skilled in the art is appreciated that fully, supervising device fully can be according to actual user demand, realize the function of supervising device with various ways such as hardware chip, hardware integration circuit, embedded chip, firmwares, it pays performing creative labour without those skilled in the art, therefore the form that supervising device is realized as software module is only a kind of exemplary embodiment of the present invention, and is not to a kind of restriction of the present invention.The supervising device of the implemented in many forms such as above-mentioned hardware chip, hardware integration circuit, embedded chip, firmware is all in protection scope of the present invention.
As shown in Figure 1, stored the data content of a plurality of programs in hidden area.In Fig. 1, with the form mark of program 1 data content, program 2 data contents, program 3 data contents, program N data content, it corresponds respectively to program 1, program 2, program N.
The invention provides the method and system of executable file anti-copy in a kind of USB flash disk encryption lock.At first the present invention is separately positioned on program and program mapping icon (form with program icon in Fig. 1 is indicated) in USB flash disk encryption lock hidden area and public area by setting device, supervising device in the USB flash disk encryption lock with main frame (such as, the PC or the server host that by USB interface, with the USB flash disk encryption lock, are connected) just operation automatically while being connected, the double-click of the program icon of the inner public area of monitoring USB flash disk encryption lock or press the "enter" key" Action Events, after monitoring double-click or "enter" key" Action Events, read the corresponding executable program data content in hidden area according to program icon and the mapping relations of program, then load the executable program data content by supervising device, after loading completes, supervising device is carried out executable program in the debugger mode.
According to one embodiment of present invention, described setting device is Software tool module (wherein meaning so that instrument to be set in Fig. 2-Fig. 4), and it is arranged in PC or server host.Described setting device comprises write-in functions; at first it select the executable program that will protect; then the executable program that will protect is written in the hidden area of USB flash disk encryption lock; generate program icon corresponding to executable program simultaneously in the USB flash disk encryption lock, between the executable program data of wherein depositing in program icon and hidden area, corresponding relation is arranged.
As shown in Figure 2, Fig. 2 is the overall flow schematic diagram according to a preferred embodiment of the present invention.
Step 1: setting device writes USB flash disk encryption lock hidden area by executable program, generates the program icon of executable program mapping in USB flash disk encryption lock public area;
Step 2: the USB flash disk encryption lock set is connected with user's PC or server host, automatically the supervising device in the operation lock;
Supervising device automatic monitoring user in step 3:U dish encryption lock double-clicks or presses the operation of "enter" key" program icon;
Step 4: supervising device monitor double-click or the "enter" key" operation after, read according to the mapping relations of program icon and program that program icon in hidden area shines upon the executable program data message;
Step 5: supervising device loads the executable program data message, and after having loaded, supervising device is carried out executable program in the debugger mode.
Program of the present invention and program mapping icon have one-to-one relationship, and the setting of corresponding relation at least comprises following several method:
1. after setting device writes the hidden area of USB flash disk encryption lock by program, an icon can be set in USB flash disk encryption lock public area, this icon is one to one with the routine data that writes hidden area, icon class is like shortcut, and in icon path or reference position mapping hidden area the particular location path of executable program data.When the user double-clicks this icon, supervising device can read corresponding executable program data content by the mapping path of icon in hidden area;
2. setting device, in setting program and program icon, can generate the mapping relations table of a program and program icon, the correspondence mappings relation that title, path of having listed program and program icon in the mapping relations table etc. can identify.This mapping table can be stored in public area or hidden area.After supervising device monitors the double-click event or "enter" key" operation of program icon, read mapping table, according to routine data positional information corresponding to information searching such as program icon title or paths, then read and load the corresponding executable program data content in hidden area.
According to an aspect of the present invention, when in said method 2, mapping table is stored in public area and/or hidden area, for security consideration, can adopt cryptographic algorithm to be encrypted data, be decrypted when reading out data.
According to an embodiment of the invention, described encryption lock algorithm comprises symmetry algorithm or asymmetric arithmetic, and wherein symmetry algorithm comprises AES, DES, TDES; Asymmetric arithmetic comprises RSA, ECC etc.
In the present invention, supervising device is positioned at USB flash disk encryption lock inside, for monitoring double-click or the "enter" key" operational motion of executable program icon in USB flash disk encryption lock public area, and read the corresponding executable program data of shining upon in hidden area according to double-click action or "enter" key" operation, load and carry out executable program.
According to an embodiment of the invention, described supervising device is automatic running status, just operation automatically when the USB flash disk encryption lock inserts host interface.
In the present invention, write the executable program data message of hidden area with block storage separately separately.
In the present invention, setting device can also integratedly add the shell instrument or have the shell of adding function, setting device is when arranging executable program and program icon, data itself to program are added shell, and then the program that will add after shell writes in the hidden area of USB flash disk encryption lock, can improve security.For a person skilled in the art, encryption technology belongs to known technology, without describing in detail again.
In the present invention, for improving security, can also carry out the encryption and decryption operation to program or program critical data by setting device.
In the present invention, setting device Lookup protocol program and program icon, the user also can arrange manually voluntarily, according to an embodiment of the invention, such as the icon of setting program voluntarily.
Embodiment 1
The executable program that will protect in the present embodiment is the file of suffix with the .exe ending, and memory device is the USB flash disk encryption lock.According to content of the present invention, a kind of method of anti-copy of executable program is provided, as shown in Figure 3, wherein in Fig. 3, setting device means so that instrument to be set, concrete steps comprise:
1. by setting device, executable program information is written to USB flash disk encryption lock hidden area automatically;
2. generate the program icon of executable program position, path mapping in USB flash disk encryption lock public area;
3. while using, the USB flash disk encryption lock set is inserted to the main frame USB interface, the supervising device in lock starts operation automatically;
4. supervising device comes supervisory user double-click or hit program icon by "enter" key" by monitoring mouse or keyboard action;
5. supervising device reads the executable program data message of hidden area internal program icon mapping according to the program icon of double-click or "enter" key" and mapping position, the path relation of program;
6. supervising device loads the executable program data message, with debud mode operation executable program.
Embodiment 2
The executable program that will protect in the present embodiment is the file of suffix with the .bat ending, and memory device is the USB flash disk encryption lock.According to content of the present invention, a kind of method of anti-copy of executable program is provided, as shown in Figure 4, wherein in Fig. 4, setting device means so that instrument to be set, concrete steps comprise:
1. search the executable program of .bat by setting device, executable program is write to USB flash disk encryption lock hidden area;
2. setting device generates the program icon of a similar shortcut at USB flash disk encryption lock public area correspondence executable program;
3. setting device generates an executable program data content position and program icon mapping table one to one in hidden area, in mapping table, can search the Data Position in corresponding hidden area, program place according to identification information (as Custom Number, title or position);
4. the USB flash disk encryption lock set is inserted to the main frame USB interface, the supervising device in lock starts operation automatically;
5. the double-click of supervising device supervisory user or hit program icon are pressed the "enter" key" operation;
6. supervising device is searched corresponding with it routine data information position according to the identification informations such as program icon title of double-click or "enter" key" from mapping table;
7. supervising device reads the executable program data message that icon is corresponding according to mapping table in hidden area;
8. supervising device loads the executable program data message, with debud mode operation executable program.
 
In addition, according to one embodiment of present invention, the usb protocol that the USB flash disk encryption lock adopts is USB 2.0.But those skilled in the art is clear, usb protocol comprises a lot of versions, and the present invention is equally applicable to the usb protocol of other versions, includes but not limited to USB 1.1, USB 2.5, USB 3.0.
In addition, in other operating systems, the file suffixes name of executable program can be different, but it does not affect the application of USB flash disk encryption lock in these operating systems, because this instructions is only the exemplary description to content of the present invention, rather than restriction, those skilled in the art is content according to the present invention, can the executable program in other operating system similarly be operated and process fully, its implementation procedure and MSDOS, implementation procedure in the WINDOWS system is similar, can't be for for simplicity, because this instructions is described in detail process of the present invention and device, therefore this instructions no longer is described in greater detail for processing and the use-pattern of the USB flash disk encryption lock under other operating system.
The foregoing is only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of doing, be equal to and replace and improvement etc., within all should being included in protection scope of the present invention.

Claims (8)

1. the system of the interior executable program anti-copy of USB flash disk encryption lock, is characterized in that, described system comprises:
Setting device and USB flash disk encryption lock,
Described setting device, be arranged in main frame, and described main frame is connected with described USB flash disk encryption lock by interface; Described setting device is for being set to the data content of executable program the hidden area of USB flash disk encryption lock, and mapping icon that will be corresponding with described executable program is set in the public area of USB flash disk encryption lock;
Described USB flash disk encryption lock, at least comprise public area and hidden area, for the data content of stores executable programs and the mapping icon corresponding with described executable program, and for the executive software defencive function.
2. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, is characterized in that, in described USB flash disk encryption lock, also comprises:
Supervising device, for monitoring described in the USB flash disk encryption lock corresponding with described the executable program double-click of mapping graph target or "enter" key", operate the public area in, and, according to double-clicking or executable program data content corresponding with described mapping icon in hidden area is read described in the USB flash disk encryption lock in the "enter" key" operation, load also and carry out executable program in the debugger mode.
3. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, it is characterized in that, be mapping relations one to one between the mapping icon of public area described in the executable program data content of hidden area described in described USB flash disk encryption lock and described USB flash disk encryption lock.
4. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, it is characterized in that, described setting device has the shell of adding function, after described executable program is added to shell, again the data content of executable program is set in the hidden area of USB flash disk encryption lock, and mapping icon that will be corresponding with described executable program is set in the public area of USB flash disk encryption lock.
5. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, it is characterized in that, described setting device has encryption function, for the some or all of critical data to executable program or described executable program, by cryptographic algorithm, be encrypted, and then write the hidden area in the USB flash disk encryption lock, when reading, the more described executable program through encryption or the some or all of critical data in described executable program are decrypted.
6. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, is characterized in that, described cryptographic algorithm comprises symmetric encipherment algorithm or rivest, shamir, adelman, and wherein cryptographic algorithm comprises AES, DES, TDES; Asymmetric arithmetic comprises RSA, ECC.
7. the system of executable program anti-copy in a kind of USB flash disk encryption lock according to claim 1, is characterized in that, when the USB flash disk encryption lock is connected by interface with main frame, described supervising device moves automatically.
8. the method for executable program anti-copy in a USB flash disk encryption lock, be provided with setting device in main frame, described main frame is connected with described USB flash disk encryption lock by interface, it is characterized in that, there is hidden area and public area in described USB flash disk encryption lock, have supervising device in described public area, described method comprises the steps:
Step 1: by described setting device, executable program is write to the hidden area in the USB flash disk encryption lock, generate the mapping icon corresponding with executable program in the public area of USB flash disk encryption lock;
Step 2: the USB flash disk encryption lock set is connected with main frame, automatically moves the supervising device in the USB flash disk encryption lock;
Step 3: described supervising device automatic monitoring user is double-clicked for described mapping icon or the operation of "enter" key";
Step 4: described supervising device according to described mapping icon and with it the mapping relations of corresponding executable program read the data content of executable program corresponding with described mapping icon in described hidden area;
Step 5: described supervising device loads the data content of described executable program, then in the debugger mode, moves described executable program.
CN201310437740.7A 2013-09-24 2013-09-24 A kind of guard method of executable program and device Active CN103488919B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310437740.7A CN103488919B (en) 2013-09-24 2013-09-24 A kind of guard method of executable program and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310437740.7A CN103488919B (en) 2013-09-24 2013-09-24 A kind of guard method of executable program and device

Publications (2)

Publication Number Publication Date
CN103488919A true CN103488919A (en) 2014-01-01
CN103488919B CN103488919B (en) 2017-03-29

Family

ID=49829134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310437740.7A Active CN103488919B (en) 2013-09-24 2013-09-24 A kind of guard method of executable program and device

Country Status (1)

Country Link
CN (1) CN103488919B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156639A (en) * 2014-08-06 2014-11-19 广东欧珀移动通信有限公司 Method and device for opening application program through two-dimension code and intelligent terminal
CN104992129A (en) * 2015-05-28 2015-10-21 山东华芯半导体有限公司 Encryption USB flash drive for OSX system and implementing method thereof
CN106682458A (en) * 2016-12-22 2017-05-17 北京锐安科技有限公司 Method and device for authorization based on mobile device
CN108985078A (en) * 2018-04-28 2018-12-11 深圳市江波龙电子有限公司 Store decryption method, device and the storage equipment, memory apparatus system of equipment
CN109101788A (en) * 2018-06-19 2018-12-28 光大环保技术研究院(南京)有限公司 A kind of incinerator automatic combustion control system encryption device and encryption method
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN110532817A (en) * 2019-08-29 2019-12-03 北京计算机技术及应用研究所 A kind of pre installation software package hides the safety protecting method of operation
CN111062064A (en) * 2019-12-24 2020-04-24 飞天诚信科技股份有限公司 Method and system for realizing encrypted USB flash disk system
CN112559982A (en) * 2020-12-25 2021-03-26 山东华芯半导体有限公司 Copyright protection method for application program

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714118A (en) * 2009-11-20 2010-05-26 北京邮电大学 Detector for binary-code buffer-zone overflow bugs, and detection method thereof
CN102609666A (en) * 2012-01-20 2012-07-25 飞天诚信科技股份有限公司 Protecting method for packing executable program
CN102890758A (en) * 2012-10-11 2013-01-23 北京深思洛克软件技术股份有限公司 Method and system for protecting executable file
CN102968391A (en) * 2012-03-20 2013-03-13 广州市国迈科技有限公司 U disk capable of protecting copyrights of stored software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714118A (en) * 2009-11-20 2010-05-26 北京邮电大学 Detector for binary-code buffer-zone overflow bugs, and detection method thereof
CN102609666A (en) * 2012-01-20 2012-07-25 飞天诚信科技股份有限公司 Protecting method for packing executable program
CN102968391A (en) * 2012-03-20 2013-03-13 广州市国迈科技有限公司 U disk capable of protecting copyrights of stored software
CN102890758A (en) * 2012-10-11 2013-01-23 北京深思洛克软件技术股份有限公司 Method and system for protecting executable file

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156639A (en) * 2014-08-06 2014-11-19 广东欧珀移动通信有限公司 Method and device for opening application program through two-dimension code and intelligent terminal
CN104992129A (en) * 2015-05-28 2015-10-21 山东华芯半导体有限公司 Encryption USB flash drive for OSX system and implementing method thereof
CN104992129B (en) * 2015-05-28 2017-12-22 山东华芯半导体有限公司 A kind of OSX systems encrypted U disk and its implementation
CN106682458A (en) * 2016-12-22 2017-05-17 北京锐安科技有限公司 Method and device for authorization based on mobile device
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN108985078A (en) * 2018-04-28 2018-12-11 深圳市江波龙电子有限公司 Store decryption method, device and the storage equipment, memory apparatus system of equipment
CN109101788A (en) * 2018-06-19 2018-12-28 光大环保技术研究院(南京)有限公司 A kind of incinerator automatic combustion control system encryption device and encryption method
CN109101788B (en) * 2018-06-19 2022-06-03 光大环保技术研究院(南京)有限公司 Encryption device and encryption method for automatic combustion control system of incinerator
CN110532817A (en) * 2019-08-29 2019-12-03 北京计算机技术及应用研究所 A kind of pre installation software package hides the safety protecting method of operation
CN110532817B (en) * 2019-08-29 2021-09-10 北京计算机技术及应用研究所 Safety protection method for hidden operation of pre-installed software
CN111062064A (en) * 2019-12-24 2020-04-24 飞天诚信科技股份有限公司 Method and system for realizing encrypted USB flash disk system
CN111062064B (en) * 2019-12-24 2021-11-02 飞天诚信科技股份有限公司 Method and system for realizing encrypted USB flash disk system
CN112559982A (en) * 2020-12-25 2021-03-26 山东华芯半导体有限公司 Copyright protection method for application program

Also Published As

Publication number Publication date
CN103488919B (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN103617399B (en) A kind of data file guard method and device
CN103488919A (en) Protection method and device for executable programs
CN107977573B (en) Method and system for secure disk access control
Li et al. A trusted virtual machine in an untrusted management environment
CN103617398B (en) A kind of guard method of data file and device
CN102855452B (en) Fast Data Encipherment strategy based on encryption chunk is deferred to
CN108713194A (en) Use the data protection of virtual resource view
KR101476222B1 (en) Storage system having security storage device and managing method thereof
CN105993018B (en) Content item encryption in mobile device
CN112269547B (en) Active and controllable hard disk data deleting method and device without operating system
US10372628B2 (en) Cross-domain security in cryptographically partitioned cloud
CN102945355A (en) Sector map-based rapid data encryption policy compliance
TW200837602A (en) Cryptographic key containers on a USB token
Chang et al. Mobipluto: File system friendly deniable storage for mobile devices
US20100211802A1 (en) Storage Volume Protection Supporting Legacy Systems
US10091213B2 (en) Systems and methods to provide secure storage
KR20210021285A (en) Safe computer system
CN103605934B (en) Protection method and device for executable files
Chang et al. User-friendly deniable storage for mobile devices
Hong et al. Personal privacy protection framework based on hidden technology for smartphones
US20100333192A1 (en) Secure storage
EP1998270A1 (en) External storage device
US8086873B2 (en) Method for controlling file access on computer systems
JP2013506207A (en) Method and system for supporting portable desktops
CN101236532B (en) Hard disk encryption method based on USB equipment under Window environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder