CN103838995B - It can customize the information safety devices of setting - Google Patents

It can customize the information safety devices of setting Download PDF

Info

Publication number
CN103838995B
CN103838995B CN201410103387.3A CN201410103387A CN103838995B CN 103838995 B CN103838995 B CN 103838995B CN 201410103387 A CN201410103387 A CN 201410103387A CN 103838995 B CN103838995 B CN 103838995B
Authority
CN
China
Prior art keywords
sequence number
information safety
information
processing module
safety devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410103387.3A
Other languages
Chinese (zh)
Other versions
CN103838995A (en
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN201410103387.3A priority Critical patent/CN103838995B/en
Publication of CN103838995A publication Critical patent/CN103838995A/en
Application granted granted Critical
Publication of CN103838995B publication Critical patent/CN103838995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information safety devices that can customize setting; including at least one adjustable gear disk, the gear disk is configured to be used for described information safety means to be directed toward different parameters or mark by the change of its gear and perform corresponding software protection operation.The information safety devices that can customize setting of the present invention, user can be able to the corresponding function of use information safety means by peripheral operation, have the characteristics that safe, using flexible, simple, lifting user experience.

Description

It can customize the information safety devices of setting
Technical field
The present invention relates to information security field, more particularly to a kind of information safety devices that can customize setting.
Background technology
Software protecting equipment is that one kind passes through computer interface(Including but not limited to parallel port or USB interface)It is connected to meter Calculate the hardware device on machine host.There is nonvolatile storage space for read-write inside the equipment, be generally also provided with microcontroller Or the calculation processing unit such as microprocessor control chip.Software developer can be carried out by interface function and software protecting equipment Data exchange(Software protecting equipment is written and read), to check whether software protecting equipment is inserted on interface;Or directly It is encrypted with the subsidiary instrument of software protecting equipment.In this way, software developer can set many places software locks in software, profit These locks are opened by the use of software protecting equipment as key;If not inserting software protecting equipment or software protecting equipment not corresponding to, Software cannot be performed normally.
In addition, include specific function inside software protecting equipment, for example, a part of memory space, some cryptographic algorithms or Some user-defined algorithms of person or function.Before software publishing, software developer changes the software code of oneself, makes Software needs to use in the process of running some functions inside software protecting equipment, such software leaves software protection dress It is able to not will be run after putting, and software protecting equipment is larger as the difficulty that a kind of hardware device replicates, so that playing prevents The effect that piracy software is illegally propagated.
Main software protecting equipment includes on Vehicles Collected from Market:Sentinel Superpro of SafeNet companies of the U.S., Hasp HL of Aladdin companies of Israel, the Elite series of BeiJing, China's deep thinking Luo Ke softwares limited company, Germany Wi- WIBU-Key of Bu companies etc..All these software protecting equipments both provide built-in memory space, privately owned or disclosed close Code algorithm, checks whether to belong to legal when that can call these functions in software running process.These software protecting equipments are adopted By the use of intelligent card chip as the basis of hardware, and support user that the function that oneself is defined is written in software protecting equipment Portion, it might even be possible to directly the partial function of software is transplanted to inside software protecting equipment and is completed, so as to substantially increase software It is commonly referred to as this that oneself function of definition or the partial function of software are transplanted in software protecting equipment by pirate difficulty The technology in portion is code migrating.It is http that the applicant corresponds to website now://www.sense.com.cn/, wherein public in detail The design parameter performance and operation principle of the software protecting equipment of the present inventor's exploitation are opened.
Although present software protecting equipment employs high performance intelligent card chip, there is very high security, it is soft It is many or realized by house software when part protective device realizes various functions therein, and software running process energy The hard to bear monitoring to cracker, in other words, cracker can be to software running process into line trace and debugging, it might even be possible to pin The call instruction and handling result of each pass point are analyzed, so as to know the call instruction and its correspondence of each pass point The function that handling result can be realized, and then crack out the code being implanted in software protecting equipment.It can be seen from the above that based on existing Also there are certain security for some method of software Protection.
The content of the invention
The present invention provides a kind of information safety devices that can customize setting, and user can be used by peripheral operation The corresponding function of information safety devices, has the characteristics that safe, using flexible, simple, lifting user experience.
In order to solve the above technical problem, the present invention provides a kind of information safety devices that can customize setting, including At least one adjustable gear disk, the gear disk be configured to by its gear change come be directed toward different parameters or Mark is used for described information safety means and performs corresponding software protection operation.
Preferably, described information safety means specifically include setup module, acquisition module and main control chip, the master control Chip includes processing module, wherein:
The setup module includes at least one gear disk, and the gear disk is electrically connected and has with the main control chip Multiple and different scale gears of setting can voluntarily be adjusted by user by having, and the calibration information of each scale gear corresponds to difference Parameter or mark;
The acquisition module be configured to gather parameter corresponding to the calibration information of the scale gear or mark and by its Feed back to the processing module;
The processing module is configured to receive the parameter or mark of the acquisition module feedback, and it is carried out conversion and/ Or formation sequence number after arrangement, the processing module perform corresponding feature operation according to the sequence number.
Preferably, the processing module concrete configuration is by the sequence number and is stored in described information safety means Portion one switch sequence number compare, when the sequence number is identical with the switch sequence number execution described information safety means startup or The feature operation of closing.
Preferably, the work(that the processing module concrete configuration uses the sequence number as encryption and decryption key for execution Can operation.
Preferably, described information safety means are configured to be stored with multiple keys and are stored with cipher key list, the key There is the Key Sequence Number of corresponding different keys, the processing module concrete configuration is execution using the sequence number as choosing in list The feature operation that key uses is selected, concrete configuration is that the sequence number is right item by item with the Key Sequence Number in the cipher key list Than if it does, then choosing key corresponding with the matched Key Sequence Number in the cipher key list.
Preferably, described information safety means are configured to be stored with correct encrypted message, the processing module is specific It is configured to perform the feature operation using the sequence number as identification password, concrete configuration is by corresponding to the sequence number Encrypted message contrasted with the correct encrypted message stored in described information safety means, if unanimously, allowing to make With described information safety means.
Preferably, described information safety means are configured to be stored with every authority distribution list, each authority corresponds to not Same authority sequence number, the processing module concrete configuration perform the feature operation of rights management to perform by the sequence number, The authority sequence number of the sequence number and authority distribution table is specially subjected to contrast matching, if occurrence, then performs or opens Lead to the corresponding authority of authority sequence number.
Preferably, the processing module is configured to be provided with conversion table, each scale shelves are indicated in the conversion table Symbolic information corresponding to the calibration information of position, after the processing module receives the calibration information of the acquisition module feedback The calibration information is changed item by item automatically according to the conversion table, and the symbolic information obtained after conversion is connected into shape Into the sequence number.
Preferably, the symbolic information includes letter, numeral or combined information.
Preferably, described information safety means include excellent shield, encryption lock.
Compared with prior art, the beneficial effect of the information safety devices that can customize setting of the invention is:Increase The visible adjustable gear disk of at least one user, the scale gear of each gear disk correspond to different voltage, user's tune Gear dial scale, information safety devices collection user setting gear voltage are saved, inside is changed, arranged, and formation sequence number is simultaneously Implement corresponding feature operation, such as performed according to sequence number and such as select key, switching information safety means, directly by sequence Number as key, the operation such as control of authority.The information safety devices that can customize setting of the present invention simultaneously may be used by peripheral hardware hardware The mode of manual setting increases to implement protection scheme and cracks difficulty, using flexible, easy to operate, improves user experience.
Brief description of the drawings
Fig. 1 is the configuration diagram of the information safety devices that can customize setting of the embodiment of the present invention.
Fig. 2 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is showing for circular configuration It is intended to.
Fig. 3 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is showing for square structure It is intended to.
Fig. 4 is the overall structure diagram of the information safety devices that can customize setting of the embodiment of the present invention.
Embodiment
The information safety devices that can customize setting with specific embodiment to the embodiment of the present invention below in conjunction with the accompanying drawings It is described in further detail, but it is not as a limitation of the invention.
Fig. 1 is the configuration diagram of the information safety devices that can customize setting of the embodiment of the present invention.The present invention's The information safety devices that can customize setting of embodiment, including at least one adjustable gear disk, gear disk are configured to It is enough to be used for the corresponding software protection of information safety devices execution to be directed toward different parameters or mark by the change of its gear and grasp Make.The present invention's can customize the information safety devices of setting peripheral hardware hardware and can implement to protect by way of manual setting Scheme, increases and cracks difficulty, using flexible, easy to operate, improves user experience.
As an improvement information safety devices specifically include setup module, acquisition module and main control chip, main control chip Including processing module.Certainly, in order to reach the more modular beneficial effect of function, acquisition module can also be configured in master control core In piece, Fig. 1 shows that acquisition module is configured at the situation in main control chip.Wherein, setup module includes at least one gear disk, Gear disk is electrically connected and has multiple and different scale gears that setting can be voluntarily adjusted by user, gear dish type with main control chip Shape does not have set form, conventionally in the majority with circular and rectangle, and user can stir progress by rotation or up and down/left and right Regulation stall.Such as a kind of embodiment can be similar to the combination disk on combination lock for gear disk.Each scale gear corresponds to Different parameters or mark, such as the calibration information of each scale gear can correspond to different voltage parameter or numerical identity.Adopt Collection module is configured to the parameter corresponding to the calibration information of collection scale gear or mark and is fed back to processing module, handles Module is configured to receive the calibration information of acquisition module feedback, and formation sequence number after being changed and/or being arranged, processing Module performs corresponding feature operation according to sequence number.Such as a kind of embodiment is, processing module is used to receive acquisition module The scale and/or information of voltage of feedback, and the scale of reception and/or information of voltage are changed and/or arranged, generate new Sequence number, processing module perform different feature operations according to sequence number.The present invention adds at least in information safety devices The visible adjustable gear disk of one user, the scale gear of each gear disk correspond to different voltage, user's regulation stall Dial scale.After the good gear disk of user setting, the gear disk information of acquisition module capture setting, and feed back information to main control chip In processing module, the information such as the scale of collection and/or voltage are changed, are arranged by processing module, and formation sequence number is simultaneously real Apply corresponding feature operation.
As a further improvement, sequence number can be used for the startup and closing of information safety devices, information safety devices One switch sequence number of storage inside, when user's regulation stall disk, the sequence number of generation and the switch sequence of safety means storage inside When number identical, that is, perform startup or the shutoff operation of safety means.Specific implementation is that processing module concrete configuration is by sequence Row number performs letter compared with the switch sequence number being stored in inside information safety devices when sequence number is identical with the switch sequence number Cease the feature operation of startup or the closing of safety means.
As an improvement sequence number can also be used directly as key, processing module concrete configuration is to perform sequence The feature operation that row number is used as encryption and decryption key.Embodiment is, after the good gear disk of user setting, capture setting Gear formation sequence number, uses this sequence number as encryption and decryption key, so sets generation key by external hand, also has There are higher convenience and security.
Improved as further, sequence number is also used as selection key and uses, i.e.,:Stored in information safety devices There are multiple keys, also there are a cipher key list, different sequence numbers correspond to different keys in list, when the good gear disk of user setting Afterwards, the sequence number in the sequence number and cipher key list of generation is contrasted item by item, if match information, then choosing should in cipher key list The corresponding key of matched sequence number.Embodiment is that information safety devices are configured with the cipher key list for storing multiple keys, There is the Key Sequence Number of corresponding different keys, processing module concrete configuration is to perform sequence number alternatively in the cipher key list The feature operation that key uses, sequence number is specially contrasted, if match information, then choose key item by item with Key Sequence Number Key corresponding with the matched Key Sequence Number in list.
Improved as another kind, sequence number can be used as identification password, similar to the password of combination lock, information security Be stored with correct encrypted message in equipment, user using when can be by setting gear disk to be configured or adjust, collection is set The encrypted message and the encrypted message of storage inside put are contrasted, if unanimously, allowing use information safety means its His function.Embodiment is that correct encrypted message is stored with information safety devices, and processing module concrete configuration is to hold It is about to feature operation of the sequence number as identification password, specially by the encrypted message and information security corresponding to sequence number Correct encrypted message is stored with equipment to be contrasted, if unanimously, allow use information safety means, including it is required Other functions etc..
As the preferred solution of the present embodiment, the present invention can also be by setting gear disk to perform DRM operations.Tool Body embodiment is that information safety devices are configured with every authority distribution list, each authority corresponds to different authority sequence numbers, place Module concrete configuration is managed to perform the feature operation by sequence number execution rights management, specially by sequence number and authority distribution The authority sequence number of table carries out contrast matching, if occurrence, then performs or open the corresponding authority of authority sequence number.
Improved as another kind, processing module is configured to be provided with conversion table, and each scale gear is indicated in the conversion table Calibration information corresponding to symbolic information, when processing module receive acquisition module feedback calibration information after automatically according to turn Change table to change the calibration information item by item, and transformed symbolic information is connected into formation sequence number.Its specific side Method can be preferably, and set a conversion table, indicated in table each scale or letter or number corresponding to different voltages or Other combined informations.After processing module receives the scale and/or information of voltage of collection, automatically according to conversion table to collection Scale and/or information of voltage are changed item by item, and transformed numeral or letter or other combinations are connected, that is, are formed New sequence number.
As a further refinement of the present invention, the information safety devices that can customize setting of the present invention include but unlimited In excellent shield(USB Key), encryption lock, and other have and set password, the hardware device of the demand such as authority.
For the objects, technical solutions and advantages of the present invention are more clearly understood, develop simultaneously embodiment referring to the drawings, right The present invention is further described.
Fig. 2 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is showing for circular configuration It is intended to, Fig. 3 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is the signal of square structure Figure, Fig. 4 are the overall structure diagram of the information safety devices that can customize setting of the embodiment of the present invention.In the present invention, Setup module includes at least one adjustable gear disk, and gear disk is connected by the main control chip of circuit and information safety devices Connect, the exterior scale gear disk by similar combination disk is shown in outside, and user is visible and adjusts.Each gear disk has more A different scale gear, each gear correspond to different voltage.User can be voluntarily set on regulation stall disk according to demand Different stalls.
Referring to Fig. 2, Fig. 3, gear disk can be circular or rectangle, and user can be stirred by rotation or up and down/left and right It is adjusted gear, the digital and alphabetical expression gear mark in figure.It is of course also possible to it is other shapes, as long as can meet Regulatory demand.According to embodiment of the present invention, gear disk can be the combination disk on similar combination lock.
Referring to Fig. 4, Fig. 4 is the product structure schematic diagram of a preferred embodiment of the present invention.Such as Fig. 4, whole information peace Full equipment is the encryption lock of similar USB flash disk, and 401 be the USB interface of encryption lock, for being electrically connected by host interface with host, 402nd, 403 be to be shown in gear disk of outer two similar to combination disk, and each gear disk has 1-8 scale shelves in the present embodiment Position, each gear scale correspond to different voltage, it is assumed that 1 voltage of scale is 0.3V in the present embodiment, incremented by successively according to scale 0.5V, i.e. scale 2 are 0.8V, scale 3 is 1.3V, scale 4 is that 1.8V ... scales 8 are 3.8V.
Encryption lock storage inside has a voltage conversion table, and different voltages scope corresponds to different numerals in table, such as 0.2~0.7V Corresponding numerical value 1, incremented by successively 0.5, i.e. 0.7~1.2V corresponds to numerical value 2, and so on.
Cipher key list is also stored with inside encryption lock, sequence number corresponds to different keys.
During using the solution of the present invention, user voluntarily adjusts the gear for setting two gear disks, the collection inside encryption lock Module gathers the voltage of user setting gear, and information of voltage is fed back to the processing module inside encryption lock, processing module root The information of voltage of feedback is changed item by item according to voltage conversion table, numeric sequence number is converted voltages into, afterwards by sequence Number matched with the sequence number in cipher key list, if occurrence, then select the corresponding key of the matched sequence number, and then make The operation such as encryption and decryption for including data is performed with the key.
The beneficial effect of the information safety devices that can customize setting of the present invention is:Adding at least one user can The adjustable gear disk seen, the scale gear of each gear disk correspond to different voltage, user's regulation stall dial scale, information Safety means gather user setting gear voltage, and inside is changed, arranged, and formation sequence number simultaneously implements corresponding function behaviour Make, such as performed according to sequence number and such as select key, switching information safety means, directly using sequence number as key, authority The operation such as control.The present invention can customize the information safety devices of setting peripheral hardware hardware simultaneously can by way of manual setting come Implement protection scheme, increase and crack difficulty, it is using flexible, easy to operate, improve user experience.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, protection scope of the present invention It is defined by the claims.Those skilled in the art can make the present invention respectively in the essence and protection domain of the present invention Kind modification or equivalent substitution, this modification or equivalent substitution also should be regarded as being within the scope of the present invention.

Claims (9)

1. a kind of information safety devices that can customize setting, it is characterised in that including at least one adjustable gear disk, institute Gear disk is stated to be configured to be used for described information safety means by the change of its gear to be directed toward different parameters or mark Perform corresponding software protection operation;
Described information safety means specifically include setup module, acquisition module and main control chip, and the main control chip includes processing Module, wherein:
The setup module includes at least one gear disk, and the gear disk is electrically connected with the main control chip and has energy Multiple and different scale gears of setting are voluntarily adjusted by user, the calibration information of each scale gear corresponds to different ginsengs Number or mark;
The acquisition module is configured to gather parameter corresponding to the calibration information of the scale gear or mark and is fed back To the processing module;
The processing module is configured to receive the parameter or mark of the acquisition module feedback, and it is changed and/or is arranged Formation sequence number after row, the processing module perform corresponding feature operation according to the sequence number, and the feature operation includes: The feature operation of startup or the closing of described information safety means, the function behaviour for using the sequence number as encryption and decryption key Make, by the sequence number feature operation that alternatively key uses, the function using the sequence number as identification password Operation, pass through a kind of feature operation in the feature operation of sequence number execution rights management.
2. the information safety devices according to claim 1 that can customize setting, it is characterised in that the processing module tool Body is configured to by the sequence number compared with the switch sequence number being stored in inside described information safety means, when the sequence number The feature operation of startup or the closing of described information safety means is performed when identical with the switch sequence number.
3. the information safety devices according to claim 1 that can customize setting, it is characterised in that the processing module tool Body is configured to perform the feature operation for using the sequence number as encryption and decryption key.
4. the information safety devices according to claim 1 that can customize setting, it is characterised in that described information is set safely It is standby to be configured to be stored with multiple keys and be stored with cipher key list, there is the key sequence of corresponding different keys in the cipher key list Number, the processing module concrete configuration is to perform the sequence number feature operation that alternatively key uses, concrete configuration For the sequence number and the Key Sequence Number in the cipher key list are contrasted item by item, if it does, then choosing the cipher key list In key corresponding with the matched Key Sequence Number.
5. the information safety devices according to claim 1 that can customize setting, it is characterised in that described information is set safely Standby to be configured to be stored with correct encrypted message, the processing module concrete configuration is known to perform using the sequence number as identity The feature operation of other password, concrete configuration are with being deposited in described information safety means by the encrypted message corresponding to the sequence number The correct encrypted message of storage is contrasted, if unanimously, allowing to use described information safety means.
6. the information safety devices according to claim 1 that can customize setting, it is characterised in that described information is set safely Standby to be configured to be stored with every authority distribution list, each authority corresponds to different authority sequence numbers, and the processing module is specifically matched somebody with somebody The feature operation for performing and rights management being performed by the sequence number is set to, specially by the sequence number and authority distribution table Authority sequence number carries out contrast matching, if occurrence, then performs or open the corresponding authority of authority sequence number.
7. the information safety devices according to any one of claim 1 to 6 that can customize setting, it is characterised in that institute State processing module to be configured to be provided with conversion table, corresponding to the calibration information that each scale gear is indicated in the conversion table Symbolic information, automatically according to the conversion table pair after the processing module receives the calibration information of the acquisition module feedback The calibration information is changed item by item, and the symbolic information obtained after conversion is connected to form the sequence number.
8. the information safety devices according to claim 7 that can customize setting, it is characterised in that the symbolic information bag Include letter, numeral or combined information.
9. the information safety devices according to claim 7 that can customize setting, it is characterised in that described information is set safely It is standby to include excellent shield or encryption lock.
CN201410103387.3A 2014-03-19 2014-03-19 It can customize the information safety devices of setting Active CN103838995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410103387.3A CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410103387.3A CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Publications (2)

Publication Number Publication Date
CN103838995A CN103838995A (en) 2014-06-04
CN103838995B true CN103838995B (en) 2018-04-27

Family

ID=50802483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410103387.3A Active CN103838995B (en) 2014-03-19 2014-03-19 It can customize the information safety devices of setting

Country Status (1)

Country Link
CN (1) CN103838995B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI818221B (en) * 2020-12-31 2023-10-11 新唐科技股份有限公司 Chip and method capable of authenticating off-chip debug firmware program and debug user

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4525599A (en) * 1982-05-21 1985-06-25 General Computer Corporation Software protection methods and apparatus
US8327099B2 (en) * 2005-04-27 2012-12-04 Incomm Technologies Co., Ltd Method for soft configuring a memory device
CN100452070C (en) * 2006-03-14 2009-01-14 北京深思洛克数据保护中心 Software protection method
CN201207651Y (en) * 2008-03-19 2009-03-11 阎琳 USB digital autograph device
CN101282221A (en) * 2008-05-14 2008-10-08 北京深思洛克数据保护中心 Dynamic password apparatus for multiple applications and implementing method
CN103400067B (en) * 2013-03-29 2016-08-10 青岛海信电器股份有限公司 Right management method, system and server
CN103532697B (en) * 2013-10-22 2017-08-25 北京深思数盾科技股份有限公司 A kind of realization method and system of wireless messages safety means

Also Published As

Publication number Publication date
CN103838995A (en) 2014-06-04

Similar Documents

Publication Publication Date Title
Yasin et al. Ultra-low power, secure IoT platform for predicting cardiovascular diseases
Lee et al. Improving logic obfuscation via logic cone analysis
AU2014203782B2 (en) System and method for storing a password recovery secret
CN104268487B (en) Reset and self-destruction management system for security chip
CN109582354A (en) Security engine method, internet of things equipment, non-transitory computer-readable storage media
CN101650693B (en) Security control method for mobile hard disk and security mobile hard disk
CN106063182A (en) Electronic signing methods, systems and apparatus
CN103903043B (en) A kind of smart card Trinity preventing side-channel attack means of defence and system
CN103853943B (en) program protection method and device
CN103927462B (en) The remote calibration method of real-time time in software protecting equipment
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN105117658A (en) Password security management method and equipment based on fingerprint authentication
US11019098B2 (en) Replay protection for memory based on key refresh
CN103838995B (en) It can customize the information safety devices of setting
CN104573423B (en) A kind of PLC software and hardware combinings encryption protecting method
CN109391469A (en) Especially for realizing the method and apparatus of security function in the field that equipment and/or facility control
CN1318934C (en) Data encrypting and deciphering method of data storing device with laminated storing structure
CN107808086A (en) Unlocking method, device and equipment of intelligent terminal
CN201395986Y (en) Fingerprint and touch screen password protecting lock
CN107563226A (en) A kind of Memory Controller, processor module and key updating method
CN106203142A (en) A kind of method and device of the Primary Hard Drive data protecting computer
CN202887202U (en) Digitalized multi-fingerprint encryption system
CN105893821A (en) Method for encrypting USB flash disk with fingerprint authentication
CN201063642Y (en) Fingerprint USB key
CN203276262U (en) Portable storage device with encryption lock function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SHENSI SHUDUN TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
CB02 Change of applicant information

Address after: 100193 Beijing, Haidian District, East West Road, No. 10, East Hospital, building No. 5, floor 5, layer 510

Applicant after: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

Address before: 100872 room 1706, building 59, Zhongguancun street, Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.