Background technology
Software protecting equipment is that one kind passes through computer interface(Including but not limited to parallel port or USB interface)It is connected to meter
Calculate the hardware device on machine host.There is nonvolatile storage space for read-write inside the equipment, be generally also provided with microcontroller
Or the calculation processing unit such as microprocessor control chip.Software developer can be carried out by interface function and software protecting equipment
Data exchange(Software protecting equipment is written and read), to check whether software protecting equipment is inserted on interface;Or directly
It is encrypted with the subsidiary instrument of software protecting equipment.In this way, software developer can set many places software locks in software, profit
These locks are opened by the use of software protecting equipment as key;If not inserting software protecting equipment or software protecting equipment not corresponding to,
Software cannot be performed normally.
In addition, include specific function inside software protecting equipment, for example, a part of memory space, some cryptographic algorithms or
Some user-defined algorithms of person or function.Before software publishing, software developer changes the software code of oneself, makes
Software needs to use in the process of running some functions inside software protecting equipment, such software leaves software protection dress
It is able to not will be run after putting, and software protecting equipment is larger as the difficulty that a kind of hardware device replicates, so that playing prevents
The effect that piracy software is illegally propagated.
Main software protecting equipment includes on Vehicles Collected from Market:Sentinel Superpro of SafeNet companies of the U.S.,
Hasp HL of Aladdin companies of Israel, the Elite series of BeiJing, China's deep thinking Luo Ke softwares limited company, Germany Wi-
WIBU-Key of Bu companies etc..All these software protecting equipments both provide built-in memory space, privately owned or disclosed close
Code algorithm, checks whether to belong to legal when that can call these functions in software running process.These software protecting equipments are adopted
By the use of intelligent card chip as the basis of hardware, and support user that the function that oneself is defined is written in software protecting equipment
Portion, it might even be possible to directly the partial function of software is transplanted to inside software protecting equipment and is completed, so as to substantially increase software
It is commonly referred to as this that oneself function of definition or the partial function of software are transplanted in software protecting equipment by pirate difficulty
The technology in portion is code migrating.It is http that the applicant corresponds to website now://www.sense.com.cn/, wherein public in detail
The design parameter performance and operation principle of the software protecting equipment of the present inventor's exploitation are opened.
Although present software protecting equipment employs high performance intelligent card chip, there is very high security, it is soft
It is many or realized by house software when part protective device realizes various functions therein, and software running process energy
The hard to bear monitoring to cracker, in other words, cracker can be to software running process into line trace and debugging, it might even be possible to pin
The call instruction and handling result of each pass point are analyzed, so as to know the call instruction and its correspondence of each pass point
The function that handling result can be realized, and then crack out the code being implanted in software protecting equipment.It can be seen from the above that based on existing
Also there are certain security for some method of software Protection.
The content of the invention
The present invention provides a kind of information safety devices that can customize setting, and user can be used by peripheral operation
The corresponding function of information safety devices, has the characteristics that safe, using flexible, simple, lifting user experience.
In order to solve the above technical problem, the present invention provides a kind of information safety devices that can customize setting, including
At least one adjustable gear disk, the gear disk be configured to by its gear change come be directed toward different parameters or
Mark is used for described information safety means and performs corresponding software protection operation.
Preferably, described information safety means specifically include setup module, acquisition module and main control chip, the master control
Chip includes processing module, wherein:
The setup module includes at least one gear disk, and the gear disk is electrically connected and has with the main control chip
Multiple and different scale gears of setting can voluntarily be adjusted by user by having, and the calibration information of each scale gear corresponds to difference
Parameter or mark;
The acquisition module be configured to gather parameter corresponding to the calibration information of the scale gear or mark and by its
Feed back to the processing module;
The processing module is configured to receive the parameter or mark of the acquisition module feedback, and it is carried out conversion and/
Or formation sequence number after arrangement, the processing module perform corresponding feature operation according to the sequence number.
Preferably, the processing module concrete configuration is by the sequence number and is stored in described information safety means
Portion one switch sequence number compare, when the sequence number is identical with the switch sequence number execution described information safety means startup or
The feature operation of closing.
Preferably, the work(that the processing module concrete configuration uses the sequence number as encryption and decryption key for execution
Can operation.
Preferably, described information safety means are configured to be stored with multiple keys and are stored with cipher key list, the key
There is the Key Sequence Number of corresponding different keys, the processing module concrete configuration is execution using the sequence number as choosing in list
The feature operation that key uses is selected, concrete configuration is that the sequence number is right item by item with the Key Sequence Number in the cipher key list
Than if it does, then choosing key corresponding with the matched Key Sequence Number in the cipher key list.
Preferably, described information safety means are configured to be stored with correct encrypted message, the processing module is specific
It is configured to perform the feature operation using the sequence number as identification password, concrete configuration is by corresponding to the sequence number
Encrypted message contrasted with the correct encrypted message stored in described information safety means, if unanimously, allowing to make
With described information safety means.
Preferably, described information safety means are configured to be stored with every authority distribution list, each authority corresponds to not
Same authority sequence number, the processing module concrete configuration perform the feature operation of rights management to perform by the sequence number,
The authority sequence number of the sequence number and authority distribution table is specially subjected to contrast matching, if occurrence, then performs or opens
Lead to the corresponding authority of authority sequence number.
Preferably, the processing module is configured to be provided with conversion table, each scale shelves are indicated in the conversion table
Symbolic information corresponding to the calibration information of position, after the processing module receives the calibration information of the acquisition module feedback
The calibration information is changed item by item automatically according to the conversion table, and the symbolic information obtained after conversion is connected into shape
Into the sequence number.
Preferably, the symbolic information includes letter, numeral or combined information.
Preferably, described information safety means include excellent shield, encryption lock.
Compared with prior art, the beneficial effect of the information safety devices that can customize setting of the invention is:Increase
The visible adjustable gear disk of at least one user, the scale gear of each gear disk correspond to different voltage, user's tune
Gear dial scale, information safety devices collection user setting gear voltage are saved, inside is changed, arranged, and formation sequence number is simultaneously
Implement corresponding feature operation, such as performed according to sequence number and such as select key, switching information safety means, directly by sequence
Number as key, the operation such as control of authority.The information safety devices that can customize setting of the present invention simultaneously may be used by peripheral hardware hardware
The mode of manual setting increases to implement protection scheme and cracks difficulty, using flexible, easy to operate, improves user experience.
Embodiment
The information safety devices that can customize setting with specific embodiment to the embodiment of the present invention below in conjunction with the accompanying drawings
It is described in further detail, but it is not as a limitation of the invention.
Fig. 1 is the configuration diagram of the information safety devices that can customize setting of the embodiment of the present invention.The present invention's
The information safety devices that can customize setting of embodiment, including at least one adjustable gear disk, gear disk are configured to
It is enough to be used for the corresponding software protection of information safety devices execution to be directed toward different parameters or mark by the change of its gear and grasp
Make.The present invention's can customize the information safety devices of setting peripheral hardware hardware and can implement to protect by way of manual setting
Scheme, increases and cracks difficulty, using flexible, easy to operate, improves user experience.
As an improvement information safety devices specifically include setup module, acquisition module and main control chip, main control chip
Including processing module.Certainly, in order to reach the more modular beneficial effect of function, acquisition module can also be configured in master control core
In piece, Fig. 1 shows that acquisition module is configured at the situation in main control chip.Wherein, setup module includes at least one gear disk,
Gear disk is electrically connected and has multiple and different scale gears that setting can be voluntarily adjusted by user, gear dish type with main control chip
Shape does not have set form, conventionally in the majority with circular and rectangle, and user can stir progress by rotation or up and down/left and right
Regulation stall.Such as a kind of embodiment can be similar to the combination disk on combination lock for gear disk.Each scale gear corresponds to
Different parameters or mark, such as the calibration information of each scale gear can correspond to different voltage parameter or numerical identity.Adopt
Collection module is configured to the parameter corresponding to the calibration information of collection scale gear or mark and is fed back to processing module, handles
Module is configured to receive the calibration information of acquisition module feedback, and formation sequence number after being changed and/or being arranged, processing
Module performs corresponding feature operation according to sequence number.Such as a kind of embodiment is, processing module is used to receive acquisition module
The scale and/or information of voltage of feedback, and the scale of reception and/or information of voltage are changed and/or arranged, generate new
Sequence number, processing module perform different feature operations according to sequence number.The present invention adds at least in information safety devices
The visible adjustable gear disk of one user, the scale gear of each gear disk correspond to different voltage, user's regulation stall
Dial scale.After the good gear disk of user setting, the gear disk information of acquisition module capture setting, and feed back information to main control chip
In processing module, the information such as the scale of collection and/or voltage are changed, are arranged by processing module, and formation sequence number is simultaneously real
Apply corresponding feature operation.
As a further improvement, sequence number can be used for the startup and closing of information safety devices, information safety devices
One switch sequence number of storage inside, when user's regulation stall disk, the sequence number of generation and the switch sequence of safety means storage inside
When number identical, that is, perform startup or the shutoff operation of safety means.Specific implementation is that processing module concrete configuration is by sequence
Row number performs letter compared with the switch sequence number being stored in inside information safety devices when sequence number is identical with the switch sequence number
Cease the feature operation of startup or the closing of safety means.
As an improvement sequence number can also be used directly as key, processing module concrete configuration is to perform sequence
The feature operation that row number is used as encryption and decryption key.Embodiment is, after the good gear disk of user setting, capture setting
Gear formation sequence number, uses this sequence number as encryption and decryption key, so sets generation key by external hand, also has
There are higher convenience and security.
Improved as further, sequence number is also used as selection key and uses, i.e.,:Stored in information safety devices
There are multiple keys, also there are a cipher key list, different sequence numbers correspond to different keys in list, when the good gear disk of user setting
Afterwards, the sequence number in the sequence number and cipher key list of generation is contrasted item by item, if match information, then choosing should in cipher key list
The corresponding key of matched sequence number.Embodiment is that information safety devices are configured with the cipher key list for storing multiple keys,
There is the Key Sequence Number of corresponding different keys, processing module concrete configuration is to perform sequence number alternatively in the cipher key list
The feature operation that key uses, sequence number is specially contrasted, if match information, then choose key item by item with Key Sequence Number
Key corresponding with the matched Key Sequence Number in list.
Improved as another kind, sequence number can be used as identification password, similar to the password of combination lock, information security
Be stored with correct encrypted message in equipment, user using when can be by setting gear disk to be configured or adjust, collection is set
The encrypted message and the encrypted message of storage inside put are contrasted, if unanimously, allowing use information safety means its
His function.Embodiment is that correct encrypted message is stored with information safety devices, and processing module concrete configuration is to hold
It is about to feature operation of the sequence number as identification password, specially by the encrypted message and information security corresponding to sequence number
Correct encrypted message is stored with equipment to be contrasted, if unanimously, allow use information safety means, including it is required
Other functions etc..
As the preferred solution of the present embodiment, the present invention can also be by setting gear disk to perform DRM operations.Tool
Body embodiment is that information safety devices are configured with every authority distribution list, each authority corresponds to different authority sequence numbers, place
Module concrete configuration is managed to perform the feature operation by sequence number execution rights management, specially by sequence number and authority distribution
The authority sequence number of table carries out contrast matching, if occurrence, then performs or open the corresponding authority of authority sequence number.
Improved as another kind, processing module is configured to be provided with conversion table, and each scale gear is indicated in the conversion table
Calibration information corresponding to symbolic information, when processing module receive acquisition module feedback calibration information after automatically according to turn
Change table to change the calibration information item by item, and transformed symbolic information is connected into formation sequence number.Its specific side
Method can be preferably, and set a conversion table, indicated in table each scale or letter or number corresponding to different voltages or
Other combined informations.After processing module receives the scale and/or information of voltage of collection, automatically according to conversion table to collection
Scale and/or information of voltage are changed item by item, and transformed numeral or letter or other combinations are connected, that is, are formed
New sequence number.
As a further refinement of the present invention, the information safety devices that can customize setting of the present invention include but unlimited
In excellent shield(USB Key), encryption lock, and other have and set password, the hardware device of the demand such as authority.
For the objects, technical solutions and advantages of the present invention are more clearly understood, develop simultaneously embodiment referring to the drawings, right
The present invention is further described.
Fig. 2 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is showing for circular configuration
It is intended to, Fig. 3 is that the gear disk of the information safety devices that can customize setting of the embodiment of the present invention is the signal of square structure
Figure, Fig. 4 are the overall structure diagram of the information safety devices that can customize setting of the embodiment of the present invention.In the present invention,
Setup module includes at least one adjustable gear disk, and gear disk is connected by the main control chip of circuit and information safety devices
Connect, the exterior scale gear disk by similar combination disk is shown in outside, and user is visible and adjusts.Each gear disk has more
A different scale gear, each gear correspond to different voltage.User can be voluntarily set on regulation stall disk according to demand
Different stalls.
Referring to Fig. 2, Fig. 3, gear disk can be circular or rectangle, and user can be stirred by rotation or up and down/left and right
It is adjusted gear, the digital and alphabetical expression gear mark in figure.It is of course also possible to it is other shapes, as long as can meet
Regulatory demand.According to embodiment of the present invention, gear disk can be the combination disk on similar combination lock.
Referring to Fig. 4, Fig. 4 is the product structure schematic diagram of a preferred embodiment of the present invention.Such as Fig. 4, whole information peace
Full equipment is the encryption lock of similar USB flash disk, and 401 be the USB interface of encryption lock, for being electrically connected by host interface with host,
402nd, 403 be to be shown in gear disk of outer two similar to combination disk, and each gear disk has 1-8 scale shelves in the present embodiment
Position, each gear scale correspond to different voltage, it is assumed that 1 voltage of scale is 0.3V in the present embodiment, incremented by successively according to scale
0.5V, i.e. scale 2 are 0.8V, scale 3 is 1.3V, scale 4 is that 1.8V ... scales 8 are 3.8V.
Encryption lock storage inside has a voltage conversion table, and different voltages scope corresponds to different numerals in table, such as 0.2~0.7V
Corresponding numerical value 1, incremented by successively 0.5, i.e. 0.7~1.2V corresponds to numerical value 2, and so on.
Cipher key list is also stored with inside encryption lock, sequence number corresponds to different keys.
During using the solution of the present invention, user voluntarily adjusts the gear for setting two gear disks, the collection inside encryption lock
Module gathers the voltage of user setting gear, and information of voltage is fed back to the processing module inside encryption lock, processing module root
The information of voltage of feedback is changed item by item according to voltage conversion table, numeric sequence number is converted voltages into, afterwards by sequence
Number matched with the sequence number in cipher key list, if occurrence, then select the corresponding key of the matched sequence number, and then make
The operation such as encryption and decryption for including data is performed with the key.
The beneficial effect of the information safety devices that can customize setting of the present invention is:Adding at least one user can
The adjustable gear disk seen, the scale gear of each gear disk correspond to different voltage, user's regulation stall dial scale, information
Safety means gather user setting gear voltage, and inside is changed, arranged, and formation sequence number simultaneously implements corresponding function behaviour
Make, such as performed according to sequence number and such as select key, switching information safety means, directly using sequence number as key, authority
The operation such as control.The present invention can customize the information safety devices of setting peripheral hardware hardware simultaneously can by way of manual setting come
Implement protection scheme, increase and crack difficulty, it is using flexible, easy to operate, improve user experience.
Above example is only the exemplary embodiment of the present invention, is not used in the limitation present invention, protection scope of the present invention
It is defined by the claims.Those skilled in the art can make the present invention respectively in the essence and protection domain of the present invention
Kind modification or equivalent substitution, this modification or equivalent substitution also should be regarded as being within the scope of the present invention.